The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Iwao SASASE(110hit)

61-80hit(110hit)

  • Capacity and Effects of Reed-Solomon Codes on Multi-Pulse PPM in Optical Communications

    Masahiko TAKAHASHI  Hiroyuki YASHIMA  Iwao SASASE  Shinsaku MORI  

     
    PAPER-Optical Communication

      Vol:
    E72-E No:11
      Page(s):
    1198-1203

    The capacity of Multi-pulse PPM (MPPM) and performance of Reed-Solomon coded MPPM in optical photon communications are evaluated. Transmission rate, energy efficiency and error probability of MPPM are presented for noiseless channel. It is shown that MPPM yields higher limits of energy efficiencies as well as transmission rate than PPM in band limited channel. Moreover, it is shown that MPPM combined with Reed-Solomon (RS) codes achieves higher energy efficiency of more than twice as that of RS coded PPM, which McEliece studied, in practical range of error probability.

  • Low-Complexity Joint Antenna and User Selection Scheme for the Downlink Multiuser Massive MIMO System with Complexity Reduction Factors

    Aye Mon HTUN  Maung SANN MAW  Iwao SASASE  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/08/29
      Vol:
    E102-B No:3
      Page(s):
    592-602

    Multiuser massive multi-input multi-output (MU massive MIMO) is considered as a promising technology for the fifth generation (5G) of the wireless communication system. In this paper, we propose a low-complexity joint antenna and user selection scheme with block diagonalization (BD) precoding for MU massive MIMO downlink channel in the time division duplex (TDD) system. The base station (BS) is equipped with a large-scale transmit antenna array while each user is using the single receive antenna in the system. To reduce the hardware cost, BS will be implemented by limited number of radio frequency (RF) chains and BS must activate some selected transmit antennas in the BS side for data transmitting and some users' receive antennas in user side for data receiving. To achieve the reduction in the computation complexity in the antenna and user selection while maintaining the same or higher sum-rate in the system, the proposed scheme relies on three complexity reduction key factors. The first key factor is that finding the average channel gains for the transmit antenna in the BS side and the receive antenna in the user side to select the best channel gain antennas and users. The second key factor called the complexity control factor ξ(Xi) for the antenna set and the user set limitation is used to control the complexity of the brute force search. The third one is that using the assumption of the point-to-point deterministic MIMO channel model to avoid the singular value decomposition (SVD) computation in the brute force search. We show that the proposed scheme offers enormous reduction in the computation complexity while ensuring the acceptable performance in terms of total system sum-rate compared with optimal and other conventional schemes.

  • Interlace Coding System Involving Data Compression Code, Data Encryption Code and Error Correcting Code

    Takaya YAMAZATO  Iwao SASASE  Shinsaku MORI  

     
    PAPER

      Vol:
    E75-B No:6
      Page(s):
    458-465

    An Interlace Coding System (ICS) involving data compression code, data encryption code and error correcting code is proposed and its error performance on additive white Gaussian noise (AWGN) channel with quadrature phase shift keying (QPSK) is analyzed. The proposed system handles data compression, data encryption and error correcting processes together, i.e. adds error correcting redundancy to the block lists of the dictionary in which compression system constructs to reduce source redundancy. Each block list is encoded by Ziv-Lempel code and Data Encryption Standard (DES). As the catastrophic condition determined by the data compression procedure is not negligible, error correcting redundancy should be added so as to avoid catastrophic condition. We found that the catastrophic condition depends only on the size of the dictionary for our proposed system. Thus, by employing a large dictionary, good error performance can be applied by the proposed system and the catastrophic condition can be avoided.

  • Restricted Overflow Strategy in Integrated Services Network

    Tatsuya TANIAI  Azuchi MIKI  Takashi KOJIMA  Iwao SASASE  Shinsaku MORI  

     
    PAPER-Communication Networks and Service

      Vol:
    E75-B No:7
      Page(s):
    649-656

    In this paper, restricted overflow strategy is proposed as a novel channel access strategy for the queueable hierarchical channel structure, which has been proposed as one of "Wideband-ISDN" channel structures. In this policy, overflow from higher bit rate channels to lower bit rate channels is partly restricted by the number of waiting customers in the higher channel's buffer. Therefore, thresholds, which restrict overflow, are considered on the buffer. First, we present the system model with two types of services and restricted overflow strategy. Next, we provide a queueing analysis of this strategy. After that, some numerical results of both conventional overflow strategy and restricted overflow strategy are presented, and we compare the average holding times under these strategies. Finally, we show that, if we choose appropriate thresholds, the average holding time of higher level traffic is improved.

  • Trellis Coded 8PSK Modulation with Diversity on Spatially Correlated Rayleigh Fading Channel

    Gunawan WIBISONO  Iwao SASASE  

     
    PAPER-Mobile Communication

      Vol:
    E80-B No:1
      Page(s):
    156-165

    We have investigated the BER performance of TC 8PSK with 2 branch SC and MRC diversities on spatially correlated Rayleigh fading channel. The upper bounds using the transfer function bounding technique are derived several numerical results are shown. Although the correlation between branches causes signal-to-noise (SNR) loss (relative to uncorrelated fading case) for SC and MRC diversities, the diversity can lead to achieve the diversity gain compared to the system without diversity. It is found that the diversity gain of 4-state TC 8PSK is larger than 8-state TC 8PSK. It is also shown that the BER performance of TC 8PSK is decreased as the antenna separation is decreased.

  • Indoor Infrared Wireless Systems Using OOK-CDMA with Decision-Feedback Equalizer on Diffuse Channels

    Hiroe YAMAGUCHI  Ryoko MATSUO  Michihito MATSUO  Tomoaki OHTSUKI  Iwao SASASE  

     
    PAPER-Wireless Communication Technology

      Vol:
    E84-B No:4
      Page(s):
    960-966

    We evaluate the performance of indoor infrared wireless systems using on-off keying code division multiple access (OOK-CDMA) with decision-feedback equalizer (DFE) on diffuse channels. To estimate the impulse response, we use the training sequence that alternates '1' and '0. ' We show that the OOK-CDMA with DFE and the training sequence can achieve better performance than the OOK-CDMA without DFE. We also show that the OOK-CDMA with DFE and the training sequence can achieve almost the same performance as the OOK-CDMA with DFE and the known impulse response.

  • Target Detection with MSN Algorithm for the Bistatic Radar Using Digital Terrestrial Broadcasting Signals

    Junji ASADA  Iwao SASASE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:2
      Page(s):
    515-525

    In bistatic radar, it is important to suppress the undesired signals such as the direct propagated signal from transmitter and its multipath components. Conventionally, some suppression methods have been proposed. They are categorized into the method using a feedback system and the method which subtracts the replicas of the undesired signals. The former method may have the problem on the convergence of the suppression performance. The latter method requires the precise delay times of the undesired signals. In this paper we propose a new method to detect the target in digital terrestrial TV-based bistatic radar which is based on orthogonal frequency division multiplexing (OFDM), without any information on the undesired signals' delay times. In the proposed method, we adapt a scheme based on maximum signal to noise ratio (MSN) algorithm, which makes signal to interference plus noise ratio (SINR) maximum for the desired signal component. The maximum sensitivity is steered so as to match the path that exhibits the delay which relates to the target position, as if the search beam is steered along the direction in array signal processing. In the proposed method, "nulls" are also formed for other delay components to be suppressed simultaneously. In the frequency domain, the carrier components of the scattered signal divided by those of the reference signal indicate the delays caused by scattering. We call these divided carrier components "normalized received signal." The steered sensitivity and nulls are created by the weight which is applied to the normalized received signal in the frequency domain. We obtain the method to estimate the weight to achieve the maximum SINR in the delay estimation which also includes the compensation for the reduction of the weight's length caused by decorrelation among the delay components. The simulation results show that our proposed method without any information on the undesired signal's delays provides sufficient detection performance for the typical target compared to the conventional one.

  • Statistical Analysis of Quantization Noise in an End-to-End OFDM Link

    Maduranga LIYANAGE  Iwao SASASE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:5
      Page(s):
    1376-1385

    Quantization is an important operation in digital communications systems. It not only introduces quantization noise but also changes the statistical properties of the quantized signal. Furthermore, quantization noise cannot be always considered as an additive source of Gaussian noise as it depends on the input signal probability density function. In orthogonal-frequency-division-multiplexing transmission the signal undergoes different operations which change its statistical properties. In this paper we analyze the statistical transformations of the signal from the transmitter to the receiver and determine how these effect the quantization. The discussed process considers the transceiver parameters and the channel properties to model the quantization noise. Simulation results show that the model agrees well with the simulated transmissions. The effect of system and channel properties on the quantization noise and its effect on bit-error-rate are shown. This enables the design of a quantizer with an optimal resolution for the required performance metrics.

  • Inter-Code Interference and Optimum Spreading Sequence in Frequency-Selective Rayleigh Fading Channels on Uplink MC-CDMA

    Takashi SHONO  Tomoyuki YAMADA  Kiyoshi KOBAYASHI  Katsuhiko ARAKI  Iwao SASASE  

     
    PAPER-Signal Processing for Communications

      Vol:
    E87-A No:8
      Page(s):
    1981-1993

    In uplink multicarrier code division multiple access (MC-CDMA), the inter-code interference (ICI) caused by the independent and frequency-selective fading channel of each user and the inter-carrier interference caused by the asynchronous reception of each user's OFDM symbols result in multiple access interference (MAI). This paper evaluates the ICI in frequency-selective Rayleigh fading channels for uplink MC-CDMA. We derive theoretical expressions for the desired-to-undesired signal power ratio (DUR) as a quantitative representation of ICI, and validate them by comparison with computer simulations using a Walsh-Hadamard (WH) code. Based on the analytical results, we obtain the optimum spreading sequence that minimizes the ICI (in short, maximizes the multiplexing performance); this sequence appears to be orthogonal. Three equalization combining methods are examined; equal gain combining (EGC), orthogonality restoring combining (ORC), and maximum ratio combining (MRC).

  • The Mitigation of MAI for OOK-CDMA Systems with Optical Hard-Limiters by Transmitting Optical Pulses with Two-Level Intensities

    Takaya MIYAZAWA  Ayako IWATA  Iwao SASASE  

     
    PAPER-Fiber-Optic Transmission

      Vol:
    E87-B No:1
      Page(s):
    10-19

    In this paper, we propose OOK-CDMA system with optical hard-limiters (OHLs) using schemes of transmitting optical pulses with two-level intensities. The proposed system can be applied to both cases with single OHL and double OHLs. In the proposed system, a frame corresponding to a bit time is divided into two frames, where the low intensity pulses are transmitted in the weighted positions at the former frame, and the high ones are transmitted in the weighted positions at the latter frame. At the receiver side, in each weighted position of low intensity level, the ability of Multiple Access Interferences (MAIs) cancellation by OHL is equal to that of the conventional systems. However, in each weighted position of high intensity level, the OHL with the higher-level threshold value can easily eliminate MAIs with low intensity, while the MAIs are not eliminated in the conventional system. As a result, the ability of interference cancellation by OHL is significantly increased. When using single OHL in the proposed system, the optimum combinations of the values of low-level weights and low-level intensity ratio depend on the received laser power. This means that deploying dynamic control of the values of low-level weights and low-level intensity ratio is an imperative requirement in the proposed system with single OHL. On the other hand, when using double OHLs, the optimum combinations of the values of low-level weights and low-level intensity ratio are always constant. We analyze the performance of the proposed system and show its advantage in terms of bit error probability compared to the conventional system in both cases with single OHL and double OHLs. We also show that the proposed system with double OHLs is more effective and practical than the one with single OHL depending on the received laser power.

  • Hue Signature Auto Update System for Visual Similarity-Based Phishing Detection with Tolerance to Zero-Day Attack

    Shuichiro HARUTA  Hiromu ASAHINA  Fumitaka YAMAZAKI  Iwao SASASE  

     
    PAPER-Dependable Computing

      Pubricized:
    2019/09/04
      Vol:
    E102-D No:12
      Page(s):
    2461-2471

    Detecting phishing websites is imperative. Among several detection schemes, the promising ones are the visual similarity-based approaches. In those, targeted legitimate website's visual features referred to as signatures are stored in SDB (Signature Database) by the system administrator. They can only detect phishing websites whose signatures are highly similar to SDB's one. Thus, the system administrator has to register multiple signatures to detect various phishing websites and that cost is very high. This incurs the vulnerability of zero-day phishing attack. In order to address this issue, an auto signature update mechanism is needed. The naive way of auto updating SDB is expanding the scope of detection by adding detected phishing website's signature to SDB. However, the previous approaches are not suitable for auto updating since their similarity can be highly different among targeted legitimate website and subspecies of phishing website targeting that legitimate website. Furthermore, the previous signatures can be easily manipulated by attackers. In order to overcome the problems mentioned above, in this paper, we propose a hue signature auto update system for visual similarity-based phishing detection with tolerance to zero-day attack. The phishing websites targeting certain legitimate website tend to use the targeted website's theme color to deceive users. In other words, the users can easily distinguish phishing website if it has highly different hue information from targeted legitimate one (e.g. red colored Facebook is suspicious). Thus, the hue signature has a common feature among the targeted legitimate website and subspecies of phishing websites, and it is difficult for attackers to change it. Based on this notion, we argue that the hue signature fulfills the requirements about auto updating SDB and robustness for attackers' manipulating. This commonness can effectively expand the scope of detection when auto updating is applied to the hue signature. By the computer simulation with a real dataset, we demonstrate that our system achieves high detection performance compared with the previous scheme.

  • Interference Avoidance Algorithms for Passive RFID Systems Using Contention-Based Transmit Abortion

    Yoshinori TANAKA  Iwao SASASE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E90-B No:11
      Page(s):
    3170-3180

    The performance of a passive RFID system in a dense multi-reader environment is limited by both reader-to-reader interference and reader-to-tag interference. In this paper, we formulate a practical RFID system model which takes into account the non-linear demodulation of the tags and the transmission spectrum of the readers. Using this model, we derive a novel linear programming formulation to obtain the optimum communication probability of the readers for a given reader deployment scenario. We then propose two novel distributed interference avoidance algorithms based on the detect-and-abort principle for multi-channel readers which can effectively mitigate the reader-to-tag interference as well as the reader-to-reader interference. Computer simulations show that the proposed algorithms can improve the successful communication probability and fairness among readers in dense reader environments, compared with the conventional listen-before-talk algorithm.

  • Energy Efficient and Stable Weight Based Clustering for Mobile Ad Hoc Networks

    Safdar H. BOUK  Iwao SASASE  

     
    PAPER-Network

      Vol:
    E92-B No:9
      Page(s):
    2851-2863

    Recently several weighted clustering algorithms have been proposed, however, to the best of our knowledge; there is none that propagates weights to other nodes without weight message for leader election, normalizes node parameters and considers neighboring node parameters to calculate node weights. In this paper, we propose an Energy Efficient and Stable Weight Based Clustering (EE-SWBC) algorithm that elects cluster heads without sending any additional weight message. It propagates node parameters to its neighbors through neighbor discovery message (HELLO Message) and stores these parameters in neighborhood list. Each node normalizes parameters and efficiently calculates its own weight and the weights of neighboring nodes from that neighborhood table using Grey Decision Method (GDM). GDM finds the ideal solution (best node parameters in neighborhood list) and calculates node weights in comparison to the ideal solution. The node(s) with maximum weight (parameters closer to the ideal solution) are elected as cluster heads. In result, EE-SWBC fairly selects potential nodes with parameters closer to ideal solution with less overhead. Different performance metrics of EE-SWBC and Distributed Weighted Clustering Algorithm (DWCA) are compared through simulations. The simulation results show that EE-SWBC maintains fewer average numbers of stable clusters with minimum overhead, less energy consumption and fewer changes in cluster structure within network compared to DWCA.

  • RPL-Based Tree Construction Scheme for Target-Specific Code Dissemination in Wireless Sensors Networks

    Hiromu ASAHINA  Kentaroh TOYODA  P. Takis MATHIOPOULOS  Iwao SASASE  Hisao YAMAMOTO  

     
    PAPER-Network

      Pubricized:
    2019/09/11
      Vol:
    E103-B No:3
      Page(s):
    190-199

    Distributing codes to specific target sensors in order to fix bugs and/or install a new application is an important management task in WSNs (Wireless Sensor Networks). For the energy efficient dissemination of such codes to specific target sensors, it is required to select the minimum required number of forwarders with the fewest control messages. In this paper, we propose a novel RPL (Routing Protocol for Low-power and lossy networks)-based tree construction scheme for target-specific code dissemination, which is called R-TCS. The main idea of R-TCS is that by leveraging the data collection tree created by a standard routing protocol RPL, it is possible to construct the code dissemination tree with the minimum numbers of non-target sensors and control messages. Since by creating a data collection tree each sensor exchanges RPL messages with the root of the tree, every sensor knows which sensors compose its upwards route, i.e. the route towards the root, and downwards route, i.e. the route towards the leaves. Because of these properties, a target sensor can select the upward route that contains the minimum number of non-target sensors. In addition, a sensor whose downward routes do not contain a target sensor is not required to transmit redundant control messages which are related to the code dissemination operation. In this way, R-TCS can reduce the energy consumption which typically happens in other target-specific code dissemination schemes by the transmission of control messages. In fact, various performance evaluation results obtained by means of computer simulations show that R-TCS reduces by at least 50% energy consumption as compared to the other previous known target-specific code dissemination scheme under the condition where ratio of target sensors is 10% of all sensors.

  • Two Parallel Queues with Dynamic Routing under a Threshold-Type Scheduling

    Makoto NAKAMURA  Iwao SASASE  Shinsaku MORI  

     
    PAPER-Communication Networks and Services

      Vol:
    E73-E No:3
      Page(s):
    379-385

    In this paper, we propose two parallel M/M/1 queueing systems with dynamic routing under a threshold-type scheduling. Arriving customer is sent to the buffer of the faster server as far as the difference of two queues does not exceed a threshold value, but it should be sent to the buffer of the slower server if and only if the difference of two queues exceeds a threshold value. It is shown that as the difference of the two service rates becomes large, the two parallel M/M/1 queueing systems with dynamic routing under the threshold-type scheduling can reduce the mean queueing time of costomers in the system compared to the conventional nonthreshold-type one. It is also found that as the asymmetry in the two service rates increases, the optimum threshold value which minimizes the mean queueing time should be large to reduce the number of queueing customer in the buffer of the slower server. On the other hand, as the traffic intensity becomes large, the optimum threshold value tends to be small in order to increase the total service rate.

  • Analysis of Queueing Systems with Multiple Servers under a Threshold-Type Scheduling

    Iwao SASASE  Shinsaku MORI  

     
    PAPER-Engineering Science in General

      Vol:
    E73-E No:4
      Page(s):
    545-553

    The queueing system with multiple servers of possibly different rates under a threshold-type scheduling is analyzed. We first derive the general expressions for state probabilities and the average queueing delay in which the conventional M/M/n queueing system is also included as the special case of zero-threshold policy. Next, the numerical calculation is carried out for the queueing system with 3 servers under a threshold-type scheduling to consider the impact of the multiple thresholds on the average queueing delay of the system. It is found that the average queueing delay of the queueing system with multiple servers of different rates can be reduced under a threshold-type scheduling by selecting the threshold values appropriately. The threshold-type scheduling is more effective as the difference of the service rates becomes larger.

  • Primary Traffic Based Cooperative Multihop Relaying with Preliminary Farthest Relay Selection in Cognitive Radio Ad Hoc Networks

    I-Te LIN  Iwao SASASE  

     
    PAPER-Network

      Vol:
    E95-B No:8
      Page(s):
    2586-2599

    We propose a primary traffic based multihop relaying algorithm with cooperative transmission (PTBMR-CT). It enlarges the hop transmission distances to reduce the number of cognitive relays on the route from the cognitive source (CS) to the cognitive destination (CD). In each hop, from the cognitive nodes in a specified area depending on whether the primary source (PS) transmits data to the primary destination (PD), the cognitive node that is farthest away from the cognitive relay that sends data is selected as the other one that receives data. However, when the PS is transmitting data to the PD, from the cognitive nodes in a specified area, another cognitive node is also selected and prepared to be the cognitive relay that receives data of cooperative transmission. Cooperative transmission is performed if the PS is still transmitting data to the PD when the cognitive relay that receives data of the next hop transmission is being searched. Simulation results show that the average number of cognitive relays is reduced by PTBMR-CT compared to conventional primary traffic based farthest neighbor relaying (PTBFNR), and PTBMR-CT outperforms conventional PTBFNR in terms of the average end-to-end reliability, the average end-to-end throughput, the average required transmission power of transmitting data from the CS to the CD, and the average end-to-end transmission latency.

  • Parallel Rate-Variable Punctured Convolutional Coded PPM in Photon Communication

    Tomoaki OHTSUKI  Hiroyuki YASHIMA  Iwao SASASE  Shinsaku MORI  

     
    PAPER

      Vol:
    E75-C No:1
      Page(s):
    44-49

    We propose parallel rate-variable punctured convolutional coded PPM in photon communication to achieve high energy information efficiency Ie for desired bit error rate (BER) and transmission bandwidth. We theoretically show the BER performance, bandwidth expansion factor β and necessary Ie to achieve BER10-6 of the proposed systems for some combinations of code rates. It is found that the proposed system can achieve high Ie for desired BER and β by selecting a suitable combination of code rates depending on the channel conditions. Moreover, it is showm that the proposed system has better BER performance than RS-coded PPM in the range of small β.

  • Coherent Optical Polarization-Shift-Keying (POLSK) Homodyne System Using Phase-Diversity Receivers

    Ichiro SETO  Tomoaki OHTSUKI  Hiroyuki YASHIMA  Iwao SASASE  Shinsaku MORI  

     
    PAPER

      Vol:
    E75-C No:1
      Page(s):
    50-57

    We propose Polarization-Shift-Keying (POLSK) homodyne system using phase-diversity receivers and theoretically analyze its bit-error-rate (BER) performance. Since the proposed system uses polarization modulation and homodyne detection, it can cancel the phase noise and is attractive at a high bit-rate transmission. It is found that the receiver sensitivity of the proposed POLSK homodyne system is the same as that of POLSK heterodyne system and is much better than that of DPSK phase-diversity homodyne systems at high signal-to-noise ratio (SNR). We also cosider theoreically the effect of the fluctuation of state of polarization (SOP) on the BER performance of POLSK homodyne system.

  • Input and Output Queueing Two Stage ATM Switch with Hot-Spot Route

    Shigeki SHIOKAWA  Iwao SASASE  

     
    PAPER-ATM switching architecture

      Vol:
    E81-B No:2
      Page(s):
    194-200

    Input and output queueing two stage ATM switch model which is effective under variable hot-spot traffic is proposed. In order to prevent the degradation of performance due to hot-spot traffic, the hot-spot route is added in which cells destined to the hot-spot port bypass. The switch applies the backpressure mode basically. When the switch judges that the hot-spot port exists, it routes cells destined there to the hot-spot route and applies the queue loss mode on them. We evaluate both the cell loss probability and the mean system delay under the nonuniform traffic with variable hot-spot port by computer simulation. As the results, it is shown that our proposed switch can achieve better switching performance than those of conventional switches under variable traffic condition.

61-80hit(110hit)