The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RIN(2923hit)

901-920hit(2923hit)

  • Acceleration of Deep Packet Inspection Using a Multi-Byte Processing Prefilter

    Hyejeong HONG  Sungho KANG  

     
    LETTER-Internet

      Vol:
    E96-B No:2
      Page(s):
    643-646

    Fast string matching is essential for deep packet inspection (DPI). Traditional string matchers cannot keep up with the continuous increases in data rates due to their natural speed limits. We add a multi-byte processing prefilter to the traditional string matcher to detect target patterns on a multiple character basis. The proposed winnowing prefilter significantly reduces the number of identity blocks, thereby reducing the memory requirements.

  • PCA-Based Retinal Vessel Tortuosity Quantification

    Rashmi TURIOR  Danu ONKAEW  Bunyarit UYYANONVARA  

     
    PAPER-Pattern Recognition

      Vol:
    E96-D No:2
      Page(s):
    329-339

    Automatic vessel tortuosity measures are crucial for many applications related to retinal diseases such as those due to retinopathy of prematurity (ROP), hypertension, stroke, diabetes and cardiovascular diseases. An automatic evaluation and quantification of retinal vascular tortuosity would help in the early detection of such retinopathies and other systemic diseases. In this paper, we propose a novel tortuosity index based on principal component analysis. The index is compared with three existant indices using simulated curves and real retinal images to demonstrate that it is a valid indicator of tortuosity. The proposed index satisfies all the tortuosity properties such as invariance to translation, rotation and scaling and also the modulation properties. It is capable of differentiating the tortuosity of structures that visually appear to be different in tortuosity and shapes. The proposed index can automatically classify the image as tortuous or non tortuous. For an optimal set of training parameters, the prediction accuracy is as high as 82.94% and 86.6% on 45 retinal images at segment level and image level, respectively. The test results are verified against the judgement of two expert Ophthalmologists. The proposed index is marked by its inherent simplicity and computational attractiveness, and produces the expected estimate, irrespective of the segmentation approach. Examples and experimental results demonstrate the fitness and effectiveness of the proposed technique for both simulated curves and retinal images.

  • Statistical Approaches to Excitation Modeling in HMM-Based Speech Synthesis

    June Sig SUNG  Doo Hwa HONG  Hyun Woo KOO  Nam Soo KIM  

     
    LETTER-Speech and Hearing

      Vol:
    E96-D No:2
      Page(s):
    379-382

    In our previous study, we proposed the waveform interpolation (WI) approach to model the excitation signals for hidden Markov model (HMM)-based speech synthesis. This letter presents several techniques to improve excitation modeling within the WI framework. We propose both the time domain and frequency domain zero padding techniques to reduce the spectral distortion inherent in the synthesized excitation signal. Furthermore, we apply non-negative matrix factorization (NMF) to obtain a low-dimensional representation of the excitation signals. From a number of experiments, including a subjective listening test, the proposed method has been found to enhance the performance of the conventional excitation modeling techniques.

  • The Properties of the FCSR-Based Self-Shrinking Sequence

    Huijuan WANG  Qiaoyan WEN  Jie ZHANG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E96-A No:2
      Page(s):
    626-634

    In the construction of a no-linear key-stream generator, self-shrinking is an established way of getting the binary pseudo-random periodic sequences in cryptography design. In this paper, using the theoretical analysis, we mainly study the self-shrinking sequence based on the l-sequence, and the theoretical results reflect its good cryptography properties accurately, such that it has the last period T = pe(p-1)/2 when T is an odd number, and the expected value of its autocorrelation belongs to {0,1/T and the variance is O(T/ln4T). Furthermore, we find that the 2-adic complexity of the self-shrinking sequence based on the l-sequence is large enough to resist the Rational Approximation attack.

  • A Novel Precoding Scheme for Dynamic Base Station Cooperation with Overlapped Clusters

    Jie GONG  Sheng ZHOU  Lu GENG  Meng ZHENG  Zhisheng NIU  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E96-B No:2
      Page(s):
    656-659

    In this letter, we propose a novel precoding scheme for base station (BS) cooperation in downlink cellular networks that allow overlapped clusters. The proposed precoding scheme is designed to mitigate the overlapping-BS interference by maximizing the so-called clustered virtual signal-to-interference-plus-noise ratio (CVSINR). Simulations show that with the proposed scheme, overlapped clustering provides substantial throughput gain over the traditional non-overlapped clustering methods, and user fairness is also improved.

  • A Spiral Curve Based Chord Enabling Resource Sharing for Wireless Mesh Networks: A Location Awareness and Cross-Layering Approach

    Hui ZHOU  Jie YANG  

     
    PAPER-Network

      Vol:
    E96-B No:2
      Page(s):
    508-521

    The contradictions created by the differences in mass P2P data and transfer capability of wireless networks, and mismatch of overlay network topology and physical network topology are the main barriers hindering the implementation of P2P resource sharing in wireless multi-hop networks. This paper investigates the problem of enabling P2P resource sharing in WMNs with two-tier architecture. SpiralChord, the DHT approach implemented through routers in the upper tier, is proposed to address the major problems of wireless resource sharing – how to efficiently find resources currently available and reduce redundant messages as much as possible. SpiralChord uses an ID assignment technique to integrate location awareness with cross-layering. Location awareness aims at alleviating mismatch in physical network topology and overlay network topology, and it is designed to map neighboring routers to close-by IDs in the logical ring. Cross-layering aims at speeding up resource lookup operations in the application layer by exploiting the information that is available at the MAC layer, and it tends to be more effective when physically neighboring routers have faraway IDs in the logical ring. An ID assignment strategy based on spiral curve is proposed to meet the contradictory requirements of location awareness and cross-layering, mapping a peer's neighbors in the overlay network to peers which are its physical neighbors and distributing the remaining physical neighbors as widely as possible in the overlay network. In addition, a mobility management mechanism is proposed to address the adverse effect of the movements of clients in lower tier on resource sharing. A client is assigned a managing router to take the responsibility for the location of the client. Simulations show SpiralChord is more effective in reducing message overhead and increasing lookup performance than Chord, and mobility management for mobile clients performs well at reducing message overhead caused by mobile clients in SpiralChord.

  • Secure Regenerating Codes Based on Rashmi-Shah-Kumar MBR Codes

    Masazumi KURIHARA  Hidenori KUWAKADO  

     
    PAPER-Information Theory

      Vol:
    E96-A No:2
      Page(s):
    635-648

    In this paper, we present a construction of (n,k,d,m) secure regenerating codes for distributed storage systems against eavesdroppers that can observe either data stored in at most m storage nodes or downloaded data for repairing at most m failed nodes in a network where m < k ≤ d ≤ n-1. The (n,k,d,m) secure regenerating code is based on an (n,k,d) minimum bandwidth regenerating (MBR) code, which was proposed by Rashmi, Shah and Kumar as optimal exact-regenerating codes, for all values of the parameters (n,k,d). The (n,k,d,m) secure regenerating codes have the security as a secret sharing scheme such that even if an eavesdropper knows either data stored in at most m storage nodes or downloaded data for repairing at most m failed nodes, no information about data leaks to the eavesdropper.

  • Low Phase Noise 14-Bit Digitally Controlled CMOS Quadrature Ring Oscillator

    Ramesh K. POKHAREL  Prapto NUGROHO  Awinash ANAND  Abhishek TOMAR  Haruichi KANAYA  Keiji YOSHIDA  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E96-C No:2
      Page(s):
    262-269

    High phase noise is a common problem in ring oscillators. Continuous conduction of the transistor in an analog tuning method degrades the phase noise of ring oscillators. In this paper, a digital control tuning which completely switches the transistors on and off, and a 1/f noise reduction technique are employed to reduce the phase noise. A 14-bit control signal is employed to obtain a small frequency step and a wide tuning range. Furthermore, multiphase ring oscillator with a sub-feedback loop topology is used to obtain a stable quadrature outputs with even number of stages and to increase the output frequency. The measured DCO has a frequency tuning range from 554 MHz to 2.405 GHz. The power dissipation is 112 mW from 1.8 V power supply. The phase noise at 4 MHz offset and 2.4 GHz center frequency is -134.82 dBc/Hz. The FoM is -169.9 dBc/Hz which is a 6.3 dB improvement over the previous oscillator design.

  • Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application

    Mitsuhiro HATTORI  Takato HIRANO  Takashi ITO  Nori MATSUDA  Takumi MORI  Yusuke SAKAI  Kazuo OHTA  

     
    PAPER-Public Key Based Protocols

      Vol:
    E96-A No:1
      Page(s):
    53-67

    We propose a new hidden vector encryption (HVE) scheme that we call a ciphertext-policy delegatable hidden vector encryption (CP-dHVE) scheme. Several HVE schemes have been proposed and their properties have been analyzed extensively. Nonetheless, the definition of the HVE has been left unchanged. We therefore reconsider it, and point out that the conventional HVE should be categorized as the key-policy HVE, because the vectors corresponding to the secret keys can contain wildcards (which specify an access policy) whereas those corresponding to the ciphertexts cannot contain them. We then formalize its dual concept, the ciphertext-policy HVE, and propose a concrete scheme. Then, as an application of our scheme, we propose a public-key encryption with conjunctive keyword search scheme that can be used in the hierarchical user systems. Our scheme is novel in that the ciphertext size grows logarithmically to the number of uses in the system, while that of a conventional scheme grows linearly.

  • Current Distribution on a Conductive Circular Disk Induced by Dipole Source Located at Arbitrary Position

    Takashi KUROKI  Toshihiko SHIBAZAKI  Teruhiro KINOSHITA  

     
    PAPER-Scattering and Diffraction

      Vol:
    E96-C No:1
      Page(s):
    3-10

    Current distributions induced on a circular disk of conductor are analyzed rigorously for an electric dipole incidence, when the source dipole is polarized parallel to the disk and located at an arbitrary position, and they are evaluated numerically. As the height of the dipole increases, the current distribution of the dipole approaches that of the plane wave incidence. Using a multiple precision arithmetic, numerical data for the current distribution are obtained for larger radii of a disk than the former approach.

  • Cryptanalysis of INCrypt32 in HID's iCLASS Systems

    ChangKyun KIM  Eun-Gu JUNG  Dong Hoon LEE  Chang-Ho JUNG  Daewan HAN  

     
    PAPER-Symmetric Key Cryptography

      Vol:
    E96-A No:1
      Page(s):
    35-41

    The cryptographic algorithm called INCrypt32 is a MAC algorithm to authenticate participants, RFID cards and readers, in HID Global's iCLASS systems. HID's iCLASS cards are widely used contactless smart cards for physical access control. Although INCrypt32 is a heart of the security of HID's iCLASS systems, its security has not been evaluated yet since the specification has not been open to public. In this paper, we reveal the specification of INCrypt32 by reverse-engineering iCLASS cards and investigate the security of INCrypt32 with respect to the cryptographic sense. This result is the first work to describe the details of INCrypt32 and the possibility of a secret key (64-bit) recovery in our attack environments. 242 MAC queries are required in the real environment using secure communication protocols. But the required number of MAC queries decreases to 218 if MAC quires for chosen messages with arbitrary length can be requested.

  • Semi-Analytical Method for Scattering by Finite Array of Magnetized Ferrite Circular Cylinders Based on the Model of Cylindrical Structures

    Vakhtang JANDIERI  Kiyotoshi YASUMOTO  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E96-C No:1
      Page(s):
    115-118

    A semi-analytical method for a planar periodic array formed by a finite number of magnetized ferrite circular cylinders is presented using a model of layered cylindrical structures. The method uses the T-matrix approach and the extraction of the reflection and transmission matrices based on the cylindrical harmonic mode expansion. Based on the proposed method, plane wave scattering by the finite number of magnetized ferrite circular cylinders is numerically studied from the viewpoint of realization the electronic switching and electronic scanning effects by varying the applied magnetic field.

  • A Heuristic Algorithm for Reconstructing a Packet Filter with Dependent Rules

    Ken TANAKA  Kenji MIKAWA  Manabu HIKIN  

     
    PAPER-Network Management/Operation

      Vol:
    E96-B No:1
      Page(s):
    155-162

    Network devices, such as routers or L3 switches, have a feature called packet-filtering for network security. They determine whether or not to pass arriving packets by applying filtering rules to them. If the number of comparisons of packets with rules increases, the time required for a determination will increase, which will result in greater communication delay. Various algorithms for optimizing filtering tables to minimize the load of packet filtering, which directly impacts the communication delay, have been proposed. In this paper, first we introduce an adaptive packet filter based on an algorithm that reconstructs the filtering table according to the frequency distribution of arrival packets. Next, we propose a new reconstruction algorithm based on grouping of dependent rules. Grouping dependent rules makes it possible to sort the rules in the table by the frequency of matching. Finally, we show the effectiveness of our algorithm by comparing it against previously reported algorithms.

  • Outage Analysis of Cognitive Spectrum Sharing for Two-Way Relaying Schemes with Opportunistic Relay Selection over i.n.i.d. Rayleigh Fading Channels

    Tran Trung DUY  Hyung Yun KONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    348-351

    In this letter, we analyze the outage performance of cognitive spectrum sharing in two-way relaying systems. We derive expressions of outage probability for the primary and secondary network over independent but not necessarily identically distributed (i.n.i.d.) Rayleigh fading channels. Monte Carlo simulations are presented to verify the theoretical analyses.

  • Resco: Automatic Collection of Leaked Resources

    Ziying DAI  Xiaoguang MAO  Yan LEI  Xiaomin WAN  Kerong BEN  

     
    PAPER-Software Engineering

      Vol:
    E96-D No:1
      Page(s):
    28-39

    A garbage collector relieves programmers from manual memory management and improves productivity and program reliability. However, there are many other finite system resources that programmers must manage by themselves, such as sockets and database connections. Growing resource leaks can lead to performance degradation and even program crashes. This paper presents the automatic resource collection approach called Resco (RESource COllector) to tolerate non-memory resource leaks. Resco prevents performance degradation and crashes due to resource leaks by two steps. First, it utilizes monitors to count resource consumption and request resource collections independently of memory usage when resource limits are about to be violated. Second, it responds to a resource collection request by safely releasing leaked resources. We implement Resco based on a Java Virtual Machine for Java programs. The performance evaluation against standard benchmarks shows that Resco has a very low overhead, around 1% or 3%. Experiments on resource leak bugs show that Resco successfully prevents most of these programs from crashing with little increase in execution time.

  • Numerical Methods for Composite Dielectric Gratings Embedded with Conducting Strips Using Scattering Factors

    Hideaki WAKABAYASHI  Masamitsu ASAI  Keiji MATSUMOTO  Jiro YAMAKITA  

     
    PAPER-Periodic Structures

      Vol:
    E96-C No:1
      Page(s):
    19-27

    We propose a new analytical method for a composite dielectric grating embedded with conducting strips using scattering factors in the shadow theory. The scattering factor in the shadow theory plays an important role instead of the conventional diffraction amplitude. By specifying the relation between scattering factors and spectral-domain Green's functions, we derive expressions of the Green's functions directly for unit surface electric and magnetic current densities, and apply the spectral Galerkin method to our formulation. From some numerical results, we show that the expressions of the Green's functions are valid, and analyze scattering characteristics by composite gratings.

  • Cognitive Fixed-Gain Amplify-and-Forward Relay Networks under Interference Constraints

    Dac-Binh HA  Vo Nguyen Quoc BAO  Xuan-Nam TRAN  Tuong-Duy NGUYEN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    375-378

    In this work, we analyze the performance of cognitive amplify-and-forward (AF) relay networks under the spectrum sharing approach. In particular, by assuming that the AF relay operates in the semi-blind mode (fixed-gain), we derive the exact closed-form expressions of the outage probability for the cognitive relaying (no direct link) and cognitive cooperative (with direct link) systems. Simulation results are presented to verify the theoretical analysis.

  • An Approach of Filtering Wrong-Type Entities for Entity Ranking

    Junsan ZHANG  Youli QU  Shu GONG  Shengfeng TIAN  Haoliang SUN  

     
    LETTER-Natural Language Processing

      Vol:
    E96-D No:1
      Page(s):
    163-167

    Entity is an important information carrier in Web pages. Users would like to directly get a list of relevant entities instead of a list of documents when they submit a query to the search engine. So the research of related entity finding (REF) is a meaningful work. In this paper we investigate the most important task of REF: Entity Ranking. The wrong-type entities which don't belong to the target-entity type will pollute the ranking result. We propose a novel method to filter wrong-type entities. We focus on the acquisition of seed entities and automatically extracting the common Wikipedia categories of target-entity type. Also we demonstrate how to filter wrong-type entities using the proposed model. The experimental results show our method can filter wrong-type entities effectively and improve the results of entity ranking.

  • A Study on the Effective Boundary Condition for Periodic Surfaces with Perfect Conductivity

    Yasuhiko TAMURA  

     
    PAPER-Periodic Structures

      Vol:
    E96-C No:1
      Page(s):
    11-18

    This paper deals with a characteristic of the so-called effective boundary condition for a plane wave scattering from periodic surfaces with perfect conductivity. The perturbation solution with all orders is explicitly given under the effective boundary condition. It is newly found that such a perturbation solution satisfies the optical theorem under the exact boundary condition. A comparison between such a perturbation solution and a reference solution for the exact boundary condition by other methods is performed. Then, the validity of such a perturbation solution is concretely discussed.

  • Towards Cost-Effective P2P Traffic Classification in Cloud Environment

    Tao BAN  Shanqing GUO  Masashi ETO  Daisuke INOUE  Koji NAKAO  

     
    PAPER-Network and Communication

      Vol:
    E95-D No:12
      Page(s):
    2888-2897

    Characterization of peer-to-peer (P2P) traffic is an essential step to develop workload models towards capacity planning and cyber-threat countermeasure over P2P networks. In this paper, we present a classification scheme for characterizing P2P file-sharing hosts based on transport layer statistical features. The proposed scheme is accessed on a virtualized environment that simulates a P2P-friendly cloud system. The system shows high accuracy in differentiating P2P file-sharing hosts from ordinary hosts. Its tunability regarding monitoring cost, system response time, and prediction accuracy is demonstrated by a series of experiments. Further study on feature selection is pursued to identify the most essential discriminators that contribute most to the classification. Experimental results show that an equally accurate system could be obtained using only 3 out of the 18 defined discriminators, which further reduces the monitoring cost and enhances the adaptability of the system.

901-920hit(2923hit)