The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

10481-10500hit(18690hit)

  • Adomian Decomposition for Studying Hyperchaotic 2D-Scroll Attractors with Application to Synchronization

    Donato CAFAGNA  Giuseppe GRASSI  

     
    PAPER-Oscillation, Dynamics and Chaos

      Vol:
    E89-A No:10
      Page(s):
    2752-2758

    In this paper the attention is focused on the numerical study of hyperchaotic 2D-scroll attractors via the Adomian decomposition method. The approach, which provides series solutions of the system equations, is first applied to weakly-coupled Chua's circuits with Hermite interpolating polynomials. Then the method is successfully utilized for achieving hyperchaos synchronization of two coupled Chua's circuits. The reported examples show that the approach presents two main features, i.e., the system nonlinearity is preserved and the chaotic solution is provided in a closed form.

  • A Blind Adaptive Decorrelating Detector Using Spatial Signature Estimation

    Yuji KIMURA  Koji SHIBATA  Takakazu SAKAI  Atsushi NAKAGAKI  

     
    LETTER-Spread Spectrum

      Vol:
    E89-A No:10
      Page(s):
    2686-2689

    The decorrelating detector is one of the detecting methods in a direct sequence code division multiple access systems. We investigate the blind adaptive decorrelating detector (BADD) using only the signature of the desired user (DU) according to the assumption that the algorithm is used in downlink. When the BADD is constructed with an antenna array, both the spatial and temporal signature must be taken into consideration for signal detection. We propose the BADD incorporated with the blind estimation of spatial signature (SS) of the DU only from the received signals. As the estimation procedure of SS, the orthogonal projection approximation and subspace tracking algorithm is adopted. The proposed BADD presented the BER improvement with using antenna array. The BER performance has a lower limit with increasing the number of antenna array elements.

  • Temporal Sequences of Patterns with an Inverse Function Delayed Neural Network

    Johan SVEHOLM  Yoshihiro HAYAKAWA  Koji NAKAJIMA  

     
    PAPER-Control, Neural Networks and Learning

      Vol:
    E89-A No:10
      Page(s):
    2818-2824

    A network based on the Inverse Function Delayed (ID) model which can recall a temporal sequence of patterns, is proposed. The classical problem that the network is forced to make long distance jumps due to strong attractors that have to be isolated from each other, is solved by the introduction of the ID neuron. The ID neuron has negative resistance in its dynamics which makes a gradual change from one attractor to another possible. It is then shown that a network structure consisting of paired conventional and ID neurons, perfectly can recall a sequence.

  • Aggregation Efficiency-Aware Greedy Incremental Tree Routing for Wireless Sensor Networks

    Shinji MIKAMI  Takafumi AONISHI  Hironori YOSHINO  Chikara OHTA  Hiroshi KAWAGUCHI  Masahiko YOSHIMOTO  

     
    PAPER

      Vol:
    E89-B No:10
      Page(s):
    2741-2751

    In most research work for sensor network routings, perfect aggregation has been assumed. Such an assumption might limit the application of the wireless sensor networks. We address the impact of aggregation efficiency on energy consumption in the context of GIT routing. Our questions are how the most efficient aggregation point changes according to aggregation efficiency and the extent to which energy consumption can decrease compared to the original GIT routing and opportunistic routing. To answer these questions, we analyze a two-source model, which yields results that lend insight into the impact of aggregation efficiency. Based on analytical results, we propose an improved GIT: "aggregation efficiency-aware GIT," or AGIT. We also consider a suppression scheme for exploratory messages: "hop exploratory." Our simulation results show that the AGIT routing saves the energy consumption of the data transmission compared to the original GIT routing and opportunistic routing.

  • Zero-Knowledge and Correlation Intractability

    Satoshi HADA  Toshiaki TANAKA  

     
    PAPER-Information Security

      Vol:
    E89-A No:10
      Page(s):
    2894-2905

    The notion of correlation intractable function ensembles (CIFEs) was introduced in an attempt to capture the "unpredictability" property of random oracles [12]: If O is a random oracle then it is infeasible to find an input x such that the input-output pair (x,O(x)) has some desired property. In this paper, we observe relationships between zero-knowledge protocols and CIFEs. Specifically, we show that, in the non-uniform model, the existence of CIFEs implies that 3-round auxiliary-input zero-knowledge (AIZK) AM interactive proofs exist only for BPP languages. In the uniform model, we show that 3-round AIZK AM interactive proofs with perfect completeness exist only for easy-to-approximate languages. These conditional triviality results extend to constant-round AIZK AM interactive proofs assuming the existence of multi-input CIFEs, where "multi-input" means that the correlation intractability is satisfied with respect to multiple input-output pairs. Also, as a corollary, we show that any construction of uniform multi-input CIFEs from uniform one-way functions proves unconditionally that constant-round AIZK AM interactive proofs with perfect completeness only for easy-to-approximate languages.

  • Piggyback Packetization of Duplicate Packets for Packet-Loss Resilient Video Transmission

    Man-keun SEO  Yo-won JEONG  Kwang-deok SEO  Jae-kyoon KIM  

     
    LETTER

      Vol:
    E89-B No:10
      Page(s):
    2802-2808

    The transmission of duplicate packets provides a loss-resilience without undue time-delay in the video transmission over packet loss networks. However, this method generally deteriorates the problem of traffic congestion because of the increased bit-rate for duplicate packet transmission. In this paper, we propose a set of techniques for an efficient packetization and transmission of duplicate video packets. The proposed method transmits the duplicate packet containing high priority data that is quite small in volume but very important for the reconstruction of the video. This method significantly reduces the required bit-rate for duplicate transmission. An efficient packetization method is also proposed to reduce additional packet overhead which is required for transmitting the duplicate data. It is shown by simulations that the proposed method remarkably improves the packet loss-resilience for video transmission only with small increase of redundant duplicated data for each slice.

  • Prioritized Transmission Gain for Mobile Visual Communications

    Hyungkeuk LEE  Sanghoon LEE  

     
    LETTER

      Vol:
    E89-B No:10
      Page(s):
    2809-2812

    For point-to-point mobile visual communications, layered video has been utilized to adapt to time-varying channel capacity over noisy environments. From the perspective of the HVS (Human Visual System), it is necessary to minimize the loss of visual quality by specifically maintaining the throughput of visually important regions, objects and so on. Utilizing the prioritized bitstreams generated according to each layer, the throughput can be improved for given channel statistics. In this paper, we define the transmission gain and measure the improved performance when the throughput of ROI (Regions Of Interest) is increased relative to visually unimportant regions over a capacity limited mobile channel.

  • Effects of Gradual Enhancement for Receivers at Mobile Terminals in Different Locations with Greedy Scheduling

    Jaehwang YU  Kwyro LEE  Dongwoo KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:10
      Page(s):
    2929-2932

    Receiver enhancement at mobile terminals such as using receiver diversity is a way of achieving greater downlink capacity. The enhancement, however, is achieved not instantaneously by a network operator but gradually by the individual users that choose and purchase their own mobile terminals. We investigate in this letter the effect of gradually introducing enhanced receivers at mobiles in different locations. With greedy scheduling, capacity, fairness and coverage are quantified and numerically compared according to locations of enhanced mobiles. The results show that the enhancement made at mobiles nearer to the base provides the greater capacity but this capacity-driving introduction of the enhancement makes the fairness and the coverage poorer.

  • Efficient Techniques in OFDM System with Channel Evaluation

    So-Young YEO  Jae-Seon YOON  Myung-Sun BAEK  Young-Hwan YOU  Hyoung-Kyu SONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:10
      Page(s):
    2945-2948

    In this letter, we aim at the study of an OFDM system that employs adaptive modulation techniques to achieve efficient transmission service. In adaptive modulation techniques, a banded AM technique can reduce the number of adaptive modulation information bits and signaling overhead. We evaluate the banded AM technique and compare with Subcarrier AM technique. Moreover, to evaluate the channel condition, we apply the SNR estimation method. Furthermore, to increase the performance of OFDM system, frequency domain pre-equalization is applied. The simulation results have been shown that the OFDM system with adaptive schemes can achieve the efficient transmission for multi-media services.

  • Optimal Server Replication Schemes to Reduce Location Management Cost in Cellular Network

    Sung-Hwa LIM  Jai-Hoon KIM  

     
    PAPER-Network

      Vol:
    E89-B No:10
      Page(s):
    2841-2849

    The default server strategy is commonly used to manage the location and state of mobile hosts in cellular networks. With this strategy, connections can be established after the client obtains the location information of the mobile host by querying the default server. Unfortunately, the communication cost increases if the query requests are frequent and the distance between the default server and the client is long. Still more, no connection to a mobile host can be established when the default server of the destination mobile host fails. These problems can be solved by replicating the default servers and by letting the nearest replicated default server process the query request which is sent from a client [9]. It is important to allocate replicated default servers efficiently in networks and determine the number of replicated default servers. In this paper, we suggest and evaluate a default server replication strategy to reduce communication costs and to improve service availabilities. We consider optimal replication degree as well as location for replicating the default servers in n-grid and tree networks.

  • On the Classification of Cyclic Hadamard Sequences

    Solomon W. GOLOMB  

     
    INVITED PAPER

      Vol:
    E89-A No:9
      Page(s):
    2247-2253

    Binary sequences with two-level periodic autocorrelation correspond directly to cyclic (v, k, λ)-designs. When v = 4t-1, k = 2t -1 and λ = t-1, for some positive integer t, the sequence (or design) is called a cyclic Hadamard sequence (or design). For all known examples, v is either a prime number, a product of twin primes, or one less than a power of 2. Except when v = 2k-1, all known examples are based on quadratic residues (using the Legendre symbol when v is prime, and the Jacobi symbol when v = p(p+2) where both p and p+2 are prime); or sextic residues (when v is a prime of the form 4a2 + 27). However, when v = 2k-1, many constructions are now known, including m-sequences (corresponding to Singer difference sets), quadratic and sextic residue sequences (when 2k-1 is prime), GMW sequences and their generalizations (when k is composite), certain term-by-term sums of three and of five m-sequences and more general sums of trace terms, several constructions based on hyper-ovals in finite geometries (found by Segre, by Glynn, and by Maschietti), and the result of performing the Welch-Gong transformation on some of the foregoing.

  • Performance of Affordable Neural Network for Back Propagation Learning

    Yoko UWATE  Yoshifumi NISHIO  

     
    PAPER-Nonlinear Problems

      Vol:
    E89-A No:9
      Page(s):
    2374-2380

    Cell assembly is one of explanations of information processing in the brain, in which an information is represented by a firing space pattern of a group of plural neurons. On the other hand, effectiveness of neural network has been confirmed in pattern recognition, system control, signal processing, and so on, since the back propagation learning was proposed. In this study, we propose a new network structure with affordable neurons in the hidden layer of the feedforward neural network. Computer simulated results show that the proposed network exhibits a good performance for the back propagation learning. Furthermore, we confirm the proposed network has a good generalization ability.

  • On Efficient Core Selection for Reducing Multicast Delay Variation under Delay Constraints

    Moonseong KIM  Young-Cheol BANG  Hyung-Jin LIM  Hyunseung CHOO  

     
    PAPER

      Vol:
    E89-B No:9
      Page(s):
    2385-2393

    With the proliferation of multimedia group applications, the construction of multicast trees satisfying the Quality of Service (QoS) requirements is becoming a problem of the prime importance. An essential factor of these real-time application is to optimize the Delay- and delay Variation-Bounded Multicast Tree (DVBMT) problem. This problem is to satisfy the minimum delay variation and the end-to-end delay within an upper bound. The DVBMT problem is known as NP-complete problem. The representative algorithms for the problem are DVMA, DDVCA, and so on. In this paper, we show that the proposed algorithm outperforms any other algorithm. The efficiency of our algorithm is verified through the performance evaluation and the enhancement is up to about 13.5% in terms of the multicast delay variation. The time complexity of our algorithm is O(mn2) which is comparable to well known DDVCA.

  • Orthogonal Set of Huffman Sequences and Its Application to Suppressed-Interference Quasi-Synchronous CDMA System

    Yoshihiro TANADA  

     
    PAPER

      Vol:
    E89-A No:9
      Page(s):
    2283-2291

    A Huffman sequence has a zero-sidelobe aperiodic autocorrelation function except at both shift ends. This paper presents orthogonal sets of the zero correlation zone (ZCZ) Huffman sequences and the application to a quasi-synchronous CDMA system with interferences suppressed. The sequences with low or large peak values are constructed on the basis of sequence spectra corresponding to multiple convolution of elementary sequences, and include the ZCZ sequences. The CDMA system is constructed from the ZCZ sequences, and suppresses intersymbol and interchannel interferences.

  • The Central Limit Theorem for the Normalized Sums of the MAI for SSMA Communication Systems Using Spreading Sequences of Markov Chains

    Hiroshi FUJISAKI  Gerhard KELLER  

     
    PAPER

      Vol:
    E89-A No:9
      Page(s):
    2307-2314

    We extend the sliding block code in symbolic dynamics to transform J (≥2) sequences of Markov chains with time delays. Under the assumption that the chains are irreducible and aperiodic, we prove the central limit theorem (CLT) for the normalized sums of extended sliding block codes from J sequences of Markov chains. We apply the theorem to the system analysis of asynchronous spread spectrum multiple access (SSMA) communication systems using spreading sequences of Markov chains. We find that the standard Gaussian approximation (SGA) for estimations of bit error probabilities in such systems is the 0-th order approximation of the evaluation based on the CLT. We also provide a simple theoretical evaluation of bit error probabilities in such systems, which agrees properly with the experimental results even for the systems with small number of users and low length of spreading sequences.

  • Multiobjective Evolutionary Approach to the Design of Optimal Controllers for Interval Plants via Parallel Computation

    Chen-Chien James HSU  Chih-Yung YU  Shih-Chi CHANG  

     
    PAPER-Systems and Control

      Vol:
    E89-A No:9
      Page(s):
    2363-2373

    Design of optimal controllers satisfying performance criteria of minimum tracking error and disturbance level for an interval system using a multi-objective evolutionary approach is proposed in this paper. Based on a worst-case design philosophy, the design problem is formulated as a minimax optimization problem, subsequently solved by a proposed two-phase multi-objective genetic algorithm (MOGA). By using two sets of interactive genetic algorithms where the first one determines the maximum (worst-case) cost function values for a given set of controller parameters while the other one minimizes the maximum cost function values passed from the first genetic algorithm, the proposed approach evolutionarily derives the optimal controllers for the interval system. To suitably assess chromosomes for their fitness in a population, root locations of the 32 generalized Kharitonov polynomials will be used to establish a constraints handling mechanism, based on which a fitness function can be constructed for effective evaluation of the chromosomes. Because of the time-consuming process that genetic algorithms generally exhibit, particularly the problem nature of minimax optimization, a parallel computation scheme for the evolutionary approach in the MATLAB-based working environment is also proposed to accelerate the design process.

  • Quasi-Orthogonal STBC System Using Unequal Power Allocation Scheme

    Yeon Ju LIM  Bong Jun KIM  Sang Kyu PARK  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:9
      Page(s):
    2633-2637

    Quasi-orthogonal Space Time Block Code (STBC) was designed to provide full transmission rate when using more than two antennas. However, it cannot have a full diversity gain because of the interference resulted from its quasi orthogonality property. In order to achieve full diversity from quasi-orthogonal STBC, the interference can be removed by a Simple Correlation Canceling (SCC) algorithm which improves a system performance significantly. However, the SCC algorithm has a disadvantage that produces noise enhancement, thereby resulting in performance degradation. Accordingly, without increasing an extra system complexity, an unequal power allocation scheme in a transmitter is proposed to achieve a better system performance than the conventional STBC system using the SCC algorithm. Also, the unequal power allocation scheme enables a receiver to use a simple decoding procedure that does not produce noise enhancement.

  • On Optimal Construction of Two Classes of ZCZ Codes

    Takafumi HAYASHI  Shinya MATSUFUJI  

     
    LETTER

      Vol:
    E89-A No:9
      Page(s):
    2345-2350

    This paper presents constructions of two kinds of sets of sequences with a zero correlation zone, called ZCZ code, which can reach the upper bound of the member size of the sequence set. One is a ZCZ code which can be constructed by a unitary matrix and a perfect sequence. Especially, a ternary perfect sequence with elements 1 and zero can be used to construct the proposed ZCZ code. The other is a ZCZ code of pairs of ternary sequences and binary sequences which can be constructed by an orthogonal matrix that includes a Hadamard matrix and an orthogonal sequence pair. As a special case, an orthogonal sequence pair, which consists of a ternary sequence and a binary sequence, can be used to construct the proposed ZCZ code. These codes can provide CDMA systems without co-channel interference.

  • Traffic Engineering for Provisioning Restorable Hose-Model VPNs

    Yu-Liang LIU  Yeali Sunny SUN  Meng Chang CHEN  

     
    PAPER

      Vol:
    E89-B No:9
      Page(s):
    2394-2403

    Virtual Private Networks (VPNs) are overlay networks established on top of a public network backbone with the goal of providing a service comparable to Private Networks (PNs). The recently proposed VPN hose-model provides customers with flexible and convenient ways to specify their bandwidth requirements. To meet the specified bandwidth requirements, the Network Service Provider (NSP) must reserve sufficient bandwidth on the data transmission paths between each pair of endpoints in a VPN. In addition, the reliability of a VPN depends on the reliability of the data transmission paths. Italiano et al. proposed an algorithm that finds a set of backup paths for a given VPN (VPN tree) under the single-link failure model [1]. When a link failure is detected on a VPN tree, a backup path corresponding to the failed link can be activated to restore the disconnected VPN tree into a new one, thereby ensuring the reliability of the VPN. However, Italiano's algorithm cannot guarantee that the specified bandwidth requirement of the given VPN under the single-link failure model will be met. To address this issue, we propose a new backup path set selection algorithm called BANGUAD in this paper. In addition, the problem of establishing multiple bandwidth-guaranteed hose-model VPNs under the single-link failure model has not been investigated previously. However in this problem, bandwidth-sharing algorithms have the potential to improve the performance of a provisioning algorithm significantly. Therefore, we also propose a bandwidth sharing algorithm and three provisioning algorithms for establishing multiple bandwidth-guaranteed hose-model VPNs under the single-link failure model. Simulations that compare the performance of the proposed algorithms are reported.

  • A Synchronization Protocol for OFDM-Based Asynchronous Access Networks

    Sanghoon LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:9
      Page(s):
    2638-2640

    To generate multiple orthogonal carriers in an OFDM (Orthogonal Frequency Division Multiplexing) symbol, an FFT (Fast Fourier Transform) and IFFT (Inverse FFT) pair is utilized at the transmitter and the receiver, respectively. Thus, it may be difficult for an MN (Mobile Node) to reconstruct signals received from several BSs (Base Stations), when single FFT module is used. Moreover, when a GPS (Global Position System) is not supported, ICI (Inter Carrier Interference) may occur over multi-cell environments. This paper introduces a synchronization protocol for OFDM-based asynchronous networks that do not use GPS. The network protocol is designed to perform the plug & access radio configuration for next generation networks.

10481-10500hit(18690hit)