The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SiON(4624hit)

1761-1780hit(4624hit)

  • Scalable Packet Classification with Hash Tables

    Pi-Chung WANG  

     
    LETTER

      Vol:
    E93-B No:5
      Page(s):
    1155-1158

    In the last decade, the technique of packet classification has been widely deployed in various network devices, including routers, firewalls and network intrusion detection systems. In this work, we improve the performance of packet classification by using multiple hash tables. The existing hash-based algorithms have superior scalability with respect to the required space; however, their search performance may not be comparable to other algorithms. To improve the search performance, we propose a tuple reordering algorithm to minimize the number of accessed hash tables with the aid of bitmaps. We also use pre-computation to ensure the accuracy of our search procedure. Performance evaluation based on both real and synthetic filter databases shows that our scheme is effective and scalable and the pre-computation cost is moderate.

  • A Predictive Block Based DC Offset for H.264/AVC Video Coding

    Jie JIA  Daeil YOON  Hae Kwang KIM  

     
    LETTER-Digital Signal Processing

      Vol:
    E93-A No:5
      Page(s):
    976-980

    Video coding standard H.264/AVC employs transform coding to explore spatial correlation in inter picture prediction residue. This paper presents a block based DC offset to further explore the correlation in spatially neighboring blocks and provides H.264/AVC an enhanced coding efficiency performance. The proposed method applies DC offset to inter picture prediction residue, and encodes the offset compensated residual signal. The DC offset is derived from reconstructed residue in neighboring blocks. No additional bits are required for the DC offset representation. Simulation results report that the proposed method yields an average of 2.67% bit rate reduction for high resolution video over the H.264 baseline profile.

  • Kernel Based Image Registration Incorporating with Both Feature and Intensity Matching

    Quan MIAO  Guijin WANG  Xinggang LIN  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E93-D No:5
      Page(s):
    1317-1320

    Image sequence registration has attracted increasing attention due to its significance in image processing and computer vision. In this paper, we put forward a new kernel based image registration approach, combining both feature-based and intensity-based methods. The proposed algorithm consists of two steps. The first step utilizes feature points to roughly estimate a motion parameter between successive frames; the second step applies our kernel based idea to align all the frames to the reference frame (typically the first frame). Experimental results using both synthetic and real image sequences demonstrate that our approach can automatically register all the image frames and be robust against illumination change, occlusion and image noise.

  • Demultiplexing Property Owing to a Composite Right/Left-Handed Transmission Line with Leaky Wave Radiation toward Functional Wireless Interconnects

    Sadaharu ITO  Michihiko SUHARA  

     
    PAPER-Analog/RF Devices

      Vol:
    E93-C No:5
      Page(s):
    619-624

    A composite right/left-handed (CRLH) transmission line with demultiplexing property is proposed towards short-range functional wireless interconnects. The CRLH line is designed by analyzing dispersion relation of the microstrip line having a split-ring and a double-stub structure to realize frequency selective properties for leaky wave radiation. A prototype device is fabricated and estimated to study feasibility of the demultiplexing operation around ten GHz.

  • A Low-Voltage High-Gain Quadrature Up-Conversion 5 GHz CMOS RF Mixer

    Wan-Rone LIOU  Mei-Ling YEH  Sheng-Hing KUO  Yao-Chain LIN  

     
    PAPER-Electronic Circuits

      Vol:
    E93-C No:5
      Page(s):
    662-669

    A low-voltage quadrature up-conversion CMOS mixer for 5-GHz wireless communication applications is designed with a TSMC 0.18-µm process. The fold-switching technique is used to implement the low-voltage double balanced quadrature mixer. A miniature lumped-element microwave broadband rat-race hybrid and RLC shift network are used for the local oscillator and the intermediate frequency port design, respectively. The measured results demonstrate that the mixer can reach a high conversion gain, a low noise figure (NF), and a high linearity. The mixer exhibits improvement in noise, conversion gain, and image rejection. The mixer shows a conversion gain of 16 dB, a noise figure of 12.8 dB, an image rejection of 45 dB, while dissipating 15.5 mW for an operating voltage at 1 V.

  • Predictive Closed-Loop Power Control for Delay-Prone Burst Transmission Systems in Rayleigh Fading

    Sangho CHOE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:5
      Page(s):
    1280-1283

    We present a predictive closed-loop power control scheme for delay-prone burst transmission systems. The scheme has a sample-by-sample predictor compensating burst delay and a built-in channel encoder reducing power control command bit error.

  • Kyushu-TCP: Improving Fairness of High-Speed Transport Protocols

    Suguru YOSHIMIZU  Hiroyuki KOGA  Katsushi KOUYAMA  Masayoshi SHIMAMURA  Kazumi KUMAZOE  Masato TSURU  

     
    PAPER

      Vol:
    E93-B No:5
      Page(s):
    1104-1112

    With the emergence of bandwidth-greedy application services, high-speed transport protocols are expected to effectively and aggressively use large amounts of bandwidth in current broadband and multimedia networks. However, when high-speed transport protocols compete with other standard TCP flows, they can occupy most of the available bandwidth leading to disruption of service. To deploy high-speed transport protocols on the Internet, such unfair situations must be improved. In this paper, therefore, we propose a method to improve fairness, called Kyushu-TCP (KTCP), which introduces a non-aggressive period in the congestion avoidance phase to give other standard TCP flows more chances of increasing their transmission rates. This method improves fairness in terms of the throughput by estimating the stably available bandwidth-delay product and adjusting its transmission rate based on this estimation. We show the effectiveness of the proposed method through simulations.

  • Acoustic Feature Transformation Based on Discriminant Analysis Preserving Local Structure for Speech Recognition

    Makoto SAKAI  Norihide KITAOKA  Kazuya TAKEDA  

     
    PAPER-Speech and Hearing

      Vol:
    E93-D No:5
      Page(s):
    1244-1252

    To improve speech recognition performance, feature transformation based on discriminant analysis has been widely used to reduce the redundant dimensions of acoustic features. Linear discriminant analysis (LDA) and heteroscedastic discriminant analysis (HDA) are often used for this purpose, and a generalization method for LDA and HDA, called power LDA (PLDA), has been proposed. However, these methods may result in an unexpected dimensionality reduction for multimodal data. It is important to preserve the local structure of the data when reducing the dimensionality of multimodal data. In this paper we introduce two methods, locality-preserving HDA and locality-preserving PLDA, to reduce dimensionality of multimodal data appropriately. We also propose an approximate calculation scheme to calculate sub-optimal projections rapidly. Experimental results show that the locality-preserving methods yield better performance than the traditional ones in speech recognition.

  • Study of a PMD Tolerance Extension by InP HBT Analog EDC IC without Adaptive Control in 43G DQPSK Transmission

    Toshihiro ITOH  Kimikazu SANO  Hiroyuki FUKUYAMA  Koichi MURATA  

     
    PAPER-Compound Semiconductor Devices

      Vol:
    E93-C No:5
      Page(s):
    573-578

    We experimentally studied the polarization mode dispersion (PMD) tolerance of an feed-forward equalizer (FFE) electronic dispersion compensation (EDC) IC in the absence of adaptive control, in 43-Gbit/s RZ-DQPSK transmission. Using a 3-tap FFE IC composed of InP HBTs, differential group delay (DGD) tolerance at a 2-dB Q penalty is shown to be extended from 25 ps to up to 29 ps. When a polarization scrambler is used, the tolerance is further extended to 31 ps. This value is close to the tolerance obtained with adaptive control, without a polarization scrambler.

  • Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks

    Mitsuaki AKIYAMA  Makoto IWAMURA  Yuhei KAWAKOYA  Kazufumi AOKI  Mitsutaka ITOH  

     
    PAPER

      Vol:
    E93-B No:5
      Page(s):
    1131-1139

    Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser vulnerabilities is increasing, and a clarification of their methods and countermeasures is urgently needed. In this paper, we introduce the design and implementation of a new client honeypot for drive-by-download attacks that has the capacity to detect and investigate a variety of malicious web sites. On the basis of the problems of existing client honeypots, we enumerate the requirements of a client honeypot: 1) detection accuracy and variety, 2) collection variety, 3) performance efficiency, and 4) safety and stability. We improve our system with regard to these requirements. The key features of our developed system are stepwise detection focusing on exploit phases, multiple crawler processing, tracking of malware distribution networks, and malware infection prevention. Our evaluation of our developed system in a laboratory experiment and field experiment indicated that its detection variety and crawling performance are higher than those of existing client honeypots. In addition, our system is able to collect information for countermeasures and is secure and stable for continuous operation. We conclude that our system can investigate malicious web sites comprehensively and support countermeasures.

  • Complexity Scalability Design in the Internet Low Bit Rate Codec (iLBC) for Speech Coding

    Fu-Kun CHEN  Kuo-Bao KUO  

     
    PAPER-Speech and Hearing

      Vol:
    E93-D No:5
      Page(s):
    1238-1243

    Differing from the long-term prediction used in the modern speech codec, the standard of the internet low bit rate codec (iLBC) independently encodes the residual of the linear predictive coding (LPC) frame by frame. In this paper, a complexity scalability design is proposed for the coding of the dynamic codebook search in the iLBC speech codec. In addition, a trade-off between the computational complexity and the speech quality can be achieved by dynamically setting the parameter of the proposed approach. Simulation results show that the computational complexity can be effectively reduced with imperceptible degradation of the speech quality.

  • On-Chip Charged Device Model ESD Protection Design Method Using Very Fast Transmission Line Pulse System for RF ICs

    Jae-Young PARK  Jong-Kyu SONG  Dae-Woo KIM  Chang-Soo JANG  Won-Young JUNG  Taek-Soo KIM  

     
    PAPER-Analog/RF Devices

      Vol:
    E93-C No:5
      Page(s):
    625-630

    An on-chip Charged Device Model (CDM) ESD protection method for RF ICs is proposed in a 0.13 µm RF process and evaluated by using very fast Transmission Line Pulse (vf-TLP) system. Key design parameters such as triggering voltage (Vt1) and the oxide breakdown voltage from the vf-TLP measurement are used to design input ESD protection circuits for a RF test chip. The characterization and the behavior of a Low Voltage Triggered Silicon Controlled Rectifier (SCR) which used for ESD protection clamp under vf-TLP measurements are also reported. The results measured by vf-TLP system showed that the triggering voltage decreased and the second breakdown current increased in comparison with the results measured by a standard 100 ns TLP system. From the HBM/ CDM testing, the RF test chip successfully met the requested RF ESD withstand level, HBM 1 kV, MM 100 V and CDM 500 V.

  • New General Constructions of LCZ Sequence Sets Based on Interleaving Technique and Affine Transformations

    Xuan ZHANG  Qiaoyan WEN  Jie ZHANG  

     
    PAPER-Communication Theory and Signals

      Vol:
    E93-A No:5
      Page(s):
    942-949

    In this paper, we propose four new general constructions of LCZ/ZCZ sequence sets based on interleaving technique and affine transformations. A larger family of LCZ/ZCZ sequence sets with longer period are generated by these constructions, which are more flexible among the selection of the alphabet size, the period of the sequences and the length of LCZ/ZCZ, compared with those generated by the known constructions. Especially, two families of the newly constructed sequences can achieve or almost achieve the theoretic bound.

  • Importance of the Electronic State on the Electrode in Electron Tunneling Processes between the Electrode and the Quantum Dot

    Masakazu MURAGUCHI  Yukihiro TAKADA  Shintaro NOMURA  Tetsuo ENDOH  Kenji SHIRAISHI  

     
    PAPER-Emerging Devices

      Vol:
    E93-C No:5
      Page(s):
    563-568

    We have revealed that the electronic states in the electrodes give a significant influence to the electron transport in nano-electronic devices. We have theoretically investigated the time-evolution of electron transport from a two-dimensional electron gas (2DEG) to a quantum dot (QD), where 2DEG represents the electrode in the nano-electronic devices. We clearly showed that the coherent electron transport is remarkably modified depending on the initial electronic state in the 2DEG. The electron transport from the 2DEG to the QD is strongly enhanced, when the initial state of the electron in the 2DEG is localized below the QD. We have proposed that controlling the electronic state in the electrodes could realize a new concept device function without modifying the electrode structures; that achieves a new controllable state in future nano-electronic devices.

  • Low-Voltage, Wide-Common-Mode-Range and High-CMRR CMOS OTA

    Hisashi TANAKA  Koichi TÁNNO  Ryota MIWA  Hiroki TAMURA  Kenji MURAO  

     
    PAPER-Analog Signal Processing

      Vol:
    E93-A No:5
      Page(s):
    936-941

    In this paper, a low-voltage, wide-common-mode-range and high-CMRR OTA is presented. The proposed OTA consists of two circuit blocks; one is the input stage and operates as a differential level shifter, and the other is a highly linear output stage. Furthermore, the OTA can be operated in both weak and strong inversion regions. The proposed OTA is evaluated through Star-HSPICE with 0.18 µm CMOS device parameters (LEVEL53). Simulation results demonstrate a CMRR of 158 dB, a common-mode-input-range of 65 mV to 720 mV and a current consumption of 1.2 µA when VDD=0.8 V.

  • On Best-Effort Packet Reordering for Mitigating the Effects of Out-of-Order Delivery on Unmodified TCP

    John Russell LANE  Akihiro NAKAO  

     
    PAPER

      Vol:
    E93-B No:5
      Page(s):
    1095-1103

    Multipath routing and the ability to simultaneously use multiple network paths has long been proposed as a means for meeting the reliability and performance improvement goals of a next generation Internet. However, its use causes out-of-order packet delivery, which is well known to hinder TCP performance. While next-generation transport protocols will no doubt better cope with this phenomenon, a complete switch to these new protocols cannot be made on all devices "overnight"; the reality is that we will be forced to continue using TCP on such multipath networks well after deployment of a future Internet is complete. In this paper, we investigate the use of best-effort packet reordering -- an optional network layer service for improving the performance of any TCP session in the presence of out-of-order packet delivery. Such a service holds the promise of allowing unmodified TCP to take advantage of the reliability and performance gains offered by a future multipath-enabled Internet without suffering the adverse performance effects commonly associated with out-of-order packet delivery. Our experiments test the performance of two common TCP variants under packet dispersion with differing numbers of paths and amounts of inter-path latency variance. They were conducted using multipath network and packet reorderer implementations implemented within the Emulab testbed. Our results demonstrate that a simple best-effort reordering service can insulate TCP from the type of reordering that might be expected from use of packet dispersion over disjoint paths in a wide-area network, and is capable of providing significant performance benefits with few ill side-effects.

  • Adaptive Maximum Power Point Tracking Algorithm for Photovoltaic Power Systems

    Chang Wook AHN  Ju Yeop CHOI  Dong-Ha LEE  Jinung AN  

     
    LETTER-Energy in Electronics Communications

      Vol:
    E93-B No:5
      Page(s):
    1334-1337

    This paper presents an adaptive maximum power point tracking (MPPT) algorithm. The aim is to dynamically adjust the step length for updating duty ratio (or operating voltage) so as to make full utilization of the output power of photovoltaic (PV) systems, even under the rapidly changing atmospheric conditions. To this end, the average slope in terms of voltage and power is exploited for reducing the harmful effect of noise and error (incurred in measurement or quantization) on the slope. Also, a statistical decision-making scheme is employed for reliably deciding the time instant at which atmospheric conditions actually change. Empirical study has adduced grounds for its dominance over existing references.

  • Group Testing Based Detection of Web Service DDoS Attackers

    Dalia NASHAT  Xiaohong JIANG  Michitaka KAMEYAMA  

     
    PAPER

      Vol:
    E93-B No:5
      Page(s):
    1113-1121

    The Distributed Denial of Service attack (DDoS) is one of the major threats to network security that exhausts network bandwidth and resources. Recently, an efficient approach Live Baiting was proposed for detecting the identities of DDoS attackers in web service using low state overhead without requiring either the models of legitimate requests nor anomalous behavior. However, Live Baiting has two limitations. First, the detection algorithm adopted in Live Baiting starts with a suspects list containing all clients, which leads to a high false positive probability especially for large web service with a huge number of clients. Second, Live Baiting adopts a fixed threshold based on the expected number of requests in each bucket during the detection interval without the consideration of daily and weekly traffic variations. In order to address the above limitations, we first distinguish the clients activities (Active and Non-Active clients during the detection interval) in the detection process and then further propose a new adaptive threshold based on the Change Point Detection method, such that we can improve the false positive probability and avoid the dependence of detection on sites and access patterns. Extensive trace-driven simulation has been conducted on real Web trace to demonstrate the detection efficiency of the proposed scheme in comparison with the Live Baiting detection scheme.

  • Access Load Balancing with Analogy to Thermal Diffusion for Dynamic P2P File-Sharing Environments

    Masanori TAKAOKA  Masato UCHIDA  Kei OHNISHI  Yuji OIE  

     
    PAPER

      Vol:
    E93-B No:5
      Page(s):
    1140-1150

    In this paper, we propose a file replication method to achieve load balancing in terms of write access to storage device ("write storage access load balancing" for short) in unstructured peer-to-peer (P2P) file-sharing networks in which the popularity trend of queried files varies dynamically. The proposed method uses a write storage access ratio as a load balance index value in order to stabilize dynamic P2P file-sharing environments adaptively. In the proposed method, each peer autonomously controls the file replication ratio, which is defined as a probability to create the replica of the file in order to uniform write storage access loads in the similar way to thermal diffusion phenomena. Theoretical analysis results show that the behavior of the proposed method actually has an analogy to a thermal diffusion equation. In addition, simulation results reveal that the proposed method has an ability to realize write storage access load balancing in the dynamic P2P file-sharing environments.

  • Theoretical Analysis of Density Ratio Estimation

    Takafumi KANAMORI  Taiji SUZUKI  Masashi SUGIYAMA  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E93-A No:4
      Page(s):
    787-798

    Density ratio estimation has gathered a great deal of attention recently since it can be used for various data processing tasks. In this paper, we consider three methods of density ratio estimation: (A) the numerator and denominator densities are separately estimated and then the ratio of the estimated densities is computed, (B) a logistic regression classifier discriminating denominator samples from numerator samples is learned and then the ratio of the posterior probabilities is computed, and (C) the density ratio function is directly modeled and learned by minimizing the empirical Kullback-Leibler divergence. We first prove that when the numerator and denominator densities are known to be members of the exponential family, (A) is better than (B) and (B) is better than (C). Then we show that once the model assumption is violated, (C) is better than (A) and (B). Thus in practical situations where no exact model is available, (C) would be the most promising approach to density ratio estimation.

1761-1780hit(4624hit)