Her-Tyan YEH Hung-Min SUN Bin-Tsan HSIEH
Recently, Hwang and Li proposed a smartcard-based remote user authentication scheme. Later, Chan and Cheng showed that Hwang and Li's scheme is insecure against a kind of impersonation attack where a legitimate user can create another valid pair of user identity and password without knowing the secret key of the remote system. However, an assumption under Chan and Cheng's attack is that the attacker must be a legal user. In this paper, we further present a more fundamental and efficient impersonation attack on Hwang and Li's scheme. Using our attack, any users (including legal and illegal users) can easily get a specific legal user's password, impersonate this specific user to login to the remote system, and pass the system authentication.
Hiroshi INOUE Takahiro IWASAKI Toshifumi SUGANE Masahiro NUMA Keisuke YAMAMOTO
In an LSI design process, Engineering Change Orders (ECO's) are often given even after the layout process. This letter presents an approach to change the design to satisfy the new specification with ECO's by employing an error diagnosis technique. Our approach performs incremental synthesis using spare cells embedded on the original layout. Experimental results show that applying the error diagnosis technique to incremental synthesis is effective to suppress increase in delay time caused by ECO's.
Hiroyuki TANAKA Akihiro TSUTSUMI
In this paper, we present a numerical analysis for resonant characteristics of the TM010 mode of a cylindrical cavity containing a dielectric rod and a conductive layer on its metal walls. This analysis uses the mode matching method for calculation. Error in complex permittivity of a loaded dielectric rod measured using a layered cavity is evaluated as a function of thickness and layered conductor conductivity. A thick layered cavity is necessary for precise measurement of material properties using the cavity resonator method at microwave and millimeter-wave frequencies.
Mira KIM Junji SHIKATA Hirofumi MURATANI Hideki IMAI
In this paper, we deal with c-secure codes in a fingerprinting scheme, which encode user ID to be embedded into the contents. If a pirate copy appears, c-secure codes allow the owner of the contents to trace the source of the illegal redistribution under collusion attacks. However, when dealing in practical applications, most past proposed codes are failed to obtain a good efficiency, i.e. their codeword length are too large to be embedded into digital contents. In this paper, we propose a construction method of c-secure CRT codes based on polynomials over finite fields and it is shown that the codeword length in our construction is shorter than that of Muratani's scheme. We compare the codeword length of our construction and that of Muratani's scheme by numerical experiments and present some theoretical results which supports the results obtained by numerical experiments. As a result, we show that our construction is especially efficient in respect to a large size of any coalition c. Furthermore, we discuss the influence of the random error on the traceability and formally define the Weak IDs in respect to our construction.
Yong GUAN Yoshio NIKAWA Eiji TANABE
Development of non-invasive techniques to measure blood sugar level is strongly required. The application of millimeter waves has a great potentiality to realize the measuring technique. Nevertheless, the practical method of the technique is not yet reported. In this paper, a new technique is proposed to measure blood sugar level using millimeter waves. The technique proposed here is very rapid and safety way to obtain blood sugar level.
Satoshi KATSUNO Kiminori SUGAUCHI Osamu TSUNEHIRO Katsuyuki YAMAZAKI Kenichi YOSHIDA Hiroshi ESAKI
This paper presents measurement and analysis of various networks and applications using a high-speed IP meter. The authors have developed a high-speed IP meter with a GPS timestamp component, which enables precise measurement of packet delay and jitter in various networks. Measurement of the following networks was performed, 1) Measurement of traffic in a commercial IPv6 access service on ADSL, as a typical broadband access service network. 2) Measurement of traffic in the 54th IETF meeting in Yokohama, as a typical high-speed Internet backbone network. This paper reports the characteristics identified in these networks, e.g. asymmetricities of one-way packet delay over an ADSL access network and the difference in TCP/UDP packet delay over a high-speed backbone network. It also presents the analysis results of some multimedia applications in the Internet, and discusses the quality of service on Internet access service networks.
Jaemin KIM Moongoo KANG Seongwon CHO
This article describes a new method for converting an arbitrary topology mesh into one having subdivision connectivity. First, a base mesh is produced by applying a sequence of edge collapse operations to the original mesh with irregular connectivity. Then, the base mesh is iteratively subdivided. Each subdivided mesh is optimized to reduce its distance from the original mesh and to improve its global smoothness and compactness. A set of corresponding point pairs, which is required to compute the distance from the original mesh to the subdivided mesh, is determined by combining the initial parameterization and the multi-resolution projection. Experimental results show that the proposed method yields good performance in terms of global smoothness, small distortion, and good compactness, compared with conventional methods.
Kunihiro TOGE Kazuo HOGARI Tsuneo HORIGUCHI
This letter proposes a novel technique for evaluating the longitudinal distribution of the Raman gain characteristics in optical fibers connected to a reference optical fiber with a known Raman gain efficiency. This technique can evaluate the Raman gain efficiency in test fibers using a simplified experimental setup. We performed experiments on various test fibers and confirmed that their Raman gain efficiency can be obtained easily and accurately by employing a reference fiber.
Shinsuke TAMURA Toshibumi SEKI Tetsuo HASEGAWA Toshiaki TANAKA
Holonic Manufacturing Systems (HMSs), in which decisions are made through cooperation among holons (autonomous and cooperative manufacturing entities), eliminate various bottlenecks that exist in conventional systems to adapt to high-variety low-volume production. This paper describes the architecture of HMSs. Issues regarding incremental development and dynamic reconfiguration of cooperation mechanisms themselves, and mechanisms for ensuring stable and safe behaviors of HMSs are also discussed with reference to several proposals, with a view to applying the HMS architecture to large and complicated applications.
Masato TSURU Nobuo RYOKI Yuji OIE
The recent evolution on the network tomography have successfully provided principles and methodologies of inferring network-internal (local) characteristics solely from end-to-end measurements, which should be followed by deployment in practical use. In this paper, two kinds of user-oriented tools for inferring one-way packet losses based on the network tomography are proposed. They can infer one-way packet loss rates on paths or path segments from/to a user-host (a client) to/from a specified target host (an application server or a router) without any measurement on the target, and thus can find the congested area along the path between the client and an application server. One is a stand-alone tool running on the client, and the other is a client-server style tool running on both the client and a proxy measurement server distributed in the Internet. Prototypes of the tools have been developed and evaluated by experiments in the actual Internet environment, which shows that the tools can infer the loss rates within 1% errors in various network conditions.
Young I. SON Hyungbo SHIM Kab-Il KIM
In order to stabilize a convey-crane with only cart position measurement, this paper designs an additional dynamics with which the parallel-connected system is feedback passive. Since the crane system can be stabilized with a proportional-derivative (PD) law, the additional system is constructed by using the PD gains, and the closed-loop system exhibits almost same performances with the PD law. With the proposed control law, the transfer function of the additional system has the form of sH(s) with a strictly positive real (SPR) H(s).
Electromagnetic shielding clothes for reducing human exposure to radio waves have been commercialized. However, their effect has so far been confirmed only in the form of the raw material. In this paper, we develop a new compact scheme for measuring electromagnetic radiations using a short dipole antenna and Gaussian pulses in order to evaluate the effect of the shielding clothes over a wide frequency range with the aid of time-domain measurements and FDTD computation. The proposed method is based on a time-domain analysis technique and pulse compression technique, which enables the user to separate the direct transmission wave from the reflection from the floor as well as from the refracted wave around the neck of the clothes. The direct advantage is that measurements can be made in an ordinary laboratory without the function of an electromagnetic anechoic chamber. Also, we can separate direct transmission wave and diffraction wave from the measurement result by using pulse compression technique, then each frequency characteristic of the shielding shirt can be evaluated. The performance of the separation is confirmed by comparing the measurements with those of a shirt with no opening. We further demonstrate the possibility of predicting the effective conductivity of the material as a function of frequency by comparing the measured results with realistic FDTD computations, which will enable us to design a shielding shirt via numerical means.
Christos DROSOS Chrissavgi DRE Spyridon BLIONAS Dimitrios SOUDRIS
The architecture and implementation of a novel processor suitable wireless terminal applications, is introduced. The wireless terminal is based on the novel dual-mode baseband processor for DECT and GSM, which supports both heterodyne and direct conversion terminal architectures and is capable to undertake all baseband signal processing, and an innovative direct conversion low power modulator/demodulator for DECT and GSM. The state of the art design methodologies for embedded applications and innovative low-power design steps followed for a single chip solution. The performance of the implemented dual mode direct conversion wireless terminal was tested and measured for compliance to the standards. The developed innovative terminal fulfils all the requirements and specifications imposed by the DECT and GSM standards.
Tian-Cheng HU Yasushi IKEDA Minoru NAKAZAWA Shimmi HATTORI
Proxy caches have been used for a very long time to enhance the performance of web access. Along with the recent development of CDN (Content Distribution Network), the web proxy caching has also been adopted in many main techniques. This paper presents a new viewpoint on the possible improvement to the cooperative proxy caching, which can reduce outbound traffic and therefore ideally result in better response time. We take notice to the regional total cost of cache objects for optimizing content distribution. By contrast to the regular removal policies based on single proxy server, we prefer to evaluate a retrieved web object based on the metrics gathered from multiply proxy caches regionally. We particularly introduce a concept called post-removal analysis, which is used in measuring the value of the removed objects. Finally, we use the real proxy cache Squid to implement our proposal and modify the well-known cache benchmarking tool Web Polygraph to test this cooperative prototype. The test results prove that the proposed scheme can bring noticeable improvement on the performance of proxy caching.
Takuya ASAKA Katsunori ORI Hiroshi YAMAMOTO
Measuring the duration of flow of a TCP connection in an end-to-end path is important in the management of network performance, and when this is done, an administrator can manage the quality of the networks using the α percentile of the distribution. We propose a method of estimating the distribution of flow duration in an end-to-end path through active measurement using a small degree of traffic. This method of estimation is based on traffic characteristics that are observed in measuring traffic in actual networks. It imposes little additional load on networks and the time in computation required to estimate the distribution is also short. The distribution to be estimated is assumed as a log-normal distribution, and the mean and variance of the distribution of a target file size is estimated by using results of active measurements. Means and variances in various file sizes are estimated through the linear relationships between these values (or their logarithms) and file size. We also provide numerical examples using actual traffic data.
Yasunori ISHIHARA Kengo MORI Toru FUJIWARA
Detecting the possibility of inference attacks is necessary in order to keep a database secure. Inference attacks mean that a user tries to infer the result of an unauthorized queries to the user. For method schemas, which are a formal model of object-oriented databases, it is known that the security problem against inference attacks is decidable in polynomial time in the size of a given database instance. However, when the database instance or authorization has slightly been updated, it is not desirable to check the entire database again for efficiency. In this paper, we propose several sufficient conditions for update operations to preserve the security. Furthermore, we show that some of the proposed sufficient conditions can be decided much more efficiently than the entire security check. Thus, the sufficient conditions are useful for incremental security checking.
A new algorithm for texture segmentation, called iterative feature extraction (IFE), is proposed to iteratively search and select for an overcomplete wavelet feature vector based on aspect ratio of extrema number (AREN) with a desired window that provides optimal classification accuracy.
Mikhail MOZEROV Vitaly KOBER Tae-Sun CHOI
A novel effective method for detection and removal impulse noise in highly corrupted color images is proposed. This detection-estimation method consists of two steps. Outliers are first detected using spatial relations between the color components. Then the detected noise pixels are replaced with the output of the vector median filter over a local spatially connected area excluding the outliers. Simulation results in a test color image show a superior performance of the proposed filtering algorithm comparing to the conventional vector median filter. The comparisons are made using a mean square error and a mean absolute error criteria.
Hiroshi NARUSE Mitsuhiro TATEDA Hiroshige OHNO Akiyoshi SHIMADA
In an optical time domain reflectometer type strain measurement system, we theoretically derive the shape of the Brillouin gain spectrum produced in an optical fiber under a parabolic strain distribution which is formed in a uniformly loaded beam. Based on the derived result, we investigate the effects of the parabolic strain distribution parameters and the measurement conditions such as the launched pulse width and the measurement position on the beam on the deformation of the Brillouin backscattered-light power spectrum shape. In addition, we investigate the strain measurement error resulting from the deformation of the power spectrum shape by analyzing the peak-power frequency at which the power spectrum is maximized.
Let us introduce n ( 2) nonlinear mappings fi (i = 1,2,,n) defined on complete linear metric spaces (Xi-1,ρ) (i = 1,2,,n), respectively, and let fi: Xi-1 Xi be completely continuous on bounded convex closed subsets Xi-1,(i = 1,2,,n 0), such that fi() . Moreover, let us introduce n fuzzy-set-valued nonlinear mappings Fi: Xi-1 Xi {a family of all non-empty closed compact fuzzy subsets of Xi}. Here, we have a fixed point theorem on the recurrent system of β-level fuzzy-set-valued mapping equations: xi Fiβ(xi-1,fi(xi-1)), (i = 1,2,,n 0), where the fuzzy set Fi is characterized by a membership function µFi(xi): Xi [0,1], and the β-level set Fiβ of the fuzzy set Fi is defined as Fiβ {ξi Xi | µFi(ξi) β}, for any constant β (0,1]. This theorem can be applied immediately to discussion for characteristics of ring nonlinear network systems disturbed by undesirable uncertain fluctuations and to fine estimation of available behaviors of those disturbed systems. In this paper, its mathematical situation and proof are discussed, in detail.