The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RIN(2923hit)

441-460hit(2923hit)

  • A New Energy Efficient Clustering Algorithm Based on Routing Spanning Tree for Wireless Sensor Network

    Yating GAO  Guixia KANG  Jianming CHENG  Ningbo ZHANG  

     
    PAPER-Network

      Pubricized:
    2017/05/26
      Vol:
    E100-B No:12
      Page(s):
    2110-2120

    Wireless sensor networks usually deploy sensor nodes with limited energy resources in unattended environments so that people have difficulty in replacing or recharging the depleted devices. In order to balance the energy dissipation and prolong the network lifetime, this paper proposes a routing spanning tree-based clustering algorithm (RSTCA) which uses routing spanning tree to analyze clustering. In this study, the proposed scheme consists of three phases: setup phase, cluster head (CH) selection phase and steady phase. In the setup phase, several clusters are formed by adopting the K-means algorithm to balance network load on the basis of geographic location, which solves the randomness problem in traditional distributed clustering algorithm. Meanwhile, a conditional inter-cluster data traffic routing strategy is created to simplify the networks into subsystems. For the CH selection phase, a novel CH selection method, where CH is selected by a probability based on the residual energy of each node and its estimated next-time energy consumption as a function of distance, is formulated for optimizing the energy dissipation among the nodes in the same cluster. In the steady phase, an effective modification that counters the boundary node problem by adjusting the data traffic routing is designed. Additionally, by the simulation, the construction procedure of routing spanning tree (RST) and the effect of the three phases are presented. Finally, a comparison is made between the RSTCA and the current distributed clustering protocols such as LEACH and LEACH-DT. The results show that RSTCA outperforms other protocols in terms of network lifetime, energy dissipation and coverage ratio.

  • Implementing Exchanged Hypercube Communication Patterns on Ring-Connected WDM Optical Networks

    Yu-Liang LIU  Ruey-Chyi WU  

     
    PAPER-Interconnection networks

      Pubricized:
    2017/08/04
      Vol:
    E100-D No:12
      Page(s):
    2771-2780

    The exchanged hypercube, denoted by EH(s,t), is a graph obtained by systematically removing edges from the corresponding hypercube, while preserving many of the hypercube's attractive properties. Moreover, ring-connected topology is one of the most promising topologies in Wavelength Division Multiplexing (WDM) optical networks. Let Rn denote a ring-connected topology. In this paper, we address the routing and wavelength assignment problem for implementing the EH(s,t) communication pattern on Rn, where n=s+t+1. We design an embedding scheme. Based on the embedding scheme, a near-optimal wavelength assignment algorithm using 2s+t-2+⌊2t/3⌋ wavelengths is proposed. We also show that the wavelength assignment algorithm uses no more than an additional 25 percent of (or ⌊2t-1/3⌋) wavelengths, compared to the optimal wavelength assignment algorithm.

  • Wireless Packet Communications Protected by Secret Sharing and Vector Coding

    Shoichiro YAMASAKI  Tomoko K. MATSUSHIMA  Shinichiro MIYAZAKI  Kotoku OMURA  Hirokazu TANAKA  

     
    PAPER-Communication Theory and Systems

      Vol:
    E100-A No:12
      Page(s):
    2680-2690

    Secret sharing is a method to protect information for security. The information is divided into n shares, and the information is reconstructed from any k shares but no knowledge of it is revealed from k-1 shares. Physical layer security is a method to yield a favorable receive condition to an authorized destination terminal in wireless communications based on multi-antenna transmission. In this study, we propose wireless packet communications protected by the secret sharing based on Reed Solomon coding and the physical layer security based on vector coding, which implements a single-antenna system and a multi-antenna system. Evaluation results show the validity of the proposed scheme.

  • Exponentially Weighted Distance-Based Detection for Radiometric Identification

    Yong Qiang JIA  Lu GAN  Hong Shu LIAO  

     
    LETTER-Measurement Technology

      Vol:
    E100-A No:12
      Page(s):
    3086-3089

    Radio signals show characteristics of minute differences, which result from various idiosyncratic hardware properties between different radio emitters. A robust detector based on exponentially weighted distances is proposed to detect the exact reference instants of the burst communication signals. Based on the exact detection of the reference instant, in which the radio emitter finishes the power-up ramp and enters the first symbol of its preamble, the features of the radio fingerprint can be extracted from the transient signal section and the steady-state signal section for radiometric identification. Experiments on real data sets demonstrate that the proposed method not only has a higher accuracy that outperforms correlation-based detection, but also a better robustness against noise. The comparison results of different detectors for radiometric identification indicate that the proposed detector can improve the classification accuracy of radiometric identification.

  • Single Image Dehazing Using Invariance Principle

    Mingye JU  Zhenfei GU  Dengyin ZHANG  Jian LIU  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2017/09/01
      Vol:
    E100-D No:12
      Page(s):
    3068-3072

    In this letter, we propose a novel technique to increase the visibility of the hazy image. Benefiting from the atmospheric scattering model and the invariance principle for scene structure, we formulate structure constraint equations that derive from two simulated inputs by performing gamma correction on the input image. Relying on the inherent boundary constraint of the scattering function, the expected scene albedo can be well restored via these constraint equations. Extensive experimental results verify the power of the proposed dehazing technique.

  • Second-Order Intrinsic Randomness for Correlated Non-Mixed and Mixed Sources

    Tomohiko UYEMATSU  Tetsunao MATSUTA  

     
    PAPER-Shannon Theory

      Vol:
    E100-A No:12
      Page(s):
    2615-2628

    We consider the intrinsic randomness problem for correlated sources. Specifically, there are three correlated sources, and we want to extract two mutually independent random numbers by using two separate mappings, where each mapping converts one of the output sequences from two correlated sources into a random number. In addition, we assume that the obtained pair of random numbers is also independent of the output sequence from the third source. We first show the δ-achievable rate region where a rate pair of two mappings must satisfy in order to obtain the approximation error within δ ∈ [0,1), and the second-order achievable rate region for correlated general sources. Then, we apply our results to non-mixed and mixed independently and identically distributed (i.i.d.) correlated sources, and reveal that the second-order achievable rate region for these sources can be represented in terms of the sum of normal distributions.

  • A Cheating-Detectable (k, L, n) Ramp Secret Sharing Scheme

    Wataru NAKAMURA  Hirosuke YAMAMOTO  Terence CHAN  

     
    PAPER-Cryptography and Information Security

      Vol:
    E100-A No:12
      Page(s):
    2709-2719

    In this paper, we treat (k, L, n) ramp secret sharing schemes (SSSs) that can detect impersonation attacks and/or substitution attacks. First, we derive lower bounds on the sizes of the shares and random number used in encoding for given correlation levels, which are measured by the mutual information of shares. We also derive lower bounds on the success probabilities of attacks for given correlation levels and given sizes of shares. Next we propose a strong (k, L, n) ramp SSS against substitution attacks. As far as we know, the proposed scheme is the first strong (k, L, n) ramp SSSs that can detect substitution attacks of at most k-1 shares. Our scheme can be applied to a secret SL uniformly distributed over GF(pm)L, where p is a prime number with p≥L+2. We show that for a certain type of correlation levels, the proposed scheme can achieve the lower bounds on the sizes of the shares and random number, and can reduce the success probability of substitution attacks within nearly L times the lower bound when the number of forged shares is less than k. We also evaluate the success probability of impersonation attack for our schemes. In addition, we give some examples of insecure ramp SSSs to clarify why each component of our scheme is essential to realize the required security.

  • A New Approach of Matrix Factorization on Complex Domain for Data Representation

    Viet-Hang DUONG  Manh-Quan BUI  Jian-Jiun DING  Yuan-Shan LEE  Bach-Tung PHAM  Pham The BAO  Jia-Ching WANG  

     
    LETTER-Pattern Recognition

      Pubricized:
    2017/09/15
      Vol:
    E100-D No:12
      Page(s):
    3059-3063

    This work presents a new approach which derives a learned data representation method through matrix factorization on the complex domain. In particular, we introduce an encoding matrix-a new representation of data-that satisfies the simplicial constraint of the projective basis matrix on the field of complex numbers. A complex optimization framework is provided. It employs the gradient descent method and computes the derivative of the cost function based on Wirtinger's calculus.

  • Single Image Haze Removal Using Structure-Aware Atmospheric Veil

    Yun LIU  Rui CHEN  Jinxia SHANG  Minghui WANG  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2017/08/04
      Vol:
    E100-D No:11
      Page(s):
    2729-2733

    In this letter, we propose a novel and effective haze removal method by using the structure-aware atmospheric veil. More specifically, the initial atmospheric veil is first estimated based on dark channel prior and morphological operator. Furthermore, an energy optimization function considering the structure feature of the input image is constructed to refine the initial atmospheric veil. At last, the haze-free image can be restored by inverting the atmospheric scattering model. Additionally, brightness adjustment is also performed for preventing the dehazing result too dark. Experimental results on hazy images reveal that the proposed method can effectively remove the haze and yield dehazing results with vivid color and high scene visibility.

  • An Extreme Learning Machine Architecture Based on Volterra Filtering and PCA

    Li CHEN  Ling YANG  Juan DU  Chao SUN  Shenglei DU  Haipeng XI  

     
    PAPER-Information Network

      Pubricized:
    2017/08/02
      Vol:
    E100-D No:11
      Page(s):
    2690-2701

    Extreme learning machine (ELM) has recently attracted many researchers' interest due to its very fast learning speed, good generalization ability, and ease of implementation. However, it has a linear output layer which may limit the capability of exploring the available information, since higher-order statistics of the signals are not taken into account. To address this, we propose a novel ELM architecture in which the linear output layer is replaced by a Volterra filter structure. Additionally, the principal component analysis (PCA) technique is used to reduce the number of effective signals transmitted to the output layer. This idea not only improves the processing capability of the network, but also preserves the simplicity of the training process. Then we carry out performance evaluation and application analysis for the proposed architecture in the context of supervised classification and unsupervised equalization respectively, and the obtained results either on publicly available datasets or various channels, when compared to those produced by already proposed ELM versions and a state-of-the-art algorithm: support vector machine (SVM), highlight the adequacy and the advantages of the proposed architecture and characterize it as a promising tool to deal with signal processing tasks.

  • Magnetic Anomaly Detection with Empirical Mode Decomposition Trend Filtering

    Han ZHOU  Zhongming PAN  Zhuohang ZHANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E100-A No:11
      Page(s):
    2503-2506

    Magnetic Anomaly Detection (MAD) is a passive method for the detection of ferromagnetic objects. Currently, the performance of a MAD system is limited by the magnetic background noise that is non-stationary and shows self-similarity and long-range correlation. In this paper, we propose an empirical mode decomposition (EMD) trend filtering based energy detector for adaptively detecting the magnetic anomaly signal from the background noise. The input data is first detrended adaptively with the energy-ratio trend filtering approach. Then, the magnetic anomaly signal is detected using an energy detector. The proposed detector does not need any a priori knowledge about the target or assumptions regarding the background noise. Experiments also prove that the proposed detector shows a more stable performance than the existing undecimated discrete wavelet transform (UDWT) based energy detector.

  • A Desynchronization-Based Data Gathering Mechanism for a Fish Farm Monitoring Environment

    Yoshiaki TANIGUCHI  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E100-A No:11
      Page(s):
    2547-2550

    We have proposed a fish farm monitoring system for the efficient farming of tuna. In our system, energy efficient and adaptive control of sensor node is highly important. In addition, since a sensor node is attached to the fish, the transmission range of sensor node is not omni-directional. In this paper, we propose a data gathering mechanism for fish farm monitoring by extending a traditional desyncronization mechanism. In our proposed mechanism, by utilizing acknowledgment packets from the sink node, distributed and adaptive timing control of packet transmission is accomplished. In addition, we apply a reassignment mechanism and a sleep mechanism for improving the performance of our proposed mechanism. Through simulation experiments, we show that the performance of our proposed mechanism is higher than that of comparative mechanisms.

  • Possibility of Metal-Oxide-Nitride-Oxide-Semiconductor Memories for Long Lifespan Archive Memories

    Hiroki SHIRAKAWA  Keita YAMAGUCHI  Masaaki ARAIDAI  Katsumasa KAMIYA  Kenji SHIRAISHI  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E100-C No:10
      Page(s):
    928-933

    We demonstrate on the basis of ab initio calculations that metal-oxide-nitride-oxide-semiconductor (MONOS) memory is one of the most promising future high-density archive memories. We find that O related defects in a MONOS memory cause irreversible structural changes to the SiO2/Si3N4 interface at the atomistic level during program/erase (P/E) cycles. Carrier injection during the programming operation makes the structure energetically very stable, because all the O atoms in this structure take on three-fold-coordination. The estimated lifespan of the programmed state is of the order of a thousand years.

  • A Spectrum Sharing Method Based on Users' Behavior and Providers' Profit

    Kazuhiko KINOSHITA  Yukika MARUYAMA  Keita KAWANO  Takashi WATANABE  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/03/10
      Vol:
    E100-B No:10
      Page(s):
    1928-1938

    In recent years, spectrum sharing has received much attention as a technique for more efficient spectrum use. In the case in which all providers are cooperative, spectrum sensing can easily be realized and can improve user throughput (on average). If that is not the case, providers are not cooperative, i.e., spectrum trading, spectrum bands are rented to promote spectrum sharing. To ensure more profit, however, non-cooperative providers must correctly estimate the fluctuation of the number of connected users to be able to determine the offered channel price. In this paper, we propose a spectrum sharing method to achieve both higher throughput and provider profit via appropriate pricing using a disaggregate behavioral model. Finally, we confirm the effectiveness of the proposed method using simulation experiments.

  • Effect of Phase Shifter Quantization Error on the Performance of Millimeter Wave Beam Steering

    Junlin TANG  Kaida XU  Yuan ZENG  Guangrong YUE  Shaoqian LI  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/03/23
      Vol:
    E100-B No:10
      Page(s):
    1884-1890

    Beamforming technology is an effective method to build a robust link. The commonly used digital beamforming is an expensive and power consuming approach to realizing millimeter-wave transmission. This makes radio frequency(RF) beamforming, which has low cost and low power consumption due to its use of phase shifters the more feasible approach to creating stable links in the millimeter-wave band. Unfortunately, the performance of RF processing is degraded by the limited precision of digital phase shifters. In this paper, we analyze the gain loss caused by the limited precision of phase shifter in millimeter wave single stream beam steering. We deduce a theoretical relationship between the array gain loss and variance of phase error. The theoretical results are validated by the Monte Carlo simulations, which indicate that gain loss could be reduced by the increased precision of phase shifter. In practical applications, 4-bit phase shifters provide sufficient accuracy for single stream beam steering.

  • Proposal of Waveguide-Type Polarization Switch Based on Microring Resonator

    Keita SUZUKI  Tomoki HIRAYAMA  Yasuo KOKUBUN  Taro ARAKAWA  

     
    PAPER

      Vol:
    E100-C No:10
      Page(s):
    767-774

    We proposed and theoretically discussed a polarization switch based on a multiple quantum well (MQW) microring resonator (MRR) with an L-shaped waveguide as a dynamic polarization control device. The L-shaped waveguide was useful to obtain the rotation angle of the principal axis of 45° even when the core layer has form birefringence such as an MQW. The MRR functions as both a polarization converter and a wavelength filter. As an MQW core layer, a multiple five-layer asymmetric coupled quantum well (FACQW) was assumed. Polarization switching of an inputted light with a selected wavelength was successfully demonstrated at an operation voltage as low as 0.2 V using the electrorefractive index change in the MRR waveguide. The maximum polarization extinction ratio was more than 35 dB. The high-speed and low-voltage polarization switching can be realized with the proposed MRR polarization switch.

  • Study on Effect of Company Rules and Regulations in Telework Involving Personal Devices

    Takashi HATASHIMA  Yasuhisa SAKAMOTO  

     
    LETTER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2458-2461

    We surveyed employees who use personal devices for work. Residual analysis for cross-tabulation was carried out for three groups classified based on company rules and regulations established for mobile work. We show that the behavior of employees working with personal devices to process business data changes due to the presence or absence of the company rules and regulations.

  • Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach

    Dongyang ZHAN  Lin YE  Binxing FANG  Xiaojiang DU  Zhikai XU  

     
    PAPER-Operating system and network Security

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2307-2318

    Protecting critical files in operating system is very important to system security. With the increasing adoption of Virtual Machine Introspection (VMI), designing VMI-based monitoring tools become a preferential choice with promising features, such as isolation, stealthiness and quick recovery from crash. However, these tools inevitably introduce high overhead due to their operation-based characteristic. Specifically, they need to intercept some file operations to monitor critical files once the operations are executed, regardless of whether the files are critical or not. It is known that file operation is high-frequency, so operation-based methods often result in performance degradation seriously. Thus, in this paper we present CFWatcher, a target-based real-time monitoring solution to protect critical files by leveraging VMI techniques. As a target-based scheme, CFWatcher constraints the monitoring into the operations that are accessing target files defined by users. Consequently, the overhead depends on the frequency of target files being accessed instead of the whole filesystem, which dramatically reduces the overhead. To validate our solution, a prototype system is built on Xen with full virtualization, which not only is able to monitor both Linux and Windows virtual machines, but also can take actions to prevent unauthorized access according to predefined policies. Through extensive evaluations, the experimental results demonstrate that the overhead introduced by CFWatcher is acceptable. Especially, the overhead is very low in the case of a few target files.

  • Completely Independent Spanning Trees on 4-Regular Chordal Rings

    Jou-Ming CHANG  Hung-Yi CHANG  Hung-Lung WANG  Kung-Jui PAI  Jinn-Shyong YANG  

     
    LETTER

      Vol:
    E100-A No:9
      Page(s):
    1932-1935

    Given a graph G, a set of spanning trees of G are completely independent spanning trees (CISTs for short) if for any vertices x and y, the paths connecting them on these trees have neither vertex nor edge in common, except x and y. Hasunuma (2001, 2002) first introduced the concept of CISTs and conjectured that there are k CISTs in any 2k-connected graph. Later on, this conjecture was unfortunately disproved by Péterfalvi (2012). In this note, we show that Hasunuma's conjecture holds for graphs restricted in the class of 4-regular chordal rings CR(n,d), where both n and d are even integers.

  • Optical Networking Paradigm: Past, Recent Trends and Future Directions Open Access

    Eiji OKI  Naoya WADA  Satoru OKAMOTO  Naoaki YAMANAKA  Ken-ichi SATO  

     
    INVITED SURVEY PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2017/03/22
      Vol:
    E100-B No:9
      Page(s):
    1564-1580

    This paper presents past and recent trends of optical networks and addresses the future directions. First, we describe path networks with the historical backgrounds and trends. path networks have advanced by using various multiplexing technologies. They include time-division multiplexing (TDM), asynchronous transfer mode (ATM), and wavelength-division multiplexing (WDM). ATM was later succeeded to multi-protocol label switching (MPLS). Second, we present generalized MPLS technologies (GMPLS). In GMPLS, the label concept of MPLS is extended to other labels used in TDM, WDM, and fiber networks. GMPLS enables network operators to serve networks deployed by different technologies with a common protocol suite of GMPLS. Third, we describe multi-layer traffic engineering and a path computation element (PCE). Multi-layer traffic engineering designs and controls networks considering resource usages of more than one layer. This leads to use network resources more efficiently than the single-layer traffic engineering adopted independently for each layer. PCE is defined as a network element that computes paths, which are used for traffic engineering. Then, we address software-defined networks, which put the designed network functions into the programmable data plane by way of the management plane. We describe the evaluation from GMPLS to software defined networking (SDN) and transport SDN. Fifth, we describe the advanced devices and switches for optical networks. Finally, we address advances in networking technologies and future directions on optical networking.

441-460hit(2923hit)