This paper deals with a characteristic of the so-called effective boundary condition for a plane wave scattering from periodic surfaces with perfect conductivity. The perturbation solution with all orders is explicitly given under the effective boundary condition. It is newly found that such a perturbation solution satisfies the optical theorem under the exact boundary condition. A comparison between such a perturbation solution and a reference solution for the exact boundary condition by other methods is performed. Then, the validity of such a perturbation solution is concretely discussed.
Bennian DOU Hong ZHANG Chun-Hua CHEN Chungen XU
In this letter, we point out that key substitution attacks should be taken into account for multisignature schemes, which implies that the existing security notions for multisignature schemes are not sufficient. As an example, we show that the multisignature scheme proposed by Boldyreva at PKC'03 is susceptible to key substitution attacks.
Bennian DOU Hong ZHANG Chun-Hua CHEN Chungen XU
At Eurocrypt'2006, Lu et al. proposed a pairing based verifiably encrypted signature scheme (the LOSSW-VES scheme) without random oracles. In this letter, we show that the LOSSW-VES scheme does not have opacity against rogue-key attacks.
Senya POLIKOVSKY Yoshinari KAMEDA Yuichi OHTA
Facial micro-expressions are fast and subtle facial motions that are considered as one of the most useful external signs for detecting hidden emotional changes in a person. However, they are not easy to detect and measure as they appear only for a short time, with small muscle contraction in the facial areas where salient features are not available. We propose a new computer vision method for detecting and measuring timing characteristics of facial micro-expressions. The core of this method is based on a descriptor that combines pre-processing masks, histograms and concatenation of spatial-temporal gradient vectors. Presented 3D gradient histogram descriptor is able to detect and measure the timing characteristics of the fast and subtle changes of the facial skin surface. This method is specifically designed for analysis of videos recorded using a hi-speed 200 fps camera. Final classification of micro expressions is done by using a k-mean classifier and a voting procedure. The Facial Action Coding System was utilized to annotate the appearance and dynamics of the expressions in our new hi-speed micro-expressions video database. The efficiency of the proposed approach was validated using our new hi-speed video database.
Hideaki WAKABAYASHI Masamitsu ASAI Keiji MATSUMOTO Jiro YAMAKITA
We propose a new analytical method for a composite dielectric grating embedded with conducting strips using scattering factors in the shadow theory. The scattering factor in the shadow theory plays an important role instead of the conventional diffraction amplitude. By specifying the relation between scattering factors and spectral-domain Green's functions, we derive expressions of the Green's functions directly for unit surface electric and magnetic current densities, and apply the spectral Galerkin method to our formulation. From some numerical results, we show that the expressions of the Green's functions are valid, and analyze scattering characteristics by composite gratings.
Bijun PENG Wei CHEN Yu ZHANG Ming LEI Zhigang CAO Sheng ZHOU
A leakage-aware Coordinated Scheduling/Coordinated Beamforming (CS/CB) scheme for heterogeneous networks with layered limited feedback is proposed. In particular, all pico cells cooperatively select an optimal beamforming vector for the macro cell within a CoMP cluster so as to minimizing leakage power from the macro cell. Simulations show that the proposed scheme outperforms the conventional non-CoMP scheme with perfect channel state information at teansmitter (CSIT). Furthermore, the feedback amount and scheduler complexity is decreased greatly.
In this letter, we reduce the computational complexity of the conventional iterative MMSE-ML signal detection method for multiple input multiple output (MIMO) single carrier FDMA (SC-FDMA) systems, without compromising the error performance. Complexity analysis confirms the efficacy of the proposed modification.
Vakhtang JANDIERI Kiyotoshi YASUMOTO
A semi-analytical method for a planar periodic array formed by a finite number of magnetized ferrite circular cylinders is presented using a model of layered cylindrical structures. The method uses the T-matrix approach and the extraction of the reflection and transmission matrices based on the cylindrical harmonic mode expansion. Based on the proposed method, plane wave scattering by the finite number of magnetized ferrite circular cylinders is numerically studied from the viewpoint of realization the electronic switching and electronic scanning effects by varying the applied magnetic field.
Kuniyasu SUZAKI Kengo IIJIMA Toshiki YAGI Cyrille ARTHO
Memory deduplication improves the utilization of physical memory by sharing identical blocks of data. Although memory deduplication is most effective when many virtual machines with same operating systems run on a CPU, cross-user memory deduplication is a covert channel and causes serious memory disclosure attack. It reveals the existence of an application or file on another virtual machine. The covert channel is a difference in write access time on deduplicated memory pages that are re-created by Copy-On-Write, but it has some interferences caused by execution environments. This paper indicates that the attack includes implementation issues caused by memory alignment, self-reflection between page cache and heap, and run-time modification (swap-out, anonymous pages, ASLR, preloading mechanism, and self-modification code). However, these problems are avoidable with some techniques. In our experience on KSM (kernel samepage merging) with the KVM virtual machine, the attack could detect the security level of attacked operating systems, find vulnerable applications, and confirm the status of attacked applications.
Masashi NOMURA Shigemasa TAKAI
In this paper, we study decentralized supervisory control of timed discrete event systems, where we adopt the OR rule for fusing local enablement decisions and the AND rule for fusing local enforcement decisions. Under these rules, necessary and sufficient conditions for the existence of a decentralized supervisor that achieves a given specification language are easily obtained from the result of literature. If a given specification language does not satisfy these existence conditions, we must compute its sublanguage satisfying them. The main contribution of this paper is proposing a method for computing such a sublanguage.
Recently, Shao et al. [M. Shao and Y. Chin, A privacy-preserving dynamic id-based remote user authentication scheme with access control for multi-server environment, IEICE Transactions on Information and Systems, vol.E95-D, no.1, pp.161–168, 2012] proposed a dynamic ID-based remote user authentication scheme with access control for multi-server environments. They claimed that their scheme could withstand various attacks and provide anonymity. However, in this letter, we will point out that Shao et al.'s scheme has practical pitfalls and is not feasible for real-life implementation. We identify that their scheme is vulnerable to two kinds of attacks and cannot provide anonymity.
In this paper we consider the two-class classification problem with high-dimensional data. It is important to find a class of distributions such that we cannot expect good performance in classification for any classifier. In this paper, when two population variance-covariance matrices are different, we give a reasonable sufficient condition for distributions such that the misclassification rate converges to the worst value as the dimension of data tends to infinity for any classifier. Our results can give guidelines to decide whether or not an experiment is worth performing in many fields such as bioinformatics.
Chee Yik KEONG Poo Kuan HOONG Choo-Yee TING
In this paper, we propose an adaptive chunk scheduling for mesh-based peer-to-peer live streaming system, a hybrid class of push and pull chunk delivery approach. The proposed rule-based push-pull scheduler simultaneously pull video chunk from lower latency peers to fill up missing chunks and push video chunk adaptively for rapid chunk delivery. We performed comparative simulation study against rarest first push-pull and status-wise push-pull to prove the efficiency of our proposed algorithm. Mesh-push is made possible by effectively exploiting the information through buffer map exchange. The findings of performance evaluation have suggested a better video continuity and achieved lower source to end delay.
Xiongxin ZHAO Xiao PENG Zhixiang CHEN Dajiang ZHOU Satoshi GOTO
Structured quasi-cyclic low-density parity-check (QC-LDPC) codes have been adopted in many wireless communication standards, such as WiMAX, Wi-Fi and WPAN. To completely support the variable code rate (multi-rate) and variable code length (multi-length) implementation for universal applications, the partial-parallel layered LDPC decoder architecture is straightforward and widely used in the decoder design. In this paper, we propose a high parallel LDPC decoder architecture for WiMAX system with dedicated ASIC design. Different from the block by block decoding schedule in most partial-parallel layered architectures, all the messages within each layer are updated simultaneously in the proposed fully-parallel layered decoder architecture. Meanwhile, the message updating is separated into bit-serial style to reduce hardware complexity. A 6-bit implementation is adopted in the decoder chip, since simulations demonstrate that 6-bit quantization is the best trade-off between performance and complexity. Moreover, the two-layer concurrent processing technique is proposed to further increase the parallelism for low code rates. Implementation results show that the decoder chip saves 22.2% storage bits and only takes 2448 clock cycles per iteration for all the code rates defined in WiMAX standard. It occupies 3.36 mm2 in SMIC 65 nm CMOS process, and realizes 1056 Mbps throughput at 1.2 V, 110 MHz and 10 iterations with 115 mW power occupation, which infers a power efficiency of 10.9 pJ/bit/iteration. The power efficiency is improved 63.6% in normalized comparison with the state-of-art WiMAX LDPC decoder.
Jungo GOTO Osamu NAKAMURA Kazunari YOKOMAKURA Yasuhiro HAMAGUCHI Shinsuke IBI Seiichi SAMPEI
This paper proposes a spectrum-overlapped resource management (SORM) technique where each user equipment (UE) can ideally obtain the frequency selection diversity gain under multi-user environments. In the SORM technique for cellular systems, under assumption of adopting a soft canceller with minimum mean square error (SC/MMSE) turbo equalizer, an evolved node B (eNB) accepts overlapped frequency resource allocation. As a result, each UE can use the frequency bins having the highest channel gain. However, the SORM becomes non-orthogonal access when the frequency bins having high channel gain for UEs are partially identical. In this case, the inter-user interference (IUI) caused by overlapping spectra among UEs is eventually canceled out by using the SC/MMSE turbo equalizer. Therefore, SORM can achieve better performance than orthogonal access e.g. FDMA when the IUI is completely canceled. This paper demonstrates that SORM has the potential to improve transmission performance, by extrinsic information transfer (EXIT) analysis. Moreover, this paper evaluates the block error rate (BLER) performance of the SORM and the FDMA. Consequently, this paper shows that the SORM outperforms the FDMA.
Xuan GENG Fang CAO Qi-ming SHI
In this letter, non-orthogonal amplify-and-forward (NAF) is considered in a half-duplex two-way system. We derive the closed-form outage probability in the high signal-to-noise ratio (SNR) region, and approximate it with a simpler version to enable power allocation. Then a closed-form power allocation scheme is proposed to improve the outage performance; it uses only statistical channel knowledge (SCK). It is validated that our analyses agree with simulation results and the proposed power allocation approaches the optimal power allocation.
Masao MASUGI Norihito HIRASAWA Yoshiharu AKIYAMA Kazuo MURAKAWA
To clarify the characteristics of high-speed electrostatic discharge (ESD) events, we use two kinds of discharge electrodes: sphere- and cylinder-shape ones. We measure the energy level of ESD waveforms with charging voltages of 0.25, 0.5, and 1.0 kV. We find that the cylindrical electrode yields higher high-speed ESD energies, especially when the charging voltage is high; this indicates that the discharge gap shape is an important factor in ESD events.
Yanling ZHI Wai-Shing LUK Yi WANG Changhao YAN Xuan ZENG
Yield-driven clock skew scheduling was previously formulated as a minimum cost-to-time ratio cycle problem, by assuming that variational path delays are in Gaussian distributions. However in today's nanometer technology, process variations show growing impacts on this assumption, as variational delays with non-Gaussian distributions have been observed on these paths. In this paper, we propose a novel yield-driven clock skew scheduling method for arbitrary distributions of critical path delays. Firstly, a general problem formulation is proposed. By integrating the cumulative distribution function (CDF) of critical path delays, the formulation is able to handle path delays with any distributions. It also generalizes the previous formulations on yield-driven clock skew scheduling and indicates their statistical interpretations. Generalized Howard algorithm is derived for finding the critical cycles of the underlying timing constraint graphs. Moreover, an effective algorithm based on minimum balancing is proposed for the overall yield improvement. Experimental results on ISCAS89 benchmarks show that, compared with two representative existing methods, our method remarkably improves the yield by 10.25% on average (up to 14.66%).
Tatsuya AKUTSU Yang ZHAO Morihiro HAYASHIDA Takeyuki TAMURA
The Boolean network (BN) can be used to create discrete mathematical models of gene regulatory networks. In this paper, we consider three problems on BNs that are known to be NP-hard: detection of a singleton attractor, finding a control strategy that shifts a BN from a given initial state to the desired state, and control of attractors. We propose integer programming-based methods which solve these problems in a unified manner. Then, we present results of computational experiments which suggest that the proposed methods are useful for solving moderate size instances of these problems. We also show that control of attractors is -hard, which suggests that control of attractors is harder than the other two problems.
Tsung-Han LIN Yuki KINEBUCHI Tatsuo NAKAJIMA
In this paper, we propose a virtualization architecture for a multi-core embedded system to provide more system reliability and security while maintaining performance and without introducing additional special hardware supports or implementing a complex protection mechanism in the virtualization layer. Embedded systems, especially consumer electronics, have often used virtualization. Virtualization is not a new technique, as there are various uses for both GPOS (General Purpose Operating System) and RTOS (Real Time Operating System). The surge of the multi-core platforms in embedded systems also helps consolidate the virtualization system for better performance and lower power consumption. Embedded virtualization design usually uses two approaches. The first is to use the traditional VMM, but it is too complicated for use in the embedded environment without additional special hardware support. The other approach uses the microkernel, which imposes a modular design. The guest systems, however, would suffer from considerable modifications in this approach, as the microkernel allows guest systems to run in the user space. For some RTOSes and their applications originally running in the kernel space, this second approach is more difficult to use because those codes use many privileged instructions. To achieve better reliability and keep the virtualization layer design lightweight, this work uses a common hardware component adopted in multi-core embedded processors. In most embedded platforms, vendors provide additional on-chip local memory for each physical core, and these local memory areas are only private to their cores. By taking advantage of this memory architecture, we can mitigate the above-mentioned problems at once. We choose to re-map the virtualization layer's program on the local memory, called SPUMONE, which runs all guest systems in the kernel space. Doing so, it can provide additional reliability and security for the entire system because the SPUMONE design in a multi-core platform has each instance installed on a separate processor core. This design differs from traditional virtualization layer design, and the content of each SPUMONE is inaccessible to the others. We also achieve this goal without adding overhead to the overall performance.