The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] AF(873hit)

521-540hit(873hit)

  • Structures of Human Relations and User-Dynamics Revealed by Traffic Data

    Masaki AIDA  Keisuke ISHIBASHI  Hiroyoshi MIWA  Chisa TAKANO  Shin-ichi KURIBAYASHI  

     
    PAPER

      Vol:
    E87-D No:6
      Page(s):
    1454-1460

    The number of customers of a service for Internet access from cellular phones in Japan has been explosively increasing for some time. We analyze the relation between the number of customers and the volume of traffic, with a view to finding clues to the structure of human relations among the very large set of potential customers of the service. The traffic data reveals that this structure is a scale-free network, and we calculate the exponent that governs the distribution of node degree in this network. The data also indicates that people who have many friends tend to subscribe to the service at an earlier stage. These results are useful for investigating various fields, including marketing strategies, the propagation of rumors, the spread of computer viruses, and so on.

  • Self-Organizing Map-Based Analysis of IP-Network Traffic in Terms of Time Variation of Self-Similarity: A Detrended Fluctuation Analysis Approach

    Masao MASUGI  

     
    PAPER-Nonlinear Problems

      Vol:
    E87-A No:6
      Page(s):
    1546-1554

    This paper describes an analysis of IP-network traffic in terms of the time variation of self-similarity. To get a comprehensive view in analyzing the degree of long-range dependence (LRD) of IP-network traffic, this paper used a self-organizing map, which provides a way to map high-dimensional data onto a low-dimensional domain. Also, in the LRD-based analysis, this paper employed detrended fluctuation analysis (DFA), which is applicable to the analysis of long-range power-law correlations or LRD in non-stationary time-series signals. In applying this method to traffic analysis, this paper performed two kinds of traffic measurement: one based on IP-network traffic flowing into NTT Musashino R&D center (Tokyo, Japan) from the Internet and the other based on IP-network traffic flowing through at an interface point between an access provider (Tokyo, Japan) and the Internet. Based on sequential measurements of IP-network traffic, this paper derived corresponding values for the LRD-related parameter α of measured traffic. As a result, we found that the characteristic of self-similarity seen in the measured traffic fluctuated over time, with different time variation patterns for two measurement locations. In training the self-organizing map, this paper used three parameters: two α values for different plot ranges, and Shannon-based entropy, which reflects the degree of concentration of measured time-series data. We visually confirmed that the traffic data could be projected onto the map in accordance with the traffic properties, resulting in a combined depiction of the effects of the degree of LRD and network utilization rates. The proposed method can deal with multi-dimensional parameters, projecting its results onto a two-dimensional space in which the projected data positions give us an effective depiction of network conditions at different times.

  • Queueing Analysis of an ATM Multichannel Switch Routing Two-Class Multimedia Traffic with Two Service Rates

    Hamed NASSAR  John CARPINELLI  Fayza NADA  

     
    PAPER-Switching

      Vol:
    E87-B No:6
      Page(s):
    1505-1513

    In this article we analyze the performance of a space division output buffered multichannel switch operating in an ATM multimedia environment as follows. Fixed size packets belonging to two classes arrive onto the switch inputs in each time slot. Class-1 packets, representing real time traffic such as live audio and live video communications, are sensitive to delay but insensitive to loss and have their own service time needs. Class-2 packets, representing nonreal time communications such as file transfers, are insensitive to delay but sensitive to loss and have their different service time needs. To respond to the class-1 delay sensitivity, the switch gives class-1 packets higher service priority over class-2. And to respond to the difference in service time needs, the switch operates at two service rates, one for each class. This latter assumption is the major feature of the article, as previous studies have usually assumed that the two classes have the same service needs and thus the same service rate. For the purpose of the analysis, the switch is modelled as a priority, discrete time, batch arrival, multiserver queueing system, with infinite buffer and two geometric service times with two parameters. Performance measures analyzed are system occupancy and packet waiting time.

  • Performance Evaluation of Dynamic Multi-Layer Routing Schemes in Optical IP Networks

    Eiji OKI  Kohei SHIOMOTO  Masaru KATAYAMA  Wataru IMAJUKU  Naoaki YAMANAKA  Yoshihiro TAKIGAWA  

     
    PAPER-Network

      Vol:
    E87-B No:6
      Page(s):
    1577-1583

    This paper presents two dynamic multi-layer routing policies for optical IP Networks. Both policies first try to allocate a newly requested electrical path to an existing optical path that directly connects the source and destination nodes. If such a path is not available, the two policies employ different procedures. Policy 1, which has been published already, tries to find available existing optical paths with two or more hops that connect the source and destination nodes. Policy 2, which is proposed in this paper, tries to establish a new one-hop optical path between source and destination nodes. The performances of the two routing policies are evaluated. Simulation results suggest that policy 2 outperforms policy 1 if p is large, where p is the number of packet-switching-capable ports; the reverse is true only if p is small. We observe that p is the key factor in choosing the most appropriate routing policy.

  • A Parameter Decimation Technique for Variable-Coefficient Invertible Deinterlacing

    Jun UCHITA  Takuma ISHIDA  Shogo MURAMATSU  Hisakazu KIKUCHI  Tetsuro KUGE  

     
    PAPER

      Vol:
    E87-A No:6
      Page(s):
    1363-1370

    In this paper, a coefficient-parameter reduction method is proposed for invertible deinterlacing with variable coefficients. Invertible deinterlacing, which the authors have developed before, can be used as a preprocess of frame-based motion picture codec, such as Motion-JPEG2000 (MJP2), for interlaced videos. When the conventional field-interleaving is used instead, comb-tooth artifacts appear around edges of moving objects. On the other hand, the invertible deinterlacing technique allows us to suppress the comb-tooth artifacts and also to recover an original picture on demand. As previous works, the authors have developed a variable coefficient scheme with a motion detection filter, which realizes adaptability to local characteristics of given pictures. When applying this deinterlacing technique to an image codec, it is required to send coefficient parameters to receivers for original picture recovery. This work proposes a parameter decimation technique and shows that this reduction approach can be achieved without significant loss of comb-tooth suppression capability and improves the quality at high bit-rate decoding.

  • Web First Adaptive Traffic Engineering

    Guangyi LIU  Yang YANG  Xiaokang LIN  

     
    LETTER-Network

      Vol:
    E87-B No:6
      Page(s):
    1750-1755

    Internet traffic engineering is much important for Internet Service Providers (ISPs) today, since it can be used to fully utilize already deployed network resources. For ISPs, the requirements for traffic engineering should be simple, easy to configure, cost-effective and efficient. Based on these considerations, we propose an algorithm called Web First Adaptive Traffic Engineering (WFATE). Since World Wide Web (WWW) services dominate most of the total Internet traffic and WWW flows are not long-lived, we only apply load balancing to WWW traffic in the algorithm. It can be shown that the number of coexistent WWW flows at an ingress node is almost certainly below a bound, and thus a forward-per-flow mechanism without keeping track of the state of each flow is feasible. This mechanism can balance traffic load at fine granularity and therefore get better performance. Through simulations and performance comparison, it is shown that WFATE is quite efficient, which can improve the network throughput averagely by 26% under the "dense source" traffic pattern and 9% under the "sparse source" traffic pattern.

  • Traffic Engineering with Constrained Multipath Routing in MPLS Networks

    Youngseok LEE  Yongho SEOK  Yanghee CHOI  

     
    PAPER-Network

      Vol:
    E87-B No:5
      Page(s):
    1346-1356

    A traffic engineering problem in a network consists of setting up paths between the edge nodes of the network to meet traffic demands while optimizing network performance. It is known that total traffic throughput in a network, or resource utilization, can be maximized if a traffic demand is split over multiple paths. However, the problem formulation and practical algorithms, which calculate the paths and the load-splitting ratios by taking bandwidth, the route constraints or policies into consideration, have not been much touched. In this paper, we formulate the constrained multipath-routing problems with the objective of minimizing the maximum of link utilization, while satisfying bandwidth, the maximum hop count, and the not-preferred node/link list in Linear Programming (LP). Optimal solutions of paths and load-splitting ratios found by an LP solver are shown to be superior to the conventional shortest path algorithm in terms of maximum link utilization, total traffic volume, and number of required paths. Then, we propose a heuristic algorithm with low computational complexity that finds near optimal paths and load-splitting ratios satisfying the given constraints. The proposed algorithm is applied to Multi-Protocol Label Switching (MPLS) that can permit explicit path setup, and it is tested in a fictitious backbone network. The experiment results show that the heuristic algorithm finds near optimal solutions.

  • An Accurate and Low-Cost Method for On-Wafer LNA Noise Figure Measurement

    Sheng-Yu WEN  Guo-Wei HUANG  Kun-Ming CHEN  

     
    PAPER-Active Devices and Circuits

      Vol:
    E87-C No:5
      Page(s):
    742-748

    In this paper, an accurate and low-cost method for on-wafer noise figure measurement, specifically designed for low-noise amplifiers (LNAs), will be proposed. An experiment conducted on a 5 GHz LNA demonstrates that a good agreement can be reached between the measurement result of the proposed method and that of a commercial noise parameter measurement system.

  • A Study on an Advanced QoS Provisioning Scheme Using CDMA Traffic Measurement in ALL-IP Networks

    Seokhoon KIM  Intae RYOO  

     
    PAPER-Mobility Management

      Vol:
    E87-B No:5
      Page(s):
    1184-1192

    Currently, the IP infrastructure is widely available, which reduces the deployment and implementation cost of IP-based wireless networks. But, the corresponding researches on Quality of Service (QoS) in wireless mobile networks have not been done sufficiently. Although All-IP network has gotten the spotlight for both wired and wireless integrated networks, it has some unavoidable defects as it is based on best-effort IP transmission technologies. By focusing our attention on this point, we propose an Advanced QoS Provisioning Scheme (AQPS) that can provide satisfied QoS for multimedia applications based on accurate traffic measurements. With the AQPS, we consider 1xEV-DV system as a target system, extract QoS requirements for this system, and develop a corresponding QoS provisioning method using CDMA traffic measurement. The AQPS is designed to estimate delay parameters between a mobile station and a BTS (or repeater), verify whether the mobile station can support RSVP or not, operate a corresponding scheduler, and assign appropriate time slots based on traffic classes. One of the interesting results of this research is that the capability of distinguishing BTS' traffic from repeater's traffic helps save implementation cost of CDMA systems. The AQPS has been verified to outperform the existing system used in the current CDMA network and to efficiently manage network resources by computer simulations.

  • A Metadata-Based Video-on-Demand Traffic Control over the Network Supporting Bandwidth Renegotiations

    Hwangjun SONG  

     
    PAPER-Multimedia Systems

      Vol:
    E87-B No:5
      Page(s):
    1373-1381

    In this paper, we study an effective video-on-demand traffic control algorithm using the metadata over the network supporting bandwidth-renegotiations. The proposed algorithm includes bandwidth smoothing, bandwidth-burstiness estimation and rate adaptation algorithms. The proposed video-on-demand server has not only video database but also metadata database that includes coding information of the compressed video in video database and the traffic burst characteristics with respect to control parameters of the bandwidth smoothing algorithm. Thus, we can predict the traffic properties accurately with a low computational complexity by using the stored metadata, and then determine the efficient bandwidth renegotiating variables such as the renegotiating instants and the required bandwidth in terms of network utilization and video-on-demand service quality. In addition, we present a rate adaptation algorithm that pursues an effective trade-off between spatial and temporal qualities of the decoded video to improve the perceptual video quality when the bandwidth request is rejected.

  • Performance Evaluation of K Shortest Path Algorithms in MPLS Traffic Engineering

    Guangyi LIU  Yang YANG  Xiaokang LIN  

     
    LETTER-Fundamental Theories

      Vol:
    E87-B No:4
      Page(s):
    1007-1011

    A number of on-line and off-line algorithms for load balancing on multiple paths for MPLS (MultiProtocol Label Switching) traffic engineering have now been proposed, in which it is always assumed that sets of LSPs (Label Switched Path) have already been established between node pairs. While how to choose these paths is an important issue in traffic engineering, it has not been well studied yet. In this paper, we attempt to fill in this gap. As the shortest paths are always preferred in routing problems, we evaluate several k shortest path algorithms from the viewpoint of bandwidth use efficiency and the number of the found paths. Extensive simulations have been performed in different kinds of topologies to factor out effects of network characteristics on these algorithms' path calculation performances. It is found out that the performances of the evaluated algorithms are limited in some cases and the design of new algorithms for the path calculation problem is worth studying in the future.

  • Safety Verification of Material Handling Systems Driven by Programmable Logic Controller--Consideration of Physical Behavior of Plants--

    Eiji KONAKA  Tatsuya SUZUKI  Shigeru OKUMA  

     
    PAPER

      Vol:
    E87-A No:4
      Page(s):
    843-849

    The PLC (Programmable Logic Controller) has been widely used in the industrial world as a controller for manufacturing systems, as a process controller and so on. The conventional PLC has been designed and verified as a pure Discrete Event System (DES) by using an abstract model of a controlled plant. In verifying the PLC, however, it is also important to take into account the physical behavior (e.g. dynamics, shape of objects) of the controlled plant in order to guarantee such important factors as safety. This paper presents a new verification technique for the PLC-based control system, which takes into account these physical behaviors, based on a Hybrid Dynamical System (HDS) framework. The other key idea described in the paper is the introduction of the concept of signed distance which not only measures the distance between two objects but also checks whether two objects interfere with each other. The developed idea is applied to illustrative material handling problems, and its usefulness is demonstrated.

  • Fitting Self-Similar Traffic by a Superposition of MMPPs Modeling the Distribution at Multiple Time Scales

    Antonio NOGUEIRA  Paulo SALVADOR  Rui VALADAS  Antonio PACHECO  

     
    PAPER-Fundamental Theories

      Vol:
    E87-B No:3
      Page(s):
    678-688

    Measuring and modeling network traffic is of key importance for the traffic engineering of IP networks, due to the growing diversity of multimedia applications and the need to efficiently support QoS differentiation in the network. Several recent measurements have shown that Internet traffic may incorporate long-range dependence and self-similar characteristics, which can have significant impact on network performance. Self-similar traffic shows variability over many time scales, and this behavior must be taken into account for accurate prediction of network performance. In this paper, we propose a new parameter fitting procedure for a superposition of Markov Modulated Poisson Processes (MMPPs), which is able to capture self-similarity over a range of time scales. The fitting procedure matches the complete distribution of the arrival process at each time scale of interest. We evaluate the procedure by comparing the Hurst parameter, the probability mass function at each time scale, and the queuing behavior (as assessed by the loss probability and average waiting time), corresponding to measured traffic traces and to traces synthesized according to the proposed model. We consider three measured traffic traces, all exhibiting self-similar behavior: the well-known pOct Bellcore trace, a trace of aggregated IP WAN traffic, and a trace corresponding to the popular file sharing application Kazaa. Our results show that the proposed fitting procedure is able to match closely the distribution over the time scales present in data, leading to an accurate prediction of the queuing behavior.

  • Performance Analysis of Flow Loss Probability and Link Utilization in MPLS Networks for Traffic Engineering

    Hitomi TAMURA  Kenji KAWAHARA  Yuji OIE  

     
    PAPER-MPLS

      Vol:
    E87-B No:3
      Page(s):
    579-586

    As the Internet grows, various types of traffic, such as voice, video and data, are transmitted. Therefore, the Internet should provide the Quality of Service (QoS) required by each type of traffic as well as end-to-end connectivity, and routing decisions should be based on the utilization of links/routers and/or the application types of traffic. This kind of routing is called Traffic Engineering (TE), and its objective is to improve such performance factors as flow loss probability for users and the utilization of links for networks, simultaneously. Some studies claim that the Multi-Protocol Label Switching (MPLS) technique can easily implement TE. So far, some experimental results show that TE is effective on a MPLS network; however, its performance has not been theoretically and quantitatively analyzed. Thus, in this paper, we will investigate the basic and preliminary performance of MPLS networks with TE by analyzing flow loss probability and Smoothness index of link utilization in the queueing system.

  • The Basis for an Adaptive IP QoS Management

    Miguel FRANKLIN DE CASTRO  Lela MERGHEM  Dominique GAITI  Abdallah M'HAMED  

     
    PAPER-Congestion Control

      Vol:
    E87-B No:3
      Page(s):
    564-572

    The new Internet has to provide the Quality of Services to converged multimedia services, in which each one may choose its own requirements. Managing such a dynamic network is not an easy task. A more intelligent and adaptive behavior is required from network management. We argue that agents are able to realize this task by dynamically adapting management mechanisms to the current network conditions. This article presents a Behavioral Multi-Agent-based model for QoS-enabled Internet. Based on this behavioral approach, we analyze network management mechanisms (or "elementary behaviors") in terms of performance and applicability profile. We use simulation to observe services performances when submitted to diverse QoS management elementary behaviors.

  • A Significant Property of Mapping Parameters for Signal Interpolation Using Fractal Interpolation Functions

    Satoshi UEMURA  Miki HASEYAMA  Hideo KITAJIMA  

     
    LETTER-Digital Signal Processing

      Vol:
    E87-A No:3
      Page(s):
    748-752

    This letter presents a significant property of the mapping parameters that play a central role to represent a given signal in Fractal Interpolation Functions (FIF). Thanks to our theoretical analysis, it is derived that the mapping parameters required to represent a given signal are also applicable to represent the upsampled signal of a given one. Furthermore, the upsampled signal obtained by using the property represents the self-affine property more distinctly than the given signal. Experiments show the validity and usefulness of the significant property.

  • DCAA: A Dynamic Constrained Adaptive Aggregation Method for Effective Network Traffic Information Summarization

    Kazuhide KOIDE  Glenn Mansfield KEENI  Gen KITAGATA  Norio SHIRATORI  

     
    PAPER-Implementation and Operation

      Vol:
    E87-B No:3
      Page(s):
    413-420

    Online and realtime traffic summarization is a challenge as, except for the routine cases, aggregation parameters or, the flows that need to be observed are not known a priori. Dynamic adaptive aggregation algorithms adapt to the network traffic to detect the important flows. But present day algorithms are inadequate as they often produce inaccurate or meaningless aggregates. In this work we propose a Dynamic Constrained Adaptive Aggregation algorithm that does not produce the meaningless aggregates by using information about the network's configuration. We compare the performance of this algorithm with the erstwhile Dynamic (Unconstrained) Adaptive Aggregation algorithm and show its efficacy. Further we use the network map context that shows the network flows in an intuitive manner. Several applications of the algorithm and network map based visualization are discussed.

  • AFM/STM Observation of C-Au-S Conductive Granular Molecule by Co-operation Process of Plasma CVD and Sputtering

    Mikinori SUZUKI  Md. Abul KASHEM  Shinzo MORITA  

     
    PAPER-Organic-neuro Systems

      Vol:
    E87-C No:2
      Page(s):
    179-182

    AFM/STM observations were performed on sub nm thick C-Au-S film by co-operation process of plasma CVD and sputtering with using CH4, SF6 and Ar mixture gas and Au plate discharge electrode. From the refractive index values, the conductive granular molecules with a size of 0.4-0.6 nm were expected to exist in the film. For the film at thickness similar to the molecular size, Ra (arithmetic mean departures of roughness profile from the mean line) values were measured to be 0.712/6.10 nm by AFM/STM measurement, respectively. The one order large STM Ra value compared to the AFM Ra value suggests that the film contains conductive granular molecules.

  • Affine Invariant Partial Shape Matching by means of Unification and Expansion of Local Correspondences

    Hideo OGAWA  

     
    LETTER-Image Processing, Image Pattern Recognition

      Vol:
    E87-D No:2
      Page(s):
    504-508

    This paper describes a novel method of shape matching by means of unification and expansion of local correspondences on the feature points. The method has the ability to simultaneously locate plural similar parts of two-dimensional objects under affine transformation. Furthermore, the method is applicable to the objects partially occluded. Experimental results show that the method yields results that are satisfactory, even for the cases with additions, deletions and local deviations of some feature points.

  • The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem

    Masakazu SOSHI  Mamoru MAEKAWA  Eiji OKAMOTO  

     
    PAPER-Applications

      Vol:
    E87-A No:1
      Page(s):
    190-203

    The safety problem in access matrix models determines whether a given subject can eventually obtain access privilege to a given object. Generally speaking, the safety problem is, unfortunately undecidable. Not much is known about protection systems for which the safety problem is decidable, except for strongly constrained systems (e.g., monotonic systems). Therefore, we propose the Dynamic-Typed Access Matrix (DTAM) Model, which extends the Typed Access Matrix model of Sandhu by allowing the type of an object to change dynamically. The DTAM model has an advantage that it can describe non-monotonic protection systems for which the safety problem is decidable. In particular, with further restrictions, we can show that the problem becomes NP-hard. In this paper, we formally define the DTAM model and then discuss various aspects of it thoroughly.

521-540hit(873hit)