Tsukasa TAKAHASHI Teruyuki MIYAJIMA
In OFDM systems, residual inter-block interference can be suppressed by a time-domain equalizer that blindly shortens the effective length of a channel impulse response. To further improve the performance of blind equalizers, we propose a channel shortening method that attempts to maximize the minimum FFT output power over data subcarriers. Simulation results indicate that the max-min strategy has performance improvement over a conventional channel shortening method.
Vakhtang JANDIERI Kiyotoshi YASUMOTO
A semi-analytical method for a planar periodic array formed by a finite number of magnetized ferrite circular cylinders is presented using a model of layered cylindrical structures. The method uses the T-matrix approach and the extraction of the reflection and transmission matrices based on the cylindrical harmonic mode expansion. Based on the proposed method, plane wave scattering by the finite number of magnetized ferrite circular cylinders is numerically studied from the viewpoint of realization the electronic switching and electronic scanning effects by varying the applied magnetic field.
Yukiko KISHIKI Jun-ichi TAKADA Gilbert Siy CHING Hajime TAKAO Yoshihiro SUGIHARA Shigeaki MATSUNAGA Fumiya UESAKA
For the modeling of multipath propagation in every wireless systems, the ray tracing method has been widely studied. However, large errors may result due to the approximation of geometrical optics in curved surfaces. This paper therefore focused on the curved surfaces and edges, which are difficult to handle in ray tracing. Examples of curved surfaces can be found in arched cross-section tunnels which are common in highway networks of mountainous areas. The traditional ray tracing method of dividing the curved surface into smaller flat plates is not so accurate as the size of smaller plates may not satisfy the geometrical optics assumption, and the reflection point which satisfies Fermat's principle may not exist. In this work, a new ray tracing method is proposed with 2 contributions. The first one is the implementation of the reflection coefficient for curved surfaces in ray tracing. The second is applying the physical optics method on the caustics region. To evaluate these methods, path gain simulation results for an arched cross-section model are compared with measurements made inside an arched tunnel. To further improve the simulation results, the effect of rough surface is introduced, and the results are again compared with measurement.
Hideki KAWAGUCHI Kazunori MAEDA Shohei KODATE Yoshihiro ITO
Streak cameras are now widely used for measurements of ultra short phenomena, such as those in semi conductor luminescence and plasma gaseous discharge. To further improve the temporal resolution and carry out higher-dimensional measurements, it is necessary to understand the electron beam behavior in detail. Thus, numerical simulations play an important role in the analysis of the streak camera. The authors have been working on the development of a numerical simulation code that uses the finite difference method (FDM) for electric field analysis, the Runge-Kutta (R-K) method for charged particle motion determination, and the particle-in-cell (PIC) method for charge density calculation. However, the use of the PIC method leads to inaccuracy in the charge density calculation in cases of high-density electron beams. To improve the accuracy of the conventional analysis of the streak camera, we perform the boundary element (BE) analysis of the streak camera.
We deal with the scattering of a scalar plane wave by a half plane with a sinusoidally deformed edge from a straight edge by a physical optics approximation. The normal incidence of a plane wave to an edge is assumed. A contribution of an edge to the field integral is asymptotically evaluated and the basic properties of the scattering caused by the edge deformation is clarified. The scattering pattern has peaks at specific scattering angles, which agree with diffraction angles calculated by the well-known grating formula for normal incidence. Some numerical examples are shown and it is shown that the results are in good agreement with the results obtained by the GTD method for low angle incidence.
Suguru KAMEDA Hiroshi OGUMA Noboru IZUKA Yasuyoshi ASANO Yoshiharu YAMAZAKI Noriharu SUEMATSU Tadashi TAKAGI Kazuo TSUBOUCHI
This paper describes downlink throughput performances measured in a mobile broadband wireless access (MBWA) system field trial with Fast Low-latency Access with Seamless Handoff Orthogonal Frequency Division Multiplexing (FLASH-OFDM). The field trial results show that the downlink cell sizes are 0.4 km2, 0.6 km2, and 1.7 km2 when the sector antenna heights are 19 m, 58 m, and 84 m, respectively, assuming the following items. (1) The cell shape is circular. (2) The cell edge is defined as the location where the average downlink throughput is 1.5 Mbit/s.
Masashi NOMURA Shigemasa TAKAI
In this paper, we study decentralized supervisory control of timed discrete event systems, where we adopt the OR rule for fusing local enablement decisions and the AND rule for fusing local enforcement decisions. Under these rules, necessary and sufficient conditions for the existence of a decentralized supervisor that achieves a given specification language are easily obtained from the result of literature. If a given specification language does not satisfy these existence conditions, we must compute its sublanguage satisfying them. The main contribution of this paper is proposing a method for computing such a sublanguage.
Shaojing FU Chao LI Longjiang QU
Because of the algebraic attacks, a high algebraic immunity is now an important criteria for Boolean functions used in stream ciphers. In 2011, X.Y. Zeng et al. proposed three constructions of balanced Boolean functions with maximum algebraic immunity, the constructions are based on univariate polynomial representation of Boolean functions. In this paper, we will improve X.Y. Zeng et al.' constructions to obtain more even-variable Boolean functions with maximum algebraic immunity. It is checked that, our new functions can have as high nonlinearity as X.Y. Zeng et al.' functions.
Kuniyasu SUZAKI Kengo IIJIMA Toshiki YAGI Cyrille ARTHO
Memory deduplication improves the utilization of physical memory by sharing identical blocks of data. Although memory deduplication is most effective when many virtual machines with same operating systems run on a CPU, cross-user memory deduplication is a covert channel and causes serious memory disclosure attack. It reveals the existence of an application or file on another virtual machine. The covert channel is a difference in write access time on deduplicated memory pages that are re-created by Copy-On-Write, but it has some interferences caused by execution environments. This paper indicates that the attack includes implementation issues caused by memory alignment, self-reflection between page cache and heap, and run-time modification (swap-out, anonymous pages, ASLR, preloading mechanism, and self-modification code). However, these problems are avoidable with some techniques. In our experience on KSM (kernel samepage merging) with the KVM virtual machine, the attack could detect the security level of attacked operating systems, find vulnerable applications, and confirm the status of attacked applications.
In this letter, a low complexity decoder for non-binary low-density parity-check (LDPC) codes in a multiple-input and multiple-output (MIMO) channel is proposed employing Quasi-orthogonal space-time block code (QOSTBC). The complexity of the proposed decoding algorithm involved grows linearly with the number of transmit antennas and order of Galois Field.
We introduce a new kind of P2P traffic localization technique, called Netpherd, benefiting from the network virtualization technique for its successful deployment. Netpherd exploits one feature of P2P applications, a peer selection adaptation (i.e., preferring peers who are likely to provide better performance) for the traffic localization. Netpherd tries to enable local peers (i.e., peers in target network domain) to communicate with each other by affecting the peer selection adaptation. To affect the peer selection adaptation, Netpherd adds artificial delay to inter-domain traffic going to local peers. Our experiment conducted over Internet testbed verifies that Netpherd achieves the traffic localization and also improves the content download performance with the network delay insertion. In addition, we show that how the network virtualization technique can be utilized for efficient and graceful implementation of Netpherd.
Biao WANG Weifeng LI Zhimin LI Qingmin LIAO
In this letter, we propose an extension to the classical logarithmic total variation (LTV) model for face recognition under variant illumination conditions. LTV treats all facial areas with the same regularization parameters, which inevitably results in the loss of useful facial details and is harmful for recognition tasks. To address this problem, we propose to assign the regularization parameters which balance the large-scale (illumination) and small-scale (reflectance) components in a spatially adaptive scheme. Face recognition experiments on both Extended Yale B and the large-scale FERET databases demonstrate the effectiveness of the proposed method.
In this paper, we study a boomerang attack approach on MD4-based hash functions, and present a practical 4-sum distinguisher against the compression function of the full 5-pass HAVAL. Our approach is based on the previous work by Kim et al., which proposed the boomerang distinguisher on the encryption mode of MD4, MD5, and HAVAL in the related-key setting. Firstly, we prove that the differential path for 5-pass HAVAL used in the previous boomerang distinguisher contains a critical flaw and thus the attack cannot work. We then search for new differential paths. Finally, by using the new paths, we mount the distinguisher on the compression function of the full 5-pass HAVAL which generates a 4-sum quartet with a complexity of approximately 211 compression function computations. As far as we know, this is the first result on the full compression function of 5-pass HAVAL that can be computed in practice. We also point out that the 4-sum distinguisher can also be constructed for other MD4-based hash functions such as MD5, 3-pass HAVAL, and 4-pass HAVAL. Our attacks are implemented on a PC and we present a generated 4-sum quartet for each attack target.
Yi ZHOU Yusheng JI Weidong XIANG Sateesh ADDEPALLI Aihuang GUO Fuqiang LIU
To accurately evaluate and manage future distributed wireless networks, it is indispensable to fully understand cooperative propagation channels. In this contribution, we propose cascaded multi-keyhole channel models for analyzing cooperative diversity wireless communications. The cascaded Wishart distribution is adopted to investigate the eigenvalue distribution of the multi-keyhole MIMO (multiple input multiple output) channel matrix, and the capacity performance is also presented for the wireless systems over such channels. A diversity order approximation method is proposed for better evaluating the eigenvalue and capacity distributions. The good match of analytical derivations and numerical simulations validates the proposed models and analysis methods. The proposed models can provide an important reference for the optimization and management of cooperative diversity wireless networks.
Haijun LIANG Hongyu YANG Bo YANG
A new paradigm for building Virtual Controller Model (VCM) for traffic flow simulator is developed. It is based on flight plan data and is applied to Traffic Flow Management System (TFMS) in China. The problem of interest is focused on the sectors of airspace and how restrictions to aircraft movement are applied by air traffic controllers and demand overages or capacity shortfalls in sectors of airspace. To estimate and assess the balance between the traffic flow and the capacity of sector in future, we apply Virtual Controller model, which models by the sectors airspace system and its capacity constraints. Numerical results are presented and illustrated by applying them to air traffic data for a typical day in the Traffic Flow Management System. The results show that the predictive capabilities of the model are successfully validated by showing a comparison between real flow data and simulated sector flow, making this method appropriate for traffic flow management system.
The Generalized cross-correlation (GCC) method is most commonly used for time delay estimation (TDE). However, the GCC method can result in false peak errors (FPEs) especially at a low signal to noise ratio (SNR). These FPEs significantly degrade TDE, since the estimation error, which is the difference between a true time delay and an estimated time delay, is larger than at least one sampling period. This paper introduces an algorithm that estimates two peaks for two cross-correlation functions using three types of signals such as a reference signal, a delayed signal, and a delayed signal with an additional time delay of half a sampling period. A peak selection algorithm is also proposed in order to identify which peak is closer to the true time delay using subsample TDE methods. This paper presents simulations that compare the algorithms' performance for varying amounts of noise and delay. The proposed algorithms can be seen to display better performance, in terms of the probability of the integer TDE errors, as well as the mean and standard deviation of absolute values of the time delay estimation errors.
The cooperative orthogonal frequency-division multiplexing (OFDM) relaying system is widely regarded as a key design for future broadband mobile cellular systems. This paper focuses on channel estimation in such a system that uses amplify-and-forward (AF) as the relaying strategy. In the cooperative AF relaying, the destination requires the individual (disintegrated) channel state information (CSI) of the source-relay (S-R) and relay-destination (R-D) links for optimum combination of the signals received from source and relay. Traditionally, the disintegrated CSIs are obtained with two channel estimators: one at the relay and the other at the destination. That is, the CSI of the S-R link is estimated at relay and passed to destination, and the CSI of the R-D link is estimated at destination with the help of pilot symbols transmitted by relay. In this paper, a new disintegrated channel estimator is proposed; based on an expectation-maximization (EM) algorithm, the disintegrated CSIs can be estimated solely by the estimator at destination. Therefore, the new method requires neither signaling overhead for passing the CSI of the S-R link to destination nor pilot symbols for the estimation of the R-D link. Computer simulations show that the proposed estimator works well under the signal-to-noise ratios of interest.
This paper identifies a ripple effect problem (REP) that spreads interference to neighbors and proposes a novel channel localization mechanism to decrease the REP in a Wi-Fi system. The proposed mechanism has less blocking probability when compared to a random channel allocation mechanism and also has increased channel reusability. The proposed mechanism in simulation yields less channels BEm as the number of users and Tused increase.
Network slicing for wide-area coordinated packet processing has attracted attentions for improving efficiency of handling network traffic. We have recently proposed a tag-based network slicing mechanism called OpenTag, and introduced the prototype implementation of the OpenTag redirector on an evaluation board. In this paper, we investigate the integration of the OpenTag redirector into a commercial network device. Our contributions are three-fold: (1) designing the architecture aiming OpenTag-capable intermediaries embedded on commercial network devices, (2) implementing a prototype of the embedded OpenTag redirector using the Advanced Mezzanine Card (AMC) which has an OCTEON network processor, (3) showing our implementation can tolerate high bandwidth environment.
Xiaoping LI Wenping MA Tongjiang YAN Xubo ZHAO
In this letter we propose a new Whiteman generalized cyclotomic sequence of order 4. Meanwhile, we determine its linear complexity and minimal polynomial. The results show that this sequence possesses both high linear complexity and optimal balance on 1 s and 0 s, which may be attractive for cryptographic applications.