The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

11101-11120hit(42807hit)

  • An Implementation Design of a WLAN Handover Method Based on Cross-Layer Collaboration for TCP Communication

    Yuzo TAENAKA  Kazuya TSUKAMOTO  Shigeru KASHIHARA  Suguru YAMAGUCHI  Yuji OIE  

     
    PAPER

      Vol:
    E96-B No:7
      Page(s):
    1716-1726

    In order to prevent the degradation of TCP performance while traversing two WLANs, we present an implementation design of an inter-domain TCP handover method based on cross-layer and multi-homing. The proposed handover manager (HM) in the transport layer uses two TCP connections previously established via two WLANs (multi-homing) and switches the communication path between the two connections according to the handover trigger and the comparison of new/old APs. The handover trigger and comparison are conducted by assessing the wireless link quality using the frame-retry information obtained from the MAC layer (cross-layer). In a previous study, we proposed a preliminary concept for this method and evaluated its functional effectiveness through simulations. In the present study, we design an implementation considering a real system and then examine the effective performance in a real environment because a real system has several system constraints and suffers from fluctuations in an actual wireless environment. Indeed, depending on the cross-layer design, the implementation often degrades the system performance even if the method exhibits good functional performance. Moreover, the simple assessments of wireless link quality in the previous study indicated unnecessary handovers and inappropriate AP selection in a real environment. Therefore, we herein propose a new architecture that performs cross-layer collaboration between the MAC layer and the transport layer while avoiding degradation of system performance. In addition, we use a new assessment scheme of wireless link quality, i.e., double thresholds of frame retry and comparison of frame retry ratio, in order to prevent handover oscillation caused by fluctuations in the wireless environment. The experimental results demonstrate that the prototype system works well by controlling two TCP connections based on assessments of wireless link quality thereby achieving efficient inter-domain TCP handover in a real WLAN environment.

  • Motor Speed Ripple Elimination Using State Dependent Disturbance Observer in Various Time Delay Environments

    Daesung JUNG  Youngjun YOO  Yujin JANG  Sangchul WON  

     
    PAPER-Systems and Control

      Vol:
    E96-A No:7
      Page(s):
    1562-1570

    We propose a motor speed ripple elimination method using a state dependent disturbance observer (SDDOB). The SDDOB eliminates the state dependent disturbance in the system regardless of the operation frequency, input time delay and output time delay. The SDDOB and a main proportional integral (PI) controller constitute a robust motor speed controller. Experimental results show the effectiveness of the proposed method.

  • Research and Implementation of a Practical Ranging Method Using IR-UWB Signals

    Tingting ZHANG  Qinyu ZHANG  Hongguang XU  Hong ZHANG  Bo ZHOU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:7
      Page(s):
    1976-1985

    Practical, low complexity time of arrival (TOA) estimation method with high accuracy are attractive in ultra wideband (UWB) ranging and localization. In this paper, a generalized maximum likelihood energy detection (GML-ED) ranging method is proposed and implemented. It offers low complexity and can be applied in various environments. An error model is first introduced for TOA accuracy evaluation, by which the optimal integration interval can be determined. Aiming to suppress the significant error created by the false alarm events, multiple pulses are utilized for accuracy promotion at the cost of extra energy consumption. For this reason, an energy efficiency model is also proposed based on the transmitted pulse number. The performance of the analytical research is evaluated and verified through practical experiments in a typical indoor environment.

  • Performance Evaluation of Network-Based Global Mobility Management Protocol in Proxy Mobile IPv6

    Van Hanh NGUYEN  Soonghwan RO  

     
    PAPER-Internet

      Vol:
    E96-B No:7
      Page(s):
    1886-1895

    Proxy Mobile IPv6 (PMIPv6) is a network-based localized mobility management protocol that is independent of global mobility management protocols. In a single local mobility domain, the mobile node (MN) is not involved in any IP mobility-related signaling, but when the MN moves into another local mobility domain, the MN must change its PMIPv6 home address. In this case, host-based mobility signaling is activated, and PMIPv6's network-based mobility cannot be retained. Additionally, if the MN does not support global mobility, it cannot maintain its communication sessions with its correspondent node. In this paper, we propose a solution for network-based global mobility support in PMIPv6 networks, which allows the MN to maintain active communication sessions without mobility protocol stacks when the MN moves into another local mobility domain. In the proposed mechanism, the MN remains unaware of its movement when it moves to another local mobility domain, and it is forced to use only its MIPv6 home address for all its communication. Thus, the MN is not involved in any IP mobility-related signaling, despite its movement. The proposed protocol provides for global mobility while retaining the advantages of the network-based localized mobility in the Proxy Mobile IPv6 protocol. In this paper, we propose a solution for global mobility support in PMIPv6 networks by which the MAG (Mobile Access Gateway) can maintain the MN's communication sessions during inter-domain handover. In the proposed mechanism, the MN remains unaware of its movement when it moves to another local mobility domain, and it is forced to use only its MIPv6 home address for all its communication. Thus, the MN is not involved in any IP mobility-related signaling, despite its movement. We evaluate and compare network performance between our proposed solution and PMIPv6 and the main host-based mobility protocol. We evaluate and compare handover delays, and packet loss cost of the two protocols.

  • Design and Prototyping of Error Resilient Multi-Server Video Streaming System with Inter-Stream FEC

    Akihiro FUJIMOTO  Yusuke HIROTA  Hideki TODE  Koso MURAKAMI  

     
    PAPER-Network

      Vol:
    E96-B No:7
      Page(s):
    1826-1836

    To establish seamless and highly robust content distribution, we proposed the new concept of Inter-Stream Forward Error Correction (FEC), an efficient data recovery method leveraging several video streams. Our previous research showed that Inter-Stream FEC had significant recovery capability compared with the conventional FEC method under ideal modeling conditions and assumptions. In this paper, we design the Inter-Stream FEC architecture in detail with a view to practical application. The functional requirements for practical feasibility are investigated, such as simplicity and flexibility. Further, the investigation clarifies a challenging problem: the increase in processing delay created by the asynchronous arrival of packets. To solve this problem, we propose a pragmatic parity stream construction method. We implement and evaluate experimentally a prototype system with Inter-Stream FEC. The results demonstrate that the proposed system could achieve high recovery performance in our experimental environment.

  • Feature Selection via 1-Penalized Squared-Loss Mutual Information

    Wittawat JITKRITTUM  Hirotaka HACHIYA  Masashi SUGIYAMA  

     
    PAPER-Pattern Recognition

      Vol:
    E96-D No:7
      Page(s):
    1513-1524

    Feature selection is a technique to screen out less important features. Many existing supervised feature selection algorithms use redundancy and relevancy as the main criteria to select features. However, feature interaction, potentially a key characteristic in real-world problems, has not received much attention. As an attempt to take feature interaction into account, we propose 1-LSMI, an 1-regularization based algorithm that maximizes a squared-loss variant of mutual information between selected features and outputs. Numerical results show that 1-LSMI performs well in handling redundancy, detecting non-linear dependency, and considering feature interaction.

  • Path Loss Model with Low Antenna Height for Microwave Bands in Residential Areas Open Access

    Motoharu SASAKI  Wataru YAMADA  Naoki KITA  Takatoshi SUGIYAMA  

     
    PAPER-Antennas and Propagation

      Vol:
    E96-B No:7
      Page(s):
    1930-1944

    A new path loss model of interference between mobile terminals in a residential area is proposed. The model uses invertible formulas and considers the effects on path loss characteristics produced by paths having many corners or corners with various angles. Angular profile and height pattern measurements clarify three paths that are dominant in terms of their effect on the accurate modeling of path loss characteristics in residential areas: paths along a road, paths between houses, and over-roof propagation paths. Measurements taken in a residential area to verify the model's validity show that the model is able to predict path loss with greater accuracy than conventional models.

  • An Improved Generalized Optimization of Polarimetric Contrast Enhancement and Its Application to Ship Detection

    Junjun YIN  Jian YANG  Chunhua XIE  Qingjun ZHANG  Yan LI  Yalin QI  

     
    PAPER-Sensing

      Vol:
    E96-B No:7
      Page(s):
    2005-2013

    The optimization of polarimetric contract enhancement (OPCE) is one of the important problems in radar polarimetry since it provides a substantial benefit for target enhancement. Considering different scattering mechanisms between the desired targets and the undesired targets, Yang et al. extended the OPCE model to the generalized OPCE (GOPCE) problem. Based on a modified GOPCE model and the linear discriminant analysis, a ship detector is proposed in this paper to improve the detection performance for polarimetric Synthetic Aperture Radar (SAR) imagery. In the proposed method, we modify the combination form of the three polarimetric parameters (i.e., the plane scattering similarity parameter, the diplane scattering similarity parameter and the Cloude entropy), then use an optimization function resembling the classical Fisher criterion to optimize the optimal polarization states corresponding to the radar received power and the fusion vector corresponding to the polarimetric parameters. The principle of the optimization detailed in this paper lies in maximizing the difference between the desired targets and sea clutter, and minimizing the clutter variance at the same time. RADARSAT-2 polarimetric SAR data acquired over Tanggu Port (Tianjin, China) on June 23, 2011 are used for validation. The experimental results show that the proposed method improves the contrast of the targets and sea clutter and meanwhile reduces the clutter variance. In comparison to another GOPCE based ship detector and the classical polarimetric whitening filter (PWF), the proposed method shows a better performance for weak targets. In addition, we also use the RADARSAT-2 data acquired over San-Francisco on April 9, 2008 to further demonstrate the improvement of this method for target contrast.

  • Low Complexity Image/Video Super Resolution Using Edge and Nonlocal Self-Similarity Constraint

    Zongliang GAN  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E96-D No:7
      Page(s):
    1569-1572

    In this letter, we present a fast image/video super resolution framework using edge and nonlocal constraint. The proposed method has three steps. First, we improve the initial estimation using content-adaptive bilateral filtering to strengthen edge. Second, the high resolution image is estimated by using classical back projection method. Third, we use joint content-adaptive nonlocal means filtering to get the final result, and self-similarity structures are obtained by the low resolution image. Furthermore, content-adaptive filtering and fast self-similarity search strategy can effectively reduce computation complexity. The experimental results show the proposed method has good performance with low complexity and can be used for real-time environment.

  • Non-iterative Algorithm of MIMO Adaptive Array Based on Correlation Matrix Including Parasitic Antennas

    Naoki HONMA  Kentaro NISHIMORI  Takefumi HIRAGURI  Yoshitaka TSUNEKAWA  

     
    PAPER-Antennas and Propagation

      Vol:
    E96-B No:7
      Page(s):
    1945-1952

    Parasitic antenna elements with tunable terminations can be used for interference suppression in multi-antenna systems without using the degrees of freedom. The authors have proposed a fast non-iterative algorithm for optimizing the termination conditions. However, this method cannot be used for suppressing the interference from unknown systems since it requires the channel state information. In this paper, a fast non-iterative algorithm based on the correlation matrix, which can be obtained even from unknown interference sources, is proposed for the multi-antenna system with parasitic antenna elements. The correlation matrix including both receiving and parasitic antennas can be estimated from a few observations of the signals even without receiving signals at the parasitic antenna. By using this correlation matrix, the power of the interference with the arbitrary termination conditions can be easily estimated. Therefore, the termination condition, which minimizes the interference power, can be calculated without knowledge of the channel state information or additional estimations. The results of a numerical analysis indicate that proposed method works well in suppressing the interference without the perfect channel state information.

  • Low-Complexity Residual Symbol Timing Offset Estimation Scheme in LTE Downlink System

    Won-Jae SHIN  Young-Hwan YOU  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E96-A No:7
      Page(s):
    1678-1680

    In this letter, we present a low-complexity residual symbol timing offset (STO) estimation scheme in a long term evolution (LTE) downlink system. The proposed scheme is designed to estimate STO without a priori knowledge of cell-specific reference signals, which reduces the arithmetic complexity while maintaining a similar performance to the conventional algorithm.

  • Coverage of Irrelevant Components in Systems with Imperfect Fault Coverage

    Jianwen XIANG  Fumio MACHIDA  Kumiko TADANO  Yoshiharu MAENO  Kazuo YANOO  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Vol:
    E96-A No:7
      Page(s):
    1649-1652

    Traditional imperfect fault coverage models only consider the coverage (including identification and isolation) of faulty components, and they do not consider the coverage of irrelevant (operational) components. One potential reason for the omission is that in these models the system is generally assumed to be coherent in which each component is initially relevant. In this paper, we first point out that an initially relevant component could become irrelevant afterwards due to the failures of some other components, and thus it is important to consider the handling of irrelevancy even the system is originally coherent. We propose an irrelevancy coverage model (IRCM) in which the coverage is extended to the irrelevant components in addition to the faulty components. The IRCM can not only significantly enhance system reliability by preventing the future system failures resulting from the not-covered failures of the irrelevant components, but may also play an important role in efficient energy use in practice by timely turning off the irrelevant components.

  • Network Coder Placement for Peer-to-Peer Content Distribution

    Dinh NGUYEN  Hidenori NAKAZATO  

     
    PAPER

      Vol:
    E96-B No:7
      Page(s):
    1661-1669

    We study the use of network coding to speed up content distribution in peer-to-peer (P2P) networks. Our goal is to get the underlying reason for network coding's improved performance in P2P content distribution and to optimize resource consumption of network coding. We observe analytically and experimentally that in pure P2P networks, a considerable amount of data is sent multiple times from one peer to another when there are multiple paths connecting those two particular peers. Network coding, on the other hand, when applied at upstream peers, eliminates information duplication on paths to downstream peers, which results in more efficient content distribution. Based on that insight, we propose a network coder placement algorithm which achieves comparable distribution time as network coding, yet substantially reduces the number of encoders compared to a pure network coding solution in which all peers have to encode. Our placement method puts encoders at critical network positions to eliminate information duplication the most, thus, effectively shortens distribution time with just a portion of encoders.

  • A Situational Training System for Developmentally Disabled People Based on Augmented Reality

    Tae-Young KIM  

     
    LETTER-Educational Technology

      Vol:
    E96-D No:7
      Page(s):
    1561-1564

    Nowadays, many interface devices or training systems have been developed with recent developments in IT technology, but only a few training systems for developmentally disabled people have been introduced. In this paper, we present a real-time, interactional and situational training system based on augmented reality in order to improve cognitive capability and adaptive ability in the daily lives of developmentally disabled people. Our system is specifically based on serving food in restaurants. It allows disabled people wearing the HMD attached with camera to conduct the training to cope with a series of situations safely while serving customers food and drinks and take the training session as much as they want. After experimenting on our presented system for 3 months, we found that they actively participated in the training and their cognitive abilities increasingly went faster through repeated training, resulting in the improvement in their cognitive ability and their ability to deal with situations.

  • FOREWORD Open Access

    Takeo SHIMIZU  

     
    FOREWORD

      Vol:
    E96-C No:7
      Page(s):
    949-949
  • Reliable and Swift Device Discovery in Consolidated IP and ZigBee Home Networks

    Jin MITSUGI  Shigeru YONEMURA  Takehiro YOKOISHI  

     
    PAPER-Network

      Vol:
    E96-B No:7
      Page(s):
    1837-1844

    This paper proposes a device discovery method for consolidated IP and ZigBee home networks. The method broadcasts an IP multicasted device discovery request of UPnP, m-search, in the ZigBee network as a Constrained Application Protocol (CoAP) message. Upon receiving the m-search broadcast, ZigBee devices respond after a constant time delay with their device description Universal Resource Name (URN). We refer to this device discovery mechanism as transparent msearch. Transparent m-search enables reliable and swift device discovery in home networks which may include constrained networks such as ZigBee. It is revealed by an experiment with 41 ZigBee devices that the delayed response from ZigBee devices is essential to avoid collisions between m-search broadcast and responses from devices and, as a result, to secure the reliability of device discovery. Since the transparent m-search requires the receiving ZigBee devices to respond with their device description URNs, the execution time of device discovery is significantly improved. In our experiment with 41 ZigBee devices, a conventional m-search took 38.1 second to complete device discovery while that of transparent m-search took only 6.3 second.

  • The Linear Complexity of a Class of Binary Sequences with Three-Level Autocorrelation

    Yuhua SUN  Tongjiang YAN  Hui LI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E96-A No:7
      Page(s):
    1586-1592

    Binary sequences with good autocorrelation and large linear complexity have found many applications in communication systems. A construction of almost difference sets was given by Cai and Ding in 2009. Many classes of binary sequences with three-level autocorrelation could be obtained by this construction and the linear complexity of two classes of binary sequences from the construction have been determined by Wang in 2010. Inspired by the analysis of Wang, we deternime the linear complexity and the minimal polynomials of another class of binary sequences, i.e., the class based on the WG difference set, from the construction by Cai and Ding. Furthermore, a generalized version of the construction by Cai and Ding is also presented.

  • WHIT: A More Efficient Hybrid Method for Single-Packet IP Traceback Using Walsh Matrix and Router Degree Distribution

    Yulong WANG  Ji REN  

     
    PAPER-Internet

      Vol:
    E96-B No:7
      Page(s):
    1896-1907

    Single-packet attack can be tracked with logging-based IP traceback approaches, whereas DDoS attack can be tracked with marking-based approaches. However, both approaches have their limits. Logging-based approaches incur heavy overhead for packet-digest storage as well as time overhead for both path recording and recovery. Marking-based approaches incur little traceback overhead but are unable to track single packets. Simply deploying both approaches in the same network to deal with single-packet and DDoS attacks is not an efficient solution due to the heavy traceback overhead. Recent studies suggest that hybrid approaches are more efficient as they consume less router memory to store packet digests and require fewer attack packets to recover attack paths. Thus, the hybrid single packet traceback approach is more promising in efficiently tracking both single-packet and DDoS attacks. The major challenge lies in reducing storage and time overhead while maintaining single-packet traceback capability. We present in this paper a new hybrid approach to efficiently track single-packet attacks by designing a novel path fragment encoding scheme using the orthogonality of Walsh matrix and the degree distribution characteristic of router-level topologies. Compared to HIT (Hybrid IP Traceback), which, to the best of our knowledge, is the most efficient hybrid approach for single-packet traceback, our approach has three advantages. First, it reduces the overhead by 2/3 in both storage and time for recording packet paths. Second, the time overhead for recovering packet paths is also reduced by a calculatable amount. Finally, our approach generates no more than 2/3 of the false-positive paths generated by HIT.

  • Adaptive Amplify-and-Forward Relaying for Cellular Downlink

    Kiichi TATEISHI  Kenichi HIGUCHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:7
      Page(s):
    1968-1975

    This paper presents an adaptive amplify-and-forward (AF)-type relay method appropriate for the cellular downlink. The proposed method adaptively selects active relay stations (RSs) based on the path loss between each set of user equipment (UE) and the base station (BS) and that between each RS in order to avoid unnecessary enhancement of inter-cell interference and bandwidth reduction due to transmission relay. Furthermore, to enhance the spectrum efficiency under relay transmission, the frequency used for the relay transmission from the RS to the cell-edge user is reused for the direct transmission from the BS to the cell-center user. Based on computer simulations, the system-level average throughput and cell-edge user throughput of the proposed method are compared to those for cases using no relaying or a conventional repeater. The simulation results show the effectiveness of the proposed method.

  • Multi-Stage Non-cooperative Game for Pricing and Connection Admission Control in Wireless Local Area Networks

    Bo GU  Kyoko YAMORI  Sugang XU  Yoshiaki TANAKA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E96-B No:7
      Page(s):
    1986-1996

    This paper focuses on learning the economic behaviour of the access point (AP) and users in wireless local area networks (WLANs), and using a game theoretic approach to analyze the interactions among them. Recent studies have shown that the AP would adopt a simple, yet optimal, fixed rate pricing strategy when the AP has an unlimited uplink bandwidth to the Internet and the channel capacity of WLAN is unlimited. However, the fixed rate strategy fails to be optimal if a more realistic model with limited capacity is considered. A substitute pricing scheme for access service provisioning is hence proposed. In particular, the AP first estimates the probable utility degradation of existing users consequent upon the admission of an incoming user. Second, the AP decides: (i) whether the incoming user should be accepted; and (ii) the price to be announced in order to try to maximize the overall revenue. The condition, under which the proposed scheme results in a perfect Bayesian equilibrium (PBE), is investigated.

11101-11120hit(42807hit)