The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] AF(873hit)

241-260hit(873hit)

  • Intelligent Traffic Control Systems Based on IEEE 802.11 DCF/PCF

    Chanwoo PARK  Jungwoo LEE  

     
    LETTER-Intelligent Transport System

      Vol:
    E95-A No:9
      Page(s):
    1651-1654

    The research on driverless cars has been making much progress lately. In this paper, we propose a new traffic control system without traffic lights at an intersection. We assume a system with fully autonomous driverless cars, and infrastructure to avoid collision completely. When automobiles approach an intersection, they communicates with the access point in both random access mode and polling mode, and the movement of the automobiles will be coordinated by the infra structure (access point). Traffic congestion is very difficult to predict and deal with because it is a function of many unknown factors such as number of cars, weather, road conditions, accidents, etc. The proposed algorithm is designed for urban road networks to ease the congestion, and make it more predictable at the same time. A key idea of this paper is that IEEE 802.11 DCF/PCF mechanisms are used to control traffic flow for driverless cars when there are no traffic lights at an intersection. The algorithm uses the concept of contention/contention-free period of IEEE 802.11 to find a balance between the efficiency of traffic flow and the fairness between users.

  • Primary Traffic Based Cooperative Multihop Relaying with Preliminary Farthest Relay Selection in Cognitive Radio Ad Hoc Networks

    I-Te LIN  Iwao SASASE  

     
    PAPER-Network

      Vol:
    E95-B No:8
      Page(s):
    2586-2599

    We propose a primary traffic based multihop relaying algorithm with cooperative transmission (PTBMR-CT). It enlarges the hop transmission distances to reduce the number of cognitive relays on the route from the cognitive source (CS) to the cognitive destination (CD). In each hop, from the cognitive nodes in a specified area depending on whether the primary source (PS) transmits data to the primary destination (PD), the cognitive node that is farthest away from the cognitive relay that sends data is selected as the other one that receives data. However, when the PS is transmitting data to the PD, from the cognitive nodes in a specified area, another cognitive node is also selected and prepared to be the cognitive relay that receives data of cooperative transmission. Cooperative transmission is performed if the PS is still transmitting data to the PD when the cognitive relay that receives data of the next hop transmission is being searched. Simulation results show that the average number of cognitive relays is reduced by PTBMR-CT compared to conventional primary traffic based farthest neighbor relaying (PTBFNR), and PTBMR-CT outperforms conventional PTBFNR in terms of the average end-to-end reliability, the average end-to-end throughput, the average required transmission power of transmitting data from the CS to the CD, and the average end-to-end transmission latency.

  • Multipath Routing Algorithm Applied to Cloud Data Center Services

    Hiroshi MATSUURA  

     
    PAPER

      Vol:
    E95-B No:8
      Page(s):
    2558-2567

    Cloud data center services, such as video on demand (VoD) and sensor data monitoring, have become popular. The quality of service (QoS) between a client and a cloud data center should be assured by satisfying each service's required bandwidth and delay. Multipath traffic engineering is effective for dispersing traffic flows on a network; therefore, an improved k-shortest paths first (k-SPF) algorithm is applied to these cloud data center services to satisfy their required QoS. k-SPF can create a set of multipaths between a cloud data center and all edge routers, to which client nodes are connected, within one algorithm process. Thus, k-SPF can produce k shortest simple paths between a cloud data center and every access router faster than with conventional Yen's algorithm. By using a parameter in the algorithm, k-SPF can also impartially use links on a network and shorten the average hop-count and number of necessary MPLS labels for multiple paths that comprise a multipath.

  • Power Consumption Evaluation of Distributed Computing Network Considering Traffic Locality

    Yukio OGAWA  Go HASEGAWA  Masayuki MURATA  

     
    PAPER

      Vol:
    E95-B No:8
      Page(s):
    2538-2548

    When computing resources are consolidated in a few huge data centers, a massive amount of data is transferred to each data center over a wide area network (WAN). This results in increased power consumption in the WAN. A distributed computing network (DCN), such as a content delivery network, can reduce the traffic from/to the data center, thereby decreasing the power consumed in the WAN. In this paper, we focus on the energy-saving aspect of the DCN and evaluate its effectiveness, especially considering traffic locality, i.e., the amount of traffic related to the geographical vicinity. We first formulate the problem of optimizing the DCN power consumption and describe the DCN in detail. Then, numerical evaluations show that, when there is strong traffic locality and the router has ideal energy proportionality, the system's power consumption is reduced to about 50% of the power consumed in the case where a DCN is not used; moreover, this advantage becomes even larger (up to about 30%) when the data center is located farthest from the center of the network topology.

  • Traffic Sign Recognition with Invariance to Lighting in Dual-Focal Active Camera System

    Yanlei GU  Mehrdad PANAHPOUR TEHRANI  Tomohiro YENDO  Toshiaki FUJII  Masayuki TANIMOTO  

     
    PAPER-Recognition

      Vol:
    E95-D No:7
      Page(s):
    1775-1790

    In this paper, we present an automatic vision-based traffic sign recognition system, which can detect and classify traffic signs at long distance under different lighting conditions. To realize this purpose, the traffic sign recognition is developed in an originally proposed dual-focal active camera system. In this system, a telephoto camera is equipped as an assistant of a wide angle camera. The telephoto camera can capture a high accuracy image for an object of interest in the view field of the wide angle camera. The image from the telephoto camera provides enough information for recognition when the accuracy of traffic sign is low from the wide angle camera. In the proposed system, the traffic sign detection and classification are processed separately for different images from the wide angle camera and telephoto camera. Besides, in order to detect traffic sign from complex background in different lighting conditions, we propose a type of color transformation which is invariant to light changing. This color transformation is conducted to highlight the pattern of traffic signs by reducing the complexity of background. Based on the color transformation, a multi-resolution detector with cascade mode is trained and used to locate traffic signs at low resolution in the image from the wide angle camera. After detection, the system actively captures a high accuracy image of each detected traffic sign by controlling the direction and exposure time of the telephoto camera based on the information from the wide angle camera. Moreover, in classification, a hierarchical classifier is constructed and used to recognize the detected traffic signs in the high accuracy image from the telephoto camera. Finally, based on the proposed system, a set of experiments in the domain of traffic sign recognition is presented. The experimental results demonstrate that the proposed system can effectively recognize traffic signs at low resolution in different lighting conditions.

  • Handling Deafness Problem of Scheduled Multi-Channel Polling MACs

    Fulong JIANG  Hao LIU  Longxing SHI  

     
    PAPER-Network

      Vol:
    E95-B No:7
      Page(s):
    2323-2329

    Combining scheduled channel polling with channel diversity is a promising way for a MAC protocol to achieve high energy efficiency and performance under both light and heavy traffic conditions. However, the deafness problem may cancel out the benefit of channel diversity. In this paper, we first investigate the deafness problem of scheduled multi-channel polling MACs with experiments. Then we propose and evaluate two schemes to handle the deafness problem. Our experiment shows that deafness is a significant reason for performance degradation in scheduled multi-channel polling MACs. A proper scheme should be chosen depending on the traffic pattern and the design objective.

  • Exact BER Analysis of Threshold-Based Amplify-and-Forward Relaying over Rayleigh Fading Channels

    Dae-Hwan KIM  Young-Hwan YOU  We-Duke CHO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:6
      Page(s):
    2148-2152

    We study threshold-based relaying in an amplify-and-forward (AF) cooperative diversity network. For the network, the relay helps the communication from the source to the destination only if the signal-to-noise ratio (SNR) of the link from the source to the relay is greater than or equal to a pre-determined threshold value; otherwise, the relay remains silent. We derive the exact bit-error rate (BER) of the threshold-based relaying for M-pulse amplitude modulation (PAM) and M-quadrature amplitude modulation (QAM). The obtained BER expression can help the design of the threshold-based relaying in determining the system parameters such as the transmission power, the amplifying coefficient at the relay, and the pre-determined threshold value.

  • Route Instruction Mechanism for Mobile Users Leveraging Distributed Wireless Resources

    Takeshi KAKEHI  Ryoichi SHINKUMA  Tutomu MURASE  Gen MOTOYOSHI  Kyoko YAMORI  Tatsuro TAKAHASHI  

     
    PAPER

      Vol:
    E95-B No:6
      Page(s):
    1965-1973

    The market growths of smart-phones and thin clients have been significantly increasing communication traffic in mobile networks. To handle the increased traffic, network operators should consider how to leverage distributed wireless resources such as distributed spots of wireless local access networks. In this paper, we consider the system where multiple moving users share distributed wireless access points on their traveling routes between their start and goal points and formulate as an optimization problem. Then, we come up with three algorithms as a solution for the problem. The key idea here is 'longcut route instruction', in which users are instructed to choose a traveling route where less congested access points are available; even if the moving distance increases, the throughput for users in the system would improve. In this paper, we define the gain function. Moreover, we analyze the basic characteristics of the system using as a simple model as possible.

  • Noise Constrained Data-Reusing Adaptive Algorithms for System Identification

    Young-Seok CHOI  Woo-Jin SONG  

     
    LETTER-Digital Signal Processing

      Vol:
    E95-A No:6
      Page(s):
    1084-1087

    We present a new framework of the data-reusing (DR) adaptive algorithms by incorporating a constraint on noise, referred to as a noise constraint. The motivation behind this work is that the use of the statistical knowledge of the channel noise can contribute toward improving the convergence performance of an adaptive filter in identifying a noisy linear finite impulse response (FIR) channel. By incorporating the noise constraint into the cost function of the DR adaptive algorithms, the noise constrained DR (NC-DR) adaptive algorithms are derived. Experimental results clearly indicate their superior performance over the conventional DR ones.

  • Fiber Endface Sealing Technique for Optical Connection of Holey Fibers with Low Loss and Reflection

    Masaki WAKI  Kyozo TSUJIKAWA  Yuji AZUMA  

     
    PAPER-Optical Fiber for Communications

      Vol:
    E95-B No:5
      Page(s):
    1620-1624

    We propose a new fiber endface sealing technique for the optical connection of holey fibers (HFs). We experimentally investigate the optimum sealing condition for physical contact using a carbon dioxide (CO2) laser. We use this technique to fabricate an HF connector, and achieve low splice loss and a high return loss when splicing with a conventional SMF connector. With hole-assisted fiber (HAF), the obtained splice and return losses are almost the same as those obtained with the conventional method. In particular, with photonic crystal fiber (PCF), we obtained a minimum splice loss of 0.2 dB and a return loss exceeding 50 dB at wavelengths of 1.31 and 1.55 µm.

  • Opportunistic Scheduling for Hybrid Network Coding and Cooperative Relaying Techniques in Wireless Networks Open Access

    Lin SHAN  Hidekazu MURATA  Sonia AISSA  Susumu YOSHIDA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E95-B No:5
      Page(s):
    1751-1760

    With the purpose of improving the performance of next generation wireless networks, cooperative relaying (CoR) and network coding (NC) are promising techniques. The number of time slots required for NC in bidirectional transmission is less than that required for CoR, and hence, NC can achieve higher throughput performance than CoR. However, the disadvantage of NC is that asymmetric traffic ratio conditions might cause a significant decrease in the bidirectional throughput. In contrast, CoR is robust to asymmetric traffic ratio conditions. In this paper, in order to improve the throughput of NC even under asymmetric traffic ratio conditions, we propose an opportunistic scheduling scheme for hybrid NC and CoR. In the proposed scheduling scheme, the transmission protocol with best throughput performance can be adaptively selected based on instantaneous channel state information. Computer simulation results reveal that the proposed scheduling scheme not only achieve higher throughput than the conventional scheduling scheme but is also robust against asymmetric traffic ratio conditions. By adjusting the scheduler's parameter, the proposed scheduling scheme can provide a tradeoff between the throughput and the traffic ratio. Moreover, in certain cases, maximizing the throughput of NC and guaranteeing the offered traffic ratio can be achieved at the same time.

  • Traffic Adaptive Distributed Backoff Control Mechanism for Cluster-Based IEEE802.15.4 WSNs with Traffic Fluctuations

    Kazuo MORI  Katsuhiro NAITO  Hideo KOBAYASHI  

     
    PAPER-Network

      Vol:
    E95-B No:5
      Page(s):
    1702-1710

    The traffic adaptive 2-level active period control has been proposed as a traffic adaptation mechanism to handle temporal and spatial (geographical) traffic fluctuations in cluster-based wireless sensor networks (WSNs) employing IEEE802.15.4 medium access control (MAC). This paper proposes a traffic adaptive distributed backoff control mechanism for cluster-based WSNs with the traffic adaptive 2-level active period control to enhance the system performance, especially transmission performance. The proposed mechanism autonomously adjusts the starting time of the backoff procedure for channel accesses in the contention access period (CAP) specified by the IEEE802.15.4 MAC, and then distributes the channel access timing over a wide range within the CAP, which can mitigate channel access congestion. The results of computer simulations show that the proposed mechanism can improve the transmission delay performance while keeping the enhancement in throughput and energy consumption at the cluster-based WSNs under non-uniform traffic environments.

  • A Parallel Implementation of the Gustafson-Kessel Clustering Algorithm with CUDA

    Jeong Bong SEO  Dae-Won KIM  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E95-D No:4
      Page(s):
    1162-1165

    Despite the benefits of the Gustafson-Kessel (GK) clustering algorithm, it becomes computationally inefficient when applied to high-dimensional data. In this letter, a parallel implementation of the GK algorithm on the GPU with CUDA is proposed. Using an optimized matrix multiplication algorithm with fast access to shared memory, the CUDA version achieved a maximum 240-fold speedup over the single-CPU version.

  • Lightweight Distance Bounding Protocol against Relay Attacks

    Jin Seok KIM  Kookrae CHO  Dae Hyun YUM  Sung Je HONG  Pil Joong LEE  

     
    LETTER-Information Network

      Vol:
    E95-D No:4
      Page(s):
    1155-1158

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  • 6 W/25 mm2 Wireless Power Transmission for Non-contact Wafer-Level Testing

    Andrzej RADECKI  Hayun CHUNG  Yoichi YOSHIDA  Noriyuki MIURA  Tsunaaki SHIDEI  Hiroki ISHIKURO  Tadahiro KURODA  

     
    PAPER

      Vol:
    E95-C No:4
      Page(s):
    668-676

    Wafer-level testing is a well established solution for detecting manufacturing errors and removing non-functional devices early in the fabrication process. Recently this technique has been facing a number of challenges, resulting from increased complexity of devices under test, larger number and higher density of pads or bumps, application of mechanically fragile materials, such as low-k dielectrics, and ever developing packaging technologies. Most of these difficulties originate from the use of mechanical probes, as they limit testing speed, impose performance limitations and add reliability issues. Earlier work focused on relaxing these constraints by removing mechanical probes for data transmission and DC signal measurement and replacing them with non-contact interfaces. In this paper we extend this concept by adding a capability of transferring power wirelessly, enabling non-contact wafer-level testing. In addition to further improvements in the performance and reliability, this solution enables new testing scenarios such as probing wafers from their backside. The proposed system achieves 6 W/25 mm2 power transfer density over a distance of up to 0.32 mm, making it suitable for non-contact wafer-level testing of medium performance CMOS integrated circuits.

  • Efficient Antenna Selection for Amplify-and-Forward Two-Way MIMO Relay Systems

    Ming DING  Jun ZOU  Zeng YANG  Hanwen LUO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:4
      Page(s):
    1459-1462

    In this letter, we propose an efficient relay antenna selection algorithm for the amplify and forward (AF) two-way multiple-input multiple-output (MIMO) relay systems with analogue network coding (ANC). The proposed algorithm greedily selects the additional receive-transmit antenna pair that provides the maximum sum-rate. An iterative computation method is also designed to evaluate the sum-rate efficiently.

  • A New Analytical Model for the CQ Switch Performance Analysis under the Bursty Traffic

    Milutin RADONJIC  Igor RADUSINOVIC  Anita SIMURINA  Dusan BANOVIC  

     
    LETTER-Network System

      Vol:
    E95-B No:2
      Page(s):
    595-598

    In this letter we propose a new analytical iterative method for calculating the throughput and average cell latency of the crosspoint queued switch with random scheduling algorithm under the bursty traffic model. This method is verified by comparing it with simulation results, which shows a very good match. To the authors' knowledge, this is the first analytical method for performance analysis of such a switch under the bursty traffic model.

  • GTS Allocation Scheme for Bidirectional Voice Traffic in IEEE 802.15.4 Multihop Networks

    Junwoo JUNG  Hoki BAEK  Jaesung LIM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E95-B No:2
      Page(s):
    493-508

    The IEEE 802.15.4 protocol is considered a promising technology for low-cost low-power wireless personal area networks. Researchers have discussed the feasibility of voice communications over IEEE 802.15.4 networks. To this end, the personal area network (PAN) coordinator allocates guaranteed time slots (GTSs) for voice communications in the beacon-enabled mode of IEEE 802.15.4. Although IEEE 802.15.4 is capable of supporting voice communications by GTS allocation, it is impossible to accommodate voice transmission beyond two hops due to the excessive transmission delay. In this paper, we propose a GTS allocation scheme for bidirectional voice traffic in IEEE 802.15.4 multihop networks. The goal of our proposed scheme is to achieve low end-to-end delay and packet drop ratio without a complex allocation algorithm. Thus, the proposed scheme allocates GTSs to devices for successful completion of voice transmission in a superframe duration. The proposed scheme also considers transceiver switching delay. This is relatively large compared to a time slot due to the low-cost and low-gain antenna designs. We analyze and validate the proposed scheme in terms of average end-to-end delay and packet drop ratio. Our scheme has lower end-to-end delay and packet drop ratio than the basic IEEE 802.15.4 GTS allocation scheme.

  • A Configurable On-Chip Glitchy-Clock Generator for Fault Injection Experiments

    Sho ENDO  Takeshi SUGAWARA  Naofumi HOMMA  Takafumi AOKI  Akashi SATOH  

     
    LETTER

      Vol:
    E95-A No:1
      Page(s):
    263-266

    This paper presents a glitchy-clock generator integrated in FPGA for evaluating fault injection attacks and their countermeasures on cryptographic modules. The proposed generator exploits clock management capabilities, which are common in modern FPGAs, to generate clock signal with temporal voltage spike. The shape and timing of the glitchy-clock cycle are configurable at run time. The proposed generator can be embedded in a single FPGA without any external instrument (e.g., a pulse generator and a variable power supply). Such integration enables reliable and reproducible fault injection experiments. In this paper, we examine the characteristics of the proposed generator through experiments on Side-channel Attack Standard Evaluation Board (SASEBO). The result shows that the timing of the glitches can be controlled at the step of about 0.17 ns. We also demonstrate its application to the safe-error attack against an RSA processor.

  • A Proposal for Next Generation ITS Wireless Communications System in EV Generation

    Kiyohito TOKUDA  

     
    INVITED PAPER

      Vol:
    E95-A No:1
      Page(s):
    271-277

    ITS (Intelligent Transport Systems) wireless communications system has been developing based on the leading edge ICT (Information Communication Technologies) in Japan. The comfort driving systems for example VICS (Vehicular Information Communication system), ETC (Electronic Toll Collection), Telematics has already become popular and the safety driving support systems, such as ASV (Advanced Safety Vehicle) and SMARTWAY have been scheduled for introduction in the near future. However, there are many residual issues in the comfort driving system because of the existence of the traffic jam and the interest of the economical cars in the world. Moreover, the acceleration of the development of the Smart Grid and EV (Electric Vehicle) would affect the future development of the ITS wireless communications system. In this paper, it is clarified that the future development should be advanced considering the one of the basic business rule of 'market-in and product-out'.

241-260hit(873hit)