The search functionality is under construction.

Author Search Result

[Author] Hiroyuki YOKOYAMA(12hit)

1-12hit
  • Reflection Routing: A Simple Approach for Contention Resolution in All-Optical Packet Switched Networks

    Hiroyuki YOKOYAMA  Hajime NAKAMURA  Shinichi NOMOTO  

     
    PAPER-Network

      Vol:
    E87-B No:6
      Page(s):
    1561-1568

    Packet loss is a serious problem due to the shortage of optical buffers in all-optical packet switched networks. In order to reduce packet losses, a dynamic routing method called 'deflection routing' has been proposed. Deflection routing, however, requires an optical switch to modify routing tables and packet labels for overflowing packets, so this routing method may also lead to other implementation problems in packet routing and forwarding. This paper proposes a simple routing method called 'reflection routing' which utilizes optical transport links as optical buffers to improve the quality of service in optical packet switched networks in terms of packet loss ratio. We numerically demonstrate the effectiveness and applicability of reflection routing.

  • Ultrafast All-Optical Signal Processing with Mode-Locked Semiconductor Lasers

    Hisakazu KURITA  Ichiro OGURA  Hiroyuki YOKOYAMA  

     
    INVITED PAPER-Mode-locked and Gain-switched Laser Diodes and High speed EA Modulators

      Vol:
    E81-C No:2
      Page(s):
    129-139

    The novel application potential of mode-locked laser diodes (MLLDs) in ultrafast optical signal processing in addition to coherent optical pulse generation is described. As the most fundamental function of MLLDs, we show that the generation of ultrashort (2 ps) coherent optical pulses with low timing jitter (<0. 5 ps) at precisely controlled wavelength and repetition frequency can be achieved by employing a rigid module configuration for an external-cavity MLLD. We then discuss new aspects of MLLDs which are functions of ultrafast all-optical signal processing such as optical clock extraction and optical gating. All-optical clock extraction is based on the timing synchronization of MLLD output to the injected optical data pulse. When the passive mode-locking frequency of an MLLD is very close to the fundamental clock pulse frequency of optical data, the former frequency is pulled into the latter frequency by optical data injection. We show that same-frequency and subharmonic-frequency optical clock pulses can successfully be extracted from optical data pulses at bit rates of up to 80 Gbit/s with very simple configurations and very low excess timing jitter (<0. 1 ps). On the other hand, optical gating is due to absorption saturation and the following picosecond absorption recovery in a saturable absorber (SA) in an MLLD structure incorporating optical gate-pulse amplification. Here, MLLDs are anti-reflection coated and used as traveling wave devices instead of laser oscillators, and small saturation energy (<1 pJ) and ultrafast recovery time (<8 ps) are demonstrated. By combining all these MLLD functions, we successfully demonstrated an experiment with 40- to 10-Gbit/s all-optical demultiplexing processing.

  • Highly Reliable Mode-Locked Semiconductor Lasers

    Hiroyuki YOKOYAMA  

     
    INVITED PAPER

      Vol:
    E85-C No:1
      Page(s):
    27-36

    Very reliable mode-locked semiconductor lasers have been developed. These devices provide high signal-to-noise ratio optical clock pulses of a few picoseconds temporal width in the 1.5-micrometer wavelength region. Potential applications of these lasers for high-bit-rate optical communication systems operating at over 40 Gbps including all-optical signal processing, and for very high-speed measurement systems are described.

  • A Secure Content Delivery System Based on a Partially Reconfigurable FPGA

    Yohei HORI  Hiroyuki YOKOYAMA  Hirofumi SAKANE  Kenji TODA  

     
    PAPER-Contents Protection

      Vol:
    E91-D No:5
      Page(s):
    1398-1407

    We developed a content delivery system using a partially reconfigurable FPGA to securely distribute digital content on the Internet. With partial reconfigurability of a Xilinx Virtex-II Pro FPGA, the system provides an innovative single-chip solution for protecting digital content. In the system, a partial circuit must be downloaded from a server to the client terminal to play content. Content will be played only when the downloaded circuit is correctly combined (=interlocked) with the circuit built in the terminal. Since each circuit has a unique I/O configuration, the downloaded circuit interlocks with the corresponding built-in circuit designed for a particular terminal. Thus, the interface of the circuit itself provides a novel authentication mechanism. This paper describes the detailed architecture of the system and clarify the feasibility and effectiveness of the system. In addition, we discuss a fail-safe mechanism and future work necessary for the practical application of the system.

  • Tandem Queue Approximation of Non-preemptive Priority Queues for Capacity Dimensioning and Call Admission Control in an ATM Switch

    Hiroyuki YOKOYAMA  Hajime NAKAMURA  

     
    PAPER-ATM Networks

      Vol:
    E81-B No:11
      Page(s):
    2072-2080

    Priority control and call admission control are indispensable traffic management methods to guarantee each QoS requirement of connections in ATM networks. The key technique of call admission control under priority control is to estimate required bandwidth of each connection to satisfy all QoSs of calls in progress. In this paper, we propose a novel approximation method to calculate the required bandwidth of ATM connections through priority queues and show a practical call admission control scheme using the proposed method. The essence of the approximation method is to model prioritized parallel queues as a series of queues in tandem with no priority control by focusing on the number of cells in queues. The tandem queue approximation method enables us to model each queue under priority control as a single non-priority FIFO queue in terms of its queue length. This results in that effective bandwidth techniques are applicable to priority queues. The effectiveness of the proposed scheme is evaluated by some numerical examples.

  • Prototype System of SLAMNet: Implementation and Performance Analysis of Signaling-Free Wavelength Path Switching Network

    Hiroyuki YOKOYAMA  Hajime NAKAMURA  Shinichi NOMOTO  

     
    PAPER-Network

      Vol:
    E87-B No:4
      Page(s):
    932-939

    This paper describes the implementation of an optical switch control system for best-effort multi-wavelength path assignment in DWDM networks based on the SLAMNet (Statistical Lambda Multiplexing Network) that provides dynamic path assignment capabilities without signaling between nodes. The platform of the prototype system consists of a hardware and operation system that are commercially available in the market. We developed the control functions of the SLAMNet as application software to run on the platform. The control function monitors the instantaneous bit rate of the traffic in the wavelength paths and autonomously sets up or releases optical channels in an independent and distributed manner. We demonstrate that the prototype system achieves a switching time of less than 28 milliseconds, which can respond to the burst traffic that emerges and disappears within a fraction of a second in backbone networks. This result indicates that the network architecture SLAMNet is applicable for best-effort multi-wavelength path assignment as an overlay network built on a legacy infrastructure that has no signaling capabilities. The design description and detail hardware configuration are presented. The control mechanisms and performance analysis are also included.

  • Shaka: User Movement Estimation Considering Reliability, Power Saving, and Latency Using Mobile Phone

    Arei KOBAYASHI  Shigeki MURAMATSU  Daisuke KAMISAKA  Takafumi WATANABE  Atsunori MINAMIKAWA  Takeshi IWAMOTO  Hiroyuki YOKOYAMA  

     
    PAPER

      Vol:
    E94-D No:6
      Page(s):
    1153-1163

    This paper proposes a method for using an accelerometer, microphone, and GPS in a mobile phone to recognize the movement of the user. Past attempts at identifying the movement associated with riding on a bicycle, train, bus or car and common human movements like standing still, walking or running have had problems with poor accuracy due to factors such as sudden changes in vibration or times when the vibrations resembled those for other types of movement. Moreover, previous methods have had problems with has the problem of high power consumption because of the sensor processing load. The proposed method aims to avoid these problems by estimating the reliability of the inference result, and by combining two inference modes to decrease the power consumption. Field trials demonstrate that our method achieves 90% or better average accuracy for the seven types of movement listed above. Shaka's power saving functionality enables us to extend the battery life of a mobile phone to over 100 hours while our estimation algorithm is running in the background. Furthermore, this paper uses experimental results to show the trade-off between accuracy and latency when estimating user activity.

  • Privacy-Preserving Correlation Coefficient

    Tomoaki MIMOTO  Hiroyuki YOKOYAMA  Toru NAKAMURA  Takamasa ISOHARA  Masayuki HASHIMOTO  Ryosuke KOJIMA  Aki HASEGAWA  Yasushi OKUNO  

     
    PAPER

      Pubricized:
    2023/02/08
      Vol:
    E106-D No:5
      Page(s):
    868-876

    Differential privacy is a confidentiality metric and quantitatively guarantees the confidentiality of individuals. A noise criterion, called sensitivity, must be calculated when constructing a probabilistic disturbance mechanism that satisfies differential privacy. Depending on the statistical process, the sensitivity may be very large or even impossible to compute. As a result, the usefulness of the constructed mechanism may be significantly low; it might even be impossible to directly construct it. In this paper, we first discuss situations in which sensitivity is difficult to calculate, and then propose a differential privacy with additional dummy data as a countermeasure. When the sensitivity in the conventional differential privacy is calculable, a mechanism that satisfies the proposed metric satisfies the conventional differential privacy at the same time, and it is possible to evaluate the relationship between the respective privacy parameters. Next, we derive sensitivity by focusing on correlation coefficients as a case study of a statistical process for which sensitivity is difficult to calculate, and propose a probabilistic disturbing mechanism that satisfies the proposed metric. Finally, we experimentally evaluate the effect of noise on the sensitivity of the proposed and direct methods. Experiments show that privacy-preserving correlation coefficients can be derived with less noise compared to using direct methods.

  • Electromagnetic Wave Pattern Detection with Multiple Sensors in the Manufacturing Field

    Ayano OHNISHI  Michio MIYAMOTO  Yoshio TAKEUCHI  Toshiyuki MAEYAMA  Akio HASEGAWA  Hiroyuki YOKOYAMA  

     
    PAPER

      Pubricized:
    2022/08/23
      Vol:
    E106-B No:2
      Page(s):
    109-116

    Multiple wireless communication systems are often operated together in the same area in such manufacturing sites as factories where wideband noise may be emitted from industrial equipment over channels for wireless communication systems. To perform highly reliable wireless communication in such environments, radio wave environments must be monitored that are specific to each manufacturing site to find channels and timing that enable stable communication. The authors studied technologies using machine learning to efficiently analyze a large amount of monitoring data, including signals whose spectrum shape is undefined, such as electromagnetic noise over a wideband. In this paper, we generated common supervised data for multiple sensors by conjointly clustering features after normalizing those calculated in each sensor to recognize the signal reception timing from identical sources and eliminate the complexity of supervised data management. We confirmed our method's effectiveness through signal models and actual data sampled by sensors that we developed.

  • Optical Sampling System Using Compact and Stable External-Cavity Mode-Locked Laser-Diode Modules

    Masayuki SHIRANE  Yoichi HASHIMOTO  Hirohito YAMADA  Hiroyuki YOKOYAMA  

     
    PAPER

      Vol:
    E87-C No:7
      Page(s):
    1173-1180

    A compact and stable optical sampling measurement system with a temporal resolution of 2 ps has been developed. External-cavity mode-locked laser-diode (EC-MLLD) modules, which directly generate coherent 2-ps optical pulses, were used as the optical sampling pulse sources. Real-time measurement of the recovery dynamics in semiconductor saturable absorber devices has been achieved by optical sampling combined with the pump-probe method. An EC-MLLD module was also utilized for simple sub-harmonic all-optical clock recovery based on the synchronization of the mode-locking operation by optical-pulse injection. Optical sampling measurement of 160-Gbit/s return-to-zero signals incorporating all-optical clock recovery has been demonstrated.

  • Design and Implementation of Pedestrian Dead Reckoning System on a Mobile Phone

    Daisuke KAMISAKA  Shigeki MURAMATSU  Takeshi IWAMOTO  Hiroyuki YOKOYAMA  

     
    PAPER

      Vol:
    E94-D No:6
      Page(s):
    1137-1146

    Pedestrian dead reckoning (PDR) based on human gait locomotion is a promising solution for indoor location services, which independently determine the relative position of the user using multiple sensors. Most existing PDR methods assume that all sensors are mounted in a fixed position on the user's body while walking. However, it is inconvenient for a user to mount his/her mobile phone or additional sensor modules in a specific position on his/her body such as the torso. In this paper, we propose a new PDR method and a prototype system suitable for indoor navigation systems on a mobile phone. Our method determines the user's relative position even if the sensors' orientation relative to the user is not given and changes from moment to moment. Therefore, the user does not have to mount the mobile phone containing sensors on the body and can carry it in a natural way while walking, e.g., while swinging the arms. Detailed algorithms, implementation and experimental evaluation results are presented.

  • Design Methods for Utility Max-Min Fair Share Networks

    Hiroyuki YOKOYAMA  Hajime NAKAMURA  Shinichi NOMOTO  

     
    PAPER-Network

      Vol:
    E87-B No:10
      Page(s):
    2922-2930

    This paper proposes a bandwidth allocation algorithm and a demand accommodation algorithm guaranteeing utility max-min fairness under bandwidth constraints. We prove that the proposed algorithms can fairly split network resources among connections and achieve call admission control considering the fairness among different types of applications. We then formulate three different network design problems to maximize the total utility of all customers, the number of users accommodated in the network, and the average utility of the customers accommodated in the network. To solve the problems, we extend the conventional network design algorithms considering utility max-min fair share, and numerically evaluate and compare their performance. Finally, we summarize the best algorithms to design the utility max-min fair share networks considering the operation policy of network providers.