The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42756hit)

37421-37440hit(42756hit)

  • Specification Description Supporting Method of Telecommunications Networks Management Using Information Model and Process Model

    Ryutaro MATSUMURA  Osamu MIYAGISHI  

     
    PAPER

      Vol:
    E78-B No:1
      Page(s):
    39-46

    Managed Objects (MOs) can be specified by the combination of a static information model and a dynamic process model. First, this paper presents a mapping of attributes from a process model diagram to an information model diagram. Then, it introduces a concept of topology into these two models and proposes a hypothesis about the relationship of topology in these two models. To explicitly explain the hypothesis, it can be stated that all attributes of incoming or outgoing data related to a process in a process model are mapped to an information model where these attributes are interconnected by an explicit relationship which corresponds to a specific meaning, such as physical containment or logical connection. From an intuitive perspective, it can be said that if two attributes have a close topological relationship in a process model, the mapped attributes also have a close topological relationship in an information model. This hypothesis provides clues for determining whether there is an error in an attribute either in the process model or in the information model. By examining the way attributes of incoming or outgoing data related to a process are mapped to an information model, we can detect whether there is an error with respect to the process. The error correction is performed with the assistance of probability analysis. The method of error detection and correction can be implemented in a computer aided tool. Then, error detection on the attribute level becomes automatic, and error correction on the attribute level becomes interactive through the computer aided tool. Finally, the validity of the hypothesis is confirmed by analyzing ITU-T Recommendation M.3100. The specification of the fabric object class defined in M.3 100 is transformed into these two models and the hypothesis is validated for the analysis of the mapping between these two models.

  • Multi-Fisheye Distortion of the Network Map

    Tetsuo OKAZAKI  Hiromichi KAWANO  Yuji HATAKEYAMA  

     
    PAPER

      Vol:
    E78-B No:1
      Page(s):
    61-67

    This paper proposes a multi-fisheye distortion method which can show a large-scale telecommunication network in a single window on the display of a workstation or personal computer. This distortion method has three advantages over the conventional single-fisheye distortion method. First, the focus area is magnified smoothly by the fisheye distortion method, and the peripheral area coordinates are calculated linearly to avoid unnecessary distortion. Second, multiple focus areas are magnified smoothly by using an average of the coordinates calculated for the individual focuses. Third, the scale of unnecessary areas is reduced to provide sufficient space for magnification. The effectiveness of this method is demonstrated by applying to the display of large-scale networks. The effect of the resulting network map distortion on the user is tested by a subjective evaluation experiment.

  • DUALQUEST: Real-Time Bifocal Network Visualization System

    Hiroko FUJI  Shoichiro NAKAI  Hiroshi MATOBA  Hajime TAKANO  

     
    PAPER

      Vol:
    E78-B No:1
      Page(s):
    68-73

    Most current management systems employ graphic-user-interface displays to visualize the networks being managed. Some networks are so large that it is difficult to display all network elements in a single window alone, and therefore, the hierarchical multi-window style presentation is commonly used. This form of presentation has disadvantages, however, including the fact that window manipulations are complex. Our approach (bifocal network visualization) is able to display both the context and any detail of a network within a single window, and overcomes the disadvantages of hierarchical multi-window presentation. We implemented this bifocal network visualization on a workstation using a frame buffer memory called DUALQUEST that is able to generate images in real-time and is simple to operate. This paper describes bifocal network visualization and its implementation. Furthermore, we present an experiment to compare our interface with conventional hierarchical multi-window presentation.

  • Optical Switching Networks Using Free-Space Wavelength-Division Multiplexing Interconnections

    Shigeru KAWAI  Hisakazu KURITA  Ichiro OGURA  

     
    PAPER

      Vol:
    E78-C No:1
      Page(s):
    81-84

    Wavelength-division multiplexing (WDM) optical switching networks are one of most attractive technologies in optical interconnections. By combining with time-division multiplexing (TDM) and space-division multiplexing (SDM) technologies, remarkably high-throughput interconnections may be accomplished. In this paper, we propose WDM switching networks with time-division multiplexed optical signals by using free-space optics. We also propose novel WDM interconnections, including multiple-wavelength light-sources, optical fibers and wavelength-selectable detectors. We successfully confirmed basic principles for the WDM interconnections.

  • Analysis of Highly-Birefringent Fibers with a Hollow Layer Outside an Elliptical Core

    Zygmunt KRASISKI  Takashi HINATA  Shin-ichiro YAMASHITA  Adam MAJEWSKI  

     
    PAPER-Electromagnetic Theory

      Vol:
    E78-C No:1
      Page(s):
    111-116

    The improved point-matching method with Mathieu function expansion for the accurate analysis of the W-type elliptical fiber with layers of any ellipticity is proposed. Results of our method are reliable, because we expand the electromagnetic fields by a sum of the complete set of wave functions in each layer of the fiber. Numerical results are presented for the highly-birefringent fibers with a hollow layer outside an elliptical core. It is found that such fibers can realize the large value of the modal birefringence as well as they can be suitable for the single-mode and single-polarization transmission. From the convergence tests, it is confirmed that the relative error of the modal birefringence is less than 0.01%. The comparison of our results with those by previously reported method is presented. The proposed method can be extended for analysis of the elliptical-core fibers with hollow pits and electromagnetic scattering by targets of the complex elliptical geometry.

  • Short Optical Pulse Generation and Modulation by a Multi-Section MQW Modulator/DFB Laser Integrated Light Source

    Koichi WAKITA  Kenji SATO  Isamu KOTAKA  Yasuhiro KONDO  Mitsuo YAMAMOTO  

     
    PAPER

      Vol:
    E78-C No:1
      Page(s):
    50-54

    A new device consisting of an optical pulse generation section and pulse coding section monolithically integrated on a single-chip has been developed. The pulse generation section consists of a multiple quantum well (MQW) electroabsorption modulator integrated with an MQW DFB laser. The modulator operates at large-signal modulation and low voltage (from 2 to 3-V DC bias with a 3.2-V peak-to-peak RF signal). The second modulator is operated independently as a pulse encoder. An approximately transform-limited optical pulse train, whose full width at half maximum (FWHM) in the time domain is less than 17-ps and spectral FWHM is 28-GHz, is obtained with a repetition frequency of 10-GHz. Compressive strain is introduced in both InGaAsP quantum wells in order to obtain efficient device characteristics. These include a low threshold current (18-mA) for the laser, and low driving voltage (30-dB for 3-V swing) and high-speed operation (over 12-GHz for a 3-dB bandwidth) for the modulators. Demonstrations show that this new device generates short optical pulses encoded by a pseudo-random signal at a rate of 10 Gbit/s. This is the first time 10 Gbit/s modulation has been achieved with a multi-section electroabsorption modulator/DFB laser integrated light source. This monolithic device is expected to be applied to optical soliton transmitters.

  • FOREWORD

    Masayasu HATA  

     
    FOREWORD

      Vol:
    E78-A No:1
      Page(s):
    3-3
  • Challenge to the New Infrastructure and Users' Embarrassment in Network Management Field

    Keiichiro SATO  

     
    INVITED PAPER

      Vol:
    E78-B No:1
      Page(s):
    11-16

    The availability of new technologies in the computer and network industry has allowed us to benefit from a wider choice when building new information systems. This paper presents Japan Airlines' challenge to develop a new information network and management infrastructure based on the new technology. Compared with the existing main-frame environment, the new infrastructure will give us a more comfortable and economic network computing environment. Once we think about network management, there are so many issues to be solved. All existing network elements have their own management consoles with different interfaces and commands. Net managers are swimming in the pool of system consoles looking for the one that exactly tells them what is going on at the user site. The industry standard SNMP offers us a much better environment. However, there is still a long way to go before reaching a world where net managers find a single management console with a single object to manage that is composed of all network elements.

  • Intelligent Trouble Management System Based on Operation Scenario and Fault Simulation

    Kisaku FUJIMOTO  Masakazu BABA  Nobuaki SHIMIZU  Masahiko MATSUSHITA  

     
    PAPER

      Vol:
    E78-B No:1
      Page(s):
    31-38

    Trouble management is a key function in solving the problems and maintaining the high communications capability of a network when communication service network users encounter problems in the quality of services [1]. This paper proposes technologies and architecture for an intelligent management system to achieve advanced service/network trouble management. The system generates operation scenarios to find a cause to solve a reported trouble, executes them, and modifies them according to operation circumstance changes. In the scenario execution process, fault propagation simulation is used to isolate a fault in necessary cases. The evaluation of the system applied to the ISDN services shows that the proposed system can achieve high-speed, precise trouble management by the integrated cooperative work of a human (operator) and a machine (operation system).

  • Network Management System Using Distributed Computing

    Tamiya OCHIAI  

     
    PAPER

      Vol:
    E78-B No:1
      Page(s):
    54-60

    This paper proposes a suitable distributed computing model as the basis for building a network management system. Author has been studying a distributed reactive model, called Meta for this purpose at Cornell University. Effectiveness using Meta is to provide high level program interface for developing network management system, and programmers can achieve network management system with coding small amount of programs. It also realizes easy additions and modifications for network management application programs. To confirm the effectiveness of the proposal, the author has utilized Meta to implement an experimental network management system. The experimental system provides high level interfaces for monitoring and controlling network components. It also supports reliable communication over distributed nodes. Preliminary evaluation of the system shows that critical network management applications are provided within an appropriate response time for all applications provided by SNMP, with small development cost and easy system modification.

  • The Effect of Internal Parasitic Capacitances in Series-Connected MOS Structure

    Sang Heon LEE  Song Bai PARK  Kyu Ho PARK  

     
    LETTER-VLSI Design Technology

      Vol:
    E78-A No:1
      Page(s):
    142-145

    A simple method is presented to calculate the parasitic capacitance effect in the propagation delay of series-connected MOS (SCM) structures. This method divides SCM circuits into two parts and accurately calculates the contribution of each part to the difference from the delay without parasitic capacitances.

  • Checkers for Adaptive Programs

    Toshiya ITOH  Masahiro TAKEI  

     
    PAPER

      Vol:
    E78-A No:1
      Page(s):
    42-50

    Let L{0,1}* be a language and let λL : {0,1}*{0,1} be the characteristic function of the language L, i.e., if x ∈ L, λL (x) = 1; otherwise,λL (x) = 0. In this paper, we consider an adaptive checker with a single program F (resp. noncommunicating multiple programs F1, F2,...) for λL that works even when an incorrect program F* (resp. incorrect noncommunicating multiple programs F*1,F*2,...) for λL adaptively behaves according to inputs previously provided to the program F* (resp. the programs F*1,F*2,...). We show that (1) for any language L, there exists an adaptive checker with a single program for λL iff L and respectively have competitive interactive proof systems; and (2) that for any language L, there exists an adaptive checker with noncommunicating multiple programs for λL iff L and respectively have function-restricted interactive proof systems. This implies that for any language L, adaptive chekers with noncommunicating multiple programs for λL are as powerful as static ones with a single program for λL.

  • An Extended Centering Mechanism for Interpreting Pronouns and Zero-Pronouns

    Shingo TAKADA  Norihisa DOI  

     
    PAPER-Artificial Intelligence and Cognitive Science

      Vol:
    E78-D No:1
      Page(s):
    58-67

    Zero-pronouns and overt pronouns occur frequently in Japanese text. These must be interpreted by recognizing their antecedents to properly understand' a piece of discourse. The notion of centering" has been used to help in the interpretation process for intersentential anaphors. This is based on the premise that in a piece of discourse, some members have a greater amount of attention put on it than other members. In Japanese, the zero-pronoun is said to have the greatest amount of attention put on it. But, when there are more than one zero-pronoun in a sentence, only one of them would be accountable using centering. Overt pronouns and any other zero-pronouns may as well have appeared as ordinary' noun phrases. In this paper, the notion of centering has been extended so that these can also be interpreted. Basically, zero-pronouns and overt pronouns are treated as being more centered" in the discourse than other ordinary' noun phrases. They are put in an ordered list called the Center List. Any other noun phrases appearing in a sentence are put in another list called the Possible Center List. Noun phrases within both lists are ordered according to their degrees of salience. To see the effect of our approach, it was implemented in a simple system with minimal constraints and evaluated. The result showed that when the antecedent is in either the Center List or the Possible Center List, 80% of all zero-pronouns and overt pronouns were properly interpreted.

  • A New Class of Non-interactive ID-Based Key Sharing Schemes and Its Performances

    Ryuichi SAKAI  Masao KASAHARA  

     
    PAPER

      Vol:
    E78-A No:1
      Page(s):
    51-58

    In this paper, we propose a new class of ID-based non-interactive key sharing scheme with a trusted center which generate a common key on the basis of a linear combination of the center secrets. We also discuss the security of the proposed schemes, and show that the proposed schemes prevent the conventional collusion attack, by adding another random integers unique to each user, on the secret vector that is assigned to the user. Furthermore, we present a new type of a statistical collusion attack which is more suitable for the proposed schemes. We also present the lower bound of the threshold of the statistical collusion attack on the proposed schemes. The proposed schemes can be easily implemented compared with other schemes as they require only computing of the inner product of two vectors over finite ring (including finite field) and an Euclidean quotient, for generating the common key. Our proposed schemes can be regarded as modified versions of the Blom's original scheme. However our proposed schemes are secure against our new type of the attack, as well as the collusion attack based on the solving of the linear equations, although Blom's scheme is insecure against both of these collusion attacks.

  • A Telecommunications Management Integration Network

    Masahiko MATSUSHITA  Tetsuo OKAZAKI  Makoto YOSHIDA  

     
    PAPER

      Vol:
    E78-B No:1
      Page(s):
    17-23

    Telecommunications management activities have mostly been supported by operators; however, machines are gradually playing more important roles in the management arena by utilizing computing technology. Additionally, management systems can now be networked by using standard interface specifications. The study of human and machine integration is thus essential for achieving the sophisticated management objectives of telecommunications. This paper proposes the principles for a telecommunications management integration network (TMIN), which integrates human and machine management networks, and proposes a source text description method for transferring management communication knowledge from human to machine. First, reference models are proposed for the management process and management communication. These models cover network management activities of both humans and machines. Second, the contents of the source text are clarified. Source text presents human management knowledge in a form suitable for machine-machine communication. Third, an efficient source text description method is proposed that reduces redundancy and proliferation. Finally, a means of harmonizing management information definitions with TMIN is suggested to facilitate human-machine cooperation.

  • High-Speed Modulation with Low-Threshold 1.3µm-Wavelength MQW Laser Diodes

    Kazuhiro TANAKA  Kaoru NAKAJIMA  Tetsufumi ODAGAWA  Hiroyuki NOBUHARA  Kiyohide WAKAO  

     
    LETTER

      Vol:
    E78-C No:1
      Page(s):
    91-93

    Laser diodes for optical interconnections are ideally high speed, work over a wide temperature range, and are simple to bias. This paper reports high bit-rate modulation with nearly zero bias with very low threshold 1.3µm-wavelength laser diodes over a wide temperature range. At the high temperature of 80, lasing delay was 165 ps with nearly zero bias. We demonstrated 2.5 Gbit/s modulation over a wide temperature range. Eye opening was over 34% of one time slot.

  • Soliton Transmission Control for Ultra High Speed System

    Hirokazu KUBOTA  Masataka NAKAZAWA  

     
    INVITED PAPER

      Vol:
    E78-C No:1
      Page(s):
    5-11

    Soliton transmission control has already proved to be an outstanding technique and enable a soliton to be transmit over one million kilometers. This technique is not only applicable to vast distances but also to shorter distances where the amplifier spacing is greater than that of conventional systems. A combination of time and frequency domain control eliminates the noise accumulation and timing jitter caused by soliton interaction and the Gordon-Haus effect, that are the main impediments to extending the transmission distance. In this paper we describe soliton control techniques applied over an astronomical transmission distance of 180,000,000 km, and to a terrestrial system with a large amplifier spacing of up to 100km. We also report the possibility of realizing a sub-tera bit/s soliton transmission system operating over more than 5,000 km in which the soliton self-frequency shift is controlled with the soliton control technique.

  • On the Proper-Path-Decomposition of Trees

    Atsushi TAKAHASHI  Shuichi UENO  Yoji KAJITANI  

     
    LETTER-Graphs, Networks and Matroids

      Vol:
    E78-A No:1
      Page(s):
    131-136

    We introduce the interval set of a graph G which is a representation of the proper-path-decomposition of G, and show a linear time algorithm to construct an optimal interval set for any tree T. It is shown that a proper-path-decomposition of T with optimal width can be obtained from an optimal interval set of T in O(n log n) time.

  • 10-Gb/s Repeaterless Transmission Using Standard Single-Mode Fiber with Pre-Chirping and Dispersion Compensation Techniques

    George ISHIKAWA  Motoyoshi SEKIYA  Hiroshi ONAKA  Terumi CHIKAMA  Hiroshi NISHIMOTO  

     
    PAPER

      Vol:
    E78-C No:1
      Page(s):
    43-49

    This paper proposes that a combination of pre-chirping and dispersion compensation is effective in suppressing the waveform distortion due to the self-phase modulation and the group-velocity dispersion in 10 Gb/s repeaterless transmission using 1.3-µm zero-dispersion single-mode fibers (SMF) operating at a wavelength of 1.55µm. The following results were obtained through simulation. 1) Setting the α-parameter of a LiNbO3 optical modulator negative (α1.0) gives a large tolerance of the launched power Pin. 2) For 90-km SMF transmission, the maximum Pin is obtained when the dispersion compensation ratio β is from 50% to 70%. 3) For the allowable β as a function of the transmission distance when a dispersion compensator is located in the receiver (post-compensation scheme), the lower limit of β is determined by the constant residual dispersion value, which agrees well with the dispersion tolerance without dispersion compensation. Our 90-km SMF transmission experiments using a LiNbO3 optical modulator and a dispersion compensating fiber (DCF) confirmed the simulation results regarding the optimum value of β and the large tolerance of the fiber launched power. Based on the above investigations, we achieved a 10-Gb/s repeaterless 140-km SMF transmission with α1.0 and post-compensation.

  • Detection of the K-Complex Using a New Method of Recognizing Waveform Based on the Discrete Wavelet Transform

    Zhengwei TANG  Naohiro ISHII  

     
    PAPER-Bio-Cybernetics and Neurocomputing

      Vol:
    E78-D No:1
      Page(s):
    77-85

    In this paper a method of recognizing waveform based on the Discrete Wavelet Transform (DWT) presented by us is applied to detecting the K-complex in human's EEG which is a slow wave overridden by fast rhythms (called as spindle). The features of K-complex are extracted in terms of three parameters: the local maxima of the wavelet transform modulus, average slope and the number of DWT coefficients in a wave. The 4th order B-spline wavelet is selected as the wavelet basis. Two channels at different resolutions are used to detect slow wave and sleep spindle contained in the K-complex. According to the principle of the minimum distance classification the classifiers are designed in order to decide the thresholds of recognition criteria. The EEG signal containing K-complexes elicited by sound stimuli is used as pattern to train the classifiers. Compared with traditional method of waveform recognition in time domain, this method has the advantage of automatically classifying duration ranks of various waves with different frequencies. Hence, it specially is suitable to recognition of signals which are the superimposition of waves with different frequencies. The experimental results of detection of K-complexes indicate that the method is effective.

37421-37440hit(42756hit)