The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] AF(873hit)

201-220hit(873hit)

  • Object Detection Using RSSI with Road Surface Reflection Model for Intersection Safety

    Shoma HISAKA  Shunsuke KAMIJO  

     
    PAPER-Intelligent Transport System

      Vol:
    E96-A No:6
      Page(s):
    1451-1459

    We have developed a dedicated onboard “sensor” utilizing wireless communication devices for collision avoidance around road intersections. The “sensor” estimates the positions of transmitters on traffic participants by comparing the strengths of signals received by four ZigBee receivers installed at the four corners of a vehicle. On-board sensors involving cameras cannot detect objects in non line-of-sight (NLOS) area caused by buildings and other vehicles. Although infrastructure sensors for vehicle-to-infrastructure (V2I) cooperative systems can detect such hidden objects, they are substantially more expensive than on-board sensors. The on-board wireless “sensor” developed in this work would function as an alternative tool for collision avoidance around intersections. Herein, we extend our previous work by considering a road surface reflection model to improve the estimation accuracy. By using this model, we succeeded in reducing the error mismatches between the observed data and the calibration data of the estimation algorithm. The proposed system will be realized on the basis of these enhancements.

  • Handling Cross Traffic Bursts in Wireless Sensor Networks with Multi-Hop Multi-Channel Wakeup Reservation

    Xuan ZHANG  Hao LIU  Fulong JIANG  Zhiqun LI  

     
    PAPER-Network

      Vol:
    E96-B No:6
      Page(s):
    1472-1480

    Duty-cycle MAC protocols achieve high energy-efficiency. However, duty-cycle MACs introduce significant end-to-end delivery latency. Recently proposed protocols such as RMAC and PRMAC improve the latency of duty-cycle MAC protocols by employing a mechanism of multi-hop wakeup reservation to allow a packet to be forwarded over multiple hops in a single communication cycle. However, these protocols can not efficiently handle cross traffic bursts which are common in applications with space-correlated event detection. If there are multiple packets to send in each flow, most of the data packets will be seriously postponed. This paper proposes a multi-channel pipelined routing-enhanced MAC protocol, called MPR-MAC, to handle this problem. By jointly employing channel diversity and time diversity, MPR-MAC allows cross data flows to forward multiple packets respectively in a single communication cycle without interfering with each other. Simulation results show the advantage of MPR-MAC in handling cross data flows and the significant performance upgrade in terms of end-to-end latency and energy efficiency.

  • An Algorithm for Allocating User Requests to Licenses in the OMA DRM System

    Nikolaos TRIANTAFYLLOU  Petros STEFANEAS  Panayiotis FRANGOS  

     
    PAPER-Formal Methods

      Vol:
    E96-D No:6
      Page(s):
    1258-1267

    The Open Mobile Alliance (OMA) Order of Rights Object Evaluation algorithm causes the loss of rights on contents under certain circumstances. By identifying the cases that cause this loss we suggest an algebraic characterization, as well as an ordering of OMA licenses. These allow us to redesign the algorithm so as to minimize the losses, in a way suitable for the low computational powers of mobile devices. In addition we provide a formal proof that the proposed algorithm fulfills its intent. The proof is conducted using the OTS/CafeOBJ method for verifying invariant properties.

  • Optimal Contention Window Adjustment for Asymmetry Traffic in Erroneous Channels over IEEE802.11 WLANs

    Zhengyong FENG  Guangjun WEN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:5
      Page(s):
    1149-1157

    IEEE802.11 Wireless Local Area Networks (WLANs) are becoming more and more pervasive due to their simple channel access mechanism, Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), but this mechanism provides all nodes including Access Point and other Stations with the same channel access probability. This characteristic does not suit the infrastructure mode which has so many downlink flows to be transmitted at the Access Point that congestion at the Access Point is more likely to occur. To resolve this asymmetry traffic problem, we develop an Optimal Contention Window Adjustment method assuming the condition of erroneous channels over WLANs. This method can be easily implemented and is compatible with the original CSMA/CA mechanism. It holds the ratio of downlink and uplink flows and at the same time achieves the maximum saturation throughput in the WLANs. We use the Markov Chain analytical model to analyze its performance and validate it through the simulations.

  • Traffic Adaptive Routing for Mobile Sensor Networks

    Ki Sup HONG  Sang Hoon LEE  Lynn CHOI  

     
    PAPER-Network

      Vol:
    E96-B No:5
      Page(s):
    1097-1111

    Existing MANET routing protocols may not be efficient for mobile sensor networks (MSNs) since they generate too much control traffic by relying on flooding or route maintenance messages. Furthermore, peer-to-peer communication patterns assumed in MANET would exacerbate the traffic around sink nodes in MSNs. In this paper we propose traffic adaptive routing (TAR) for MSNs; it can reduce the control packets by analyzing and predicting the source, volume, and the patterns of both traffic and mobility. Through its analysis and the prediction of mobility, TAR also copes with dynamic topology changes by carrying out a fast route recovery process. Our theoretical analysis shows that TAR can effectively reduce unnecessary control packet flooding by 53% on average when compared to AODV. We implement TAR on NS-2. Our experimental evaluation confirms that TAR can not only improve the network and energy performance for MSNs but also can be a practical routing solution for MANET and WSNs compared to the existing ad hoc routing protocols.

  • Characterization of Local Electronic Transport through Ultrathin Au/Highly-Dense Si Nanocolumnar Structures by Conducting-Probe Atomic Force Microscopy

    Daichi TAKEUCHI  Katsunori MAKIHARA  Mitsuhisa IKEDA  Seiichi MIYAZAKI  Hirokazu KAKI  Tsukasa HAYASHI  

     
    PAPER

      Vol:
    E96-C No:5
      Page(s):
    718-721

    We have fabricated highly-dense Si nano-columnar structures accompanied with Si nanocrystals on W-coated quartz, and characterized their local electrical transport in the thickness direction using atomic force microscopy (AFM) with a conductive cantilever. By applying DC negative bias to the bottom W electrode with respect to a grounded top electrode made of 10-nm-thick Au on the sample surface, current images reflecting highly-localized conduction were obtained in both contact and non-contact modes. This result is attributable to electron emission due to quasi-ballistic transport through Si nanocrystals via nanocolumnar structure.

  • Whitelisting for Critical IT-Based Infrastructure

    YoungHwa JANG  InCheol SHIN  Byung-gil MIN  Jungtaek SEO  MyungKeun YOON  

     
    LETTER-Network Management/Operation

      Vol:
    E96-B No:4
      Page(s):
    1070-1074

    Critical infrastructures are falsely believed to be safe when they are isolated from the Internet. However, the recent appearance of Stuxnet demonstrated that isolated networks are no longer safe. We observe that a better intrusion detection scheme can be established based on the unique features of critical infrastructures. In this paper, we propose a whitelist-based detection system. Network and application-level whitelists are proposed, which are combined to form a novel cross-layer whitelist. Through experiments, we confirm that the proposed whitelists can exactly detect attack packets, which cannot be achieved by existing schemes.

  • Outage Channel Capacity of Direct/Cooperative AF Relay Switched SC-FDMA Using Spectrum Division/Adaptive Subcarrier Allocation

    Masayuki NAKADA  Tatsunori OBARA  Tetsuya YAMAMOTO  Fumiyuki ADACHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:4
      Page(s):
    1001-1011

    In this paper, a direct/cooperative relay switched single carrier-frequency division multiple access (SC-FDMA) using amplify-and-forward (AF) protocol and spectrum division/adaptive subcarrier allocation (SDASA) is proposed. Using SDASA, the transmit SC signal spectrum is divided into sub-blocks, to each of which a different set of subcarriers (resource block) is adaptively allocated according to the channel conditions of mobile terminal (MT)-relay station (RS) link, RS-base station (BS) link, and MT-BS link. Cooperative relay does not always provide higher capacity than the direct communication. Switching between direct communication and cooperative relay is done depending on the channel conditions of MT-RS, RS-BS, and MT-BS links. We evaluate the achievable channel capacity by the Monte-Carlo numerical computation method. It is shown that the proposed scheme can reduce the transmit power by about 6.0 (2.0) dB compared to the direct communication (the cooperative AF relay) for a 1%-outage capacity of 3.0 bps/Hz.

  • Optimal Power Allocation with Max-Min Fairness in a Non-orthogonal AF Relay-Assisted Uplink Transmission

    Peng GONG  Ping LI  Duk Kyung KIM  

     
    LETTER-Communication Theory and Signals

      Vol:
    E96-A No:3
      Page(s):
    728-731

    In this letter, unlike the previous work in [2], the optimal power allocation in a non-orthogonal, amplify-and-forward (AF) relay-assisted transmission is investigated in the uplink. Here, the inter-user-interference among the signals from MTs and relays exists due to non-zero interference suppression factor (ISF), i.e., finite spreading factor. In this letter, we show that the optimal solution to achieve a 'max-min fairness' among mobile terminals can be alternatively obtained by solving its inverse problem. The impact of various ISFs as well as the Jain's fairness is investigated in comparison with the equal power allocation.

  • Joint MMSE Design of Relay and Destination in Two-Hop MIMO Multi-Relay Networks

    Youhua FU  Wei-Ping ZHU  Chen LIU  Feng LU  Hua-An ZHAO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:3
      Page(s):
    836-846

    This paper presents a joint linear processing scheme for two-hop and half-duplex distributed amplify-and-forward (AF) relaying networks with one source, one destination and multiple relays, each having multiple antennas. By using the minimum mean-square error (MMSE) criterion and the Wiener filter principle, the joint relay and destination design with perfect channel state information (CSI) is first formulated as an optimization problem with respect to the relay precoding matrix under the constraint of a total relay transmit power. The constrained optimization with an objective to design the relay block-diagonal matrix is then simplified to an equivalent problem with scalar optimization variables. Next, it is revealed that the scalar-version optimization is convex when the total relay power or the second-hop SNR (signal to noise ratio) is above a certain threshold. The underlying optimization problem, which is non-convex in general, is solved by complementary geometric programming (CGP). The proposed joint relay and destination design with perfect CSI is also extended for practical systems where only the channel mean and covariance matrix are available, leading to a robust processing scheme. Finally, Monte Carlo simulations are undertaken to demonstrate the superior MSE (mean-square error) and SER (symbol error rate) performances of the proposed scheme over the existing relaying method in the case of relatively large second-hop SNR.

  • Survey on Data Center Networking Technologies Open Access

    Yoshiaki KIRIHA  Motoo NISHIHARA  

     
    INVITED SURVEY PAPER

      Vol:
    E96-B No:3
      Page(s):
    713-721

    In recent years, technologies and markets related to data centers have been rapidly changing and growing. Data centers are playing an important role in ICT infrastructure deployment and promise to become common platforms for almost all social infrastructures. Even though research has focused on networking technologies, various technologies are needed to develop high-performance, cost-efficient, and flexible large-scale data centers. To understand those technologies better, this paper surveys recent research and development efforts and results in accordance with a data center network taxonomy that the authors defined.

  • An Improved Traffic Matrix Decomposition Method with Frequency-Domain Regularization

    Zhe WANG  Kai HU  Baolin YIN  

     
    LETTER-Information Network

      Vol:
    E96-D No:3
      Page(s):
    731-734

    We propose a novel network traffic matrix decomposition method named Stable Principal Component Pursuit with Frequency-Domain Regularization (SPCP-FDR), which improves the Stable Principal Component Pursuit (SPCP) method by using a frequency-domain noise regularization function. An experiment demonstrates the feasibility of this new decomposition method.

  • Model Checking an OSEK/VDX-Based Operating System for Automobile Safety Analysis

    Yunja CHOI  

     
    LETTER-Dependable Computing

      Vol:
    E96-D No:3
      Page(s):
    735-738

    An automotive operating system is a typical safety-critical software and therefore requires extensive analysis w.r.t its effect on system safety. Our earlier work [1] reported a systematic model checking approach for checking the safety properties of the OSEK/VDX-based operating system Trampoline. This article reports further performance improvement using embeddedC constructs for efficient verification of the Trampoline model developed in the earlier work. Experiments show that the use of embeddedC constructs greatly reduces verification costs.

  • Global Asymptotic Stability of FAST TCP in the Presence of Time-Varying Network Delay and Cross Traffic

    Joon-Young CHOI  Hongju KIM  Soonman KWON  

     
    PAPER-Internet

      Vol:
    E96-B No:3
      Page(s):
    802-810

    We address the global asymptotic stability of FAST TCP, especially considering cross traffics, time-varying network feedback delay, and queuing delay dynamics at link. Exploiting the inherent dynamic property of FAST TCP, we construct two sequences that represent the lower and upper bound variations of the congestion window in time. By showing that the sequences converge to the equilibrium point of the congestion window, we establish that FAST TCP in itself is globally asymptotically stable without any specific conditions on the tuning parameter α or the update gain γ.

  • Traffic Aware QoS Scheduling for IEEE 802.11e HCCA WLAN

    Kang Yong LEE  Jinsul KIM  Kee Seong CHO  Won RYU  Ho-Jin LEE  

     
    LETTER-Network

      Vol:
    E96-B No:2
      Page(s):
    639-642

    In this letter, we propose a new QoS scheduling algorithm, referred to as the explicit traffic aware scheduling algorithm with explicit queue length notification (ETA-EQN), which aims at supporting multimedia services in HCCA of IEEE 802.11e WLAN. The results from intensive simulations with NS-2 verify that ETA-EQN provides much better network performance than the reference scheduler in terms of throughput, delay, and packet loss.

  • Analyzing Characteristics of TCP Quality Metrics with Respect to Type of Connection through Measured Traffic Data

    Yasuhiro IKEDA  Ryoichi KAWAHARA  Noriaki KAMIYAMA  Tatsuaki KIMURA  Tatsuya MORI  

     
    PAPER-Internet

      Vol:
    E96-B No:2
      Page(s):
    533-542

    We analyze measured traffic data to investigate the characteristics of TCP quality metrics such as packet retransmission rate, roundtrip time (RTT), and throughput of connections classified by their type (client-server (C/S) or peer-to-peer (P2P)), or by the location of the connection host (domestic or overseas). Our findings are as follows. (i) The TCP quality metrics of the measured traffic data are not necessarily consistent with a theoretical formula proposed in a previous study. However, the average RTT and retransmission rate are negatively correlated with the throughput, which is similar to this formula. Furthermore, the maximum idle time, which is defined as the maximum length of the packet interarrival times, is negatively correlated with throughput. (ii) Each TCP quality metric of C/S connections is higher than that of P2P connections. Here “higher quality” means that either the throughput is higher, or the other TCP quality metrics lead to higher throughput; for example the average RTT is lower or the retransmission rate is lower. Specifically, the median throughput of C/S connections is 2.5 times higher than that of P2P connections in the incoming direction of domestic traffic. (iii) The characteristics of TCP quality metrics depend on the location of the host of the TCP connection. There are cases in which overseas servers might use a different TCP congestion control scheme. Even if we eliminate these servers, there is still a difference in the degree of impact the average RTT has on the throughput between domestic and overseas traffic. One reason for this is thought to be the difference in the maximum idle time, and another is the fact that congestion levels of these types of traffic differ, even if their average RTTs are the same.

  • An Efficient I/O Aggregator Assignment Scheme for Multi-Core Cluster Systems

    Kwangho CHA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E96-D No:2
      Page(s):
    259-269

    As the number of nodes in high-performance computing (HPC) systems increases, parallel I/O becomes an important issue: collective I/O is the specialized parallel I/O that provides the function of single-file based parallel I/O. Collective I/O in most message passing interface (MPI) libraries follows a two-phase I/O scheme in which the particular processes, namely I/O aggregators, perform important roles by engaging the communications and I/O operations. This approach, however, is based on a single-core architecture. Because modern HPC systems use multi-core computational nodes, the roles of I/O aggregators need to be re-evaluated. Although there have been many previous studies that have focused on the improvement of the performance of collective I/O, it is difficult to locate a study regarding the assignment scheme for I/O aggregators that considers multi-core architectures. In this research, it was discovered that the communication costs in collective I/O differed according to the placement of the I/O aggregators, where each node had multiple I/O aggregators. The performance with the two processor affinity rules was measured and the results demonstrated that the distributed affinity rule used to locate the I/O aggregators in different sockets was appropriate for collective I/O. Because there may be some applications that cannot use the distributed affinity rule, the collective I/O scheme was modified in order to guarantee the appropriate placement of the I/O aggregators for the accumulated affinity rule. The performance of the proposed scheme was examined using two Linux cluster systems, and the results demonstrated that the performance improvements were more clearly evident when the computational node of a given cluster system had a complicated architecture. Under the accumulated affinity rule, the performance improvements between the proposed scheme and the original MPI-IO were up to approximately 26.25% for the read operation and up to approximately 31.27% for the write operation.

  • Node Degree Based Routing Metric for Traffic Load Distribution in the Internet

    Jun'ichi SHIMADA  Hitomi TAMURA  Masato UCHIDA  Yuji OIE  

     
    PAPER

      Vol:
    E96-D No:2
      Page(s):
    202-212

    Congestion inherently occurs on the Internet due to traffic concentration on certain nodes or links of networks. The traffic concentration is caused by inefficient use of topological information of networks in existing routing protocols, which reduces to inefficient mapping between traffic demands and network resources. Actually, the route with minimum cost, i.e., number of hops, selected as a transmission route by existing routing protocols would pass through specific nodes with common topological characteristics that could contribute to a large improvement in minimizing the cost. However, this would result in traffic concentration on such specific nodes. Therefore, we propose a measure of the distance between two nodes that is suitable for reducing traffic concentration on specific nodes. To consider the topological characteristics of the congestion points of networks, we define node-to-node distance by using a generalized norm, p-norm, of a vector of which elements are degrees of intermediate nodes of the route. Simulation results show that both the maximum Stress Centrality (SC) and the coefficient of variation of the SC are minimized in some network topologies by selecting transmission routes based on the proposed measure of node-to-node distance.

  • A Long Range Dependent Internet Traffic Model Using Unbounded Johnson Distribution

    Sunggon KIM  Seung Yeob NAM  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E96-B No:1
      Page(s):
    301-304

    It is important to characterize the distributional property and the long-range dependency of traffic arrival processes in modeling Internet traffic. To address this problem, we propose a long-range dependent traffic model using the unbounded Johnson distribution. Using the proposed model, a sequence of traffic rates with the desired four quantiles and Hurst parameter can be generated. Numerical studies show how well the sequence of traffic rates generated by the proposed model mimics that of the real traffic rates using a publicly available Internet traffic trace.

  • Unilateral Distance Bounding Protocol with Bidirectional Challenges

    Myung-Ho PARK  Ki-Gon NAM  Jin Seok KIM  Dae Hyun YUM  Pil Joong LEE  

     
    LETTER-Information Network

      Vol:
    E96-D No:1
      Page(s):
    134-137

    A distance bounding protocol provides an upper bound on the distance between communicating parties by measuring the round-trip time between challenges and responses. It is an effective countermeasure against mafia fraud attacks (a.k.a. relay attacks). The adversary success probability of previous distance bounding protocols without a final confirmation message such as digital signature or message authentication code is at least . We propose a unilateral distance bounding protocol without a final confirmation message, which reduces the adversary success probability to .

201-220hit(873hit)