The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] system(3183hit)

361-380hit(3183hit)

  • A Fuzzy Rule-Based Key Redistribution Method for Improving Security in Wireless Sensor Networks

    Jae Kwan LEE  Tae Ho CHO  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2017/07/27
      Vol:
    E101-B No:2
      Page(s):
    489-499

    Wireless Sensor Networks (WSNs) are randomly deployed in a hostile environment and left unattended. These networks are composed of small auto mouse sensor devices which can monitor target information and send it to the Base Station (BS) for action. The sensor nodes can easily be compromised by an adversary and the compromised nodes can be used to inject false vote or false report attacks. To counter these two kinds of attacks, the Probabilistic Voting-based Filtering Scheme (PVFS) was proposed by Li and Wu, which consists of three phases; 1) Key Initialization and assignment, 2) Report generation, and 3) En-route filtering. This scheme can be a successful countermeasure against these attacks, however, when one or more nodes are compromised, the re-distribution of keys is not handled. Therefore, after a sensor node or Cluster Head (CH) is compromised, the detection power and effectiveness of PVFS is reduced. This also results in adverse effects on the sensor network's lifetime. In this paper, we propose a Fuzzy Rule-based Key Redistribution Method (FRKM) to address the limitations of the PVFS. The experimental results confirm the effectiveness of the proposed method by improving the detection power by up to 13.75% when the key-redistribution period is not fixed. Moreover, the proposed method achieves an energy improvement of up to 9.2% over PVFS.

  • BER Performance of SS System Using a Huffman Sequence against CW Jamming

    Takahiro MATSUMOTO  Hideyuki TORII  Yuta IDA  Shinya MATSUFUJI  

     
    PAPER

      Vol:
    E101-A No:1
      Page(s):
    167-175

    In this paper, we theoretically analyse the influence of intersymbol interference (ISI) and continuous wave interference (CWI) on the bit error rate (BER) performance of the spread spectrum (SS) system using a real-valued Huffman sequence under the additive white Gaussian noise (AWGN) environment. The aperiodic correlation function of the Huffman sequence has zero sidelobes except the shift-end values at the left and right ends of shift. The system can give the unified communication and ranging system because the output of a matched filter (MF) is the ideal impulse by generating transmitted signal of the bit duration T=NTc, N=2n, n=1,2,… from the sequence of length M=2kN+1, k=0,1,…, where Tc is the chip duration and N is the spreading factor. As a result, the BER performance of the system is improved with decrease in the absolute value of the shift-end value, and is not influenced by ISI if the shift-end value is almost zero-value. In addition, the BER performance of the system of the bit duration T=NTc with CWI is improved with increase in the sequence length M=2kN+1, and the system can decrease the influence of CWI.

  • Intercarrier-Interference-Aware Energy Saving for High-Mobility Cognitive OFDM Systems

    Wenjun XU  Xuemei ZHOU  Yanda CHEN  Zhihui LIU  Zhiyong FENG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/07/18
      Vol:
    E101-B No:1
      Page(s):
    203-212

    Cognitive orthogonal frequency-division multiplexing (OFDM) systems are spectrum-efficient yet vulnerable to intercarrier interference (ICI), especially in high-mobility scenarios. In this paper, the energy efficiency optimization problem in high-mobility cognitive OFDM system is considered. The aim is to maximize the energy efficiency by adapting subcarrier bandwidth, power allocation and sensing duration in the presence of ICI, under the constraints of the total power budget of secondary networks, the probabilistic interference limits for the protection of primary networks, and the subcarrier spacing restriction for high-mobility OFDM systems. In order to tackle the intractable non-convex optimization problem induced by ICI, an ICI-aware power allocation algorithm is proposed, by referring to noncooperative game theory. Moreover, a near-optimal subcarrier bandwidth search algorithm based on golden section methods is also presented to maximize the system energy efficiency. Simulation results show that the proposed algorithms can achieve a considerable energy efficiency improvement by up to 133% compared to the traditional static subcarrier bandwidth and power allocation schemes.

  • Enhanced Performance of MUSIC Algorithm Using Spatial Interpolation in Automotive FMCW Radar Systems

    Seongwook LEE  Young-Jun YOON  Seokhyun KANG  Jae-Eun LEE  Seong-Cheol KIM  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/06/28
      Vol:
    E101-B No:1
      Page(s):
    163-175

    In this paper, we propose a received signal interpolation method for enhancing the performance of multiple signal classification (MUSIC) algorithm. In general, the performance of the conventional MUSIC algorithm is very sensitive to signal-to-noise ratio (SNR) of the received signal. When array elements receive the signals with nonuniform SNR values, the resolution performance is degraded compared to elements receiving the signals with uniform SNR values. Hence, we propose a signal calibration technique for improving the resolution of the algorithm. First, based on original signals, rough direction of arrival (DOA) estimation is conducted. In this stage, using frequency-domain received signals, SNR values of each antenna element in the array are estimated. Then, a deteriorated element that has a relatively lower SNR value than those of the other elements is selected by our proposed scheme. Next, the received signal of the selected element is spatially interpolated based on the signals received from the neighboring elements and the DOA information extracted from the rough estimation. Finally, fine DOA estimation is performed again with the calibrated signal. Simulation results show that the angular resolution of the proposed method is better than that of the conventional MUSIC algorithm. Also, we apply the proposed scheme to actual data measured in the testing ground, and it gives us more enhanced DOA estimation result.

  • On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks

    Tatsuya CHUMAN  Kenta KURIHARA  Hitoshi KIYA  

     
    PAPER

      Pubricized:
    2017/10/16
      Vol:
    E101-D No:1
      Page(s):
    37-44

    The aim of this paper is to apply automatic jigsaw puzzle solvers, which are methods of assembling jigsaw puzzles, to the field of information security. Encryption-then-Compression (EtC) systems have been considered for the user-controllable privacy protection of digital images in social network services. Block scrambling-based encryption schemes, which have been proposed to construct EtC systems, have enough key spaces for protecting brute-force attacks. However, each block in encrypted images has almost the same correlation as that of original images. Therefore, it is required to consider the security from different viewpoints from number theory-based encryption methods with provable security such as RSA and AES. In this paper, existing jigsaw puzzle solvers, which aim to assemble puzzles including only scrambled and rotated pieces, are first reviewed in terms of attacking strategies on encrypted images. Then, an extended jigsaw puzzle solver for block scrambling-based encryption scheme is proposed to solve encrypted images including inverted, negative-positive transformed and color component shuffled blocks in addition to scrambled and rotated ones. In the experiments, the jigsaw puzzle solvers are applied to encrypted images to consider the security conditions of the encryption schemes.

  • An Approach to Effective Recommendation Considering User Preference and Diversity Simultaneously

    Sang-Chul LEE  Sang-Wook KIM  Sunju PARK  Dong-Kyu CHAE  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2017/09/28
      Vol:
    E101-D No:1
      Page(s):
    244-248

    This paper addresses recommendation diversification. Existing diversification methods have difficulty in dealing with the tradeoff between accuracy and diversity. We point out the root of the problem in diversification methods and propose a novel method that can avoid the problem. Our method aims to find an optimal solution of the objective function that is carefully designed to consider user preference and the diversity among recommended items simultaneously. In addition, we propose an item clustering and a greedy approximation to achieve efficiency in recommendation.

  • Recent Developments in Post-Quantum Cryptography

    Tsuyoshi TAKAGI  

     
    INVITED PAPER

      Vol:
    E101-A No:1
      Page(s):
    3-11

    The security of current public-key cryptosystems relies on the hardness of factoring large integers or solving discrete logarithm problems. However, these mathematical problems can be solved in polynomial time using a quantum computer. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. In this expository article, we give an overview of recent research on post-quantum cryptography. In particular, we describe the construction and security of multivariate polynomial cryptosystems and lattice-based cryptosystems, which are the main candidates of post-quantum cryptography.

  • A Compact Matched Filter Bank for an Optical ZCZ Sequence Set with Zero-Correlation Zone 2z

    Yasuaki OHIRA  Takahiro MATSUMOTO  Hideyuki TORII  Yuta IDA  Shinya MATSUFUJI  

     
    LETTER

      Vol:
    E101-A No:1
      Page(s):
    195-198

    In this paper, we propose a new structure for a compact matched filter bank (MFB) for an optical zero-correlation zone (ZCZ) sequence set with Zcz=2z. The proposed MFB can reduces operation elements such as 2-input adders and delay elements. The number of 2-input adders decrease from O(N2) to O(N log2 N), delay elements decrease from O(N2) to O(N). In addition, the proposed MFBs for the sequence of length 32, 64, 128 and 256 with Zcz=2,4 and 8 are implemented on a field programmable gate array (FPGA). As a result, the numbers of logic elements (LEs) of the proposed MFBs for the sequences with Zcz=2 of length 32, 64, 128 and 256 are suppressed to about 76.2%, 84.2%, 89.7% and 93.4% compared to that of the conventional MFBs, respectively.

  • Semantic Integration of Sensor Data with SSN Ontology in a Multi-Agent Architecture for Intelligent Transportation Systems

    Susel FERNANDEZ  Takayuki ITO  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2017/09/15
      Vol:
    E100-D No:12
      Page(s):
    2915-2922

    Intelligent transportation systems (ITS) are a set of technological solutions used to improve the performance and safety of road transportation. Since one of the most important information sources on ITS are sensors, the integration and sharing the sensor data become a big challenging problem in the application of sensor networks to these systems. In order to make full use of the sensor data, is crucial to convert the sensor data into semantic data, which can be understood by computers. In this work, we propose to use the SSN ontology to manage the sensor information in an intelligent transportation architecture. The system was tested in a traffic light settings application, allowing to predict and avoid traffic accidents, and also for the routing optimization.

  • Natural Facial and Head Behavior Recognition using Dictionary of Motion Primitives

    Qun SHI  Norimichi UKITA  Ming-Hsuan YANG  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2017/08/28
      Vol:
    E100-D No:12
      Page(s):
    2993-3000

    This paper proposes a natural facial and head behavior recognition method using hybrid dynamical systems. Most existing facial and head behavior recognition methods focus on analyzing deliberately displayed prototypical emotion patterns rather than complex and spontaneous facial and head behaviors in natural conversation environments. We first capture spatio-temporal features on important facial parts via dense feature extraction. Next, we cluster the spatio-temporal features using hybrid dynamical systems, and construct a dictionary of motion primitives to cover all possible elemental motion dynamics accounting for facial and head behaviors. With this dictionary, the facial and head behavior can be interpreted into a distribution of motion primitives. This interpretation is robust against different rhythms of dynamic patterns in complex and spontaneous facial and head behaviors. We evaluate the proposed approach under natural tele-communication scenarios, and achieve promising results. Furthermore, the proposed method also performs favorably against the state-of-the-art methods on three benchmark databases.

  • Design and Experimental Evaluation of an Adaptive Output Feedback Control System Based on ASPR-Ness

    Zhe GUAN  Shin WAKITANI  Ikuro MIZUMOTO  Toru YAMAMOTO  

     
    PAPER-Systems and Control

      Vol:
    E100-A No:12
      Page(s):
    2956-2962

    This paper considers a design method of a discrete-time adaptive output feedback control system with a feedforward input based on almost strict positive realness (ASPR-ness). The proposed scheme utilizes the property of ASPR of the controlled plant, and the reference signal is used as feedforward input. The parallel feedforward compensator (PFC) which renders an ASPR augmented controlled plant is also investigated. Besides, it is shown that the output of original plant can track reference signal perfectly without any steady state error. The effectiveness of the proposed scheme is confirmed through a pilot-scale temperature control system.

  • Cost Aware Offloading Selection and Resource Allocation for Cloud Based Multi-Robot Systems

    Yuan SUN  Xing-she ZHOU  Gang YANG  

     
    LETTER-Software System

      Pubricized:
    2017/08/28
      Vol:
    E100-D No:12
      Page(s):
    3022-3026

    In this letter, we investigate the computation offloading problem in cloud based multi-robot systems, in which user weights, communication interference and cloud resource limitation are jointly considered. To minimize the system cost, two offloading selection and resource allocation algorithms are proposed. Numerical results show that the proposed algorithms both can greatly reduce the overall system cost, and the greedy selection based algorithm even achieves near-optimal performance.

  • Exploiting Sparse Activation for Low-Power Design of Synchronous Neuromorphic Systems

    Jaeyong CHUNG  Woochul KANG  

     
    BRIEF PAPER-Integrated Electronics

      Vol:
    E100-C No:11
      Page(s):
    1073-1076

    Massive amounts of computation involved in real-time evaluation of deep neural networks pose a serious challenge in battery-powered systems, and neuromorphic systems specialized in neural networks have been developed. This paper first shows the portion of active neurons at a time dwindles as going toward the output layer in recent large-scale deep convolutional neural networks. Spike-based, asynchronous neuromorphic systems take advantage of the sparse activation and reduce dynamic power consumption, while synchronous systems may waste much dynamic power even for the sparse activation due to clocks. We thus propose a clock gating-based dynamic power reduction method that exploits the sparse activation for synchronous neuromorphic systems. We apply the proposed method to a building block of a recently proposed synchronous neuromorphic computing system and demonstrate up to 79% dynamic power saving at a negligible overhead.

  • A Study of Qualitative Knowledge-Based Exploration for Continuous Deep Reinforcement Learning

    Chenxi LI  Lei CAO  Xiaoming LIU  Xiliang CHEN  Zhixiong XU  Yongliang ZHANG  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2017/07/26
      Vol:
    E100-D No:11
      Page(s):
    2721-2724

    As an important method to solve sequential decision-making problems, reinforcement learning learns the policy of tasks through the interaction with environment. But it has difficulties scaling to large-scale problems. One of the reasons is the exploration and exploitation dilemma which may lead to inefficient learning. We present an approach that addresses this shortcoming by introducing qualitative knowledge into reinforcement learning using cloud control systems to represent ‘if-then’ rules. We use it as the heuristics exploration strategy to guide the action selection in deep reinforcement learning. Empirical evaluation results show that our approach can make significant improvement in the learning process.

  • Ball State Based Parallel Ball Tracking and Event Detection for Volleyball Game Analysis

    Xina CHENG  Norikazu IKOMA  Masaaki HONDA  Takeshi IKENAGA  

     
    PAPER-Vision

      Vol:
    E100-A No:11
      Page(s):
    2285-2294

    The ball state tracking and detection technology plays a significant role in volleyball game analysis, whose performance is limited due to the challenges include: 1) the inaccurate ball trajectory; 2) multiple numbers of the ball event category; 3) the large intra-class difference of one event. With the goal of broadcasting supporting for volleyball games which requires a real time system, this paper proposes a ball state based parallel ball tracking and event detection method based on a sequential estimation method such as particle filter. This method employs a parallel process of the 3D ball tracking and the event detection so that it is friendly for real time system implementation. The 3D ball tracking process uses the same models with the past work [8]. For event detection process, a ball event change estimation based multiple system model, a past trajectory referred hit point likelihood and a court-line distance feature based event type detection are proposed. First, the multiple system model transits the ball event state, which consists the event starting time and the event type, through three models dealing with different ball motion situations in the volleyball game, such as the motion keeping and changing. The mixture of these models is decided by estimation of the ball event change estimation. Secondly, the past trajectory referred hit point likelihood avoids the processing time delay between the ball tracking and the event detection process by evaluating the probability of the ball being hit at certain time without using future ball trajectories. Third, the feature of the distance between the ball and the specific court line are extracted to detect the ball event type. Experimental results based on multi-view HDTV video sequences (2014 Inter High School Men's Volleyball Games, Japan), which contains 606 events in total, show that the detection rate reaches 88.61% while the success rate of 3D ball tracking keeps more than 99%.

  • Subcarrier-Selectable Short Preamble for OFDM Channel Estimation in Real-Time Wireless Control Systems

    Theerat SAKDEJAYONT  Chun-Hao LIAO  Makoto SUZUKI  Hiroyuki MORIKAWA  

     
    PAPER-Communication Systems

      Vol:
    E100-A No:11
      Page(s):
    2323-2331

    Real-time and reliable radio communication is essential for wireless control systems (WCS). In WCS, preambles create significant overhead and affect the real-time capability since payloads are typically small. To shorten the preamble transmission time in OFDM systems, previous works have considered adopting either time-direction extrapolation (TDE) or frequency-direction interpolation (FDI) for channel estimation which however result in poor performance in fast fading channels and frequency-selective fading channels, respectively. In this work, we propose a subcarrier-selectable short preamble (SSSP) by introducing selectability to subcarrier sampling patterns of a preamble such that it can provide full sampling coverage of all subcarriers with several preamble transmissions. In addition, we introduce adaptability to a channel estimation algorithm for the SSSP so that it conforms to both fast and frequency-selective channels. Simulation results validate the feasibility of the proposed method in terms of the reliability and real-time capability. In particular, the SSSP scheme shows its advantage in flexibility as it can provide a low error rate and short communication time in various channel conditions.

  • Timed Model-Based Formal Analysis of a Scheduler of Qplus-AIR, an ARINC-653 Compliance RTOS

    Sanghyun YOON  Dong-Ah LEE  Eunji PAK  Taeho KIM  Junbeom YOO  

     
    LETTER-Software System

      Pubricized:
    2017/06/23
      Vol:
    E100-D No:10
      Page(s):
    2644-2647

    Qplus-AIR is a real-time operating system for avionics, and its safety and correctness should be analyzed and guaranteed. We performed model checking a version of Qplus-AIR with the Times model checker and identified one abnormal case that might result in safety-critical situations.

  • Analysis of Timing and Frequency Offsets on OFDM Systems for Fractional Sampling Rate

    Byungju LIM  Young-Chai KO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/03/17
      Vol:
    E100-B No:10
      Page(s):
    1946-1951

    Timing and frequency offsets are caused by imperfect synchronization at the receiver. These errors degrade the performance of OFDM systems by introducing inter-carrier-interference (ICI) and inter-symbol-interference (ISI). In this paper, we derive signal-to-interference ratio (SIR) analytically with timing and frequency offsets for the case that the sampling rate of analog-to-digital converter (ADC) in OFDM receiver is an integer fraction of the signal bandwidth. We find the exact form of interference power as a function of the fractional sampling rate. Our derived analysis is confirmed by simulations and can be applied to see the exact performance of OFDM systems with fractional sampling rate.

  • Hierarchical-Masked Image Filtering for Privacy-Protection

    Takeshi KUMAKI  Takeshi FUJINO  

     
    PAPER-Privacy, anonymity, and fundamental theory

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2327-2338

    This paper presents a hierarchical-masked image filtering method for privacy-protection. Cameras are widely used for various applications, e.g., crime surveillance, environment monitoring, and marketing. However, invasion of privacy has become a serious social problem, especially regarding the use of surveillance cameras. Many surveillance cameras point at many people; thus, a large amount of our private information of our daily activities are under surveillance. However, several surveillance cameras currently on the market and related research often have a complicated or institutional masking privacy-protection functionality. To overcome this problem, a Hierarchical-Masked image Filtering (HMF) method is proposed, which has unmaskable (mask reversal) capability and is applicable to current surveillance camera systems for privacy-information protection and can satisfy privacy-protection related requirements. This method has five main features: unmasking of the original image from only the masked image and a cipher key, hierarchical-mask level control using parameters for the length of a pseudorandom number, robustness against malicious attackers, fast processing on an embedded processor, and applicability of mask operation to current surveillance camera systems. Previous studies have difficulty in providing these features. To evaluate HMF on actual equipment, an HMF-based prototype system is developed that mainly consists of a USB web camera, ultra-compact single board computer, and notebook PC. Through experiments, it is confirmed that the proposed method achieves mask level control and is robust against attacks. The increase in processing time of the HMF-based prototype system compared with a conventional non-masking system is only about 1.4%. This paper also reports on the comparison of the proposed method with conventional privacy protection methods and favorable responses of people toward the HMF-based prototype system both domestically and abroad. Therefore, the proposed HMF method can be applied to embedded systems such as those equipped with surveillance cameras for protecting privacy.

  • Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library

    Toshihiro YAMAUCHI  Yuta IKEGAMI  Yuya BAN  

     
    PAPER-Operating system and network Security

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2295-2306

    Recently, there has been an increase in use-after-free (UAF) vulnerabilities, which are exploited using a dangling pointer that refers to a freed memory. In particular, large-scale programs such as browsers often include many dangling pointers, and UAF vulnerabilities are frequently exploited by drive-by download attacks. Various methods to prevent UAF attacks have been proposed. However, only a few methods can effectively prevent UAF attacks during runtime with low overhead. In this paper, we propose HeapRevolver, which is a novel UAF attack-prevention method that delays and randomizes the timing of release of freed memory area by using a memory-reuse-prohibited library, which prohibits a freed memory area from being reused for a certain period. The first condition for reuse is that the total size of the freed memory area is beyond the designated size. The threshold for the conditions of reuse of the freed memory area can be randomized by HeapRevolver. Furthermore, we add a second condition for reuse in which the freed memory area is merged with an adjacent freed memory area before release. Furthermore, HeapRevolver can be applied without modifying the target programs. In this paper, we describe the design and implementation of HeapRevolver in Linux and Windows, and report its evaluation results. The results show that HeapRevolver can prevent attacks that exploit existing UAF vulnerabilities. In addition, the overhead is small.

361-380hit(3183hit)