The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] system(3183hit)

441-460hit(3183hit)

  • Broadcast Network-Based Sender Based Message Logging for Overcoming Multiple Failures

    Jinho AHN  

     
    LETTER-Dependable Computing

      Pubricized:
    2016/10/18
      Vol:
    E100-D No:1
      Page(s):
    206-210

    All the existing sender-based message logging (SBML) protocols share a well-known limitation that they cannot tolerate concurrent failures. In this paper, we analyze the cause for this limitation in a unicast network environment, and present an enhanced SBML protocol to overcome this shortcoming while preserving the strengths of SBML. When the processes on different nodes execute a distributed application together in a broadcast network, this new protocol replicates the log information of each message to volatile storages of other processes within the same broadcast network. It may reduce the communication overhead for the log replication by taking advantage of the broadcast nature of the network. Simulation results show our protocol performs better than the traditional one modified to tolerate concurrent failures in terms of failure-free execution time regardless of distributed application communication pattern.

  • An Encryption-then-Compression System for Lossless Image Compression Standards

    Kenta KURIHARA  Shoko IMAIZUMI  Sayaka SHIOTA  Hitoshi KIYA  

     
    LETTER

      Pubricized:
    2016/10/07
      Vol:
    E100-D No:1
      Page(s):
    52-56

    In many multimedia applications, image encryption has to be conducted prior to image compression. This letter proposes an Encryption-then-Compression system using JPEG XR/JPEG-LS friendly perceptual encryption method, which enables to be conducted prior to the JPEG XR/JPEG-LS standard used as an international standard lossless compression method. The proposed encryption scheme can provides approximately the same compression performance as that of the lossless compression without any encryption. It is also shown that the proposed system consists of four block-based encryption steps, and provides a reasonably high level of security. Existing conventional encryption methods have not been designed for international lossless compression standards, but for the first time this letter focuses on applying the standards.

  • Blind Channel Estimation by EM Algorithm for OFDM Systems

    Hirokazu ABE  Masahiro FUJII  Takanori IWAMATSU  Hiroyuki HATANO  Atsushi ITO  Yu WATANABE  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    210-218

    It is necessary to estimate channel state information coherently to equalize the received signal in wireless communication systems. The pilot symbol, known at the receiver, aided channel estimator degrades the transmission efficiency because it requires the signal spaces and the energy for the transmission. In this paper, we assume a fixed wireless communication system in line of sight slowly varying channel and propose a new blind channel estimation method without help from the pilot symbol for Orthogonal Frequency Division Multiplexing systems. The proposed estimator makes use of the Expectation-Maximization algorithm and the correlation property among the channel frequency responses by considering the assumed channel environment. By computer simulations, we show that the proposed estimator can asymptotically achieve bit error rate performance by using the ideal channel estimation.

  • Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field

    Yasufumi HASHIMOTO  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    18-25

    One of major ideas to design a multivariate public key cryptosystem (MPKC) is to generate its quadratic forms by a polynomial map over an extension field. In fact, Matsumoto-Imai's scheme (1988), HFE (Patarin, 1996), MFE (Wang et al., 2006) and multi-HFE (Chen et al., 2008) are constructed in this way and Sflash (Akkar et al., 2003), Quartz (Patarin et al., 2001), Gui (Petzoldt et al, 2015) are variants of these schemes. An advantage of such extension field type MPKCs is to reduce the numbers of variables and equations to be solved in the decryption process. In the present paper, we study the security of MPKCs whose quadratic forms are derived from a “quadratic” map over an extension field and propose a new attack on such MPKCs. Our attack recovers partial information of the secret affine maps in polynomial time when the field is of odd characteristic. Once such partial information is recovered, the attacker can find the plain-text for a given cipher-text by solving a system of quadratic equations over the extension field whose numbers of variables and equations are same to those of the system of quadratic equations used in the decryption process.

  • Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems

    Seondong HEO  Soojin LEE  Bumsoon JANG  Hyunsoo YOON  

     
    PAPER-Dependable Computing

      Pubricized:
    2016/09/29
      Vol:
    E100-D No:1
      Page(s):
    118-129

    Research on intrusion-tolerant systems (ITSs) is being conducted to protect critical systems which provide useful information services. To provide services reliably, these critical systems must not have even a single point of failure (SPOF). Therefore, most ITSs employ redundant components to eliminate the SPOF problem and improve system reliability. However, systems that include identical components have common vulnerabilities that can be exploited to attack the servers. Attackers prefer to exploit these common vulnerabilities rather than general vulnerabilities because the former might provide an opportunity to compromise several servers. In this study, we analyze software vulnerability data from the National Vulnerability Database (NVD). Based on the analysis results, we present a scheme that finds software combinations that minimize the risk of common vulnerabilities. We implement this scheme with CSIM20, and simulation results prove that the proposed scheme is appropriate for a recovery-based intrusion tolerant architecture.

  • Blind Identification of Multichannel Systems Based on Sparse Bayesian Learning

    Kai ZHANG  Hongyi YU  Yunpeng HU  Zhixiang SHEN  Siyu TAO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/06/28
      Vol:
    E99-B No:12
      Page(s):
    2614-2622

    Reliable wireless communication often requires accurate knowledge of the underlying multipath channels. Numerous measurement campaigns have shown that physical multipath channels tend to exhibit a sparse structure. Conventional blind channel identification (BCI) strategies such as the least squares, which are known to be optimal under the assumption of rich multipath channels, are ill-suited to exploiting the inherent sparse nature of multipath channels. Recently, l1-norm regularized least-squares-type approaches have been proposed to address this problem with a single parameter governing all coefficients, which is equivalent to maximum a posteriori probability estimation with a Laplacian prior for the channel coefficients. Since Laplace prior is not conjugate to the Gaussian likelihood, no closed form of Bayesian inference is possible. Following a different approach, this paper deals with blind channel identification of a single-input multiple-output (SIMO) system based on sparse Bayesian learning (SBL). The inherent sparse nature of wireless multipath channels is exploited by incorporating a transformative cross relation formulation into a general Bayesian framework, in which the filter coefficients are governed by independent scalar parameters. A fast iterative Bayesian inference method is then applied to the proposed model for obtaining sparse solutions, which completely eliminates the need for computationally costly parameter fine tuning, which is necessary in the l1-norm regularization method. Simulation results are provided to demonstrate the superior effectiveness of the proposed channel estimation algorithm over the conventional least squares (LS) scheme as well as the l1-norm regularization method. It is shown that the proposed algorithm exhibits superior estimation performance compared to both LS and l1-norm regularization methods.

  • General, Practical and Accurate Models for the Performance Analysis of Multi-Cache Systems

    Haoqiu HUANG  Lanlan RUI  Weiwei ZHENG  Danmei NIU  Xuesong QIU  Sujie SHAO  

     
    PAPER

      Vol:
    E99-B No:12
      Page(s):
    2559-2573

    In this work, we propose general, practical and accurate models to analyze the performance of multi-cache systems, in which a cache forwards its miss stream (i.e., requests which have not found the target item) to other caches. We extend a miss stream modeling technique originally known as Melazzi's approximation, which provides a simple but accurate approximate analysis for caches with cascade configurations. We consider several practical replication strategies, which have been commonly adopted in the context of ICN, taking into account the effects of temporal locality. Also, we capture the existing state correlations between neighboring caches by exploiting the cache eviction time. Our proposed models to handle traffic patterns allow us to go beyond the standard Poisson approximation under Independent Reference Model. Our results, validated against simulations, provide interesting insights into the performance of multi-cache systems with different replication strategies.

  • RFS: An LSM-Tree-Based File System for Enhanced Microdata Performance

    Lixin WANG  Yutong LU  Wei ZHANG  Yan LEI  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2016/09/06
      Vol:
    E99-D No:12
      Page(s):
    3035-3046

    File system workloads are increasing write-heavy. The growing capacity of RAM in modern nodes allows many reads to be satisfied from memory while writes must be persisted to disk. Today's sophisticated local file systems like Ext4, XFS and Btrfs optimize for reads but suffer from workloads dominated by microdata (including metadata and tiny files). In this paper we present an LSM-tree-based file system, RFS, which aims to take advantages of the write optimization of LSM-tree to provide enhanced microdata performance, while offering matching performance for large files. RFS incrementally partitions the namespace into several metadata columns on a per-directory basis, preserving disk locality for directories and reducing the write amplification of LSM-trees. A write-ordered log-structured layout is used to store small files efficiently, rather than embedding the contents of small files into inodes. We also propose an optimization of global bloom filters for efficient point lookups. Experiments show our library version of RFS can handle microwrite-intensive workloads 2-10 times faster than existing solutions such as Ext4, Btrfs and XFS.

  • Set-to-Set Disjoint Paths Routing in Torus-Connected Cycles

    Antoine BOSSARD  Keiichi KANEKO  

     
    LETTER-Dependable Computing

      Pubricized:
    2016/08/10
      Vol:
    E99-D No:11
      Page(s):
    2821-2823

    Extending the very popular tori interconnection networks[1]-[3], Torus-Connected Cycles (TCC) have been proposed as a novel network topology for massively parallel systems [5]. Here, the set-to-set disjoint paths routing problem in a TCC is solved. In a TCC(k,n), it is proved that paths of lengths at most kn2+2n can be selected in O(kn2) time.

  • Revisiting the Regression between Raw Outputs of Image Quality Metrics and Ground Truth Measurements

    Chanho JUNG  Sanghyun JOO  Do-Won NAM  Wonjun KIM  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2016/08/08
      Vol:
    E99-D No:11
      Page(s):
    2778-2787

    In this paper, we aim to investigate the potential usefulness of machine learning in image quality assessment (IQA). Most previous studies have focused on designing effective image quality metrics (IQMs), and significant advances have been made in the development of IQMs over the last decade. Here, our goal is to improve prediction outcomes of “any” given image quality metric. We call this the “IQM's Outcome Improvement” problem, in order to distinguish the proposed approach from the existing IQA approaches. We propose a method that focuses on the underlying IQM and improves its prediction results by using machine learning techniques. Extensive experiments have been conducted on three different publicly available image databases. Particularly, through both 1) in-database and 2) cross-database validations, the generality and technological feasibility (in real-world applications) of our machine-learning-based algorithm have been evaluated. Our results demonstrate that the proposed framework improves prediction outcomes of various existing commonly used IQMs (e.g., MSE, PSNR, SSIM-based IQMs, etc.) in terms of not only prediction accuracy, but also prediction monotonicity.

  • Periodic-Like Trajectories in Master-Slave Coupled Piecewise Constant Spiking Oscillators

    Yusuke MATSUOKA  

     
    PAPER-Nonlinear Problems

      Vol:
    E99-A No:11
      Page(s):
    2049-2059

    This paper considers the behavior of a master-slave system of two coupled piecewise constant spiking oscillators (PWCSOs). The master of this system exhibits chaos and outputs a chaotic sequence of spikes, which are used as input to the slave. The slave exhibits a periodic-like trajectory (PLT) that is chaotic but that appears to be periodic in the phase plane. We theoretically investigate the generating region of the PLT in the parameter space. Using a test circuit, we confirm the typical phenomena of this coupled system.

  • Interference Cancellation Employing Replica Selection Algorithm and Neural Network Power Control for MIMO Small Cell Networks

    Michael Andri WIJAYA  Kazuhiko FUKAWA  Hiroshi SUZUKI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/06/02
      Vol:
    E99-B No:11
      Page(s):
    2414-2425

    In a network with dense deployment of multiple-input multiple-output (MIMO) small cells, coverage overlap between the small cells produces intercell-interference, which degrades system capacity. This paper proposes an intercell-interference management (IIM) scheme that aims to maximize system capacity by using both power control for intercell-interference coordination (ICIC) on the transmitter side and interference cancellation (IC) on the receiver side. The power control determines transmit power levels at the base stations (BSs) by employing a neural network (NN) algorithm over the backhaul. To further improve the signal to interference plus noise ratio (SINR), every user terminal (UT) employs a multiuser detector (MUD) as IC. The MUD detects not only the desired signals, but also some interfering signals to be cancelled from received signals. The receiver structure consists of branch metric generators (BMGs) and MUD. BMGs suppress residual interference and noise in the received signals by whitening matched filters (WMFs), and then generate metrices by using the WMFs' outputs and symbol candidates that the MUD provides. On the basis of the metrices, the MUD detects both the selected interfering signals and the desired signals. In addition, the MUD determines which interfering signals are detected by an SINR based replica selection algorithm. Computer simulations demonstrate that the SINR based replica selection algorithm, which is combined with channel encoders and packet interleavers, can significantly improve the system bit error rate (BER) and that combining IC at the receiver with NN power control at the transmitter can considerably increase the system capacity. Furthermore, it is shown that choosing the detected interfering signals by the replica selection algorithm can obtain system capacity with comparable loss and less computational complexity compared to the conventional greedy algorithm.

  • An Index Based on Irregular Identifier Space Partition for Quick Multiple Data Access in Wireless Data Broadcasting

    SeokJin IM  HeeJoung HWANG  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2016/07/20
      Vol:
    E99-D No:11
      Page(s):
    2809-2813

    This letter proposes an Index based on Irregular Partition of data identifiers (IIP), to enable clients to quickly access multiple data items on a wireless broadcast channel. IIP improves the access time by reducing the index waiting time when clients access multiple data items, through the use of irregular partitioning of the identifier space of data items. Our performance evaluation shows that with respect to access time, the proposed IIP outperforms the existing index schemes supporting multiple data access.

  • A Machine Learning Model for Wide Area Network Intelligence with Application to Multimedia Service

    Yiqiang SHENG  Jinlin WANG  Yi LIAO  Zhenyu ZHAO  

     
    PAPER

      Vol:
    E99-B No:11
      Page(s):
    2263-2270

    Network intelligence is a discipline that builds on the capabilities of network systems to act intelligently by the usage of network resources for delivering high-quality services in a changing environment. Wide area network intelligence is a class of network intelligence in wide area network which covers the core and the edge of Internet. In this paper, we propose a system based on machine learning for wide area network intelligence. The whole system consists of a core machine for pre-training and many terminal machines to accomplish faster responses. Each machine is one of dual-hemisphere models which are made of left and right hemispheres. The left hemisphere is used to improve latency by terminal response and the right hemisphere is used to improve communication by data generation. In an application on multimedia service, the proposed model is superior to the latest deep feed forward neural network in the data center with respect to the accuracy, latency and communication. Evaluation shows scalable improvement with regard to the number of terminal machines. Evaluation also shows the cost of improvement is longer learning time.

  • LAB-LRU: A Life-Aware Buffer Management Algorithm for NAND Flash Memory

    Liyu WANG  Lan CHEN  Xiaoran HAO  

     
    LETTER-Computer System

      Pubricized:
    2016/06/21
      Vol:
    E99-D No:10
      Page(s):
    2633-2637

    NAND flash memory has been widely used in storage systems. Aiming to design an efficient buffer policy for NAND flash memory, a life-aware buffer management algorithm named LAB-LRU is proposed, which manages the buffer by three LRU lists. A life value is defined for every page and the active pages with higher life value can stay longer in the buffer. The definition of life value considers the effect of access frequency, recency and the cost of flash read and write operations. A series of trace-driven simulations are carried out and the experimental results show that the proposed LAB-LRU algorithm outperforms the previous best-known algorithms significantly in terms of the buffer hit ratio, the numbers of flash write and read operations and overall runtime.

  • Steady-versus-Transient Plot for Analysis of Digital Maps

    Hiroki YAMAOKA  Toshimichi SAITO  

     
    PAPER-Nonlinear Problems

      Vol:
    E99-A No:10
      Page(s):
    1806-1812

    A digital map is a simple dynamical system that is related to various digital dynamical systems including cellular automata, dynamic binary neural networks, and digital spiking neurons. Depending on parameters and initial condition, the map can exhibit various periodic orbits and transient phenomena to them. In order to analyze the dynamics, we present two simple feature quantities. The first and second quantities characterize the plentifulness of the periodic phenomena and the deviation of the transient phenomena, respectively. Using the two feature quantities, we construct the steady-versus-transient plot that is useful in the visualization and consideration of various digital dynamical systems. As a first step, we demonstrate analysis results for an example of the digital maps based on analog bifurcating neuron models.

  • Application of Non-Orthogonal Multiple Access Scheme for Satellite Downlink in Satellite/Terrestrial Integrated Mobile Communication System with Dual Satellites

    Eiji OKAMOTO  Hiroyuki TSUJI  

     
    PAPER

      Vol:
    E99-B No:10
      Page(s):
    2146-2155

    In satellite/terrestrial integrated mobile communication systems (STICSs), a user terminal directly connects both terrestrial and satellite base stations. STICS enables expansion of service areas and provides a robust communication service for large disasters. However, the cell radius of the satellite system is large (approximately 100km), and thus a capacity enhancement of the satellite subsystem for accommodating many users is needed. Therefore, in this paper, we propose an application of two methods — multiple-input multiple-output (MIMO) transmission using multi-satellites and non-orthogonal multiple access (NOMA) for STICS — to realize the performance improvement in terms of system capacity and user fairness. Through numerical simulations, we show that system capacity and user fairness are increased by the proposed scheme that applies the two methods.

  • Policy Optimization for Spoken Dialog Management Using Genetic Algorithm

    Hang REN  Qingwei ZHAO  Yonghong YAN  

     
    PAPER-Spoken dialog system

      Pubricized:
    2016/07/19
      Vol:
    E99-D No:10
      Page(s):
    2499-2507

    The optimization of spoken dialog management policies is a non-trivial task due to the erroneous inputs from speech recognition and language understanding modules. The dialog manager needs to ground uncertain semantic information at times to fully understand the need of human users and successfully complete the required dialog tasks. Approaches based on reinforcement learning are currently mainstream in academia and have been proved to be effective, especially when operating in noisy environments. However, in reinforcement learning the dialog strategy is often represented by complex numeric model and thus is incomprehensible to humans. The trained policies are very difficult for dialog system designers to verify or modify, which largely limits the deployment for commercial applications. In this paper we propose a novel framework for optimizing dialog policies specified in human-readable domain language using genetic algorithm. We present learning algorithms using user simulator and real human-machine dialog corpora. Empirical experimental results show that the proposed approach can achieve competitive performance on par with some state-of-the-art reinforcement learning algorithms, while maintaining a comprehensible policy structure.

  • Neural Network Approaches to Dialog Response Retrieval and Generation

    Lasguido NIO  Sakriani SAKTI  Graham NEUBIG  Koichiro YOSHINO  Satoshi NAKAMURA  

     
    PAPER-Spoken dialog system

      Pubricized:
    2016/07/19
      Vol:
    E99-D No:10
      Page(s):
    2508-2517

    In this work, we propose a new statistical model for building robust dialog systems using neural networks to either retrieve or generate dialog response based on an existing data sources. In the retrieval task, we propose an approach that uses paraphrase identification during the retrieval process. This is done by employing recursive autoencoders and dynamic pooling to determine whether two sentences with arbitrary length have the same meaning. For both the generation and retrieval tasks, we propose a model using long short term memory (LSTM) neural networks that works by first using an LSTM encoder to read in the user's utterance into a continuous vector-space representation, then using an LSTM decoder to generate the most probable word sequence. An evaluation based on objective and subjective metrics shows that the new proposed approaches have the ability to deal with user inputs that are not well covered in the database compared to standard example-based dialog baselines.

  • Shilling Attack Detection in Recommender Systems via Selecting Patterns Analysis

    Wentao LI  Min GAO  Hua LI  Jun ZENG  Qingyu XIONG  Sachio HIROKAWA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2016/06/27
      Vol:
    E99-D No:10
      Page(s):
    2600-2611

    Collaborative filtering (CF) has been widely used in recommender systems to generate personalized recommendations. However, recommender systems using CF are vulnerable to shilling attacks, in which attackers inject fake profiles to manipulate recommendation results. Thus, shilling attacks pose a threat to the credibility of recommender systems. Previous studies mainly derive features from characteristics of item ratings in user profiles to detect attackers, but the methods suffer from low accuracy when attackers adopt new rating patterns. To overcome this drawback, we derive features from properties of item popularity in user profiles, which are determined by users' different selecting patterns. This feature extraction method is based on the prior knowledge that attackers select items to rate with man-made rules while normal users do this according to their inner preferences. Then, machine learning classification approaches are exploited to make use of these features to detect and remove attackers. Experiment results on the MovieLens dataset and Amazon review dataset show that our proposed method improves detection performance. In addition, the results justify the practical value of features derived from selecting patterns.

441-460hit(3183hit)