The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] REM(1013hit)

681-700hit(1013hit)

  • Security of a Remote User Authentication Scheme Using Smart Cards

    Her-Tyan YEH  Hung-Min SUN  Bin-Tsan HSIEH  

     
    LETTER-Internet

      Vol:
    E87-B No:1
      Page(s):
    192-194

    Recently, Hwang and Li proposed a smartcard-based remote user authentication scheme. Later, Chan and Cheng showed that Hwang and Li's scheme is insecure against a kind of impersonation attack where a legitimate user can create another valid pair of user identity and password without knowing the secret key of the remote system. However, an assumption under Chan and Cheng's attack is that the attacker must be a legal user. In this paper, we further present a more fundamental and efficient impersonation attack on Hwang and Li's scheme. Using our attack, any users (including legal and illegal users) can easily get a specific legal user's password, impersonate this specific user to login to the remote system, and pass the system authentication.

  • Application of Error Diagnosis Technique to Incremental Synthesis

    Hiroshi INOUE  Takahiro IWASAKI  Toshifumi SUGANE  Masahiro NUMA  Keisuke YAMAMOTO  

     
    LETTER-Design Methodology

      Vol:
    E86-A No:12
      Page(s):
    3214-3217

    In an LSI design process, Engineering Change Orders (ECO's) are often given even after the layout process. This letter presents an approach to change the design to satisfy the new specification with ECO's by employing an error diagnosis technique. Our approach performs incremental synthesis using spare cells embedded on the original layout. Experimental results show that applying the error diagnosis technique to incremental synthesis is effective to suppress increase in delay time caused by ECO's.

  • Analysis of Resonant Characteristics of Cavity Resonator with a Layered Conductor on Its Metal Walls

    Hiroyuki TANAKA  Akihiro TSUTSUMI  

     
    PAPER-Measurement

      Vol:
    E86-C No:12
      Page(s):
    2379-2386

    In this paper, we present a numerical analysis for resonant characteristics of the TM010 mode of a cylindrical cavity containing a dielectric rod and a conductive layer on its metal walls. This analysis uses the mode matching method for calculation. Error in complex permittivity of a loaded dielectric rod measured using a layered cavity is evaluated as a function of thickness and layered conductor conductivity. A thick layered cavity is necessary for precise measurement of material properties using the cavity resonator method at microwave and millimeter-wave frequencies.

  • Constructing c-Secure CRT Codes Using Polynomials over Finite Fields

    Mira KIM  Junji SHIKATA  Hirofumi MURATANI  Hideki IMAI  

     
    PAPER-Information Security

      Vol:
    E86-A No:12
      Page(s):
    3259-3266

    In this paper, we deal with c-secure codes in a fingerprinting scheme, which encode user ID to be embedded into the contents. If a pirate copy appears, c-secure codes allow the owner of the contents to trace the source of the illegal redistribution under collusion attacks. However, when dealing in practical applications, most past proposed codes are failed to obtain a good efficiency, i.e. their codeword length are too large to be embedded into digital contents. In this paper, we propose a construction method of c-secure CRT codes based on polynomials over finite fields and it is shown that the codeword length in our construction is shorter than that of Muratani's scheme. We compare the codeword length of our construction and that of Muratani's scheme by numerical experiments and present some theoretical results which supports the results obtained by numerical experiments. As a result, we show that our construction is especially efficient in respect to a large size of any coalition c. Furthermore, we discuss the influence of the random error on the traceability and formally define the Weak IDs in respect to our construction.

  • Study of Simulation for High Sensitivity Non-invasive Measurement of Blood Sugar Level in Millimeter Waves

    Yong GUAN  Yoshio NIKAWA  Eiji TANABE  

     
    PAPER-Medical Application

      Vol:
    E86-C No:12
      Page(s):
    2488-2493

    Development of non-invasive techniques to measure blood sugar level is strongly required. The application of millimeter waves has a great potentiality to realize the measuring technique. Nevertheless, the practical method of the technique is not yet reported. In this paper, a new technique is proposed to measure blood sugar level using millimeter waves. The technique proposed here is very rapid and safety way to obtain blood sugar level.

  • Asymmetric Characteristics of Internet Based on Traffic Measurement and Analysis

    Satoshi KATSUNO  Kiminori SUGAUCHI  Osamu TSUNEHIRO  Katsuyuki YAMAZAKI  Kenichi YOSHIDA  Hiroshi ESAKI  

     
    PAPER

      Vol:
    E86-D No:11
      Page(s):
    2300-2309

    This paper presents measurement and analysis of various networks and applications using a high-speed IP meter. The authors have developed a high-speed IP meter with a GPS timestamp component, which enables precise measurement of packet delay and jitter in various networks. Measurement of the following networks was performed, 1) Measurement of traffic in a commercial IPv6 access service on ADSL, as a typical broadband access service network. 2) Measurement of traffic in the 54th IETF meeting in Yokohama, as a typical high-speed Internet backbone network. This paper reports the characteristics identified in these networks, e.g. asymmetricities of one-way packet delay over an ADSL access network and the difference in TCP/UDP packet delay over a high-speed backbone network. It also presents the analysis results of some multimedia applications in the Internet, and discusses the quality of service on Internet access service networks.

  • A Global Optimization Method for Remeshing Polygonal Surface of Arbitrary Topological Type

    Jaemin KIM  Moongoo KANG  Seongwon CHO  

     
    LETTER-Algorithms

      Vol:
    E86-D No:11
      Page(s):
    2475-2478

    This article describes a new method for converting an arbitrary topology mesh into one having subdivision connectivity. First, a base mesh is produced by applying a sequence of edge collapse operations to the original mesh with irregular connectivity. Then, the base mesh is iteratively subdivided. Each subdivided mesh is optimized to reduce its distance from the original mesh and to improve its global smoothness and compactness. A set of corresponding point pairs, which is required to compute the distance from the original mesh to the subdivided mesh, is determined by combining the initial parameterization and the multi-resolution projection. Experimental results show that the proposed method yields good performance in terms of global smoothness, small distortion, and good compactness, compared with conventional methods.

  • Raman Gain Distribution Measurement Employing Reference Optical Fiber

    Kunihiro TOGE  Kazuo HOGARI  Tsuneo HORIGUCHI  

     
    LETTER-Optical Fiber

      Vol:
    E86-B No:11
      Page(s):
    3293-3295

    This letter proposes a novel technique for evaluating the longitudinal distribution of the Raman gain characteristics in optical fibers connected to a reference optical fiber with a known Raman gain efficiency. This technique can evaluate the Raman gain efficiency in test fibers using a simplified experimental setup. We performed experiments on various test fibers and confirmed that their Raman gain efficiency can be obtained easily and accurately by employing a reference fiber.

  • Toward the Practical Uses of Holonic Manufacturing Systems

    Shinsuke TAMURA  Toshibumi SEKI  Tetsuo HASEGAWA  Toshiaki TANAKA  

     
    INVITED PAPER

      Vol:
    E86-A No:11
      Page(s):
    2722-2730

    Holonic Manufacturing Systems (HMSs), in which decisions are made through cooperation among holons (autonomous and cooperative manufacturing entities), eliminate various bottlenecks that exist in conventional systems to adapt to high-variety low-volume production. This paper describes the architecture of HMSs. Issues regarding incremental development and dynamic reconfiguration of cooperation mechanisms themselves, and mechanisms for ensuring stable and safe behaviors of HMSs are also discussed with reference to several proposals, with a view to applying the HMS architecture to large and complicated applications.

  • Measurement Tool of One-Way Packet Loss Rates Based on Network Tomography

    Masato TSURU  Nobuo RYOKI  Yuji OIE  

     
    PAPER

      Vol:
    E86-D No:11
      Page(s):
    2334-2342

    The recent evolution on the network tomography have successfully provided principles and methodologies of inferring network-internal (local) characteristics solely from end-to-end measurements, which should be followed by deployment in practical use. In this paper, two kinds of user-oriented tools for inferring one-way packet losses based on the network tomography are proposed. They can infer one-way packet loss rates on paths or path segments from/to a user-host (a client) to/from a specified target host (an application server or a router) without any measurement on the target, and thus can find the congested area along the path between the client and an application server. One is a stand-alone tool running on the client, and the other is a client-server style tool running on both the client and a proxy measurement server distributed in the Internet. Prototypes of the tools have been developed and evaluated by experiments in the actual Internet environment, which shows that the tools can infer the loss rates within 1% errors in various network conditions.

  • A Design Method of an SPR System for Stabilization of a Crane without Velocity Measurement

    Young I. SON  Hyungbo SHIM  Kab-Il KIM  

     
    LETTER-Systems and Control

      Vol:
    E86-A No:11
      Page(s):
    2894-2896

    In order to stabilize a convey-crane with only cart position measurement, this paper designs an additional dynamics with which the parallel-connected system is feedback passive. Since the crane system can be stabilized with a proportional-derivative (PD) law, the additional system is constructed by using the PD gains, and the closed-loop system exhibits almost same performances with the PD law. With the proposed control law, the transfer function of the additional system has the form of sH(s) with a strictly positive real (SPR) H(s).

  • A Design Scheme for Electromagnetic Shielding Clothes via Numerical Computation and Time Domain Measurements

    Satoru KUROKAWA  Toru SATO  

     
    PAPER

      Vol:
    E86-C No:11
      Page(s):
    2216-2223

    Electromagnetic shielding clothes for reducing human exposure to radio waves have been commercialized. However, their effect has so far been confirmed only in the form of the raw material. In this paper, we develop a new compact scheme for measuring electromagnetic radiations using a short dipole antenna and Gaussian pulses in order to evaluate the effect of the shielding clothes over a wide frequency range with the aid of time-domain measurements and FDTD computation. The proposed method is based on a time-domain analysis technique and pulse compression technique, which enables the user to separate the direct transmission wave from the reflection from the floor as well as from the refracted wave around the neck of the clothes. The direct advantage is that measurements can be made in an ordinary laboratory without the function of an electromagnetic anechoic chamber. Also, we can separate direct transmission wave and diffraction wave from the measurement result by using pulse compression technique, then each frequency characteristic of the shielding shirt can be evaluated. The performance of the separation is confirmed by comparing the measurements with those of a shirt with no opening. We further demonstrate the possibility of predicting the effective conductivity of the material as a function of frequency by comparing the measured results with realistic FDTD computations, which will enable us to design a shielding shirt via numerical means.

  • A Low Power Baseband Processor for a Portable Dual Mode DECT/GSM Terminal

    Christos DROSOS  Chrissavgi DRE  Spyridon BLIONAS  Dimitrios SOUDRIS  

     
    PAPER

      Vol:
    E86-D No:10
      Page(s):
    1976-1986

    The architecture and implementation of a novel processor suitable wireless terminal applications, is introduced. The wireless terminal is based on the novel dual-mode baseband processor for DECT and GSM, which supports both heterodyne and direct conversion terminal architectures and is capable to undertake all baseband signal processing, and an innovative direct conversion low power modulator/demodulator for DECT and GSM. The state of the art design methodologies for embedded applications and innovative low-power design steps followed for a single chip solution. The performance of the implemented dual mode direct conversion wireless terminal was tested and measured for compliance to the standards. The developed innovative terminal fulfils all the requirements and specifications imposed by the DECT and GSM standards.

  • Total Cost-Aware Proxy Caching with Cooperative Removal Policy

    Tian-Cheng HU  Yasushi IKEDA  Minoru NAKAZAWA  Shimmi HATTORI  

     
    PAPER-Network

      Vol:
    E86-B No:10
      Page(s):
    3050-3062

    Proxy caches have been used for a very long time to enhance the performance of web access. Along with the recent development of CDN (Content Distribution Network), the web proxy caching has also been adopted in many main techniques. This paper presents a new viewpoint on the possible improvement to the cooperative proxy caching, which can reduce outbound traffic and therefore ideally result in better response time. We take notice to the regional total cost of cache objects for optimizing content distribution. By contrast to the regular removal policies based on single proxy server, we prefer to evaluate a retrieved web object based on the metrics gathered from multiply proxy caches regionally. We particularly introduce a concept called post-removal analysis, which is used in measuring the value of the removed objects. Finally, we use the real proxy cache Squid to implement our proposal and modify the well-known cache benchmarking tool Web Polygraph to test this cooperative prototype. The test results prove that the proposed scheme can bring noticeable improvement on the performance of proxy caching.

  • Method of Estimating Flow Duration Distribution Using Active Measurements

    Takuya ASAKA  Katsunori ORI  Hiroshi YAMAMOTO  

     
    PAPER-Network

      Vol:
    E86-B No:10
      Page(s):
    3030-3038

    Measuring the duration of flow of a TCP connection in an end-to-end path is important in the management of network performance, and when this is done, an administrator can manage the quality of the networks using the α percentile of the distribution. We propose a method of estimating the distribution of flow duration in an end-to-end path through active measurement using a small degree of traffic. This method of estimation is based on traffic characteristics that are observed in measuring traffic in actual networks. It imposes little additional load on networks and the time in computation required to estimate the distribution is also short. The distribution to be estimated is assumed as a log-normal distribution, and the mean and variance of the distribution of a target file size is estimated by using results of active measurements. Means and variances in various file sizes are estimated through the linear relationships between these values (or their logarithms) and file size. We also provide numerical examples using actual traffic data.

  • Sufficient Conditions for Update Operations on Object-Oriented Databases to Preserve the Security against Inference Attacks

    Yasunori ISHIHARA  Kengo MORI  Toru FUJIWARA  

     
    PAPER-Databases

      Vol:
    E86-D No:10
      Page(s):
    2187-2197

    Detecting the possibility of inference attacks is necessary in order to keep a database secure. Inference attacks mean that a user tries to infer the result of an unauthorized queries to the user. For method schemas, which are a formal model of object-oriented databases, it is known that the security problem against inference attacks is decidable in polynomial time in the size of a given database instance. However, when the database instance or authorization has slightly been updated, it is not desirable to check the entire database again for efficiency. In this paper, we propose several sufficient conditions for update operations to preserve the security. Furthermore, we show that some of the proposed sufficient conditions can be decided much more efficiently than the entire security check. Thus, the sufficient conditions are useful for incremental security checking.

  • Iterative Wavelet-Based Feature Extraction for Texture Segmentation

    Jing-Wein WANG  

     
    LETTER-Source Coding/Image Processing

      Vol:
    E86-A No:10
      Page(s):
    2628-2632

    A new algorithm for texture segmentation, called iterative feature extraction (IFE), is proposed to iteratively search and select for an overcomplete wavelet feature vector based on aspect ratio of extrema number (AREN) with a desired window that provides optimal classification accuracy.

  • Noise Removal from Highly Corrupted Color Images with Adaptive Neighborhoods

    Mikhail MOZEROV  Vitaly KOBER  Tae-Sun CHOI  

     
    LETTER-Image

      Vol:
    E86-A No:10
      Page(s):
    2713-2717

    A novel effective method for detection and removal impulse noise in highly corrupted color images is proposed. This detection-estimation method consists of two steps. Outliers are first detected using spatial relations between the color components. Then the detected noise pixels are replaced with the output of the vector median filter over a local spatially connected area excluding the outliers. Simulation results in a test color image show a superior performance of the proposed filtering algorithm comparing to the conventional vector median filter. The comparisons are made using a mean square error and a mean absolute error criteria.

  • Deformation of the Brillouin Gain Spectrum Caused by Parabolic Strain Distribution and Resulting Measurement Error in BOTDR Strain Measurement System

    Hiroshi NARUSE  Mitsuhiro TATEDA  Hiroshige OHNO  Akiyoshi SHIMADA  

     
    PAPER-Optoelectronics

      Vol:
    E86-C No:10
      Page(s):
    2111-2121

    In an optical time domain reflectometer type strain measurement system, we theoretically derive the shape of the Brillouin gain spectrum produced in an optical fiber under a parabolic strain distribution which is formed in a uniformly loaded beam. Based on the derived result, we investigate the effects of the parabolic strain distribution parameters and the measurement conditions such as the launched pulse width and the measurement position on the beam on the deformation of the Brillouin backscattered-light power spectrum shape. In addition, we investigate the strain measurement error resulting from the deformation of the power spectrum shape by analyzing the peak-power frequency at which the power spectrum is maximized.

  • A Fixed Point Theorem for Recurrent System of Fuzzy-Set-Valued Nonlinear Mapping Equations

    Kazuo HORIUCHI  

     
    PAPER-Neuro, Fuzzy, GA

      Vol:
    E86-A No:9
      Page(s):
    2256-2261

    Let us introduce n ( 2) nonlinear mappings fi (i = 1,2,,n) defined on complete linear metric spaces (Xi-1,ρ) (i = 1,2,,n), respectively, and let fi: Xi-1 Xi be completely continuous on bounded convex closed subsets Xi-1,(i = 1,2,,n 0), such that fi() . Moreover, let us introduce n fuzzy-set-valued nonlinear mappings Fi: Xi-1 Xi {a family of all non-empty closed compact fuzzy subsets of Xi}. Here, we have a fixed point theorem on the recurrent system of β-level fuzzy-set-valued mapping equations: xi Fiβ(xi-1,fi(xi-1)), (i = 1,2,,n 0), where the fuzzy set Fi is characterized by a membership function µFi(xi): Xi [0,1], and the β-level set Fiβ of the fuzzy set Fi is defined as Fiβ {ξi Xi | µFi(ξi) β}, for any constant β (0,1]. This theorem can be applied immediately to discussion for characteristics of ring nonlinear network systems disturbed by undesirable uncertain fluctuations and to fine estimation of available behaviors of those disturbed systems. In this paper, its mathematical situation and proof are discussed, in detail.

681-700hit(1013hit)