17 results on '"Masahisa Kawashima"'
Search Results
2. IOWN for digital twin enabled societies
- Author
-
Masahisa Kawashima
- Abstract
Achieving the extreme data volume and velocity requirements of digital twin applications energy-efficiently is challenging. IOWN will address this challenge by making architectural shifts in computing and networking with the evolution of optical technologies.
- Published
- 2022
- Full Text
- View/download PDF
3. Safe and Secure Services Based on NGN
- Author
-
Takemi Nisase, Yoshihito Oshima, Tomoo Fukazawa, Takeo Hariu, and Masahisa Kawashima
- Subjects
Password ,Authentication ,Session Initiation Protocol ,Service (systems architecture) ,Computer science ,business.industry ,computer.internet_protocol ,Computer security ,computer.software_genre ,Secure communication ,Artificial Intelligence ,Hardware and Architecture ,Next-generation network ,Web application ,Strong authentication ,Computer Vision and Pattern Recognition ,Electrical and Electronic Engineering ,business ,computer ,Software ,Computer network ,Private network - Abstract
Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles—namely, fixed, nomadic, and mobile—are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.
- Published
- 2008
- Full Text
- View/download PDF
4. A cell interleave method for VBR data transport and the evaluation of its effectiveness in video transmission
- Author
-
Masahisa Kawashima
- Subjects
Computer Networks and Communications ,business.industry ,Data transport ,Computer science ,Real-time computing ,Video transmission ,Electrical and Electronic Engineering ,business ,Variable bitrate ,Computer network - Published
- 1998
- Full Text
- View/download PDF
5. Let's Enjoy Multimedia with DAVIC! Interoperability Tests
- Author
-
Masahisa Kawashima and Masahiro Morinaga
- Subjects
World Wide Web ,Multimedia ,Computer science ,Interoperability ,Media Technology ,Electrical and Electronic Engineering ,computer.software_genre ,computer ,Computer Science Applications - Published
- 1997
- Full Text
- View/download PDF
6. Variable bit-rate video transmission using traffic shaping
- Author
-
Masahisa Kawashima, Hideyoshi Tominaga, and Masahiro Inoue
- Subjects
Network congestion ,Variable (computer science) ,Transmission (telecommunications) ,Transmission delay ,Computer Networks and Communications ,Control theory ,Computer science ,Traffic shaping ,Electrical and Electronic Engineering ,Saturation (chemistry) ,Variable bitrate ,Smoothing - Abstract
Video transmission that uses traffic shaping to smooth bit-rate variations in performing a variable bit-rate transmission while controlling congestion on an ATM network is examined. First, a traffic shaping system is proposed that keeps the transmission delay due to buffering under a fixed permitted value. Next, in simulation, the relationship between the effective bit-rate smoothing of traffic shaping, the permitted delay, and effective congestion control are shown. Effective congestion control due to the use of average rate control in conjunction with traffic shaping is also shown. Effective bit-rate smoothing and effective congestion control change in accordance with the size of the permitted delay. In an example experiment, an improvement in effective bit-rate smoothing in a scene change is evident when the permitted delay increases in a segment of under roughly 100 ms and the rate increase is inversely proportional to the permitted delay. Consequently, saturation probability decreases. Even when the permitted delay is increased in a segment exceeding 100 ms, saturation probability decreases, although a decrease in the maximum bit rate is not evident due to smoothing. The effect of the two systems is multiplied if the average bit rate and traffic shaping are used together, with the saturation probability being greatly reduced.
- Published
- 1996
- Full Text
- View/download PDF
7. DAVIC. Delivery System Aspects of DAVIC
- Author
-
Masahisa Kawashima and You-ichi Maeda
- Subjects
Multimedia ,Computer science ,General Engineering ,Delivery system ,computer.software_genre ,computer - Published
- 1996
- Full Text
- View/download PDF
8. Rate control strategies for high-priority data in two-layer packet video transmission
- Author
-
Masahisa Kawashima, Masahiro Inoue, and Hideyoshi Tominaga
- Subjects
Scheme (programming language) ,Computer Networks and Communications ,Computer science ,Network packet ,Real-time computing ,Rate control ,Multiplexing ,Transmission (telecommunications) ,Bandwidth (computing) ,Electrical and Electronic Engineering ,Layering ,Constant (mathematics) ,computer ,computer.programming_language - Abstract
To transmit the video image with the two-layer transmission by utilizing the priority cell control of the ATM network, the required bandwidth varies depending on the rate control scheme for the high-priority information. Therefore, several high-priority rate control schemes can be considered such as the scheme in which the ratio of the high-priority bit rate to the entire bit rate is kept constant or the scheme in which the peak rate is specified for the high-priority information. Therefore, for these two schemes, the optimum layering parameters will be derived in order to keep the minimum bandwidth requirements and to compare the bandwidth requirements by using the optimum layering parameters. As the result of the comparison, it was concluded that the peak rate control is superior when the number of multiplexed video sources (terminals) in the network is low and when the bandwidth requirements for the low-priority information is not strict. It was concluded also that the scheme to keep the ratio of the high-priority information fixed is superior when the number of multiplexed video sources in the network is high and when the bandwidth requirements for the low-priority information is strict.
- Published
- 1995
- Full Text
- View/download PDF
9. Variable bit-rate video transmission under usage parameter control
- Author
-
Hideyoshi Tominaga, Masahiro Inoue, and Masahisa Kawashima
- Subjects
Network congestion ,Flow control (data) ,Computer Networks and Communications ,Computer science ,Image quality ,Sliding window protocol ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,Transmission system ,Electrical and Electronic Engineering ,Video quality ,Variable bitrate ,Multiplexing - Abstract
This paper proposes a method of video bit-rate control for the case where the average transmission bitrate is constrained, considering the usage parameter control in an ATM network. By a simulation, the video quality and the network congestion probability of the variable bit-rate (VBR) transmission system, with the constrained average bit-rate, are compared to those of the conventional constant bit-rate (CBR) transmission system or the VBR transmission system without the rate control. the relations among the length of the sliding window (SW) to monitor the average bit-rate, the video quality, and the network congestion probability are analyzed. With respect to the video quality, it is shown that the VBR transmission with the average bit-rate control exhibits a stable image quality when SW is long and exhibits a better image quality than the CBR transmission for the cases of scene change and the panning scene. When the scene changes, the image quality changes and the VBR transmission with the bit-rate control. With respect to the network congestion probability, it is shown that the probability is decreased greatly by constraining the average bit-rate and the probability becomes less when SW is made shorter. Finally, it is shown that SW should desirably be long to stabilize the video quality but the permissible length of SW depends on how many video signlas can be multiplexed in the network.
- Published
- 1995
- Full Text
- View/download PDF
10. Hybrid extended MPEG video coding algorithm for general video applications
- Author
-
Cheng-Tie Chen, Sharad Singhal, Fure-Ching Jeng, Masahisa Kawashima, and Andria Hafong Wong
- Subjects
H.262/MPEG-2 Part 2 ,Motion compensation ,Theoretical computer science ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,computer.file_format ,Huffman coding ,Coding tree unit ,symbols.namesake ,Signal Processing ,symbols ,Computer Vision and Pattern Recognition ,Electrical and Electronic Engineering ,Multiview Video Coding ,Algorithm ,computer ,Software ,Context-adaptive binary arithmetic coding ,Data compression ,Block-matching algorithm - Abstract
This paper is an analysis of a video coding algorithm designed and optimized for video compression at bit-rates from 3 up to 10 Mbit/s. This algorithm is suitable for different applications ranging from communication services to video broadcasting. This is a hybrid DCT/DPCM coding scheme originally based on an MPEG1 (Moving Picture Experts Group phase 1) algorithm modified for interlaced CCIR601 resolution pictures coded at higher rates. Some important features of the algorithm include field-based motion compensated prediction and interpolation, frame-based DCT coding and quantization, optimized frame bit allocation and quantizer assignment, and adaptive Huffman code tables for transform coefficients. This coding scheme allows easy implementation of common VCR functions, and can also operate in a low-delay mode as required for interactive video. This paper presents a brief analysis of the coding/decoding delay. The result of a subjective test conducted at Bellcore concludes that this algorithm achieves a quality better than NTSC at 4 Mbit/s and close to component quality at 9 Mbit/s. This algorithm was submitted as an MPEG2 (MPEG phase 2) proposal, and showed high performance among 21 525-format proposals.
- Published
- 1993
- Full Text
- View/download PDF
11. Adaptation of the MPEG video-coding algorithm to network applications
- Author
-
Fure-Ching Jeng, Cheng-Tie Chen, Masahisa Kawashima, and Sharad Singhal
- Subjects
Image quality ,Network packet ,Computer science ,End-to-end delay ,Real-time computing ,Inter frame ,Full motion video ,Multiplexing ,Bit rate ,Media Technology ,Algorithm design ,Electrical and Electronic Engineering ,Statistical time division multiplexing ,Algorithm - Abstract
The Motion Picture Experts Group (MPEG) video-coding algorithm is regarded as a promising coding algorithm for coding full-motion video. However, since MPEG was originally designed for storage applications, some problems must be solved before the algorithm can be applied to interactive services. Due to the use of periodic intraframe coding and bidirectional interframe prediction, the end-to end delay of the MPEG algorithm is much larger than that of the H.261 algorithm. In packet video transmission, the large peak in bit rate caused by periodic intraframe coding may lower performance of statistical multiplexing. In this paper, real-time video transmission using the Hybrid Extended MPEG (Bellcore's proposal to ISO/MPEG) is considered. First, the end-to-end delay of the Hybrid Extended MPEG algorithm is analyzed. Then several schemes to reduce the delay are considered and compared with regular coding schemes in terms of image quality, end-to-end delay and performance of statistical multiplexing. Error resilience of the presented schemes is also tested by simulations assuming cell loss. It is shown that the presented schemes improved the end-to-end delay and performance of statistical multiplexing significantly. >
- Published
- 1993
- Full Text
- View/download PDF
12. A video coding method considering cell losses in ATM-based networks
- Author
-
Hideyoshi Tominaga, Masahisa Kawashima, Hirohisa Jozawa, and Tsuyoshi Hanamura
- Subjects
Pixel ,Computer science ,Image quality ,Real-time computing ,Telecommunications network ,Network congestion ,Asynchronous communication ,Quincunx ,Asynchronous Transfer Mode ,Signal Processing ,Computer Vision and Pattern Recognition ,Electrical and Electronic Engineering ,Algorithm ,Software ,Coding (social sciences) - Abstract
This paper describes a video coding method which is capable of compensating for information losses due to cell discard. The proposed method separates picture elements into two groups by using quincunx subsampling. Separated picture elements are coded severally. Picture elements in one group are called higher priority pixels and their coded data are transmitted in higher priority cells, while ones in the other called lower priority pixels and their coded data are transmitted in lower priority cells. In case of network congestion, the proposed method prevents fatal degeneration in image quality by selectively discarding lower priority cells. Furthermore we take into consideration that higher priority cells are not always free from discard. As a countermeasure against losses of higher priority cells, we examine two schemes, one of which is called intrablock prediction and the other is cyclic refreshing. Experimental results show that the proposed method effectively suppresses degradation in image quality compared with conventional coding methods.
- Published
- 1991
- Full Text
- View/download PDF
13. Spam Filtering with Cryptographic Ad-hoc E-mail Addresses
- Author
-
Katsumi Takahashi, Jun Miyake, Masahisa Kawashima, and Tsuyoshi Abe
- Subjects
Service system ,Computer science ,business.industry ,System testing ,Usability ,Cryptography ,Filter (signal processing) ,Computer security ,computer.software_genre ,Electronic mail ,The Internet ,business ,computer ,Computer network - Abstract
This paper presents an ad-hoc e-mail address service system which employs a cryptographic algorithm for the generation of ad-hoc addresses. The addresses are associated with mail filter rules and subscribers' original address undisclosed to public. The presented algorithm enables mail transfer agents to filter incoming mails by extracting filter rules from ad-hoc addresses, and thus requires no database to store filter rules for the addresses. The practical usability of the presented system has been tested to major Internet services which requires e-mail addresses.
- Published
- 2006
- Full Text
- View/download PDF
14. An authentication method for interaction between personal servers based on the exchange of addresses
- Author
-
Akinori Shiraga, Masahisa Kawashima, and Tsuyoshi Abe
- Subjects
Authentication ,Computer science ,business.industry ,media_common.quotation_subject ,Certainty ,Computer security ,computer.software_genre ,Certificate ,Public-key cryptography ,Server ,Key revocation ,DNS spoofing ,business ,computer ,Countermeasure (computer) ,media_common - Abstract
The sharing of information held on personal servers is becoming widespread, as represented by Weblogs, SNS, etc. In this situation, it is necessary for each personal server to authenticate users autonomously without any special conditions for the site to which they belong. In this paper, we propose an authentication method for interaction between personal servers. The proposal introduces a new method, which involves retrieving a public key based on the prior exchange of addresses. It requires no trusted-third-party, suppresses the number of secret data items to be managed, and enables key revocation with certainty. We investigate a possible security pitfall of the proposal which results in a risk of impersonation using DNS spoofing, and propose a countermeasure for this, showing that the risk is avoidable.
- Published
- 2005
- Full Text
- View/download PDF
15. Cryptographic alias e-mail addresses for privacy enforcement in business outsourcing
- Author
-
Tetsuya Nakagawa, Tsuyoshi Abe, Satoshi Minamoto, and Masahisa Kawashima
- Subjects
Traceability ,Revocation ,Alias ,business.industry ,Computer science ,Cryptography ,Computer security ,computer.software_genre ,Outsourcing ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,business ,Enforcement ,computer ,Digital watermarking - Abstract
This paper proposes a method of anonymizing e-mail addresses for privacy enforcement in business outsourcing. By means of a cryptographic encoding scheme, the method generates an alias address containing a tracking ID for traceability and revocation. This feature helps an enterprise identify leakage path and revoke a cluster of leaked alias addresses in case of an address leakage incident.
- Published
- 2005
- Full Text
- View/download PDF
16. Study on a very low bit-rate video coding algorithm
- Author
-
Hideyoshi Tominaga, Masahisa Kawashima, and Furnihiko Numata
- Subjects
Motion compensation ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Motion detection ,Coding tree unit ,Quarter-pixel motion ,Motion estimation ,Discrete cosine transform ,Computer vision ,Artificial intelligence ,business ,Transform coding ,Block-matching algorithm - Abstract
A very low bit-rate video coding algorithm is proposed. The algorithm is a hybrid motion compensation andDCT (discrete cosine transform) coding. However a progressive transmission scheme with a frequency-orientedcoding of DCT coefficients is proposed to cope with partia.1 freeze due to the buffer overflow. In addition, somemethods to improve motion estimation are proposed. The simulation results show the proposed algorithm showsperceptually better decoded images than the traditional RM8 (reference model 8) algorithm.
- Published
- 1993
- Full Text
- View/download PDF
17. Method to convert image resolution using M-band-extended QMF banks
- Author
-
Masahisa Kawashima and Hideyoshi Tominaga
- Subjects
business.industry ,Aliasing ,Computer science ,Discrete cosine transform ,Computer vision ,Artificial intelligence ,Filter (signal processing) ,business ,Image resolution ,Convolution - Abstract
Masahisa Kawashima and Hideyoshi TominagaWaseda University, Department of Electronics and Communication Engineering3-4-1, Ohkubo, Shinjuku-ku, Tokyo, 169, JAPANABSTRACTA new method to convert image resolution using M-band extended QMF is proposed. Due to the parallel structure ofthe filter banks, the conversion ratio of the proposed method is not constrained to be a power of 2. Moreover, since theproposed method performs the filtering of signals by convolution operations, the resolution converted image by theproposed scheme is free from the aliasing which occurs in that by the DCT method. Judging from the experimentalresults, it is concluded that the resolution converted image by the proposed scheme is superior to that by the DCTmethod.1. INTRODUCTIONOne of anticipated features of visual communication over broadband ISDN is multiresolution. The resolution ofan image is selected by a user depending on his/her preference, available displays, available bandwidth and otherfactors. Under these circumstances, compatible or universal coding schemes are being actively investigated in areas
- Published
- 1991
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.