The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Q(6809hit)

761-780hit(6809hit)

  • Optimizing Non-Uniform Bandwidth Reservation Based on Meter Table of Openflow

    Liaoruo HUANG  Qingguo SHEN  Zhangkai LUO  

     
    LETTER-Information Network

      Pubricized:
    2018/03/14
      Vol:
    E101-D No:6
      Page(s):
    1694-1698

    Bandwidth reservation is an important way to guarantee deterministic end-to-end service quality. However, with the traditional bandwidth reservation mechanism, the allocated bandwidth at each link is by default the same without considering the available resource of each link, which may lead to unbalanced resource utilization and limit the number of user connections that network can accommodate. In this paper, we propose a non-uniform bandwidth reservation method, which can further balance the resource utilization of network by optimizing the reserved bandwidth at each link according to its link load. Furthermore, to implement the proposed method, we devise a flexible and automatic bandwidth reservation mechanism based on meter table of Openflow. Through simulations, it is showed that our method can achieve better load balancing performance and make network accommodate more user connections comparing with the traditional methods in most application scenarios.

  • Estimating the Quality of Fractal Compressed Images Using Lacunarity

    Megumi TAKEZAWA  Hirofumi SANADA  Takahiro OGAWA  Miki HASEYAMA  

     
    LETTER

      Vol:
    E101-A No:6
      Page(s):
    900-903

    In this paper, we propose a highly accurate method for estimating the quality of images compressed using fractal image compression. Using an iterated function system, fractal image compression compresses images by exploiting their self-similarity, thereby achieving high levels of performance; however, we cannot always use fractal image compression as a standard compression technique because some compressed images are of low quality. Generally, sufficient time is required for encoding and decoding an image before it can be determined whether the compressed image is of low quality or not. Therefore, in our previous study, we proposed a method to estimate the quality of images compressed using fractal image compression. Our previous method estimated the quality using image features of a given image without actually encoding and decoding the image, thereby providing an estimate rather quickly; however, estimation accuracy was not entirely sufficient. Therefore, in this paper, we extend our previously proposed method for improving estimation accuracy. Our improved method adopts a new image feature, namely lacunarity. Results of simulation showed that the proposed method achieves higher levels of accuracy than those of our previous method.

  • Source-Side Detection of DRDoS Attack Request with Traffic-Aware Adaptive Threshold

    Sinh-Ngoc NGUYEN  Van-Quyet NGUYEN  Giang-Truong NGUYEN  JeongNyeo KIM  Kyungbaek KIM  

     
    LETTER-Information Network

      Pubricized:
    2018/03/12
      Vol:
    E101-D No:6
      Page(s):
    1686-1690

    Distributed Reflective Denial of Services (DRDoS) attacks have gained huge popularity and become a major factor in a number of massive cyber-attacks. Usually, the attackers launch this kind of attack with small volume of requests to generate a large volume of attack traffic aiming at the victim by using IP spoofing from legitimate hosts. There have been several approaches, such as static threshold based approach and confirmation-based approach, focusing on DRDoS attack detection at victim's side. However, these approaches have significant disadvantages: (1) they are only passive defences after the attack and (2) it is hard to trace back the attackers. To address this problem, considerable attention has been paid to the study of detecting DRDoS attack at source side. Because the existing proposals following this direction are supposed to be ineffective to deal with small volume of attack traffic, there is still a room for improvement. In this paper, we propose a novel method to detect DRDoS attack request traffic on SDN(Software Defined Network)-enabled gateways in the source side of attack traffic. Our method adjusts the sampling rate and provides a traffic-aware adaptive threshold along with the margin based on analysing observed traffic behind gateways. Experimental results show that the proposed method is a promising solution to detect DRDoS attack request in the source side.

  • More New Classes of Differentially 4-Uniform Permutations with Good Cryptographic Properties

    Jie PENG  Chik How TAN  Qichun WANG  Jianhua GAO  Haibin KAN  

     
    PAPER-Cryptography and Information Security

      Vol:
    E101-A No:6
      Page(s):
    945-952

    Research on permutation polynomials over the finite field F22k with significant cryptographical properties such as possibly low differential uniformity, possibly high nonlinearity and algebraic degree has attracted a lot of attention and made considerable progress in recent years. Once used as the substitution boxes (S-boxes) in the block ciphers with Substitution Permutation Network (SPN) structure, this kind of polynomials can have a good performance against the classical cryptographic analysis such as linear attacks, differential attacks and the higher order differential attacks. In this paper we put forward a new construction of differentially 4-uniformity permutations over F22k by modifying the inverse function on some specific subsets of the finite field. Compared with the previous similar works, there are several advantages of our new construction. One is that it can provide a very large number of Carlet-Charpin-Zinoviev equivalent classes of functions (increasing exponentially). Another advantage is that all the functions are explicitly constructed, and the polynomial forms are obtained for three subclasses. The third advantage is that the chosen subsets are very large, hence all the new functions are not close to the inverse function. Therefore, our construction may provide more choices for designing of S-boxes. Moreover, it has been checked by a software programm for k=3 that except for one special function, all the other functions in our construction are Carlet-Charpin-Zinoviev equivalent to the existing ones.

  • A Real-Time Subtask-Assistance Strategy for Adaptive Services Composition

    Li QUAN  Zhi-liang WANG  Xin LIU  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2018/01/30
      Vol:
    E101-D No:5
      Page(s):
    1361-1369

    Reinforcement learning has been used to adaptive service composition. However, traditional algorithms are not suitable for large-scale service composition. Based on Q-Learning algorithm, a multi-task oriented algorithm named multi-Q learning is proposed to realize subtask-assistance strategy for large-scale and adaptive service composition. Differ from previous studies that focus on one task, we take the relationship between multiple service composition tasks into account. We decompose complex service composition task into multiple subtasks according to the graph theory. Different tasks with the same subtasks can assist each other to improve their learning speed. The results of experiments show that our algorithm could obtain faster learning speed obviously than traditional Q-learning algorithm. Compared with multi-agent Q-learning, our algorithm also has faster convergence speed. Moreover, for all involved service composition tasks that have the same subtasks between each other, our algorithm can improve their speed of learning optimal policy simultaneously in real-time.

  • Partial Transmit Sequence Technique with Low Complexity in OFDM System

    Chang-Hee KANG  Sung-Soon PARK  Young-Hwan YOU  Hyoung-Kyu SONG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/11/16
      Vol:
    E101-B No:5
      Page(s):
    1291-1298

    In wireless communication systems, OFDM technology is a communication method that can yield high data rates. However, OFDM systems suffer high PAPR values due to the use of many of subcarriers. The SLM and the PTS technique were proposed to solve the PAPR problem in OFDM systems. However, these approaches have the disadvantage of having high complexity. This paper proposes a method which has lower complexity than the conventional PTS method but has less performance degradation.

  • Perfect Gaussian Integer Sequence Pairs from Cyclic Difference Set Pairs

    Hongbin LIN  Xiuping PENG  Chao FENG  Qisheng TONG  Kai LIU  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:5
      Page(s):
    855-858

    The concept of Gaussian integer sequence pair is generalized from a single Gaussian integer sequence. In this letter, by adopting cyclic difference set pairs, a new construction method for perfect Gaussian integer sequence pairs is presented. Furthermore, the necessary and sufficient conditions for constructing perfect Gaussian integer sequence pairs are given. Through the research in this paper, a large number of perfect Gaussian integer sequence pairs can be obtained, which can greatly extend the existence of perfect sequence pairs.

  • Accelerating Existing Non-Blind Image Deblurring Techniques through a Strap-On Limited-Memory Switched Broyden Method

    Ichraf LAHOULI  Robby HAELTERMAN  Joris DEGROOTE  Michal SHIMONI  Geert DE CUBBER  Rabah ATTIA  

     
    PAPER-Machine Vision and its Applications

      Pubricized:
    2018/02/16
      Vol:
    E101-D No:5
      Page(s):
    1288-1295

    Video surveillance from airborne platforms can suffer from many sources of blur, like vibration, low-end optics, uneven lighting conditions, etc. Many different algorithms have been developed in the past that aim to recover the deblurred image but often incur substantial CPU-time, which is not always available on-board. This paper shows how a “strap-on” quasi-Newton method can accelerate the convergence of existing iterative methods with little extra overhead while keeping the performance of the original algorithm, thus paving the way for (near) real-time applications using on-board processing.

  • Reviving Identification Scheme Based on Isomorphism of Polynomials with Two Secrets: a Refined Theoretical and Practical Analysis

    Bagus SANTOSO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E101-A No:5
      Page(s):
    787-798

    The isomorphism of polynomials with two secret (IP2S) problem is one candidate of computational assumptions for post-quantum cryptography. The idea of identification scheme based on IP2S is firstly introduced in 1996 by Patarin. However, the scheme was not described concretely enough and no more details are provided on how to transcribe the idea into a real-world implementation. Moreover, the security of the scheme has not been formally proven and the originally proposed security parameters are no longer secure based on the most recent research. In this paper, we propose a concrete identification scheme based on IP2S with the idea of Patarin as the starting point. We provide formal security proof of the proposed scheme against impersonation under passive attack, sequential active attack, and concurrent active attack. We also propose techniques to reduce the implementation cost such that we are able to cut the storage cost and average communication cost to an extent that under parameters for the standard 80-bit security, the scheme is implementable even on the lightweight devices in the current market.

  • Semi-Blind Interference Cancellation with Multiple Receive Antennas for MIMO Heterogeneous Networks

    Huiyu YE  Kazuhiko FUKAWA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/11/10
      Vol:
    E101-B No:5
      Page(s):
    1299-1310

    Our previous work proposed a semi-blind single antenna interference cancellation scheme to cope with severe inter-cell interference in heterogeneous networks. This paper extends the scheme to allow multiple-receive-antenna implementation. It does not require knowledge of the training sequences of interfering signals and can cancel multiple interfering signals irrespective of the number of receive antennas. The proposed scheme applies an enhanced version of the quantized channel approach to suboptimal joint channel estimation and signal detection (JCESD) during the training period in order to blindly estimate channels of the interfering signals, while reducing the computational complexity of optimum JCESD drastically. Different from the previous work, the proposed scheme applies the quantized channel generation and local search at each individual receive antenna so as to estimate transmitted symbol matrices during the training period. Then, joint estimation is newly introduced in order to estimate a channel matrix from the estimated symbol matrices, which operates in the same manner as the expectation maximization (EM) algorithm and considers signals received at all receive antennas. Using the estimated channels, the proposed scheme performs multiuser detection (MUD) during the data period under the maximum likelihood (ML) criterion in order to cancel the interference. Computer simulations with two receive antennas under two-interfering-stream conditions show that the proposed scheme outperforms interference rejection combining (IRC) with perfect channel state information (CSI) and MUD with channels estimated by a conventional scheme based on the generalized Viterbi algorithm, and can achieve almost the same average bit error rate (BER) performance as MUD with channels estimated from sufficiently long training sequences of both the desired stream(s) and the interfering streams, while reducing the computational complexity significantly compared with full search involving all interfering signal candidates during the training period.

  • Proposed Hyperbolic NILT Method — Acceleration Techniques and Two-Dimensional Expansion for Electrical Engineering Applications

    Nawfal AL-ZUBAIDI R-SMITH  Lubomír BRANČÍK  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E101-A No:5
      Page(s):
    763-771

    Numerical inverse Laplace transform (NILT) methods are potential methods for time domain simulations, for instance the analysis of the transient phenomena in systems with lumped and/or distributed parameters. This paper proposes a numerical inverse Laplace transform method based originally on hyperbolic relations. The method is further enhanced by properly adapting several convergence acceleration techniques, namely, the epsilon algorithm of Wynn, the quotient-difference algorithm of Rutishauser and the Euler transform. The resulting accelerated models are compared as for their accuracy and computational efficiency. Moreover, an expansion to two dimensions is presented for the first time in the context of the accelerated hyperbolic NILT method, followed by the error analysis. The expansion is done by repeated application of one-dimensional partial numerical inverse Laplace transforms. A detailed static error analysis of the resulting 2D NILT is performed to prove the effectivness of the method. The work is followed by a practical application of the 2D NILT method to simulate voltage/current distributions along a transmission line. The method and application are programmed using the Matlab language.

  • Recent Progress on Reversible Quantum-Flux-Parametron for Superconductor Reversible Computing Open Access

    Naoki TAKEUCHI  Yuki YAMANASHI  Nobuyuki YOSHIKAWA  

     
    INVITED PAPER

      Vol:
    E101-C No:5
      Page(s):
    352-358

    We have been investigating reversible quantum-flux-parametron (RQFP), which is a reversible logic gate using adiabatic quantum-flux-parametron (AQFP), toward realizing superconductor reversible computing. In this paper, we review the recent progress of RQFP. Followed by a brief explanation on AQFP, we first review the difference between irreversible logic gates and RQFP in light of time evolution and energy dissipation, based on our previous studies. Numerical calculation results reveal that the logic state of RQFP can be changed quasi-statically and adiabatically, or thermodynamically reversibly, and that the energy dissipation required for RQFP to perform a logic operation can be arbitrarily reduced. Lastly, we show recent experimental results of an RQFP cell, which was newly designed for the latest cell library. We observed the wide operation margins of more than 4.7dB with respect to excitation currents.

  • Mitigating Pilot Contamination in Massive MIMO Using Cell Size Reduction

    Parfait I. TEBE  Yujun KUANG  Affum E. AMPOMA  Kwasi A. OPARE  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/10/24
      Vol:
    E101-B No:5
      Page(s):
    1280-1290

    In this paper, we provide a novel solution to mitigate pilot contamination in massive MIMO technology. In the proposed approach, we consider seven copilot cells of the first layer of interfering cells of a cellular network. We derive and formulate the worst-case signal-to-interference power ratio (SIR) of a typical user in both downlink and uplink of a pilot contaminated cell. Based on the formulated SIR and other considerations of the system, the total pilot sequence length, the reliability of channel estimation within the cell, the spectral and energy efficiencies are derived and formulated in downlink. The user's transmit power and the achievable sum rate are also derived and formulated in uplink. Our results show that when the cell size is reduced the pilot contamination is significantly mitigated and hence the system performance is improved.

  • Energy/Space-Efficient Rapid Single-Flux-Quantum Circuits by Using π-Shifted Josephson Junctions

    Tomohiro KAMIYA  Masamitsu TANAKA  Kyosuke SANO  Akira FUJIMAKI  

     
    PAPER

      Vol:
    E101-C No:5
      Page(s):
    385-390

    We present a concept of an advanced rapid single-flux-quantum (RSFQ) logic circuit family using the combination of 0-shifted and π-shifted Josephson junctions. A π-shift in the current-phase relationship can be obtained in several types of Josephson junctions, such as Josephson junctions containing a ferromagnet barrier layer, depending on its thickness and temperature. We use a superconducting quantum interference devices composed of a pair of 0- and π-shifted Josephson junctions (0-π SQUIDs) as a basic circuit element. Unlike the conventional RSFQ logic, bistability is obtained by spontaneous circular currents without using a large superconductor loop, and the state can be flipped by smaller driving currents. These features lead to energy- and/or space-efficient logic gates. In this paper, we show several example circuits where we represent signals by flips of the states of a 0-π SQUID. We obtained successful operation of the circuits from numerical simulation.

  • Linear Complexity of Quaternary Sequences over Z4 Based on Ding-Helleseth Generalized Cyclotomic Classes

    Xina ZHANG  Xiaoni DU  Chenhuang WU  

     
    LETTER-Information Theory

      Vol:
    E101-A No:5
      Page(s):
    867-871

    A family of quaternary sequences over Z4 is defined based on the Ding-Helleseth generalized cyclotomic classes modulo pq for two distinct odd primes p and q. The linear complexity is determined by computing the defining polynomial of the sequences, which is in fact connected with the discrete Fourier transform of the sequences. The results show that the sequences possess large linear complexity and are “good” sequences from the viewpoint of cryptography.

  • Simulation of Temperature Distribution under Periodic Heating for Analysis of Thermal Diffusivity in Nanometer-Scale Thermoelectric Materials

    Naomi YAMASHITA  Yuya OTA  Faiz SALLEH  Mani NAVANEETHAN  Masaru SHIMOMURA  Kenji MURAKAMI  Hiroya IKEDA  

     
    BRIEF PAPER

      Vol:
    E101-C No:5
      Page(s):
    347-350

    With the aim of characterizing the thermal conductivity for nanometer-scale thermoelectric materials, we have constructed a new measurement system based on ac calorimetry. Analysis of the obtained data requires time-evolution of temperature distribution in nanometer-scale material under periodic heating. In this study, we made a simulation using a C#-program for time-dependent temperature distribution, based on 2-dimensional heat-diffusion equation including the influence of heat emission from material edges. The simulation was applied to AlN with millimeter-scale dimensions for confirming the validity and accuracy. The simulated thermal diffusivity for 10×75-mm2-area AlN was 1.3×10-4 m2/s, which was larger than the value set in the heat-diffusion equation. This overestimation was also observed in the experiment. Therefore, our simulation can reproduce the unsteady heat conduction and be used for analyzing the ac calorimetry experiment.

  • Thermally Assisted Superconductor Transistors for Josephson-CMOS Hybrid Memories Open Access

    Kyosuke SANO  Masato SUZUKI  Kohei MARUYAMA  Soya TANIGUCHI  Masamitsu TANAKA  Akira FUJIMAKI  Masumi INOUE  Nobuyuki YOSHIKAWA  

     
    INVITED PAPER

      Vol:
    E101-C No:5
      Page(s):
    370-377

    We have studied on thermally assisted nano-structured transistors made of superconductor ultra-thin films. These transistors potentially work as interface devices for Josephson-CMOS (complementary metal oxide semiconductor) hybrid memory systems, because they can generate a high output voltage of sub-V enough to drive a CMOS transistor. In addition, our superconductor transistors are formed with very fine lines down to several tens of nm in widths, leading to very small foot print enabling us to make large capacity hybrid memories. Our superconductor transistors are made with niobium titanium nitride (NbTiN) thin films deposited on thermally-oxidized silicon substrates, on which other superconductor circuits or semiconductor circuits can be formed. The NbTiN thickness dependence of the critical temperature and of resistivity suggest thermally activated vortex or anti-vortex behavior in pseudo-two-dimensional superconducting films plays an important role for the operating principle of the transistors. To show the potential that the transistors can drive MOS transistors, we analyzed the driving ability of the superconductor transistors with HSPICE simulation. We also showed the turn-on behavior of a MOS transistor used for readout of a CMOS memory cell experimentally. These results showed the high potential of superconductor transistors for Josephson-CMOS hybrid memories.

  • Towards Ultra-High-Speed Cryogenic Single-Flux-Quantum Computing Open Access

    Koki ISHIDA  Masamitsu TANAKA  Takatsugu ONO  Koji INOUE  

     
    INVITED PAPER

      Vol:
    E101-C No:5
      Page(s):
    359-369

    CMOS microprocessors are limited in their capacity for clock speed improvement because of increasing computing power, i.e., they face a power-wall problem. Single-flux-quantum (SFQ) circuits offer a solution with their ultra-fast-speed and ultra-low-power natures. This paper introduces our contributions towards ultra-high-speed cryogenic SFQ computing. The first step is to design SFQ microprocessors. From qualitatively and quantitatively evaluating past-designed SFQ microprocessors, we have found that revisiting the architecture of SFQ microprocessors and on-chip caches is the first critical challenge. On the basis of cross-layer discussions and analysis, we came to the conclusion that a bit-parallel gate-level pipeline architecture is the best solution for SFQ designs. This paper summarizes our current research results targeting SFQ microprocessors and on-chip cache architectures.

  • New Construction Methods for Binary Sequence Pairs of Period pq with Ideal Two-Level Correlation

    Xiumin SHEN  Yanguo JIA  Xiaofei SONG  Yubo LI  

     
    PAPER-Coding Theory

      Vol:
    E101-A No:4
      Page(s):
    704-712

    In this paper, a new generalized cyclotomy over Zpq is presented based on cyclotomy and Chinese remainder theorem, where p and q are different odd primes. Several new construction methods for binary sequence pairs of period pq with ideal two-level correlation are given by utilizing these generalized cyclotomic classes. All the binary sequence pairs from our constructions have both ideal out-of-phase correlation values -1 and optimum balance property.

  • A Video-Quality Controller for QoE Enhancement in HTTP Adaptive Streaming

    Takumi KUROSAKA  Shungo MORI  Masaki BANDAI  

     
    PAPER-Multimedia Systems for Communications

      Pubricized:
    2017/10/17
      Vol:
    E101-B No:4
      Page(s):
    1163-1174

    In this paper, we propose a quality-level control method based on quality of experience (QoE) characteristics for HTTP adaptive streaming (HAS). The proposed method works as an adaptive bitrate controller on the HAS client. The proposed method consists of two operations: buffer-aware control and QoE-aware control. We implement the proposed method on an actual dynamic adaptive streaming over HTTP (DASH) program and evaluate the QoE performance of the proposed method via both objective and subjective evaluations. The results show that the proposed method effectively improves both objective and subjective QoE performances by preventing stalling events and quality-level switchings that have a negative influence on subjective QoE performance.

761-780hit(6809hit)