The search functionality is under construction.

Author Search Result

[Author] Eiji KAMIOKA(12hit)

1-12hit
  • Hybrid Mechanism to Detect Paroxysmal Stage of Atrial Fibrillation Using Adaptive Threshold-Based Algorithm with Artificial Neural Network

    Mohamad Sabri bin SINAL  Eiji KAMIOKA  

     
    PAPER-Biological Engineering

      Pubricized:
    2018/03/14
      Vol:
    E101-D No:6
      Page(s):
    1666-1676

    Automatic detection of heart cycle abnormalities in a long duration of ECG data is a crucial technique for diagnosing an early stage of heart diseases. Concretely, Paroxysmal stage of Atrial Fibrillation rhythms (ParAF) must be discriminated from Normal Sinus rhythms (NS). The both of waveforms in ECG data are very similar, and thus it is difficult to completely detect the Paroxysmal stage of Atrial Fibrillation rhythms. Previous studies have tried to solve this issue and some of them achieved the discrimination with a high degree of accuracy. However, the accuracies of them do not reach 100%. In addition, no research has achieved it in a long duration, e.g. 12 hours, of ECG data. In this study, a new mechanism to tackle with these issues is proposed: “Door-to-Door” algorithm is introduced to accurately and quickly detect significant peaks of heart cycle in 12 hours of ECG data and to discriminate obvious ParAF rhythms from NS rhythms. In addition, a quantitative method using Artificial Neural Network (ANN), which discriminates unobvious ParAF rhythms from NS rhythms, is investigated. As the result of Door-to-Door algorithm performance evaluation, it was revealed that Door-to-Door algorithm achieves the accuracy of 100% in detecting the significant peaks of heart cycle in 17 NS ECG data. In addition, it was verified that ANN-based method achieves the accuracy of 100% in discriminating the Paroxysmal stage of 15 Atrial Fibrillation data from 17 NS data. Furthermore, it was confirmed that the computational time to perform the proposed mechanism is less than the half of the previous study. From these achievements, it is concluded that the proposed mechanism can practically be used to diagnose early stage of heart diseases.

  • Pricing to Stimulate Node Cooperation in Wireless Ad Hoc Networks

    Mingmei LI  Eiji KAMIOKA  Shigeki YAMADA  

     
    PAPER-Network

      Vol:
    E90-B No:7
      Page(s):
    1640-1650

    In wireless ad hoc networks, network services are provided through the cooperation of all nodes. Albeit that good teamwork could smoothly run a mobile network, selfish node behaviors would probably cause it to break down. Some examples of these selfish node behaviors would include, "listening only" for saving energy or "receiving the valuable" without forwarding the packets to others. To cope with this problem, we propose PDM, a price-demand function based pricing model, to restrains the selfish behaviors of mobile nodes. PDM is based on the packet sending requirements of the source nodes and the forwarding cost of relay nods. Using this pricing methodology, the packet forwarding activities will be profitable for the relay node and further stimulate cooperation in the network. In particular, the new model enjoys the merit of giving relay nodes no reason to dishonestly report their forwarding costs, because an honest cost claim has proven to be an optimal strategy for relay nodes. Furthermore, our new model uses a price-demand function to reflect the relationship between the service demand of the source nodes and the service supply of the relay nodes. As a consequence, our approach reduces the source nodes' payments to send packets, and at the same time guarantees that the packets sent by the source nodes are delivered to the destination.

  • MoRaRo: Mobile Router-Assisted Route Optimization for Network Mobility (NEMO) Support

    Ved P. KAFLE  Eiji KAMIOKA  Shigeki YAMADA  

     
    PAPER-Mobile Technologies

      Vol:
    E89-D No:1
      Page(s):
    158-170

    The IETF (Internet Engineering Task Force) has developed a Network Mobility (NEMO) basic support protocol by extending the operation of Mobile IPv6 to provide uninterrupted Internet connectivity to the communicating nodes of mobile networks. The protocol uses a mobile router (MR) in the mobile network to perform prefix scope binding updates with its home agent (HA) to establish a bi-directional tunnel between the HA and MR. This solution reduces location-update signaling by making network movements transparent to the mobile nodes behind the MR. However, delays in data delivery and higher overheads are likely to occur because of sub-optimal routing and multiple encapsulation of data packets. To resolve these problems, we propose a mobile router-assisted route optimization (MoRaRo) scheme for NEMO support. With MoRaRo, a mobile node performs route optimization with a correspondent node only once, at the beginning of a session. After that the MR performs route optimization on behalf of all active mobile nodes when the network moves. The virtue of this scheme is that it requires only slight modification of the implementation of the NEMO basic support protocol at local entities such as the MR and mobile nodes of the mobile network, leaving entities in the core or in other administrative domains untouched. MoRaRo enables a correspondent node to forward packets directly to the mobile network without any tunneling, thus reducing packet delay and encapsulation overheads in the core network. To enable the scheme to be evaluated, we present the results of both theoretical analysis and simulation.

  • Access Control for Security and Privacy in Ubiquitous Computing Environments

    Shigeki YAMADA  Eiji KAMIOKA  

     
    INVITED PAPER

      Vol:
    E88-B No:3
      Page(s):
    846-856

    Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.

  • CoMoRoHo: Cooperative Mobile Router-Based Handover Scheme for Long-Vehicular Multihomed Networks

    Ved P. KAFLE  Eiji KAMIOKA  Shigeki YAMADA  

     
    PAPER

      Vol:
    E89-B No:10
      Page(s):
    2774-2785

    To support multimedia applications effectively in mobile networks, the handover latency or packet losses during handover should be very small. Addressing this issue, we present a cooperative mobile router-based handover (CoMoRoHo) scheme for long-vehicular multihomed mobile networks. The basic idea behind CoMoRoHo is to enable different mobile routers to access different subnets during a handover and cooperatively receive packets destined for each other. In general, packet losses are directly proportional to handover latency; however, the overlapped reception of packets from different subnets makes possible to minimize packet losses even without reducing handover latency. To evaluate the scheme, we carried out performance modeling of the CoMoRoHo scheme in comparison with the Fast Handover for Mobile IPv6 (FMIPv6) protocol in regard to the handover latency, packet loss, signaling overhead, and packet delivery overhead in access networks. The analysis results show that CoMoRoHo outperforms FMIPv6 by reducing the packet losses as well as signaling overheads by more than 50%. Moreover, CoMoRoHo imposes lower packet delivery overheads required for preventing packets from being dropped from access routers. We thus conclude that CoMoRoHo is a scalable scheme because its performance remains intact even when the access network is overloaded.

  • esVHO: Energy Saving Vertical Handover Extension for Local SDN in Non-Interconnected Environment

    Toan Nguyen DUC  Eiji KAMIOKA  

     
    PAPER

      Pubricized:
    2017/05/16
      Vol:
    E100-B No:11
      Page(s):
    2027-2037

    Wireless technologies that offer high data rate are generally energy-consuming ones while low-energy technologies commonly provide low data rate. Both kinds of technologies have been integrated in a single mobile device for different services. Therefore, if the service does not always require high data rate, the low energy technology, i.e., Bluetooth, can be used instead of the energy-consuming one, i.e., Wi-Fi, for saving energy. It is obvious that energy savings are maximized by turning the unused technology off. However, when active sessions of ongoing services migrate between different technologies, the network-layer connectivity must be maintained, or a vertical handover (VHO) between different networks is required. Moreover, when the networks are not interconnected, the VHO must be fully controlled by the device itself. The device typically navigates traffic through the firmware of the wireless network interface cards (WNIC) using their drivers, which are dependent on the vendors. To control the traffic navigation between WNICs without any modification of the WNICs' drivers, Software-Defined Networking (SDN) can be applied locally on the mobile device, the so called local SDN. In the local SDN architecture, a local SDN controller (SDNC) is used to control a virtual OpenFlow switch, which turns WNICs into its switch ports. Although the SDNC can navigate the traffic, it lacks the global view of the network topology. Hence, to correctly navigate traffic in a VHO process, an extended SDN controller (extSDNC) was proposed in a previous work. With the extSDNC, the SDNC can perform VHO based on a link layer trigger but with a significant packet loss rate. Therefore, in this paper, a framework named esVHO is proposed that executes VHO at the network layer to reduce the packet loss rate and reduce energy consumption. Experiments on VHO performance prove that esVHO can reduce the packet loss rate considerably. Moreover, the results of an energy saving experiment show that esVHO performs high energy saving up to 4.89 times compared to the others.

  • An Efficient and Privacy-Aware Meeting Scheduling Scheme Using Common Computational Space

    Md. Nurul HUDA  Eiji KAMIOKA  Shigeki YAMADA  

     
    PAPER-Distributed Cooperation and Agents

      Vol:
    E90-D No:3
      Page(s):
    656-667

    Privacy is increasingly viewed as a key concern in multi-agent based algorithms for Distributed Constraint Satisfaction Problems (DCSP) such as the Meeting Scheduling (MS) problem. Many algorithms aim for a global objective function and as a result, incur performance penalties in computational complexity and personal privacy. This paper describes a mobile agent-based scheduling scheme called Efficient and Privacy-aware Meeting Scheduling (EPMS), which results in a tradeoff among complexity, privacy, and global utility. It also introduces a privacy loss model for collaborative computation, multiple criteria for evaluating privacy in the MS problem, and a privacy measurement metric called the Min privacy metric. We have utilized a common computational space in EPMS for reducing the complexity and the privacy loss in the MS problem. The analytical results show that EPMS has a polynomial time computational complexity. In addition, simulation results show that the obtained global utility for scheduling multiple meetings with EPMS is close to the optimal level and the resulting privacy loss is less than for those in existing algorithms.

  • Proposal for Context-Aware Information Delivery and Personal Communication Network Architectures with Preliminary Evaluations of Their Performance

    Eiji KAMIOKA  Shigeki YAMADA  Takako SANDA  

     
    PAPER-Network

      Vol:
    E87-B No:9
      Page(s):
    2672-2681

    This paper proposes two types of network architectures using UMTS Release 5 architecture and wireless LAN suitable for context-aware information delivery and personal communication services, and it reports on preliminary evaluations of their performance. The first type of network architecture is the NCA (network-centric architecture) and the second is the ECA (end-user-centric architecture). The two architectures are modeled with a queuing network and their response times are compared through theoretical analysis and simulation. The results indicate that with low-performance servers, the response times of the ECA are generally shorter or almost the same as those of the NCA. However with high-performance servers, the response times of the NCA are generally shorter except during high server utilization.

  • FOREWORD Open Access

    Eiji KAMIOKA  

     
    FOREWORD

      Vol:
    E94-B No:3
      Page(s):
    617-617
  • Traffic State Estimation with Mobile Phones Based on the “3R” Philosophy

    Quang TRAN MINH  Eiji KAMIOKA  

     
    PAPER-Network

      Vol:
    E94-B No:12
      Page(s):
    3447-3458

    This paper proposes a novel approach to traffic state estimation using mobile phones. In this work, a real-time traffic data collection policy based on the so-called “3R” philosophy, a unique vehicle classification method, and a reasonable traffic state quantification model are proposed. The “3R” philosophy, in which the Right data are collected by the Right mobile devices at the Right time, helps to improve not only the effectiveness but also the scalability of the traffic state estimation model. The vehicle classification method using the simple data collected by mobile phones makes the traffic state estimation more accurate. The traffic state quantification model integrates both the mean speed capacity and the density of a traffic flow to improve the comprehensibility of the traffic condition. The experimental results reveal the effectiveness as well as the robustness of the proposed solutions.

  • Energy Efficient Macrocell Strategy: Opportunistic Beamforming with Femtocells Deployment Based on Hourly User Location Distribution

    Nur Ellina Binti ISHAK  Eiji KAMIOKA  

     
    PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1706-1717

    In the conventional cellular macrocell implementation strategy, the main base station transmits the radio signals in the omnidirectional manner in order to provide a wide range of cellular transmission to the users. In reality, however, the users move from one place to another depending on their activities, hence, sometimes this creates areas where no user exists inside the macrocell. Nevertheless, the base station continues to transmit the radio signals to all the coverage areas due to its involuntary manner, thus causing waste of energy. In our previous work, an energy efficient LTE macrocell base station scheme based on hourly user location distribution, which utilized opportunistic beamforming, was proposed in order to provide the cellular transmission only to the area where the user density is high. The drawback of this scheme was that there were many users who cannot receive the cellular transmission because of the limitation of the beamforming shape. In this paper, to overcome this difficulty, a new energy efficient macrocell strategy will be proposed. Here, additional low power consumption femtocell access points are deployed inside the macrocell to support the energy efficient opportunistic beamforming based on the hourly user location distribution. Concretely, the femtocell access points are woken up only when the active calling users exist inside its range. The proposed new strategy will be evaluated in terms of the hourly successful calling user ratio, the total power consumption and the hourly average downlink throughput compared with the previously proposed beamforming transmission strategy and the conventional omnidirectional transmission. The results will show the effectiveness of the proposed strategy in providing an energy efficient cellular macrocell system with high quality cellular services.

  • Maximizing User Satisfaction Based on Mobility in Heterogeneous Mobile Multimedia Communication Networks

    Ved P. KAFLE  Eiji KAMIOKA  Shigeki YAMADA  

     
    PAPER

      Vol:
    E88-B No:7
      Page(s):
    2709-2717

    Future wireless/mobile system is expected to have heterogeneous wireless overlay networks for ubiquitous multimedia communication. In a such network environment, mobile users are likely to try to get attached to higher bandwidth network as bandwidth-hungry multimedia applications are increasing. However, the users have to perform vertical handoff to lower bandwidth network, as high bandwidth network become unavailable due to various reasons (such as its limited coverage, network congestion, etc.). In this paper, we discuss the problem of vertical handoff from a user's perspective. For this purpose, we formulate user satisfaction as a function of bandwidth utility and handoff latency. Then, we investigate the effect of call holding time, user movement probability, etc. on the satisfaction that a user derives from the use of network service for multimedia applications. In addition, based on the evaluation, we present an algorithm for selecting a wireless network, which maximizes the effective user satisfaction.