The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

6621-6640hit(20498hit)

  • Route Instruction Mechanism for Mobile Users Leveraging Distributed Wireless Resources

    Takeshi KAKEHI  Ryoichi SHINKUMA  Tutomu MURASE  Gen MOTOYOSHI  Kyoko YAMORI  Tatsuro TAKAHASHI  

     
    PAPER

      Vol:
    E95-B No:6
      Page(s):
    1965-1973

    The market growths of smart-phones and thin clients have been significantly increasing communication traffic in mobile networks. To handle the increased traffic, network operators should consider how to leverage distributed wireless resources such as distributed spots of wireless local access networks. In this paper, we consider the system where multiple moving users share distributed wireless access points on their traveling routes between their start and goal points and formulate as an optimization problem. Then, we come up with three algorithms as a solution for the problem. The key idea here is 'longcut route instruction', in which users are instructed to choose a traveling route where less congested access points are available; even if the moving distance increases, the throughput for users in the system would improve. In this paper, we define the gain function. Moreover, we analyze the basic characteristics of the system using as a simple model as possible.

  • TXOP Exchange: A Mechanism for Cooperation in CSMA Networks

    Takayuki NISHIO  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  Narayan B. MANDAYAM  

     
    PAPER

      Vol:
    E95-B No:6
      Page(s):
    1944-1952

    Conventional mechanisms proposed for enhancing quality of service (QoS) in 802.11 networks suffer from a lack of backward compatibility and fairness with and to legacy devices. In this paper, we present a cooperative mechanism, called TXOP (transmission opportunity) Exchange, that provides a legacy-neutral solution in which only stations (STAs) participating in TXOP Exchange cooperatively use their available bandwidth to satisfy their required throughputs, while other legacy devices continue to get the same throughput performance as before. Specifically, we discuss the implementation of TXOP Exchange in legacy 802.11 networks. We show that this mechanism can be realized with minor modifications to the RTS (request-to-send) frames of only the STAs participating in TXOP Exchange and without any replacement of legacy access points or STAs. We show an example of a proportional fair algorithm for fair and efficient MAC cooperation using a Nash bargaining solution (NBS). A simulation study using a realistic simulator verifies that the TXOP Exchange mechanism ensures legacy neutrality and fair and efficient cooperation even when a large number of legacy STAs coexist.

  • An Adaptive Multi-Range-Sensing Method for 3D Localization of Passive RFID Tags

    Tomotaka WADA  Toshihiro HORI  Manato FUJIMOTO  Kouichi MUTSUURA  Hiromi OKADA  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E95-A No:6
      Page(s):
    1074-1083

    The RFID tag system has received a lot of attention for ubiquitous computing. An RFID tag is attached to an object. With the unique ID of the RFID tag, a user identifies the object provided with the RFID tag and derives appropriate information about the object. One important application in the RFID technology is localizing RFID tags, which can be very useful in acquiring the position information concerning the RFID tags. It can be applied to navigation systems and positional detection systems for mobile robots. This paper proposes a new adaptive multi-range-sensing method for 3D localization of passive RFID tags by using a probabilistic approach. In this method, a mobile object (human, robot, etc.) with an RFID reader estimates the positions of RFID tags with multiple communication ranges dynamically. The effectiveness of the proposed method was demonstrated in experiments.

  • Halftoning with Weighted Centroidal Voronoi Tessellations

    Kohei INOUE  Kiichi URAHAMA  

     
    LETTER-Computer Graphics

      Vol:
    E95-A No:6
      Page(s):
    1103-1105

    We propose a method for halftoning grayscale images by drawing weighted centroidal Voronoi tessellations (WCVTs) with black lines on white image planes. Based on the fact that CVT approaches a uniform hexagonal lattice asymptotically, we derive a relationship of darkness between input grayscale images and the corresponding halftone images. Then the derived relationship is used for adjusting the contrast of the halftone images. Experimental results show that the generated halftone images can reproduce the original tone in the input images faithfully.

  • Dynamic Multiple Work Stealing Strategy for Flexible Load Balancing

    ADNAN  Mitsuhisa SATO  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E95-D No:6
      Page(s):
    1565-1576

    Lazy-task creation is an efficient method of overcoming the overhead of the grain-size problem in parallel computing. Work stealing is an effective load balancing strategy for parallel computing. In this paper, we present dynamic work stealing strategies in a lazy-task creation technique for efficient fine-grain task scheduling. The basic idea is to control load balancing granularity depending on the number of task parents in a stack. The dynamic-length strategy of work stealing uses run-time information, which is information on the load of the victim, to determine the number of tasks that a thief is allowed to steal. We compare it with the bottommost first work stealing strategy used in StackThread/MP, and the fixed-length strategy of work stealing, where a thief requests to steal a fixed number of tasks, as well as other multithreaded frameworks such as Cilk and OpenMP task implementations. The experiments show that the dynamic-length strategy of work stealing performs well in irregular workloads such as in UTS benchmarks, as well as in regular workloads such as Fibonacci, Strassen's matrix multiplication, FFT, and Sparse-LU factorization. The dynamic-length strategy works better than the fixed-length strategy because it is more flexible than the latter; this strategy can avoid load imbalance due to overstealing.

  • Hand-Shape Recognition Using the Distributions of Multi-Viewpoint Image Sets

    Yasuhiro OHKAWA  Kazuhiro FUKUI  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E95-D No:6
      Page(s):
    1619-1627

    This paper proposes a method for recognizing hand-shapes by using multi-viewpoint image sets. The recognition of a hand-shape is a difficult problem, as appearance of the hand changes largely depending on viewpoint, illumination conditions and individual characteristics. To overcome this problem, we apply the Kernel Orthogonal Mutual Subspace Method (KOMSM) to shift-invariance features obtained from multi-viewpoint images of a hand. When applying KOMSM to hand recognition with a lot of learning images from each class, it is necessary to consider how to run the KOMSM with heavy computational cost due to the kernel trick technique. We propose a new method that can drastically reduce the computational cost of KOMSM by adopting centroids and the number of images belonging to the centroids, which are obtained by using k-means clustering. The validity of the proposed method is demonstrated through evaluation experiments using multi-viewpoint image sets of 30 classes of hand-shapes.

  • Long-Range Asynchronous On-Chip Link Based on Multiple-Valued Single-Track Signaling

    Naoya ONIZAWA  Atsushi MATSUMOTO  Takahiro HANYU  

     
    PAPER-Circuit Theory

      Vol:
    E95-A No:6
      Page(s):
    1018-1029

    We have developed a long-range asynchronous on-chip data-transmission link based on multiple-valued single-track signaling for a highly reliable asynchronous Network-on-Chip. In the proposed signaling, 1-bit data with control information is represented by using a one-digit multi-level signal, so serial data can be transmitted asynchronously using only a single wire. The small number of wires alleviates the routing complexity of wiring long-range interconnects. The use of current-mode signaling makes it possible to transmit data at high speed without buffers or repeaters over a long interconnect wire because of the low-voltage swing of signaling, and it leads to low-latency data transmission. We achieve a latency of 0.45 ns, a throughput of 1.25 Gbps, and energy dissipation of 0.58 pJ/bit with a 10-mm interconnect wire under a 0.13 µm CMOS technology. This represents an 85% decrease in latency, a 150% increase in throughput, and a 90% decrease in energy dissipation compared to a conventional serial asynchronous data-transmission link.

  • Mirrored Serpentine Microstrip Lines for Reduction of Far-End Crosstalk

    Hyun Bae LEE  Young-Chan JANG  

     
    BRIEF PAPER

      Vol:
    E95-C No:6
      Page(s):
    1086-1088

    Mirrored serpentine microstrip lines are proposed for a parallel high speed digital signaling to reduce the peak far-end crosstalk (FEXT) voltage. Mirrored serpentine microstrip lines consist of two serpentine microstrip lines, each one equal to a conventional normal serpentine microstrip line. However, one serpentine microstrip line of the mirrored serpentine microstrip lines is flipped in the length direction, and thus, two serpentine microstrip lines face each other. Time domain reflectometry measurements show that the peak FEXT voltage of the mirrored serpentine microstrip lines is reduced by 56.4% of that of conventional microstrip lines and 30.0% of that of conventional normal serpentine microstrip lines.

  • Temporal Dependence Network Link Loss Inference from Unicast End-to-End Measurements

    Gaolei FEI  Guangmin HU  

     
    LETTER

      Vol:
    E95-B No:6
      Page(s):
    1974-1977

    In this letter, we address the issue of estimating the temporal dependence characteristic of link loss by using network tomography. We use a k-th order Markov chain (k > 1) to model the packet loss process, and estimate the state transition probabilities of the link loss model using a constrained optimization-based method. Analytical and simulation results indicate that our method yields more accurate packet loss probability estimates than existing loss inference methods.

  • Online Anomaly Prediction for Real-Time Stream Processing

    Yuanqiang HUANG  Zhongzhi LUAN  Depei QIAN  Zhigao DU  Ting CHEN  Yuebin BAI  

     
    PAPER-Network Management/Operation

      Vol:
    E95-B No:6
      Page(s):
    2034-2042

    With the consideration of real-time stream processing technology, it's important to develop high availability mechanism to guarantee stream-based application not interfered by faults caused by potential anomalies. In this paper, we present a novel online prediction technique for predicting some anomalies which may occur in the near future. Concretely, we first present a value prediction which combines the Hidden Markov Model and the Mixture of Expert Model to predict the values of feature metrics in the near future. Then we employ the Support Vector Machine to do anomaly identification, which is a procedure to identify the kind of anomaly that we are about to alarm. The purpose of our approach is to achieve a tradeoff between fault penalty and resource cost. The experiment results show that our approach is of high accuracy for common anomaly prediction and low runtime overhead.

  • Performance Analysis of Different Excitation Signals for Sounding Time-Varying Channels

    Liu LIU  Cheng TAO  Jiahui QIU  Houjin CHEN  

     
    LETTER-Antennas and Propagation

      Vol:
    E95-B No:6
      Page(s):
    2125-2128

    In the channel measurement and characterization, selecting a suitable excitation signal for a specified scenario is the primary task. This letter describes several selecting criteria of the excitation signal for channel sounding. And then the popular types of probing signals are addressed and through simulations their accuracy performances are compared in time-varying channels. The conclusion is the Constant Amplitude Zero Auto-Correlation (CAZAC) sequence yields better results in time-varying scenarios.

  • An Experiment of GMPLS-Based Dispersion Compensation Control over In-Field Fibers

    Shoichiro SENO  Eiichi HORIUCHI  Sota YOSHIDA  Takashi SUGIHARA  Kiyoshi ONOHARA  Misato KAMEI  Yoshimasa BABA  Kazuo KUBO  Takashi MIZUOCHI  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E95-B No:6
      Page(s):
    1997-2004

    As ROADMs (Reconfigurable Optical Add/Drop Multiplexers) are becoming widely used in metro/core networks, distributed control of wavelength paths by extended GMPLS (Generalized MultiProtocol Label Switching) protocols has attracted much attention. For the automatic establishment of an arbitrary wavelength path satisfying dynamic traffic demands over a ROADM or WXC (Wavelength Cross Connect)-based network, precise determination of chromatic dispersion over the path and optimized assignment of dispersion compensation capabilities at related nodes are essential. This paper reports an experiment over in-field fibers where GMPLS-based control was applied for the automatic discovery of chromatic dispersion, path computation, and wavelength path establishment with dynamic adjustment of variable dispersion compensation. The GMPLS-based control scheme, which the authors called GMPLS-Plus, extended GMPLS's distributed control architecture with attributes for automatic discovery, advertisement, and signaling of chromatic dispersion. In this experiment, wavelength paths with distances of 24 km and 360 km were successfully established and error-free data transmission was verified. The experiment also confirmed path restoration with dynamic compensation adjustment upon fiber failure.

  • Spectral Efficiency Improvement of Fractional Frequency Reuse by Inter-Cell Interference Cancellation on Cooperative Base Station

    Kazuki MARUTA  Atsushi OHTA  Masataka IIZUKA  Takatoshi SUGIYAMA  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:6
      Page(s):
    2164-2168

    This paper proposes applying our inter-cell interference (ICI) cancellation method to fractional frequency reuse (FFR) and evaluates the resulting spectral efficiency improvement. With our ICI cancellation method based on base station cooperation, the control station generates ICI replica signals by simple linear processing. Moreover, FFR effectively utilizes frequency resources by both allowing users in the cell-center region to access all available sub-channels and increasing the transmission power to users in the cell-edge region. FFR provides the conditions under which the ICI cancellation method works effectively. Computer simulations show that the average spectral efficiency of the proposed method is comparable to that of cooperative MU-MIMO, which can completely remove ICI.

  • A 1-V TSPC Dual Modulus Prescaler with Speed Scalability Using Forward Body Biasing in 0.18 µm CMOS

    Hyunchol SHIN  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E95-C No:6
      Page(s):
    1121-1124

    The operating speed scalability is demonstrated by using the forward body biasing method for a 1-V 0.18-µm CMOS true single-phase clocking (TSPC) dual-modulus prescaler. With the forward body bias voltage varying between 0 and 0.4 V, the maximum operating speed changes by about 40–50% and the maximum input sensitivity frequency changes by about 400%. This speed scalability is achieved with less than 0.5-dB phase noise degradation. This demonstration indicates that the forward body biasing method is instrumental to build a cost-saving power-efficient 1-V 0.18-µm CMOS radio for low-power WBAN and WSN applications.

  • Japanese Argument Reordering Based on Dependency Structure for Statistical Machine Translation

    Chooi-Ling GOH  Taro WATANABE  Eiichiro SUMITA  

     
    PAPER-Natural Language Processing

      Vol:
    E95-D No:6
      Page(s):
    1668-1675

    While phrase-based statistical machine translation systems prefer to translate with longer phrases, this may cause errors in a free word order language, such as Japanese, in which the order of the arguments of the predicates is not solely determined by the predicates and the arguments can be placed quite freely in the text. In this paper, we propose to reorder the arguments but not the predicates in Japanese using a dependency structure as a kind of reordering. Instead of a single deterministically given permutation, we generate multiple reordered phrases for each sentence and translate them independently. Then we apply a re-ranking method using a discriminative approach by Ranking Support Vector Machines (SVM) to re-score the multiple reordered phrase translations. In our experiment with the travel domain corpus BTEC, we gain a 1.22% BLEU score improvement when only 1-best is used for re-ranking and 4.12% BLEU score improvement when n-best is used for Japanese-English translation.

  • Multipath Binomial Congestion Control Algorithms

    Tuan Anh LE  Choong Seon HONG  Sungwon LEE  

     
    PAPER

      Vol:
    E95-B No:6
      Page(s):
    1934-1943

    Nowadays portable devices with multiple wireless interfaces and using multimedia services are becoming more popular on the Internet. This paper describes a family of multipath binomial congestion control algorithms for audio/video streaming, where a low variant of transmission rate is important. We extend the fluid model of binomial algorithms for single-path transmission to support the concurrent transmission of packets across multiple paths. We focus on the extension of two particular algorithms, SQRT and IIAD, for multiple paths, called MPSQRT and MPIIAD, respectively. Additionally, we apply the design technique (using the multipath fluid model) for multipath TCP (MPTCP) into the extension of SQRT and IIAD, called fbMPSQRT and fbMPIIAD, respectively. Both two approaches ensure that multipath binomial congestion control algorithms achieve load-balancing, throughput improvement, and fairness to single-path binomial algorithms at shared bottlenecks. Through the simulations and comparison with the uncoordinated protocols MPSQRT/MPIIAD, fbMPSQRT/fbMPIIAD and MPTCP, we find that our extended multipath transport protocols can preserve lower latency and transmission rate variance than MPTCP, fairly share with single-path SQRT/IIAD, MPTCP and TCP, and also can achieve throughput improvements and load-balancing equivalent to those of MPTCP under various scenarios and network conditions.

  • Estimation of Sea Wave Heights by Two-Frequency Cross-Correlation Function of Reflected Signals of a Spaceborne Radar Altimeter with Nadir Synthesis of Antenna Aperture

    Min-Ho KA  Aleksandr I. BASKAKOV  Vladimir A. TEREKHOV  

     
    PAPER-Sensing

      Vol:
    E95-B No:6
      Page(s):
    2095-2100

    In the work we introduce novel approach to remote sensing from space for the estimation of sea wave heights with a spaceborne high precision two-frequency radar altimeter with nadir synthesis antenna aperture. Experiments show considerable reduction of the decorrelation factor of the correlation coefficient and so significant enhancement of the sensitivity of the altimeter for the estimation for the sea wave status.

  • An Optimal Pull-Push Scheduling Algorithm Based on Network Coding for Mesh Peer-to-Peer Live Streaming

    Laizhong CUI  Yong JIANG  Jianping WU  Shutao XIA  

     
    PAPER-Network

      Vol:
    E95-B No:6
      Page(s):
    2022-2033

    Most large-scale Peer-to-Peer (P2P) live streaming systems are constructed as a mesh structure, which can provide robustness in the dynamic P2P environment. The pull scheduling algorithm is widely used in this mesh structure, which degrades the performance of the entire system. Recently, network coding was introduced in mesh P2P streaming systems to improve the performance, which makes the push strategy feasible. One of the most famous scheduling algorithms based on network coding is R2, with a random push strategy. Although R2 has achieved some success, the push scheduling strategy still lacks a theoretical model and optimal solution. In this paper, we propose a novel optimal pull-push scheduling algorithm based on network coding, which consists of two stages: the initial pull stage and the push stage. The main contributions of this paper are: 1) we put forward a theoretical analysis model that considers the scarcity and timeliness of segments; 2) we formulate the push scheduling problem to be a global optimization problem and decompose it into local optimization problems on individual peers; 3) we introduce some rules to transform the local optimization problem into a classical min-cost optimization problem for solving it; 4) We combine the pull strategy with the push strategy and systematically realize our scheduling algorithm. Simulation results demonstrate that decode delay, decode ratio and redundant fraction of the P2P streaming system with our algorithm can be significantly improved, without losing throughput and increasing overhead.

  • Finding Higher Order Differentials of MISTY1

    Yukiyasu TSUNOO  Teruo SAITO  Takeshi KAWABATA  Hirokatsu NAKAGAWA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:6
      Page(s):
    1049-1055

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it is recommended for Japanese e-Government ciphers by the CRYPTREC project. In this paper, we report on 12th order differentials in 3-round MISTY1 with FL functions and 44th order differentials in 4-round MISTY1 with FL functions both previously unknown. We also report that both data complexity and computational complexity of higher order differential attacks on 6-round MISTY1 with FL functions and 7-round MISTY1 with FL functions using the 46th order differential can be reduced to as much as 1/22 of the previous values by using multiple 44th order differentials simultaneously.

  • Symbol-Spaced Turbo Frequency Domain Equalization for Precoded Continuous Phase Modulation

    Qing YAN  Qiang LI  Sheng LUO  Shaoqian LI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E95-B No:6
      Page(s):
    2065-2073

    In this paper, a low-complexity symbol-spaced turbo frequency domain equalization (FDE) algorithm based on Laurent decomposition is proposed for precoded binary continuous phase modulation (CPM) with modulation index h=1/2. At the transmitter, a precoder is utilized to eliminate the inherent memory of the CPM signal. At the receiver, a matched filter based on Laurent decomposition is utilized to make the detection symbol-spaced. As a result, the symbol-spaced iteration can be taken between the equalizer and the decoder directly without a CPM demodulator, and we derive a symbol-spaced soft interference cancellation frequency domain equalization (SSIC-FDE) algorithm for binary CPM with h=1/2. A new data block structure for FDE of partial response CPM is also presented. The computational complexity analysis and simulations show that this approach provides a complexity reduction and an impressive performance improvement over previously proposed turbo FDE algorithm for binary CPM with h=1/2 in multi-path fading channels.

6621-6640hit(20498hit)