The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

7221-7240hit(42807hit)

  • A Survey of Geographic Routing Protocols for Vehicular Ad Hoc Networks as a Sensing Platform

    Kenichi MASE  

     
    SURVEY PAPER

      Vol:
    E99-B No:9
      Page(s):
    1938-1948

    An overview of the evolution of intelligent transport systems (ITS) supported by advances in information and communication technologies is presented. Focusing on a sensing platform as one of the ITS applications, this paper presents a survey on vehicular ad hoc network-based geographic routing. In addition to the minimum requirement of street-awareness based on street maps, traffic and packet-awareness are considered essential to achieve acceptable packet delivery performance. In particular, in addition to statistical information, real-time traffic and packet level information are indispensable for making routing protocols feasible and effective. Considering traffic conditions that are highly space- and time-dependent, static nodes can be used to assist with geographic routing, and a protocol workable under a partial deployment of static nodes is considered.

  • DOA Estimation Using Temporal Spatial Virtual Array Based on Doppler Shift with Adaptive PRI Control

    Hirotaka HAYASHI  Tomoaki OHTSUKI  

     
    PAPER

      Vol:
    E99-B No:9
      Page(s):
    2009-2018

    Recently, Doppler radars have been used in various applications from the detection and the classification of indoor human activities to the detection of airplanes. To improve both the degrees of freedom (DOF) and the estimation accuracy of the direction-of-arrival (DOA) of targets, multiple-input multiple-output (MIMO) radar has received much attention in recent years. The temporal spatial virtual array based on Doppler shift of a moving target has been one of methods to improve DOA estimation accuracy. However, the DOA estimation accuracy based on the method depends on the velocity and the direction of the target on which we focus. Also, the temporal spatial virtual array should be generated based on the information of the single target. Thus, it is difficult to implement the method if there are multiple targets. In this paper, we propose a new method that provides high accuracy of DOA estimation by using the temporal spatial virtual array without dependence on the velocity, the direction and the number of existing targets. We demonstrate the DOA estimation accuracy and the effectiveness of the proposed method via simulations.

  • A Network-Type Brain Machine Interface to Support Activities of Daily Living Open Access

    Takayuki SUYAMA  

     
    INVITED PAPER

      Vol:
    E99-B No:9
      Page(s):
    1930-1937

    To help elderly and physically disabled people to become self-reliant in daily life such as at home or a health clinic, we have developed a network-type brain machine interface (BMI) system called “network BMI” to control real-world actuators like wheelchairs based on human intention measured by a portable brain measurement system. In this paper, we introduce the technologies for achieving the network BMI system to support activities of daily living.

  • Tardy Flow Scheduling in Data Center Networks

    Gyuyeong KIM  Wonjun LEE  

     
    LETTER-Information Network

      Pubricized:
    2016/05/25
      Vol:
    E99-D No:9
      Page(s):
    2400-2403

    Query response times are critical for cluster computing applications in data centers. In this letter, we argue that to optimize the network performance, we should consider the latency of the flows suffered loss, which are called tardy flows. We propose two tardy flow scheduling algorithms and show that our work offers significant performance gains through performance analysis and simulations.

  • The Constructions of Mismatched Filtering of Periodic Quadriphase Sequences with Even Length

    Xiuping PENG  Chengqian XU  Jiadong REN  Kai LIU  

     
    LETTER-Coding Theory

      Vol:
    E99-A No:9
      Page(s):
    1735-1739

    Quadriphase sequences with good correlation properties are required in higher order digital modulation schemes, e.g., for timing measurements, channel estimation or synchronization. In this letter, based on interleaving technique and pairs of mismatched binary sequences with perfect cross-correlation function (PCCF), two new methods for constructing quadriphase sequences with mismatched filtering which exist for even length N ≡ 2(mod4) are presented. The resultant perfect mismatched quadriphase sequences have high energy efficiencies. Compared with the existing methods, the new methods have flexible parameters and can give cyclically distinct perfect mismatched quadriphase sequences.

  • Multiple Multicast Transmission Exploiting Channel Simplification

    Changyong SHIN  Yong-Jai PARK  

     
    LETTER-Communication Theory and Signals

      Vol:
    E99-A No:9
      Page(s):
    1745-1749

    In this letter, we present a spectrally efficient multicast method which enables a transmitter to simultaneously transmit multiple multicast streams without any interference among multicast groups. By using unique combiners at receivers with multiple antennas within each multicast group, the proposed method simplifies multiple channels between the transmitter and the receivers to an equivalent channel. In addition, we establish the sufficient condition for the system configuration which should be satisfied for the channel simplification and provide a combiner design technique for the receivers. To remove interference among multicast groups, the precoder for the transmitter is designed by utilizing the equivalent channels. By exploiting time resources efficiently, the channel simplification (CS) based method achieves a higher sum rate than the time division multiplexing (TDM) based method, which the existing multicast techniques fundamentally employ, at high signal-to-noise ratio (SNR) regime. Furthermore, we present a multicast method combining the CS based method with the TDM based method to utilize the benefits of both methods. Simulation results successfully demonstrate that the combined multicast method obtains a better sum rate performance at overall SNR regime.

  • Fast Intra Mode Decision for Screen Contents Coding in HEVC

    Yong-Jo AHN  Xiangjian WU  Donggyu SIM  Woo-Jin HAN  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2016/05/25
      Vol:
    E99-D No:9
      Page(s):
    2410-2412

    In this letter, fast intra mode decision algorithms for HEVC Screen Contents Coding (SCC) are proposed. HEVC SCC has been developed to efficiently code mixed contents consisting of natural video, graphics, and texts. Comparing to HEVC version 1, the SCC encoding complexity significantly increases due to the newly added intra block copy mode. To reduce the heavy encoding complexity, the evaluation orders of multiple intra modes are rearranged and several early termination schemes based on intermediate coding information are developed. Based on our evaluation, it is found that the proposed method can achieve encoding time reduction of 13∼30% with marginal coding gain or loss, compared with HEVC SCC test model 2.0 in all intra (AI) case.

  • Blind Carrier Frequency Offset Estimation Based on Particle Swarm Optimization Searching for Interleaved OFDMA Uplink

    Ann-Chen CHANG  Chih-Chang SHEN  

     
    LETTER-Communication Theory and Signals

      Vol:
    E99-A No:9
      Page(s):
    1740-1744

    In this letter, standard particle swarm optimization (PSO) with the center-symmetric trimmed correlation matrix and the orthogonal projection technique is firstly presented for blind carrier frequency offset estimation under interleaved orthogonal frequency division multiple access (OFDMA) uplink systems. It doesn't require eigenvalue decomposition and only needs a single OFDMA data block. Second, this letter also presents adaptive multiple inertia weights with Newton method to speed up the convergence of standard PSO iteration process. Meanwhile, the advantage of inherent interleaved OFDMA signal structure also is exploited to conquer the problems of local optimization and the effect of ambiguous peaks for the proposed approaches. Finally, several simulation results are provided for illustration and comparison.

  • A Method for Evaluating Degradation Phenomenon of Electrical Contacts Using a Micro-Sliding Mechanism — Minimal Sliding Amplitudes against Input Waveforms —

    Shin-ichi WADA  Koichiro SAWA  

     
    PAPER

      Vol:
    E99-C No:9
      Page(s):
    999-1008

    Authors have studied degradation phenomenon on electrical contacts under the influences of an external micro-oscillation. A new micro-sliding mechanism 2 (MSM2) has developed, which provides micro-sliding driven by a piezo-electric actuator and elastic hinges. The experimental results are obtained on “minimal sliding amplitudes” to make resistances fluctuate on electrical contacts under some conditions which are three types of inputwaveform (sinusoidal, rectangular, and impulsive) and three levels of frictional force (1.6, 1.0, and 0.3 N/pin) by using the MSM2. The dynamical characteristics are discussed under the conditions. The simple theoretical model on the input signal and the output of the mechanism is built and the theoretical expressions from the model are obtained. A natural angular frequency (ω0=12600[s-1]) and a damping ratio (ζ=0.03[-]) are evaluated using experimental dynamical responses. The waveforms of inputs and outputs are obtained and the characteristics between inputs and outputs are also obtained on the theoretical model using the above. The maximal gain between the input and the output in rectangular or impulsive (24.4) is much larger than that (0.0) in sinusoidal. The difference on the output-accelerations between in sinusoidal and in rectangular (impulsive) is discussed. It is shown that it is possible to cause the degradation phenomenon in sinusoidal only when the output displacement are enlarged. It is also shown that it is possible to cause the phenomenon in rectangular or in impulsive, in addition to the above, when the external force has sharper rising and falling waveforms even if the displacement and the frequency of the force is small. The difference on the output-amplitudes between in rectangular and in impulsive is discussed. It is not clear that there is the difference between the effect in rectangular and that in impulsive. It is indicated that it is necessary to discuss the other causes, for instance, another dynamical, thermal, and chemical process.

  • FOREWORD

    Makoto NAKASHIZUKA  Seishi TAKAMURA  

     
    FOREWORD

      Vol:
    E99-A No:9
      Page(s):
    1645-1645
  • Energy-Based Tree Illustration System: ETIS

    Katsuto NAKAJIMA  Azusa MAMA  Yuki MORIMOTO  

     
    LETTER-Computer Graphics

      Pubricized:
    2016/05/25
      Vol:
    E99-D No:9
      Page(s):
    2417-2421

    We propose a system named ETIS (Energy-based Tree Illustration System) for automatically generating tree illustrations characteristic of two-dimensional ones with features such as exaggerated branch curves, leaves, and flowers. The growth behavior of the trees can be controlled by adjusting the energy. The canopy shape and the region to fill with leaves and flowers are also controlled by hand-drawn guide lines.

  • Self-Organization of Coverage of Densely Deployed WLANs Considering Outermost APs without Generating Coverage Holes

    Shotaro KAMIYA  Keita NAGASHIMA  Koji YAMAMOTO  Takayuki NISHIO  Masahiro MORIKURA  Tomoyuki SUGIHARA  

     
    PAPER

      Vol:
    E99-B No:9
      Page(s):
    1980-1988

    In densely deployed wireless local area network (WLAN) environments, the arbitrary deployment of WLAN access points (APs) can cause serious cell overlaps among APs. In such situations, the ability to realize adaptable coverage using transmission power control (TPC) is effective for improving the area spectral efficiency. Meanwhile, it should be guaranteed that no coverage holes occur and that connectivity between APs and wireless stations (STAs) is maintained. In this paper, the self-organization of coverage domains of APs using TPC is proposed. The proposed technique reduces the incidence of coverage overlaps without generating area coverage holes. To detect coverage holes, STAs and/or APs are used as sensors that inform each AP of whether or not the points at which they exist are covered by the APs. However, there is a problem with this approach in that when the density of STAs is not sufficiently large, the occurrence of area coverage holes is inevitable because the points at which the sensors do not exist are not guaranteed to be covered by APs. This paper overcomes the problem by focusing APs that belong to network's outer boundary (boundary APs) and prohibiting the APs from operating at low transmission power levels, the idea being that the coverage domains of such APs always include the region covered by only those APs. The boundary APs are determined by performing Delaunay triangulation of the set of points at which all APs exist. Simulation results confirm the effectiveness of the proposed TPC scheme in terms of its ability to reduce the total overlap area while avoiding the occurrence of area coverage holes.

  • 2PTS: A Two-Phase Task Scheduling Algorithm for MapReduce

    Byungnam LIM  Yeeun SHIM  Yon Dohn CHUNG  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2016/06/06
      Vol:
    E99-D No:9
      Page(s):
    2377-2380

    For an efficient processing of large data in a distributed system, Hadoop MapReduce performs task scheduling such that tasks are distributed with consideration of the data locality. The data locality, however, is limitedly exploited, since it is pursued one node at a time basis without considering the global optimality. In this paper, we propose a novel task scheduling algorithm that globally considers the data locality. Through experiments, we show our algorithm improves the performance of MapReduce in various situations.

  • Energy Efficient Macrocell Strategy: Opportunistic Beamforming with Femtocells Deployment Based on Hourly User Location Distribution

    Nur Ellina Binti ISHAK  Eiji KAMIOKA  

     
    PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1706-1717

    In the conventional cellular macrocell implementation strategy, the main base station transmits the radio signals in the omnidirectional manner in order to provide a wide range of cellular transmission to the users. In reality, however, the users move from one place to another depending on their activities, hence, sometimes this creates areas where no user exists inside the macrocell. Nevertheless, the base station continues to transmit the radio signals to all the coverage areas due to its involuntary manner, thus causing waste of energy. In our previous work, an energy efficient LTE macrocell base station scheme based on hourly user location distribution, which utilized opportunistic beamforming, was proposed in order to provide the cellular transmission only to the area where the user density is high. The drawback of this scheme was that there were many users who cannot receive the cellular transmission because of the limitation of the beamforming shape. In this paper, to overcome this difficulty, a new energy efficient macrocell strategy will be proposed. Here, additional low power consumption femtocell access points are deployed inside the macrocell to support the energy efficient opportunistic beamforming based on the hourly user location distribution. Concretely, the femtocell access points are woken up only when the active calling users exist inside its range. The proposed new strategy will be evaluated in terms of the hourly successful calling user ratio, the total power consumption and the hourly average downlink throughput compared with the previously proposed beamforming transmission strategy and the conventional omnidirectional transmission. The results will show the effectiveness of the proposed strategy in providing an energy efficient cellular macrocell system with high quality cellular services.

  • Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems

    Guangquan XU  Yuanyuan REN  Yuanbin HAN  Xiaohong LI  Zhiyong FENG  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2019-2026

    With the rapid development of Internet of things (IoT), Radio Frequency Identification (RFID) has become one of the most significant information technologies in the 21st century. However, more and more privacy threats and security flaws have been emerging in various vital RFID systems. Traditional RFID systems only focus attention on foundational implementation, which lacks privacy protection and effective identity authentication. To solve the privacy protection problem this paper proposes a privacy protection method with a Privacy Enhancement Model for RFID (PEM4RFID). PEM4RFID utilizes a “2+2” identity authentication mechanism, which includes a Two-Factor Authentication Protocol (TFAP) based on “two-way authentication”. Our TFAP employs “hardware information + AES-ECC encryption”, while the ”“two-way authentication” is based on improved Combined Public Key (CPK). Case study shows that our proposed PEM4RFID has characteristics of untraceability and nonrepeatability of instructions, which realizes a good trade-off between privacy and security in RFID systems.

  • Singular-Spectrum Analysis for Digital Audio Watermarking with Automatic Parameterization and Parameter Estimation Open Access

    Jessada KARNJANA  Masashi UNOKI  Pakinee AIMMANEE  Chai WUTIWIWATCHAI  

     
    PAPER-Information Network

      Pubricized:
    2016/05/16
      Vol:
    E99-D No:8
      Page(s):
    2109-2120

    This paper proposes a blind, inaudible, robust digital-audio watermarking scheme based on singular-spectrum analysis, which relates to watermarking techniques based on singular value decomposition. We decompose a host signal into its oscillatory components and modify amplitudes of some of those components with respect to a watermark bit and embedding rule. To improve the sound quality of a watermarked signal and still maintain robustness, differential evolution is introduced to find optimal parameters of the proposed scheme. Test results show that, although a trade-off between inaudibility and robustness still persists, the difference in sound quality between the original and the watermarked one is considerably smaller. This improved scheme is robust against many attacks, such as MP3 and MP4 compression, and band-pass filtering. However, there is a drawback, i.e., some music-dependent parameters need to be shared between embedding and extraction processes. To overcome this drawback, we propose a method for automatic parameter estimation. By incorporating the estimation method into the framework, those parameters need not to be shared, and the test results show that it can blindly decode watermark bits with an accuracy of 99.99%. This paper not only proposes a new technique and scheme but also discusses the singular value and its physical interpretation.

  • Necessary Conditions for θ-Stability of Real Polynomials

    Younseok CHOO  

     
    LETTER-Systems and Control

      Vol:
    E99-A No:8
      Page(s):
    1628-1631

    In this letter we present some easily checkable necessary conditions for a polynomial with positive coefficients to have all its zeros in a prescribed sector in the left half of the complex plane. As an auxiliary result, we also obtain a new necessary condition for the Hurwitz stability.

  • Virtual Edge Architecture with Optical Bandwidth Resource Control

    Akira MISAWA  Konomi MOCHIZUKI  Hideo TSUCHIYA  Masahiro NAKAGAWA  Kyota HATTORI  Masaru KATAYAMA  Jun-ichi KANI  

     
    PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1805-1812

    A virtual network edge using live migration of virtualized network functions (VNFs) can be expected to reduce computation time and save resources instead of conventional network edge routers that have complex functions. Wavelength-division-multiplexing/time-division-multiplexing (WDM/TDM) photonic switching technology for metro ring networks is proposed to provide fast bandwidth resource allocation for rapidly changing service-flow demand. However, there are no reports on the coexistence of high-speed path switching for live migration with fast bandwidth resource allocation, as far as we know. We propose an architecture that achieves both high-speed path switching and fast dynamic bandwidth allocation control for service flows with in-service live migration. The feature of this architecture is that the VNF for the virtual edge corresponds to each 10-gigabit Ethernet-passive optical network (10G-EPON) and fast route change can be achieved with a simple point-to-point path between VNFs and optical line terminals (OLTs). The second feature is that the live migration of a VNF is limited to a part of it that contains a larger number of subscribers. Owing to the reduction in the number of total paths, fast resource allocation can be provided.

  • Lattice Reduction-Aided Detection for Overloaded MIMO Using Slab Decoding

    Ryo HAYAKAWA  Kazunori HAYASHI  Megumi KANEKO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1697-1705

    In this paper, we propose an overloaded multiple-input multiple-output (MIMO) signal detection scheme with slab decoding and lattice reduction (LR). The proposed scheme firstly splits the transmitted signal vector into two parts, the post-voting vector composed of the same number of signal elements as that of receive antennas, and the pre-voting vector composed of the remaining elements. Secondly, it reduces the candidates of the pre-voting vector using slab decoding and determines the post-voting vectors for each pre-voting vector candidate by LR-aided minimum mean square error (MMSE)-successive interference cancellation (SIC) detection. From the performance analysis of the proposed scheme, we derive an upper bound of the error probability and show that it can achieve the full diversity order. Simulation results show that the proposed scheme can achieve almost the same performance as the optimal ML detection while reducing the required computational complexity.

  • Analysis of Information Floating with a Fixed Source of Information Considering Behavior Changes of Mobile Nodes

    Keisuke NAKANO  Kazuyuki MIYAKITA  

     
    PAPER

      Vol:
    E99-A No:8
      Page(s):
    1529-1538

    Information floating delivers information to mobile nodes in specific areas without meaningless spreading of information by permitting mobile nodes to directly transfer information to other nodes by wireless links in designated areas called transmittable areas. In this paper, we assume that mobile nodes change direction at intersections after receiving such information as warnings and local advertisements and that an information source remains in some place away from the transmittable area and continuously broadcasts information. We analyze performance of information floating under these assumptions to explore effects of the behavior changes of mobile nodes, decision deadline of the behavior change, and existence of a fixed source on information floating. We theoretically analyze the probability that a node cannot receive information and also derive the size of each transmittable area so that this probability is close to desired values.

7221-7240hit(42807hit)