The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

6661-6680hit(18690hit)

  • Power Dissipation Analysis of IEEE 802.15.4 Distributed Multi-Hop Wireless Sensor Networks

    Muhammad TARIQ  Zhenyu ZHOU  Yong-Jin PARK  Takuro SATO  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E94-A No:11
      Page(s):
    2279-2286

    The involvement of IEEE 802.15.4 Wireless Sensor Networks (WSNs) in diverse applications has made the realistic analysis of sensor power dissipation in distributed network environments an essential research issue. In this paper, we propose and thoroughly analyze a power dissipation model for Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) based IEEE 802.15.4 distributed multi-hop WSNs. Our model takes the loss rate of frames, neighbor sensors density in communication range of a sensor, number of hops, distance of source to the sink, and density of the network into account. We evaluate the impact of these factors on overall power dissipation. We also perform comprehensive analysis of overheads caused by message routing through multi-hop distributed networks. We validate our proposed model through Monte Carlo simulations. Results show that our power dissipation model is more realistic compared to other proposed models in terms of accuracy and multiplicity of the environments.

  • A Model of Luminance-Adaptation for Quantifying Brightness in Mixed Visual Adapting Conditions

    Sung-Hak LEE  Kyu-Ik SOHNG  

     
    BRIEF PAPER

      Vol:
    E94-C No:11
      Page(s):
    1768-1772

    The color appearance model gives us the proper brightness information and optimized display conditions for various viewing surroundings. However on conditions of low-level illumination or low background reflectivity, the performance of brightness estimation is relatively poor. Therefore, through our psychophysical experiments, we investigated the state of visual luminance adaptation for comparing single adaptations and mixed adaptations under a complex viewing field, and we also investigated background adaptation degrees and exponential nonlinearity factors for mixed adaptation models. It provides more accurate brightness predictions according to different adapting luminance, which is decided from object and background luminance.

  • Single-Carrier Transmission Using Overlap Frequency Domain Equalizing and Coherent Averaging

    Shinichiro MIYAZAKI  Shoichiro YAMASAKI  Ryuji KOHNO  

     
    PAPER-Communication Theory and Signals

      Vol:
    E94-A No:11
      Page(s):
    2169-2177

    This paper proposes a single-carrier transmission method based on an overlap frequency-domain equalizing (FDE) and a coherent averaging. FDE is a block-based equalizing technique using discrete Fourier transform. A cyclic prefix is often used to avoid inter-block interference under multipath channel conditions, which reduces transmission efficiency. An overlap FDE is a technique to avoid the cyclic prefix insertion, but the residual interferences often exist after the FDE processing according to the channel conditions. The method proposed in this paper suppresses the residual interferences by applying a coherent averaging to the FDE outputs and improve the equalization performances. Computer simulation shows the effect of the proposed technique over the multipath channels.

  • Analysis of Stopping Constellation Distribution for Irregular Non-binary LDPC Code Ensemble

    Takayuki NOZAKI  Kenta KASAI  Kohichi SAKANIWA  

     
    PAPER-Coding Theory

      Vol:
    E94-A No:11
      Page(s):
    2153-2160

    The fixed points of the belief propagation decoder for non-binary low-density parity-check (LDPC) codes are referred to as stopping constellations. In this paper, we give the stopping constellation distributions for the irregular non-binary LDPC code ensembles defined over the general linear group. Moreover, we derive the exponential growth rate of the average stopping constellation distributions in the limit of large codelength.

  • On the Autocorrelation and Linear Complexity of Some 2p Periodic Quaternary Cyclotomic Sequences over F4

    Pinhui KE  Zheng YANG  Jie ZHANG  

     
    LETTER-Information Theory

      Vol:
    E94-A No:11
      Page(s):
    2472-2477

    We determine the autocorrelations of the quaternary sequence over F4 and its modified version introduced by Du et al. [X.N. Du et al., Linear complexity of quaternary sequences generated using generalized cyclotomic classes modulo 2p, IEICE Trans. Fundamentals, vol.E94-A, no.5, pp.1214–1217, 2011]. Furthermore, we reveal a drawback in the paper aforementioned and remark that the proof in the paper by Kim et al. can be simplified.

  • FPGA-Specific Custom VLIW Architecture for Arbitrary Precision Floating-Point Arithmetic

    Yuanwu LEI  Yong DOU  Jie ZHOU  

     
    PAPER-Computer System

      Vol:
    E94-D No:11
      Page(s):
    2173-2183

    Many scientific applications require efficient variable-precision floating-point arithmetic. This paper presents a special-purpose Very Large Instruction Word (VLIW) architecture for variable precision floating-point arithmetic (VV-Processor) on FPGA. The proposed processor uses a unified hardware structure, equipped with multiple custom variable-precision arithmetic units, to implement various variable-precision algebraic and transcendental functions. The performance is improved through the explicitly parallel technology of VLIW instruction and by dynamically varying the precision of intermediate computation. We take division and exponential function as examples to illustrate the design of variable-precision elementary algorithms in VV-Processor. Finally, we create a prototype of VV-Processor unit on a Xilinx XC6VLX760-2FF1760 FPGA chip. The experimental results show that one VV-Processor unit, running at 253 MHz, outperforms the approach of a software-based library running on an Intel Core i3 530 CPU at 2.93 GHz by a factor of 5X-37X for basic variable-precision arithmetic operations and elementary functions.

  • A Fast Systematic Optimized Comparison Algorithm for CNU Design of LDPC Decoders

    Jui-Hui HUNG  Sau-Gee CHEN  

     
    PAPER-Communication Theory and Signals

      Vol:
    E94-A No:11
      Page(s):
    2246-2253

    This work first investigates two existing check node unit (CNU) architectures for LDPC decoding: self-message-excluded CNU (SME-CNU) and two-minimum CNU (TM-CNU) architectures, and analyzes their area and timing complexities based on various realization approaches. Compared to TM-CNU architecture, SME-CNU architecture is faster in speed but with much higher complexity for comparison operations. To overcome this problem, this work proposes a novel systematic optimization algorithm for comparison operations required by SME-CNU architectures. The algorithm can automatically synthesize an optimized fast comparison operation that guarantees a shortest comparison delay time and a minimized total number of 2-input comparators. High speed is achieved by adopting parallel divide-and-conquer comparison operations, while the required comparators are minimized by developing a novel set construction algorithm that maximizes shareable comparison operations. As a result, the proposed design significantly reduces the required number of comparison operations, compared to conventional SME-CNU architectures, under the condition that both designs have the same speed performance. Besides, our preliminary hardware simulations show that the proposed design has comparable hardware complexity to low-complexity TM-CNU architectures.

  • Performance Analysis of Opportunistic and All-Participate Relaying with Imperfect Channel Estimation

    Lei WANG  Yueming CAI  Weiwei YANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:11
      Page(s):
    3151-3154

    For amplify-and-forward (AF) relaying with imperfect channel estimation, we present the average symbol error rate (SER) and the diversity and multiplexing tradeoff (DMT) analysis for both opportunistic relaying (OPR) and all-participate relaying (APR) schemes. SER comparisons show that when the channel estimation quality order is no larger than 1, OPR will perform worse than APR in high SNR region. Moreover, small channel estimation quality orders will also lead to significant DMT loss.

  • A Ternary Zero-Correlation Zone Sequence Set Having Wide Inter-Subset Zero-Correlation Zone

    Takafumi HAYASHI  Takao MAEDA  Shinya MATSUFUJI  Satoshi OKAWA  

     
    LETTER-Sequence

      Vol:
    E94-A No:11
      Page(s):
    2230-2235

    The present paper introduces a novel construction of ternary sequences having a zero-correlation zone. The cross-correlation function and the side-lobe of the auto-correlation function of the proposed sequence set is zero for the phase shifts within the zero-correlation zone. The proposed sequence set consists of more than one subset having the same member size. The correlation function of the sequences of a pair of different subsets, referred to as the inter-subset correlation function, has a wider zero-correlation zone than that of the correlation function of sequences of the same subset (intra-subset correlation function). The wide inter-subset zero-correlation enables performance improvement during application of the proposed sequence set. The proposed sequence set has a zero-correlation zone for periodic, aperiodic, and odd correlation functions.

  • Packet Scheduling and Traffic Differentiation in Femtocell Environment

    Volkan SEVINDIK  Oguz BAYAT  

     
    PAPER-Network

      Vol:
    E94-B No:11
      Page(s):
    3018-3025

    This paper proposes new scheduling algorithms for best effort (BE) traffic classification in business femtocell networks. The purpose of traffic classification is to provide differentiated services to BE users depending on their traffic classes, and the concept of traffic classification is called Inter User Best Effort (IUBE) in CDMA2000 1x Evolution Data Optimized (EVDO) standard. Traffic differentiation is achieved by introducing Grade of Service (GoS) as a quality of service (QoS) parameter into the scheduler's decision metric (DM). New scheduling algorithms are called QoS Round Robin (QoS-RR), QoS Proportionally Fair (QoS-PF), QoS maximum data rate control (DRC) (QoS-maxDRC), QoS average DRC (QoS-aveDRC), QoS exponent DRC (QoS-expDRC), QoS maxDRC-PF (QoS-maxDRC-PF). Two different femtocell throughput experiments are performed using real femtocell devices in order to collect real DRC values. The first experiment examines 4, 8, 12 and 16 IUBE users, while second experiment examines 4 IUBE + 2 Voice over IP (VoIP), 8 IUBE + 2 VoIP, 12 IUBE + 2 VoIP, 16 IUBE + 2 (VoIP) users. Average sector throughput, IUBE traffic differentiation, VoIP delay bound error values are investigated to compare the performance of the proposed scheduling algorithms. In conclusion, QoS-maxDRC-PF scheduler is proposed for business femtocell environment.

  • Overhead Reduction in Coordinated Beamforming for Multiuser MIMO-OFDM Systems with Limited Feedforward

    Leonel SORIANO-EQUIGUA  Jaime SANCHEZ-GARCIA  Chan-Byoung CHAE  Robert W. HEATH, Jr.  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:11
      Page(s):
    3168-3171

    This letter proposes a method for choosing the best quantized beamforming vector that represents a subcarrier group, for coordinated beamforming in the downlink of multiuser multiple input multiple output-orthogonal frequency division multiplexing systems. The correlation between subcarriers is exploited for reducing the feedforward overhead, while maximizing the sum rate.

  • Signal Activity Detection of Offset-QPSK in Colored Gaussian Noise

    Sayed Jalal ZAHABI  Mohammadali KHOSRAVIFARD  Ali A. TADAION  T. Aaron GULLIVER  

     
    LETTER-Communication Theory and Signals

      Vol:
    E94-A No:11
      Page(s):
    2226-2229

    This letter considers the problem of detecting an offset quadrature phase shift keying (O-QPSK) modulated signal in colored Gaussian noise. The generalized likelihood ratio test (GLRT) is employed for detection. By deriving the GLRT, it is shown that the assumption of colored Gaussian noise results in a more complicated problem than with the white noise assumption that was previously examined in the literature. An efficient solution for the detection maximization problem is proposed, based on which the GLRT is implemented. Performance results are presented to illustrate the detector performance.

  • Assessment of Building Damage in 2008 Wenchuan Earthquake from Multi-Temporal SAR Images Using Getis Statistic

    Haipeng WANG  Tianlin WANG  Feng XU  Kazuo OUCHI  

     
    LETTER

      Vol:
    E94-B No:11
      Page(s):
    2983-2986

    In this paper, the Getis statistic is applied to ALOS- PALSAR (Advanced Land Ovserving Satellite-Phased Array L-band Synthetic Aperture Radar) images for assessing the building damage caused by the Wenchuan earthquake in 2008. As a proposed image analysis, a simulated building image using mapping and projection algorithm is first presented for analysis of the Getis statistic. The results show the high accuracy of the assessment of the proposed approach. The Getis statistic is then applied to two ALOS-PALSAR images acquired before and after the Wenchuan earthquake to assess the level of building damage. Results of the Getis statistic show that the damage level is approximately 81%.

  • A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude

    Gregory BLANC  Youki KADOBAYASHI  

     
    PAPER

      Vol:
    E94-D No:11
      Page(s):
    2159-2166

    Modern web applications incorporate many programmatic frameworks and APIs that are often pushed to the client-side with most of the application logic while contents are the result of mashing up several resources from different origins. Such applications are threatened by attackers that often attempts to inject directly, or by leveraging a stepstone website, script codes that perform malicious operations. Web scripting based malware proliferation is being more and more industrialized with the drawbacks and advantages that characterize such approach: on one hand, we are witnessing a lot of samples that exhibit the same characteristics which make these easy to detect, while on the other hand, professional developers are continuously developing new attack techniques. While obfuscation is still a debated issue within the community, it becomes clear that, with new schemes being designed, this issue cannot be ignored anymore. Because many proposed countermeasures confess that they perform better on unobfuscated contents, we propose a 2-stage technique that first relieve the burden of obfuscation by emulating the deobfuscation stage before performing a static abstraction of the analyzed sample's functionalities in order to reveal its intent. We support our proposal with evidence from applying our technique to real-life examples and provide discussion on performance in terms of time, as well as possible other applications of proposed techniques in the areas of web crawling and script classification. Additionally, we claim that such approach can be generalized to other scripting languages similar to JavaScript.

  • Text Line Segmentation in Handwritten Document Images Using Tensor Voting

    Toan Dinh NGUYEN  Gueesang LEE  

     
    PAPER-Image

      Vol:
    E94-A No:11
      Page(s):
    2434-2441

    A novel grouping approach to segment text lines from handwritten documents is presented. In this text line segmentation algorithm, for each text line, a text string that connects the center points of the characters in this text line is built. The text lines are then segmented using the resulting text strings. Since the characters of the same text line are situated close together and aligned on a smooth curve, 2D tensor voting is used to reduce the conflicts when building these text strings. First, the text lines are represented by separate connected components. The center points of these connected components are then encoded by second order tensors. Finally, a voting process is applied to extract the curve saliency values and normal vectors, which are used to remove outliers and build the text strings. The experimental results obtained from the test dataset of the ICDAR 2009 Handwriting Segmentation Contest show that the proposed method generates high detection rate and recognition accuracy.

  • Low-Complexity Constant Multiplication Based on Trigonometric Identities with Applications to FFTs

    Fahad QURESHI  Oscar GUSTAFSSON  

     
    PAPER-Digital Signal Processing

      Vol:
    E94-A No:11
      Page(s):
    2361-2368

    In this work we consider optimized twiddle factor multipliers based on shift-and-add-multiplication. We propose a low-complexity structure for twiddle factors with a resolution of 32 points. Furthermore, we propose a slightly modified version of a previously reported multiplier for a resolution of 16 points with lower round-off noise. For completeness we also include results on optimal coefficients for eight-points resolution. We perform finite word length analysis for both coefficients and round-off errors and derive optimized coefficients with minimum complexity for varying requirements.

  • Probabilistic Constrained Power Allocation for MISO Wiretap Channel Based on Statistical CSI-E

    Xiaojun SUN  Xiaojian LIU  Ming JIANG  Pengcheng ZHU  Chunming ZHAO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:11
      Page(s):
    3175-3178

    In this letter, we propose a power allocation scheme to optimize the ergodic secrecy rate of multiple-input single-output (MISO) fading wiretap channels with a probabilistic constraint, using the statistical channel state information (CSI) of the eavesdropper (CSI-E). The analytical expressions of the false secrecy probability are derived and used as constraints in the rate maximization problem. Moreover, we obtain a suboptimal solution by formulating the power allocation problem as a Rayleigh quotient problem.

  • Effects of Multiple Antennas on Outage Performance of Decode-and-Forward Cooperative Networks with Relay Selection

    Wooju LEE  Dongweon YOON  Zhengyuan XU  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:11
      Page(s):
    3155-3159

    In this paper, we consider multiple source and destination antennas based on relay selection scheme to improve the end-to-end outage performance for decode-and-forward cooperative networks. We derive an exact closed-form expression of the outage probability for the proposed system over a Rayleigh fading channel and describe the diversity-multiplexing tradeoff of the system. We then analyze the effects of the number of source and destination antennas on the outage probabilities and diversity-multiplexing tradeoffs.

  • Data Transmission Using Original Coils in Resonant Wireless Power Transmission

    Takashi MARUYAMA  Tatsuya SHIMIZU  Mamoru AKIMOTO  Kazuki MARUTA  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:11
      Page(s):
    3172-3174

    We propose a data transmission method for resonant wireless power transmission systems. In order to transmit data, we use the coils originally designed for power transmission, no additional antennas are required. We focus on uplink data transmission and adopt the load modulation technique. This configuration yields mid-range data transmission without transmitting power. In addition, the proposal enables simultaneous power feeding and uplink data transmission. We make a prototype demonstrating resonant wireless power transmission and measure its S-parameter under some load conditions. The results confirm the potential of load modulation in supporting uplink data transmission. Additionally, the results are elucidated by analyzing an equivalent circuit. Measured S-parameter and equivalent circuit response are found to be similar.

  • Performance Analysis of Two-Hop Cellular Systems in Transparent and Non-transparent Modes

    Se-Jin KIM  Seung-Yeon KIM  Ryong OH  Seungwan RYU  Hyong-Woo LEE  Choong-Ho CHO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:11
      Page(s):
    3107-3115

    In this paper, we evaluate the downlink performance of Transparent mode (T-mode) and Non-Transparent mode (NT-mode) in a two-hop cellular system based on IEEE 802.16j. In particular, we evaluate the performance in terms of the system capacity, optimal resource allocation, and outage probability using Monte Carlo simulation with various system parameters such as different Frequency Reuse Factors (FRFs) and the distance between Base Station (BS) and Relay Station (RS). To analyze the Signal to Interference and Noise Ratio (SINR) of the access and relay links, an SINR model is introduced for cellular multihop systems considering intra- and inter-cell interferences. Then, we present a method of optimal resource allocation for the Access Zone (AZ) and Relay Zone (RZ) to maximize the system capacity. Consequently, the simulation results provide an insight into choosing the appropriate RS position and optimal resource allocation. Through numerical examples, it is found that the FRFs of two and three are good choices to achieve the highest capacity with low outage in T- and NT-modes, respectively.

6661-6680hit(18690hit)