Analysis of transmission line loaded with BCI probe using circuit concept approach

Size: px
Start display at page:

Download "Analysis of transmission line loaded with BCI probe using circuit concept approach"

Transcription

1 IEICE Communications Express, Vol.4, No.7, Analysis of transmission line loaded with BCI probe using circuit concept approach Kimitoshi Murano 1a), Naoki Takata 1, Majid Tayarani 2, Fengchao Xiao 3, and Yoshio Kami 3 1 School of Engineering, Tokai University, Kitakaname, Hiratsuka-shi, Kanagawa , Japan 2 School of Electrical Engineering, Iran University of Science and Technology, Narmak, Tehran , Iran 3 Graduate School of Informatics and Engineering, The University of Electro-Communications, Chofugaoka, Chofu, Tokyo , Japan a) murano@tokai.ac.jp Abstract: Bulk current injection (BCI) test is adopted as an immunity testing method for automotive electronic equipment. In this letter, an analytical method for obtaining the terminal output of the transmission line excited by using the BCI probe is proposed. The test setup is analytically solved by using a circuit concept approach because it is considered to be a transmission line externally excited by an electromagnetic field. To confirm the validity of the proposed method, a single-ended transmission line loaded with the BCI probe is considered as an example. The comparison with the analytical solution and our experimental results shows a good agreement. Keywords: BCI test, immunity, electromagnetic coupling, transmission line, circuit concept approach Classification: Electromagnetic Compatibility (EMC) References DOI: /comex Received May 25, 2015 Accepted June 18, 2015 Published July 13, 2015 [1] Road vehicles Component test methods for electrical disturbances from narrowband radiated electromagnetic energy Part 4: Harness excitation methods, International Standard, ISO , Dec [2] A. Orlandi, G. Antonini, and R. M. Rizzi, Equivalent circuit model of a bundle of cables for bulk current injection (BCI) test, IEEE Trans. Electromagn. Compat., vol. 48, no. 4, pp , Nov DOI: /TEMC [3] H. Tanaka, A. Takahashi, Y. Hattori, and M. Izumichi, A modeling methodology for simulation of BCI (bulk current injection) test, IEICE Trans. Commun., vol. J96-B, no. 4, pp , April 2013 (in Japanese). [4] Y. Kami and R. Sato, Circuit-concept approach to externally excited transmission lines, IEEE Trans. Electromagn. Compat., vol. EMC-27, no. 4, pp , Nov DOI: /TEMC [5] N. Takata, Y. Kami, F. Xiao, M. Tayarani, and K. Murano, Susceptibility characteristics of transmission line in BCI test, IEICE Tech. Rep., EMCJ , vol. 114, no. 398, pp. 1 4, Jan (in Japanese). 223

2 IEICE Communications Express, Vol.4, No.7, Introduction Bulk current injection (BCI) test is usually conducted to evaluate the immunity characteristics of automotive electronic equipment [1]. In the BCI test, an electric current is induced in a wire harness connecting to the equipment under test (EUT) by using a BCI probe in a toroidal coil generating a magnetic field linking the wire harness. In recent years, some studies on simulation model of the BCI-test system have been carried out. A circuit model of a bundle of cables in the BCI-test setup was suggested to predict the induced signals at the terminations in [2], and a simulation model of BCI-test system was reported to predict the resonant frequencies of the injected current occurring on the wire harness [3]. In contrast, because the BCI-test model can be considered as a kind of electromagnetic (EM) coupling phenomenon between the external-em field and a transmission line, the output of the transmission line can be analytically derived using a circuit concept approach [4]. If the model can be analytically solved, the optimum position of the BCI probe on the wire harness can be easily found, and over or underestimation of the immunity of the EUT can be avoided [5]. This letter describes a new analytical method of the BCI-test system based on the circuit concept approach. The method makes it possible to derive the induced current or voltages at the terminals of the transmission line under all conditions. In this letter, the proposed method is validated by an experimental result of a single transmission line which is loaded with a BCI probe. 2 Formulation for BCI test setup Consider a transmission line of length externally excited by an EM-plane wave in Fig. 1(a). By modifying the telegrapher s equation, a relation between two terminal outputs on both sides of the transmission line can be expressed as follows [4]: " # Z " # " # Vð0Þ V f ðxþ Vð Þ FðxÞ dx ¼ Fð Þ ð1þ Ið0Þ 0 I f ðxþ Ið Þ where V and I are the line voltage and current, and V f and I f are the distributed voltage and current source on the transmission line expressed as V f ðxþ ¼ j! Z h 0 B e z dy I fðxþ ¼j!C Z h 0 E e y dy where h and C are the line height and the line capacitance, respectively. V f and I f are equivalently generated by the external-em fields, E e and H e ¼ B e = 0. F is the chain matrix of the transmission line as follows: 2 3 cos x jz 0 sin x FðxÞ ¼4 j 1 5 sin x cos x Z 0 DOI: /comex Received May 25, 2015 Accepted June 18, 2015 Published July 13, 2015 where β and Z 0 are the phase constant and the characteristic impedance of the transmission line, respectively. In Eq. (1), the 2nd term on the left side indicates the voltage and current induced by E e and B e, so that those effects are equivalently expressed at the starting point x ¼ 0 in Eq. (1). Thus an equivalent circuit corresponding to Eq. (1) can be expressed as Fig. 1(b) where the effects of E e and B e 224

3 IEICE Communications Express, Vol.4, No.7, Fig. 1. Externally excited transmission line. DOI: /comex Received May 25, 2015 Accepted June 18, 2015 Published July 13, 2015 are expressed by using the equivalent source E eq0 and J eq0. E eq0 and J eq0 are as follows. " # E Z " # eq0 V f ðxþ ¼ FðxÞ dx I f ðxþ J eq0 0 Here, we assume that x 0 is an arbitrary position on the transmission line. Multiplying on both sides of Eq. (1) by the unit matrix I ¼ Fðx 0 ÞF 1 ðx 0 Þ,we finally obtain the following expression: " # Z " # " # Vðx 0 Þ V f ðxþ Vð Þ Fðx x 0 Þ dx ¼ Fð x 0 Þ : ð2þ Iðx 0 Þ 0 I f ðxþ Ið Þ The equivalent circuit corresponding to Eq. (2) is expressed as Fig. 1(c). Namely, Eq. (2) shows that the effects of E e and B e are expressed at the arbitrary position x 0 on the transmission line. In the case of BCI-test setup, the BCI probe locates at an arbitrary point on the transmission line. The probe generates a magnetic field locally linking the line, so that its effect can be expressed in an equivalent voltage source Eeq BCI at the point as shown in Fig. 2(a). In this case, Eq. (2) can be written as " # " # " # Vðx 0 Þ EBCI eq Vð Þ ¼ Fð x 0 Þ : ð3þ Iðx 0 Þ 0 Ið Þ Multiplying both sides of above equation by Fðx 0 Þ yield " " # " # Vð0Þ # EBCI eq0 Vð Þ ¼ Fð Þ Ið0Þ Ið Þ where J BCI eq0 ð4þ 225

4 IEICE Communications Express, Vol.4, No.7, Fig. 2. Two kinds of equivalent circuits of transmission line with BCI probe. " Eeq0 BCI # 2 3 cos x 0 ¼ Eeq BCI 4 j 1 5: sin x 0 Z 0 J BCI eq0 Eq. (4) shows that the equivalent voltage and current sources are expressed at the terminal x ¼ 0 on the transmission line as shown in Fig. 2(b). The terminal output can be provided theoretically by solving Eq. (4): the induced currents at both terminal loads, R 0 and R, are 2 3 " # Ið0Þ ¼ Ið Þ 6 4 ðr cos þ jz 0 sin Þ 1 cos þ j R sin Z 0 R " # Eeq0 BCI J BCI eq0 : 3 Experimental validation Experimental evaluation of a transmission line loaded with a BCI probe have been conducted to validate the proposed method. Experimental setup is shown in Fig. 3(a). The length and height h of the transmission line examined here are 1 m and 40 mm, respectively. In this case, the characteristic impedance Z 0 is about Ω. One terminal of the transmission line is terminated with a load of 50 Ω, and the other is connected to port#2 of a network analyzer. In addition, the terminal of the BCI probe is connected to port#1 of the network analyzer so that the transmission coefficient js 21 j is measured as relative values of the terminal output for a constant current injected to the transmission line. Fig. 3(b) shows the relative terminal outputs measured for various frequency and probe position x 0. In this figure, js 21 j is normalized by the maximum value for obtaining the relative output variation. The theoretical results under the same condition mentioned above are shown in Fig. 3(c). From these results, we can see that the theoretical results accord well with tendency of Fig. 3(b). Figs. 3(d) and (e) show a comparison between experimental and theoretical values for the frequency of MHz as an example. Both results show that the terminal output may greatly change by the probe position x 0. From these result, it is found that the terminal output can be expected by using the proposed method. Moreover, it is indicated that the most suitable probe position where over or underestimation of the conducted immunity of the EUT is avoided can be found. DOI: /comex Received May 25, 2015 Accepted June 18, 2015 Published July 13,

5 IEICE Communications Express, Vol.4, No.7, Ω Fig. 3. Measurement of relative terminal output of transmission line loaded with BCI probe. 4 Conclusion A theoretical method for analyzing the transmission line loaded with the BCI probe was proposed. The validity of this method was demonstrated through the experiments using the single-ended transmission line. Since this method is based on the circuit concept approach, it is applicable to various kinds of transmission lines under any terminal conditions such as a multi-conductor transmission line with any load impedance. And it needs to estimate quantitatively the equivalent voltage source due to the BCI probe because the theoretical results shown here are in relative value. DOI: /comex Received May 25, 2015 Accepted June 18, 2015 Published July 13,

6 IEICE Communications Express, Vol.4, No.7, OpenStack hypervisor, container and Baremetal servers performance comparison Yoji Yamato a) Software Innovation Center, NTT Corporation, Midori-cho, Musashino-shi, Tokyo , Japan a) yamato.yoji@lab.ntt.co.jp Abstract: Recently, IaaS services provide not only virtual machines on hypervisors but also Baremetal servers or container based virtual servers. In this paper, we measure performances and start up time of Baremetal server, container servers, virtual machines on OpenStack with virtual server number changing and evaluate quantitative performances. Keywords: performance, cloud computing, IaaS, Baremetal, container, hypervisor, OpenStack Classification: Network References [1] OpenStack web site, [2] W. Fester, A. Ferreria, R. Rajamony and J. Rubio, An updated performance comparison of virtual machines and Linux containers, IBM Research Report, July [3] B. Russell, Passive benchmarking with docker LXC, KVM & OpenStack, slides in Apr [4] UnixBench web site, 1 Introduction DOI: /comex Received June 2, 2015 Accepted June 30, 2015 Published July 28, 2015 Recently, cloud technology has been progressed and many providers have started cloud services. To build IaaS systems, many providers adopt open source software such as OpenStack [1] and CloudStack. NTT group also has started IaaS services based on OpenStack since Currently, many cloud services provide virtual servers to users using virtual machines deployed on hypervisors such as Xen or KVM. However, hypervisors have a demerit of much virtualization overhead. Therefore, some providers have started to provide non-virtualized Baremetal servers (hereafter, Baremetal) or container based virtual servers which overheads are small (hereafter, Container). 228

7 IEICE Communications Express, Vol.4, No.7, It is generally said that Baremetals and Containers show better performances than virtual machines on hypervisors. However, there are few works to compare performances and start up time of those three in same conditions and appropriate usage discussions based on quantitative data are not enough. For example, [2] compared performances of Baremetal, Docker and KVM but there is no data of start up time. The work of [3] includes Baremetal, Docker and KVM results of boot up time, reboot time and other performance data other than Unixbench data. However, it did not compare 3 types with virtual server number changing. Therefore, this paper measures performances and start-up time of Baremetal using Ironic, Containers by Docker and virtual machines on KVM with virtual server number changing on OpenStack and shows quantitative data. The previous work of [2] and [3] do not have enough data with virtual server number changing. 2 Outline of Baremetal, Container and Hypervisor In this section, we compare Baremetal, Container and Hypervisor qualitatively. Baremetal is a non-virtualized physical server and same as an existing dedicated hosting server. IBM SoftLayer provides Baremetal cloud services adding characteristics of prompt provisioning and pay-per-use billing to dedicated servers. In OpenStack, Ironic component provides baremetal provisioning. Because Baremetal is a dedicated server, flexibility and performance are high but provisioning and start-up time are long and it also cannot conduct live migrations. Containers technology is OS virtualization. OpenVZ or FreeBSD jail were used for VPS (Virtual Private Server) for many years. Computer resources are isolated with each unit called container but OS kernel is shared among all containers. Docker which uses LXC (Linux Container) appeared in 2013 and attracted many users because of its usability. Containers do not have kernel flexibility but a container creation only needs a process invocation and it takes a short time for start up. Virtualization overhead is also small. OpenVZ can conduct live migrations but Docker or LXC cannot conduct live migrations now. Hypervisors technology is hardware virtualization and virtual machines are behaved on emulated hardware, thus users can customize virtual machine OS flexibly. Major hypervisors are Xen, KVM and VMware ESX. Virtual machines have merits of flexible OS and live migrations but those have demerits of performances and start up time. Next, we compare performance and start-up time quantitatively. 3 Performance measurement conditions DOI: /comex Received June 2, 2015 Accepted June 30, 2015 Published July 28, 2015 This paper measures performances and start up time of 3 types servers with same conditions. We use OpenStack version Juno as a cloud controller, a physical server provisioned by Ironic as Baremetal, Docker as a container technology and KVM/QEMU as a hypervisor. Ironic, Docker and KVM are de facto standard software in OpenStack community. Server instances are Ubuntu Linux servers with Apache2 web servers from 10 GB image file and we request 3 types instances provisioning to a same physical server using OpenStack compute component Nova. 229

8 IEICE Communications Express, Vol.4, No.7, Fig. 1. Performance measurement environment servers 3.1 Performance measurement items Measured servers: Baremetal provisioned by Ironic, Containers based on Docker, Virtual machines on KVM Virtual server number: 1, 2, 3, 4 Only 1 for Baremetal case, 1 4 containers for Docker case and 1 4 virtual machines for KVM case. When there are plural virtual servers, all physical resources are equally separated to these plural servers. Performance measurement UnixBench [4] is conducted to acquire UnixBench performance indexes. Note that UnixBench is a major system performance benchmark. Start up time measurement A time from Nova server instance creation API call to each Linux and Apache2 server start up is measured. For Baremetal case, we measure not only total time but also each processing time of start up and we also measure the 1st time boot and the 2nd time boot. 3.2 Performance measurement environment For a performance measurement environment, we prepared 1 physical server on which 3 types servers were provisioned and 1 physical server which had OpenStack components (Nova, Ironic, PXE server for Ironic PXE boot and so on). These servers were connected with Gigabit Ethernet and Layer 2 switch. Fig. 1 shows each server specification. 4 Performances of Baremetal, Docker and KVM DOI: /comex Received June 2, 2015 Accepted June 30, 2015 Published July 28, UnixBench performance Fig. 2 shows a performance comparison of 3 types servers. Vertical axis shows UnixBench performance index value and horizon axis shows each server with virtual server number changing. Based on Fig. 2 results, it is clear that Docker containers performance degradation is about 75% performance compared to Baremetal performance. And it is also said that Docker performance is degraded when we change virtual server number but it is not inverse proportion. Almost all performances of Docker are 230

9 IEICE Communications Express, Vol.4, No.7, Fig. 2. UnixBench performance index score comparison better than KVM but file copy performances are worse than KVM, therefore the total index value is not much higher than KVM. Meanwhile, virtual machines on KVM performance degradation is more larger and only 60% performance compared to Baremetal performance and KVM performance degradation tendency with virtual server number change is as same as Docker. 4.2 Start up time Fig. 3(a) shows start up time of 3 type servers. When virtual servers are plural, average start up time is showed. Fig. 3(b) shows each processing time of Baremetal start up for the 1st time boot and the 2nd time boot. From Fig. 3(a), Baremetal start up takes much long time than KVM and Docker. This is because Baremetal start up needs image writing for PXE boot for the 1st time boot and it takes long time. For the 2nd time boot, it does not need image writing and total start up time is about only 200 sec (see, Fig. 3(b)). Comparing Docker and KVM, Docker containers start up are shorter than KVM virtual machines and are less than 15 sec. This is because a virtual machine start up needs OS boot but a container creation only needs a process invocation. Precisely, Docker instance creation only takes several hundred msec but OpenStack processing such as API check, port creation and IP address setting take about 5 sec. DOI: /comex Received June 2, 2015 Accepted June 30, 2015 Published July 28, 2015 Fig. 3. Start-up time comparison. (a) Baremetal, Docker and KVM start up time. (b) Each processing time of Baremetal start up. 231

10 IEICE Communications Express, Vol.4, No.7, Discussion Here, we discuss appropriate usages of IaaS servers based on quantitative data. Because Baremetal shows better performances than other 2 types servers, it is suitable to use large scale DB processing or real time processing which have performance problems when we use virtual machines. Containers lack flexibility of kernel but performance degradation is small and start up time is short. Thus, it is suitable for auto scaling for existing servers or shared usages of basic services such as Web or mail. Hypervisors are suitable to use for areas which need system flexibility such as business applications on specific OS. 5 Conclusion This paper measured performances and start up time of 3 types IaaS servers; Baremetal, Docker and KVM with virtual server number changing and showed quantatitive data. We also studied application areas of each type based on the rusults. In the future, we plan to enhance IaaS services line up for appropriate use of 3 types servers. DOI: /comex Received June 2, 2015 Accepted June 30, 2015 Published July 28,

11 IEICE Communications Express, Vol.4, No.7, Index-based maximum likelihood RaptorQ code decoder Yi-Pin Lu a) and Yi-Yao Lan Graduate Institute of Electronics Engineering, National Taiwan University, Taipei City, Taiwan a) Abstract: Aiming at the next generation forward error correction code (FEC) in the application layer, a RaptorQ code decoding algorithm is proposed in this paper. The proposed index-based decoder significantly reduces the decoding complexity by tabulates the indices of the non-zero entries in the sparse code generator matrix. As the number of tabulated indices is much less than the dimension of the code generator matrix, the computational complexity is up to ten times lower than direct implementation of the Raptor code decoder, the previous version of RaptorQ code. Finally, saving of up to two orders of magnitude in the required memory is also achieved by the proposed solution. Keywords: error correction code, fountain code, Raptor code, RaptorQ code Classification: Fundamental Theories for Communications References [1] M. Luby, A. Shokrollahi, M. Watson, T. Stockhammer, and L. Minder, RaptorQ forward error correction scheme for object delivery, Internet Engineering Task Force, RFC6330, http//:tools.ietf.org/html/rfc6330, accessed Jun. 11, [2] P. Cataldi, M. P. Shatarski, M. Grangetto, and E. Magli, Implementation and performance evaluation of LT and Raptor codes for multimedia applications, Proc. IEEE Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Pasadena, California, USA, pp , Dec DOI: /IIH-MSP [3] T. Mladenov, S. Nooshabadi, and K. Kim, Implementation and evaluation of Raptor codes on embedded systems, IEEE Trans. Comput., vol. 60, no. 12, pp , Dec DOI: /TC [4] S. Kim, S. Lee, and S. Y. Chung, An efficient algorithm for ML decoding of Raptor codes over the binary erasure channel, IEEE Commun. Lett., vol. 12, no. 8, pp , Aug DOI: /LCOMM [5] A. Shokrollahi, Raptor codes, IEEE Trans. Inf. Theory, vol. 52, no. 6, pp , June DOI: /TIT DOI: /comex Received June 12, 2015 Accepted June 30, 2015 Published July 28,

12 IEICE Communications Express, Vol.4, No.7, Introduction RaptorQ code [1], the first standardized forward error correction code (FEC) in the application layer, has recently drawn much attention from researchers. While conventional FEC systems need to retransmit the complete coded sequence if the receiver fails to decode the information sequence, the RaptorQ code decoder retains the partial coded sequences that are correctly received, until enough newlygenerated coded symbols for reconstructing the information sequence are received. Once the accumulated correctly-received coded sequence length exceeds the threshold, satisfactory error rate performance can be guaranteed [1]. However, the RaptorQ decoder is too complicated owing to the requirement of inversion of a huge matrix [2]. A matrix inverse with dimension up to 2 16 is required, accounting for 92% of the total decoding complexity [3]. Kim et al. [4] reduces the complexity of such matrix inversion for the Raptor code [5], the previous version of the RaptorQ code. The Raptor and RaptorQ codes are nearly identical except that some entries in the RaptorQ code generator matrix are octet, while the Raptor code only uses binary values to construct its code generator matrix. In this paper, we propose an index-based maximum likelihood (ML) RaptorQ code decoder based on the two-stage decoder structure in [4]. However, since the RaptorQ code generator matrix contains entries with octet values, the complexity of the RaptorQ decoder is significantly higher than that of the Raptor code. To mitigate this issue, we first partition these two stages properly so that most computations remain binary. Then, instead of storing the complete code generator matrix [3], we propose to tabulate the indices of the nonzero binary entries and then perform all the corresponding binary operations based on these indices. Owing to the sparse property of the code generator matrix, the number of the tabulated indices is much less than the dimension of the code generator matrix, leading to significant complexity reduction. From our analysis, the computational complexity of the proposed index-based ML decoder is only quadratic to the dimension of the code generator matrix, while the implementation of [4] for RaptorQ code needs cubic complexity. Simulation results demonstrate that when the code generator matrix is large, only about onetenth computational complexity and one-hundredth memory are respectively required when compared with [4]. 2 Preliminary knowledge of the RaptorQ decoder Before introducing the proposed index-based ML RaptorQ decoder, this section reviews the concept of ML decoding algorithm for the Raptor code. ML decoding, as known as full rank decoding, is performed by solving a set of linear equation, since each coded symbol y is a linear combination of the M 1 source symbols x by using " # y ¼ A 1 A 2 x; ð1þ DOI: /comex Received June 12, 2015 Accepted June 30, 2015 Published July 28, 2015 where A 1 is an M M code generator matrix for x. Then, y is infinitely generated by the code generator matrix ½A 1 > A 2 > Š >, where A 2 is generated by a designated 234

13 IEICE Communications Express, Vol.4, No.7, random generator. By removing the erasures from the coded symbols, the received symbols are denoted as y. When the numbers of received symbols reaches M, the receiver acknowledge the transmitter to stop sending new coded symbols. The decoder then recover the source symbols by computing the inverse of the corresponding code generator matrix D x ¼ D 1 y; where it will be successful if and only if D is full rank. Since the positions and the number of erasures are random and depend on transmission, D 1 has to be computed on-line. For more details, interested readers are referred to [1]. 2.1 Gaussian Elimination (GE) The equation in (2) is commonly solved by GE, a recursive algorithm comprising the row/column exchanges and row operations. The step-by-step operation of GE in the ith iteration step is given by Pivot row identification: The pivot row possessed the fewest non-zero entries is identified and exchanged with the ith row vector, Pivot column identification: Denote the first non-zero entry in the pivot row vector (the ith row currently) as the pivot entry and the corresponding column as the pivot column. Put the pivot entry to the diagonal line by the column exchange. Normalize the entry values in the pivot row vector by the value of the pivot entry, Forward elimination: Use the pivot row vector (the ith row currently) to null the pth entries in the pivot column (the ith column currently) by the row operation, ði þ 1Þ p M, Backward elimination: Use the pivot row vector to null the qth entries in the pivot column by the row operation, 1 q ði 1Þ. Increase the value of i by 1. If i M, repeat steps from 1) to 4); otherwise, the GE procedure is terminated. With the GE procedure, D is diagonalized, leading to the solution of D 1. Since the complexity of each iteration in GE is OðM 2 Þ due to the pivot row identification and the forward/backward eliminations, the complexity of the GE including M iterations is OðM 3 Þ. ð2þ DOI: /comex Received June 12, 2015 Accepted June 30, 2015 Published July 28, Two-stage Raptor ML decoding algorithm Instead of using GE, the low-complexity Raptor ML decoder in [4] splits the diagonalization of D into two stages that respectively adopted a modified GE (MGE) and GE. MGE is first proposed in the 3GPP standard [1] and tailored for the Raptor code generator matrix. MGE is different from GE in that the fourth step backward elimination is revised to Column inactivation: Except the pivot column, all columns with non-zero entries in the ith position are moved to the rightmost part of the matrix. Thus, the MGE is simpler than the GE since all the row operations involving additions and subtractions in backward elimination are substituted by simple column exchanges. However, please note that instead of diagonalization, MGE 235

14 IEICE Communications Express, Vol.4, No.7, Fig. 1. A set of two subfigures: (a) Matrix D during the first stage. (b) Matrix D after the first stage. generates a matrix with non-zero entries located in the diagonal line and the rightmost columns. The two-stage Raptor decoder operates as follows: In the first stage, MGE upper triangluarizes matrix D. The columns shifted to the rightmost part are grouped and defined as U, whose column number increases as MGE operates, as shown in Fig. 1(a). The matrix D after the first stage is illustrated in Fig. 1(b), where the left-upper and left-bottom parts respectively become a diagonal matrix and a null matrix, while the rightmost part is a dense matrix since many non-zero entries are included in U by the column inactivation. Then, the dense matrix U is processed by GE in the second stage so as to fully diagonalize the matrix. By using the low-complexity MGE to process most of the columns in the first stage, more than 90% of the overall complexity is reduced [4]. 3 Index-based ML RaptorQ decoder DOI: /comex Received June 12, 2015 Accepted June 30, 2015 Published July 28, 2015 The major difference of the Raptor and RaptorQ codes lies in the fact that some entries in the RaptorQ code generator matrix are octet. Based on the Raptor decoder introduced in the previous section, our proposed RaptorQ decoder also consists of two stages. In the first stage, the row vectors with octet entries are excluded from the candidates of the pivot rows, in order to make most computations of the MGE remain binary. An index table is then constructed to store all non-zero binary entries in D. For instance, for the row vector [ ], the indices stored in the table are [1, 2, 4, ]. Since the column/row exchange and the row operation for binary entries in the first stage are translated into the update of the index table, the computations in the first stages are greatly simplified. Specifically, considering the exchange of the mth and the nth columns, all the binary non-zero entries in the row vectors can be quickly identified by the index table. Then, only the row vector with different values of the mth and the nth entries need to update the index in the table by changing m to n, and vice versa. When the values of the mth and the nth entries are identical, either zero or one, the index table remains the same. For the exchange of the row vectors, we only need to interchange their indices stored in the table. Last, the row operation can be done by first checking which row vector has nonzero value in the same position as the position of the pivot entry, i.e., the index i in the ith iteration. Then, these row vectors are updated by removing those indices that also exist in the pivot row, and adding new indices that only exist in the pivot row. For example, for the pivot row with tabulated indices [2 4 7] which 2 is the 236

15 IEICE Communications Express, Vol.4, No.7, Fig. 2. Average runtime vs. sequence length for various decoding algorithms. The numbers in the boxes are the slopes of the regression lines for various algorithms. position of the pivot entry, the row vector with tabulated indices [2 4 6] is updated to [6 7] after the row operation. Last, due to the sparsity of D, the size of the index table is much smaller than M 2, and the computations row/column exchange and row operation are thus reduced from processing M entries to only a few indices. Consequently, the computational complexity of the MGE is reduced from OðM 3 Þ to OðM 2 Þ. 4 Simulation results DOI: /comex Received June 12, 2015 Accepted June 30, 2015 Published July 28, 2015 The computational complexity comparisons are depicted in Fig. 2 by measuring the average runtime of the Matlab code with the Intel(R) i GHz. The dashed lines are the linear regressions of the numerical results of the decoding algorithms. We can see that while the two reference algorithms have complexity of OðM 3 Þ, the proposed algorithm shows a complexity OðM 2 Þ. Thus, the complexity saving of the index-based ML decoder is more pronounced for large M. Only when M<1200, the index-based ML decoder is inferior since each row vector stores different numbers of indices, leading to the overhead of the irregular memory configuration and access. Nevertheless, this overhead is negligible for large M where up to ten times computational complexity saving is achieved. Memory is precious resource in a complicated decoder. We compare the memory requirement by the three decoder algorithms and show the comparison results in Fig. 3. Unlike the reference algorithms that use one bit and eight bits to store all entry values of the code generator matrix, the proposed algorithm keeps only the indices of nonzero binary entries and thus its memory requirement is drastically reduced. More than hundred times saving is achieved for the cases with large sequence length. 237

16 IEICE Communications Express, Vol.4, No.7, Fig. 3. Memory requirement vs. sequence length for various decoding algorithms. 5 Conclusion In this paper, we develop the first decoder for the RaptorQ code with the octet code generator matrix. By properly partitioning the decoding process, most operations are performed with binary values. Together with the proposed index table that saves the positions of the binary entries, our proposed index-based ML RaptorQ decoder consumes only one-tenth computational complexity and one-hundredth memory, when compared with the decoders that directly extend the algorithms for Raptor code decoders. Acknowledgments This work was supported in part by Ministry of Science and Technology, Taiwan (R.O.C.) under Grant no. NSC MOST E DOI: /comex Received June 12, 2015 Accepted June 30, 2015 Published July 28,

17 IEICE Communications Express, Vol.4, No.7, Two-stage SPIT detection scheme with betweenness centrality and social trust Miho Kurata a), Kentaroh Toyoda a), and Iwao Sasase Dept. of Information and Computer Science, Keio University, Hiyoshi, Kohoku, Yokohama, Kanagawa , Japan a) toyoda+kurata@sasase.ics.keio.ac.jp Abstract: Detecting SPIT (Spam over Internet Telephony) is an urgent demand in voice communication services. In this paper, we propose a twostage SPIT detection scheme using BC (Betweenness Centrality) and social trust to decrease misdetection of a call from low-frequent users as SPIT. BC indicates user s centrality in the entire network and the BC against legitimate users gradually increases with time even if users seldom call. We first use BC to identify a call request from a low-frequent user then judge the call legitimacy by using social trust. By the computer simulation, we show that our scheme improves the detection accuracy. Keywords: SPIT detection, VoIP, security, social trust Classification: Internet References [1] A. D. Keromytis, A comprehensive survey of voice over IP security research, IEEE Comm. Surv. and Tutor., vol. 14, no. 2, pp , DOI: / SURV [2] J. Seedorf, N. D Heureuse, S. Niccolini, and M. Cornolti, Detecting trustworthy real-time communications using a Web-of-Trust, IEEE GLOBECOM, pp. 1 8, DOI: /GLOCOM [3] T. Kusumoto, E. Y. Chen, and M. Itoh, Using call patterns to detect unwanted communication callers, IEEE/IPSJ International Symposium on Applications and the Internet (SAINT), pp , DOI: /SAINT [4] M. A. Azad and R. Morla, Caller-REP: Detecting unwanted calls with caller social strength, Comput. Secur., vol. 39, Part B, pp , DOI: /j.cose [5] N. Chaisamran, T. Okuda, and S. Yamaguchi, Trust-based VoIP spam detection based on calling behaviors and human relationships, J. Inf. Process., vol. 21, no. 2, pp , DOI: /ipsjjip [6] U. Brandes, A faster algorithm for betweenness centrality, J. Math. Sociol., vol. 25, no. 2, pp , DOI: / X Introduction DOI: /comex Received June 7, 2015 Accepted July 2, 2015 Published July 31, 2015 Various voice communication services are getting popular with the growing smartphone market. However, it is reported that malicious users or companies 239

18 IEICE Communications Express, Vol.4, No.7, may abuse them for advertisement or fraud, which is called SPIT (Spam over Internet Telephony) [1]. Hence, detecting SPIT calls or spammers in voice communication services is an urgent demand for the service providers. In particular, a social trust-based approach is receiving much attention due to growing SNS-based voice communication services. A social trust-based approach judges the legitimacy of a call with a trust value calculated from caller-callee relationships [2, 3, 4, 5]. We especially pay attention to the scheme [5] since it can correctly classify unknown users. This scheme uses the call duration as the trust value and the longer a user calls to a callee, the higher trust value the callee gives to the caller. However we notice that the scheme [5] raises false alarms for low-frequent legitimate users as time goes on. That is, the trust value of low-frequent users gradually decreases since they seldom receive calls. In this paper, we propose a two-stage SPIT detection scheme with BC (Betweenness Centrality) and social trust. We use BC to allow a call request from a low-frequent legitimate user at the first stage. And then we judge the legitimacy of a call by using the conventional scheme [5]. BC indicates how much a user is gone through shortest paths between paths among other users. The intuition behind utilizing BC is that spammers call towards users while they seldom receive calls and thus spammers tend to be isolated at the edge of the entire network. On the other hand, the value of BC against legitimate users gradually increases with time even if users seldom call. By the computer simulation, we show the legitimacy of introducing BC and also clarify that our scheme improves the detection accuracy. 2 System model We define a voice-based spammer as the attacker model and the aims of spammers are advertisement, voice phishing, and illegal sales. Spammers call towards randomly chosen users but they seldom receive calls from others. The call frequency is higher than that of legitimate users. Since the contents of SPIT seems to irritate ordinary users, the call duration tends to be much shorter than that of legitimate users. We assume that a SPIT detection system is deployed in a voice communication service provider and its task is to judge whether a call request should be established or not when receiving a call request from a user. We assume that as many as N user users (including both legitimate users and spammers) in the service provider and the system can access to users CDR (Call Detail Records) and buddy lists (friend lists) for the inspection. 3 Conventional scheme DOI: /comex Received June 7, 2015 Accepted July 2, 2015 Published July 31, 2015 Chaisamran et al. propose a voice-based SPIT detection scheme with a social trust [5]. This scheme always allows a call from a user in the callee s buddy list. Otherwise, i.e., if a call is from an unknown user, the system judges the legitimacy of call with an inferred trust value calculated from trust values of other users. Since multiple paths between an unknown caller u and a callee v may exist, the system chooses the maximum inferred trust T u!v as shown in Eq. (1). 240

19 IEICE Communications Express, Vol.4, No.7, T u!v ¼ max T path p u!v ; ð1þ p2p u!v where P u!v denotes a set of paths between u and v and T path p u!v indicates an inferred trust value calculated between users in a path p and is represented as Eq. (2). T path p u!v ¼ Y i2p T iðtþ : ð2þ In order to make a trust value reliable, each user is assigned a trust value from his/ her friend depending on the cumulative call duration. This will give a low trust value for spammers since they seldom receive calls. More specifically, a user i in the path p has its own trust value at time t as Eq. (3). T iðtþ ¼ R iðtþ þð1 ÞT iðt 1Þ ; where α denotes a weight variable ð 2½0; 1ŠÞ and a raw trust value R iðtþ at time t is represented as Eq. (4). C vðtþ Y n C j¼1 jðtþ ð3þ R iðtþ ¼ 1 ; ð4þ n where C jðtþ denotes the cumulative call duration that a user j calls to user v and n denotes the number of v s friends, respectively. Finally, the system compares the inferred trust value T u!v and the pre-defined threshold T th.ift u!v >T th, the system establishes a call request from a user u to v. Otherwise, it rejects a call request. 3.1 Shortcomings of the conventional scheme We argue that the scheme [5] raises false alarms for low-frequent legitimate users as time goes on. That is, the trust value of low-frequent users gradually decreases since they seldom receive calls. 4 Proposed scheme Here, we propose a two-stage SPIT detection scheme with BC and social trust in order for the system to correctly identify a call request from low-frequent legitimate users as a legitimate one. We use BC as a feature to allow a call from low-frequent users at the first stage. After that, we judge the legitimacy of a call by using the social trust-based approach [5]. DOI: /comex Received June 7, 2015 Accepted July 2, 2015 Published July 31, Introduction of BC In graph theory, BC indicates a user s centrality in the social network [6]. Formally, BC is defined as the ratio of the number of shortest paths from all users to all others that pass through that user. Let st denote the number of shortest paths from s 2 U to t 2 U, where U denotes a set of users in the entire network. Let st ðuþ denote the number of shortest paths from s 2 U to t 2 U that pass through u 2 U. By using st and st ðuþ, BCðuÞ, which is the BC of a user u, can be represented as Eq. (5). BCðuÞ ¼ X s u t2u st ðuþ st : ð5þ 241

20 IEICE Communications Express, Vol.4, No.7, Fig. 1. Toy example of SNS that consists of five users. The above description is rigid and difficult to understand why Eq. (5) indicates the centrality. Hence we calculate BC with an SNS that consists of five users with Fig. 1. In this example, we calculate two users BC, which are u 1 and u 3 and they are represented as BCðu 1 Þ¼ 2;3ðu 1 Þ 2;3 þ 2;4ðu 1 Þ 2;4 þ 2;5ðu 1 Þ 2;5 þ 3;4ðu 1 Þ 3;4 0 1 þ 0 1 þ 0 1 þ 0 1 þ 0 1 þ 0 1 ¼ 0 and BCðu 3Þ¼ 0 1 þ 1 1 þ 1 1 þ 1 1 þ 1 1 þ 0 1 þ 3;5ðu 1 Þ 3;5 ¼ ¼ 4. Therefore, þ 4;5ðu 1 Þ 4;5 BCðu 3 Þ > BCðu 1 Þ and thus the user u 3 is located more central than the user u 1. This matches the fact that the user u 1 is located at the edge of the entire network while the user u 3 is located in the center of the network in Fig. 1. We argue that BC for spammers does not increase. Since spammers call but seldom receive calls, they tend to be isolated at the edge of the entire network and hardly go through the shortest paths between users. Hence the numerator of Eq. (5) for spammers does not increase well. On the other hand, BC for legitimate users gradually increases with time even if users seldom call. This is because legitimate users gradually make connection with legitimate users and the number of paths that go through legitimate users increases. Therefore, the numerator in Eq. (5) for legitimate users gradually increases. Spammers may collude each other to increase the value of their BC, which is so-called Sybil attack. Although they can locally increase their BC, it is difficult to globally increase it. Hence spammers should account for large part of entire user to succeed the Sybil attack. In reality, spammers would be less compared to the legitimate users and thus BC for spammers is still small even if they collude. 4.2 Algorithm When receiving a call establish request from a caller u, the server first checks whether the caller u is in the callee s buddy list. If the caller is in callee s buddy list, they are assumed to be friends and thus the system establishes a call request. Otherwise, the system proceeds to the first detection stage that checks whether his/ her BCðuÞ is bigger than a pre-defined threshold BC th.ifbcðuþ > BC th, the system judges that the call is legitimate and establishes the call. Otherwise, the system calculates the inferred trust value T u!v by using Eqs. (1) (4) and checks whether the caller s inferred social trust from the callee vt u!v is bigger than a pre-defined threshold T th. If T u!v >T th, the system judges that the call is legitimate and establishes a call. Otherwise, the system rejects the call establishment request. DOI: /comex Received June 7, 2015 Accepted July 2, 2015 Published July 31,

21 IEICE Communications Express, Vol.4, No.7, Fig. 2. Characteristics of BC. Fig. 3. Detection accuracy. 5 Simulation results We evaluate the characteristics of BC and the detection accuracy by the computer simulation. We use the simulation parameters specified in [5] and set the other undefined parameters as N user ¼ 1;000 and BC th ¼ Characteristics of BC Fig. 2(a) shows the boxplot of an average BC values against legitimate callers and spammers when five months passed. As we can see from Fig. 2(a), BC for spammers is concentrated around 0 while BC for legitimate callers mostly ranges from 50 to 200. Fig. 2(b) shows the average BC for legitimate users with time. As we can see from Fig. 2(b), the BC for legitimate users gradually increases with time. DOI: /comex Received June 7, 2015 Accepted July 2, 2015 Published July 31, Detection accuracy Fig. 3(a) and Fig. 3(b) show the true positive rate and false positive rate versus elapsed time. The true positive rate denotes the ratio of correctly identified calls from spammers while the false positive rate is the ratio of mistakenly identified calls from legitimate users, respectively. We first discuss the true positive rate. From Fig. 3(a), we confirm that our scheme does not degrade the true positive rate. We then discuss the false positive rate. In Fig. 3(b), the false positive rate against the conventional scheme is getting worse with time. On the other hand, the false positive rate of the proposed scheme is within 2% and does not degrade with time. 243

22 IEICE Communications Express, Vol.4, No.7, The false positive rate seems to be irrespective of the ratio of spammers. This is because the scheme judges whether each call request (not caller ) is legitimate or not. From this result, we can say that the false positive rate can be remedied by using BC. 6 Conclusion We have pointed out that calls from low-frequent users are gradually identified as SPIT in the conventional scheme. To remedy this issue, we have proposed a twostage SPIT detection scheme with BC and social trust. By the computer simulation, it is shown that our scheme achieves low false positive rate (< 2%) without lowering true positive rate. Acknowledgments This work is partly supported by the Grant in Aid for Scientific Research (No ) from Ministry of Education, Sport, Science and Technology, Japan. DOI: /comex Received June 7, 2015 Accepted July 2, 2015 Published July 31,

OpenStack hypervisor, container and Baremetal servers performance comparison

OpenStack hypervisor, container and Baremetal servers performance comparison OpenStack hypervisor, container and Baremetal servers performance comparison Yoji Yamato a) Software Innovation Center, NTT Corporation, 3 9 11 Midori-cho, Musashino-shi, Tokyo 180 8585, Japan a) yamato.yoji@lab.ntt.co.jp

More information

Generating a network reliability formula by using binary decision diagrams

Generating a network reliability formula by using binary decision diagrams Generating a network reliability formula by using binary decision diagrams Yasuhiro Ikeda a), Ryoichi Kawahara, and Hiroshi Saito NTT Network Technology Laboratories, NTT Corporation, 3 9 11 Midori-cho,

More information

The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks

The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks Jing Yue, Zihuai Lin, Branka Vucetic, and Pei Xiao School of Electrical and Information Engineering, The University

More information

An Area-Efficient BIRA With 1-D Spare Segments

An Area-Efficient BIRA With 1-D Spare Segments 206 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 26, NO. 1, JANUARY 2018 An Area-Efficient BIRA With 1-D Spare Segments Donghyun Kim, Hayoung Lee, and Sungho Kang Abstract The

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant

More information

Real-time processing for intelligent-surveillance applications

Real-time processing for intelligent-surveillance applications LETTER IEICE Electronics Express, Vol.14, No.8, 1 12 Real-time processing for intelligent-surveillance applications Sungju Lee, Heegon Kim, Jaewon Sa, Byungkwan Park, and Yongwha Chung a) Dept. of Computer

More information

/$ IEEE

/$ IEEE IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 56, NO. 1, JANUARY 2009 81 Bit-Level Extrinsic Information Exchange Method for Double-Binary Turbo Codes Ji-Hoon Kim, Student Member,

More information

Quantitative study of computing time of direct/iterative solver for MoM by GPU computing

Quantitative study of computing time of direct/iterative solver for MoM by GPU computing Quantitative study of computing time of direct/iterative solver for MoM by GPU computing Keisuke Konno 1a), Hajime Katsuda 2, Kei Yokokawa 1, Qiang Chen 1, Kunio Sawaya 3, and Qiaowei Yuan 4 1 Department

More information

A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks

A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks Hiraku Okada,HitoshiImai, Takaya Yamazato, Masaaki Katayama, Kenichi Mase Center for Transdisciplinary Research, Niigata University,

More information

Keywords: disk throughput, virtual machine, I/O scheduling, performance evaluation

Keywords: disk throughput, virtual machine, I/O scheduling, performance evaluation Simple and practical disk performance evaluation method in virtual machine environments Teruyuki Baba Atsuhiro Tanaka System Platforms Research Laboratories, NEC Corporation 1753, Shimonumabe, Nakahara-Ku,

More information

Lec 19 - Error and Loss Control

Lec 19 - Error and Loss Control ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office

More information

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Optimized Watermarking Using Swarm-Based Bacterial Foraging Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging

More information

Implementation of Software-based EPON-OLT and Performance Evaluation

Implementation of Software-based EPON-OLT and Performance Evaluation This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Communications Express, Vol.1, 1 6 Implementation of Software-based EPON-OLT and

More information

An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform

An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform A B M Moniruzzaman, StudentMember, IEEE Kawser Wazed Nafi Syed Akther Hossain, Member, IEEE & ACM Abstract Cloud

More information

MRT based Fixed Block size Transform Coding

MRT based Fixed Block size Transform Coding 3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using

More information

Near Optimal Repair Rate Built-in Redundancy Analysis with Very Small Hardware Overhead

Near Optimal Repair Rate Built-in Redundancy Analysis with Very Small Hardware Overhead Near Optimal Repair Rate Built-in Redundancy Analysis with Very Small Hardware Overhead Woosung Lee, Keewon Cho, Jooyoung Kim, and Sungho Kang Department of Electrical & Electronic Engineering, Yonsei

More information

RECENTLY, researches on gigabit wireless personal area

RECENTLY, researches on gigabit wireless personal area 146 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 55, NO. 2, FEBRUARY 2008 An Indexed-Scaling Pipelined FFT Processor for OFDM-Based WPAN Applications Yuan Chen, Student Member, IEEE,

More information

Expectation and Maximization Algorithm for Estimating Parameters of a Simple Partial Erasure Model

Expectation and Maximization Algorithm for Estimating Parameters of a Simple Partial Erasure Model 608 IEEE TRANSACTIONS ON MAGNETICS, VOL. 39, NO. 1, JANUARY 2003 Expectation and Maximization Algorithm for Estimating Parameters of a Simple Partial Erasure Model Tsai-Sheng Kao and Mu-Huo Cheng Abstract

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

packet-switched networks. For example, multimedia applications which process

packet-switched networks. For example, multimedia applications which process Chapter 1 Introduction There are applications which require distributed clock synchronization over packet-switched networks. For example, multimedia applications which process time-sensitive information

More information

DOWNWARD SPATIALLY-SCALABLE IMAGE RECONSTRUCTION BASED ON COMPRESSED SENSING

DOWNWARD SPATIALLY-SCALABLE IMAGE RECONSTRUCTION BASED ON COMPRESSED SENSING DOWNWARD SPATIALLY-SCALABLE IMAGE RECONSTRUCTION BASED ON COMPRESSED SENSING Shuyuan Zhu 1 Bing Zeng 1 Lu Fang 2 and Moncef Gabbouj 3 1 Institute of Image Processing University of Electronic Science and

More information

CPU-GPU hybrid computing for feature extraction from video stream

CPU-GPU hybrid computing for feature extraction from video stream LETTER IEICE Electronics Express, Vol.11, No.22, 1 8 CPU-GPU hybrid computing for feature extraction from video stream Sungju Lee 1, Heegon Kim 1, Daihee Park 1, Yongwha Chung 1a), and Taikyeong Jeong

More information

1278 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 21, NO. 3, JULY 2006

1278 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 21, NO. 3, JULY 2006 1278 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 21, NO. 3, JULY 2006 Failure Risk Prediction Using Artificial Neural Networks for Lightning Surge Protection of Underground MV Cables Ángel L. Orille-Fernández,

More information

Proactnes II: Visualization for Next Generation Networks

Proactnes II: Visualization for Next Generation Networks roactnes II: Visualization for Next Generation Networks Hideyuki Matsuda Noritaka Fujinaka Jun Ogawa Tomohiro Muramoto (Manuscript received April 2, 2009) The voice telephony, video distribution, and data

More information

THE KEY PROVIDING SYSTEM FOR WIRELESS LAN USING VISIBLE LIGHT COMMUNICATION

THE KEY PROVIDING SYSTEM FOR WIRELESS LAN USING VISIBLE LIGHT COMMUNICATION THE KEY PROVIDING SYSTEM FOR WIRELESS LAN USING VISIBLE LIGHT COMMUNICATION Kuniyoshi Okuda 1, Takuya Yamamoto 2, Tomoo Nakamura 1 and Wataru Uemura 1 1 Department of Electronics Informatics, Ryukoku University,

More information

Reconstruction Improvements on Compressive Sensing

Reconstruction Improvements on Compressive Sensing SCITECH Volume 6, Issue 2 RESEARCH ORGANISATION November 21, 2017 Journal of Information Sciences and Computing Technologies www.scitecresearch.com/journals Reconstruction Improvements on Compressive Sensing

More information

An introduction to interpolation and splines

An introduction to interpolation and splines An introduction to interpolation and splines Kenneth H. Carpenter, EECE KSU November 22, 1999 revised November 20, 2001, April 24, 2002, April 14, 2004 1 Introduction Suppose one wishes to draw a curve

More information

TEXTURE OVERLAY ONTO NON-RIGID SURFACE USING COMMODITY DEPTH CAMERA

TEXTURE OVERLAY ONTO NON-RIGID SURFACE USING COMMODITY DEPTH CAMERA TEXTURE OVERLAY ONTO NON-RIGID SURFACE USING COMMODITY DEPTH CAMERA Tomoki Hayashi 1, Francois de Sorbier 1 and Hideo Saito 1 1 Graduate School of Science and Technology, Keio University, 3-14-1 Hiyoshi,

More information

Performance Bottleneck Analysis of Web Applications with eassist

Performance Bottleneck Analysis of Web Applications with eassist : New Measures for Data Center Performance Bottleneck Analysis of Web Applications with eassist Tomohide Yamamoto, Yasuharu Yamada, and Tetsuya Ogata Abstract This article introduces eassist, which enables

More information

Singularity Analysis of an Extensible Kinematic Architecture: Assur Class N, Order N 1

Singularity Analysis of an Extensible Kinematic Architecture: Assur Class N, Order N 1 David H. Myszka e-mail: dmyszka@udayton.edu Andrew P. Murray e-mail: murray@notes.udayton.edu University of Dayton, Dayton, OH 45469 James P. Schmiedeler The Ohio State University, Columbus, OH 43210 e-mail:

More information

Summary of Raptor Codes

Summary of Raptor Codes Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.

More information

FEC Performance in Large File Transfer over Bursty Channels

FEC Performance in Large File Transfer over Bursty Channels FEC Performance in Large File Transfer over Bursty Channels Shuichiro Senda, Hiroyuki Masuyama, Shoji Kasahara and Yutaka Takahashi Graduate School of Informatics, Kyoto University, Kyoto 66-85, Japan

More information

Express Letters. A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation. Jianhua Lu and Ming L. Liou

Express Letters. A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation. Jianhua Lu and Ming L. Liou IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 7, NO. 2, APRIL 1997 429 Express Letters A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation Jianhua Lu and

More information

For example, the system. 22 may be represented by the augmented matrix

For example, the system. 22 may be represented by the augmented matrix Matrix Solutions to Linear Systems A matrix is a rectangular array of elements. o An array is a systematic arrangement of numbers or symbols in rows and columns. Matrices (the plural of matrix) may be

More information

Efficient VLSI Huffman encoder implementation and its application in high rate serial data encoding

Efficient VLSI Huffman encoder implementation and its application in high rate serial data encoding LETTER IEICE Electronics Express, Vol.14, No.21, 1 11 Efficient VLSI Huffman encoder implementation and its application in high rate serial data encoding Rongshan Wei a) and Xingang Zhang College of Physics

More information

Sparse Component Analysis (SCA) in Random-valued and Salt and Pepper Noise Removal

Sparse Component Analysis (SCA) in Random-valued and Salt and Pepper Noise Removal Sparse Component Analysis (SCA) in Random-valued and Salt and Pepper Noise Removal Hadi. Zayyani, Seyyedmajid. Valliollahzadeh Sharif University of Technology zayyani000@yahoo.com, valliollahzadeh@yahoo.com

More information

Cost-based Pricing for Multicast Streaming Services

Cost-based Pricing for Multicast Streaming Services Cost-based Pricing for Multicast Streaming Services Eiji TAKAHASHI, Takaaki OHARA, Takumi MIYOSHI,, and Yoshiaki TANAKA Global Information and Telecommunication Institute, Waseda Unviersity 29-7 Bldg.,

More information

Method estimating reflection coefficients of adaptive lattice filter and its application to system identification

Method estimating reflection coefficients of adaptive lattice filter and its application to system identification Acoust. Sci. & Tech. 28, 2 (27) PAPER #27 The Acoustical Society o Japan Method estimating relection coeicients o adaptive lattice ilter and its application to system identiication Kensaku Fujii 1;, Masaaki

More information

Development of Transport Systems for Dedicated Service Provision Using Packet Transport Technologies

Development of Transport Systems for Dedicated Service Provision Using Packet Transport Technologies Development of Transport Systems for Dedicated Service Provision Using Transport Technologies Hidetoshi Onda, Masaki Shinkai, Takaaki Hisashima, Sachio Suda, Takeru Sakairi, Hidenori Iwashita, Masaya Ogawa,

More information

Evaluation of DSSS WLAN Beacon Caused by Interference with BLE Advertising Packet Considering the Difference in Frequency

Evaluation of DSSS WLAN Beacon Caused by Interference with BLE Advertising Packet Considering the Difference in Frequency Journal of Signal Processing, Vol.21, No.6, pp.249-256, November 2017 PAPER Evaluation of DSSS WLAN Beacon Caused by Interference with BLE Advertising Packet Considering the Difference in Frequency Junya

More information

PERFORMANCE IMPROVEMENT OF AN ISCSI-BASED SECURE STORAGE ACCESS

PERFORMANCE IMPROVEMENT OF AN ISCSI-BASED SECURE STORAGE ACCESS PERFORMANCE IMPROVEMENT OF AN I-BASED SECURE STORAGE ACCESS Kikuko Kamisakay, Saneyasu Yamaguchiz, Masato Oguchiy y Graduate School of Humanities and Sciences Ochanomizu University 2-1-1, Otsuka, Bunkyo-ku,

More information

DUE to the high computational complexity and real-time

DUE to the high computational complexity and real-time IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 3, MARCH 2005 445 A Memory-Efficient Realization of Cyclic Convolution and Its Application to Discrete Cosine Transform Hun-Chen

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications

An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications Zhenhai Duan, Kartik Gopalan, Xin Yuan Abstract In this paper we present a detailed study of the behavioral characteristics

More information

Experimental Analysis of TCP Behaviors against Bursty Packet Losses Caused by Transmission Interruption

Experimental Analysis of TCP Behaviors against Bursty Packet Losses Caused by Transmission Interruption Experimental Analysis of TCP Behaviors against Bursty Packet Losses Caused by Transmission Interruption Weikai Wang, Celimuge Wu, Satoshi Ohzahata, Toshihiko Kato Graduate School of Information Systems

More information

Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers

Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers , October 20-22, 2010, San Francisco, USA Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers I-Lun Tseng, Member, IAENG, Huan-Wen Chen, and Che-I Lee Abstract Longest-path routing problems,

More information

Ultrasonic Multi-Skip Tomography for Pipe Inspection

Ultrasonic Multi-Skip Tomography for Pipe Inspection 18 th World Conference on Non destructive Testing, 16-2 April 212, Durban, South Africa Ultrasonic Multi-Skip Tomography for Pipe Inspection Arno VOLKER 1, Rik VOS 1 Alan HUNTER 1 1 TNO, Stieltjesweg 1,

More information

Image Classification Using Wavelet Coefficients in Low-pass Bands

Image Classification Using Wavelet Coefficients in Low-pass Bands Proceedings of International Joint Conference on Neural Networks, Orlando, Florida, USA, August -7, 007 Image Classification Using Wavelet Coefficients in Low-pass Bands Weibao Zou, Member, IEEE, and Yan

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

CONTENT ADAPTIVE SCREEN IMAGE SCALING

CONTENT ADAPTIVE SCREEN IMAGE SCALING CONTENT ADAPTIVE SCREEN IMAGE SCALING Yao Zhai (*), Qifei Wang, Yan Lu, Shipeng Li University of Science and Technology of China, Hefei, Anhui, 37, China Microsoft Research, Beijing, 8, China ABSTRACT

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

Communication Method for Remote Device Control using the Internet and its Evaluation

Communication Method for Remote Device Control using the Internet and its Evaluation Communication Method for Remote Control using the Internet and its Evaluation SHINJI KITAGAMI 1, YOSUKE KANEKO 1, AKIHISA YASUDA 1, HARUMI MINEMURA 1 and JUN SAWAMOTO 2 1 Mitsubishi Electric Corporation

More information

Modeling and Analysis of Crosstalk between Differential Lines in High-speed Interconnects

Modeling and Analysis of Crosstalk between Differential Lines in High-speed Interconnects 1293 Modeling and Analysis of Crosstalk between Differential Lines in High-speed Interconnects F. Xiao and Y. Kami University of Electro-Communications, Japan Abstract The crosstalk between a single-ended

More information

Supplementary file for SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks

Supplementary file for SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks 1 Supplementary file for SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks Wei Wei, Fengyuan Xu, Chiu C. Tan, Qun Li The College of William and Mary, Temple University {wwei,

More information

Random projection for non-gaussian mixture models

Random projection for non-gaussian mixture models Random projection for non-gaussian mixture models Győző Gidófalvi Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 92037 gyozo@cs.ucsd.edu Abstract Recently,

More information

Robot localization method based on visual features and their geometric relationship

Robot localization method based on visual features and their geometric relationship , pp.46-50 http://dx.doi.org/10.14257/astl.2015.85.11 Robot localization method based on visual features and their geometric relationship Sangyun Lee 1, Changkyung Eem 2, and Hyunki Hong 3 1 Department

More information

Power-Mode-Aware Buffer Synthesis for Low-Power Clock Skew Minimization

Power-Mode-Aware Buffer Synthesis for Low-Power Clock Skew Minimization This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.* No.*,*-* Power-Mode-Aware Buffer Synthesis for Low-Power

More information

Copyright 2011 by Dr. Andrew David Norte. All Rights Reserved.

Copyright 2011 by Dr. Andrew David Norte. All Rights Reserved. Near-End Crosstalk Considerations For Coupled Microstriplines David Norte, PhD www.the-signal-and-power-integrity-institute.com Thornton, Colorado, 80234, USA Abstract This paper addresses the impact of

More information

Photometric Stereo with Auto-Radiometric Calibration

Photometric Stereo with Auto-Radiometric Calibration Photometric Stereo with Auto-Radiometric Calibration Wiennat Mongkulmann Takahiro Okabe Yoichi Sato Institute of Industrial Science, The University of Tokyo {wiennat,takahiro,ysato} @iis.u-tokyo.ac.jp

More information

Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH

Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH 2011 International Conference on Document Analysis and Recognition Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH Kazutaka Takeda,

More information

A Novel Information Lifecycle Management Scheme for a Web-Based Database System

A Novel Information Lifecycle Management Scheme for a Web-Based Database System Journal of Scientific & Industrial Research Vol. 76, February 2017, pp. 85-89 A Novel Information Lifecycle Management Scheme for a Web-Based Database System Jui-Pin Yang 1 * and Ying-Chin Chen 2 *1 Department

More information

Multi-View Image Coding in 3-D Space Based on 3-D Reconstruction

Multi-View Image Coding in 3-D Space Based on 3-D Reconstruction Multi-View Image Coding in 3-D Space Based on 3-D Reconstruction Yongying Gao and Hayder Radha Department of Electrical and Computer Engineering, Michigan State University, East Lansing, MI 48823 email:

More information

Progress In Electromagnetics Research M, Vol. 20, 29 42, 2011

Progress In Electromagnetics Research M, Vol. 20, 29 42, 2011 Progress In Electromagnetics Research M, Vol. 20, 29 42, 2011 BEAM TRACING FOR FAST RCS PREDICTION OF ELECTRICALLY LARGE TARGETS H.-G. Park, H.-T. Kim, and K.-T. Kim * Department of Electrical Engineering,

More information

MATRIX-VECTOR MULTIPLICATION ALGORITHM BEHAVIOR IN THE CLOUD

MATRIX-VECTOR MULTIPLICATION ALGORITHM BEHAVIOR IN THE CLOUD ICIT 2013 The 6 th International Conference on Information Technology MATRIX-VECTOR MULTIPLICATIO ALGORITHM BEHAVIOR I THE CLOUD Sasko Ristov, Marjan Gusev and Goran Velkoski Ss. Cyril and Methodius University,

More information

ANALYSIS OF SPIHT ALGORITHM FOR SATELLITE IMAGE COMPRESSION

ANALYSIS OF SPIHT ALGORITHM FOR SATELLITE IMAGE COMPRESSION ANALYSIS OF SPIHT ALGORITHM FOR SATELLITE IMAGE COMPRESSION K Nagamani (1) and AG Ananth (2) (1) Assistant Professor, R V College of Engineering, Bangalore-560059. knmsm_03@yahoo.com (2) Professor, R V

More information

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision Huei-Wen Ferng, Jin-Hui Lin, Yuan-Cheng Lai, and Yung-Ching Chen Department of Computer Science and Information

More information

P. H. Xie, K. S. Chen, and Z. S. He School of Electronic Engineering University of Electronic Science and Technology of China Chengdu , China

P. H. Xie, K. S. Chen, and Z. S. He School of Electronic Engineering University of Electronic Science and Technology of China Chengdu , China Progress In Electromagnetics Research Letters, Vol 9, 47 56, 29 SYNTHESIS OF SPARSE CYLINDRICAL ARRAYS USING SIMULATED ANNEALING ALGORITHM P H Xie, K S Chen, and Z S He School of Electronic Engineering

More information

Robust color segmentation algorithms in illumination variation conditions

Robust color segmentation algorithms in illumination variation conditions 286 CHINESE OPTICS LETTERS / Vol. 8, No. / March 10, 2010 Robust color segmentation algorithms in illumination variation conditions Jinhui Lan ( ) and Kai Shen ( Department of Measurement and Control Technologies,

More information

A CORDIC Algorithm with Improved Rotation Strategy for Embedded Applications

A CORDIC Algorithm with Improved Rotation Strategy for Embedded Applications A CORDIC Algorithm with Improved Rotation Strategy for Embedded Applications Kui-Ting Chen Research Center of Information, Production and Systems, Waseda University, Fukuoka, Japan Email: nore@aoni.waseda.jp

More information

Study on Appropriate Voice Data Length of IP Packets for VoIP Network Adjustment

Study on Appropriate Voice Data Length of IP Packets for VoIP Network Adjustment Study on Appropriate Voice Data Length of IP Packets for VoIP Network Adjustment Hiroyuki OOUCHI, Tsuyoshi TAKENAGA, Hajime SUGAWARA, and Masao MASUGI NTT Network Service Systems Laboratories 9-, Midori-Cho

More information

Twiddle Factor Transformation for Pipelined FFT Processing

Twiddle Factor Transformation for Pipelined FFT Processing Twiddle Factor Transformation for Pipelined FFT Processing In-Cheol Park, WonHee Son, and Ji-Hoon Kim School of EECS, Korea Advanced Institute of Science and Technology, Daejeon, Korea icpark@ee.kaist.ac.kr,

More information

Development and Evaluation of QoS Measurement System for Internet Applications by Client Observation

Development and Evaluation of QoS Measurement System for Internet Applications by Client Observation JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 891-904 (2002) Development and Evaluation of QoS Measurement System for Internet Applications by Client Observation Department of Information Systems

More information

A Software LDPC Decoder Implemented on a Many-Core Array of Programmable Processors

A Software LDPC Decoder Implemented on a Many-Core Array of Programmable Processors A Software LDPC Decoder Implemented on a Many-Core Array of Programmable Processors Brent Bohnenstiehl and Bevan Baas Department of Electrical and Computer Engineering University of California, Davis {bvbohnen,

More information

On Layered VPN Architecture for Enabling User-Based Multiply Associated VPNs

On Layered VPN Architecture for Enabling User-Based Multiply Associated VPNs On Layered VPN Architecture for Enabling User-Based Multiply Associated VPNs Yoshihiro Hara 1, Hiroyuki Ohsaki 1, Makoto Imase 1,YoshitakeTajima 2, Masahiro Maruyoshi 2, and Junichi Murayama 2 1 Graduate

More information

A Two-phase Distributed Training Algorithm for Linear SVM in WSN

A Two-phase Distributed Training Algorithm for Linear SVM in WSN Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

Thwarting Traceback Attack on Freenet

Thwarting Traceback Attack on Freenet Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract

More information

Scan-Based BIST Diagnosis Using an Embedded Processor

Scan-Based BIST Diagnosis Using an Embedded Processor Scan-Based BIST Diagnosis Using an Embedded Processor Kedarnath J. Balakrishnan and Nur A. Touba Computer Engineering Research Center Department of Electrical and Computer Engineering University of Texas

More information

Synthesis of Pencil Beam Linear Antenna Arrays using Simple FFT/CF/GA Based Technique

Synthesis of Pencil Beam Linear Antenna Arrays using Simple FFT/CF/GA Based Technique International Journal of Engineering & Technology IJET-IJENS Vol:13 No:05 86 Synthesis of Pencil Beam Linear Antenna Arrays using Simple FFT/CF/GA Based Technique B. Eldosouky 1, A. H. Hussein 1, H. H.

More information

Video shot segmentation using late fusion technique

Video shot segmentation using late fusion technique Video shot segmentation using late fusion technique by C. Krishna Mohan, N. Dhananjaya, B.Yegnanarayana in Proc. Seventh International Conference on Machine Learning and Applications, 2008, San Diego,

More information

Epipolar geometry-based ego-localization using an in-vehicle monocular camera

Epipolar geometry-based ego-localization using an in-vehicle monocular camera Epipolar geometry-based ego-localization using an in-vehicle monocular camera Haruya Kyutoku 1, Yasutomo Kawanishi 1, Daisuke Deguchi 1, Ichiro Ide 1, Hiroshi Murase 1 1 : Nagoya University, Japan E-mail:

More information

Hideki SAKAMOTO 1 Ikuo TANABE 2 Satoshi TAKAHASHI 3

Hideki SAKAMOTO 1 Ikuo TANABE 2 Satoshi TAKAHASHI 3 Journal of Machine Engineering, Vol. 14, No. 2, 2014 Taguchi methods, production, management, optimum condition, innovation Hideki SAKAMOTO 1 Ikuo TANABE 2 Satoshi TAKAHASHI 3 DEVELOPMENT OF PERFECTLY

More information

Robust Face Recognition via Sparse Representation

Robust Face Recognition via Sparse Representation Robust Face Recognition via Sparse Representation Panqu Wang Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA 92092 pawang@ucsd.edu Can Xu Department of

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Cell-to-switch assignment in. cellular networks. barebones particle swarm optimization

Cell-to-switch assignment in. cellular networks. barebones particle swarm optimization Cell-to-switch assignment in cellular networks using barebones particle swarm optimization Sotirios K. Goudos a), Konstantinos B. Baltzis, Christos Bachtsevanidis, and John N. Sahalos RadioCommunications

More information

A Graph-Based Approach for Mining Closed Large Itemsets

A Graph-Based Approach for Mining Closed Large Itemsets A Graph-Based Approach for Mining Closed Large Itemsets Lee-Wen Huang Dept. of Computer Science and Engineering National Sun Yat-Sen University huanglw@gmail.com Ye-In Chang Dept. of Computer Science and

More information

Available online at ScienceDirect. Procedia Computer Science 98 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 98 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 98 (2016 ) 515 521 The 3rd International Symposium on Emerging Information, Communication and Networks (EICN 2016) A Speculative

More information

Digital Filter Synthesis Considering Multiple Adder Graphs for a Coefficient

Digital Filter Synthesis Considering Multiple Adder Graphs for a Coefficient Digital Filter Synthesis Considering Multiple Graphs for a Coefficient Jeong-Ho Han, and In-Cheol Park School of EECS, Korea Advanced Institute of Science and Technology, Daejeon, Korea jhhan.kr@gmail.com,

More information

Binarization of Color Character Strings in Scene Images Using K-means Clustering and Support Vector Machines

Binarization of Color Character Strings in Scene Images Using K-means Clustering and Support Vector Machines 2011 International Conference on Document Analysis and Recognition Binarization of Color Character Strings in Scene Images Using K-means Clustering and Support Vector Machines Toru Wakahara Kohei Kita

More information

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam

More information

Design and Implementation of Log Collection and System Statistics Model for Android Containers in OpenStack

Design and Implementation of Log Collection and System Statistics Model for Android Containers in OpenStack ISBN 978-93-86878-04-5 6th International Conference on Science, Engineering, Technology and Healthcare (SETH-2017) Kuala Lumpur (Malaysia), Nov. 20-21, 2017 Design and Implementation of Log Collection

More information

Enhanced Characteristic Basis Function Method for Solving the Monostatic Radar Cross Section of Conducting Targets

Enhanced Characteristic Basis Function Method for Solving the Monostatic Radar Cross Section of Conducting Targets Progress In Electromagnetics Research M, Vol. 68, 173 180, 2018 Enhanced Characteristic Basis Function Method for Solving the Monostatic Radar Cross Section of Conducting Targets Jinyu Zhu, Yufa Sun *,

More information

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an

More information

The optimum design of a moving PM-type linear motor for resonance operating refrigerant compressor

The optimum design of a moving PM-type linear motor for resonance operating refrigerant compressor International Journal of Applied Electromagnetics and Mechanics 33 (2010) 673 680 673 DOI 10.3233/JAE-2010-1172 IOS Press The optimum design of a moving PM-type linear motor for resonance operating refrigerant

More information

An efficient access control method for composite multimedia content

An efficient access control method for composite multimedia content IEICE Electronics Express, Vol.7, o.0, 534 538 An efficient access control method for composite multimedia content Shoko Imaizumi,a), Masaaki Fujiyoshi,andHitoshiKiya Industrial Research Institute of iigata

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

A nodal based evolutionary structural optimisation algorithm

A nodal based evolutionary structural optimisation algorithm Computer Aided Optimum Design in Engineering IX 55 A dal based evolutionary structural optimisation algorithm Y.-M. Chen 1, A. J. Keane 2 & C. Hsiao 1 1 ational Space Program Office (SPO), Taiwan 2 Computational

More information