The search functionality is under construction.

IEICE TRANSACTIONS on Information

  • Impact Factor

    0.72

  • Eigenfactor

    0.002

  • article influence

    0.1

  • Cite Score

    1.4

Advance publication (published online immediately after acceptance)

Volume E89-D No.12  (Publication Date:2006/12/01)

    Special Section on New Technologies and their Applications of the Internet IV
  • FOREWORD

    Jun MATSUKATA  

     
    FOREWORD

      Page(s):
    2821-2821
  • Implementing a Secure Autonomous Bootstrap Mechanism for Control Networks

    Nobuo OKABE  Shoichi SAKANE  Kazunori MIYAZAWA  Ken'ichi KAMADA  Masahiro ISHIYAMA  Atsushi INOUE  Hiroshi ESAKI  

     
    PAPER

      Page(s):
    2822-2830

    There are many kinds of control networks, which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automation). They are now introducing IP and face the issues of security and configuration complexity. The authors have proposed a model which intends to solve these issues while satisfying restrictions, i.e. small embedded devices, isolated networks and private naming system/name space, which are required when introducing new functionality into existing control networks. Secure bootstrap sequence and device-to-device communication using the chain of trust are the points of the model. This paper shows the practicability of the model through implementing the model experimentally.

  • DRBAC Model Using a WSNM for Services in i-Home

    Jong-Hyuk PARK  Sangjin LEE  In-Hwa HONG  

     
    PAPER

      Page(s):
    2831-2837

    RBAC (Role Based Access Control) was added the concept of the role which user can have access to resources based on the role of the user, and it increased efficiency and expandability. But, evolution of computing power and internet technology has caused the up rise of the dynamic environments, in accordance with it, it will be expected to require a dynamic access control model considering various elements. In this paper, we propose DRBAC (Dynamic RBAC) model in intelligent Home (i-Home). This is an access control model suitable for user-oriented service in i-Home. In order to consider dynamic environment in the existing RBAC models, the proposed model executes assignments user-role and permission-role based on context. In addition, the proposed model provides scalable access control policies which are suitable for the characteristics of intelligent environment as considering the user location information as a temporary constraints condition. Furthermore, we design and implement WSNM (Wireless Sensor Network Module) for its services. Finally, the proposed model provides flexible and efficient authentication method which applied Domain-Group concept as well as user / device authentication.

  • AMS: An Adaptive TCP Bandwidth Aggregation Mechanism for Multi-homed Mobile Hosts

    Shunsuke SAITO  Yasuyuki TANAKA  Mitsunobu KUNISHI  Yoshifumi NISHIDA  Fumio TERAOKA  

     
    PAPER

      Page(s):
    2838-2847

    Recently, the number of multi-homed hosts is getting large, which are equipped with multiple network interfaces to support multiple IP addresses. Although there are several proposals that aim at bandwidth aggregation for multi-homed hosts, few of them support mobility. This paper proposes a new framework called AMS: Aggregate-bandwidth Multi-homing Support. AMS provides functions of not only bandwidth aggregation but also mobility by responding to the changes of the number of connections during communication without the support of underlying infrastructure. To achieve efficient data transmission, AMS introduces a function called address pairs selection to select an optimal combination of addresses of the peer nodes. We implemented AMS in the kernel of NetBSD and evaluated it in our test network, in which dummynet was used to control bandwidth and delay. The measured results showed that AMS achieved ideal bandwidth aggregation in three TCP connections by selecting optimal address pairs.

  • Improvement of Paging Extensions in Mobile Internet Protocol Based on Post Registration

    Kortong CHIRATANA  Watit BENJAPOLAKUL  

     
    PAPER

      Page(s):
    2848-2855

    Paging extensions for Mobile Internet Protocol (P-MIP) decreases only the number of registration, but it does not much improve the method of registration, which still gives rise to a lot of lost packets and long handoff latency, and may also waste the data buffering and time during registration. In the active state, P-MIP behaves in the same way as Mobile Internet Protocol (MIP), thus, in this state, the packet loss rate of P-MIP is the same as that of MIP. However, the packet loss rate of P-MIP is lower than that of MIP, when changing from idle state to active state, because P-MIP buffers packets at the registered FA. We propose an improvement method for the registration delay, while the mobile node is entering the active state to decrease the mobile node waiting time for data packets. The proposed method can reduce the requirement of data buffering and also improve the method of registration to decrease lost packets and handoff latency when the mobile node moves across the cell in the same paging area during active state.

  • Proactive Route Maintenance for Tree-Based Application Layer Multicast and Its Implementations

    Tetsuya KUSUMOTO  Jiro KATTO  Sakae OKUBO  

     
    PAPER

      Page(s):
    2856-2866

    The purpose of this study is to maintain efficient backup routes for reconstructing overlay trees quickly. In most conventional methods, after a node leaves the trees, its child nodes start searching for the new parents. In this reactive approach, it takes a lot of time to find a new parent. In this paper, we propose a proactive approach to finding a next parent as the backup route node over the overlay tree before the current parent leaves. A proactive approach allows a node to find its new parent node immediately and switch to the backup route node smoothly. In our proposal, the structure of the overlay tree using a redundant degree can decide a backup route node without so much overhead. Simulations demonstrate our proactive approach can recover from node departures 2 times faster than reactive approaches, and can construct overlay trees with lower overheads than another proactive method. Additionally we carried out experiments over actual networks and their results support the effectiveness of our approach. We confirmed that our proposal achieved better streaming quality than conventional approaches.

  • Service Virtualization for Border Model Based Multi-Layer Service Network Architecture

    Mallik TATIPAMULA  Ichiro INOUE  Zafar ALI  Hisashi KOJIMA  Kohei SHIOMOTO  Shigeo URUSHIDANI  Shoichiro ASANO  

     
    PAPER

      Page(s):
    2867-2874

    The rapidly increasing bandwidth requirements of IP traffic mean that networks based on optical technologies in conjunction with IP routing technologies will provide the backbone of the next generation Internet. One of the major issues is how to construct an optical-technology-based backbone network that offers the economical transport of large-scale IP/MPLS services while achieving reliable, robust network. The key to achieving this objective lies in multilayer coordination technologies using Multi-Layer Service Network [MLSN] Architecture, that we previously proposed [2]. One of the important aspects of MLSN architecture is ability to effectively use GMPLS network resources by IP/MPLS service networks. We propose extensions to previously proposed MLSN architecture. The proposed extensions to MLSN architecture are tailored to address "service virtualization and separation" of various service networks over GMPLS backbone. As a part of this extended MLSN architecture, we introduce novel concepts known as Logical Router (LR) and Virtual Router (VR) that would enable border router to be services domain router, so that it can connect multiple service networks such as L2VPN, L3VPN etc., over GMPLS backbone by offering service separation or virtualization. This service separation/isolation greatly enhances the reliability of next generation networks, as any failure on one service should be isolated from others. We evaluate our extended network architecture against requirements for the large scale network targeting at introducing such new technology to cope with vast traffic explosion and challenges in operation and service provision sophistication.

  • Application-Coexistent Wire-Rate Network Monitor for 10 Gigabit-per-Second Network

    Kenji SHIMIZU  Tsuyoshi OGURA  Tetsuo KAWANO  Hiroyuki KIMIYAMA  Mitsuru MARUYAMA  Keiichi KOYANAGI  

     
    PAPER

      Page(s):
    2875-2885

    To apply network monitoring functions to emerging high-quality video streaming services, we proposed an application-coexistent monitor (APCM). In APCM, a streaming server can works as an active monitor and a passive monitor. In addition, IP packets sent from the server carry monitoring information together with application's data such as video signals. To achieve APCM on a 10-Gbps network, we developed a network interface card for an application-coexistent wire-rate network monitor (AWING NIC). It provides (1) a function to append GPS-based accurate timestamps to every packet that streaming applications send and receive, which can be used for real-time monitoring of delays and inter-packet gap, and (2) functions to capture and generate 10-Gbps wire-rate traffic without depending on packets' size, achieved by our highly-efficient DMA-transfer mechanisms. Such monitoring capability are unprecedented in existing PC-based systems because of the limitation in PC system's architecture. As an evaluation of APCM in an actual network, we conducted an experiment to transmit a 6-Gbps high-quality video stream over an IP network with the system in which we installed the AWING NIC. The results revealed that the video stream became highly bursty by passing through the network, and the observed smallest inter-packet gap corresponds to the value of 10-Gbps wire-rate traffic, which supports the effectiveness of our development.

  • Analysis and Modeling of Voice over IP Traffic in the Real Network

    Padungkrit PRAGTONG  Kazi M. AHMED  Tapio J. ERKE  

     
    PAPER

      Page(s):
    2886-2896

    This paper presents the characteristics and modeling of VoIP traffic for a real network. The new model, based on measured data, shows a significant difference from the previously proposed models in terms of parameters and their effects. It is found that the effects of background noise and ringing tones have essential influences on the model. The observed distributions of talkspurt and silent durations have long-tail characteristics and considerably differ from the existing models. An additional state called "Long burst", which represents the background noise at the talker's place, is added into the continuous-time Markov process model. The other three states, "Talk", "Short silence" and "Long silence", represent the normal behavior of the VoIP user. Models for conversational speech containing the communication during the dialogue are presented. In the case of the VoIP traffic aggregation, the simplified models, which neglect the conversation's interaction, are proposed. Depending on the occurrences of background noise during the speech, the model is classified as "noisy speech" or "noiseless speech". The measured data shows that the background noise typically increases the data rate by 60%. Simulation results of aggregated VoIP traffic indicate the self-similarity, which is analogous to the measured data. Results from the measurements support the fact that except the ringing duration the conversations from both the directions can be modeled in identical manner.

  • A Parallel Network Emulation Method for Evaluating the Correctness and Performance of Applications

    Yue LI  Chunxiao XING  Ying HE  

     
    PAPER

      Page(s):
    2897-2906

    Network emulation system constructs a virtual network environment which has the characteristics of controllable and repeatable network conditions. This makes it possible to predict the correctness and performance of proposed new technology before deploying to Internet. In this paper we present a methodology for evaluating the correctness and performance of applications based on the PARNEM, a parallel discrete event network emulator. PARNEM employs a BSP based real-time event scheduling engine, provides flexible interactive mechanism and facilitates legacy network models reuse. PARNEM allows detailed and accurate study of application behavior. Comprehensive case studies covering bottleneck bandwidth measurement and distributed cooperative web caching system demonstrate that network emulation technology opens a wide range of new opportunities for examining the behavior of applications.

  • Regular Section
  • Power-Aware Allocation of Chain-Like Real-Time Tasks on DVS Processors

    Chun-Chao YEH  

     
    PAPER-Computation and Computational Models

      Page(s):
    2907-2918

    Viable techniques such as dynamic voltage scaling (DVS) provide a new design technique to balance system performance and energy saving. In this paper, we extend previous works on task assignment problems for a set of linear-pipeline tasks over a set of processors. Different from previous works, we revisit the problems with two additional system factors: deadline and energy-consumption, which are key factors in real-time and power-aware computation. We propose an O(nm2) time complexity algorithm to determine optimal task-assignment and speed-setting schemes leading to minimal energy consumption, for a given set of m real-time tasks running on n identical processors (with or without DVS supports). The same result can be extended to a restricted form of heterogeneous processor model. Meanwhile, we show that on homogeneous processor model more efficient algorithms can be applied and result in time complexity of O(m2) when mn. For completeness, we also discuss cases without contiguity constraints. We show under such cases the problems become at least as hard as NP-hard.

  • TSK-Based Linguistic Fuzzy Model with Uncertain Model Output

    Keun-Chang KWAK  Dong-Hwa KIM  

     
    PAPER-Computation and Computational Models

      Page(s):
    2919-2923

    We present a TSK (Takagi-Sugeno-Kang)-based Linguistic Fuzzy Model (TSK-LFM) with uncertain model output. Based on the Linguistic Model (LM) proposed by Pedrycz, we develop a comprehensive design framework. The main design process is composed of the automatic generation of the contexts, fuzzy rule extraction by Context-based Fuzzy C-Means (CFCM) clustering, connection of bias term, and combination of TSK and linguistic context. Finally, we contrast the performance of the presented models with other models for coagulant dosing process in a water purification plant.

  • LR Formalisms as Abstract Interpretations of Grammar Semantics

    Seunghwan O  Kwang-Moo CHOE  

     
    PAPER-Automata and Formal Language Theory

      Page(s):
    2924-2932

    The concept of LR(k) validity is represented as an abstract interpretation of a refinement of the derivation semantics of a given grammar. Also the algorithm of LR(k) parsing is represented as an abstract interpretation of the refined semantics. Such representations of LR formalisms provide us with more intuitive and easier means by which to understand LR parsing.

  • Analogical Conception of Chomsky Normal Form and Greibach Normal Form for Linear, Monadic Context-Free Tree Grammars

    Akio FUJIYOSHI  

     
    PAPER-Automata and Formal Language Theory

      Page(s):
    2933-2938

    This paper presents the analogical conception of Chomsky normal form and Greibach normal form for linear, monadic context-free tree grammars (LM-CFTGs). LM-CFTGs generate the same class of languages as four well-known mildly context-sensitive grammars. It will be shown that any LM-CFTG can be transformed into equivalent ones in both normal forms. As Chomsky normal form and Greibach normal form for context-free grammars (CFGs) play a very important role in the study of formal properties of CFGs, it is expected that the Chomsky-like normal form and the Greibach-like normal form for LM-CFTGs will provide deeper analyses of the class of languages generated by mildly context-sensitive grammars.

  • Perceptually Transparent Polyline Watermarking Based on Normal Multi-Resolution Representation

    Yu-Chi PU  Wei-Chang DU  I-Chang JOU  

     
    PAPER-Application Information Security

      Page(s):
    2939-2949

    Digital watermarking techniques were developed for regular raster data such as images or video, but little research addressed irregular vector data, such as the shapes of cartoons or elevation contours. Vector graphic images, such as those in SVG format, are popular on the WWW, and provide the advantage of permitting affine transformations without aliasing. The creation of cartoon images or the acquisition of GIS geometry data involves much work, so the copyright and ownership of vector data must be protected. Common components in vector graphic images are polygonal lines or polylines. This work develops a normal multi-resolution representation of a polygonal line, and embeds a copyright notice or serial number in this representation. Previous studies on polyline watermarking have the non-transparent problems, including self-intersection of line segments. The experimental results demonstrate that the proposed watermarking approach is perceptually transparent, and solves the self-intersection problem. It is also resistant to similarity transformation, traversal reordering, point insertion/deletion and random noise attacks.

  • Anonymous and Transferable Coins in Pay-Fair Ecommerce

    Lih-Chyau WUU  Chih-Ming LIN  Wen-Fong WANG  

     
    PAPER-Application Information Security

      Page(s):
    2950-2956

    In this paper, we propose an on-line e-coin system with four parties: Consumer, Merchant, Bank and Issuer. The proposed system not only circulates anonymous e-coins but also protects the profits of the Merchant and the Consumer during a transaction. An e-coin, consisting of a secret value c and a public value c'=h(c) where h() is a secure one-way hash function with collision resistant property, is generated by its owner. The public value of a legal e-coin is published on the bulletin board of Issuer. Only the owner who releases the secret values of the published e-coins can spend money. Instead of Bank, Issuer has to be on-line to verify and replace the public values of the Consumer's e-coins with the Merchant's while the Consumer pays money to the Merchant in a transaction. Such a replacement represents that the coins are passed from one person to another.

  • Recognizing and Analyzing of User's Continuous Action in Mobile Systems

    Jonghun BAEK  Ik-Jin JANG  Byoung-Ju YUN  

     
    PAPER-Human-computer Interaction

      Page(s):
    2957-2963

    As a result of the growth of sensor-enabled mobile devices, in recent years, users can utilize diverse digital contents everywhere and anytime. However, the interfaces of mobile applications are often unnatural due to limited computational capability, miniaturized input/output controls, and so on. To complement the poor user interface (UI) and fully utilize mobility as feature of mobile devices, we explore possibilities for a new UI of mobile devices. This paper describes the method for recognizing and analyzing a user's continuous action including the user's various gestures and postures. The application example we created is mobile game called AM-Fishing game on mobile devices that employ the accelerometer as the main interaction modality. The demonstration shows the evaluation for the system usability.

  • Automatic Affect Recognition Using Natural Language Processing Techniques and Manually Built Affect Lexicon

    Young Hwan CHO  Kong Joo LEE  

     
    PAPER-Natural Language Processing

      Page(s):
    2964-2971

    In this paper, we present preliminary work on recognizing affect from a Korean textual document by using a manually built affect lexicon and adopting natural language processing tools. A manually built affect lexicon is constructed in order to be able to detect various emotional expressions, and its entries consist of emotion vectors. The natural language processing tools analyze an input document to enhance the accuracy of our affect recognizer. The performance of our affect recognizer is evaluated through automatic classification of song lyrics according to moods.

  • An Alignment Model for Extracting English-Korean Translations of Term Constituents

    Jong-Hoon OH  Key-Sun CHOI  Hitoshi ISAHARA  

     
    PAPER-Natural Language Processing

      Page(s):
    2972-2980

    Technical terms are linguistic representations of a domain concept, and their constituents are components used to represent the concept. Technical terms are usually multi-word terms and their meanings can be inferred from their constituents. Therefore, term constituents are essential for understanding the designated meaning of technical terms. However, there are several problems in finding the correct meanings of technical terms with their term constituents. First, because a term constituent is usually a morphological unit rather than a conceptual unit in the case of Korean technical terms, we need to first identify conceptual units by chunking term constituents. Second, conceptual units are sometimes homonyms or synonyms. Moreover their meanings show domain dependency. It is therefore necessary to give information about conceptual units and their possible meanings, including homonyms, synonyms, and domain dependency, so that natural language applications can properly handle technical terms. In this paper, we propose a term constituent alignment algorithm that extracts such information from bilingual technical term pairs. Our algorithm recognizes conceptual units and their meanings by finding English term constituents and their corresponding Korean term constituents for given English-Korean term pairs. Our experimental results indicate that this method can effectively find conceptual units and their meanings with about 6% alignment error rate (AER) on manually analyzed experimental data and about 14% AER on automatically analyzed experimental data.

  • Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems

    Sangchul HAN  Heeheon KIM  Xuefeng PIAO  Minkyu PARK  Seongje CHO  Yookun CHO  

     
    LETTER-System Programs

      Page(s):
    2981-2984

    This letter proves the finish time predictability of EDZL (Earliest Deadline Zero Laxity) scheduling algorithm for multiprocessor real-time systems, which is a variant of EDF. Based on the results, it also shows that EDZL can successfully schedule any periodic task set if its total utilization is not greater than (m+1)/2, where m is the number of processors.

  • Using IS-A Relation Patterns for Factoid Questions in Question Answering Systems

    Bojun SHIM  Youngjoong KO  Jungyun SEO  

     
    LETTER-Contents Technology and Web Information Systems

      Page(s):
    2985-2989

    This paper describes a flexible strategy to generate candidate answers for factoid questions in Question Answering (QA) systems. Most QA systems have predefined the conceptual categories for candidate answers. But if the conceptual category of answers to any question is not prepared in the QA system, it is hard to extract correct answers to that question. Therefore, we propose an extraction method for IS-A relation patterns which describe relations between the nominal target concepts of question and candidate answers. The extracted IS-A relation patterns can be used for questions with an unexpected target concept.

  • Design of the Mobile Agent Anonymity Framework in Ubiquitous Computing Environments

    Jae-gon KIM  Gu Su KIM  Young Ik EOM  

     
    LETTER-Contents Technology and Web Information Systems

      Page(s):
    2990-2993

    In ubiquitous computing environments supporting mobile agents, agent anonymity is a critical issue in protecting the privacy of users. Agent anonymity means that no other entity can identify the identity of the agent performing an action. For agent anonymity, the information, that the user creates or contributes to, and the agent itself should not be revealed, which can be accomplished by hiding the identity of the agent working on behalf of the user. In this paper, an anonymity framework is described for mobile agent systems, providing agent anonymity facilities using agent identity encryption and access control facilities, based on partially blind signature. It is possible to service anonymous mobile agents in ubiquitous computing environments while reducing the abuse resulting from anonymity, by deploying the proposed agent anonymity framework.

  • Soft Counting Poisson Mixture Model-Based Polling Method for Speech/Nonspeech Classification

    Youngjoo SUH  Hoirin KIM  Minsoo HAHN  Yongju LEE  

     
    LETTER-Speech and Hearing

      Page(s):
    2994-2997

    In this letter, a new segment-level speech/nonspeech classification method based on the Poisson polling technique is proposed. The proposed method makes two modifications from the baseline Poisson polling method to further improve the classification accuracy. One of them is to employ Poisson mixture models to more accurately represent various segmental patterns of the observed frequencies for frame-level input features. The other is the soft counting-based frequency estimation to improve the reliability of the observed frequencies. The effectiveness of the proposed method is confirmed by the experimental results showing the maximum error reduction of 39% compared to the segmentally accumulated log-likelihood ratio-based method.

  • Perceptually Weighted Mel-Cepstrum Analysis of Speech Based on Psychoacoustic Model

    Hongwu YANG  Dezhi HUANG  Lianhong CAI  

     
    LETTER-Speech and Hearing

      Page(s):
    2998-3001

    This letter proposes a novel approach for mel-cepstral analysis based on the psychoacoustic model of MPEG. A perceptual weighting function is developed by applying cubic spline interpolation on the signal-to-mask ratios (SMRs) which are obtained from the psychoacoustic model. Experiments on speaker identification and speech re-synthesis showed that the proposed method not only improved the speaker recognition performance, but also improved the speech quality of the re-synthesized speech.

  • Adaptive Noise Estimation Using Least-Squares Line in Wavelet Packet Transform Domain

    Sung-il JUNG  Younghun KWON  Sung-il YANG  

     
    LETTER-Speech and Hearing

      Page(s):
    3002-3005

    In this letter, we suggest a noise estimation method which can be applied for speech enhancement in various noise environments. The proposed method consists of the following two main processes to analyze and estimate efficiently the noise from the noisy speech. First, a least-squares line is used, which is obtained by applying coefficient magnitudes in node with a uniform wavelet packet transform to a least squares method. Next, a differential forgetting factor and a correlation coefficient per subband are applied, where each subband consists of several nodes with the uniform wavelet packet transform. In particular, this approach has the ability to update noise estimation by using the estimated noise at the previous frame only instead of employing the statistical information of long past frames and explicit nonspeech frames detection consisted of noise signals. In objective assessments, we observed that the performance of the proposed method was better than that of the compared methods. Furthermore, our method showed a reliable result even at low SNR.

  • Fast 2-Dimensional 88 Integer Transform Algorithm Design for H.264/AVC Fidelity Range Extensions

    Chih-Peng FAN  

     
    LETTER-Image Processing and Video Processing

      Page(s):
    3006-3011

    In this letter, efficient two-dimensional (2-D) fast algorithms for realizations of 88 forward and inverse integer transforms in H.264/AVC fidelity range extensions (FRExt) are proposed. Based on matrix factorizations with Kronecker product and direct sum operations, efficient fast 2-D 88 forward and inverse integer transforms can be derived from the one-dimensional (1-D) fast 88 forward and inverse integer transforms through matrix operations. The proposed fast 2-D 88 forward and inverse integer transform designs don't require transpose memory in hardware realizations. The fast 2-D 88 integer transforms require fewer latency delays and provide a larger throughput rate than the row-column based method. With regular modularity, the proposed fast algorithms are suitable for VLSI implementations to achieve H.264/AVC FRExt high-profile signal processing.

  • Population Fitness Probability for Effectively Terminating Evolution Operations of a Genetic Algorithm

    Heng-Chou CHEN  Oscal T.-C. CHEN  

     
    LETTER-Biocybernetics, Neurocomputing

      Page(s):
    3012-3014

    The probability associated with population fitness in a Genetic Algorithm (GA) is studied using the concept of average Euclidean distance. Based on the probability derived from population fitness, the GA can effectively terminate its evolution operations to mitigate the total computational load. Simulation results verify the feasibility of the derived probability used for the GA's termination strategy.