The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RIN(2923hit)

1381-1400hit(2923hit)

  • A Framework for Detection of Traffic Anomalies Based on IP Aggregation

    Marat ZHANIKEEV  Yoshiaki TANAKA  

     
    PAPER-Networks

      Vol:
    E92-D No:1
      Page(s):
    16-23

    Traditional traffic analysis is can be performed online only when detection targets are well specified and are fairly primitive. Local processing at measurement point is discouraged as it would considerably affect major functionality of a network device. When traffic is analyzed at flow level, the notion of flow timeout generates differences in flow lifespan and impedes unbiased monitoring, where only n-top flows ordered by a certain metric are considered. This paper proposes an alternative manner of traffic analysis based on source IP aggregation. The method uses flows as basic building blocks but ignores timeouts, using short monitoring intervals instead. Multidimensional space of metrics obtained through IP aggregation, however, enhances capabilities of traffic analysis by facilitating detection of various anomalous conditions in traffic simultaneously.

  • Low Grazing Scattering from a Surface with a Finite Periodic Array of Rectangular Grooves

    Junichi NAKAYAMA  Yasuhiko TAMURA  Kiyoshi TSUTSUMI  

     
    LETTER-Electromagnetic Theory

      Vol:
    E92-C No:1
      Page(s):
    166-168

    This paper deals with the scattering of a transverse magnetic (TM) plane wave from a perfectly conductive surface with a finite periodic array of rectangular grooves. By use of the method in a previous paper [IEICE TRANS. ELECTRON. VOL.E90-C, no.4, pp.903-906, APRIL 2007], the total scattering cross section is numerically calculated for several different numbers of grooves at a low grazing angle of incidence. It is newly found that, when the corrugation width becomes thousands times of wavelength, the total scattering cross section slightly depends on the groove depth and the period, and becomes almost proportional to square root of the corrugation width with a small correction.

  • Analysis of Two-Phase Path Management Scheme for MPLS Traffic Engineering

    Hitomi TAMURA  Kenji KAWAHARA  Yuji OIE  

     
    PAPER

      Vol:
    E92-B No:1
      Page(s):
    59-67

    Traffic Engineering (TE) is important for improving QoS in forwarding paths by efficient use of network resources. In fact, MPLS allows several detour paths to be (pre-)established for some source-destination pair as well as its primary path of minimum hops. Thus, we focus on a two-phase path management scheme using these two kinds of paths. In the first phase, each primary path is allocated to a flow on a specific source-destination pair if the path is not congested, i.e., if its utilization is less than some predetermined threshold; otherwise, as the second phase, one of the detour paths is allocated randomly if the path is available. Therefore, in this paper, we analytically evaluate this path management scheme by extending the M/M/c/c queueing system, and through some numerical results we investigate the impact of a threshold on the flow-blocking probability. Through some numerical results, we discuss the adequacy of the path management scheme for MPLS-TE.

  • Fingerprinting Codes for Multimedia Data against Averaging Attack

    Hideki YAGI  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    PAPER-Application

      Vol:
    E92-A No:1
      Page(s):
    207-216

    Code construction for digital fingerprinting, which is a copyright protection technique for multimedia, is considered. Digital fingerprinting should deter collusion attacks, where several fingerprinted copies of the same content are mixed to disturb their fingerprints. In this paper, we consider the averaging attack, which is known to be effective for multimedia fingerprinting with the spread spectrum technique. We propose new methods for constructing fingerprinting codes to increase the coding rate of conventional fingerprinting codes, while they guarantee to identify the same number of colluders. Due to the new fingerprinting codes, the system can deal with a larger number of users to supply digital contents.

  • Analysis of Revocable-iff-Linked Ring Signature Scheme

    Ik Rae JEONG  Jeong Ok KWON  Dong Hoon LEE  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:1
      Page(s):
    322-325

    In a linkable ring signature scheme, a signer himself selects a set of parties called a "ring" and signs the messages on behalf of the ring. Any party can know whether or not the ring signatures are made by the same signer, although the party cannot know the identity of the actual signer. Au, Liu, Susilo, and Yuen proposed an ID-based linkable ring signature scheme and an ID-based revocable-iff-linked ring signature scheme. With a revocable-iff-linked ring signature scheme, any party can recover the identity of the signer, if the signer makes two or more ring signatures. In this paper, we show that Au et al.'s revocable-iff-linked ring signature scheme does not provide anonymity, even if the signer makes only one ring signature. Anonymity is one of the most basic security requirements of ring signatures.

  • Scalar Multiplication Using Frobenius Expansion over Twisted Elliptic Curve for Ate Pairing Based Cryptography

    Yasuyuki NOGAMI  Yumi SAKEMI  Takumi OKIMOTO  Kenta NEKADO  Masataka AKANE  Yoshitaka MORIKAWA  

     
    PAPER-Mathematics

      Vol:
    E92-A No:1
      Page(s):
    182-189

    For ID-based cryptography, not only pairing but also scalar multiplication must be efficiently computable. In this paper, we propose a scalar multiplication method on the circumstances that we work at Ate pairing with Barreto-Naehrig (BN) curve. Note that the parameters of BN curve are given by a certain integer, namely mother parameter. Adhering the authors' previous policy that we execute scalar multiplication on subfield-twisted curve (Fp2) instead of doing on the original curve E(Fp12), we at first show sextic twisted subfield Frobenius mapping (ST-SFM) in (Fp2). On BN curves, note is identified with the scalar multiplication by p. However a scalar is always smaller than the order r of BN curve for Ate pairing, so ST-SFM does not directly applicable to the above circumstances. We then exploit the expressions of the curve order r and the characteristic p by the mother parameter to derive some radices such that they are expressed as a polynomial of p. Thus, a scalar multiplication [s] can be written by the series of ST-SFMs . In combination with the binary method or multi-exponentiation technique, this paper shows that the proposed method runs about twice or more faster than plain binary method.

  • Traffic Light Detection Using Rotated Principal Component Analysis for Video-Based Car Navigation System

    Sung-Kwan JOO  Yongkwon KIM  Seong Ik CHO  Kyoungho CHOI  Kisung LEE  

     
    LETTER-Pattern Recognition

      Vol:
    E91-D No:12
      Page(s):
    2884-2887

    This letter presents a novel approach for traffic light detection in a video frame captured by an in-vehicle camera. The algorithm consists of rotated principal component analysis (RPCA), modified amplitude thresholding with respect to the histograms of the PC planes and final filtering with a neural network. The proposed algorithm achieves an average detection rate of 96% and is very robust to variations in the image quality.

  • Simultaneous Optimization of Skew and Control Step Assignments in RT-Datapath Synthesis

    Takayuki OBATA  Mineo KANEKO  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E91-A No:12
      Page(s):
    3585-3595

    As well as the schedule affects system performance, the control skew, i.e., the arrival time difference of control signals between registers, can be utilized for improving the system performance, enhancing robustness against delay variations, etc. The simultaneous optimization of the control step assignment and the control skew assignment is more powerful technique in improving performance. In this paper, firstly, we prove that, even if the execution sequence of operations which are assigned to the same resource is fixed, the simultaneous optimization problem under a fixed clock period is NP-hard. Secondly, we propose a heuristic algorithm for the simultaneous control step and skew optimization under given clock period, and we show how much the simultaneous optimization improves system performance. This paper is the first one that uses the intentional skew to shorten control steps under a specified clock period. The proposed algorithm has the potential to play a central role in various scenarios of skew-aware high level synthesis.

  • Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Kenichiro SATO  Ryo HASHIMOTO  Makoto YOSHINO  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  

     
    PAPER

      Vol:
    E91-B No:12
      Page(s):
    3821-3830

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  • Optimal Common Sub-Expression Elimination Algorithm of Multiple Constant Multiplications with a Logic Depth Constraint

    Yuen-Hong Alvin HO  Chi-Un LEI  Hing-Kit KWAN  Ngai WONG  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E91-A No:12
      Page(s):
    3568-3575

    In the context of multiple constant multiplication (MCM) design, we propose a novel common sub-expression elimination (CSE) algorithm that models the optimal synthesis of coefficients into a 0-1 mixed-integer linear programming (MILP) problem with a user-defined generic logic depth constraint. We also propose an efficient solution space, which combines all minimal signed digit (MSD) representations and the shifted sum (difference) of coefficients. In the examples we demonstrate, the combination of the proposed algorithm and solution space gives a better solution comparing to existing algorithms.

  • Improving the Accuracy of Ray Tracing Estimation Considering Inhomogeneous Building Surfaces in Urban Environments

    Jae-Woo LIM  Il-Suek KOH  Youn-Hyun PARK  Hyun-Wook MOON  Han-Shin JO  Jong-Gwan YOOK  Yong-Joong YOON  

     
    LETTER-Antennas and Propagation

      Vol:
    E91-B No:12
      Page(s):
    4067-4070

    To improve path loss estimation, a ray tracing method for inhomogeneous building surfaces and its verification are presented in this paper. Considering real building surfaces with many heterogeneous materials, the effective specular reflection based on a physical optics (PO) approximation is modeled and applied to the reflection in a ray tracing method. To verify the proposed method, measurement at 2.7 GHz is performed in a complex urban environment. Comparisons between the measurements and the ray tracing results are made in LOS and NLOS environments.

  • A CMOS RF Power Detector Using an Improved Unbalanced Source Coupled Pair

    Hangue PARK  Jaejun LEE  Jaechun LEE  Sangwook NAM  

     
    LETTER-Microwaves, Millimeter-Waves

      Vol:
    E91-C No:12
      Page(s):
    1969-1970

    This paper presents the design of a CMOS RF Power Detector (PD) using 0.18 µm standard CMOS technology. The PD is an improved unbalanced source coupled pair incorporating an output differential amplifier and sink current steering. It realizes an input detectable power range of -30 to -20 dBm over 0.1-1 GHz. Also it shows a maximum data rate of 30 Mbps with 2 pF output loading under OOK modulation. The overall current consumption is 1.9 mA under a 1.5 V supply.

  • Component Reduction for Gaussian Mixture Models

    Kumiko MAEBASHI  Nobuo SUEMATSU  Akira HAYASHI  

     
    PAPER-Pattern Recognition

      Vol:
    E91-D No:12
      Page(s):
    2846-2853

    The mixture modeling framework is widely used in many applications. In this paper, we propose a component reduction technique, that collapses a Gaussian mixture model into a Gaussian mixture with fewer components. The EM (Expectation-Maximization) algorithm is usually used to fit a mixture model to data. Our algorithm is derived by extending mixture model learning using the EM-algorithm. In this extension, a difficulty arises from the fact that some crucial quantities cannot be evaluated analytically. We overcome this difficulty by introducing an effective approximation. The effectiveness of our algorithm is demonstrated by applying it to a simple synthetic component reduction task and a phoneme clustering problem.

  • Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings

    Xuefei CAO  Weidong KOU  Yong YU  Rong SUN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:12
      Page(s):
    3833-3836

    This letter proposes an identity-based authenticated key agreement protocol. Different from available comparable ones, the new protocol realizes implicit authentication without bilinear pairings which makes it more efficient. The security of proposed protocol can be reduced to the standard Computational Diffie-Hellman problem. Two variants of the protocol are also given, with one achieving the security-efficiency trade-off and the other providing authenticated key agreement between users of different domains.

  • Improving Success Ratio of Object Search in Highly-Dynamic Mobile P2P Networks

    Kei TAKESHITA  Masahiro SASABE  Hirotaka NAKANO  

     
    PAPER

      Vol:
    E91-B No:12
      Page(s):
    3851-3859

    Mobile Ad Hoc Networks (MANETs) are temporal and infrastructure-independent wireless networks that consist of mobile nodes. For instance, a MANET can be used as an emergent network for communication among people when a disaster occurred. Since there is no central server in the network, each node has to find out its desired information (objects) by itself. Constructing a mobile Peer-to-Peer (P2P) network over the MANET can support the object search. Some researchers proposed construction schemes of mobile P2P networks, such as Ekta and MADPastry. They integrated DHT-based application-layer routing and network-layer routing to increase search efficiency. Furthermore, MADPastry proposed a clustering method which groups the overlay nodes according to their physical distance. However, it has also been pointed out that the search efficiency deteriorates in highly dynamic environments where nodes quickly move around. In this paper, we focus on route disappearances in the network layer which cause the deterioration of search efficiency. We describe the detail of this problem and evaluate quantitatively it through simulation experiments. We extend MADPastry by introducing a method sharing objects among nodes in a cluster. Through simulation experiments, we show that the proposed method can achieve up to 2.5 times larger success rate of object search than MADPastry.

  • Peer-to-Peer Based Fast File Dissemination in UMTS Networks

    Kai WANG  Li PAN  Jianhua LI  

     
    PAPER

      Vol:
    E91-B No:12
      Page(s):
    3860-3871

    In UMTS (universal mobile telecommunications system) networks upgraded with HSPA (high speed packet access) technology, the high access bandwidth and advanced mobile devices make it applicable to share large files among mobile users by peer-to-peer applications. To receive files quickly is essential for mobile users in file sharing applications, mainly because they are subject to unstable signal strength and battery failures. While many researches present peer-to-peer file sharing architectures in mobile environments, few works focus on decreasing the time spent in disseminating files among users. In this paper, we present an efficient peer-to-peer file sharing design for HSPA networks called AFAM -- Adaptive efficient File shAring for uMts networks. AFAM can decrease the dissemination time by efficiently utilizing the upload-bandwidth of mobile nodes. It uses an adaptive rearrangement of a node's concurrent uploads, which causes the count of the node's concurrent uploads to lower while ensuring that the node's upload-bandwidth can be efficiently utilized. AFAM also uses URF -- Upload Rarest First policy for the block selection and receiver selection, which achieves real rarest-first for the spread of blocks and effectively avoids the "last-block" problem in file sharing applications. Our simulations show that, AFAM achieves much less dissemination time than other protocols including BulletPrime and a direct implementation of BitTorrent for mobile environments.

  • A Novel View of Color-Based Visual Tracker Using Principal Component Analysis

    Kiyoshi NISHIYAMA  Xin LU  

     
    LETTER-Vision

      Vol:
    E91-A No:12
      Page(s):
    3843-3848

    An extension of the traditional color-based visual tracker, i.e., the continuously adaptive mean shift tracker, is given for improving the convenience and generality of the color-based tracker. This is achieved by introducing a probability density function for pixels based on the hue histogram of object. As its merits, the direction and size of the tracked object are easily derived by the principle component analysis (PCA), and its extension to three-dimensional case becomes straightforward.

  • Fuzzy Logic-Based Quantized Event Filter for RFID Data Processing

    Sung Ho JANG  Hi Sung CHOUN  Heung Seok CHAE  Jong Sik LEE  

     
    PAPER

      Vol:
    E91-B No:11
      Page(s):
    3560-3568

    RFID event filtering is an important issue of RFID data management. Tag read events from readers have some problems like unreliability, redundancy, and disordering of tag readings. Duplicated events lead to performance degradation of RFID systems with a flood of similar tag information. Therefore, this paper proposes a fuzzy logic-based quantized event filter. In order to reduce duplicated tag readings and solve disordering of tag readings, the filter applies a fuzzy logic system to control a filtering threshold by the change in circumstances of readers. Continuous tag readings are converted into discrete values for event generation by the filtering threshold. And, the filter generates as many events as the discrete values at a point of event generation time. Experimental results comparing the proposed filter with existing RFID event filters, such as the primitive event filter and the smoothing event filter, verify effectiveness and efficiency of the fuzzy logic-based quantized event filter.

  • A Revenue-Based Bandwidth Sharing for Advance and Immediate Reservation Calls

    Dong-Hoon YI  JongWon KIM  

     
    PAPER-Network

      Vol:
    E91-B No:11
      Page(s):
    3617-3626

    To guarantee the timely provisioning of QoS to real-time oriented multiparty and distributed computing applications (e.g., video conferencing and grid computing) that require the utilization of time and quantity-related resources, the resource should be reserved in advance. However, this new type of reservation (i.e., advance reservation) may collide with legacy (i.e., immediate) reservations that do not specify their session duration. In this paper, to suggest a balanced solution between sharing pools of resources and the managing of collisions between reservation calls, a revenue-based resource sharing scheme (focusing on the bandwidth) is proposed. The proposed scheme attempts to avoid possible collisions by employing a virtual profile of resources reserved in advance in an effort to achieve enhanced resource utilization. It is shown through NS-2 [22] -based network simulations that the proposed scheme can achieve balanced performance when compared with other schemes, including static resource partitioning and complete resource sharing.

  • Hybrid Fault Tolerant Peer to Peer Video Streaming Architecture

    Kasm ÖZTOPRAK  Gözde Bozdai AKAR  

     
    PAPER-Network

      Vol:
    E91-B No:11
      Page(s):
    3627-3638

    In this paper, we propose a fault tolerant hybrid p2p-CDN video streaming arhitecture to overcome the problems caused by peer behavior in peer-to-peer (P2P) video streaming systems. Although there are several studies modeling and analytically investigating peer behaviors in P2P video streaming systems, they do not come up with a solution to guarantee the required Quality of the Services (QoS). Therefore, in this study a hybrid geographical location-time and interest based clustering algorithm is proposed to improve the success ratio and reduce the delivery time of required content. A Hybrid Fault Tolerant Video Streaming System (HFTS) over P2P networks conforming the required QoS and Fault Tolerance is also offered. The simulations indicate that the required QoS can be achieved in streaming video applications using the proposed hybrid approach.

1381-1400hit(2923hit)