The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] time(2217hit)

921-940hit(2217hit)

  • SA and SAR Analysis for Wearable UWB Body Area Applications

    Qiong WANG  Jianqing WANG  

     
    PAPER

      Vol:
    E92-B No:2
      Page(s):
    425-430

    With the rapid progress of electronic and information technology, an expectation for the realization of body area network (BAN) by means of ultra wide band (UWB) techniques has risen. Although the signal from a single UWB device is very low, the energy absorption may increase significantly when many UWB devices are simultaneously adorned to a human body. An analysis method is therefore required from the point of view of biological safety evaluation. In this study, two approaches, one is in the time domain and the other is in the frequency domain, are proposed for the specific energy absorption (SA) and the specific absorption rate (SAR) calculation. It is shown that the two approaches have the same accuracy but the time-domain approach is more straightforward in the numerical analysis. By using the time-domain approach, SA and SAR calculation results are given for multiple UWB pulse exposure to an anatomical human body model under the Federal Communications Commission (FCC) UWB limit.

  • Sliding Mode Control of a Class of Uncertain Nonlinear Time-Delay Systems Using LMI and TS Recurrent Fuzzy Neural Network

    Tung-Sheng CHIANG  Chian-Song CHIU  

     
    PAPER-Systems and Control

      Vol:
    E92-A No:1
      Page(s):
    252-262

    This paper proposes the sliding mode control using LMI techniques and adaptive recurrent fuzzy neural network (RFNN) for a class of uncertain nonlinear time-delay systems. First, a novel TS recurrent fuzzy neural network (TS-RFNN) is developed to provide more flexible and powerful compensation of system uncertainty. Then, the TS-RFNN based sliding model control is proposed for uncertain time-delay systems. In detail, sliding surface design is derived to cope with the non-Isidori-Bynes canonical form of dynamics, unknown delay time, and mismatched uncertainties. Based on the Lyapunov-Krasoviskii method, the asymptotic stability condition of the sliding motion is formulated into solving a Linear Matrix Inequality (LMI) problem which is independent on the time-varying delay. Furthermore, the input coupling uncertainty is also taken into our consideration. The overall controlled system achieves asymptotic stability even if considering poor modeling. The contributions include: i) asymptotic sliding surface is designed from solving a simple and legible delay-independent LMI; and ii) the TS-RFNN is more realizable (due to fewer fuzzy rules being used). Finally, simulation results demonstrate the validity of the proposed control scheme.

  • Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions

    Khoongming KHOO  Guanhan CHEW  Guang GONG  Hian-Kiat LEE  

     
    PAPER-Symmetric Cryptography

      Vol:
    E92-A No:1
      Page(s):
    11-21

    In this paper, we present the time-memory-data (TMD) trade-off attack on stream ciphers filter function generators and filter cominers based on Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-data trade-off attack of Mihaljevic and Imai on Toyocrypt. First, we substitute the filter function in Toyocrypt (which has the same size as the LFSR) with a general Maiorana-McFarland function. This allows us to apply the attack to a wider class of stream ciphers. Second, we highlight how the choice of different Maiorana-McFarland functions can affect the effectiveness of our attack. Third, we show that the attack can be modified to apply on filter functions which are smaller than the LFSR and on filter-combiner stream ciphers. This allows us to cryptanalyze other configurations commonly found in practice. Finally, filter functions with vector output are sometimes used in stream ciphers to improve the throughput. Therefore the case when the Maiorana-McFarland functions have vector output is investigated. We found that the extra speed comes at the price of additional weaknesses which make the attacks easier.

  • Fingerprinting Codes for Multimedia Data against Averaging Attack

    Hideki YAGI  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    PAPER-Application

      Vol:
    E92-A No:1
      Page(s):
    207-216

    Code construction for digital fingerprinting, which is a copyright protection technique for multimedia, is considered. Digital fingerprinting should deter collusion attacks, where several fingerprinted copies of the same content are mixed to disturb their fingerprints. In this paper, we consider the averaging attack, which is known to be effective for multimedia fingerprinting with the spread spectrum technique. We propose new methods for constructing fingerprinting codes to increase the coding rate of conventional fingerprinting codes, while they guarantee to identify the same number of colluders. Due to the new fingerprinting codes, the system can deal with a larger number of users to supply digital contents.

  • k-Times Anonymous Authentication

    Isamu TERANISHI  Jun FURUKAWA  Kazue SAKO  

     
    PAPER-Secure Protocol

      Vol:
    E92-A No:1
      Page(s):
    147-165

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  • Real-Time Color Correction Method for a Low-Cost Still/Video Camera

    Dongil HAN  Hak-Sung LEE  Chan IM  Seong Joon YOO  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E92-D No:1
      Page(s):
    97-101

    This paper describes a color correction method of low-cost still/video camera images. Instead of using complex and non-linear equations, the concept of a three-dimensional reduced resolution look-up table is used for the real-time color gamut expansion of low-cost cameras. The proposed method analyzes the color gamut of low cost cameras and constructs 3-dimensional rule tables during the off-line stage. And, real-time color correction is conducted using that rule table. The experimental result shows that output images have more vivid and natural colors compared with originals. The proposed method can be easily implemented with small software and/or hardware resources.

  • Flexible Timed-Release Encryption

    Maki YOSHIDA  Toru FUJIWARA  

     
    LETTER

      Vol:
    E92-A No:1
      Page(s):
    222-225

    This paper presents a new scheme for Timed-Release Encryption (TRE), which is mainly designed for global use. TRE aims to control the timing of disclosing information. The major approach to TRE assumes that any participants can receive a time token broadcasted by a trusted agent, called a time server. Our scheme is based on this approach and allows participants to generate an encrypted message that can be decrypted using designated or any authenticated time servers including even those which are authenticated after encryption. In this sense, our scheme has a more flexible framework in terms of message decryption.

  • Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate

    Kouichi ITOH  Tetsuya IZU  Wakaha OGATA  Takeshi SHIMOYAMA  Masahiko TAKENAKA  

     
    PAPER-Digital Signature

      Vol:
    E92-A No:1
      Page(s):
    67-75

    This paper studies two types of documents in which an adversary can forge a signature on a chosen document. One type is that a nonce is padded on an input document. The time-stamp protocol is a good example of this type. Another is a structured document (such as PS or PDF) whose contents are described in a body part and information (such as generated time and a generator) are in a meta part. In fact, this paper shows how to forge a time-stamp, a signature on a PDF and an X.509 certificate by the extended forgery attack and numerical examples. Forged signature by the original or the extended attacks is only accepted by the clients whose length check of zero-field is loosely implemented. As a result, we found that the latest versions of Adobe's Acrobat and Acrobat Reader accept the forged time-stamp and the forged signature on a PDF document. Target of this attack is RSASSA-PKCS1-v1_5, which does not have provable security. We also show the expanded attack might forge the signature of RSASSA-PSS, which has provable security, when the length check of zero-field is omitted or loosely implemented.

  • Visualization and Formalization of User Constraints for Tight Estimation of Worst-Case Execution Time

    Jong-In LEE  Ho-Jung BANG  Tai-Hyo KIM  Sung-Deok CHA  

     
    PAPER-Dependable Computing

      Vol:
    E92-D No:1
      Page(s):
    24-31

    Automated static timing analysis methods provide a safe but usually overestimated worst-case execution time (WCET) due to infeasible execution paths. In this paper, we propose a visual language, User Constraint Language (UCL), to obtain a tight WCET estimation. UCL provides intuitive visual notations with which users can easily specify various levels of flow information to characterize valid execution paths of a program. The user constraints specified in UCL are translated into finite automata. The combined automaton, constructed by a cross-production of the automata for program and user constraints, reflects the static structure and possible dynamic behavior of the program. It contains only the execution paths satisfying user constraints. A case study using part of a software program for satellite flight demonstrates the effectiveness of UCL and our approach.

  • Constrained Total Least-Squares Algorithm for Hyperbolic Location

    Kai YANG  Jianping AN  Xiangyuan BU  Zhan XU  

     
    LETTER-Digital Signal Processing

      Vol:
    E91-A No:12
      Page(s):
    3824-3827

    A novel algorithm for source location by utilizing the time-difference-of-arrival (TDOA) of a signal received at spatially separated sensors is proposed. The algorithm is based on the constrained total least-squares (CTLS) technique and gives an explicit solution. Simulation results demonstrate that the proposed algorithm has high location accuracy and its performance is close to the Cramer-Rao lower bound (CRLB).

  • Optimal Time-Multiplexing in Inter-FPGA Connections for Accelerating Multi-FPGA Prototyping Systems

    Masato INAGI  Yasuhiro TAKASHIMA  Yuichi NAKAMURA  Atsushi TAKAHASHI  

     
    PAPER-Logic Synthesis, Test and Verification

      Vol:
    E91-A No:12
      Page(s):
    3539-3547

    In multi-FPGA prototyping systems for circuit verification, serialized time-multiplexed I/O technique is used because of the limited number of I/O pins of an FPGA. The verification time depends on a selection of inter-FPGA signals to be time-multiplexed. In this paper, we propose a method that minimizes the verification time of multi-FPGA systems by finding an optimal selection of inter-FPGA signals to be time-multiplexed. In the experiments, it is shown that the estimated verification time is improved 38.2% on average compared with conventional methods.

  • Lifetime-Aware Replication for Data Durability in P2P Storage Network

    Kyungbaek KIM  

     
    LETTER-Network

      Vol:
    E91-B No:12
      Page(s):
    4020-4023

    Many p2p based wide-area storage networks have been proposed to provide scalable storage services by combining the idle resources of many unreliable nodes. These storage networks can also provide highly available and reliable storage services, by replicating each data on several nodes. The popular approach is availability based replication which uses individual node availability. However, some replicas leave within a short time under high churn in p2p networks. This results in heavy and bursty data traffic, and sometimes some data are lost. This paper presents the lifetime-aware replication which uses the lifetime of each node to prevent the bursty failures and the data loss. It keeps a primary replica which has enough time to replace a lost redundancy. It also spreads replicas on the timeline to reduce the overlapped replicas as best as it can. Results from event-driven simulations show that the lifetime-aware replication keeps high data durability with less data traffic.

  • Detection for Space-Time Block Coding over Time-Selective Fading Channels

    Donghun YU  Jae Hong LEE  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E91-B No:12
      Page(s):
    4050-4053

    A detector for space-time block coding is proposed to combat time-selective fading. To suppress both noise and interference, a minimum mean square error (MMSE) based detector is introduced for space-time block coding. It is shown by simulations that the proposed detector outperforms the conventional detectors when the channel is time-selective fading.

  • A Simple and Accurate Approximation to the Average Achievable Rate of Stacked OSTBC in Rayleigh Fading Channels

    Hoojin LEE  Edward J. POWERS  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:12
      Page(s):
    4038-4041

    In this letter, we derive a very accurate closed-form approximate formula for the average achievable rate of stacked orthogonal space-time block code (OSTBC) in Rayleigh fading channels. Some simulations are performed to demonstrate that the derived formula shows better agreement with Monte-Carlo simulation results than the existing closed-form approximate expressions.

  • Peer-to-Peer Based Fast File Dissemination in UMTS Networks

    Kai WANG  Li PAN  Jianhua LI  

     
    PAPER

      Vol:
    E91-B No:12
      Page(s):
    3860-3871

    In UMTS (universal mobile telecommunications system) networks upgraded with HSPA (high speed packet access) technology, the high access bandwidth and advanced mobile devices make it applicable to share large files among mobile users by peer-to-peer applications. To receive files quickly is essential for mobile users in file sharing applications, mainly because they are subject to unstable signal strength and battery failures. While many researches present peer-to-peer file sharing architectures in mobile environments, few works focus on decreasing the time spent in disseminating files among users. In this paper, we present an efficient peer-to-peer file sharing design for HSPA networks called AFAM -- Adaptive efficient File shAring for uMts networks. AFAM can decrease the dissemination time by efficiently utilizing the upload-bandwidth of mobile nodes. It uses an adaptive rearrangement of a node's concurrent uploads, which causes the count of the node's concurrent uploads to lower while ensuring that the node's upload-bandwidth can be efficiently utilized. AFAM also uses URF -- Upload Rarest First policy for the block selection and receiver selection, which achieves real rarest-first for the spread of blocks and effectively avoids the "last-block" problem in file sharing applications. Our simulations show that, AFAM achieves much less dissemination time than other protocols including BulletPrime and a direct implementation of BitTorrent for mobile environments.

  • Formal Model for the Reduction of the Dynamic Energy Consumption in Multi-Layer Memory Subsystems

    Hongwei ZHU  Ilie I. LUICAN  Florin BALASA  Dhiraj K. PRADHAN  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E91-A No:12
      Page(s):
    3559-3567

    In real-time data-dominated communication and multimedia processing applications, a multi-layer memory hierarchy is typically used to enhance the system performance and also to reduce the energy consumption. Savings of dynamic energy can be obtained by accessing frequently used data from smaller on-chip memories rather than from large background memories. This paper focuses on the reduction of the dynamic energy consumption in the memory subsystem of multidimensional signal processing systems, starting from the high-level algorithmic specification of the application. The paper presents a formal model which identifies those parts of arrays more intensely accessed, taking also into account the relative lifetimes of the signals. Tested on a two-layer memory hierarchy, this model led to savings of dynamic energy from 40% to over 70% relative to the energy used in the case of flat memory designs.

  • Simplified Interference Coupling Model for Two Orthogonal Striplines on Adjacent Layers

    Kenji ARAKI  Fengchao XIAO  Yoshio KAMI  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E91-B No:12
      Page(s):
    3983-3989

    To evaluate frequency-domain interference between orthogonally intersecting stripline geometries, a lumped mutual capacitance was incorporated into a circuit model, and then a simplified circuit was proposed in the previous paper. The circuit model was approximated from an investigation of the distribution of mutual capacitance but it has remained how the capacitance is approximated. In this paper, a technique using an error function is proposed for the problem. Then, the time-domain response in an analytical expression is studied using the simplified circuit model in a Laplace transformation to make the mechanism clear. Comparing the experimental and the computed results verifies the proposed models.

  • Reduced-Complexity Near-ML Detector for a Coded DSTTD-OFDM System

    Hyounkuk KIM  Hyuncheol PARK  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:11
      Page(s):
    3749-3752

    This letter introduces an efficient near-maximum likelihood (ML) detector for a coded double space-time transmit diversity-orthogonal frequency division multiplexing (DSTTD-OFDM) system. The proposed near-ML detector constructs a candidate vector set through a relaxed minimization method. It reduces computational loads from O(2|A|2) to O(|A|2), where |A| is the modulation order. Numerical results indicate that the proposed near-ML detector provides both almost ML performance and considerable complexity savings.

  • On the Performance Analysis of Distributed Space-Time Code over Nakagami-m Multipath Channels

    Zhimeng ZHONG  Shihua ZHU  Gangming LV  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:11
      Page(s):
    3740-3744

    In this letter, we analyze the pairwise error probability (PEP) behaviour of distributed space-time code (DSTC) with amplify-and-forward relaying over Nakagami-m multipath channels. An upper bound of PEP for DSTC is derived. From our analysis, it is seen that of the paths from the source to relays and from relays to the destination, those with smaller diversity order result in an overall system performance bottleneck. Numerical examples are provided to corroborate our theoretical analysis.

  • Blind Channel Shortening for Block Transmission of Correlated Signals

    Teruyuki MIYAJIMA  Yoshihisa WATANABE  

     
    PAPER

      Vol:
    E91-A No:11
      Page(s):
    3095-3103

    In block transmission systems, blind channel shortening methods are known to be effective to reduce the influence of interblock interference which degrades the performance when the length of a channel impulse response is extremely long. Conventional methods assume that the transmitted signal is uncorrelated; however, this assumption is invalid in practical systems such as OFDM with null carriers and MC-CDMA. In this paper, we consider blind channel shortening methods for block transmissions when the transmitted samples within a block are correlated. First, the channel shortening ability of a conventional method is clarified. Next, a new method which exploits the fact that the transmitted samples in different blocks are uncorrelated is introduced. It is shown that the proposed method can shorten the channel properly under certain conditions. Finally, simulation results of OFDM and MC-CDMA systems are shown to verify the effectiveness of the proposed method compared with a conventional one.

921-940hit(2217hit)