The search functionality is under construction.

Author Search Result

[Author] Hiroshi SAITO(45hit)

1-20hit(45hit)

  • Critical Location of Communications Network with Power Grid Power Supply Open Access

    Hiroshi SAITO  

     
    PAPER-Network Management/Operation

      Pubricized:
    2022/08/10
      Vol:
    E106-B No:2
      Page(s):
    166-173

    When a disaster hits a network, network service disruptions can occur even if the network facilities have survived and battery and power generators are provided. This is because in the event of a disaster, the power supply will not be restarted within the lifetime of the battery or oil transportation will not be restarted before running out of oil and power will be running out. Therefore, taking a power grid into account is important. This paper proposes a polynomial-time algorithm to identify the critical location C*D of a communications network Nc when a disaster hits. Electrical power grid Np supplies power to the nodes of Nc, and a link in Nc is disconnected when a node or a link in Nc or Np fails. Here, the disaster area is modeled as co-centric disks and the failure probability is higher in the inner disk than the outer one. The location of the center of the disaster with the greatest expected number of disconnected links in Nc is taken as the critical location C*D.

  • Parameter Estimation for Non-convex Target Object Using Networked Binary Sensors

    Hiroshi SAITO  Sadaharu TANAKA  Shigeo SHIODA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E94-D No:4
      Page(s):
    772-785

    We describe a parameter estimation method for a target object in an area that sensors monitor. The parameters to be estimated are the perimeter length, size, and parameter determined by the interior angles of the target object. The estimation method does not use sensor location information, only the binary information on whether each sensor detects the target object. First, the sensing area of each sensor is assumed to be line-segment-shaped, which is a model of an infrared distance measurement sensor. Second, based on the analytical results of assuming line-segment-shaped sensing areas, we developed a unified equation that works with general sensing areas and general target-object shapes to estimate the parameters of the target objects. Numerical examples using computer simulation show that our method yields accurate results.

  • Conversion from Synchronous RTL Models to Asynchronous RTL Models

    Shogo SEMBA  Hiroshi SAITO  

     
    PAPER

      Vol:
    E102-A No:7
      Page(s):
    904-913

    In this paper, to make asynchronous circuit design easy, we propose a conversion method from synchronous Register Transfer Level (RTL) models to asynchronous RTL models with bundled-data implementation. The proposed method consists of the generation of an intermediate representation from a given synchronous RTL model and the generation of an asynchronous RTL model from the intermediate representation. This allows us to deal with different representation styles of synchronous RTL models. We use the eXtensible Markup Language (XML) as the intermediate representation. In addition to the asynchronous RTL model, the proposed method generates a simulation model when the target implementation is a Field Programmable Gate Array and a set of non-optimization constraints for the control circuit used in logic synthesis and layout synthesis. In the experiment, we demonstrate that the proposed method can convert synchronous RTL models specified manually and obtained by a high-level synthesis tool to asynchronous ones.

  • A Copper Vapor Laser by Using a Copper-Vapor-Complex Reaction at a Low temperature

    Toshiyuki KANO  Hiroshi TANIGUCHI  Hiroshi SAITO  

     
    LETTER-Quantum Electronics

      Vol:
    E70-E No:4
      Page(s):
    312-314

    A copper vapor laser performance by using a metal-vapor-complex reaction (CuAlBr3) is reported. The laser operation is obtained at a low temperature without external heating because of the AlBr3 vapors evaporation at a room temperature. The copper vapor laser using this metal-vapor-complex reaction has an advantage of deposition-free of a metalilc copper to the laser tube wall, which is different from the copper halide and the organometallic copper lasers.

  • Sizing and Provisioning for Physical and Virtual Path Networks Using Self-Sizing Capability

    Shigeo SHIODA  Hiroshi SAITO  Hirofumi YOKOI  

     
    PAPER-Network design techniques and tools

      Vol:
    E80-B No:2
      Page(s):
    252-262

    This paper discusses the problems in designing virtual-path (VP) networks and underlying transmission-path (TP) networks using the "self-sizing" capability. Self-sizing implies an autonomous adjustment mechanism for VP bandwidths based on traffic conditions observed in real time. The notion of "bandwidth demand" has been introduced to overcome some of the problems with VP bandwidth sizing, e.g., complex traffic statistics and diverse quality of service requirements. Using the bandwidth demand concept, a VP-bandwidth-sizing procedure is proposed in which real-time estimates of VP bandwidth demand and successive VP bandwidth allocation are jointly utilized. Next, TP bandwidth demand, including extra capacity to cover single-link failures, is defined and used to measure the congestion level of the TP. Finally, a TP provisioning method is proposed that uses TP "lifetime" analysis.

  • A Robust Connection Admission Control Applicable to Long Range Dependence Traffic

    Pier Luigi CONTI  Hiroshi SAITO  Livia DE GIOVANNI  

     
    PAPER-Long Range Dependence Traffic

      Vol:
    E81-B No:5
      Page(s):
    849-857

    In this paper an algorithm of Connection Admission Control in ATM is considered. It is shown that it works under many different kinds of dependence among arrivals, including long range dependence. This point is relevant, since recent papers show that ATM traffic is characterised by self-similarity, and hence by long range dependence. An upper bound for CLR is given, without assuming any specific cell arrival process. Applications to simulated and real data (obtained by segmenting and shaping Ethernet packets) are considered. They show the goodness and the tightness of the considered upper bound.

  • Local Information, Observable Parameters, and Global View Open Access

    Hiroshi SAITO  

     
    INVITED PAPER

      Vol:
    E96-B No:12
      Page(s):
    3017-3027

    The “Blind Men and an Elephant” is an old Indian story about a group of blind men who encounter an elephant and do not know what it is. This story describes the difficulties of understanding a large concept or global view based on only local information. Modern technologies enable us to easily obtain and retain local information. However, simply collecting local information does not give us a global view, as evident in this old story. This paper gives a concrete model of this story on the plane to theoretically and mathematically discuss it. It analyzes what information we can obtain from collected local information. For a convex target object modeling the elephant and a convex sensing area, it is proven that the size and perimeter length of the target object are the only parameters that can be observed by randomly deployed sensors modeling the blind men. To increase the number of observable parameters, this paper argues that non-convex sensing areas are important and introduces composite sensor nodes as an approach to implement non-convex sensing areas. The paper also derives a model on the discrete space and analyzes it. The analysis results on the discrete space are applicable to some network related issues such as link quality estimation in a part of a network based on end-to-end probing.

  • Impact of Protocols and Network Configuration on Node-Level Availability in Sensor Networks

    Toshiaki TSUCHIYA  Hiroshi SAITO  

     
    PAPER-Network

      Vol:
    E88-B No:3
      Page(s):
    981-990

    We investigate the effects of the performance of sensor networks on network availability and in turn evaluate the impact of protocols and network configuration on these effects. The typical wireless sensor network of the future consists of a large number of micro-sized sensors that are equipped with batteries of limited capacity. In such a network, energy consumption is one of the most important issues. Several representative protocols that are applied in ring and linear network configurations are analyzed, and explicit formulae for network availability are derived for each of them. Numerical values derived by using these formulae yielded the surprising result that backup routes do not always improve network availability. This is because the loads imposed by the backup routes on network segments that do not include dead sensor nodes reduce sensor-node lifetimes in these segments.

  • Theoretical Analysis of Fully Wireless-Power-Transfer Node Networks Open Access

    Hiroshi SAITO  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2023/05/10
      Vol:
    E106-B No:10
      Page(s):
    864-872

    The performance of a fully wireless-power-transfer (WPT) node network, in which each node transfers (and receives) energy through a wireless channel when it has sufficient (and insufficient) energy in its battery, was theoretically analyzed. The lost job ratio (LJR), namely, is the ratio of (i) the amount of jobs that cannot be done due to battery of a node running out to (ii) the amount of jobs that should be done, is used as a performance metric. It describes the effect of the battery of each node running out and how much additional energy is needed. Although it is known that WPT can reduce the probability of the battery running out among a few nodes within a small area, the performance of a fully WPT network has not been clarified. By using stochastic geometry and first-passage-time analysis for a diffusion process, the expected LJR was theoretically derived. Numerical examples demonstrate that the key parameters determining the performance of the network are node density, threshold switching of statuses between “transferring energy” and “receiving energy,” and the parameters of power conversion. They also demonstrate the followings: (1) The mean energy stored in the node battery decreases in the networks because of the loss caused by WPT, and a fully WPT network cannot decrease the probability of the battery running out under the current WPT efficiency. (2) When the saturation value of power conversion increases, a fully WPT network can decrease the probability of the battery running out although the mean energy stored in the node battery still decreases in the networks. This result is explained by the fact that the variance of stored energy in each node battery becomes smaller due to transfer of energy from nodes of sufficient energy to nodes of insufficient energy.

  • An Online Framework for Flow Round Trip Time Measurement

    Xinjie GUAN  Xili WAN  Ryoichi KAWAHARA  Hiroshi SAITO  

     
    PAPER-Network

      Vol:
    E97-B No:10
      Page(s):
    2145-2156

    With the advent of high speed links, online flow measurement for, e.g., flow round trip time (RTT), has become difficult due to the enormous demands placed on computational resources. Most existing measurement methods are designed to count the numbers of flows or sizes of flows, but we address the flow RTT measurement, which is an important QoS metric for network management and cannot be measured with existing measurement methods. We first adapt a standard Bloom Filter (BF) for the flow RTT distribution estimation. However, due to the existence of multipath routing and Syn flooding attacks, the standard BF does not perform well. We further design the double-deletion bloom filter (DDBF) scheme, which alleviates potential hash collisions of the standard BF by explicitly deleting used records and implicitly deleting out-of-date records. Because of these double deletion operations, the DDBF accurately estimates the RTT distribution of TCP flows with limited memory space, even with the appearance of multipath routing and Syn flooding attacks. Theoretical analysis indicates that the DDBF scheme achieves a higher accuracy with a constant and smaller amount of memory compared with the standard BF. In addition, we validate our scheme using real traces and demonstrate significant memory-savings without degrading accuracy.

  • Performance Issues and Network Design for Sensor Networks

    Hiroshi SAITO  Hiroya MINAMI  

     
    PAPER-Network

      Vol:
    E87-B No:2
      Page(s):
    294-301

    This paper discusses performance issues for a sensor network. It describes the unique features of the sensor network and discusses studies on its protocols. Performance measures for the sensor network are investigated and studies related to them are surveyed. As an example of performance measures, this paper analyzes a sensor network's availability, which is the probability that all the sensor nodes are working without any of them having run out of energy. An explicit formula for the sensor network availability is derived, and the optimal placement of sensor nodes is investigated.

  • FOREWORD Open Access

    Hiroshi SAITO  

     
    FOREWORD

      Vol:
    E92-B No:1
      Page(s):
    1-1
  • Application of Insensitivity Analysis of Coverage Processes to Wireless Sensor Networks

    Hiroshi SAITO  Shigeo SHIODA  Junko HARADA  

     
    PAPER-Network

      Vol:
    E91-B No:12
      Page(s):
    3937-3944

    Randomly distributed wireless sensors used to monitor and detect a moving object were investigated, and performance measures such as the expected time/space detection ratio were theoretically analyzed. In particular, the insensitivities (robustness) of the performance measures to the conditions of the distributed wireless sensors and the target object were analyzed. Robust explicit equations for these performance measures were derived, and these equations can be used to calculate them without knowing the sensing area shape or the target object trajectory. These equations were applied to the following two applications. (1) They were used to estimate the impact of active/sleeping state schedule algorithms of sensors on the expected ratio of the time that the sensors detect the target object during its movement. The results were used to identify the active state schedule that increases the expected time ratio. (2) They were also applied to a sensor density design method that uses a test object. This method can be used to ensure that the expected time ratio that at least one sensor can detect the target satisfies the target value without knowing the sensing area size or the movement of the target object.

  • A Hybrid On-Demand Content Delivery Scheme Employing Modified Pyramid Broadcasting

    Tomoaki KUMAGAI  Hiroshi SAITO  

     
    PAPER-Media Compound Methods

      Vol:
    E86-B No:4
      Page(s):
    1399-1411

    This paper proposes a hybrid on-demand content delivery scheme employing modified pyramid broadcasting. Our scheme delivers a fixed-sized head portion of the video content to each client individually via an individual channel and the remaining portion via multiple broadcasting channels by using a modified form of pyramid broadcasting. The feature of this scheme is that it can be used together with forward error correction using block coding. Therefore, it can deliver high-quality content upon request with high network bandwidth efficiency even if data containers, such as Ethernet frames, are lost in the IP network. This is not possible with conventional schemes. Evaluation results show that its network bandwidth performance is still excellent even though it supports well-known FEC schemes using block coding.

  • Traffic Contract Parameters and CAC Guaranteeing Cell-Loss Ratio in ATM Networks

    Masaki AIDA  Hiroshi SAITO  

     
    PAPER-Switching and Communication Processing

      Vol:
    E78-B No:3
      Page(s):
    336-343

    Connection Admission Control (CAC) is a key part of traffic control and still leaves several challenging problems peculiar to ATM networks. One of these problems is how to assign sufficient bandwidth for any cell arrival process that satisfies the source traffic descriptor values specified by negotiation between the network and a user at the connection setup. Because the source traffic descriptor cannot describe the actual source traffic characteristics completely, it has already been studied extensively that how to estimate sufficient bandwidth under the assumption that the actual traffic parameter values in the source traffic descriptor are equal to the negotiated values. This paper extends the studies in the literature to how to estimate sufficient bandwidth only assuming that the actual values satisfy the negotiated values, that is the actual values is less than or equal to the negotiated values. We show the sufficient condition for negotiated source traffic descriptors ensuring that the cell-loss ratio calculated from the negotiated values is always the upper-bound of the actual cell-loss ratio. Using this condition, we propose a CAC that can guarantee cell-loss ratio objective so far as a user satisfies the source traffic descriptor values.

  • Synthesis of Serial Local Clock Controllers for Asynchronous Circuit Design

    Nattha SRETASEREEKUL  Hiroshi SAITO  Euiseok KIM  Metehan OZCAN  Masashi IMAI  Hiroshi NAKAMURA  Takashi NANYA  

     
    PAPER-IP Design

      Vol:
    E86-A No:12
      Page(s):
    3028-3037

    Asynchronous controllers effectively control high concurrence of datapath operations for high speed. Signal Transition Graphs (STGs) can effectively represent these concurrent events. However, highly concurrent STGs cause the state explosion problem in asynchronous synthesis tools. Many small but highly concurrent STGs cannot be synthesized to obtain control circuits. Moreover, STGs also lead to some control-time overhead of the four-phase handshake protocol. In this paper, we propose a method for deriving the serial control nodes from Control Data Flow Graphs (CDFGs) such that the concurrence of datapath operations is still preserved. The STGs derived from the serialized control nodes are serial STGs which are simpler for synthesis than the concurrent STGs. We also propose an implementation using these serialized controllers to generate local clocks at any necessary times. The implementation results in very small control-time overhead. The experimental results show that the number of synthesis states is proportional to the number of control signals, and the circuits with satisfiable small control-time overhead are obtained.

  • Networked Movable Fuel-Supply Stations for Vehicles and Its Performance

    Hiroshi SAITO  

     
    PAPER-Integrated Systems for Communications

      Vol:
    E93-B No:4
      Page(s):
    982-992

    A fuel-supply system using movable fuel-supply vehicles (FSVs) is proposed and its performance is evaluated. Both FSVs and vehicles requesting fuel are equipped with networked sensors. The sensors in FSVs are location sensors, and those in vehicles requesting fuel are for determining the remaining amount of fuel and the location of the vehicle. The time from when a fuel request is generated until the request is satisfied is the most basic performance metric for this system. Explicit formulas for the probabilistic distribution of this request time are also derived. Numerical examples show that the number of movable FSVs can be smaller than that of fixed fuel stations by about 80% or more than two orders of magnitude. This result suggests that movable FSVs may reduce the cost of the fuel supply infrastructure for alternative-fuel vehicles such as fuel-cell vehicles.

  • Performance Evaluation of AAL2 Switch Networks

    Hiroshi SAITO  

     
    PAPER-Switching and Communication Processing

      Vol:
    E82-B No:9
      Page(s):
    1411-1423

    A new asynchronous transfer mode adaptation layer (AAL), called AAL2, is being designed mainly for low-bit-rate voice traffic, and nodes that can assemble and disassemble AAL2 cells are being developed to make AAL2 usage efficient. This paper investigates the delay and performance of AAL2 nodes by an analytical method. Then, using the results, it analyzes a network using AAL2 nodes and shows the bandwidth reduction achieved by using AAL2 switching nodes as transit nodes.

  • An Equivalence Checking Method for C Descriptions Based on Symbolic Simulation with Textual Differences

    Takeshi MATSUMOTO  Hiroshi SAITO  Masahiro FUJITA  

     
    PAPER-Simulation and Verification

      Vol:
    E88-A No:12
      Page(s):
    3315-3323

    In this paper, an efficient equivalence checking method for two C descriptions is described. The equivalence of two C descriptions is proved by symbolic simulation. Symbolic simulation used in this paper can prove the equivalence of all of the variables in the descriptions. However, it takes long time to verify the equivalence of all of the variables if large descriptions are given. Therefore, in order to improve the verification, our method identifies textual differences between descriptions. The identified textual differences are used to reduce the number of equivalence checkings among variables. The proposed method has been implemented in C language and evaluated with several C descriptions.

  • Effectiveness of UBR VC Approach in AAL2 Networks and Its Application to IMT-2000

    Hiroshi SAITO  

     
    PAPER-Switching

      Vol:
    E83-B No:11
      Page(s):
    2486-2493

    This paper investigates the effectiveness of a network that uses unspecified bit rate (UBR) for a virtual channel (VC) accommodating AAL2 connections. AAL2 is a new ATM adaptation layer that has recently been standardized. Since it is designed to carry low-bit-rate voice signals efficiently, it should be used in the ATM backbone for mobile networks, especially in the IMT-2000 network (International Mobile Telecommunication in the Year 2000 network). Normally, constant-bit-rate (CBR) VCs or variable-bit-rate (VBR) VCs are used to accommodate AAL2 connections. In our previous work, however, we showed that using UBR VCs (equivalent to no VC-level bandwidth management) to accommodate AAL2 connections needs much less VP bandwidth than using CBR or VBR VCs. In this paper, the previous results are extended to the network and the network bandwidth reduction is shown to be larger than that of the virtual path. In addition, the bandwidth reduction achieved by using UBR VCs is comparable with that achieved by introducing AAL2 switching nodes. Based on these results, the core network of the IMT-2000 is discussed.

1-20hit(45hit)