The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

8181-8200hit(18690hit)

  • Study on the Temperature Limitation of the Injecting Power to a Pyramidal EM-Wave Absorber

    Tetsuhiro SASAGAWA  Shinya WATANABE  Osamu HASHIMOTO  Toshifumi SAITO  Hiroshi KURIHARA  

     
    LETTER-Electromagnetic Theory

      Vol:
    E92-C No:10
      Page(s):
    1319-1321

    In this paper, first the temperature distribution of the pyramidal EM-wave absorber is calculated in the coupled method. Next, the injected power to the EM-wave absorber is changed to estimate the maximum power density that the EM-wave absorber can resist. As a result, the limitation of the injecting power density to a pyramidal EM-wave absorber is achievable.

  • Fiber Access Networks: Reliability Analysis and Swedish Broadband Market Open Access

    Lena WOSINSKA  Jiajia CHEN  Claus Popp LARSEN  

     
    INVITED PAPER

      Vol:
    E92-B No:10
      Page(s):
    3006-3014

    Fiber access network architectures such as active optical networks (AONs) and passive optical networks (PONs) have been developed to support the growing bandwidth demand. Whereas particularly Swedish operators prefer AON, this may not be the case for operators in other countries. The choice depends on a combination of technical requirements, practical constraints, business models, and cost. Due to the increasing importance of reliable access to the network services, connection availability is becoming one of the most crucial issues for access networks, which should be reflected in the network owner's architecture decision. In many cases protection against failures is realized by adding backup resources. However, there is a trade off between the cost of protection and the level of service reliability since improving reliability performance by duplication of network resources (and capital expenditures CAPEX) may be too expensive. In this paper we present the evolution of fiber access networks and compare reliability performance in relation to investment and management cost for some representative cases. We consider both standard and novel architectures for deployment in both sparsely and densely populated areas. While some recent works focused on PON protection schemes with reduced CAPEX the current and future effort should be put on minimizing the operational expenditures (OPEX) during the access network lifetime.

  • Bidirectional Packet Aggregation and Coding for Efficient VoIP Transmission in Wireless Multi-Hop Networks

    Jun HASEGAWA  Hiroyuki YOMO  Yoshihisa KONDO  Peter DAVIS  Katsumi SAKAKIBARA  Ryu MIURA  Sadao OBANA  

     
    PAPER

      Vol:
    E92-B No:10
      Page(s):
    3060-3070

    This paper proposes bidirectional packet aggregation and coding (BiPAC), a packet mixing technique which jointly applies packet aggregation and network coding in order to increase the number of supportable VoIP sessions in wireless multi-hop mesh networks. BiPAC applies network coding for aggregated VoIP packets by exploiting bidirectional nature of VoIP sessions, and largely reduces the required protocol overhead for transmitting short VoIP packets. We design BiPAC and related protocols so that the operations of aggregation and coding are well-integrated while satisfying the required quality of service by VoIP transmission, such as delay and packet loss rate. Our computer simulation results show that BiPAC can increase the number of supportable VoIP sessions maximum by around 87% as compared with the case when the packet aggregation alone is used, and 600% in comparison to the transmission without aggregation/coding. We also implement BiPAC in a wireless testbed, and run experiments in an actual indoor environment. Our experimental results show that BiPAC is a practical and efficient forwarding method, which can be implemented into the current mesh hardware and network stack.

  • Analysis and Design of a Reflection-Cancelling Transverse Slot-Pair Array with Grating-Lobe Suppressing Baffles

    Takehito SUZUKI  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Antennas and Propagation

      Vol:
    E92-B No:10
      Page(s):
    3236-3242

    This paper presents the analysis and design of a reflection-cancelling transverse slot-pair array antenna with baffles by using the Spectrum of Two-Dimensional Solutions (S2DS) method. For the transverse slot array, the slot spacings with more than one free-space wavelength cause the grating-lobes. The baffles suppress the grating-lobes effectively. A one-dimensional slot array is extracted from the 2D array with in-phase excitation by assuming periodicity in the transversal direction. The uniform excitation over the finite array is synthesized iteratively to demonstrate the fast and accurate results by S2DS. A unit design model with the baffles is introduced to determine the initial parameters of the slot-pairs, which greatly accelerate the iterations process. Experiments at 25.3 GHz demonstrate the suppression of the grating lobes to the level less than -20.0 dB and also the good uniformity of the aperture field distribution.

  • A New User Selection Measure in Block Diagonalization Algorithm for Multiuser MIMO Systems Open Access

    Riichi KUDO  Yasushi TAKATORI  Kentaro NISHIMORI  Atsushi OHTA  Shuji KUBOTA  Masato MIZOGUCHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:10
      Page(s):
    3206-3218

    Multiuser -- Multiple Input Multiple Output (MU-MIMO) techniques were proposed to increase spectrum efficiency; a key assumption was that the Mobile Terminals (MTs) were simple with only a few antennas. This paper focuses on the Block Diagonalization algorithm (BD) based on the equal power allocation strategy as a practical MU-MIMO technique. When there are many MTs inside the service area of the access point (AP), the AP must determine, at each time slot, the subset of the MTs to be spatially multiplexed. Since the transmission performance depends on the subsets of MTs, the user selection method needs to use the Channel State Information (CSI) obtained in the physical layer to maximize the Achievable Transmission Rate (ATR). In this paper, we clarify the relationship between ATR with SU-MIMO and that with MU-MIMO in a high eigenvalue channel. Based on the derived relationship, we propose a new measure for user selection. The new measure, the eigenvalue decay factor, represents the degradation of the eigenvalues in null space compared to those in SU-MIMO; it is obtained from the signal space vectors of the MTs. A user selection method based on the proposed measure identifies the combination of MTs that yields the highest ATR; our approach also reduces the computational load of user selection. We evaluate the effectiveness of user selection with the new measure using numerical formulations and computer simulations.

  • Antenna Array Calibration Based on Frequency Selection in OFDMA/TDD Systems Open Access

    Yoshitaka HARA  Yasuhiro YANO  Hiroshi KUBO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:10
      Page(s):
    3195-3205

    This paper proposes a new antenna array calibration technique which uses frequency selection in orthogonal frequency division multiple access (OFDMA)/time division duplexing (TDD) systems. In the proposed method, subbands or frequencies of good channel conditions are initially selected for channel measurements. The relative calibration is performed at the selected subbands, which compensates for mismatch of analogue gains in multiple antennas using the measured uplink and downlink channel parameters. Furthermore, the calibration parameters are interpolated in the frequency domain for the whole bandwidth. The proposed calibration maintains accurate channel reciprocity for the whole bandwidth compared to the conventional calibration which does not use the frequency selection. The proposed calibration technique is effective in exploiting channel reciprocity at both base station and terminals with feasible amount of feedback and low-cost operation.

  • Design of Complex BPF with Automatic Digital Tuning Circuit for Low-IF Receivers

    Hideaki KONDO  Masaru SAWADA  Norio MURAKAMI  Shoichi MASUI  

     
    PAPER-Integrated Electronics

      Vol:
    E92-C No:10
      Page(s):
    1304-1310

    This paper describes the architecture and implementations of an automatic digital tuning circuit for a complex bandpass filter (BPF) in a low-power and low-cost transceiver for applications such as personal authentication and wireless sensor network systems. The architectural design analysis demonstrates that an active RC filter in a low-IF architecture can be at least 47.7% smaller in area than a conventional gm-C filter; in addition, it features a simple implementation of an associated tuning circuit. The principle of simultaneous tuning of both the center frequency and bandwidth through calibration of a capacitor array is illustrated as based on an analysis of filter characteristics, and a scalable automatic digital tuning circuit with simple analog blocks and control logic having only 835 gates is introduced. The developed capacitor tuning technique can achieve a tuning error of less than 3.5% and lower a peaking in the passband filter characteristics. An experimental complex BPF using 0.18 µm CMOS technology can successfully reduce the tuning error from an initial value of -20% to less than 2.5% after tuning. The filter block dimensions are 1.22 mm1.01 mm; and in measurement results of the developed complex BPF with the automatic digital tuning circuit, current consumption is 705 µA and the image rejection ratio is 40.3 dB. Complete evaluation of the BPF indicates that this technique can be applied to low-power, low-cost transceivers.

  • Stability Analysis of XCP (eXplicit Control Protocol) with Heterogeneous Flows

    Yusuke SAKUMOTO  Hiroyuki OHSAKI  Makoto IMASE  

     
    PAPER-Internet

      Vol:
    E92-B No:10
      Page(s):
    3174-3182

    In this paper, we analyze the stability of XCP (eXplicit Control Protocol) in a network with heterogeneous XCP flows (i.e., XCP flows with different propagation delays). Specifically, we model a network with heterogeneous XCP flows using fluid-flow approximation. We then derive the conditions that XCP control parameters should satisfy for stable XCP operation. Furthermore, through several numerical examples and simulation results, we quantitatively investigate effect of system parameters and XCP control parameters on stability of the XCP protocol. Our findings include: (1) when XCP flows are heterogeneous, XCP operates more stably than the case when XCP flows are homogeneous, (2) conversely, when variation in propagation delays of XCP flows is large, operation of XCP becomes unstable, and (3) the output link bandwidth of an XCP router is independent of stability of the XCP protocol.

  • Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks

    Tsu-Yang WU  Yuh-Min TSENG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:10
      Page(s):
    2638-2640

    In PKC 2004, Choi et al. proposed an ID-based authenticated group key agreement (AGKA) protocol using bilinear pairings. Unfortunately, their protocol suffered from an impersonation attack and an insider colluding attack. In 2008, Choi et al. presented an improvement to resist insider attacks. In their modified protocol, they used an ID-based signature scheme on transcripts for binding them in a session to prevent replay of transcripts. In particular, they smartly used the batch verification technique to reduce the computational cost. In this paper, we first show that Choi et al.'s modified AGKA protocol still suffers from an insider colluding attack. Then, we prove that the batch verification of the adopted ID-based signature scheme in their modified protocol suffers from a forgery attack.

  • A Multi-Sensing-Range Method for Efficient Position Estimation by Passive RFID Technology

    Toshihiro HORI  Tomotaka WADA  Norie UCHITOMI  Kouichi MUTSUURA  Hiromi OKADA  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E92-A No:10
      Page(s):
    2609-2617

    The RFID tag system has received attention as an identification source. Each RFID tag is attached to some object. With the unique ID of the RFID tag, a user identifies the object provided with the RFID tag, and derives appropriate information about the object. One of important applications of the RFID technology is the position estimation of RFID tags. It can be very useful to acquire the location information concerning the RFID tags. It can be applied to navigation systems and positional detection systems for robots etc. In this paper, we propose a new position estimation method of RFID tags by using a probabilistic approach. In this method, mobile objects (person and robot, etc.) with RFID readers estimate the positions of RFID tags with multiple communication ranges. We show the effectiveness of the proposed method by computer simulations.

  • Image Restoration Using a Universal GMM Learning and Adaptive Wiener Filter

    Nobumoto YAMANE  Motohiro TABUCHI  Yoshitaka MORIKAWA  

     
    PAPER-Digital Signal Processing

      Vol:
    E92-A No:10
      Page(s):
    2560-2571

    In this paper, an image restoration method using the Wiener filter is proposed. In order to bring the theory of the Wiener filter consistent with images that have spatially varying statistics, the proposed method adopts the locally adaptive Wiener filter (AWF) based on the universal Gaussian mixture distribution model (UNI-GMM) previously proposed for denoising. Applying the UNI-GMM-AWF for deconvolution problem, the proposed method employs the stationary Wiener filter (SWF) as a pre-filter. The SWF in the discrete cosine transform domain shrinks the blur point spread function and facilitates the modeling and filtering at the proceeding AWF. The SWF and UNI-GMM are learned using a generic training image set and the proposed method is tuned toward the image set. Simulation results are presented to demonstrate the effectiveness of the proposed method.

  • CMOS Circuit Simulation Using Latency Insertion Method

    Tadatoshi SEKINE  Hideki ASAI  

     
    PAPER-Nonlinear Problems

      Vol:
    E92-A No:10
      Page(s):
    2546-2553

    This paper describes the application techniques of the latency insertion method (LIM) to CMOS circuit simulations. Though the existing LIM algorithm to CMOS circuit performs fast transient analysis, CMOS circuits are not modeled accurately. As a result, they do not provide accurate simulations. We propose a more accurate LIM scheme for the CMOS inverter circuit by adopting a more accurate model of the CMOS inverter characteristics. Moreover, we present the way to expand the LIM algorithm to general CMOS circuit simulations. In order to apply LIM to the general CMOS circuits which consist of CMOS NAND and NOR, we derive the updating formulas of the explicit form of the LIM algorithm. By using the explicit form of the LIM scheme, it becomes easy to take in the characteristics of CMOS NAND and NOR into the LIM simulations. As a result, it is confirmed that our techniques are useful and efficient for the simulations of CMOS circuits.

  • Scalable DV-Hop Localization Algorithm with Constrained Multilateration for Wireless Sensor Network

    Sunwoo KIM  Byeong-Tae LEE  

     
    LETTER

      Vol:
    E92-B No:10
      Page(s):
    3075-3078

    Localization is an important problem for Wireless Sensor Networks (WSN). The localization method can be categorized as range-free or range-based schemes. Since sensor nodes are usually cheap and small, the range-based schemes that require range measurement unit are unsuitable in WSN. The DV-hop algorithm is one of the range-free localization algorithms in which average hop-distance and hop counts are used for range estimation. But it requires heavy communication cost if the number of nodes increases in the network. Therefore, we propose a simple algorithm to reduce the communication cost and its performance is verified via computer simulations.

  • Two-Dimensional Arrays Optimized for Wide-Scanning Phased Array Based on Potential Function Method

    Koji NISHIMURA  Toru SATO  

     
    PAPER-Antennas and Propagation

      Vol:
    E92-B No:10
      Page(s):
    3228-3235

    For phased and adaptive arrays of antennas, an optimal arrangement of antenna elements is essential to avoid grating lobes in the visible angular region of the array. Large sidelobes cause degradation in signal-to-noise ratio; grating lobes, in the worst case, cause malfunctions. One method of evaluating sidelobe level is square integration. For a given set element positions, evaluation by square integration of the sidelobes involves Fourier transform and numerical integration. For faster evaluation, we developed an equivalent transform algorithm that requires no numerical Fourier transform or integration. Using this new algorithm, we introduced a fast trial-and-error algorithm that iteratively applies random perturbation to the array, evaluates the function, and minimizes it. A number of separate runs of this algorithm have been conducted under the constraint of 3-fold rotational symmetry for stability. The optimal output, for which the function is minimized, is a uniformly spaced equilateral-triangular-type arrays that, unfortunately, has unwanted grating lobes. However the algorithm also yields variations trapped at local minima, some of which do not have grating lobes and whose sidelobe peaks are sufficiently low within a wide angular region. For the case N=12, a characteristic triagular-rectangular-type array often arises, which has not only better sidelobe properties as evaluated by square-integration and peak sidelobe, but also sufficient element-to-element clearance. For the case N=36, one of the results achieves a peak-sidelobe level of -8 dB, with a minimum element-to-element separation of 0.76 wavelength.

  • End-to-End Loss Differentiation Algorithm Based on Estimation of Queue Usage in Multi-Hop Wireless Networks

    Mi-Young PARK  Sang-Hwa CHUNG  Prasanthi SREEKUMARI  

     
    PAPER-Networks

      Vol:
    E92-D No:10
      Page(s):
    2082-2093

    When TCP operates in multi-hop wireless networks, it suffers from severe performance degradation. This is because TCP reacts to wireless packet losses by unnecessarily decreasing its sending rate. Although previous loss differentiation algorithms (LDAs) can identify some of the packet losses due to wireless transmission errors as wireless losses, their accuracy is not high as much as we expect, and these schemes cannot avoid sacrificing the accuracy of congestion loss discrimination by misclassifying congestion losses as wireless losses. In this paper, we suggest a new end-to-end loss differentiation scheme which has high accuracy in both wireless loss discrimination and congestion loss discrimination. Our scheme estimates the rate of queue usage using information available to TCP. If the estimated queue usage is larger than 50% when a packet is lost, our scheme diagnoses the packet loss as congestion losses. Otherwise, it diagnoses the packet loss as wireless losses. Because the estimated queue usage is highly correlated to congestion, our scheme has an advantage to more exactly identify packet losses related to congestion and those unrelated to congestion. Through extensive simulations, we compare and evaluate our scheme with previous LDAs in terms of correlation, accuracy, and stability. And the results show that our scheme has the highest accuracy as well as its accuracy is more reliable than the other LDAs.

  • Scalable Parallel Interface for Terabit LAN

    Shoukei KOBAYASHI  Yoshiaki YAMADA  Kenji HISADOME  Osamu KAMATANI  Osamu ISHIDA  

     
    PAPER

      Vol:
    E92-B No:10
      Page(s):
    3015-3021

    We propose a scalable parallel interface that provides an ideal aggregated bandwidth link for an application. The scalable parallel interface uses time information to align packets and allows dynamic lane and/or path change, a large difference in transmission delays among lanes, and so on. The basic performance of the scalable parallel interface in 10 Gb/s 2 lanes is verified using an estimation board that is newly developed to evaluate the basic functions used in a Terabit LAN. The evaluation shows that the scalable parallel interface achieves a very low delay variation that is almost the same as that under back-to-back conditions. The difference in the delay variation between the scalable parallel interface and the back-to-back condition is approximately 10 ns when the transmission delay time varies from 10 µs to 1 s.

  • Load Balancing Scheme on the Basis of Huffman Coding for P2P Information Retrieval

    Hisashi KURASAWA  Atsuhiro TAKASU  Jun ADACHI  

     
    PAPER-Contents Technology and Web Information Systems

      Vol:
    E92-D No:10
      Page(s):
    2064-2072

    Although a distributed index on a distributed hash table (DHT) enables efficient document query processing in Peer-to-Peer information retrieval (P2P IR), the index costs a lot to construct and it tends to be an unfair management because of the unbalanced term frequency distribution. We devised a new distributed index, named Huffman-DHT, for P2P IR. The new index uses an algorithm similar to Huffman coding with a modification to the DHT structure based on the term distribution. In a Huffman-DHT, a frequent term is assigned to a short ID and allocated a large space in the node ID space in DHT. Throuth ID management, the Huffman-DHT balances the index registration accesses among peers and reduces load concentrations. Huffman-DHT is the first approach to adapt concepts of coding theory and term frequency distribution to load balancing. We evaluated this approach in experiments using a document collection and assessed its load balancing capabilities in P2P IR. The experimental results indicated that it is most effective when the P2P system consists of about 30,000 nodes and contains many documents. Moreover, we proved that we can construct a Huffman-DHT easily by estimating the probability distribution of the term occurrence from a small number of sample documents.

  • Inter-Cell Resource Coordination Utilizing Macroscopic Diversity for an Uplink OFDMA System

    Sungjin LEE  Sanghoon LEE  Gyetae GIL  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:10
      Page(s):
    3256-3259

    An ICI (Inter-Cell Interference) mitigation algorithm for exploiting macroscopic diversity for an up-link OFDMA (Orthogonal Frequency Division Multiple Access) system is proposed. To reduce the influence of carrier collision, the order of resource allocation is coordinated based on the location of each MS (Mobile Station) and the associated carrier group. This consideration significantly reduces ICI and enhances throughput at the boundary region.

  • Accurate Method for Calculating the Effective Capacitance with RC Loads Based on the Thevenin Model

    Minglu JIANG  Zhangcai HUANG  Atsushi KUROKAWA  Shuai FANG  Yasuaki INOUE  

     
    PAPER-Nonlinear Problems

      Vol:
    E92-A No:10
      Page(s):
    2531-2539

    In deep submicron designs, predicting gate delays with interconnect load is a noteworthy work for Static Timing Analysis (STA). The effective capacitance Ceff concept and the Thevenin model that replaces the gate with a linear resistor and a voltage source are usually used to calculate the delay of gate with interconnect load. In conventional methods, it is not considered that the charges transferred into interconnect load and Ceff in the Thevenin model are not equal. The charge difference between interconnect load and Ceff has the large influence to the accuracy of computing Ceff. In this paper, an advanced effective capacitance model is proposed to consider the above problem in the Thevenin model, where the influence of the charge difference is modeled as one part of the effective capacitance to compute the gate delay. Experimental results show a significant improvement in accuracy when the charge difference between interconnect load and Ceff is considered.

  • An Inter-Cell Interference Mitigation Method for OFDM-Based Cellular Systems Using Independent Component Analysis

    Hui ZHANG  Xiaodong XU  Xiaofeng TAO  Ping ZHANG  Ping WU  

     
    PAPER

      Vol:
    E92-B No:10
      Page(s):
    3034-3042

    Orthogonal frequency division multiplexing (OFDM) is a critical technology in 3G evolution systems, which can effectively avoid intra-cell interference, but may bring with serious inter-cell interference. Inter-cell interference cancellation is one of effective schemes taken in mitigating inter-cell interference, but for many existing schemes in inter-cell interference cancellation, various generalized spatial diversities are taken, which always bring with extra interference and blind spots, or even need to acquire extra information on source and channel. In this paper, a novel inter-cell interference mitigation method is proposed for 3G evolution systems. This method is based on independent component analysis in blind source separation, and the input signal to interference plus noise ratio (SINR) is set as objective function. By generalized eigenvalue decomposition and algorithm iterations, maximum signal noise ratio (SNR) can be obtained in output. On the other hand, this method can be worked with no precise knowledge of source signal and channel information. Performance evaluation shows that such method can mitigate inter-cell interference in a semi-blind state, and effectively improve output SNR with the condition that lower input SINR, higher input SNR and longer lengths of the processing frame.

8181-8200hit(18690hit)