The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

6161-6180hit(20498hit)

  • Complexity Reduced Lattice-Reduction-Aided MIMO Receiver with Virtual Channel Detection

    Shogo YOSHIKAWA  Satoshi DENNO  Masahiro MORIKURA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    263-270

    This paper proposes a lattice-reduction-aided MIMO-OFDM receiver with virtual channels; the receiver enables an increase in the downlink transmission speed for a user where the number of transmit antennas is considerably higher than that of the receive antennas. However, the receiver has a higher computational complexity than conventional lattice-reduction-aided MIMO receivers. Accordingly, we also propose novel techniques to reduce the computational complexity for the lattice-reduction-aided MIMO receivers with virtual channels. The proposed MIMO receiver achieves superior performance in 102 MIMO-OFDM systems. Furthermore, the proposed techniques are shown to reduce the computational complexity to approximately 40% of the original configuration in the 102 MIMO-OFDM systems.

  • Modeling and Algorithms for QoS-Aware Service Composition in Virtualization-Based Cloud Computing

    Jun HUANG  Yanbing LIU  Ruozhou YU  Qiang DUAN  Yoshiaki TANAKA  

     
    PAPER

      Vol:
    E96-B No:1
      Page(s):
    10-19

    Cloud computing is an emerging computing paradigm that may have a significant impact on various aspects of the development of information infrastructure. In a Cloud environment, different types of network resources need to be virtualized as a series of service components by network virtualization, and these service components should be further composed into Cloud services provided to end users. Therefore Quality of Service (QoS) aware service composition plays a crucial role in Cloud service provisioning. This paper addresses the problem on how to compose a sequence of service components for QoS guaranteed service provisioning in a virtualization-based Cloud computing environment. The contributions of this paper include a system model for Cloud service provisioning and two approximation algorithms for QoS-aware service composition. Specifically, a system model is first developed to characterize service provisioning behavior in virtualization-based Cloud computing, then a novel approximation algorithm and a variant of a well-known QoS routing procedure are presented to resolve QoS-aware service composition. Theoretical analysis shows that these two algorithms have the same level of time complexity. Comparison study conducted based on simulation experiments indicates that the proposed novel algorithm achieves better performance in time efficiency and scalability without compromising quality of solution. The modeling technique and algorithms developed in this paper are general and effective; thus are applicable to practical Cloud computing systems.

  • Fast Bit-Parallel Polynomial Basis Multiplier for GF(2m) Defined by Pentanomials Using Weakly Dual Basis

    Sun-Mi PARK  Ku-Young CHANG  Dowon HONG  Changho SEO  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E96-A No:1
      Page(s):
    322-331

    In this paper, we derive a fast polynomial basis multiplier for GF(2m) defined by pentanomials xm+xk3+xk2+xk1+1 with 1 ≤ k1 < k2 < k3 ≤ m/2 using the presented method by Park and Chang. The proposed multiplier has the time delay TA+(2+⌈log2(m-1)⌉) TX or TA+(3+⌈log2(m-1)⌉) TX which is the lowest one compared with known multipliers for pentanomials except for special types, where TA and TX denote the delays of one AND gate and one XOR gate, respectively. On the other hand, its space complexity is very slightly greater than the best known results.

  • A Max-Min Approach to Channel Shortening in OFDM Systems

    Tsukasa TAKAHASHI  Teruyuki MIYAJIMA  

     
    LETTER

      Vol:
    E96-A No:1
      Page(s):
    293-295

    In OFDM systems, residual inter-block interference can be suppressed by a time-domain equalizer that blindly shortens the effective length of a channel impulse response. To further improve the performance of blind equalizers, we propose a channel shortening method that attempts to maximize the minimum FFT output power over data subcarriers. Simulation results indicate that the max-min strategy has performance improvement over a conventional channel shortening method.

  • Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures

    Shingo YANAGIHARA  Tetsu IWATA  

     
    PAPER-Symmetric Key Cryptography

      Vol:
    E96-A No:1
      Page(s):
    2-14

    The Generalized Feistel Structure (GFS) generally uses the sub-block-wise cyclic shift in the permutation layer, the layer between the two F function layers. For Type 2 GFS, at FSE 2010, Suzaki and Minematsu showed that a better diffusion property can be obtained if one uses some other sub-block-wise permutation. In this paper, we consider Type 1, Type 3, Source-Heavy (SH), and Target-Heavy (TH) GFSs, and study if their diffusion properties can be improved by changing the sub-block-wise cyclic shift. For Type 1 GFS and Type 3 GFS, we show that better permutations in terms of diffusion exist. For SH and TH GFSs, we show that the diffusion property does not change even if we change the sub-block-wise cyclic shift. We also experimentally derive optimum permutations in terms of diffusion, and evaluate the security of the resulting schemes against saturation, impossible differential, differential, and linear attacks.

  • A Novel Low-Complexity Channel Estimation Approach for Single Carrier MIMO Frequency Selective Channels

    Suyue LI  Jian XIONG  Lin GUI  Youyun XU  Baoyu ZHENG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    233-241

    A simple yet effective time domain correlation channel estimation method is proposed for multiple-input multiple-output (MIMO) systems over dispersive channels. It is known that the inherent co-channel interference (CCI) and inter-symbol interference (ISI) coexist when the signals propagate through MIMO frequency selective channels, which renders the MIMO channel estimation intractable. By elaborately devising the quasi-orthogonal training sequences between multiple antennas which have constant autocorrelation property with different cyclic shifts in the time domain, the interferences induced by ISI and CCI can be simultaneously maintained at a constant and identical value under quasi-static channels. As a consequence, it is advisable to implement the joint ISI and CCI cancelation by solving the constructed linear equation on the basis of the correlation output with optional correlation window. Finally, a general and simplified closed-form expression of the estimated channel impulse response can be acquired without matrix inversion. Additionally, the layered space-time (LST) minimum mean square error (MMSE) (LST-MMSE) frequency domain equalization is briefly described. We also provide some meaningful discussions on the beginning index of the variable correlation window and on the cyclic shift number of m-sequence of other antennas relative to the first antenna. Simulation results demonstrate that the proposed channel estimation approach apparently outperforms the existing schemes with a remarkable reduction in computational complexity.

  • Design of a Dual-Band Dual-Polarization Array Antenna with Improved Bandwidth for AMRFC Radar Application

    Youngki LEE  Deukhyeon GA  Daesung PARK  Seokgon LEE  Jaehoon CHOI  

     
    PAPER-Antennas and Propagation

      Vol:
    E96-B No:1
      Page(s):
    182-189

    A dual-band dual-polarization array antenna with improved bandwidth for an advanced multi-function radio function concept (AMRFC) radar application is proposed. To improve the S-band impedance bandwidth, the proposed antenna uses modified coupling feed patch. The measured bandwidth of the prototype array is 19.8% and 25.7% for the S- and X-band, respectively. The isolation between the two orthogonal polarizations is higher than 15 dB and cross-polarization level is less than -17 dB for both S- and X-bands.

  • Adaptive Limited Dynamic Bandwidth Allocation Scheme to Improve Bandwidth Sharing Efficiency in Hybrid PON Combining FTTH and Wireless Sensor Networks

    Monir HOSSEN  Masanori HANAWA  

     
    PAPER-Network

      Vol:
    E96-B No:1
      Page(s):
    127-134

    This paper proposes a dynamic bandwidth allocation algorithm that improves the network performance and bandwidth sharing efficiency in the upstream channels of a hybrid passive optical network (PON) that combines a fiber-to-the-home (FTTH) access network and wireless sensor networks (WSNs). The algorithm is called the adaptive limited dynamic bandwidth allocation (ALDBA) algorithm. Unlike existing algorithms, the ALDBA algorithm is not limited to controlling just FTTH access networks, it also supports WSNs. For the proposed algorithm, we investigate the difference in the lengths of generated data packets between the FTTH terminals and sensor nodes of WSN to effectively evaluate the end-to-end average packet delay, bandwidth utilization, time jitter, and upstream efficiency. Two variants of the proposed algorithm and a limited service (LS) scheme, which is an existing well-known algorithm, are compared under non-uniform traffic conditions without taking into consideration priority scheduling. We demonstrate the proposed scheme through simulation by generating a realistic network traffic model, called self-similar network traffic. We conducted a detailed simulation using several performance parameters to validate the effectiveness of the proposed scheme. The results of the simulation showed that both ALDBA variants outperformed the existing LS scheme in terms of average packet delay, bandwidth utilization, jitter, and upstream efficiency for both low and high traffic loads.

  • Multiple Symbol Differential Detection with Majority Decision Method for DQPSK in LOS Channel

    Hiroyasu ISHIKAWA  Hideyuki SHINONAGA  

     
    LETTER-Satellite Communications

      Vol:
    E96-B No:1
      Page(s):
    384-388

    This letter proposes a multiple symbol differential detection (MSDD) with majority decision method for differentially coded quadrature phase-shift keying (DQPSK) in Rician fading channels. The proposed method shows better BER performance than the conventional MSDD. Simulation results show that the proposed MSDD with a majority decision method improves the system's BER performance for DQPSK signals under the AWGN channel and it approaches asymptotically the theoretical BER performance of coherent detection. Furthermore, the proposed method shows better BER performance under the Rician fading channel with large frequency offsets especially for the range of C/M > 12 dB in comparison with the conventional MSDD.

  • Localization of Wi-Fi Access Point Using Smart Phone's GPS Information

    Seung-Man CHUN  Seung-Mu LEE  Jae-Wook NAH  Jong-Tae PARK  

     
    LETTER-Network System

      Vol:
    E96-B No:1
      Page(s):
    305-308

    Precise localization of the Wi-Fi Access Point (AP) is becoming increasingly important with the rise of diverse location-based and smart phone-based services. In this article, we propose a new method for precise Wi-Fi AP localization using GPS information of a smart phone. The idea is that the possible area of Wi-Fi AP location, termed AP_Area, is first determined by measuring GPS information and the received signal strength of smart phones. As the number of measurements from users' smart phones increases, the AP_Area is successively narrowed down to the true AP location. Simulation shows the proposed algorithm can detect the Wi-Fi AP's localization within 5 m (probability exceeds 90%).

  • ISP-Driven Delay Insertion for P2P Traffic Localization

    HyunYong LEE  Akihiro NAKAO  

     
    PAPER

      Vol:
    E96-B No:1
      Page(s):
    40-47

    We introduce a new kind of P2P traffic localization technique, called Netpherd, benefiting from the network virtualization technique for its successful deployment. Netpherd exploits one feature of P2P applications, a peer selection adaptation (i.e., preferring peers who are likely to provide better performance) for the traffic localization. Netpherd tries to enable local peers (i.e., peers in target network domain) to communicate with each other by affecting the peer selection adaptation. To affect the peer selection adaptation, Netpherd adds artificial delay to inter-domain traffic going to local peers. Our experiment conducted over Internet testbed verifies that Netpherd achieves the traffic localization and also improves the content download performance with the network delay insertion. In addition, we show that how the network virtualization technique can be utilized for efficient and graceful implementation of Netpherd.

  • A Theoretical Analysis of a Circular Microstrip Antenna in a Parallel-Plate Waveguide

    Narihiro NAKAMOTO  Tomohiro OKA  Shoichi KITAZAWA  Hiroshi BAN  Kiyoshi KOBAYASHI  

     
    PAPER-Antennas and Propagation

      Vol:
    E96-B No:1
      Page(s):
    173-181

    To better understand antenna properties in a narrow space such as in a densely-packed device, a circular microstrip antenna in a narrow parallel-plate waveguide is theoretically studied. An analytical expression is derived for the input impedance in a parallel-plate waveguide by using the cavity model with surface admittance on the side wall. The surface admittance is defined by the external magnetic field due to the equivalent magnetic current at the aperture and takes into account the contribution of the parallel plates to the antenna. The magnetic field external to the antenna, that is in the parallel-plate region, is determined by using a dyadic Green's function. The input impedance is then calculated by a basic definition based on the conservation of the complex power. An analytical expression which couples the resonant frequency and the surface susceptance is also formulated. Presented expressions are validated by comparison with experimental results.

  • Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation

    Shaojing FU  Chao LI  Longjiang QU  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:1
      Page(s):
    360-362

    Because of the algebraic attacks, a high algebraic immunity is now an important criteria for Boolean functions used in stream ciphers. In 2011, X.Y. Zeng et al. proposed three constructions of balanced Boolean functions with maximum algebraic immunity, the constructions are based on univariate polynomial representation of Boolean functions. In this paper, we will improve X.Y. Zeng et al.' constructions to obtain more even-variable Boolean functions with maximum algebraic immunity. It is checked that, our new functions can have as high nonlinearity as X.Y. Zeng et al.' functions.

  • OpenTag: Tag-Based User-Driven In-Network Packet Processing on Commercial Network Devices

    Ryoji FURUHASHI  Akihiro NAKAO  

     
    PAPER

      Vol:
    E96-B No:1
      Page(s):
    31-39

    Network slicing for wide-area coordinated packet processing has attracted attentions for improving efficiency of handling network traffic. We have recently proposed a tag-based network slicing mechanism called OpenTag, and introduced the prototype implementation of the OpenTag redirector on an evaluation board. In this paper, we investigate the integration of the OpenTag redirector into a commercial network device. Our contributions are three-fold: (1) designing the architecture aiming OpenTag-capable intermediaries embedded on commercial network devices, (2) implementing a prototype of the embedded OpenTag redirector using the Advanced Mezzanine Card (AMC) which has an OCTEON network processor, (3) showing our implementation can tolerate high bandwidth environment.

  • Linear Complexity of Binary Whiteman Generalized Cyclotomic Sequences of Order 4

    Xiaoping LI  Wenping MA  Tongjiang YAN  Xubo ZHAO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:1
      Page(s):
    363-366

    In this letter we propose a new Whiteman generalized cyclotomic sequence of order 4. Meanwhile, we determine its linear complexity and minimal polynomial. The results show that this sequence possesses both high linear complexity and optimal balance on 1 s and 0 s, which may be attractive for cryptographic applications.

  • An Online Bandwidth Allocation Scheme Based on Mechanism Design Model

    Sungwook KIM  

     
    LETTER-Network

      Vol:
    E96-B No:1
      Page(s):
    321-324

    In this paper, a new bandwidth allocation scheme is proposed based on the Mechanism Design (MD); MD is a branch of game theory that stimulates rational users to behave cooperatively for a global goal. The proposed scheme consists of bandwidth adaptation, call admission control and pricing computation algorithms to improve network performance. These algorithms are designed based on the adaptive online approach and work together to maximize bandwidth efficiency economically. A simulation shows that the proposed scheme can satisfy contradictory requirements and so provide well-balanced network performance.

  • Analysis of Two-Dimensional Photonic Crystal Optical Power Splitter with Microcavity

    Yoshihiro NAKA  Yusui NAKAMURA  

     
    BRIEF PAPER-Periodic Structures

      Vol:
    E96-C No:1
      Page(s):
    73-76

    An efficient 12 optical power splitter constructed by a two-dimensional photonic crystal has been analyzed using the finite difference time domain (FD-TD) method. The power splitter has a microcavity which is coupled to an input and two output waveguides. We have confirmed that all optical power is transmitted into output waveguides due to resonant tunneling caused by the microcavity.

  • Minimizing False Peak Errors in Generalized Cross-Correlation Time Delay Estimation Using Subsample Time Delay Estimation

    SooHwan CHOI  DooSeop EOM  

     
    PAPER-Digital Signal Processing

      Vol:
    E96-A No:1
      Page(s):
    304-311

    The Generalized cross-correlation (GCC) method is most commonly used for time delay estimation (TDE). However, the GCC method can result in false peak errors (FPEs) especially at a low signal to noise ratio (SNR). These FPEs significantly degrade TDE, since the estimation error, which is the difference between a true time delay and an estimated time delay, is larger than at least one sampling period. This paper introduces an algorithm that estimates two peaks for two cross-correlation functions using three types of signals such as a reference signal, a delayed signal, and a delayed signal with an additional time delay of half a sampling period. A peak selection algorithm is also proposed in order to identify which peak is closer to the true time delay using subsample TDE methods. This paper presents simulations that compare the algorithms' performance for varying amounts of noise and delay. The proposed algorithms can be seen to display better performance, in terms of the probability of the integer TDE errors, as well as the mean and standard deviation of absolute values of the time delay estimation errors.

  • Evaluation of Cascaded Multi-Keyhole Channels in Cooperative Diversity Wireless Communications

    Yi ZHOU  Yusheng JI  Weidong XIANG  Sateesh ADDEPALLI  Aihuang GUO  Fuqiang LIU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    223-232

    To accurately evaluate and manage future distributed wireless networks, it is indispensable to fully understand cooperative propagation channels. In this contribution, we propose cascaded multi-keyhole channel models for analyzing cooperative diversity wireless communications. The cascaded Wishart distribution is adopted to investigate the eigenvalue distribution of the multi-keyhole MIMO (multiple input multiple output) channel matrix, and the capacity performance is also presented for the wireless systems over such channels. A diversity order approximation method is proposed for better evaluating the eigenvalue and capacity distributions. The good match of analytical derivations and numerical simulations validates the proposed models and analysis methods. The proposed models can provide an important reference for the optimization and management of cooperative diversity wireless networks.

  • Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta

    Yu SASAKI  Kazumaro AOKI  

     
    PAPER-Hash Functions

      Vol:
    E96-A No:1
      Page(s):
    141-149

    This paper shows a known-key distinguisher on the internal block cipher of tweaked Lesamnta reduced to 31 (out of 32) rounds, which is one of the hash functions submitted to the SHA-3 competition. Moreover, the paper presents a distinguisher for full internal block cipher of Lesamnta with stronger assumption. For its tweaked version, all previous cryptanalysis can work no more than 24 rounds. We search for a new integral characteristic for the internal block cipher, and discover a 19-round integral characteristic for forward direction. We then search for an integral characteristic for backward direction, and the characteristics can be combined to full rounds with some assumption. The distinguisher for the internal block cipher of Lesamnta-256 requires 2192 query complexity and negligible memory. This is the best attack on Lesamnta compression function and its internal block cipher after the tweak.

6161-6180hit(20498hit)