The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

2681-2700hit(22683hit)

  • Search-Based Concolic Execution for SW Vulnerability Discovery

    Rustamov FAYOZBEK  Minjun CHOI  Joobeom YUN  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2018/07/02
      Vol:
    E101-D No:10
      Page(s):
    2526-2529

    Huge amounts of software appear nowadays. The more the number of software increases, the more increased software vulnerabilities are. Although some automatic methods have been proposed in order to detect and remove software vulnerabilities, they still require a lot of time so they have a limitation in the real world. To solve this problem, we propose BugHunter which automatically tests a binary file compiled with a C++ compiler. It searches for unsafe API calls and automatically executes to the program block that have an unsafe API call. Also, we showed that BugHunter is more efficient than angr through experiments. As a result, BugHunter is very helpful to find a software vulnerability in a short time.

  • Flexible and Printable Phase Shifter with Polymer Actuator for 12-GHz Band

    Fumio SATO  Michio YOKOYAMA  Yudai USAMI  Kentaro YAZAWA  Takao KUKI  Shizuo TOKITO  

     
    PAPER

      Vol:
    E101-C No:10
      Page(s):
    767-774

    The authors have proposed a new type of flexible and printable 12GHz-band phase shifter using polymer actuator for the first time. Polymer bending actuator was used as a termination device of a reflection-type 3-dB, 90° hybrid coupler as the phase-shift control unit which controls the electrical length of the waveguide for microwave signals by the applied bias voltage. The microstrip line circuit of the device has been fabricated using low-cost screen printing method. Polymer bending actuator having three-layer stacking structure, in which an ionic liquid electrolyte layer is sandwiched with two conductive network composite layers, was formed by wet processes. The authors have confirmed that the phase shift could be controlled in analog by low driving voltages of 2-7 V for the actuator with a insertion loss of 2.73 dB. This phase shifter can be integrated with flexible patch antenna and the current flexible polymer electronics devices such as transistors.

  • Projection Algorithm-Based Dynamic Surface Control of Dual-Motor Driving Servo System with Backlash Nonlinearity

    Haibo ZHAO  Chengguang WANG  

     
    PAPER-Systems and Control

      Vol:
    E101-A No:10
      Page(s):
    1646-1657

    Dual-motor driving servo systems are widely used in many military and civil fields. Since backlash nonlinearity affects the dynamic performance and steady-state tracking accuracy of these systems, it is necessary to study a control strategy to reduce its adverse effects. We first establish the state-space model of a system. To facilitate the design of the controller, we simplify the model based on the state-space model. Then, we design an adaptive controller combining a projection algorithm with dynamic surface control applied to a dual-motor driving servo system, which we believe to be the first, and analyze its stability. Simulation results show that projection algorithm-based dynamic surface control has smaller tracking error, faster tracking speed, and better robustness and stability than mere dynamic surface control. Finally, the experimental analysis validates the effectiveness of the proposed control algorithm.

  • On Correction-Based Iterative Methods for Eigenvalue Problems

    Takafumi MIYATA  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E101-A No:10
      Page(s):
    1668-1675

    The Jacobi-Davidson method and the Riccati method for eigenvalue problems are studied. In the methods, one has to solve a nonlinear equation called the correction equation per iteration, and the difference between the methods comes from how to solve the equation. In the Jacobi-Davidson/Riccati method the correction equation is solved with/without linearization. In the literature, avoiding the linearization is known as an improvement to get a better solution of the equation and bring the faster convergence. In fact, the Riccati method showed superior convergence behavior for some problems. Nevertheless the advantage of the Riccati method is still unclear, because the correction equation is solved not exactly but with low accuracy. In this paper, we analyzed the approximate solution of the correction equation and clarified the point that the Riccati method is specialized for computing particular solutions of eigenvalue problems. The result suggests that the two methods should be selectively used depending on target solutions. Our analysis was verified by numerical experiments.

  • Improving the Efficiency of a Reaction Attack on the QC-MDPC McEliece

    Thales BANDIERA PAIVA  Routo TERADA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E101-A No:10
      Page(s):
    1676-1686

    The QC-MDPC McEliece scheme was considered one of the most promising public key encryption schemes for efficient post-quantum secure encryption. As a variant of the McEliece scheme, it is based on the syndrome decoding problem, which is a hard problem from Coding Theory. Its key sizes are competitive with the ones of the widely used RSA cryptosystem, and it came with an apparently strong security reduction. For three years, the scheme has not suffered major threats, until the end of 2016, at the Asiacrypt, when Guo, Johansson, and Stankovski presented a reaction attack on the QC-MDPC that exploits one aspect that was not considered in the security reduction: the probability of a decoding failure to occur is lower when the secret key and the error used for encryption share certain properties. Recording the decoding failures, the attacker obtains information about the secret key and then use the information gathered to reconstruct the key. Guo et al. presented an algorithm for key reconstruction for which we can point two weaknesses. The first one is that it cannot deal with partial information about the secret key, resulting in the attacker having to send a large number of decoding challenges. The second one is that it does not scale well for higher security levels. To improve the attack, we propose a key reconstruction algorithm that runs faster than Guo's et al. algorithm, even using around 20% less interactions with the secret key holder than used by their algorithm, considering parameters suggested for 80 bits of security. It also has a lower asymptotic complexity which makes it scale much better for higher security parameters. The algorithm can be parallelized straightforwardly, which is not the case for the one by Guo et al.

  • Frequency Diversity Array MIMO Track-before-Detect in Coherent Repeated Interference

    Yuan ZHAO  Qi ZHANG  Bin TANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:10
      Page(s):
    1703-1707

    This letter proposes a track before detect scheme embedded in coherent repeated interference with the aid of frequency diversity array. The unmatched properties between echo and interferences are firstly discussed from both signal processing and data processing standpoints. Afterward, the interference suppression algorithm with virtual channel weighting at continue sampling stage is proposed, followed with kinematics constraint correspondingly. Further, the evaluations of the interference suppression performance are carried out through simulations which illustrate the feasibility and validity of the proposed algorithm.

  • Delay-Independent Design for Synchronization in Delayed-Coupled One-Dimensional Map Networks

    Yoshiki SUGITANI  Keiji KONISHI  

     
    LETTER-Nonlinear Problems

      Vol:
    E101-A No:10
      Page(s):
    1708-1712

    The present Letter proposes a design procedure for inducing synchronization in delayed-coupled one-dimensional map networks. We assume the practical situation where the connection delay, the detailed information about the network topology, and the number of the maps are unknown in advance. In such a situation, it is difficult to guarantee the stability of synchronization, since the local stability of a synchronized manifold is equivalent to that of a linear time-variant system. A sufficient condition in robust control theory helps us to derive a simple design procedure. The validity of our design procedure is numerically confirmed.

  • New Constructions of Zero-Difference Balanced Functions

    Zhibao LIN  Zhengqian LI  Pinhui KE  

     
    LETTER-Coding Theory

      Vol:
    E101-A No:10
      Page(s):
    1719-1723

    Zero-difference balanced (ZDB) functions, which have many applications in coding theory and sequence design, have received a lot of attention in recent years. In this letter, based on two known classes of ZDB functions, a new class of ZDB functions, which is defined on the group (Z2e-1×Zn,+) is presented, where e is a prime and n=p1m1p2m2…pkmk, pi is odd prime satisfying that e|(pi-1) for any 1≤i≤k . In the case of gcd(2e-1,n)=1, the new constructed ZDB functions are cyclic.

  • Self-Dual Cyclic Codes over Z4[u]/<u2-1> and Their Applications of Z4-Self-Dual Codes Construction

    Yun GAO   Jian GAO  Fang-Wei FU  

     
    LETTER-Coding Theory

      Vol:
    E101-A No:10
      Page(s):
    1724-1729

    In this paper, we study self-dual cyclic codes of length n over the ring R=Z4[u]/, where n is an odd positive integer. We define a new Gray map φ from R to Z42. It is a bijective map and maintains the self-duality. Furthermore, we give the structures of the generators of cyclic codes and self-dual cyclic codes of odd length n over the ring R. As an application, some self-dual codes of length 2n over Z4 are obtained.

  • Trajectory Estimation of the Players and Shuttlecock for the Broadcast Badminton Videos

    Yen-Ju LIN  Shiuh-Ku WENG  

     
    LETTER-Image

      Vol:
    E101-A No:10
      Page(s):
    1730-1734

    To track the players and shuttlecock in broadcast badminton video is a challenge, especially for tracking the small size and fast moving shuttlecock. There are many situations that may cause occlusion or misdetection. In this paper, a method is proposed to track players and shuttlecock in broadcast badminton videos. We apply adaptive Kalman filter, trajectory confidence estimation and confidence-update (Location Similarity and Relative Motion Relation, RMR) to improve the accuracy of object trajectories. In our experiments, the proposed method significantly enhance the tracking success rate of players and shuttlecock.

  • Incremental Environmental Monitoring for Revealing the Ecology of Endangered Fish Open Access

    Yoshinari SHIRAI  Yasue KISHINO  Shin MIZUTANI  Yutaka YANAGISAWA  Takayuki SUYAMA  Takuma OTSUKA  Tadao KITAGAWA  Futoshi NAYA  

     
    INVITED PAPER

      Pubricized:
    2018/04/13
      Vol:
    E101-B No:10
      Page(s):
    2070-2082

    This paper proposes a novel environmental monitoring strategy, incremental environmental monitoring, that enables scientists to reveal the ecology of wild animals in the field. We applied this strategy to the habitat of endangered freshwater fish. Specifically, we designed and implemented a network-based system using distributed sensors to continuously monitor and record the habitat of endangered fish. Moreover, we developed a set of analytical tools to exploit a variety of sensor data, including environmental time-series data such as amount of dissolved oxygen, as well as underwater video capturing the interaction of fish and their environment. We also describe the current state of monitoring the behavior and habitat of endangered fish and discuss solutions for making such environmental monitoring more efficient in the field.

  • Queueing Delay Analysis and Optimization of Statistical Data Aggregation and Transmission Systems

    Hideaki YOSHINO  Kenko OTA  Takefumi HIRAGURI  

     
    PAPER-Network

      Pubricized:
    2018/04/02
      Vol:
    E101-B No:10
      Page(s):
    2186-2195

    Data aggregation, which is the process of summarizing a large amount of data, is an effective method for saving limited communication resources, such as radio frequency and sensor-node energy. Packet aggregation in wireless LAN and sensed-data aggregation in wireless sensor networks are typical examples. We propose and analyze two queueing models of fundamental statistical data aggregation schemes: constant interval and constant aggregation number. We represent each aggregation scheme by a tandem queueing network model with a gate at the aggregation process and a single server queue at a transmission process. We analytically derive the stationary distribution and Laplace-Stieltjes transform of the system time for each aggregation and transmission process and of the total system time. We then numerically evaluate the stationary mean system time characteristics and clarify that each model has an optimal aggregation parameter (i.e., an optimal aggregation interval or optimal aggregation number), that minimizes the mean total system time. In addition, we derive the explicit optimal aggregation parameter for a D/M/1 transmission model with each aggregation scheme and clarify that it provides accurate approximation of that of each aggregation model. The optimal aggregation interval was determined by the transmission rate alone, while the optimal aggregation number was determined by the arrival and transmission rates alone with explicitly derived proportional constants. These results can provide a theoretical basis and a guideline for designing aggregation devices, such as IoT gateways.

  • On-Demand Data Gathering with a Drone-Based Mobile Sink in Wireless Sensor Networks Exploiting Wake-Up Receivers Open Access

    Hiroyuki YOMO  Akitoshi ASADA  Masato MIYATAKE  

     
    INVITED PAPER

      Pubricized:
    2018/04/13
      Vol:
    E101-B No:10
      Page(s):
    2094-2103

    The introduction of a drone-based mobile sink into wireless sensor networks (WSNs), which has flexible mobility to move to each sensor node and gather data with a single-hop transmission, makes cumbersome multi-hop transmissions unnecessary, thereby facilitating data gathering from widely-spread sensor nodes. However, each sensor node spends significant amount of energy during their idle state where they wait for the mobile sink to come close to their vicinity for data gathering. In order to solve this problem, in this paper, we apply a wake-up receiver to each sensor node, which consumes much smaller power than the main radio used for data transmissions. The main radio interface is woken up only when the wake-up receiver attached to each node detects a wake-up signal transmitted by the mobile sink. For this mobile and on-demand data gathering, this paper proposes a route control framework that decides the mobility route for a drone-based mobile sink, considering the interactions between wake-up control and physical layer (PHY) and medium access control (MAC) layer operations. We investigate the optimality and effectiveness of the route obtained by the proposed framework with computer simulations. Furthermore, we present experimental results obtained with our test-bed of a WSN employing a drone-based mobile sink and wake-up receivers. All these results give us the insight on the role of wake-up receiver in mobile and on-demand sensing data gathering and its interactions with protocol/system designs.

  • A Guide of Fingerprint Based Radio Emitter Localization Using Multiple Sensors Open Access

    Tao YU  Azril HANIZ  Kentaro SANO  Ryosuke IWATA  Ryouta KOSAKA  Yusuke KUKI  Gia Khanh TRAN  Jun-ichi TAKADA  Kei SAKAGUCHI  

     
    INVITED PAPER

      Pubricized:
    2018/04/17
      Vol:
    E101-B No:10
      Page(s):
    2104-2119

    Location information is essential to varieties of applications. It is one of the most important context to be detected by wireless distributed sensors, which is a key technology in Internet-of-Things. Fingerprint-based methods, which compare location unique fingerprints collected beforehand with the fingerprint measured from the target, have attracted much attention recently in both of academia and industry. They have been successfully used for many location-based applications. From the viewpoint of practical applications, in this paper, four different typical approaches of fingerprint-based radio emitter localization system are introduced with four different representative applications: localization of LTE smart phone used for anti-cheating in exams, indoor localization of Wi-Fi terminals, localized light control in BEMS using location information of occupants, and illegal radio localization in outdoor environments. Based on the different practical application scenarios, different solutions, which are designed to enhance the localization performance, are discussed in detail. To the best of the authors' knowledge, this is the first paper to give a guideline for readers about fingerprint-based localization system in terms of fingerprint selection, hardware architecture design and algorithm enhancement.

  • Performance Analysis and Hardware Verification of Feature Detection Using Cyclostationarity in OFDM Signal

    Akihide NAGAMINE  Kanshiro KASHIKI  Fumio WATANABE  Jiro HIROKAWA  

     
    PAPER

      Pubricized:
    2018/04/13
      Vol:
    E101-B No:10
      Page(s):
    2142-2151

    As one functionality of the wireless distributed network (WDN) enabling flexible wireless networks, it is supposed that a dynamic spectrum access is applied to OFDM systems for superior radio resource management. As a basic technology for such WDN, our study deals with the OFDM signal detection based on its cyclostationary feature. Previous relevant studies mainly relied on software simulations based on the Monte Carlo method. This paper analytically clarifies the relationship between the design parameters of the detector and its detection performance. The detection performance is formulated by using multiple design parameters including the transfer function of the receive filter. A hardware experiment with radio frequency (RF) signals is also carried out by using the detector consisting of an RF unit and FPGA. Thereby, it is verified that the detection characteristics represented by the false-alarm and non-detection probabilities calculated by the analytical formula agree well with those obtained by the hardware experiment. Our analysis and experiment results are useful for the parameter design of the signal detector to satisfy required performance criteria.

  • Restricted Access Window Based Hidden Node Problem Mitigating Algorithm in IEEE 802.11ah Networks

    Ruoyu WANG  Min LIN  

     
    PAPER-Network

      Pubricized:
    2018/03/29
      Vol:
    E101-B No:10
      Page(s):
    2162-2171

    IEEE 802.11ah is a specification being developed for sub-1GHz license-exempt operation and is intended to provide Low Power Wide Area (LPWA) communication services and support Internet of Things (IoT) features such as large-scale networks and extended transmission range. However, these features also make the 802.11ah networks highly susceptible to channel contention and hidden node problem (HNP). To address the problems, the 11ah Task Group proposed a Restricted Access Window (RAW) mechanism. It shows outstanding performance in alleviating channel contention, but its effect on solving HNP is unsatisfactory. In this paper, we propose a simple and effective hidden node grouping algorithm (HNGA) based on IEEE 802.11ah RAW. The algorithm collects hidden node information by taking advantage of the 802.11 association process and then performs two-stage uniform grouping to prevent hidden node collisions (HNCs). Performance of the proposed algorithm is evaluated in comparison with other existing schemes in a hidden node situation. The results show that our proposed algorithm eliminates most of hidden node pairs inside a RAW group with low overhead penalty, thereby improving the performance of the network. Moreover, the algorithm is immune to HNCs caused by cross slot boundary transmissions.

  • A New Strategy for Virtual Machine Migration Based on Decision-Theoretic Rough Sets

    Hang ZHOU  Qing LI  Hai ZHU  Jian WANG  

     
    PAPER-Network

      Pubricized:
    2018/04/02
      Vol:
    E101-B No:10
      Page(s):
    2172-2185

    Large-scale virtualized data centers are increasingly becoming the norm in our data-intensive society. One pressing challenge is to reduce the energy consumption of servers while maintaining a high level of service agreement fulfillment. Due to the convenience of virtualization, virtual machine migration is an effective way to optimize the trade-off between energy and performance. However, there are obvious drawbacks in the current static threshold strategy for migration. This paper proposes a new decision strategy based on decision-theoretic rough sets. In the new strategy, the status of a server is determined by the Bayesian rough set model. The space is divided into positive, negative and boundary regions. According to this information, a migration decision with minimum risk will be made. This three-way decision framework in our strategy can reduce over-migration and delayed migration. The experiments in this paper show that this new strategy outperforms the benchmark examined. It is an efficient and flexible approach to the energy and performance trade-off in the cloud.

  • Receive Power Control in Multiuser Inductive Power Transfer System Using Single-Frequency Coil Array

    Quang-Thang DUONG  Minoru OKADA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/04/05
      Vol:
    E101-B No:10
      Page(s):
    2222-2229

    This paper investigates receive power control for multiuser inductive power transfer (IPT) systems with a single-frequency coil array. The primary task is to optimize the transmit coil currents to minimize the total input power, subject to the minimum receive powers required by individual users. Due to the complicated coupling mechanism among all transmit coils and user pickups, the optimization problem is a non-convex quadratically constrained quadratic program (QCQP), which is analytically intractable. This paper solves the problem by applying the semidefinite relaxation (SDR) technique and evaluates the performance by full-wave electromagnetic simulations. Our results show that a single-frequency coil array is capable of power control for various multiuser scenarios, assuming that the number of transmit coils is greater than or equal to the number of users and the transmission conditions for individual users are uncorrelated.

  • Data Synchronization Method among Isolated Servers Using Mobile Relays

    Kazuya ANAZAWA  Toshiaki MIYAZAKI  Peng LI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/04/04
      Vol:
    E101-B No:10
      Page(s):
    2239-2249

    After large-scale disasters, information sharing among people becomes more important than usual. This, however, is extremely difficult to achieve in disaster zones due to serious damage to the existing network infrastructure, power outages, and high traffic congestion. For the quick provision of alternative networks to serve heavy communication demands after disasters, establishing local area networks (LANs) consisting of portable servers with data storage has been considered as one of the most promising solutions. Based on the established LAN and a data server in each area, people can share many kinds of disaster-related information such as emergency information and supply/demand information via deployed neighboring servers. However, due to the lack of stable Internet connection, these servers are isolated and cannot be synchronized in real time. To enable and guarantee more efficient information sharing across the whole disaster-hit area, data stored on each server should be synchronized without the Internet. Our solution is to propose an intermittent data synchronization scheme that uses moving vehicles as relays to exchange data between isolated servers after disasters. With the objective of maximizing the total number of synchronized high priority data under the capability constraints of mobile relays, we first propose a data allocation scheme (DAS) from a server to a mobile relay. After that, we propose a trajectory planning scheme for the relays which is formulated as a Mixed Integer Linear Fractional Programming (MILFP) problem, and an algorithm to solve it efficiently. Extensive simulations and comparisons with other methods show the superior performance of our proposals.

  • Development of Small Dielectric Lens for Slot Antenna Using Topology Optimization with Normalized Gaussian Network

    Keiichi ITOH  Haruka NAKAJIMA  Hideaki MATSUDA  Masaki TANAKA  Hajime IGARASHI  

     
    PAPER

      Vol:
    E101-C No:10
      Page(s):
    784-790

    This paper reports a novel 3D topology optimization method based on the finite difference time domain (FDTD) method for a dielectric lens antenna. To obtain an optimal lens with smooth boundary, we apply normalized Gaussian networks (NGnet) to 3D topology optimization. Using the proposed method, the dielectric lens with desired radiation characteristics can be designed. As an example of the optimization using the proposed method, the width of the main beam is minimized assuming spatial symmetry. In the optimization, the lens is assumed to be loaded on the aperture of a waveguide slot antenna and is smaller compared with the wavelength. It is shown that the optimized lens has narrower beamwidth of the main beam than that of the conventional lens.

2681-2700hit(22683hit)