The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

7361-7380hit(16314hit)

  • Fingerprinting Codes for Multimedia Data against Averaging Attack

    Hideki YAGI  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    PAPER-Application

      Vol:
    E92-A No:1
      Page(s):
    207-216

    Code construction for digital fingerprinting, which is a copyright protection technique for multimedia, is considered. Digital fingerprinting should deter collusion attacks, where several fingerprinted copies of the same content are mixed to disturb their fingerprints. In this paper, we consider the averaging attack, which is known to be effective for multimedia fingerprinting with the spread spectrum technique. We propose new methods for constructing fingerprinting codes to increase the coding rate of conventional fingerprinting codes, while they guarantee to identify the same number of colluders. Due to the new fingerprinting codes, the system can deal with a larger number of users to supply digital contents.

  • SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks

    LeXuan HUNG  Sungyoung LEE  Young-Koo LEE  Heejo LEE  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E92-B No:1
      Page(s):
    131-142

    For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol -- Secure COodination-based Data dissEmination (SCODE) -- for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.

  • OFDMA Resource Allocation Based on Traffic Class-Oriented Optimization

    Nararat RUANGCHAIJATUPON  Yusheng JI  

     
    PAPER

      Vol:
    E92-B No:1
      Page(s):
    93-101

    Orthogonal Frequency Division Multiple Access (OFDMA) is the technique for the next generation wireless networks, whose enhanced capacity is to serve a combination of traffic with diverse QoS requirements. To realize this, the resource allocation scheme has to be carefully designed so that the instantaneous channel condition, QoS provision, and the network utilization are integrated. In this paper, we propose the resource allocation scheme for downlink traffic of 2 classes; guaranteed and non-guaranteed, having different traffic contracts. We provide guaranteed throughput for the guaranteed class by considering the cost incurred from serving this class. Then, we formulate the assignment problem with the objective of minimizing this cost. For the non-guaranteed class, we aim to maximize network utilization and to maintain throughput fairness, by employing Proportional Fairness (PF) utility function and emphasizing on the portion of network resource that the user received and the individual user's queue length. We use a heuristic approach to schedule users' data into the downlink subframe by exploiting multi-user multi-channel diversity to utilize system's bandwidth efficiently. Intensive simulation shows that our scheme differentiates classes of traffic and provides satisfied throughput, lower packet drop rate, and lower queuing delay to the guaranteed class, comparing with those of the non-guaranteed class. Furthermore, the results also show that the scheme is fair to users in the same class in both throughput and service time.

  • An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation

    Koji NUIDA  Satoshi FUJITSU  Manabu HAGIWARA  Hideki IMAI  Takashi KITAGAWA  Kazuto OGAWA  Hajime WATANABE  

     
    PAPER-Application

      Vol:
    E92-A No:1
      Page(s):
    197-206

    The code length of Tardos's collusion-secure fingerprint code is of theoretically minimal order with respect to the number of adversarial users (pirates). However, the constant factor should be further reduced for practical implementation. In this article, we improve the tracing algorithm of Tardos's code and propose a 2-secure and short random fingerprint code, which is secure against collusion attacks by two pirates. Our code length is significantly shorter than that of Tardos's code and its tracing error probability is practically small.

  • A Study on Temporal Dark Image Sticking in AC-PDP Using Vacuum-Sealing Method

    Choon-Sang PARK  Heung-Sik TAE  

     
    PAPER-Electronic Displays

      Vol:
    E92-C No:1
      Page(s):
    161-165

    Minimizing the residual impurity gases is a key factor for reducing temporal dark image sticking. Therefore, this paper uses a vacuum-sealing method that minimizes the residual impurity gases by enhancing the base vacuum level, and the resultant change in temporal dark image sticking is then examined in comparison to that with the conventional sealing method using 42-in. ac-PDPs with a high Xe (11%) content. As a result of monitoring the difference in the display luminance, infrared emission, and perceived luminance between the cells with and without temporal dark image sticking, the vacuum-sealing method is demonstrated to reduce temporal dark image sticking by decreasing the residual impurity gases and increasing the oxygen vacancy in the MgO layer. Furthermore, the use of a modified driving waveform along with the vacuum-sealing method is even more effective in reducing temporal dark image sticking.

  • GMPLS-Based Multiple Failure Recovery Employing Restoration Scheme Escalation in Optical Path Networks

    Yoshiaki SONE  Wataru IMAJUKU  Naohide NAGATSU  Masahiko JINNO  

     
    PAPER

      Vol:
    E92-B No:1
      Page(s):
    46-58

    Bolstering survivable backbone networks against multiple failures is becoming a common concern among telecom companies that need to continue services even when disasters occur. This paper presents a multiple-failure recovery scheme that considers the operation and management of optical paths. The presented scheme employs scheme escalation from pre-planned restoration to full rerouting. First, the survivability of this scheme against multiple failures is evaluated considering operational constraints such as route selection, resource allocation, and the recovery order of failed paths. The evaluation results show that scheme escalation provides a high level of survivability even under operational constraints, and this paper quantitatively clarifies the impact of these various operational constraints. In addition, the fundamental functions of the scheme escalation are implemented in the Generalized Multi-Protocol Label Switching control plane and verified in an optical-cross-connect-based network.

  • Joint Stream-Wise THP Transceiver Design for the Multiuser MIMO Downlink

    Wei MIAO  Xiang CHEN  Ming ZHAO  Shidong ZHOU  Jing WANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:1
      Page(s):
    209-218

    This paper addresses the problem of joint transceiver design for Tomlinson-Harashima Precoding (THP) in the multiuser multiple-input-multiple-output (MIMO) downlink under both perfect and imperfect channel state information at the transmitter (CSIT). For the case of perfect CSIT, we differ from the previous work by performing stream-wise (both inter-user and intra-user) interference pre-cancelation at the transmitter. A minimum total mean square error (MT-MSE) criterion is used to formulate our optimization problem. By some convex analysis of the problem, we obtain the necessary conditions for the optimal solution. An iterative algorithm is proposed to handle this problem and its convergence is proved. Then we extend our designed algorithm to the robust version by minimizing the conditional expectation of the T-MSE under imperfect CSIT. Simulation results are given to verify the efficacy of our proposed schemes and to show their superiorities over existing MMSE-based THP schemes.

  • Near-Collision Attacks on MD4: Applied to MD4-Based Protocols

    Lei WANG  Kazuo OHTA  Noboru KUNIHIRO  

     
    PAPER-Hash Function

      Vol:
    E92-A No:1
      Page(s):
    76-86

    The most widely used hash functions from MD4 family have been broken, which lead to a public competition on designing new hash functions held by NIST. This paper focuses on one concept called near-collision resistance: computationally difficult to find a pair of messages with hash values differing in only few bits, which new hash functions should satisfy. In this paper, we will give a model of near-collisions on MD4, and apply it to attack protocols including HMAC/NMAC-MD4 and MD4(Password||Challenge). Our new outer-key recovery attacks on HMAC/NMAC-MD4 has a complexity of 272 online queries and 277 MD4 computations, while previous result was 288 online queries and 295 MD4 computations. Our attack on MD4(Password||Challenge) can recover 16 password characters with a complexity of 237 online queries and 221 MD4 computations, which is the first approach to attack such protocols.

  • VLSI Implementation of a VC-1 Main Profile Decoder for HD Video Applications

    Jinhyun CHO  Doowon LEE  Sangyong YOON  Sanggyu PARK  Soo-Ik CHAE  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E92-A No:1
      Page(s):
    279-290

    In this paper, we present a high-performance VC-1 main-profile decoder for high-definition (HD) video applications, which can decode HD 720p video streams with 30 fps at 80 MHz. We implemented the decoder with a one-poly eight-metal 0.13 µm CMOS process, which contains about 261,900 logic gates and on-chip memories of 13.9 KB SRAM and 13.1 KB ROM and occupies an area of about 5.1 mm2. In designing the VC-1 decoder, we used a template-based SoC design flow, with which we performed the design space exploration of the decoder by trying various configurations of communication channels. Moreover, we also describe architectures of the computation blocks optimized to satisfy the requirements of VC-1 HD applications.

  • A Multiplication Algorithm in Fpm Such That p>m with a Special Class of Gauss Period Normal Bases

    Hidehiro KATO  Yasuyuki NOGAMI  Tomoki YOSHIDA  Yoshitaka MORIKAWA  

     
    PAPER-Mathematics

      Vol:
    E92-A No:1
      Page(s):
    173-181

    In this paper, a multiplication algorithm in extension field Fpm is proposed. Different from the previous works, the proposed algorithm can be applied for an arbitrary pair of characteristic p and extension degree m only except for the case when 4p divides m(p-1) and m is an even number. As written in the title, when p>m, 4p does not divide m(p-1). The proposed algorithm is derived by modifying cyclic vector multiplication algorithm (CVMA). We adopt a special class of Gauss period normal bases. At first in this paper, it is formulated as an algorithm and the calculation cost of the modified algorithm is evaluated. Then, compared to those of the previous works, some experimental results are shown. Finally, it is shown that the proposed algorithm is sufficient practical when extension degree m is small.

  • The Vacuum Impedance and Unit Systems

    Masao KITANO  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    3-8

    In the electromagnetic theory, the vacuum impedance Z0 is a universal constant, which is as important as the velocity of light c0 in vacuum. Unfortunately, however, its significance is not appreciated so well and sometimes the presence itself is ignored. It is partly because in the Gaussian system of units, which has widely been used for long time, Z0 is a dimensionless constant and of unit magnitude. In this paper, we clarify that Z0 is a fundamental parameter in electromagnetism and plays major roles in the following scenes: reorganizing the structure of the electromagnetic formula in reference to the relativity; renormalizing the quantities toward natural unit systems starting from the SI unit system; and defining the magnitudes of electromagnetic units.

  • TE Plane Wave Reflection and Transmission from a Two-Dimensional Random Slab

    Yasuhiko TAMURA  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    77-84

    This paper reexamines reflection and transmission of a TE plane wave from a two-dimensional random slab discussed in the previous paper [IEICE Trans. Electron., Vol.E79-C, no.10, pp.1327-1333, October 1996] by means of the stochastic functional approach with the multiply renormalizing approximation. A random wavefield representation is explicitly shown in terms of a Wiener-Hermite expansion. The first-order incoherent scattering cross section and the optical theorem are numerically calculated. Enhanced scattering as gentle peaks or dips on the angular distribution of the incoherent scattering is reconfirmed in the directions of reflection and backscattering, and is newly found in the directions of forward scattering and 'symmetrical forward scattering.' The mechanism of enhanced scattering is deeply discussed.

  • Interference Canceller Based on Cycle-and-Add Property for Single User Detection in DS-CDMA

    Ranga HETTIARACHCHI  Mitsuo YOKOYAMA  Hideyuki UEHARA  Takashi OHIRA  

     
    PAPER-Spread Spectrum Technologies and Applications

      Vol:
    E92-A No:1
      Page(s):
    298-306

    In this paper, performance of a novel interference cancellation technique for the single user detection in a direct-sequence code-division multiple access (DS-CDMA) system has been investigated. This new algorithm is based on the Cycle-and-Add property of PN (Pseudorandom Noise) sequences and can be applied for both synchronous and asynchronous systems. The proposed strategy provides a simple method that can delete interference signals one by one in spite of the power levels of interferences. Therefore, it is possible to overcome the near-far problem (NFP) in a successive manner without using transmit power control (TPC) techniques. The validity of the proposed procedure is corroborated by computer simulations in additive white Gaussian noise (AWGN) and frequency-nonselective fading channels. Performance results indicate that the proposed receiver outperforms the conventional receiver and, in many cases, it does so with a considerable gain.

  • Symbol Error Rate of Cooperative Transmission Using OSTBC

    Qinghai YANG  Yingji ZHONG  Kyung Sup KWAK  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:1
      Page(s):
    338-341

    We investigate the symbol error rate (SER) of the cooperative transmission with the decode-and-forward relay protocol under Rayleigh fading channels. The technique of orthogonal space-time block coding (OSTBC) is applied at the links source-relay, source-destination and relay-destination. A closed-form SER expression is derived. Simulation results demonstrate the theoretical solutions.

  • PO with Modified Surface-Normal Vectors for RCS Calculation of Scatterers with Edges and Wedges

    Nobutaka OMAKI  Tetsu SHIJO  Makoto ANDO  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    33-39

    We have proposed a unique and simple modification to the definition of surface-normal vectors in Physical optics (PO). The modified surface-normal vectors are so defined as that the reflection law is satisfied at every point on the surface. The PO with currents defined by this new surface-normal vector has the enhanced accuracy for the edged scatterers to the level of Geometrical Theory of Diffraction (GTD), though it dispenses with the knowledge of high frequency asymptotic techniques. In this paper, firstly, the remarkable simplicity and the high accuracy of the modified PO as applied to the analysis of Radar Cross Section (RCS) is demonstrated for 2 dimensional problems. Noteworthy is that the scattering not only from edge but also from wedge is accurately predicted. This fringe advantage is confirmed asymptotically by comparing the edge and wedge diffraction coefficients of GTD. Finally, the applicability for three dimensional cube is also demonstrated by comparison with experimental data.

  • 4-Branch Power Splitters Designed by Ideal Field Method

    Tetsuro YABU  Masahiro GESHIRO  Masaharu OHASHI  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    55-62

    The design of multi-branch optical waveguides having 3 or more output ports is not so easy as that of 2-output branches because some innovative geometry is required to realize equal power splitting. All previous studies take the same approach in which they first introduce innovative geometries and then adjust the structural parameters for equal splitting. On the other hand, we propose quite a different method where distribution of refractive index is calculated from an ideal field distribution which is synthesized artificially. The method is extended to design 3-D 4-branch waveguides. It is exemplified that 4-branch waveguides with low-loss and equal splitting can be realized by the proposed method.

  • Analysis and Design of Sub-Threshold R-MOSFET Tunable Resistor

    Apisak WORAPISHET  Phanumas KHUMSAT  

     
    PAPER-Electronic Circuits

      Vol:
    E92-C No:1
      Page(s):
    135-143

    The sub-threshold R-MOSFET resistor structure which enables tuning range extension below the threshold voltage in the MOSFET with moderate to weak inversion operation is analyzed in detail. The principal operation of the sub-threshold resistor is briefly described. The analysis of its characteristic based on approximations of a general MOS equation valid for all regions is given along with discussion on design implication and consideration. Experiments and simulations are provided to validate the theoretical analysis and design, and to verify the feasibility at a supply voltage as low as 0.5 V using a low-threshold devices in a 1.8-V 0.18 µm CMOS process.

  • Development of an Enterprise-Wide Yield Management System Using Critical Area Analysis for High-Product-Mix Semiconductor Manufacturing

    Yuichi HAMAMURA  Chizu MATSUMOTO  Yoshiyuki TSUNODA  Koji KAMODA  Yoshio IWATA  Kenji KANAMITSU  Daisuke FUJIKI  Fujihiko KOJIKA  Hiromi FUJITA  Yasuo NAKAGAWA  Shun'ichi KANEKO  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E92-C No:1
      Page(s):
    144-152

    To improve product yield in high-product-mix semiconductor manufacturing, it is important to estimate the systematic yield inherent to each product and to extract problematic products that have low systematic yields. We propose a simplified and available yield model using a critical area analysis. This model enables the extraction of problematic products by the relationship between actual yields and the short sensitivities of the products. Furthermore, we present an enterprise-wide yield management system using this model and some useful applications. As a result, the system increases the efficiency of the yield management and enhancement dramatically.

  • Analysis and Uniform Design of a Single-Layer Slotted Waveguide Array Antenna with Baffles

    Takehito SUZUKI  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Devices/Circuits for Communications

      Vol:
    E92-B No:1
      Page(s):
    150-158

    This paper presents the formulation for the evaluation of external coupling in the alternating-phase feed single-layer slotted waveguide array antenna with baffles by using the Spectrum of Two-Dimensional Solutions (S2DS) method. A one-dimensional slot array is extracted from the array by assuming the periodicity in transversal direction and introducing the perfect electric conductors in the external region. The uniform excitation over the finite array is synthesized iteratively to demonstrate the fast and accurate results by S2DS. A unit design model with the baffles is introduced to determine the initial parameters of the slot pair which accelerate the iteration. Experiment at 25.3 GHz demonstrates good uniformity of the aperture field distribution as well as the effects of the baffles. The directivity is 32.7 dB which corresponds to the aperture efficiency 90.5% and the reflection is below -15.0 dB over 1.3 GHz.

  • A Simple Expression of BER Performance in COFDM Systems over Fading Channels

    Fumihito SASAMORI  Yuya ISHIKAWA  Shiro HANDA  Shinjiro OSHITA  

     
    LETTER-Communication Theory and Signals

      Vol:
    E92-A No:1
      Page(s):
    332-336

    Both adaptive modulation and diversity combining are attractive techniques to combat fading and these two can be applicable to each digital-modulated symbol in OFDM transmission. In this letter, aiming to combat severe fading more effectively than the adaptive modulation, we theoretically analyze the benefit of a frequency diversity scheme within one OFDM symbol, which is a simple kind of coded OFDM (COFDM) based on IEEE 802.16 protocols. A simple closed form equation of bit error rate (BER) is derived, and then the advantages of correlated diversity gain and interference suppression by the diversity scheme are verified by both theoretical analysis and Monte Carlo simulation.

7361-7380hit(16314hit)