The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] sign(2667hit)

981-1000hit(2667hit)

  • Multicast Routing and Wavelength Assignment with Shared Protection in Multi-Fiber WDM Mesh Networks: Optimal and Heuristic Solutions

    Kampol WORADIT  Matthieu GUYOT  Pisit VANICHCHANUNT  Poompat SAENGUDOMLERT  Lunchakorn WUTTISITTIKULKIJ  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E92-B No:11
      Page(s):
    3401-3409

    While the problem of multicast routing and wavelength assignment (MC-RWA) in optical wavelength division multiplexing (WDM) networks has been investigated, relatively few researchers have considered network survivability for multicasting. This paper provides an optimization framework to solve the MC-RWA problem in a multi-fiber WDM network that can recover from a single-link failure with shared protection. Using the light-tree (LT) concept to support multicast sessions, we consider two protection strategies that try to reduce service disruptions after a link failure. The first strategy, called light-tree reconfiguration (LTR) protection, computes a new multicast LT for each session affected by the failure. The second strategy, called optical branch reconfiguration (OBR) protection, tries to restore a logical connection between two adjacent multicast members disconnected by the failure. To solve the MC-RWA problem optimally, we propose an integer linear programming (ILP) formulation that minimizes the total number of fibers required for both working and backup traffic. The ILP formulation takes into account joint routing of working and backup traffic, the wavelength continuity constraint, and the limited splitting degree of multicast-capable optical cross-connects (MC-OXCs). After showing some numerical results for optimal solutions, we propose heuristic algorithms that reduce the computational complexity and make the problem solvable for large networks. Numerical results suggest that the proposed heuristic yields efficient solutions compared to optimal solutions obtained from exact optimization.

  • A Prototype Modem for Hyper-Multipoint Data Gathering SATCOM Systems --- A Group Modem Applicable to Arbitrarily and Dynamically Assigned FDMA Signals ---

    Kiyoshi KOBAYASHI  Fumihiro YAMASHITA  Jun-ichi ABE  Masazumi UEBA  

     
    PAPER

      Vol:
    E92-B No:11
      Page(s):
    3318-3325

    This paper presents a prototype group modem for a hyper-multipoint data gathering satellite communication system. It can handle arbitrarily and dynamically assigned FDMA signals by employing a novel FFT-type block demultiplexer/multiplexer. We clarify its configuration and operational principle. Experiments show that the developed modem offers excellent performance.

  • Algorithm for Controlling Multi-Car Elevator Systems Based on Procedures Estimating Efficiency of Passenger Transport and Call Assignability

    Takeshi FUJIMURA  Shohei UENO  Ayaka KIYOTAKE  Hiroyoshi MIWA  

     
    LETTER

      Vol:
    E92-A No:11
      Page(s):
    2790-2793

    Recently multi-car elevator (MCE) consisting of several elevator cars in a single elevator shaft received great interest as transportation systems for high-rise buildings. Algorithms for efficiently controlling elevator cars are necessary to put MCEs to practical use. We propose an algorithm for controlling MCEs to reduce passenger-waiting time. A feature of our algorithm is the introduction of a simple function estimating efficiency of passenger transport and a procedure checking assignability of a car. We evaluate the performance of our algorithm using a simulation and show that it performs better compared with a previous algorithm.

  • Synthesis and Design of Parameter Extractors for Low-Power Pre-Computation-Based Content-Addressable Memory

    Shanq-Jang RUAN  Jui-Yuan HSIEH  Chia-Han LEE  

     
    PAPER

      Vol:
    E92-C No:10
      Page(s):
    1249-1257

    This paper presents a gate-block selection algorithm, which can synthesize a proper parameter extractor of the pre-computation-based content-addressable memory (PB-CAM) to enhance power efficiency for specific applications such as embedded systems, microprocessor and SOC, etc. Furthermore, a novel CAM cell design with single bit-line is proposed. The proposed CAM cell design requires only one heavy loading bit-line and merely is constructed with eight transistors. The whole PB-CAM design was described in Spice with TSMC 0.35 µm double-poly quadruple-metal CMOS process. We used Synopsys Nanosim to estimate power consumption. With a 128 words by 32 bits CAM size, the experimental results showed that our proposed PB-CAM effectively reduces 18.21% of comparison operations in the CAM and saves 16.75% in power reduction by synthesizing a proper parameter extractor of the PB-CAM compared with the 1's count PB-CAM. This implies that our proposed PB-CAM is more flexible and adaptive for specific applications.

  • DOA Estimation Using Iterative MUSIC Algorithm for CDMA Signals

    Ann-Chen CHANG  Jui-Chung HUNG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:10
      Page(s):
    3267-3269

    In conjunction with a first-order Taylor series approximation of the spatial scanning vector, this letter presents an iterative multiple signal classification (MUSIC) direction-of-arrival (DOA) estimation for code-division multiple access signals. This approach leads to a simple one-dimensional optimization problem to find each iterative optimal search grid. It can not only accurately estimate DOA, but also speed up the estimating process. Computer results demonstrate the effectiveness of the proposed algorithm.

  • Sample-Adaptive Product Quantizers with Affine Index Assignments for Noisy Channels

    Dong Sik KIM  Youngcheol PARK  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E92-B No:10
      Page(s):
    3084-3093

    When we design a robust vector quantizer (VQ) for noisy channels, an appropriate index assignment function should be contrived to minimize the channel-error effect. For relatively high rates, the complexity for finding an optimal index assignment function is too high to be implemented. To overcome such a problem, we use a structurally constrained VQ, which is called the sample-adaptive product quantizer (SAPQ) [12], for low complexities of quantization and index assignment. The product quantizer (PQ) and its variation SAPQ [13], which are based on the scalar quantizer (SQ) and thus belong to a class of the binary lattice VQ [16], have inherent error resilience even though the conventional affine index assignment functions, such as the natural binary code, are employed. The error resilience of SAPQ is observed in a weak sense through worst-case bounds. Using SAPQ for noisy channels is useful especially for high rates, e.g., > 1 bit/sample, and it is numerically shown that the channel-limit performance of SAPQ is comparable to that of the best codebook permutation of binary switching algorithm (BSA) [23]. Further, the PQ or SAPQ codebook with an affine index assignment function is used for the initial guess of the conventional clustering algorithm, and it is shown that the performance of the best BSA can be easily achieved.

  • A Mobility-Aware QoS Signaling Protocol for Ambient Networks

    Seong-Ho JEONG  Sung-Hyuck LEE  Jongho BANG  

     
    PAPER-Network

      Vol:
    E92-B No:10
      Page(s):
    3156-3165

    Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.

  • Strong Anonymous Signature

    Rui ZHANG  Hideki IMAI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:10
      Page(s):
    2487-2491

    The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the signer, if the message is hidden from the verifier. However, in many practical applications, e.g., an anonymous paper review system mentioned in [18], the message for anonymous authentication is actually known to the verifier. This implies that the effectiveness of previous anonymous signatures may be unjustified in these applications. In this paper, we extend the previous models, and develop a related primitive called strong anonymous signatures. For strong anonymous signatures, the identity of the signer remains secret even if the challenge message is chosen by an adversary. We then demonstrate some efficient constructions and prove their security in our model.

  • Reducing Payload Inspection Cost Using Rule Classification for Fast Attack Signature Matching

    Sunghyun KIM  Heejo LEE  

     
    PAPER-DRM and Security

      Vol:
    E92-D No:10
      Page(s):
    1971-1978

    Network intrusion detection systems rely on a signature-based detection engine. When under attack or during heavy traffic, the detection engines need to make a fast decision whether a packet or a sequence of packets is normal or malicious. However, if packets have a heavy payload or the system has a great deal of attack patterns, the high cost of payload inspection severely diminishes detection performance. Therefore, it would be better to avoid unnecessary payload scans by checking the protocol fields in the packet header, before executing their heavy operations of payload inspection. When payload inspection is necessary, it is better to compare a minimum number of attack patterns. In this paper, we propose new methods to classify attack signatures and make pre-computed multi-pattern groups. Based on IDS rule analysis, we grouped the signatures of attack rules by a multi-dimensional classification method adapted to a simplified address flow. The proposed methods reduce unnecessary payload scans and make light pattern groups to be checked. While performance improvements are dependent on a given networking environment, the experimental results with the DARPA data set and university traffic show that the proposed methods outperform the most recent Snort by up to 33%.

  • An Efficient Signature Scheme with Fast Online Signing

    Taek-Young YOUN  Young-Ho PARK  Jongin LIM  

     
    PAPER-Cryptography and Information Security

      Vol:
    E92-A No:10
      Page(s):
    2431-2437

    In 1999, Gennaro, Halevi and Rabin proposed a signature which achieves provable security without assuming the random oracles, and it is the first RSA-type signature whose security is proved in the standard model. Since that time, several signatures have been proposed to achieve better efficiency or useful property along with the provable security in the standard model. In this paper, we construct a trapdoor hash function, and design an efficient online/offline signature by using the trapdoor hash function. Our signature scheme requires only one non-modular multiplication of two small integers for online signing, and it provides the fastest online signing among all online/offline signatures that achieve provable security in the standard model.

  • Signal Subspace Interpolation from Discrete Measurement Samples in Constructing a Database for Location Fingerprint Technique

    Panarat CHERNTANOMWONG  Jun-ichi TAKADA  Hiroyuki TSUJI  

     
    PAPER-Antennas and Propagation

      Vol:
    E92-B No:9
      Page(s):
    2922-2930

    In this paper, a method of the signal subspace interpolation to constructing a continuous fingerprint database for radio localization is proposed. When using the fingerprint technique, enhancing the accuracy of location estimation requires very fine spatial resolution of the database, which entails much time in collecting the data to build up the database. Interpolated signal subspace is presented to achieve a fine spatial resolution of the fingerprint database. The angle of arrival (AOA) and the measured signal subspace at known locations are needed to obtain the interpolated signal subspaces. The effectiveness of this method is verified by an outdoor experiment and the estimated location using this method was compared with those using the geometrically calculated fingerprint and the measured signal subspace fingerprint techniques.

  • Revision of Using Eigenvalues of Covariance Matrices in Boundary-Based Corner Detection

    Wen-Bing HORNG  Chun-Wen CHEN  

     
    PAPER-Pattern Recognition

      Vol:
    E92-D No:9
      Page(s):
    1692-1701

    In this paper, we present a revision of using eigenvalues of covariance matrices proposed by Tsai et al. as a measure of significance (i.e., curvature) for boundary-based corner detection. We first show the pitfall of Tsai et al.'s approach. We then further investigate the properties of eigenvalues of covariance matrices of three different types of curves and point out a mistake made by Tsai et al.'s method. Finally, we propose a modification of using eigenvalues as a measure of significance for corner detection to remedy their defect. The experiment results show that under the same conditions of the test patterns, in addition to correctly detecting all true corners, the spurious corners detected by Tsai et al.'s method disappear in our modified measure of significance.

  • Ultra-Wideband Indoor Double-Directional Channel Estimation Using Transformation between Frequency and Time Domain Signals

    Naohiko IWAKIRI  Takehiko KOBAYASHI  

     
    PAPER-Ultra Wideband System

      Vol:
    E92-A No:9
      Page(s):
    2159-2166

    This paper proposes an ultra-wideband double-directional spatio-temporal channel sounding technique using transformation between frequency- and time-domain (FD and TD) signals. Virtual antenna arrays, composed of omnidirectional antennas and scanners, are used for transmission and reception in the FD. After Fourier transforming the received FD signals to TD ones, time of arrival (TOA) is estimated using a peak search over the TD signals, and then angle of arrivals (AOA) and angle of departure (AOD) are estimated using a weighted angle histogram with a multiple signal classification (MUSIC) algorithm applied to the FD signals, inverse-Fourier transformed from the TD signals divided into subregions. Indoor channel sounding results validated that an appropriate weighting reduced a spurious level in the angle histogram by a factor of 0.1 to 0.2 in comparison with that of non-weighting. The proposed technique successfully resolved dominant multipath components, including a direct path, a single reflection, and a single diffraction, in line-of-sight (LOS) and non-LOS environments. Joint TOA and AOA/AOD spectra were also derived from the sounding signals. The spectra illustrated the dominant multipath components (agreed with the prediction by ray tracing) as clusters.

  • Power Minimization for Dual- and Triple-Supply Digital Circuits via Integer Linear Programming

    Ki-Yong AHN  Chong-Min KYUNG  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E92-A No:9
      Page(s):
    2318-2325

    This paper proposes an Integer Linear Programming (ILP)-based power minimization method by partitioning into regions, first, with three different VDD's(PM3V), and, secondly, with two different VDD's(PM2V). To reduce the solving time of triple-VDD case (PM3V), we also proposed a partitioned ILP method(p-PM3V). The proposed method provides 29% power saving on the average in the case of triple-VDD compared to the case of single VDD. Power reduction of PM3V compared to Clustered Voltage Scaling (CVS) was about 18%. Compared to the unpartitioned ILP formulation(PM3V), the partitioned ILP method(p-PM3V) reduced the total solution time by 46% at the cost of additional power consumption within 1.3%.

  • A New Signaling Architecture THREP with Autonomous Radio-Link Control for Wireless Communications Systems

    Masahiko HIRONO  Toshio NOJIMA  

     
    PAPER

      Vol:
    E92-C No:9
      Page(s):
    1163-1169

    This paper presents a new signaling architecture for radio-access control in wireless communications systems. Called THREP (for THREe-phase link set-up Process), it enables systems with low-cost configurations to provide tetherless access and wide-ranging mobility by using autonomous radio-link controls for fast cell searching and distributed call management. A signaling architecture generally consists of a radio-access part and a service-entity-access part. In THREP, the latter part is divided into two steps: preparing a communication channel, and sustaining it. Access control in THREP is thus composed of three separated parts, or protocol phases. The specifications of each phase are determined independently according to system requirements. In the proposed architecture, the first phase uses autonomous radio-link control because we want to construct low-power indoor wireless communications systems. Evaluation of channel usage efficiency and hand-over loss probability in the personal handy-phone system (PHS) shows that THREP makes the radio-access sub-system operations in a practical application model highly efficient, and the results of a field experiment show that THREP provides sufficient protection against severe fast CNR degradation in practical indoor propagation environments.

  • VLSI Floorplanning with Boundary Constraints Based on Single-Sequence Representation

    Kang LI  Juebang YU  Jian LI  

     
    LETTER-VLSI Design Technology and CAD

      Vol:
    E92-A No:9
      Page(s):
    2369-2375

    In modern VLSI physical design, huge integration scale necessitates hierarchical design and IP reuse to cope with design complexity. Besides, interconnect delay becomes dominant to overall circuit performance. These critical factors require some modules to be placed along designated boundaries to effectively facilitate hierarchical design and interconnection optimization related problems. In this paper, boundary constraints of general floorplan are solved smoothly based on the novel representation Single-Sequence (SS). Necessary and sufficient conditions of rooms along specified boundaries of a floorplan are proposed and proved. By assigning constrained modules to proper boundary rooms, our proposed algorithm always guarantees a feasible SS code with appropriate boundary constraints in each perturbation. Time complexity of the proposed algorithm is O(n). Experimental results on MCNC benchmarks show effectiveness and efficiency of the proposed method.

  • Antenna Location Optimization for Circular-Layout Distributed Antenna Systems

    Xinzheng WANG  Pengcheng ZHU  Ming CHEN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:9
      Page(s):
    2980-2983

    The distributed antenna system (DAS) offers significant power savings but only if the antennas are properly located. In this letter, we convert antenna location optimization to the codebook design problem. For the widely studied circular-layout DAS with uniform user distribution, we derive closed-form expressions for antenna locations that yield near-optimal performance. For more general user distribution and antenna topology, the codebook design algorithms can provide numerical optimization results with acceptable performance and low complexity.

  • Physical Layer Network Coding for Wireless Cooperative Multicast Flows

    Jun LI  Wen CHEN  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E92-B No:8
      Page(s):
    2559-2567

    It has been proved that wireless network coding can increase the throughput of multi-access system [2] and bi-directional system [5] by taking the advantage of the broadcast nature of electromagnetic waves. In this paper, we introduce the wireless network coding to cooperative multicast system. We establish a basic 2-source and 2-destination cooperative system model with arbitrary number of relays (2-N-2 system). Then two regenerative network coding (RNC) protocols are designed to execute the basic idea of network coding in complex field (RCNC) and Galois field (RGNC) respectively. We illuminate how network coding can enhance the throughput distinctly in cooperative multicast system. Power allocation schemes as well as precoder design are also carefully studied to improve the system performance in terms of system frame error probability (SFEP).

  • Bandwidth-Efficient Mutually Cooperative Relaying with Spatially Coordinate-Interleaved Orthogonal Design

    Hyun-Seok RYU  Kyung-Mi PARK  Hee-Soo LEE  Chung-Gu KANG  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E92-B No:8
      Page(s):
    2731-2734

    This letter proposes a type of mutually cooperative relaying (MCR) scheme based on a spatially coordinate-interleaved orthogonal design (SCID), in which two cooperative users are spatially multiplexed without bandwidth expansion. It provides not only diversity gain (with order of two) as in the existing MCR scheme, but also additional coding gain. Our simulation results demonstrate that the proposed SCID scheme is useful for improving the uplink performance as long as one user can find another active user as a close neighbor that is simultaneously communicating with the same destination, e.g., a base station in the cellular network.

  • A Note on Factoring α-LSBS Moduli

    Hung-Min SUN  Mu-En WU  Cheng-Ta YANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:8
      Page(s):
    2137-2138

    In this letter the complexity of factoring an α-LSBS modulus is analyzed. This gives an improvement on the lower bound of the previous results.

981-1000hit(2667hit)