The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] AF(873hit)

81-100hit(873hit)

  • An 11.37-to-14.8 GHz Low Phase Noise CMOS VCO in Cooperation with a Fast AFC Unit Achieving -195.3 dBc/Hz FoMT

    Youming ZHANG  Kaiye BAO  Xusheng TANG  Fengyi HUANG  Nan JIANG  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E101-C No:12
      Page(s):
    963-966

    This paper describes a broadband low phase noise VCO implemented in 0.13 µm CMOS process. A 1-bit switched varactor and a 4-bit capacitor array are adopted in cooperation with the automatic frequency calibration (AFC) circuit to lower the VCO tuning gain (KVCO), with a measured AFC time of 6 µs. Several noise reduction techniques are exploited to minimize the phase noise of the VCO. Measurement results show the VCO generates a high frequency range from 11.37 GHz to 14.8 GHz with a KVCO of less than 270 MHz/V. The prototype exhibits a phase noise of -114.6 dBc/Hz @ 1 MHz at 14.67 GHz carrier frequency and draws 10.5 mA current from a 1.2 V supply. The achieved figure-of-merits (FoM=-186.9dBc/Hz, FoMT=-195.3dBc/Hz) favorably compares with the state-of-the-art.

  • Deterministic Constructions of Compressed Sensing Matrices Based on Affine Singular Linear Space over Finite Fields

    Gang WANG  Min-Yao NIU  Jian GAO  Fang-Wei FU  

     
    LETTER-Coding Theory

      Vol:
    E101-A No:11
      Page(s):
    1957-1963

    Compressed sensing theory provides a new approach to acquire data as a sampling technique and makes sure that a sparse signal can be reconstructed from few measurements. The construction of compressed sensing matrices is a main problem in compressed sensing theory (CS). In this paper, the deterministic constructions of compressed sensing matrices based on affine singular linear space over finite fields are presented and a comparison is made with the compressed sensing matrices constructed by DeVore based on polynomials over finite fields. By choosing appropriate parameters, our sparse compressed sensing matrices are superior to the DeVore's matrices. Then we use a new formulation of support recovery to recover the support sets of signals with sparsity no more than k on account of binary compressed sensing matrices satisfying disjunct and inclusive properties.

  • Queueing Delay Analysis and Optimization of Statistical Data Aggregation and Transmission Systems

    Hideaki YOSHINO  Kenko OTA  Takefumi HIRAGURI  

     
    PAPER-Network

      Pubricized:
    2018/04/02
      Vol:
    E101-B No:10
      Page(s):
    2186-2195

    Data aggregation, which is the process of summarizing a large amount of data, is an effective method for saving limited communication resources, such as radio frequency and sensor-node energy. Packet aggregation in wireless LAN and sensed-data aggregation in wireless sensor networks are typical examples. We propose and analyze two queueing models of fundamental statistical data aggregation schemes: constant interval and constant aggregation number. We represent each aggregation scheme by a tandem queueing network model with a gate at the aggregation process and a single server queue at a transmission process. We analytically derive the stationary distribution and Laplace-Stieltjes transform of the system time for each aggregation and transmission process and of the total system time. We then numerically evaluate the stationary mean system time characteristics and clarify that each model has an optimal aggregation parameter (i.e., an optimal aggregation interval or optimal aggregation number), that minimizes the mean total system time. In addition, we derive the explicit optimal aggregation parameter for a D/M/1 transmission model with each aggregation scheme and clarify that it provides accurate approximation of that of each aggregation model. The optimal aggregation interval was determined by the transmission rate alone, while the optimal aggregation number was determined by the arrival and transmission rates alone with explicitly derived proportional constants. These results can provide a theoretical basis and a guideline for designing aggregation devices, such as IoT gateways.

  • Averaging Area of Incident Power Density for Human Exposure from Patch Antenna Arrays

    Daisuke FUNAHASHI  Takahiro ITO  Akimasa HIRATA  Takahiro IYAMA  Teruo ONISHI  

     
    BRIEF PAPER

      Vol:
    E101-C No:8
      Page(s):
    644-646

    This study discusses an area-averaged incident power density to estimate surface temperature elevation from patch antenna arrays with 4 and 9 elements at the frequencies above 10 GHz. We computationally demonstrate that a smaller averaging area (1 cm2) of power density should be considered at the frequency of 30 GHz or higher compared with that at lower frequencies (4 cm2).

  • Safety Technologies in Autonomous Decentralized Railway Control System and its Future Studies Open Access

    Shinichi RYOKI  Takashi KUNIFUJI  Toshihiro ITOH  

     
    INVITED PAPER

      Pubricized:
    2018/02/22
      Vol:
    E101-B No:8
      Page(s):
    1768-1774

    Along with the sophistication of society, the requirements for infrastructure systems are also becoming more sophisticated. Conventionally, infrastructure systems have been accepted if they were safe and stable, but nowadays they are required for serviceability as a matter of course. For this reason, not only the expansion of the scope of the control system but also the integration with the information service system has been frequently carried out. In this paper, we describe safety technology based on autonomous decentralized technology as one of the measures to secure safety in a control system integrating such information service functions. And we propose its future studies.

  • Detecting Unsafe Raw Pointer Dereferencing Behavior in Rust

    Zhijian HUANG  Yong Jun WANG  Jing LIU  

     
    LETTER-Dependable Computing

      Pubricized:
    2018/05/14
      Vol:
    E101-D No:8
      Page(s):
    2150-2153

    The rising systems programming language Rust is fast, efficient and memory safe. However, improperly dereferencing raw pointers in Rust causes new safety problems. In this paper, we present a detailed analysis into these problems and propose a practical hybrid approach to detecting unsafe raw pointer dereferencing behaviors. Our approach employs pattern matching to identify functions that can be used to generate illegal multiple mutable references (We define them as thief function) and instruments the dereferencing operation in order to perform dynamic checking at runtime. We implement a tool named UnsafeFencer and has successfully identified 52 thief functions in 28 real-world crates*, of which 13 public functions are verified to generate multiple mutable references.

  • Adaptive Bundle Flow Management for Reducing Control Traffic on SDN-Enabled Multi-Radio Wireless Networks

    Yuzo TAENAKA  Kazuki MIZUYAMA  Kazuya TSUKAMOTO  

     
    PAPER-Network

      Pubricized:
    2018/01/18
      Vol:
    E101-B No:7
      Page(s):
    1685-1692

    Applying Software Defined Network (SDN) technology to wireless networks are attracting much attention. Our previous study proposed a channel utilization method based on SDN/OpenFlow technology to improve the channel utilization efficiency of the multi-channel wireless backhaul network (WBN). However, since control messages are inherently transmitted with data traffic on a same channel in WBN, it inevitably degrades the network capacity. Specifically, the amount of control messages for collecting statistical information of each flow (FlowStats) linearly increases with the number of ongoing flows, thereby being the dominant overhead for backhaul networks. In this paper, we propose a new method that prevents the increase of control traffic while retaining the network performance of the previous method. Our proposed method uses statistical information of each interface (PortStats) instead of per-flow information (FlowStats), and handles multiple flows on the interface together if possible. Otherwise, to handle individual flow, we propose a way to estimate per-flow information without introducing extra control messages. Finally, we show that the proposed method offers the same performance with the previous method, while greatly reducing the amount of control traffic.

  • On the Feasibility of an Adaptive Movable Access Point System in a Static Indoor WLAN Environment

    Tomoki MURAKAMI  Shingo OKA  Yasushi TAKATORI  Masato MIZOGUCHI  Fumiaki MAEHARA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/01/10
      Vol:
    E101-B No:7
      Page(s):
    1693-1700

    This paper investigates an adaptive movable access point (AMAP) system and explores its feasibility in a static indoor classroom environment with an applied wireless local area network (WLAN) system. In the AMAP system, the positions of multiple access points (APs) are adaptively moved in accordance with clustered user groups, which ensures effective coverage for non-uniform user distributions over the target area. This enhances the signal to interference and noise power ratio (SINR) performance. In order to derive the appropriate AP positions, we utilize the k-means method in the AMAP system. To accurately estimate the position of each user within the target area for user clustering, we use the general methods of received signal strength indicator (RSSI) or time of arrival (ToA), measured by the WLAN systems. To clarify the basic effectiveness of the AMAP system, we first evaluate the SINR performance of the AMAP system and a conventional fixed-position AP system with equal intervals using computer simulations. Moreover, we demonstrate the quantitative improvement of the SINR performance by analyzing the ToA and RSSI data measured in an indoor classroom environment in order to clarify the feasibility of the AMAP system.

  • Source-Side Detection of DRDoS Attack Request with Traffic-Aware Adaptive Threshold

    Sinh-Ngoc NGUYEN  Van-Quyet NGUYEN  Giang-Truong NGUYEN  JeongNyeo KIM  Kyungbaek KIM  

     
    LETTER-Information Network

      Pubricized:
    2018/03/12
      Vol:
    E101-D No:6
      Page(s):
    1686-1690

    Distributed Reflective Denial of Services (DRDoS) attacks have gained huge popularity and become a major factor in a number of massive cyber-attacks. Usually, the attackers launch this kind of attack with small volume of requests to generate a large volume of attack traffic aiming at the victim by using IP spoofing from legitimate hosts. There have been several approaches, such as static threshold based approach and confirmation-based approach, focusing on DRDoS attack detection at victim's side. However, these approaches have significant disadvantages: (1) they are only passive defences after the attack and (2) it is hard to trace back the attackers. To address this problem, considerable attention has been paid to the study of detecting DRDoS attack at source side. Because the existing proposals following this direction are supposed to be ineffective to deal with small volume of attack traffic, there is still a room for improvement. In this paper, we propose a novel method to detect DRDoS attack request traffic on SDN(Software Defined Network)-enabled gateways in the source side of attack traffic. Our method adjusts the sampling rate and provides a traffic-aware adaptive threshold along with the margin based on analysing observed traffic behind gateways. Experimental results show that the proposed method is a promising solution to detect DRDoS attack request in the source side.

  • Relay Selection Scheme Based on Path Throughput for Device-to-Device Communication in Public Safety LTE

    Taichi OHTSUJI  Kazushi MURAOKA  Hiroaki AMINAKA  Dai KANETOMO  Yasuhiko MATSUNAGA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2017/11/13
      Vol:
    E101-B No:5
      Page(s):
    1319-1327

    Public safety networks need to more effectively meet the increasing demands for images or videos to be shared among first responders and incident commanders. Long term evolution (LTE) networks are considered to be candidates to achieve such broadband services. Capital expenditures in deploying base stations need to be decreased to introduce LTE for public safety. However, out-of-coverage areas tend to occur in cell edge areas or inside buildings because the cell areas of base stations for public safety networks are larger than those for commercial networks. The 3rd Generation Partnership Program (3GPP) in Release 13 has investigated device-to-device (D2D) based relay communication as a means to fill out-of-coverage areas in public safety LTE (PS-LTE). This paper proposes a relay selection scheme based on effective path throughput from an out-of-coverage terminal to a base station via an in-coverage relay terminal, which enables the optimal relay terminal to be selected. System level simulation results assuming on radii of 20km or less revealed that the proposed scheme could provide better user ratios that satisfied the throughput requirements for video transmission than the scheme standardized in 3GPP. Additionally, an evaluation that replicates actual group of fire-fighters indicated that the proposed scheme enabled 90% of out-of-coverage users to achieve the required throughput, i.e., 1.0Mbps, to transmit video images.

  • Robust Variable Step-Size Affine Projection SAF Algorithm against Impulsive Noises

    Jae-hyeon JEON  Sang Won NAM  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:5
      Page(s):
    844-847

    In this Letter, a robust variable step-size affine-projection subband adaptive filter algorithm (RVSS-APSAF) is proposed, whereby a band-dependent variable step-size is introduced to improve convergence and misalignment performances in impulsive noise environments. Specifically, the weight vector is adaptively updated to achieve robustness against impulsive noises. Finally, the proposed RVSS-APSAF algorithm is tested for system identification in an impulsive noise environment.

  • Detecting Malware-Infected Devices Using the HTTP Header Patterns

    Sho MIZUNO  Mitsuhiro HATADA  Tatsuya MORI  Shigeki GOTO  

     
    PAPER-Information Network

      Pubricized:
    2018/02/08
      Vol:
    E101-D No:5
      Page(s):
    1370-1379

    Damage caused by malware has become a serious problem. The recent rise in the spread of evasive malware has made it difficult to detect it at the pre-infection timing. Malware detection at post-infection timing is a promising approach that fulfills this gap. Given this background, this work aims to identify likely malware-infected devices from the measurement of Internet traffic. The advantage of the traffic-measurement-based approach is that it enables us to monitor a large number of endhosts. If we find an endhost as a source of malicious traffic, the endhost is likely a malware-infected device. Since the majority of malware today makes use of the web as a means to communicate with the C&C servers that reside on the external network, we leverage information recorded in the HTTP headers to discriminate between malicious and benign traffic. To make our approach scalable and robust, we develop the automatic template generation scheme that drastically reduces the amount of information to be kept while achieving the high accuracy of classification; since it does not make use of any domain knowledge, the approach should be robust against changes of malware. We apply several classifiers, which include machine learning algorithms, to the extracted templates and classify traffic into two categories: malicious and benign. Our extensive experiments demonstrate that our approach discriminates between malicious and benign traffic with up to 97.1% precision while maintaining the false positive rate below 1.0%.

  • Detecting Regularities of Traffic Signal Timing Using GPS Trajectories

    Juan YU  Peizhong LU  Jianmin HAN  Jianfeng LU  

     
    PAPER-Technologies for Knowledge Support Platform

      Pubricized:
    2018/01/19
      Vol:
    E101-D No:4
      Page(s):
    956-963

    Traffic signal phase and timing (TSPaT) information is valuable for various applications, such as velocity advisory systems, navigation systems, collision warning systems, and so forth. In this paper, we focus on learning baseline timing cycle lengths for fixed-time traffic signals. The cycle length is the most important parameter among all timing parameters, such as green lengths. We formulate the cycle length learning problem as a period estimation problem using a sparse set of noisy observations, and propose the most frequent approximate greatest common divisor (MFAGCD) algorithms to solve the problem. The accuracy performance of our proposed algorithms is experimentally evaluated on both simulation data and the real taxi GPS trajectory data collected in Shanghai, China. Experimental results show that the MFAGCD algorithms have better sparsity and outliers tolerant capabilities than existing cycle length estimation algorithms.

  • A Data Fusion-Based Fire Detection System

    Ying-Yao TING  Chi-Wei HSIAO  Huan-Sheng WANG  

     
    PAPER-Technologies for Knowledge Support Platform

      Pubricized:
    2018/01/19
      Vol:
    E101-D No:4
      Page(s):
    977-984

    To prevent constraints or defects of a single sensor from malfunctions, this paper proposes a fire detection system based on the Dempster-Shafer theory with multi-sensor technology. The proposed system operates in three stages: measurement, data reception and alarm activation, where an Arduino is tasked with measuring and interpreting the readings from three types of sensors. Sensors under consideration involve smoke, light and temperature detection. All the measured data are wirelessly transmitted to the backend Raspberry Pi for subsequent processing. Within the system, the Raspberry Pi is used to determine the probability of fire events using the Dempster-Shafer theory. We investigate moderate settings of the conflict coefficient and how it plays an essential role in ensuring the plausibility of the system's deduced results. Furthermore, a MySQL database with a web server is deployed on the Raspberry Pi for backlog and data analysis purposes. In addition, the system provides three notification services, including web browsing, smartphone APP, and short message service. For validation, we collected the statistics from field tests conducted in a controllable and safe environment by emulating fire events happening during both daytime and nighttime. Each experiment undergoes the No-fire, On-fire and Post-fire phases. Experimental results show an accuracy of up to 98% in both the No-fire and On-fire phases during the daytime and an accuracy of 97% during the nighttime under reasonable conditions. When we take the three phases into account, the accuracy in the daytime and nighttime increase to 97% and 89%, respectively. Field tests validate the efficiency and accuracy of the proposed system.

  • Block-Matching-Based Implementation of Affine Motion Estimation for HEVC

    Chihiro TSUTAKE  Toshiyuki YOSHIDA  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2018/01/15
      Vol:
    E101-D No:4
      Page(s):
    1151-1158

    Many of affine motion compensation techniques proposed thus far employ least-square-based techniques in estimating affine parameters, which requires a hardware structure different from conventional block-matching-based one. This paper proposes a new affine motion estimation/compensation framework friendly to block-matching-based parameter estimation, and applies it to an HEVC encoder to demonstrate its coding efficiency and computation cost. To avoid a nest of search loops, a new affine motion model is first introduced by decomposing the conventional 4-parameter affine model into two 3-parameter ones. Then, a block-matching-based fast parameter estimation technique is proposed for the models. The experimental results given in this paper show that our approach is advantageous over conventional techniques.

  • An Efficient Parallel Coding Scheme in Erasure-Coded Storage Systems

    Wenrui DONG  Guangming LIU  

     
    PAPER-Computer System

      Pubricized:
    2017/12/12
      Vol:
    E101-D No:3
      Page(s):
    627-643

    Erasure codes have been considered as one of the most promising techniques for data reliability enhancement and storage efficiency in modern distributed storage systems. However, erasure codes often suffer from a time-consuming coding process which makes them nearly impractical. The opportunity to solve this problem probably rely on the parallelization of erasure-code-based application on the modern multi-/many-core processors to fully take advantage of the adequate hardware resources on those platforms. However, the complicated data allocation and limited I/O throughput pose a great challenge on the parallelization. To address this challenge, we propose a general multi-threaded parallel coding approach in this work. The approach consists of a general multi-threaded parallel coding model named as MTPerasure, and two detailed parallel coding algorithms, named as sdaParallel and ddaParallel, respectively, adapting to different I/O circumstances. MTPerasure is a general parallel coding model focusing on the high level data allocation, and it is applicable for all erasure codes and can be implemented without any modifications of the low level coding algorithms. The sdaParallel divides the data into several parts and the data parts are allocated to different threads statically in order to eliminate synchronization latency among multiple threads, which improves the parallel coding performance under the dummy I/O mode. The ddaParallel employs two threads to execute the I/O reading and writing on the basis of small pieces independently, which increases the I/O throughput. Furthermore, the data pieces are assigned to the coding thread dynamically. A special thread scheduling algorithm is also proposed to reduce thread migration latency. To evaluate our proposal, we parallelize the popular open source library jerasure based on our approach. And a detailed performance comparison with the original sequential coding program indicates that the proposed parallel approach outperforms the original sequential program by an extraordinary speedups from 1.4x up to 7x, and achieves better utilization of the computation and I/O resources.

  • Separating Predictable and Unpredictable Flows via Dynamic Flow Mining for Effective Traffic Engineering Open Access

    Yousuke TAKAHASHI  Keisuke ISHIBASHI  Masayuki TSUJINO  Noriaki KAMIYAMA  Kohei SHIOMOTO  Tatsuya OTOSHI  Yuichi OHSITA  Masayuki MURATA  

     
    PAPER-Internet

      Pubricized:
    2017/08/07
      Vol:
    E101-B No:2
      Page(s):
    538-547

    To efficiently use network resources, internet service providers need to conduct traffic engineering that dynamically controls traffic routes to accommodate traffic change with limited network resources. The performance of traffic engineering (TE) depends on the accuracy of traffic prediction. However, the size of traffic change has been drastically increasing in recent years due to the growth in various types of network services, which has made traffic prediction difficult. Our approach to tackle this issue is to separate traffic into predictable and unpredictable parts and to apply different control policies. However, there are two challenges to achieving this: dynamically separating traffic according to predictability and dynamically controlling routes for each separated traffic part. In this paper, we propose a macroflow-based TE scheme that uses different routing policies in accordance with traffic predictability. We also propose a traffic-separation algorithm based on real-time traffic analysis and a framework for controlling separated traffic with software-defined networking technology, particularly OpenFlow. An evaluation of actual traffic measured in an Internet2 network shows that compared with current TE schemes the proposed scheme can reduce the maximum link load by 34% (at the most congested time) and the average link load by an average of 11%.

  • A Waffle-Iron Ridge Guide with Combined Fast- and Slow-Wave Modes for Array Antenna Applications

    Hideki KIRINO  Kazuhiro HONDA  Kun LI  Koichi OGAWA  

     
    PAPER-Antennas

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    349-356

    A new Waffle-iron Ridge Guide (WRG) structure that has the ability to control both wavelength and impedance is proposed. With the proposed structure, not only can the wavelength be controlled over a wide range for both fast- and slow-waves in free space but the impedance can also be controlled. These features can improve the performance of array antennas in terms of reducing grating lobes and side lobes. In this paper, we discuss and evaluate a design scheme using equivalent circuits and EM-simulation. This paper also discusses how the conductivity and dielectric loss in the WRG affect the total gain of the array antenna.

  • Safe-Region Generation Method for Versatile Continuous Vicinity Queries in the Road Network Distance

    Tin Nilar WIN  Htoo HTOO  Yutaka OHSAWA  

     
    PAPER-Intelligent Transport System

      Vol:
    E101-A No:2
      Page(s):
    472-480

    This paper proposes a fast safe-region generation method for several kinds of vicinity queries including set k nearest neighbor (NN) queries, ordered kNN queries, reverse kNN queries, and distance range queries. When a user is driving a car on a road network, he/she wants to know about objects located in the vicinity of the car. However, the result changes according to the movement of the car, and therefore, the user needs to request up-to-date result to the server. On the other hand, frequent requests for up-to-date results cause heavy loadings on the server. To cope with this problem efficiently, the idea of the safe-region has been proposed, however, it takes long processing time in existing works. This paper proposes a fast generation method of the safe-region applicable to several types of vicinity queries. Through experimental evaluations, we demonstrate that the proposed method outperforms the existing algorithms in the processing time by one or two orders of magnitude.

  • Design Study of Domain Decomposition Operation in Dataflow Architecture FDTD/FIT Dedicated Computer

    Hideki KAWAGUCHI  

     
    PAPER-Electromagnetic Theory

      Vol:
    E101-C No:1
      Page(s):
    20-25

    To aim to achieve a high-performance computation for microwave simulations with low cost, small size machine and low energy consumption, a method of the FDTD dedicated computer has been investigated. It was shown by VHDL logical circuit simulations that the FDTD dedicated computer with a dataflow architecture has much higher performance than that of high-end PC and GPU. Then the remaining task of this work is large scale computations by the dedicated computer, since microwave simulations for only 18×18×Z grid space (Z is the number of girds for z direction) can be executed in a single FPGA at most. To treat much larger numerical model size for practical applications, this paper considers an implementation of a domain decomposition method operation of the FDTD dedicated computer in a single FPGA.

81-100hit(873hit)