Nyberg and Rueppel recently proposed a new EIGamal-type digital signature scheme with message recovery feature and its six variants. The advantage of small signed message length is effective especially in some applications like public key certifying protocols or the key exchange. But two forgeries that present a real threat over such applications are pointed out. In certifying public keys or key exchanges, redundancy is not preferable in order to store or transfer small data. Therefore the current systems should be modified in order to integrate the Nyberg-Ruepple's signature into such applications. However, there has not been such a research that prevents the forgeries directly by improving the signature scheme. In this paper, we investigate a condition to avoid the forgeries directly. We also show some new message recovery signatures strong against the forgeries by adding a negligible computation amount to their signatures, while not increasing the signature size. The new scheme can be integrated into the above application without modifying the current systems, while maintaining the security.
Mitsuharu ARIMURA Hirosuke YAMAMOTO Suguru ARIMOTO
A Bitplane Tree Weighting (BTW) method with arithmetic coding is proposed for lossless coding of gray scale images, which are represented with multiple bitplanes. A bitplane tree, in the same way as the context tree in the CTW method, is used to derive a weighted coding probability distribution for arithmetic coding with the first order Markov model. It is shown that the proposed method can attain better compression ratio than known schemes with MDL criterion. Furthermore, the BTW method can be extended to a high order Markov model by combining the BTW with the CTW or with prediction. The performance of these modified methods is also evaluated. It is shown that they attain better compression ratio than the original BTW method without increasing memory size and coding time, and they can beat the lossless JPEG coding.
This paper proposes a general expansion architecture for constructing large-scale multicast ATM switches with any type of small multicast switch, called the multicast Universal Multistage Interconnection Network (multicast UniMIN). The proposed architecture consists of a buffered distribution network that can perform cell routing and replication simultaneously, and a column of output switch modules (OSMs). The adoption of channel grouping and virtual first-in-first-out (FIFO) buffers results in high delay/throughput performance, and the distributed lookup table scheme for multicast addressing greatly reduces the size of a single lookup table. Analytical and simulation results show that high delay/throughput performance is obtained for both unicast and multicast traffic, and the proposed architecture yields an even better performance for multicast traffic than for unicast traffic. In addition, the multicast UniMIN switch has such good features as modular expandability, simple hardware, and no internal speed-up operation.
A bicomplex representation for time-harmonic electromagnetic fields appearing in scattering and diffraction problems is given using two imaginary units i and j. Fieldsolution integral-expressions obtained in the high-frequency and low-frequency limits are shown to provide the new relation between high-frequency diffraction and low-frequency scattering. Simple examples for direct scattering problems are illustrated. It may also be possible to characterize electric or magnetic currents induced on the obstacle in terms of geometrical optics far-fields. This paper outlines some algebraic rules of bicomplex mathematics for diffraction or scattering fields and describes mathematical evidence of the solutions. Major discussions on the relationship between high-frequency and low-frequency fields are relegated to the companion paper which will be published in another journal.
The present paper gives a new formulation for rough surface scattering in terms of a stochastic integral equation which can be dealt with by means of stochastic functional approach. The random surface is assumed to be infinite and a homogeneous Gaussian random process. The random wave field is represented in the stochastic Floquet form due to the homogeneity of the surface, and in the non-Rayleigh form consisting of both upward and downward going scattered waves, as well as in the extended Voronovich form based on the consideration of the level-shift invariance. The stochastic integral equations of the first and the second kind are derived for the unknown surface source function which is a functional of the derivative or the increment of the surface profile function. It is also shown that the inhomogeneous term of the stochastic integral equation of the second kind automatically gives the solution of the Kirchhoff approximation for infinite surface.
Keiji MATSUMOTO Katsu ROKUSHIMA Jiro YAMAKITA
A method for analyzing the scattering of electromagnetic waves by a general bianisotropic slab is presented by extending the author's previous approaches for anisotropic, chiral, and those periodic media. The analysis is formulated in a unified matrix form, so that scattering characteristics can be obtained by system matrix calculations. The method can be extended straightforwardly to multilayerd and periodic structures. The scattering efficiencies are obtained for the incidence of not only linearly polarized waves but also circularly polarized waves.
Yasuhiko TAMURA Junichi NAKAYAMA Kazuteru KOMORI
This paper deals with the scattering and diffraction of a plane wave by a randomly rough half-plane by three tools: the small perturbation method, the Wiener-Hopf technique and a group theoretic consideration based on the shift-invariance of a homogeneous random surface. For a slightly rough case, the scattered wavefield is obtained up to the second-order perturbation with respect to the small roughness parameter and represented by a sum of the Fresnel integrals with complex arguments, integrals along the steepest descent path and branch-cut integrals, which are evaluated numerically. For a Gaussian roughness spectrum, intensities of the coherent and incoherent waves are calculated in the region near the edge and illustrated in figures, in terms of which several characteristics of scattering and diffraction are discussed.
Roberto TIBERIO Stefano MACI Alberto TOCCAFONDI
In this paper, a quite general systematic procedure is presented for defining incremental field contributions, that may provide effective tools for describing a wide class of scattering and diffraction phenomena at any aspect, whthin a unitary, self-consistent framework. This is based on a generalization of the localization process for cylindrical canonical problems with elementary source illumination and arbitrary observation aspects. In particular, it is shown that the spectral integral formulation of the exact solution may also be represented as a spatial integral convolution along the axis of the cylinder. Its integrand is then directly used to define the relevant incremental field contribution. This procedure, that will be referred to as a ITD (Incremental Theory of Diffraction) Fourier transform convolution localization process, is explicitly applied to both wedge and circular cylinder canonical configurations, to define incremental diffiraction and scattering contributions, respectively. These formulations are asymptotically approximated to find closed form high-frequency expression for the incremental field contributions. This generalization of the ITD lacalization process may provide a quite general, systematic procedure to find incremental field contributions that explicitly satisfy reciprocity and naturally lead to the UTD ray field representation, when it is applicable.
Ning GUAN Ken'ichiro YASHIRO Sumio OHKAWA
The integral kernel expansion method is applied to an analysis of scattering of magnetostatic forward volume waves (MSFVWs) by an array with any number of metal strips. In this method, first the integral kernel of the Fourier integral is expanded in terms of orthogonal polynomials to obtain moment equations. Then a system of algebraic equations is derived by applying the Galerkin's method. In the process, interaction between strips is naturally taken into account and real current distributions on the strips are determined such that boundary conditions are satisfied. Calculus confirmation through the energy conservation principle shows that numerical results are quite satisfactory. A comparison shows that theoretical results are in good agreement with experimental ones except the vicinity of lower and upper limits of the MSFVW band. It is shown that an infinite number of propagation modes is excited even if a wave of single mode is incident. Dependence of the scattering on dimension of arrays and on frequency and mode of an incident wave is obtained.
This paper deals with a probabilistic formulation of the diffraction and scattering of a plane wave from a periodic surface randomly deformed by a binary sequence. The scattered wave is shown to have a stochastic Floquet's form, that is a product of a periodic stationary random function and an exponential phase factor. Such a periodic stationary random function is then represented in terms of a harmonic series representation similar to Fourier series, where `Fourier coefficients' are mutually correlated stationary processes rather than constants. The mutually correlated stationary processes are written by binary orthogonal functionals with unknown binary kernels. When the surface deformations are small compared with wavelength, an approximate solution is obtained for low-order binary kernels, from which the scattering cross section, coherently diffracted power and the optical theorem are numerically calculated and are illustrated in figures.
Masahiko NISHIMOTO Hiroyoshi IKUNO
Scattering data from radar targets are analyzed in the time-frequency domain by using wavelet transform, and the scattering mechanisms are investigated. The wavelet transform used here is a powerful tool for the analysis of scattering data, because it can provide better insights into scattering mechanisms that are not immediately apparent in either the time or frequency domain. First, two types of wavelet transforms that are applied to the time domain data and to the frequency domain data are defined, and the multi-resolution characteristics of them are discussed. Next, the scattering data from a conducting cylinder, two parallel conducting cylinders, a parallel-plate waveguide cavity, and a rectangular cavity in the underground are analyzed by using these wavelet transforms to reveal the scattering mechanisms. In the resulting time-frequency displays, the scattering mechanisms including specular reflection, creeping wave, resonance, and dispersion are clearly observed and identified.
V. S. Rao SASIPALLI Gouri Shankar SASIPALLI Koichi HARADA
Clothoid or cornu spiral segments were used as transition spirals forming C-and S-shaped curves between circles as well as straight lines in various situations of highway road design. These transitions are the center lines of rail, highway road design. The above C and S-shaped form curves consist one or more transition segments. We study the possibility of using the single transition spirals in the situations that use many transition spirals to form smooth transition spline between circles as well as straight lines. We also compute the bounds for the scaling of such single spirals using the practical equation. This paper is aimed to give a method avoiding non-linear equations by finding range for the scaling factor of the clothoids which can take initially an appropriate closer value from this range.
Koohong KANG Bart STEYAERT Cheeha KIM
In this Letter, we investigate the loss performance of a discrete-time single-server queueing system with periodic vacations, with which we are often confronted in traffic control, such as cell scheduling or priority control schemes, at ATM nodes. Explicit expressions are derived for the cell loss ratio in terms of the distribution of the buffer contents in an infinite capacity queue.
Shoichi KOSHIKAWA Dilek ÇOLAK Ayhan ALTINTAŞ Kazuya KOBAYASHI Alexander I.NOSICH
A rigorous radar cross section (RCS) analysis is carried out for two-dimensional rectangular and circular cavities with double-layer material loading by means of the Wiener-Hopf (WH) technique and the Riemann-Hilbert problem (RHP) technique, respectively. Both E and H polarizations are treated. The WH solution for the rectangular cavity and the RHP solution for the circular cavity involve numerical inversion of matrix equations. Since both methods take into account the edge condition explicitly, the convergence of the WH and RHP solutions is rapid and the final results are valid over a broad frequency range. Illustrative numerical examples on the monostatic and bistatic RCS are presented for various physical parameters and the far field scattering characteristics are discussed in detail. It is shown that the double-layer lossy meterial loading inside the cavities leads to the significant RCS reduction.
We have previously proposed a scannable memory configuration which is useful in testing logic blocks around memory arrays. Although the configuration is supposed to be effective in testing the memory array itself by its frequent read/write access during the scan operation, it has not been theoretically shown what types of faults can be detected. In this paper, from a viewpoint of memory testing, we investigate the testability of the scannable memory configuration and propose a memory array test using the scan path. It is shown that we can detect (1) all stuck-at faults in memory cells, (2) all stuck-at faults in address decoders, (3) all stuck-at faults in read/write logic, (4) static, dynamic and 2-coupling faults between memory cells of adjacent words, and (5) static coupling faults between memory cells in the same word. The test can be accomplished simply by comparing scan-in data and scan-out data. The test vector is 20ms bit long, where m is the number of words of the memory array under test and s is the total scan path length.
Teruyuki HASEGAWA Toru HASEGAWA Toshihiko KATO Kenji SUZUKI
Most of current real time video retrieval systems use video transfer protocols such that servers simply transmit video packets in the same rate as clients play them. If any packets are corrupted during transmission, they will be lost and cannot be recovered by retransmission. In video retrieval systems, however, teh video data are stored in servers and clients can prefetch them prior to playing. So, it might be possible for the video retrieval systems to make corrupted video packets retransmitted before the play-out dead line. But the application of existing reliable protocols causes problems such that, if a packet does not arrive before the dead line due to retransmission, the packets following it will not be delivered to the upper layer even if they have already arrived. In this paper, we discuss how to apply reliable protocols to real time video retrieval systems and propose an new real time video transfer protocol over ATM network, which provides the video data prefetch, the flow control for video buffer, the selective retransmission with skipping function for video packets late for the play-out dead line, and the resynchronization function for video buffer. We have implemented an experimental system using our protocol and evaluated the performance. The results of performance evaluation shows that the proposed protocol decreases the number of unplayed video data largely when transmission errors are inserted in an ATM network.
Hiroshi TOHJO Tetsuya YAMAMURA Tetsuaki GOTO
In order to efficiently conduct the complex operations of network OpSs (Operation Systems), we introduce the TMN-based Integrated Management Display System (IMD). IMD is able to control the display of windows monitoring individual operations on multiple screens such as project monitors. In this paper, we describe an implementation of the IMD and experimental results. This implementation consists of the Multi-Screen Control System (MSS), Multi-Screen Agent System (MSA) and Multi-Screen Manager System (MSM). MSA controls MSS directly via proprietary protocols. MSM manages MSA via the TMN Interface. MSA is modeled using the GDMO (Guidelines for the Definition of Managed Objects). Moreover, in order to realize cooperation with other OpSs, MSM is based on TMN. We confirm that MSM interworks with ATMOS (ATM Transport Network Operation System) and develop an alarm surveillance system for ATMOS using IMD at in an OpS-Room. Experiments verify that MSA can be controlled by MSM following the alarms emitted from the real network equipment of the ATM Transport Network. As a result, the operators can comprehend the operations information more quickly than is possible with the conventional system. By using the TMN-based Integrated Management Display System (IMD), operations such as alarm surveillance can be performed more efficiently.
This paper presents a new generation method of the periodic orthogonal numerical sequences with small maximum amplitude. In the generation method, complex exponential sequences are used as the generating sequences and such periodic orthogonal numerical sequences are constructed from the discrete Fourier transform of the generating sequences. Until now, there has not been found a generation algorithm to derive such sequences with any period. It is shown that the proposed generation method can derive periodic orthogonal real sequences with the maximum amplitude less than 1.5 for the period 1N200 and periodic orthogonal coplex sequences with all the sbsolute amplitude value of 1 for any period.
Hiroyuki OCHI Yoko KAMIDOI Hideyuki KAWABATA
This paper proposes a new approach that makes it possible for every undergraduate student to perform experiments of developing a Ipipelined RISC processor within limited time available for the course. The approach consists of 4 steps. At the first step, every student implements by himself/herself a pipelined RISC processor which is based on a given, very simple model; it has separate buses for instruction and data memory ("Harvard architecture") to avoid structural hazard, while it completely ignores data control hazards to make implementation easy. Although it is such a "defective" processor, we can test its functionality by giving object code containing sufficient amount of NOP instructions to avoid hazards. At the second step, NOP instructions are deleted and behavior of the developed processor is observed carefully to understand data and control hazards. At the third step, benchmark problems are provided, and every student challenges to improve its performance. Finally every student is requested to present how he/she improved the processor. This paper also describes a new educational FPGA board ASAver.1 which is useful for experiments from introductory class to computer architecture/system class. As a feasibility study, a 16-bit pipelined RISC processor "ASAP-O" has been developed which has eight 16-bit general purpose registers, a 16-bit program counter, and a zero flag, with 10 essential instructions.
Katsuhiro SEBAYASHI Hisao UOSE
We have developed a network architecture that achieves ATM multicast communication services with receiver-specified quality of service (QoS) guarantee which depends on the dynamic resource environment of the receivers (e.g. CPU capability, memory capability, and network capability). We propose two receiver-initiated QoS guarantee methods and concentrate on the functions required to achieve them. Moreover, on our ATM testbed, we also evaluate the performance of an experimental implementation of the proposed methods.