The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SER(2307hit)

721-740hit(2307hit)

  • Proposal of High Performance 1.55 µm Quantum Dot Heterostructure Laser Using InN

    Md. Mottaleb HOSSAIN  Md. Abdullah-AL HUMAYUN  Md. Tanvir HASAN  Ashraful Ghani BHUIYAN  Akihiro HASHIMOTO  Akio YAMAMOTO  

     
    PAPER-Lasers, Quantum Electronics

      Vol:
    E95-C No:2
      Page(s):
    255-261

    This paper reports on a theoretical study and modeling of a 1.55 µm quantum dot heterostructure laser using InN as a promising candidate for the first time. Details of design and theoretical analysis of probability distribution of the optical transition energy, threshold current density, modal gain, and differential quantum efficiency are presented considering a single layer of quantum dots. Dependence of threshold current density on the RMS value of quantum dot size fluctuations and the cavity length is studied. A low threshold current density of ∼51 Acm-2 is achieved at room temperature for a cavity length of 640 µm. An external differential efficiency of ∼65% and a modal gain of ∼12.5 cm-1 are obtained for the proposed structure. The results indicate that the InN based quantum dot laser is a promising one for the optical communication system.

  • A Multi-Domain Access Control Infrastructure Based on Diameter and EAP

    Souheil BEN AYED  Fumio TERAOKA  

     
    PAPER

      Vol:
    E95-D No:2
      Page(s):
    503-513

    The evolution of Internet, the growth of Internet users and the new enabled technological capabilities place new requirements to form the Future Internet. Many features improvements and challenges were imposed to build a better Internet, including securing roaming of data and services over multiple administrative domains. In this research, we propose a multi-domain access control infrastructure to authenticate and authorize roaming users through the use of the Diameter protocol and EAP. The Diameter Protocol is a AAA protocol that solves the problems of previous AAA protocols such as RADIUS. The Diameter EAP Application is one of Diameter applications that extends the Diameter Base Protocol to support authentication using EAP. The contributions in this paper are: 1) first implementation of Diameter EAP Application, called DiamEAP, capable of practical authentication and authorization services in a multi-domain environment, 2) extensibility design capable of adding any new EAP methods, as loadable plugins, without modifying the main part, and 3) provision of EAP-TLS plugin as one of the most secure EAP methods. DiamEAP Server basic performances were evaluated and tested in a real multi-domain environment where 200 users attempted to access network using the EAP-TLS method during an event of 4 days. As evaluation results, the processing time of DiamEAP using the EAP-TLS plugin for authentication of 10 requests is about 20 ms while that for 400 requests/second is about 1.9 second. Evaluation and operation results show that DiamEAP is scalable and stable with the ability to handle more than 6 hundreds of authentication requests per second without any crashes. DiamEAP is supported by the AAA working group of the WIDE Project.

  • All-Optical Flip-Flop Based on Coupled-Mode DBR Laser Diode for Optically Clocked Operation

    Masaru ZAITSU  Akio HIGO  Takuo TANEMURA  Yoshiaki NAKANO  

     
    PAPER

      Vol:
    E95-C No:2
      Page(s):
    218-223

    A novel type of optically clocked all-optical flip-flop based on a coupled-mode distributed Bragg reflector laser diode is proposed. The device operates as a bistable laser, where the two lasing modes at different wavelength are switched all-optically by injecting a clock pulse together with a set/reset signal. We employ an analytical model based on the two-mode coupled rate equations to verify the basic operation of the device numerically. Optically clocked flip-flop operation is obtained with a set/reset power of 0.60 mW and clock power of 1.8 mW. The device features simple structure, small footprint, and synchronized all-optical flip-flop operation, which should be attractive in the future digital photonic integrated circuits.

  • An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments

    Jangseong KIM  Joonsang BAEK  Jianying ZHOU  Taeshik SHON  

     
    PAPER-Security

      Vol:
    E95-D No:1
      Page(s):
    117-125

    Recently, numerous service discovery protocols have been introduced in the open literature. Unfortunately, many of them did not consider security issues, and for those that did, many security and privacy problems still remain. One important issue is to protect the privacy of a service provider while enabling an end-user to search an alternative service using multiple keywords. To deal with this issue, the existing protocols assumed that a directory server should be trusted or owned by each service provider. However, an adversary may compromise the directory server due to its openness property. In this paper, we suggest an efficient verification of service subscribers to resolve this issue and analyze its performance and security. Using this method, we propose an efficient and secure service discovery protocol protecting the privacy of a service provider while providing multiple keywords search to an end-user. Also, we provide performance and security analysis of our protocol.

  • Sparsity Preserving Embedding with Manifold Learning and Discriminant Analysis

    Qian LIU  Chao LAN  Xiao Yuan JING  Shi Qiang GAO  David ZHANG  Jing Yu YANG  

     
    LETTER-Pattern Recognition

      Vol:
    E95-D No:1
      Page(s):
    271-274

    In the past few years, discriminant analysis and manifold learning have been widely used in feature extraction. Recently, the sparse representation technique has advanced the development of pattern recognition. In this paper, we combine both discriminant analysis and manifold learning with sparse representation technique and propose a novel feature extraction approach named sparsity preserving embedding with manifold learning and discriminant analysis. It seeks an embedded space, where not only the sparse reconstructive relations among original samples are preserved, but also the manifold and discriminant information of both original sample set and the corresponding reconstructed sample set is maintained. Experimental results on the public AR and FERET face databases show that our approach outperforms relevant methods in recognition performance.

  • Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications

    Hu XIONG  Xiaofeng WANG  Fagen LI  

     
    LETTER

      Vol:
    E95-A No:1
      Page(s):
    256-258

    Recently, Kang et al. discussed some security flaws of Wu et al.'s and Wei et al.'s authentication schemes that guarantee user anonymity in wireless communications and showed how to overcome the problems regarding anonymity and the forged login messages. However, we will show that Kang et al.'s improved scheme still did not provide user anonymity as they claimed.

  • Optical Fan-Out Adapter for Compact Packaging of Components by a Jacket Removing System with a CO2 Laser

    Osanori KOYAMA  Ryou SOUGEN  Keisuke IKUSHIMA  Makoto YAMADA  Yutaka KATSUYAMA  

     
    PAPER-Optical Fiber for Communications

      Vol:
    E95-B No:1
      Page(s):
    143-151

    A new optical fan-out adapter is proposed and fabricated by applying the jacket removing system with a CO2 laser. The fan-out adapter has both the multi-fiber connection function and the fiber separating function for single-fiber connections. In order to remove the jacket of a fiber ribbon to connectorize and fabricate the fan-out adapter, the optimum conditions of the laser power P and the scan speed V are clarified for the jacket removing. Based on the optimum conditions, the fan-out adapter was fabricated successfully. Individual fibers could be taken out from the MT connector of the fan-out adapter. The connection losses of the fabricated fan-out adapter were comparable with the values of commercially available MT connectors and SC connectors. The length of the fabricated fan-out adapter was 27 mm, including 2 MT connectors. This result clarifies that the size of the connection with a fan-out can be reduced dramatically by the proposed fan-out adapter.

  • Propagation Characteristics of Dielectric Waveguides with Arbitrary Inhomogeneous Media along the Middle Layer

    Ryosuke OZAKI  Tsuneki YAMASAKI  

     
    PAPER-Periodic Structures

      Vol:
    E95-C No:1
      Page(s):
    53-62

    In this paper, we apply an improved method for the guiding problem of dielectric waveguide with arbitrary inhomogeneous media along the middle layer introduced the defect layers, and analyzed the propagation characteristics of dielectric waveguide composed of dielectric circular cylinders and the arbitrary inhomogeneous media in the middle layer by using a combination of the improved Fourier series expansion method and multilayer method. Numerical results are given for the propagation constants in the first stop band regions, and the distribution of energy flow for both TE0 and TM0 modes. The influence of permittivity and the shape variation of arbitrary inhomogeneous media are discussed in the first stop band regions.

  • Conservation of Energy in a Waveguide System with an Imperfection Core

    Akira KOMIYAMA  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E95-C No:1
      Page(s):
    97-100

    Asymptotic expansions of the amplitudes of the direct and scattered waves in a waveguide system with an imperfection core are derived for large core number and the partial cancellation of the direct wave by the scattered wave is shown in detail. The total power of light in the cross section of a waveguide system is analytically derived and it is shown that the total power of the sum of the direct and scattered waves decreases from that of the direct wave because of the cancellation, the difference of the total power transfers to the localized wave and the total power of light is conserved.

  • Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent

    Deukjo HONG  Bonwook KOO  Dong-Chan KIM  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:1
      Page(s):
    372-380

    We present pseudo-preimage attacks on Davis-Meyer mode of reduced rounds of the block ciphers ARIA, Camellia, and Serpent by using Sasaki's framework. They yield preimage or second-preimage attacks on PGV hashing modes. We develop proper initial structures for applying meet-in-the-middle techniques to the block ciphers, by considering their diffusion layers, and propose a method to find matching-check equations for indirect partial matching technique with a binary matrix. These works enable us to attack 5 rounds of ARIA, 7 rounds of Camellia, and 4 rounds of Serpent faster than brute force attack.

  • Uplink Capacity of OFDM Multi-User MIMO Using Near-ML Detection in a Cellular System

    Masashi ITAGAKI  Tetsuya YAMAMOTO  Kazuki TAKEDA  Fumiyuki ADACHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E95-B No:1
      Page(s):
    198-205

    Multi-user multi-input multi-output (MIMO) system has been attracting much attention due to its high spectrum efficiency. Non-linear MIMO signal detection methods with less computational complexity have been widely studied for single-user MIMO systems. In this paper, we investigate how a lattice reduction (LR)-aided detection and a maximum likelihood detection (MLD) employing the QR decomposition and M-algorithm (QRM-MLD), which are commonly known as non-linear MIMO signal detection methods, improve the uplink capacity of a multi-user MIMO-OFDM cellular system, compared to simple linear detection methods such as zero-forcing detection (ZFD) and minimum mean square error detection (MMSED). We show that both LR-aided linear detection and QRM-MLD can achieve higher uplink capacity than simple linear detection at the cost of moderate increase of computational complexity. Furthermore, QRM-MLD can obtain the same uplink capacity as MLD.

  • A New Handover Management Scheme for User Mobility in NGN

    Myoung Ju YU  Seong Gon CHOI  

     
    LETTER-Network

      Vol:
    E95-B No:1
      Page(s):
    279-282

    This letter proposes a new handover management scheme supporting session continuity in user mobility. The proposed scheme uses mapping relationship between User Identifier and Terminal Identifier for supporting user mobility that a user changes his accessing terminal. The proposed scheme does not need to have any changes in protocol stacks.

  • Closed-Form Real Single-Tone Frequency Estimator Based on Phase Compensation of Multiple Correlation Lags

    Yan CAO  Gang WEI  

     
    LETTER-Digital Signal Processing

      Vol:
    E95-A No:1
      Page(s):
    395-399

    A new frequency estimator for a single real-valued sinusoid signal in white noise is proposed. The new estimator uses the Pisarenko Harmonic Decomposer (PHD) estimator to get a coarse frequency estimate and then makes use of multiple correlation lags to obtain an adjustment term. For the limited-length single sinusoid, its correlation has the same frequency as itself but with a non-zero phase. We propose to use Taylor series to expand the correlation at the PHD coarse estimated frequency with amplitude and phase of the correlation into consideration. Simulation results show that this new method improves the estimation performance of the PHD estimator. Moreover, when compared with other existing estimator, the mean square frequency error of the proposed method is closer to the Cramer-Rao Lower Bound (CRLB) for certain SNR range.

  • A Clustering K-Anonymity Scheme for Location Privacy Preservation

    Lin YAO  Guowei WU  Jia WANG  Feng XIA  Chi LIN  Guojun WANG  

     
    PAPER-Privacy

      Vol:
    E95-D No:1
      Page(s):
    134-142

    The continuous advances in sensing and positioning technologies have resulted in a dramatic increase in popularity of Location-Based Services (LBS). Nevertheless, the LBS can lead to user privacy breach due to sharing location information with potentially malicious services. A high degree of location privacy preservation for LBS is extremely required. In this paper, a clustering K-anonymity scheme for location privacy preservation (namely CK) is proposed. The CK scheme does not rely on a trusted third party to anonymize the location information of users. In CK scheme, the whole area that all the users reside is divided into clusters recursively in order to get cloaked area. The exact location information of the user is replaced by the cloaked spatial temporal boundary (STB) including K users. The user can adjust the resolution of location information with spatial or temporal constraints to meet his personalized privacy requirement. The experimental results show that CK can provide stringent privacy guarantees, strong robustness and high QoS (Quality of Service).

  • Configuring a Low-Cost, Power-Saving Multiple Server Backup System: Experimental Results

    Mitsuyoshi KITAMURA  

     
    PAPER-Network Management/Operation

      Vol:
    E95-B No:1
      Page(s):
    189-197

    In this study, a low-cost, power-saving and reliable Multiple Server Backup System (MSBS) was configured and tested. The MSBS is based on a Dynamic Backup Server System (DBSS) and is able to recover many different server functions. To configure the DBSS, the mode segmentation method is introduced to simplify system control design and improve applicability to other systems. Experiments based on a mail server showed that the DBSS has sufficient ability to deal with various types of issues, including software and hardware failures. Furthermore, it is important to evaluate the virtual server performance in recovering target server functions. The well-known clock time inaccuracy problem of the virtual server is solved using the network access method regardless of the failure.

  • Protecting Primary Users in Cognitive Radio Networks with Effective Capacity Loss Constraint

    Ding XU  Zhiyong FENG  Ping ZHANG  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E95-B No:1
      Page(s):
    349-353

    Cognitive radio (CR) in spectrum sharing mode allows secondary user (SU) to share the same spectrum simultaneously with primary user (PU), as long as the former guarantees no harmful interference is caused to the latter. This letter proposes a new type of constraint to protect the PU systems that are carrying delay-sensitive applications, namely the PU effective capacity loss constraint, which sets an upper bound on the maximum effective capacity loss of the PU due to the SU transmission. In addition, the PU effective capacity loss constraint is approximately transformed to the interference temperature (power) constraint, to make it easier to be implemented. As an example, we obtain a closed form expression of the SU effective capacity under the approximated peak interference power constraint and the results of simulations validate the proposed PU protection criterion.

  • Underground Electric Signal at the Occurrence of the Niigataken Chuetsu-oki Earthquake in 2007, Japan

    Kan OKUBO  Akihiro TAKEUCHI  Yukinobu NAKAMURA  Nobunao TAKEUCHI  

     
    BRIEF PAPER-Electromagnetic Compatibility

      Vol:
    E95-C No:1
      Page(s):
    110-114

    The electric field mill in our underground observation room detected a co-seismic electromagnetic signal in the vertical electrostatic field ca. 8 s after the origin time of the Niigataken Chuetsu-oki Earthquake in 2007, but ca. 30 s before the arrival time of the P-waves.

  • Interference Mitigation Capability of a Low Duty DS-Multiband-UWB System in Realistic Environment

    Chin-Sean SUM  Shigenobu SASAKI  Hiroshi HARADA  

     
    PAPER

      Vol:
    E94-A No:12
      Page(s):
    2762-2772

    In this paper, the performance of a low duty factor (DF) hybrid direct sequence (DS) multiband (MB)-pulsed ultra wideband (UWB) system is evaluated over realistic propagation channels to highlight its capability of interference mitigation. The interference mitigation techniques incorporated in the DS-MB-UWB system is a novel design that includes the utilization of the frequency-agile multiple sub-band configuration and the coexistence-friendly low DF signaling. The system design consists of a Rake type receiver over multipath and multi-user channel in the presence of a coexisting narrowband interferer. The propagation channels are modeled based on actual measurement data. Firstly, by suppressing the power in the particular sub-band coexisting with the narrowband signal, performance degradation due to narrowband interference can be improved. It is observed that by fully suppressing the sub-band affected by the narrowband signal, a typical 1-digit performance improvement (e.g. BER improves from 10-3 to 10-4) can be achieved. Secondly, by employing lower DF signaling, self interference (SI) and multi-user interference (MUI) can be mitigated. It is found that a typical 3 dB improvement is achieved by reducing the DF from 0.5 to 0.04. Together, the sub-band power suppression and low DF signaling are shown to be effective mitigation techniques against environment with the presence of SI, MUI and narrowband interference.

  • Growth Position and Chirality Control of Single-Walled Carbon Nanotubes

    Keijiro SAKAI  Satoshi DOI  Nobuyuki IWATA  Hirofumi YAJIMA  Hiroshi YAMAMOTO  

     
    PAPER

      Vol:
    E94-C No:12
      Page(s):
    1861-1866

    We propose a novel technique to grow the single-walled carbon nanotubes (SWNTs) with specific chirality at the desired position using free electron laser (FEL) irradiation during growth and surface treatment. As a result, only the semiconducting SWNTs grew at the area between triangle electrodes, where the ozone treatment was done to be hydrophilic when an alcohol chemical vapor deposition (ACCVD) process was carried out with the 800 nm FEL irradiation. Although the number of possible chiral index is 22 in the SWNTs grown without the FEL irradiation, the number is much reduced to be 8 by the FEL.

  • Loss Characteristics of Polymer Waveguide Fabricated by UV Laser Drawing of an Optically-Sensitive Hybrid Silicone

    Soichi KOBAYASHI  Seigi OKI  Takahiro ISHIKURA  Keisuke KATO  Toshihiro SUDA  

     
    BRIEF PAPER

      Vol:
    E94-C No:12
      Page(s):
    1858-1860

    Polymer multimode optical waveguides were fabricated from optically-sensitive hybrid silicone using the ultraviolet laser drawing method. The waveguide loss values were measured as 0.069 dB/cm with a laser diode, 0.069 dB/cm with a vertical-cavity surface-emitting laser, and 0.128 dB/cm with a light-emitting diode. The cross waveguide on a curved waveguide was drawn by overlapped direct laser drawing. The crosstalk and excess loss at the cross angle of 50 in the cross waveguide were measured as 47 dB and 0.5 dB, respectively.

721-740hit(2307hit)