The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

3001-3020hit(16314hit)

  • Behavioral Equivalence of Security-Oriented Interactive Systems

    Guanjun LIU  Changjun JIANG  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2061-2068

    In the classical computation theory, the language of a system features the computational behavior of the system but it does not distinguish the determinism and nondeterminism of actions. However, Milner found that the determinism and nondeterminism affect the interactional behavior of interactive systems and thus the notion of language does not features the interactional behavior. Therefore, Milner proposed the notion of (weak) bisimulation to solve this problem. With the development of internet, more and more interactive systems occur in the world, such as electronic trading system. Security is one of the most important topics for these systems. We find that different security policies can also affect the interactional behavior of a system, which exactly is the reason why a good policy can strengthen the security. In other words, two interactive systems with different security policies are not of an equivalent behavior although their functions (or business processes) are identical. However, the classic (weak) bisimulation theory draws an opposite conclusion that their behaviors are equivalent. The notion of (weak) bisimulation is not suitable for these security-oriented interactive systems since it does not consider a security policy. This paper proposes the concept of secure bisimulation in order to solve the above problem.

  • A 9.35-ENOB, 14.8 fJ/conv.-step Fully-Passive Noise-Shaping SAR ADC

    Zhijie CHEN  Masaya MIYAHARA  Akira MATSUZAWA  

     
    PAPER-Electronic Circuits

      Vol:
    E99-C No:8
      Page(s):
    963-973

    This paper proposes an opamp-free solution to implement single-phase-clock controlled noise shaping in a SAR ADC. Unlike a conventional noise shaping SAR ADC, the proposal realizes noise shaping by charge redistribution, which is a passive technique. The passive implementation has high power efficiency. Meanwhile, since the proposal maintains the basic architecture and operation method of a traditional SAR ADC, it retains all the advantages of a SAR ADC. Furthermore, noise shaping helps to improve the performance of SAR ADC and relaxes its non-ideal effects. Designed in a 65-nm CMOS technology, the prototype realizes 58-dB SNDR based on an 8-bit C-DAC at 50-MS/s sampling frequency. It consumes 120.7-µW power from a 0.8-V supply and achieves a FoM of 14.8-fJ per conversion step.

  • Development of Tactile Graph Generation Web Application Using R Statistics Software Environment

    Tetsuya WATANABE  Kosuke ARAKI  Toshimitsu YAMAGUCHI  Kazunori MINATANI  

     
    PAPER-Rehabilitation Engineering and Assistive Technology

      Pubricized:
    2016/05/06
      Vol:
    E99-D No:8
      Page(s):
    2151-2160

    We have developed software that uses the R statistics software environment to automatically generate tactile graphs — i.e. graphs that can be read by blind people using their sense of touch. We released this software as a Web application to make it available to anyone, from anywhere. This Web application can automatically generate images for tactile graphs from numerical data in a CSV file. It is currently able to generate four types of graph — scatter plots, line graphs, bar charts and pie charts. This paper describes the Web application's functions, operating procedures and the results of evaluation experiments.

  • Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems

    Hyeongboo BAEK  Jaewoo LEE  Yongjae LEE  Hyunsoo YOON  

     
    PAPER-Dependable Computing

      Pubricized:
    2016/04/22
      Vol:
    E99-D No:8
      Page(s):
    2121-2130

    Since many cyber-physical systems (CPSs) manipulate security-sensitive data, enhancing the quality of security in a CPS is a critical and challenging issue in CPS design. Although there has been a large body of research on securing general purpose PCs, directly applying such techniques to a CPS can compromise the real-time property of CPSs since the timely execution of tasks in a CPS typically relies on real-time scheduling. Recognizing this property, previous works have proposed approaches to add a security constraint to the real-time properties to cope with the information leakage problem that can arise between real-time tasks with different security levels. However, conventional works have mainly focused on non-preemptive scheduling and have suggested a very naive approach for preemptive scheduling, which shows limited analytical capability. In this paper, we present a new preemptive fixed-priority scheduling algorithm incorporating a security constraint, called lowest security-level first (LSF) and its strong schedulability analysis to reduce the potential of information leakage. Our simulation results show that LSF schedulability analysis outperforms state-of-the-art FP analysis when the security constraint has reasonable timing penalties.

  • Adaptive Single-Channel Speech Enhancement Method for a Push-To-Talk Enabled Wireless Communication Device

    Hyoung-Gook KIM  Jin Young KIM  

     
    PAPER-Multimedia Systems for Communications

      Vol:
    E99-B No:8
      Page(s):
    1745-1753

    In this paper, we propose a single-channel speech enhancement method for a push-to-talk enabled wireless communication device. The proposed method is based on adaptive weighted β-order spectral amplitude estimation under speech presence uncertainty and enhanced instantaneous phase estimation in order to achieve flexible and effective noise reduction while limiting the speech distortion due to different noise conditions. Experimental results confirm that the proposed method delivers higher voice quality and intelligibility than the reference methods in various noise environments.

  • Practical Implementation of Spectrum Sensing and Signal Detection for Satellite Broadcasting Systems

    Hiroyuki KAMATA  Gia Khanh TRAN  Kei SAKAGUCHI  Kiyomichi ARAKI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1894-1901

    In the European satellite broadcasting specifications, the symbol rate and the carrier frequency are not regulated. Furthermore, the first generation format DVB-S does not have any control signals. In a practical environment, the received signal condition is not stable due to the imperfect reception environment, i.e., unterminated receiver ports, cheap indoor wiring cables etc. These issues prevent correct detection of the satellite signals. For this reason, the conventional signal detection method uses brute force search for detecting the received signal's cyclostationarity, which is an extremely time-consuming approach. A coarse estimation method of the carrier frequency and the bandwidth was proposed by us based on the power spectrum. We extend this method to create a new method for detecting satellite broadcasting signals, which can significantly reduce the search range. In other words, the proposed method can detect the signals in a relatively short time. In this paper, the proposed method is applied to signals received in an actual environment. Our analysis shows that the proposed method can effectively reduce the detection time at almost a same detection performance.

  • An Interoperability Framework of Open Educational Resources and Massive Open Online Courses for Sustainable e-Learning Platform

    Sila CHUNWIJITRA  Chanchai JUNLOUCHAI  Sitdhibong LAOKOK  Pornchai TUMMARATTANANONT  Kamthorn KRAIRAKSA  Chai WUTIWIWATCHAI  

     
    PAPER-Educational Technology

      Pubricized:
    2016/05/19
      Vol:
    E99-D No:8
      Page(s):
    2140-2150

    Massive Open Online Courses (MOOC) have been invented to support Virtual Learning Environment (VLE) for higher education. While numerous learning courses and contents were authored, most of the existing resources are now hard to reuse/redistribute among instructors due to the privacy of the contents. Therefore, Open Educational Resources (OER) and the Creative Commons license (CC) are interesting solutions available to alleviate such problems of MOOC. This research presents a new framework that effectively connects OER and MOOC for a life-long e-Learning platform for Thai people. We utilize the Fedora Commons repository for an OER back-end, and develop a new front-end to manage OER resources. In addition, we introduce a “FedX API” - including a packet encapsulation and a data transmission module - that organizes educational resources between both systems. We also proposed the CC declaring function to help participants on-the-fly declare their content license; therefore, any resources must be granted as an open licensing. Another important function is a Central Authorized System (CAS) which is applied to develop single signing-on to facilitate the OER-MOOC connection. Since the framework is designed to support the massive demand, the concurrent access capability is also evaluated to measure the performance of the proposed framework. The results show that the proposed framework can provide up to 750 concurrencies without any defects. The FedX API does not produce bottleneck trouble on the interoperability framework in any cases. In addition, resources can be exchanged among the third-party OER repositories by an OAI-PMH harvesting tool.

  • Hierarchical System Schedulability Analysis Framework Using UPPAAL

    So Jin AHN  Dae Yon HWANG  Miyoung KANG  Jin-Young CHOI  

     
    LETTER-Software System

      Pubricized:
    2016/05/06
      Vol:
    E99-D No:8
      Page(s):
    2172-2176

    Analyzing the schedulability of hierarchical real-time systems is difficult because of the systems' complex behavior. It gets more complicated when shared resources or dependencies among tasks are included. This paper introduces a framework based on UPPAAL that can analyze the schedulability of hierarchical real-time systems.

  • Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems

    Min SHAO  Min S. KIM  Victor C. VALGENTI  Jungkeun PARK  

     
    PAPER-Information Network

      Pubricized:
    2016/05/13
      Vol:
    E99-D No:8
      Page(s):
    2090-2099

    Network Intrusion Detection Systems (NIDS) are deployed to protect computer networks from malicious attacks. Proper evaluation of NIDS requires more scrutiny than the evaluation for general network appliances. This evaluation is commonly performed by sending pre-generated traffic through the NIDS. Unfortunately, this technique is often limited in diversity resulting in evaluations incapable of examining the complex data structures employed by NIDS. More sophisticated methods that generate workload directly from NIDS rules consume excessive resources and are incapable of running in real-time. This work proposes a novel approach to real-time workload generation for NIDS evaluation to improve evaluation diversity while maintaining much higher throughput. This work proposes a generative grammar which represents an optimized version of a context-free grammar derived from the set of strings matching to the given NIDS rule database. The grammar is memory-efficient and computationally light when generating workload. Experiments demonstrate that grammar-generated workloads exert an order of magnitude more effort on the target NIDS. Even better, this improved diversity comes at much smaller cost in memory and speeds four times faster than current approaches.

  • BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks

    Jinli RAO  Zhangqing HE  Shu XU  Kui DAI  Xuecheng ZOU  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2002-2009

    Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.

  • Self-Organized Inter-Cell Interference Coordination Based on Partial CSI Sharing in Heterogeneous Networks Employing Cell Range Expansion

    Takuya KAMENOSONO  Megumi KANEKO  Kazunori HAYASHI  Lila BOUKHATEM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1780-1788

    Many research efforts are being focused upon the design of dynamic Inter-Cell Interference Coordination (ICIC) schemes for macrocell/picocell heterogeneous networks employing Cell Range Expansion (CRE). In order to protect the expanded Pico User Equipments (ePUEs) located in the CRE region from severe Macro Base Station (MBS) interference in downlink, the conventional methods reduce the transmit power of the MBS in the Almost Blank Subframes (ABSs), where ePUEs can be scheduled. However, this severely limits the amount of usable resources/power for the MBS as compared to Resource Block (RB)-based dynamic allocation. Instead, we propose a self-organized RB-based dynamic resource allocation method. Based on the proposed partial Channel State Information (CSI) sharing, the MBS obtains ePUEs' CSI and predicts their RB allocation. Then, the MBS reduces its transmit power in RBs where the ePUEs' allocation probability is estimated to be high. The simulation results show that the proposed scheme achieves excellent macrocell/picocell performance trade-offs, even when taking into account the overhead increase due to the partial CSI sharing.

  • Fast Search of a Similar Patch for Self-Similarity Based Image Super Resolution

    Jun-Sang YOO  Ji-Hoon CHOI  Kang-Sun CHOI  Dae-Yeol LEE  Hui-Yong KIM  Jong-Ok KIM  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2016/05/16
      Vol:
    E99-D No:8
      Page(s):
    2194-2198

    In the self-similarity super resolution (SR) approach, similar examples are searched across down-scales in the image pyramid, and the computations of searching similar examples are very heavy. This makes it difficult to work in a real-time way under common software implementation. Therefore, the search process should be further accelerated at an algorithm level. Cauchy-Schwarz inequality has been used previously for fast vector quantization (VQ) encoding. The candidate patches in the search region of SR are analogous to the code-words in the VQ, and Cauchy-Schwarz inequality is exploited to exclude implausible candidate patches early. Consequently, significant acceleration of the similar patch search process is achieved. The proposed method can easily make an optimal trade-off between running speed and visual quality by appropriately configuring the bypass-threshold.

  • The Novel Performance Evaluation Method of the Fingerprinting-Based Indoor Positioning

    Shutchon PREMCHAISAWATT  Nararat RUANGCHAIJATUPON  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2016/05/17
      Vol:
    E99-D No:8
      Page(s):
    2131-2139

    In this work, the novel fingerprinting evaluation parameter, which is called the punishment cost, is proposed. This parameter can be calculated from the designed matrix, the punishment matrix, and the confusion matrix. The punishment cost can describe how well the result of positioning is in the designated grid or not, by which the conventional parameter, the accuracy, cannot describe. The experiment is done with real measured data on weekdays and weekends. The results are considered in terms of accuracy and the punishment cost. Three well-known machine learning algorithms, i.e. Decision Tree, k-Nearest Neighbors, and Artificial Neural Network, are verified in fingerprinting positioning. In experimental environment, Decision Tree can perform well on the data from weekends whereas the performance is underrated on the data from weekdays. The k-Nearest Neighbors has proper punishment costs, even though it has lower accuracy than that of Artificial Neural Network, which has moderate accuracies but lower punishment costs. Therefore, other criteria should be considered in order to select the algorithm for indoor positioning. In addition, punishment cost can facilitate the conversion spot positioning to floor positioning without data modification.

  • A Short-Time Three-Phase Single-Rail Precharge Logic against Differential Power Analysis

    Wenyi TANG  Song JIA  Yuan WANG  

     
    PAPER-Electronic Circuits

      Vol:
    E99-C No:8
      Page(s):
    956-962

    Side channel attacks (SCAs) on security devices have become a major concern for system security. Existing SCA countermeasures are costly in terms of area and power consumption. This paper presents a novel differential power analysis (DPA) countermeasure referred to as short-time three-phase single-rail precharge logic (STSPL). The proposed logic is based on a single-rail three-phase operation scheme providing effective DPA-resistance with low cost. In the scheme, a controller is inserted to discharge logic gates by reusing evaluation paths to achieve more balanced power consumption. This reduces the latency between different phases, increasing the difficult of the adversary to conduct DPA, compared with the state-of-the-art DPA-resistance logics. To verify the chip's power consumption in practice, a 4-bit ripple carry adder and a 4-bit inverter of AES-SBOX were implemented. The testing and simulation results of DPA attacks prove the security and efficiency of the proposed logic.

  • Low Power High Performance FinFET Standard Cells Based on Mixed Back Biasing Technology

    Tian WANG  Xiaoxin CUI  Kai LIAO  Nan LIAO  Xiaole CUI  Dunshan YU  

     
    PAPER-Electronic Circuits

      Vol:
    E99-C No:8
      Page(s):
    974-983

    With the decrease in transistor feature size, power consumption, especially leakage power, has become a most important design concern. Because of their superior electrical properties and design flexibility, fin-type field-effect transistors (FinFETs) seem to be the most promising option in low-power applications. In order to support the VLSI digital system design flow based on logic synthesis, this paper proposes a design method for low-power high-performance standard cells based on IG-mode FinFETs. Such a method is derived on the basis of appropriately and artfully designing and optimizing the stacked structures in each standard cell, and applying the mixed forward and reverse back-gate bias technique in a well-chosen manner. The proposed method is also applicable when the supply voltage reduces to 0.5V to further reduce the leakage power consumption. By applying this design method, optimized IG-mode FinFET standard cells are generated, and they form a low-power high-performance standard cell library. Simulation results of the library cells indicate that the performance of the standard cells designed with the proposed method can be maintained while reducing leakage consumption by a factor of 58.9 at most. The 16-bit ripple carry adder implemented with this library can acquire up to 17.5% leakage power reduction.

  • A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits

    Takuho MITSUNAGA  Yoshifumi MANABE  Tatsuaki OKAMOTO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E99-A No:8
      Page(s):
    1591-1599

    This paper presents an efficient secure auction protocol for M+1st price auction. In our proposed protocol, a bidding price of a player is represented as a binary expression, while in the previous protocol it is represented as an integer. Thus, when the number of players is m and the bidding price is an integer up to p, compared to the complexity of the previous protocol which is a polynomial of m and p, the complexity of our protocol is a polynomial of m and log p. We apply the Boneh-Goh-Nissim encryption to the mix-and-match protocol to reduce the computation costs.

  • Radio Access Technologies for Fifth Generation Mobile Communications System: Review of Recent Research and Developments in Japan Open Access

    Hidekazu MURATA  Eiji OKAMOTO  Manabu MIKAMI  Akihiro OKAZAKI  Satoshi SUYAMA  Takamichi INOUE  Jun MASHINO  Tetsuya YAMAMOTO  Makoto TAROMARU  

     
    INVITED PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:8
      Page(s):
    1638-1647

    As the demand for higher transmission rates and spectral efficiency is steadily increasing, the research and development of novel mobile communication systems has gained momentum. This paper focuses on providing a comprehensive survey of research and development activities on fifth generation mobile communication systems in Japan. We try to survey a vast area of wireless communication systems and the developments that led to future 5G systems.

  • PPLN-Based Low-Noise In-Line Phase Sensitive Amplifier with Highly Sensitive Carrier-Recovery System

    Koji ENBUTSU  Takeshi UMEKI  Osamu TADANAGA  Masaki ASOBE  Hirokazu TAKENOUCHI  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E99-B No:8
      Page(s):
    1727-1733

    We propose a highly sensitive carrier-recovery system for in-line amplification for binary phase shift keying (BPSK) signals in a periodically poled LiNbO3 based phase sensitive amplifier (PSA). We applied a discrete two-stage second harmonic generation/difference frequency generation (SHG/DFG) parametric conversion scheme to enhance the sensitivity of the carrier recovery. Owing to this two-stage SHG/DFG scheme, the conversion efficiency of the seed light for the injection locking needed for the pump generation can be improved compared to that of the cascaded SHG/DFG scheme. The new discrete scheme might also prevent the SNR degradation of the seed light caused by the ASE from the booster EDFA compared with the previous system that used the cascaded scheme. This novel carrier-recovery system exhibits high sensitivity with the SNR of over 7.8dB of the seed light, while tapped signal power is as low as -50dBm, which is low enough for injection locking. The new in-line PSA with this carrier-recovery system exhibits high gain of over 11dB. Since we successfully obtained the high gain property, we tried multistage amplification taking into account practical use and achieved it with both a high gain of 20dB and a noise figure that is almost as low as the standard quantum limit of a PSA.

  • Array Correlation Matrix Element Properties and Their Application to Low-Cost DOA Estimation

    Koichi ICHIGE  Yu IWABUCHI  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:8
      Page(s):
    1859-1866

    We study the correlation matrix element properties in array signal processing and apply them to a Direction-Of-Arrival (DOA) estimation problem of coherent or highly-correlated sources for a Uniform Linear Array (ULA). The proposed algorithm is generally based on the relation between the elements of the array correlation matrix and does not need an eigendecomposition, iteration, or angular peak-search. The performance of the proposed method was evaluated through a computer simulation.

  • Threshold Relaxation and Holding Time Limitation Method for Accepting More General Calls under Emergency Trunk Reservation

    Kazuki TANABE  Sumiko MIYATA  Ken-ichi BABA  Katsunori YAMAOKA  

     
    PAPER

      Vol:
    E99-A No:8
      Page(s):
    1518-1528

    In emergency situations, telecommunication networks become congested due to large numbers of call requests. Also, some infrastructure breaks down, so undamaged communication resources must be utilized more efficiently. Therefore, several lines in telephone exchanges are generally reserved for emergency calls whose users communicate crucial information. The number of lines reserved for emergency calls is determined by a threshold, on a trunk reservation control method. To accept both required emergency calls and more general calls, the traffic intensity of arriving emergency calls should be estimated in advance, and a threshold should be configured so that the number of reserved lines becomes lower than the estimation. Moreover, we propose that the holding time for general calls should be positively limited. By guaranteeing the holding time sufficient for communicating essential information, holding time limitation reduces long-period calls so more general calls are accepted. In this paper, we propose a new CAC method to utilize undamaged communication resources more efficiently during emergencies. Our proposed method accepts more general calls by collaboratively relaxing the threshold of trunk reservation and limiting holding time of general calls. This method is targeted at not only the telephone exchange but also various systems on networks, e.g. base stations of the wireless network or SIP servers. With our method, the threshold is configured in consideration of the ratio of traffic intensities estimated in advance. We modeled the telephone exchange as a queueing loss system and calculated call-blocking rates of both emergency and general calls by using computer simulation. The comparison with the conventional holding time limitation method showed that our proposed method accepts the required number of emergency calls by appropriately relaxing the threshold, while suppressing the increase in call-blocking of general calls.

3001-3020hit(16314hit)