The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] system(3183hit)

1961-1980hit(3183hit)

  • Elliptic Curve Cryptosystem on Smart Card Access with Threshold Scheme

    Shyi-Tsong WU  

     
    PAPER-Information Security

      Vol:
    E86-A No:10
      Page(s):
    2569-2576

    The application of Elliptic Curve Cryptosystem has gained more and more attention. ECC uses smaller key size and lower memory requirement to retain the security level and can be a crucial factor in the smart card system. In this paper, an ECC based implementation of security schemes in smart card system to access control the door of some confidential places is proposed. The confidential place, for example a coffer, a strong room in the bank is used to store treasures as well as cashes, and where the mutual vigilance could be required. For the safety consideration, the going in and out a coffer by a person is not permissive but a group of authorized people. It involves the problem of secret sharing. The adopted solution of sharing secret is threshold scheme. Every participant possesses a secret shadow, which will be saved in the smart card. After correct reconstructing the shared secrets, it is permissible to access the coffer's door. For resisting dishonest participants, cheating detection and cheater identification will be included. The user can change his password of smart card freely and need not memorize his assigned lengthy password and shadow as traditional ID-based schemes makes our implementation much more user friendly.

  • On Stability of Singular Systems with Saturating Actuators

    Jia-Rong LIANG  Ho-Lim CHOI  Jong-Tae LIM  

     
    LETTER-Systems and Control

      Vol:
    E86-A No:10
      Page(s):
    2700-2703

    This paper investigates the stability problem of singular systems with saturation actuators. A Lyapunov method is employed to give the sufficient conditions for stability of closed-loop systems with saturation actuators. The controller is designed to satisfy the requirement for stability under the nonlinear saturation. In addition, a method is presented for estimating the domain of attraction of the origin.

  • The Theory of Software Reliability Corroboration

    Bojan CUKIC  Erdogan GUNEL  Harshinder SINGH  Lan GUO  

     
    PAPER-Testing

      Vol:
    E86-D No:10
      Page(s):
    2121-2129

    Software certification is a notoriously difficult problem. From software reliability engineering perspective, certification process must provide evidence that the program meets or exceeds the required level of reliability. When certifying the reliability of a high assurance system very few, if any, failures are observed by testing. In statistical estimation theory the probability of an event is estimated by determining the proportion of the times it occurs in a fixed number of trials. In absence of failures, the number of required certification tests becomes impractically large. We suggest that subjective reliability estimation from the development lifecycle, based on observed behavior or the reflection of one's belief in the system quality, be included in certification. In statistical terms, we hypothesize that a system failure occurs with the hypothesized probability. Presumed reliability needs to be corroborated by statistical testing during the reliability certification phase. As evidence relevant to the hypothesis increases, we change the degree of belief in the hypothesis. Depending on the corroboration evidence, the system is either certified or rejected. The advantage of the proposed theory is an economically acceptable number of required system certification tests, even for high assurance systems so far considered impossible to certify.

  • High-Assurance Video Conference System over the Internet

    Masayuki ARAI  Hitoshi KUROSU  Mamoru OHARA  Ryo SUZUKI  Satoshi FUKUMOTO  Kazuhiko IWASAKI  

     
    PAPER-Network Systems and Applications

      Vol:
    E86-B No:10
      Page(s):
    2940-2947

    In video conference systems over the Internet, audio and video data are often lost due to UDP packet losses, resulting in degradation of assurance. In this paper we describe a high-assurance video conference system applying the following two techniques: (1) packet loss recovery using convolutional codes, which improves the assurance of communication; and (2) Xcast, a multicast scheme that is designed for relatively small groups, reducing the bandwidth required for a multi-point conference. We added these functions to a GateKeeper (GK), a device used in conventional conference systems. Encoding/decoding and Xcast routing were then implemented as the upper layer for the UDP. We examined the functions of the system over the Internet in a multi-point conference between three sites around Tokyo, as well as a conference between Tokyo and Korea. We also investigated the effectiveness of the proposed system in experiments using an Internet simulator. Experimental results showed that the quality of received picture was improved in comparison with the case where no encoding schemes were applied.

  • Autonomous Integration and Optimal Allocation of Heterogeneous Information Services for High-Assurance in Distributed Information Service System

    Xiaodong LU  Kinji MORI  

     
    PAPER-Agent-Based Systems

      Vol:
    E86-D No:10
      Page(s):
    2087-2094

    Information service provision and utilization is an important infrastructure in the high-assurance distributed information service system. In order to cope with the rapidly evolving situations of providers' and users' heterogeneous requirements, one autonomous information service system has been proposed, called Faded Information Field (FIF). FIF is a distributed information service system architecture, sustained by push/pull mobile agents, through a recursive demand-oriented provision of the most popular information closer to the users to make a tradeoff between the cost of service allocation and access. In this system, users' requests are autonomously driven by pull mobile agents in charge of finding the relevant service. In the case of a mono-service request, the system is designed to reduce the time needed for users to access the information and to preserve the consistency of the replicas. However, when the user requests joint selection of multiple services, synchronization of atomic actions and timeliness have to be assured by the system. In this paper, the relationship that exists among the contents, properties and access ratios of information services is clarified. Based on these factors, the ratio of correlation and degree of satisfaction are defined and the autonomous integration and optimal allocation of information services for heterogeneous FIFs to provide one-stop service for users' multi-service requirements are proposed. The effectiveness of the proposed technology is shown through evaluation and the results show that the integrated services can reduce the total users access time and increase services consumption compared with separate systems.

  • Over 40-Gbit/s InP HEMT ICs for Optical Communication Systems

    Toshihide SUZUKI  Yasuhiro NAKASHA  Hideki KANO  Masaru SATO  Satoshi MASUDA  Ken SAWADA  Kozo MAKIYAMA  Tsuyoshi TAKAHASHI  Tatsuya HIROSE  Naoki HARA  Masahiko TAKIGAWA  

     
    INVITED PAPER

      Vol:
    E86-C No:10
      Page(s):
    1916-1922

    In this paper, we describe the operation of circuits capable of more than 40-Gbit/s that we have developed using InP HEMT technology. For example, we succeeded in obtaining 43-Gbit/s operation for a full-rate 4:1Multiplier (MUX), 50-Gbit/s operation for a Demultiplexer (DEMUX), 50-Gbit/s operation for a D-type flip-flop (D-FF), and a preamplifier with a bandwidth of 40 GHz. In addition, the achievement of 90-Gbit/s operation for a 2:1MUX and a distributed amplifier with over 110-GHz bandwidth indicates that InP HEMT technology is promising for system operations of over 100 Gbit/s. To achieve these results, we also developed several design techniques to improve frequency response above 80 GHz including a symmetric and separated layout of differential elements in the basic SCFL gate and inverted microstrip.

  • On-Line Writer Recognition for Thai Numeral

    Pitak THUMWARIN  Takenobu MATSUURA  

     
    PAPER-Source Coding/Image Processing

      Vol:
    E86-A No:10
      Page(s):
    2535-2541

    In this paper, we propose an on-line writer recognition method for Thai numeral. A handwriting process is characterized by a change of numeral's shape, which is represented by two features, a displacement of pen-point position and an area of triangle determined from the two adjacent points of pen-point position and the origin. First, the above two features are expanded into Fourier series. Secondly, in order to describe feature of handwriting, FIR (Finite impulse response) system having the above Fourier coefficients as input and output of the system is introduced. The impulse response of the FIR system is used as the feature of handwriting. Furthermore, K-L expansion of the obtained impulse response is used to recognize writer. Writer recognition experiments are performed by using 3,770 data collected by 54 Thai writers for one year. The average of Type I (false rejection) error rate and Type II (false acceptance) error rate were 2.16% and 1.12%, respectively.

  • Nonlinear System Control Using Compensatory Neuro-Fuzzy Networks

    Cheng-Jian LIN  Cheng-Hung CHEN  

     
    PAPER-Optimization and Control

      Vol:
    E86-A No:9
      Page(s):
    2309-2316

    In this paper, a Compensatory Neuro-Fuzzy Network (CNFN) for nonlinear system control is proposed. The compensatory fuzzy reasoning method is using adaptive fuzzy operations of neural fuzzy network that can make the fuzzy logic system more adaptive and effective. An on-line learning algorithm is proposed to automatically construct the CNFN. They are created and adapted as on-line learning proceeds via simultaneous structure and parameter learning. The structure learning is based on the fuzzy similarity measure and the parameter learning is based on backpropagation algorithm. The advantages of the proposed learning algorithm are that it converges quickly and the obtained fuzzy rules are more precise. The performance of CNFN compares excellently with other various exiting model.

  • The State Feedback Control Based on Fuzzy Observer for T-S Fuzzy Systems with Unknown Time-Delay

    Hyunseok SHIN  Euntai KIM  Mignon PARK  

     
    PAPER-Systems and Control

      Vol:
    E86-A No:9
      Page(s):
    2333-2339

    In this paper, we present an output feedback controller using a fuzzy controller and observer for nonlinear systems with unknown time-delay. Recently, Cao et al. proposed a stabilization method for the nonlinear time-delay systems using a fuzzy controller when the time-delay is known. In general, however, it is impossible to know or measure this time-varying delay. The proposed method requires only the upper bound of the derivative of the time-delay. We represent the nonlinear system with the unknown time-delay by Takagi-Sugeno (T-S) fuzzy model and design the fuzzy controller and observer for the systems using the parallel distributed compensation (PDC) scheme. In addition, we derive the sufficient condition for the asymptotic stability of the equilibrium point by applying Lyapunov-Krasovskii theorem to the closed-loop system and solve the condition in the formulation of LMI. Finally, computer simulations are included to demonstrate the effectiveness of the suggested method.

  • A New Approach to Fuzzy Modeling Using an Extended Kernel Method

    Jongcheol KIM  Taewon KIM  Yasuo SUGA  

     
    PAPER-Neuro, Fuzzy, GA

      Vol:
    E86-A No:9
      Page(s):
    2262-2269

    This paper proposes a new approach to fuzzy inference system for modeling nonlinear systems based on measured input and output data. In the suggested fuzzy inference system, the number of fuzzy rules and parameter values of membership functions are automatically decided by using the extended kernel method. The extended kernel method individually performs linear transformation and kernel mapping. Linear transformation projects input space into linearly transformed input space. Kernel mapping projects linearly transformed input space into high dimensional feature space. Especially, the process of linear transformation is needed in order to solve difficulty determining the type of kernel function which presents the nonlinear mapping in according to nonlinear system. The structure of the proposed fuzzy inference system is equal to a Takagi-Sugeno fuzzy model whose input variables are weighted linear combinations of input variables. In addition, the number of fuzzy rules can be reduced under the condition of optimizing a given criterion by adjusting linear transformation matrix and parameter values of kernel functions using the gradient descent method. Once a structure is selected, coefficients in consequent part are determined by the least square method. Simulated results of the proposed technique are illustrated by examples involving benchmark nonlinear systems.

  • An Electronic Voting Protocol Preserving Voter's Privacy

    Hiroshi YAMAGUCHI  Atsushi KITAZAWA  Hiroshi DOI  Kaoru KUROSAWA  Shigeo TSUJII  

     
    PAPER-Applications of Information Security Techniques

      Vol:
    E86-D No:9
      Page(s):
    1868-1878

    In this paper we present a new, two-centered electronic voting scheme that is capable of preserving privacy, universal verifiability, and robustness. An interesting property of our scheme is the use of double encryption with additive homomorphic encryption functions. In the two-centered scheme, the first center decrypts the ballots, checks the eligibility of the voters, and multiplies each eligible vote, which is still encrypted in the cryptosystem of the second center. After the deadline is reached, the second center obtains the final tally by decrypting the accumulated votes. As such, both centers cannot know the content of any individual vote, as each vote is hidden in the accumulated result, therefore the privacy of the voters is preserved. Our protocols, together with some existing protocols, allow everyone to verify that all valid votes are correctly counted. We apply the r-th residue cryptosystem as the homomorphic encryption function. Although decryption in the r-th residue cryptosystem requires an exhaustive search for all possible values, based on experiments we show that it is possible to achieve desirable performance for large-scale elections.

  • Zero Crossing Statistics of Chaos-Based FM Clock Signals

    Stefano SANTI  Riccardo ROVATTI  Gianluca SETTI  

     
    PAPER-Nonlinear Signal Processing and Coding

      Vol:
    E86-A No:9
      Page(s):
    2229-2240

    We investigate the statistical features of both random- and chaos-based FM timing signals to ascertain their applicability to digital circuits and systems. To achieve such a goal, we consider both the case of single- and two-phase logic and characterize the random variable representing, respectively, the time lag between two subsequent rising edges or between two consecutive zero-crossing points of the modulated timing signal. In particular, we determine its probability density and compute its mean value and variance for cases which are relevant for reducing Electromagnetic emissions. Finally, we address the possible problems of performance degradation in a digital system driven by a modulated timing signal and to cope with this we give some guidelines for the proper choice of the statistical properties of the modulating signals.

  • Design of a Low-Power Configurable-Way Cache Applied in Multiprocessor Systems

    Hsin-Chuan CHEN  Jen-Shiun CHIANG  

     
    PAPER-Networking and Architectures

      Vol:
    E86-D No:9
      Page(s):
    1542-1548

    In the design of a set-associative cache, maintaining low average access time and reducing the average energy dissipation are important issues. In this paper, we propose a set-associative cache that can provide the flexibility to configure its associativity according to different program behaviors, which means that the proposed cache scheme can be configured from n-way set-associative cache to direct-mapped cache. Besides, the proposed cache scheme also can disable all tag-subarrays and only enable a desired data-subarray when adjacent memory references are within the same block as the previous access. By this scheme, the power consumption can be saved when an n-way set-associative cache configures the cache with lower associativity (less than n) due to only enabling fewer subarrays of the tag memory and data memory, and when the tag checking is eliminated for the intra-block access due to disabling all subarrays of the tag memory. However, the performance is still maintained to the same as the conventional set-associative cache or the direct-mapped cache.

  • Secure Distributed Configuration Management with Randomised Scheduling of System-Administration Tasks

    Frode EIKA SANDNES  

     
    PAPER-Algorithms and Applications

      Vol:
    E86-D No:9
      Page(s):
    1601-1610

    Distributed configuration management involves maintaining a set of distributed storage and processing resources in such a way that they serve a community of users fairly, promptly, reliably and securely. Security has recently received much attention due to the general anxiety of hacking. Parallel computing systems such as clusters of workstations are no exception to this threat. This paper discusses experiments that measure the effect of employing randomisation in the scheduling of interdependent user and management tasks onto a distributed system such as clusters of workstations. Two attributes are investigated, namely performance and security. Performance is usually the prime objective in task scheduling. In this work the scheduling problem is viewed as a multi-objective optimisation problem where there is a subtle balance between efficient schedules and security. A schedule is secure if it is not vulnerable to malicious acts or inadvertent human errors. Further, the scheduling model should be hidden from unauthorised observers. The results of the study support the use of randomisation in the scheduling of tasks over an insecure network of processing nodes inhabited by malicious users.

  • Delayed Feedback Guaranteed Cost Controller Design for Uncertain Time-Delay Systems

    Ohmin KWON  Sangchul WON  Dong YUE  

     
    LETTER-Systems and Control

      Vol:
    E86-A No:9
      Page(s):
    2413-2418

    In this paper, we propose a delayed feedback guaranteed cost controller design method for uncertain linear systems with delays in states. Based on the Lyapunov method, an LMI optimization problem is formulated to design a delayed feedback controller which minimizes the upper bound of a given quadratic cost function. Numerical examples show the effectiveness of the proposed method.

  • A Performance Study of Task Allocation Algorithms in a Distributed Computing System (DCS)

    Biplab KUMER SARKER  Anil KUMAR TRIPATHI  Deo PRAKASH VIDYARTHI  Kuniaki UEHARA  

     
    PAPER-Algorithms and Applications

      Vol:
    E86-D No:9
      Page(s):
    1611-1619

    A Distributed Computing System (DCS) contributes in proper partitioning of the tasks into modules and allocating them to various nodes so as to enable parallel execution of their modules by individual different processing nodes of the system. The scheduling of various modules on particular processing nodes may be preceded by appropriate allocation of modules of the different tasks to various processing nodes and then only the appropriate execution characteristic can be obtained. A number of algorithms have been proposed for allocation of tasks in a DCS. Most of the solutions proposed had simplifying assumptions. The very first assumption has been: consideration of a single task with their corresponding modules only; second, no consideration of the status of processing nodes in terms of the previously allocated modules of various tasks and third, the capacity and capability of the processing nodes. This work proposes algorithms for a realistic situation wherein multiple tasks with their modules compete for execution on a DCS dynamically considering their architectural capability. In this work, we propose two algorithms based on the two well-known A* and GA for the task allocation models. The paper explains the algorithms elaborately by illustrated examples and presents a comparative performance study among our algorithms and the algorithms for task allocation proposed in the various literatures. The results demonstrate that our GA based task allocation algorithm achieves better performance compared with the other algorithms.

  • Capacity Estimation of SIR-Based Power Controlled CDMA Cellular Systems in Presence of Power Control Error

    Lin WANG  A. Hamid AGHVAMI  Williams G. CHAMBERS  

     
    LETTER-Wireless Communication Technology

      Vol:
    E86-B No:9
      Page(s):
    2774-2776

    Power control error is well known for its negative effects on CDMA system capacity. In this Letter, an analytical model is developed to estimate the uplink capacity for a SIR-based power controlled CDMA cellular system. The voice capacity reduction due to power control error is numerically examined with this model.

  • Blind Estimation of Symbol Timing and Carrier Frequency Offset in Time-Varying Multipath Channels for OFDM Systems

    Tiejun LV  Qun WAN  

     
    PAPER-Wireless Communication Technology

      Vol:
    E86-B No:9
      Page(s):
    2665-2671

    In this paper, a novel algorithm is presented for blind estimation of the symbol timing and frequency offset for OFDM systems. Time-varying frequency-selective Rayleigh fading multipath channel is considered, which is characterized by the power delay profile and time-varying scattering function and has high reliability for real-world mobile environment. The estimators exploit the intrinsic structures of OFDM signals and rely on the second-order moment rather than the probability distribution function of the received signals. They are totally optimum in sense of minimum mean-square-error and can be implemented easily. In addition, we have presented an improved approach which not only preserves the merits of previously proposed method, but also makes the estimation range of the frequency offset cover the entire subcarrier spacing of OFDM signals and the timing estimator be independent of the frequency offset.

  • Uplink Packet Transmission Control for Asymmetric Traffic in CDMA/Shared-TDD Cellular Packet Communications

    Kazuo MORI  Tomotaka NAGAOSA  Hideo KOBAYASHI  

     
    PAPER-Wireless Communication Technology

      Vol:
    E86-B No:9
      Page(s):
    2620-2627

    A shared-TDD scheme has been proposed for accommodation of asymmetric communications between uplink and downlink traffic. The application of shared-TDD scheme to CDMA cellular systems causes inter-link interference because CDMA cellular systems use the same frequency band for all cells. This paper proposes a transmission control scheme for uplink packets to relieve the effect of inter-link interference in CDMA/shared-TDD cellular packet systems. In the proposed scheme, mobile stations select transmission slots based on their location and the status of slot allocations in own and the adjacent cells. Computer simulations show that the proposed scheme relieves the effect of inter-link interference, and thus improves the downlink transmission efficiency.

  • A Collaborative Personal Repository System and Its Information Retrieval Scheme

    Takashi YUKAWA  Sen YOSHIDA  Kazuhiro KUWABARA  

     
    PAPER

      Vol:
    E86-D No:9
      Page(s):
    1788-1795

    A framework is described for a peer-to-peer information exchange system, and a collaborative information retrieval (IR) scheme for the system is proposed. The aims of the system include smooth knowledge and information management to activate organizations or communities. Conventional server-centric systems are weak because they create information-providing bottlenecks. Accordingly, the proposed framework targets the collaborative inter-working of personal repositories that accumulate per-user information, and accept and service requests. Issues concerning the framework are addressed. One issue is the retrieval of information from another's personal repository; the retrieval criteria of a system are tightly personalized for its user. The system is assumed to employ a vector space model with a concept-base as its IR mechanism. The vector space on one system is very different from that on another system. Another issue is the automated control of the information-providing criteria. This paper presents solutions to the first problem. To achieve IR that provides satisfactory results to a user requiring information from another's personal repository, we need vector space equalization to compensate for the differences in the vector spaces of the personal repositories. The paper presents a vector space equalization scheme, the automated relevance feedback scheme, that compensates the differences in the vector spaces of the personal repositories. We implement the scheme as a system and evaluate its performance using documents on the Internet.

1961-1980hit(3183hit)