Yuzo TAENAKA Kazuya TSUKAMOTO Shigeru KASHIHARA Suguru YAMAGUCHI Yuji OIE
In order to prevent the degradation of TCP performance while traversing two WLANs, we present an implementation design of an inter-domain TCP handover method based on cross-layer and multi-homing. The proposed handover manager (HM) in the transport layer uses two TCP connections previously established via two WLANs (multi-homing) and switches the communication path between the two connections according to the handover trigger and the comparison of new/old APs. The handover trigger and comparison are conducted by assessing the wireless link quality using the frame-retry information obtained from the MAC layer (cross-layer). In a previous study, we proposed a preliminary concept for this method and evaluated its functional effectiveness through simulations. In the present study, we design an implementation considering a real system and then examine the effective performance in a real environment because a real system has several system constraints and suffers from fluctuations in an actual wireless environment. Indeed, depending on the cross-layer design, the implementation often degrades the system performance even if the method exhibits good functional performance. Moreover, the simple assessments of wireless link quality in the previous study indicated unnecessary handovers and inappropriate AP selection in a real environment. Therefore, we herein propose a new architecture that performs cross-layer collaboration between the MAC layer and the transport layer while avoiding degradation of system performance. In addition, we use a new assessment scheme of wireless link quality, i.e., double thresholds of frame retry and comparison of frame retry ratio, in order to prevent handover oscillation caused by fluctuations in the wireless environment. The experimental results demonstrate that the prototype system works well by controlling two TCP connections based on assessments of wireless link quality thereby achieving efficient inter-domain TCP handover in a real WLAN environment.
Daesung JUNG Youngjun YOO Yujin JANG Sangchul WON
We propose a motor speed ripple elimination method using a state dependent disturbance observer (SDDOB). The SDDOB eliminates the state dependent disturbance in the system regardless of the operation frequency, input time delay and output time delay. The SDDOB and a main proportional integral (PI) controller constitute a robust motor speed controller. Experimental results show the effectiveness of the proposed method.
Tingting ZHANG Qinyu ZHANG Hongguang XU Hong ZHANG Bo ZHOU
Practical, low complexity time of arrival (TOA) estimation method with high accuracy are attractive in ultra wideband (UWB) ranging and localization. In this paper, a generalized maximum likelihood energy detection (GML-ED) ranging method is proposed and implemented. It offers low complexity and can be applied in various environments. An error model is first introduced for TOA accuracy evaluation, by which the optimal integration interval can be determined. Aiming to suppress the significant error created by the false alarm events, multiple pulses are utilized for accuracy promotion at the cost of extra energy consumption. For this reason, an energy efficiency model is also proposed based on the transmitted pulse number. The performance of the analytical research is evaluated and verified through practical experiments in a typical indoor environment.
Proxy Mobile IPv6 (PMIPv6) is a network-based localized mobility management protocol that is independent of global mobility management protocols. In a single local mobility domain, the mobile node (MN) is not involved in any IP mobility-related signaling, but when the MN moves into another local mobility domain, the MN must change its PMIPv6 home address. In this case, host-based mobility signaling is activated, and PMIPv6's network-based mobility cannot be retained. Additionally, if the MN does not support global mobility, it cannot maintain its communication sessions with its correspondent node. In this paper, we propose a solution for network-based global mobility support in PMIPv6 networks, which allows the MN to maintain active communication sessions without mobility protocol stacks when the MN moves into another local mobility domain. In the proposed mechanism, the MN remains unaware of its movement when it moves to another local mobility domain, and it is forced to use only its MIPv6 home address for all its communication. Thus, the MN is not involved in any IP mobility-related signaling, despite its movement. The proposed protocol provides for global mobility while retaining the advantages of the network-based localized mobility in the Proxy Mobile IPv6 protocol. In this paper, we propose a solution for global mobility support in PMIPv6 networks by which the MAG (Mobile Access Gateway) can maintain the MN's communication sessions during inter-domain handover. In the proposed mechanism, the MN remains unaware of its movement when it moves to another local mobility domain, and it is forced to use only its MIPv6 home address for all its communication. Thus, the MN is not involved in any IP mobility-related signaling, despite its movement. We evaluate and compare network performance between our proposed solution and PMIPv6 and the main host-based mobility protocol. We evaluate and compare handover delays, and packet loss cost of the two protocols.
Akihiro FUJIMOTO Yusuke HIROTA Hideki TODE Koso MURAKAMI
To establish seamless and highly robust content distribution, we proposed the new concept of Inter-Stream Forward Error Correction (FEC), an efficient data recovery method leveraging several video streams. Our previous research showed that Inter-Stream FEC had significant recovery capability compared with the conventional FEC method under ideal modeling conditions and assumptions. In this paper, we design the Inter-Stream FEC architecture in detail with a view to practical application. The functional requirements for practical feasibility are investigated, such as simplicity and flexibility. Further, the investigation clarifies a challenging problem: the increase in processing delay created by the asynchronous arrival of packets. To solve this problem, we propose a pragmatic parity stream construction method. We implement and evaluate experimentally a prototype system with Inter-Stream FEC. The results demonstrate that the proposed system could achieve high recovery performance in our experimental environment.
Wittawat JITKRITTUM Hirotaka HACHIYA Masashi SUGIYAMA
Feature selection is a technique to screen out less important features. Many existing supervised feature selection algorithms use redundancy and relevancy as the main criteria to select features. However, feature interaction, potentially a key characteristic in real-world problems, has not received much attention. As an attempt to take feature interaction into account, we propose
Motoharu SASAKI Wataru YAMADA Naoki KITA Takatoshi SUGIYAMA
A new path loss model of interference between mobile terminals in a residential area is proposed. The model uses invertible formulas and considers the effects on path loss characteristics produced by paths having many corners or corners with various angles. Angular profile and height pattern measurements clarify three paths that are dominant in terms of their effect on the accurate modeling of path loss characteristics in residential areas: paths along a road, paths between houses, and over-roof propagation paths. Measurements taken in a residential area to verify the model's validity show that the model is able to predict path loss with greater accuracy than conventional models.
Junjun YIN Jian YANG Chunhua XIE Qingjun ZHANG Yan LI Yalin QI
The optimization of polarimetric contract enhancement (OPCE) is one of the important problems in radar polarimetry since it provides a substantial benefit for target enhancement. Considering different scattering mechanisms between the desired targets and the undesired targets, Yang et al. extended the OPCE model to the generalized OPCE (GOPCE) problem. Based on a modified GOPCE model and the linear discriminant analysis, a ship detector is proposed in this paper to improve the detection performance for polarimetric Synthetic Aperture Radar (SAR) imagery. In the proposed method, we modify the combination form of the three polarimetric parameters (i.e., the plane scattering similarity parameter, the diplane scattering similarity parameter and the Cloude entropy), then use an optimization function resembling the classical Fisher criterion to optimize the optimal polarization states corresponding to the radar received power and the fusion vector corresponding to the polarimetric parameters. The principle of the optimization detailed in this paper lies in maximizing the difference between the desired targets and sea clutter, and minimizing the clutter variance at the same time. RADARSAT-2 polarimetric SAR data acquired over Tanggu Port (Tianjin, China) on June 23, 2011 are used for validation. The experimental results show that the proposed method improves the contrast of the targets and sea clutter and meanwhile reduces the clutter variance. In comparison to another GOPCE based ship detector and the classical polarimetric whitening filter (PWF), the proposed method shows a better performance for weak targets. In addition, we also use the RADARSAT-2 data acquired over San-Francisco on April 9, 2008 to further demonstrate the improvement of this method for target contrast.
In this letter, we present a fast image/video super resolution framework using edge and nonlocal constraint. The proposed method has three steps. First, we improve the initial estimation using content-adaptive bilateral filtering to strengthen edge. Second, the high resolution image is estimated by using classical back projection method. Third, we use joint content-adaptive nonlocal means filtering to get the final result, and self-similarity structures are obtained by the low resolution image. Furthermore, content-adaptive filtering and fast self-similarity search strategy can effectively reduce computation complexity. The experimental results show the proposed method has good performance with low complexity and can be used for real-time environment.
Naoki HONMA Kentaro NISHIMORI Takefumi HIRAGURI Yoshitaka TSUNEKAWA
Parasitic antenna elements with tunable terminations can be used for interference suppression in multi-antenna systems without using the degrees of freedom. The authors have proposed a fast non-iterative algorithm for optimizing the termination conditions. However, this method cannot be used for suppressing the interference from unknown systems since it requires the channel state information. In this paper, a fast non-iterative algorithm based on the correlation matrix, which can be obtained even from unknown interference sources, is proposed for the multi-antenna system with parasitic antenna elements. The correlation matrix including both receiving and parasitic antennas can be estimated from a few observations of the signals even without receiving signals at the parasitic antenna. By using this correlation matrix, the power of the interference with the arbitrary termination conditions can be easily estimated. Therefore, the termination condition, which minimizes the interference power, can be calculated without knowledge of the channel state information or additional estimations. The results of a numerical analysis indicate that proposed method works well in suppressing the interference without the perfect channel state information.
In this letter, we present a low-complexity residual symbol timing offset (STO) estimation scheme in a long term evolution (LTE) downlink system. The proposed scheme is designed to estimate STO without a priori knowledge of cell-specific reference signals, which reduces the arithmetic complexity while maintaining a similar performance to the conventional algorithm.
Jianwen XIANG Fumio MACHIDA Kumiko TADANO Yoshiharu MAENO Kazuo YANOO
Traditional imperfect fault coverage models only consider the coverage (including identification and isolation) of faulty components, and they do not consider the coverage of irrelevant (operational) components. One potential reason for the omission is that in these models the system is generally assumed to be coherent in which each component is initially relevant. In this paper, we first point out that an initially relevant component could become irrelevant afterwards due to the failures of some other components, and thus it is important to consider the handling of irrelevancy even the system is originally coherent. We propose an irrelevancy coverage model (IRCM) in which the coverage is extended to the irrelevant components in addition to the faulty components. The IRCM can not only significantly enhance system reliability by preventing the future system failures resulting from the not-covered failures of the irrelevant components, but may also play an important role in efficient energy use in practice by timely turning off the irrelevant components.
We study the use of network coding to speed up content distribution in peer-to-peer (P2P) networks. Our goal is to get the underlying reason for network coding's improved performance in P2P content distribution and to optimize resource consumption of network coding. We observe analytically and experimentally that in pure P2P networks, a considerable amount of data is sent multiple times from one peer to another when there are multiple paths connecting those two particular peers. Network coding, on the other hand, when applied at upstream peers, eliminates information duplication on paths to downstream peers, which results in more efficient content distribution. Based on that insight, we propose a network coder placement algorithm which achieves comparable distribution time as network coding, yet substantially reduces the number of encoders compared to a pure network coding solution in which all peers have to encode. Our placement method puts encoders at critical network positions to eliminate information duplication the most, thus, effectively shortens distribution time with just a portion of encoders.
Nowadays, many interface devices or training systems have been developed with recent developments in IT technology, but only a few training systems for developmentally disabled people have been introduced. In this paper, we present a real-time, interactional and situational training system based on augmented reality in order to improve cognitive capability and adaptive ability in the daily lives of developmentally disabled people. Our system is specifically based on serving food in restaurants. It allows disabled people wearing the HMD attached with camera to conduct the training to cope with a series of situations safely while serving customers food and drinks and take the training session as much as they want. After experimenting on our presented system for 3 months, we found that they actively participated in the training and their cognitive abilities increasingly went faster through repeated training, resulting in the improvement in their cognitive ability and their ability to deal with situations.
Jin MITSUGI Shigeru YONEMURA Takehiro YOKOISHI
This paper proposes a device discovery method for consolidated IP and ZigBee home networks. The method broadcasts an IP multicasted device discovery request of UPnP, m-search, in the ZigBee network as a Constrained Application Protocol (CoAP) message. Upon receiving the m-search broadcast, ZigBee devices respond after a constant time delay with their device description Universal Resource Name (URN). We refer to this device discovery mechanism as transparent msearch. Transparent m-search enables reliable and swift device discovery in home networks which may include constrained networks such as ZigBee. It is revealed by an experiment with 41 ZigBee devices that the delayed response from ZigBee devices is essential to avoid collisions between m-search broadcast and responses from devices and, as a result, to secure the reliability of device discovery. Since the transparent m-search requires the receiving ZigBee devices to respond with their device description URNs, the execution time of device discovery is significantly improved. In our experiment with 41 ZigBee devices, a conventional m-search took 38.1 second to complete device discovery while that of transparent m-search took only 6.3 second.
Yuhua SUN Tongjiang YAN Hui LI
Binary sequences with good autocorrelation and large linear complexity have found many applications in communication systems. A construction of almost difference sets was given by Cai and Ding in 2009. Many classes of binary sequences with three-level autocorrelation could be obtained by this construction and the linear complexity of two classes of binary sequences from the construction have been determined by Wang in 2010. Inspired by the analysis of Wang, we deternime the linear complexity and the minimal polynomials of another class of binary sequences, i.e., the class based on the WG difference set, from the construction by Cai and Ding. Furthermore, a generalized version of the construction by Cai and Ding is also presented.
Single-packet attack can be tracked with logging-based IP traceback approaches, whereas DDoS attack can be tracked with marking-based approaches. However, both approaches have their limits. Logging-based approaches incur heavy overhead for packet-digest storage as well as time overhead for both path recording and recovery. Marking-based approaches incur little traceback overhead but are unable to track single packets. Simply deploying both approaches in the same network to deal with single-packet and DDoS attacks is not an efficient solution due to the heavy traceback overhead. Recent studies suggest that hybrid approaches are more efficient as they consume less router memory to store packet digests and require fewer attack packets to recover attack paths. Thus, the hybrid single packet traceback approach is more promising in efficiently tracking both single-packet and DDoS attacks. The major challenge lies in reducing storage and time overhead while maintaining single-packet traceback capability. We present in this paper a new hybrid approach to efficiently track single-packet attacks by designing a novel path fragment encoding scheme using the orthogonality of Walsh matrix and the degree distribution characteristic of router-level topologies. Compared to HIT (Hybrid IP Traceback), which, to the best of our knowledge, is the most efficient hybrid approach for single-packet traceback, our approach has three advantages. First, it reduces the overhead by 2/3 in both storage and time for recording packet paths. Second, the time overhead for recovering packet paths is also reduced by a calculatable amount. Finally, our approach generates no more than 2/3 of the false-positive paths generated by HIT.
Kiichi TATEISHI Kenichi HIGUCHI
This paper presents an adaptive amplify-and-forward (AF)-type relay method appropriate for the cellular downlink. The proposed method adaptively selects active relay stations (RSs) based on the path loss between each set of user equipment (UE) and the base station (BS) and that between each RS in order to avoid unnecessary enhancement of inter-cell interference and bandwidth reduction due to transmission relay. Furthermore, to enhance the spectrum efficiency under relay transmission, the frequency used for the relay transmission from the RS to the cell-edge user is reused for the direct transmission from the BS to the cell-center user. Based on computer simulations, the system-level average throughput and cell-edge user throughput of the proposed method are compared to those for cases using no relaying or a conventional repeater. The simulation results show the effectiveness of the proposed method.
Bo GU Kyoko YAMORI Sugang XU Yoshiaki TANAKA
This paper focuses on learning the economic behaviour of the access point (AP) and users in wireless local area networks (WLANs), and using a game theoretic approach to analyze the interactions among them. Recent studies have shown that the AP would adopt a simple, yet optimal, fixed rate pricing strategy when the AP has an unlimited uplink bandwidth to the Internet and the channel capacity of WLAN is unlimited. However, the fixed rate strategy fails to be optimal if a more realistic model with limited capacity is considered. A substitute pricing scheme for access service provisioning is hence proposed. In particular, the AP first estimates the probable utility degradation of existing users consequent upon the admission of an incoming user. Second, the AP decides: (i) whether the incoming user should be accepted; and (ii) the price to be announced in order to try to maximize the overall revenue. The condition, under which the proposed scheme results in a perfect Bayesian equilibrium (PBE), is investigated.