The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

3581-3600hit(18690hit)

  • Link-Adaptable Vector-Perturbation ZFBF Precoder for Multi-Point 3D-Beamformers Open Access

    Masaaki FUJII  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1648-1654

    A link adaptation scheme is devised for vector-perturbation (VP) zero-forcing beamforming (ZFBF) MIMO precoding and a link-adaptable VP-ZFBF precoder is applied to multi-point three-dimensional (3D) beamformers to be used in mmWave-band wireless access systems. Channel coding schemes used in current systems, e.g., turbo codes, possess systematic code structures. The VP gain can thus be predicted by searching for perturbation vectors for the symbol vectors mapped from information bits. On the basis of this principle, we constructed an efficient iterative modulation-and-coding-set (MCS) selection procedure for VP-ZFBF precoding. Simulation results demonstrate that our proposed scheme suitably passed on the VP gain to the selection of an appropriate higher-rate MCS index and thus achieved high throughputs by incorporating with multi-point 3D-beamformers.

  • A Graphical Game Theoretic Approach to Optimization of Energy Efficiency in Multihop Wireless Sensor Networks

    Hui JING  Hitoshi AIDA  

    This paper was deleted on February 16, 2024 because it was found to be a a illegal submission (see details in the pdf file).
     
    PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1789-1798

    Recently, multihop wireless sensor networks (WSNs) are widely developed and applied to energy efficient data collections from environments by establishing reliable transmission radio links and employing data aggregation algorithms, which can eliminate redundant transmissions and provide fusion information. In this paper, energy efficiency which consists of not only energy consumptions but also the amount of received data by the base station, as the performance metric to evaluate network utilities is presented for achieving energy efficient data collections. In order to optimize energy efficiency for improvements of network utilization, we firstly establish a graphical game theoretic model for energy efficiency in multihop WSNs, considering message length, practical energy consumptions and packet success probabilities. Afterwards, we propose a graphical protocol for performance optimization from Nash equilibrium of the graphical game theory. The approach also consists of the distributed protocol for generating optimum tree networks in practical WSNs. The experimental results show energy efficient multihop communications can be achieved by optimum tree networks of the approach. The quantitative evaluation and comparisons with related work are presented for the metric with respect to network energy consumptions and the amount of received data by the base station. The performances of our proposal are improved in all experiments. As an example, our proposal can achieve up to about 52% energy efficiency more than collection tree protocol (CTP). The corresponding tree structure is provided for the experiment.

  • Multi-Cell Structure Backscatter Based Wireless-Powered Communication Network (WPCN)

    Shin Hyuk CHOI  Dong In KIM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1687-1696

    In this paper, we propose a multi-cell structure backscatter based wireless-powered communication network (WPCN) where a number of backscatter cells are locally separated, each containing a subset of users around a carrier emitter. The multi-cell structure backscatter based WPCN can be implemented in two ways, namely time-division multiplexing (TDM) and frequency-division multiplexing (FDM). Here users harvest energy from the carrier signal transmitted by the carrier emitter, and then transmit their own information in a passive way via the reflection of the carrier signal using frequency-shift keying modulation. We characterize the energy-free condition and the signal-to-noise ratio (SNR) outage zone in a backscatter based WPCN. Also, a backscatter based harvest-then-transmit protocol is adopted to maximize the sum-throughput of all users by optimally allocating time for energy harvesting and information transmission. Numerical results demonstrate that the backscatter based WPCN ensures an increased long-range coverage and a diminished SNR outage zone compared to conventional radio based WPCNs. Also, comparing the two types of multi-cell structure backscatter based WPCN, TDM within each backscatter cell and FDM across backscatter cells versus FDM within each backscatter cell and TDM across backscatter cells, numerical results confirm that which one yields a better performance.

  • BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks

    Jinli RAO  Zhangqing HE  Shu XU  Kui DAI  Xuecheng ZOU  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2002-2009

    Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.

  • SNGR: Scalable Name-Based Geometric Routing for ICN

    Yanbin SUN  Yu ZHANG  Binxing FANG  Hongli ZHANG  

     
    PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1835-1845

    Information-Centric Networking (ICN) treats contents as first class citizens and adopts name-based routing for content distribution and retrieval. Content names rather than IP addresses are directly used for routing. However, due to the location-independent naming and the huge namespace, name-based routing faces scalability and efficiency issues including large routing tables and high path stretches. This paper proposes a universal Scalable Name-based Geometric Routing scheme (SNGR), which is a careful synthesis of geometric routing and name resolution. To provide scalable and efficient underlying routing, a universal geometric routing framework (GRF) is proposed. Any geometric routing scheme can be used directly for name resolution based on GRF. To implement an overlay name resolution system, SNGR utilizes a bi-level grouping design. With this design, a resolution node that is close to the consumer can always be found. Our theoretical analyses guarantee the performance of SNGR, and experiments show that SNGR outperforms similar routing schemes in terms of node state, path stretch, and reliability.

  • Adaptive Interference-Aware Receiver for Multiuser MIMO Downlink Transmission in IEEE 802.11ac Wireless LAN Systems

    Minjoon KIM  Yunho JUNG  Jaeseok KIM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1884-1893

    This paper presents an adaptive interference-aware receiver for multiuser multiple-input multiple-output (MU-MIMO) downlink systems in wireless local area network (WLAN) systems. The MU-MIMO downlink technique is one of the key techniques that are newly applied to WLAN systems in order to support a very high throughput. However, the simultaneous communication of several users causes inter-user interference (IUI), which adversely affects receivers. Therefore, in order to prevent IUI, a precoding technique is defined at the transmitter based on feedback from the receiver. Unfortunately, however, the receiver still suffers from interference, because the precoding technique is prone to practical errors from the feedback quantization and subcarrier grouping scheme. Whereas ordinary detection schemes are available to mitigate such interference, such schemes are unsuitable because of their low performance or high computational complexity. In this paper, we propose an switching algorithm based on the norm ratio between an effective channel matrix for the desired signal and that of the interfering signals. Simulation results based on the IEEE 802.11ac standard show that the proposed algorithm can achieve near-optimal performance with a 70% reduction in computational complexity.

  • Proposal of a Simple Ultra-Low Contention CD ROADM

    Ayako IWAKI  Akio SAHARA  Mitsunori FUKUTOKU  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E99-B No:8
      Page(s):
    1772-1779

    We propose a simple configuration for colorless and directionless (CD) reconfigurable optical add/drop multiplexers that enables ultra-low contention add/drop operation to be achieved. In the configuration, we apply a combination of multiple small-port-count CD add/drop banks (CD banks) and round-robin CD bank assignment. Evaluation results show that the proposed configuration can substantially reduce intra-node contention rate, which is less than 0.1%. We also find that the proposed configuration can improve the utilization efficiency of wavelength resources and transponders. We discuss the mechanism of how the proposed configuration reduces intra-node contention by analyzing the status of wavelength assignments in direction ports and CD banks.

  • Hough Transform-Based Clock Skew Measurement by Dynamically Locating the Region of Offset Majority

    Komang OKA SAPUTRA  Wei-Chung TENG  Takaaki NARA  

     
    PAPER-Information Network

      Pubricized:
    2016/05/19
      Vol:
    E99-D No:8
      Page(s):
    2100-2108

    A network-based remote host clock skew measurement involves collecting the offsets, the differences between sending and receiving times, of packets from the host within a period of time. Although the variant and immeasurable delay in each packet prevents the measurer from getting the real clock offset, the local minimum delays and the majority of delays delineate the clock offset shifts, and are used by existing approaches to estimate the skew. However, events during skew measurement like time synchronization and rerouting caused by switching network interface or base transceiver station may break the trend into multi-segment patterns. Although the skew in each segment is theoretically of the same value, the skew derived from the whole offset-set usually differs with an error of unpredictable scale. In this work, a method called dynamic region of offset majority locating (DROML) is developed to detect multi-segment cases, and to precisely estimate the skew. DROML is designed to work in real-time, and it uses a modified version of the HT-based method [8] both to measure the skew of one segment and to detect the break between adjacent segments. In the evaluation section, the modified HT-based method is compared with the original method and with a linear programming algorithm (LPA) on accumulated-time and short-term measurement. The fluctuation of the modified method in the short-term experiment is 0.6 ppm (parts per million), which is obviously less than the 1.23 ppm and 1.45 ppm from the other two methods. DROML, when estimating a four-segment case, is able to output a skew of only 0.22 ppm error, compared with the result of the normal case.

  • Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems

    Min SHAO  Min S. KIM  Victor C. VALGENTI  Jungkeun PARK  

     
    PAPER-Information Network

      Pubricized:
    2016/05/13
      Vol:
    E99-D No:8
      Page(s):
    2090-2099

    Network Intrusion Detection Systems (NIDS) are deployed to protect computer networks from malicious attacks. Proper evaluation of NIDS requires more scrutiny than the evaluation for general network appliances. This evaluation is commonly performed by sending pre-generated traffic through the NIDS. Unfortunately, this technique is often limited in diversity resulting in evaluations incapable of examining the complex data structures employed by NIDS. More sophisticated methods that generate workload directly from NIDS rules consume excessive resources and are incapable of running in real-time. This work proposes a novel approach to real-time workload generation for NIDS evaluation to improve evaluation diversity while maintaining much higher throughput. This work proposes a generative grammar which represents an optimized version of a context-free grammar derived from the set of strings matching to the given NIDS rule database. The grammar is memory-efficient and computationally light when generating workload. Experiments demonstrate that grammar-generated workloads exert an order of magnitude more effort on the target NIDS. Even better, this improved diversity comes at much smaller cost in memory and speeds four times faster than current approaches.

  • Proactive Handover Based on Human Blockage Prediction Using RGB-D Cameras for mmWave Communications

    Yuta OGUMA  Takayuki NISHIO  Koji YAMAMOTO  Masahiro MORIKURA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:8
      Page(s):
    1734-1744

    To substantially alleviate the human blockage problem in mmWave communications, this paper proposes a proactive handover system based on human blockage prediction using RGB and depth (RGB-D) cameras. The proposed scheme uses RGB-D camera images to estimate the mobility of pedestrians and to predict when blockage will occur. On the basis of this information, the proposed system transfers a mobile station (STA) communicating with one wireless BS (base station) to another BS before human blockage occurs and thus avoids blockage-induced throughput degradation. This paper presents performance modeling of both proactive handover scheme and reactive handover scheme which is based on the received power level. A numerical evaluation reveals conditions under which the proactive handover scheme achieves higher spectral efficiency compared to reactive scheme. In addition, using IEEE 802.11ad-based wireless local area network (WLAN) devices, a testbed for implementing the proposed system is built. The innovative experimental results demonstrate that the proactive handover system can considerably reduce the duration of human blockage-induced degradation of throughput performance relative to the reactive scheme.

  • Energy Efficient Macrocell Strategy: Opportunistic Beamforming with Femtocells Deployment Based on Hourly User Location Distribution

    Nur Ellina Binti ISHAK  Eiji KAMIOKA  

     
    PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1706-1717

    In the conventional cellular macrocell implementation strategy, the main base station transmits the radio signals in the omnidirectional manner in order to provide a wide range of cellular transmission to the users. In reality, however, the users move from one place to another depending on their activities, hence, sometimes this creates areas where no user exists inside the macrocell. Nevertheless, the base station continues to transmit the radio signals to all the coverage areas due to its involuntary manner, thus causing waste of energy. In our previous work, an energy efficient LTE macrocell base station scheme based on hourly user location distribution, which utilized opportunistic beamforming, was proposed in order to provide the cellular transmission only to the area where the user density is high. The drawback of this scheme was that there were many users who cannot receive the cellular transmission because of the limitation of the beamforming shape. In this paper, to overcome this difficulty, a new energy efficient macrocell strategy will be proposed. Here, additional low power consumption femtocell access points are deployed inside the macrocell to support the energy efficient opportunistic beamforming based on the hourly user location distribution. Concretely, the femtocell access points are woken up only when the active calling users exist inside its range. The proposed new strategy will be evaluated in terms of the hourly successful calling user ratio, the total power consumption and the hourly average downlink throughput compared with the previously proposed beamforming transmission strategy and the conventional omnidirectional transmission. The results will show the effectiveness of the proposed strategy in providing an energy efficient cellular macrocell system with high quality cellular services.

  • Modelling Load Balancing Mechanisms in Self-Optimising 4G Mobile Networks with Elastic and Adaptive Traffic

    Mariusz GŁĄBOWSKI  Sławomir HANCZEWSKI  Maciej STASIAK  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:8
      Page(s):
    1718-1726

    This article describes an approximate model of a group of cells in the wireless 4G network with implemented load balancing mechanism. An appropriately modified model of Erlang's Ideal Grading is used to model this group of cells. The model makes it possible to take into account limited availability of resources of individual cells to multi-rate elastic and adaptive traffic streams generated by Erlang and Engset sources. The developed solution allows the basic traffic characteristics in the considered system to be determined, i.e. the occupancy distribution and the blocking probability. Because of the approximate nature of the proposed model, the results obtained based on the model were compared with the results of a digital simulation. The present study validates the adopted assumptions of the proposed model.

  • Real-Time Joint Channel and Hyperparameter Estimation Using Sequential Monte Carlo Methods for OFDM Mobile Communications

    Junichiro HAGIWARA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1655-1668

    This study investigates a real-time joint channel and hyperparameter estimation method for orthogonal frequency division multiplexing mobile communications. The channel frequency response of the pilot subcarrier and its fixed hyperparameters (such as channel statistics) are estimated using a Liu and West filter (LWF), which is based on the state-space model and sequential Monte Carlo method. For the first time, to our knowledge, we demonstrate that the conventional LWF biases the hyperparameter due to a poor estimate of the likelihood caused by overfitting in noisy environments. Moreover, this problem cannot be solved by conventional smoothing techniques. For this, we modify the conventional LWF and regularize the likelihood using a Kalman smoother. The effectiveness of the proposed method is confirmed via numerical analysis. When both of the Doppler frequency and delay spread hyperparameters are unknown, the conventional LWF significantly degrades the performance, sometimes below that of least squares estimation. By avoiding the hyperparameter estimation failure, our method outperforms the conventional approach and achieves good performance near the lower bound. The coding gain in our proposed method is at most 10 dB higher than that in the conventional LWF. Thus, the proposed method improves the channel and hyperparameter estimation accuracy. Derived from mathematical principles, our proposal is applicable not only to wireless technology but also to a broad range of related areas such as machine learning and econometrics.

  • Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems

    Guangquan XU  Yuanyuan REN  Yuanbin HAN  Xiaohong LI  Zhiyong FENG  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2019-2026

    With the rapid development of Internet of things (IoT), Radio Frequency Identification (RFID) has become one of the most significant information technologies in the 21st century. However, more and more privacy threats and security flaws have been emerging in various vital RFID systems. Traditional RFID systems only focus attention on foundational implementation, which lacks privacy protection and effective identity authentication. To solve the privacy protection problem this paper proposes a privacy protection method with a Privacy Enhancement Model for RFID (PEM4RFID). PEM4RFID utilizes a “2+2” identity authentication mechanism, which includes a Two-Factor Authentication Protocol (TFAP) based on “two-way authentication”. Our TFAP employs “hardware information + AES-ECC encryption”, while the ”“two-way authentication” is based on improved Combined Public Key (CPK). Case study shows that our proposed PEM4RFID has characteristics of untraceability and nonrepeatability of instructions, which realizes a good trade-off between privacy and security in RFID systems.

  • Design and Deployment of Enhanced VNode Infrastructure — Deeply Programmable Network Virtualization Open Access

    Kazuhisa YAMADA  Akihiro NAKAO  Yasusi KANADA  Yoshinori SAIDA  Koichiro AMEMIYA  Yuki MINAMI  

     
    INVITED PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1629-1637

    We introduce the design and deployment of the latest version of the VNode infrastructure, VNode-i. We present new extended VNode-i functions that offer high performance and provide convenient deep programmability to network developers. We extend resource abstraction to the transport network and achieve highly precise slice measurement for resource elasticity. We achieve precise resource isolation for VNode-i. We achieve coexistence of high performance and programmability. We also enhance AGW functions. In addition, we extend network virtualization from the core network to edge networks and terminals. In evaluation experiments, we deploy the enhanced VNode-i on the JGN-X testbed and evaluate its performance. We successfully create international federation slices across VNode-i, GENI, and Fed4FIRE. We also present experimental results on video streaming on a federated slice across VNode-i and GENI. Testbed experiments confirm the practicality of the enhanced VNode-i.

  • Data Association in Bistatic MIMO of T/R-R Mode: Basis Decision and Performance Analysis

    Xiang DUAN  Zishu HE  Hongming LIU  Jun LI  

     
    PAPER-Digital Signal Processing

      Vol:
    E99-A No:8
      Page(s):
    1567-1575

    Bistatic multi-input multi-output (MIMO) radar has the capability of measuring the transmit angle from the receiving array, which means the existence of information redundancy and benefits data association. In this paper, a data association decision for bistatic MIMO radar is proposed and the performance advantages of bistatic MIMO radar in data association is analyzed and evaluated. First, the parameters obtained by receiving array are sent to the association center via coordinate conversion. Second, referencing the nearest neighbor association (NN) algorithm, an improved association decision is proposed with the transmit angle and target range as association statistics. This method can evade the adverse effects of the angle system errors to data association. Finally, data association probability in the presence of array directional error is derived and the correctness of derivation result is testified via Monte Carlo simulation experiments. Besides that performance comparison with the conventional phased array radar verifies the excellent performance of bistatic MIMO Radar in data association.

  • Numerical Evaluation of Effect of Using UTM Grid Maps on Emergency Response Performance — A Case of Information-Processing Training at an Emergency Operation Center in Tagajo City, Miyagi Prefecture —

    Shosuke SATO  Rui NOUCHI  Fumihiko IMAMURA  

     
    LETTER

      Vol:
    E99-A No:8
      Page(s):
    1560-1566

    It is qualitatively considered that emergency information processing by using UTM grids is effective in generating COP (Common Operational Pictures). Here, we conducted a numerical evaluation based on emergency information-processing training to examine the efficiency of the use of UTM grid maps by staff at the Tagajo City Government office. The results of the demonstration experiment were as follows: 1) The time required for information propagation and mapping with UTM coordinates was less than that with address text consisting of area name and block number. 2) There was no measurable difference in subjective estimates of the training performance of participants with or without the use of UTM grids. 3) Fear of real emergency responses decreased among training participants using UTM grids. 4) Many of the negative free answers on a questionnaire evaluation of participants involved requests regarding the reliability and operability of UTM tools.

  • Necessary Conditions for θ-Stability of Real Polynomials

    Younseok CHOO  

     
    LETTER-Systems and Control

      Vol:
    E99-A No:8
      Page(s):
    1628-1631

    In this letter we present some easily checkable necessary conditions for a polynomial with positive coefficients to have all its zeros in a prescribed sector in the left half of the complex plane. As an auxiliary result, we also obtain a new necessary condition for the Hurwitz stability.

  • Estimation of the Acoustic Time Delay of Arrival by Adaptive Eigenvalue Decomposition with a Proportionate Step-Size Control and Direct-Path Constraint

    Seokjin LEE  

     
    LETTER-Digital Signal Processing

      Vol:
    E99-A No:8
      Page(s):
    1622-1627

    Estimation of the time delay of arrival (TDOA) problem is important to acoustic source localization. The TDOA estimation problem is defined as finding the relative delay between several microphone signals for the direct sound. To estimate TDOA, the generalized cross-correlation (GCC) method is the most frequently used, but it has a disadvantage in terms of reverberant environments. In order to overcome this problem, the adaptive eigenvalue decomposition (AED) method has been developed, which estimates the room transfer function and finds the direct-path delay. However, the algorithm does not take into account the fact that the room transfer function is a sparse channel, and so sometimes the estimated transfer function is too dense, resulting in failure to exact direct-path and delay. In this paper, an enhanced AED algorithm that makes use of a proportionate step-size control and a direct-path constraint is proposed instead of a constant step size and the L2-norm constraint. The simulation results show that the proposed algorithm has enhanced performance as compared to both the conventional AED method and the phase-transform (PHAT) algorithm.

  • Construction of Z-Periodic Complementary Sequence Sets over the 8-QAM+ Constellation

    Xiaoyu CHEN  Deming KONG  Chengqian XU  Kai LIU  

     
    LETTER-Coding Theory

      Vol:
    E99-A No:8
      Page(s):
    1635-1638

    Based on a ternary perfect sequence and a binary orthogonal matrix, the Z-periodic complementary sequence (ZPCS) sets over the 8-QAM+ constellation are constructed. The resultant sequences can be used in multi-carriers code division multiple access (MC-CDMA) systems to remove interference and increase the transmission rate. The proposed construction provides flexible choice for parameters so as to meet different requirements in the application. A construction of shift sequence sets is proposed and the number of 8-QAM ZPCS sets is extended by changing the parameters of shift sequences. As a result, more users can be accommodated in the system.

3581-3600hit(18690hit)