The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

11701-11720hit(20498hit)

  • Converter-Aware Wavelength Assignment in WDM Networks with Limited-Range Conversion Capability

    Quang-Dzung HO  Man-Seop LEE  

     
    PAPER-Switching for Communications

      Vol:
    E89-B No:2
      Page(s):
    436-445

    In wavelength-routed optical networks, wavelength converters are considered as one of the most critical network resources because they can significantly reduce the blocking probability, but still remain quite expensive. Unfortunately, previous wavelength assignment algorithms have seldom considered their presence. Therefore, in this paper, we propose a novel dynamic algorithm that can minimize the number of wavelength translations. Our algorithm establishes lightpaths by connecting a minimum number of wavelength-continuous segments. We mathematically prove the correctness of our algorithm. Then, we carry out extensive performance evaluations over three typical topologies with full-range or limited-range converters to compare our proposed algorithm with first-fit and most-used algorithms. The simulations show that, to obtain similar blocking performance, our algorithm requires much fewer converters, or the same number of converters but with smaller conversion ranges. From another perspective, with the same conversion capacity, our algorithm can significantly improve the blocking performance. Our algorithm is also scalable due to its polynomial time complexity and insignificant local signaling overhead.

  • Weaknesses of Two SAS-Like Password Authentication Schemes

    Min-Hung CHIANG  Wei-Chi KU  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E89-B No:2
      Page(s):
    594-597

    In 2000, Sandirigama, Shimizu, and Noda proposed a simple password authentication scheme, SAS. However, SAS was later found to be flawed. Recently, Chen, Lee, Horng proposed two SAS-like schemes, which were claimed to be more secure than similar schemes. Herein, we show that both their schemes are still vulnerable to denial-of-service attacks. Additionally, Chen-Lee-Horng's second scheme is not easily reparable.

  • A Novel False Lock Detection Technique for a Wide Frequency Range Delay-Locked Loop

    Yasutoshi AIBARA  Eiki IMAIZUMI  Hiroaki TAKAGISHI  Tatsuji MATSUURA  

     
    PAPER

      Vol:
    E89-A No:2
      Page(s):
    385-390

    A false lock free delay-locked loop(DLL) achieving a wide frequency operation and a fine timing resolution is presented. A novel false lock detection technique is proposed to solve the trade-off between a wide frequency range and false locks. This technique enables a fine timing resolution even at a high frequency. In addition, the duty cycle of the input clock is not required to be 50%. This technique is applied to the DLLs in analog front-end LSIs of digital camera systems, with a range of 465 MHz (16) and a timing resolution of 9(40 stages).

  • Lower-Bound on Blocking Probability of a Class of Crosstalk-Free Optical Cross-Connects (OXCs)

    Chen YU  Xiaohong JIANG  Susumu HORIGUCHI  

     
    PAPER-Network Protocols, Topology and Fault Tolerance

      Vol:
    E89-D No:2
      Page(s):
    719-727

    A combination of horizontal expansion and vertical stacking of optical Banyan (HVOB) is the general architecture for building Banyan-based optical cross-connects (OXCs), and the intrinsic crosstalk problem of optical signals is a major constraint in designing OXCs. In this paper, we analyze the blocking behavior of HVOB networks and develop the lower bound on blocking probability of a HVOB network that is free of first-order crosstalk in switching elements. The proposed lower-bound is significant because it provides network designers an effective tool to estimate the minimum blocking probability they can expect from a HVOB architecture regardless what kind of routing strategy to be adopted. Our lower bound can accurately depict the overall blocking behavior in terms of the minimum blocking probability in a HVOB network, as verified by extensive simulation based on a network simulator with both random routing and packing routing strategies. Surprisingly, the simulated and theoretical results show that our lower bound can be used to efficiently estimate the blocking probability of HVOB networks applying packing strategy. Thus, our analytical model can guide network designers to find the tradeoff among the number of planes (stacked copies), the number of SEs, the number of stages and blocking probability in a HVOB network applying packing strategy.

  • Frequency Reuse Power Allocation for Broadband Cellular Networks

    Joohwan KIM  Hyukmin SON  Sanghoon LEE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:2
      Page(s):
    531-538

    An FRPA (frequency reuse power allocation) technique by employing the frequency reuse notion as a strategy for overcoming the ICI (intercell interference) and maintaining the QoS (quality of service) at the cell boundary is described for broadband cellular networks. In the scheme, the total bandwidth is divided into sub-bands and two different power levels are then allocated to sub-bands based on the frequency reuse for forward-link cell planning. In order to prove the effectiveness of the proposed algorithm, a Monte Carlo simulation was performed based on the Chernoff upper bound. The simulation shows that this technique can achieve a high channel throughput while maintaining the required QoS at the cell boundary.

  • Point-of-Failure Shortest-Path Rerouting: Computing the Optimal Swap Edges Distributively

    Paola FLOCCHINI  Antonio Mesa ENRIQUES  Linda PAGLI  Giuseppe PRENCIPE  Nicola SANTORO  

     
    PAPER-Network Protocols, Topology and Fault Tolerance

      Vol:
    E89-D No:2
      Page(s):
    700-708

    We consider the problem of computing the optimal swap edges of a shortest-path tree. This problem arises in designing systems that offer point-of-failure shortest-path rerouting service in presence of a single link failure: if the shortest path is not affected by the failed link, then the message will be delivered through that path; otherwise, the system will guarantee that, when the message reaches the node where the failure has occurred, the message will then be re-routed through the shortest detour to its destination. There exist highly efficient serial solutions for the problem, but unfortunately because of the structures they use, there is no known (nor foreseeable) efficient distributed implementation for them. A distributed protocol exists only for finding swap edges, not necessarily optimal ones. We present two simple and efficient distributed algorithms for computing the optimal swap edges of a shortest-path tree. One algorithm uses messages containing a constant amount of information, while the other is tailored for systems that allow long messages. The amount of data transferred by the protocols is the same and depends on the structure of the shortest-path spanning-tree; it is no more, and sometimes significantly less, than the cost of constructing the shortest-path tree.

  • An Algorithm to Calculate Correlation Coefficients between Interconnect Delays for Use in Statistical Timing Analysis

    Shuji TSUKIYAMA  Masahiko TOMITA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E89-A No:2
      Page(s):
    535-543

    As process technologies decrease below a hundred nanometers, the variability of circuit parameters increases, and statistical timing analysis, which analyzes the distribution of the critical delay of a circuit, is receiving a great deal of attention. In such statistical approaches, correlations between random variables are important to the accuracy of analysis. Since interconnect delays dominate in recent technology, their correlations are of primary concern in statistical timing analysis. In this paper, we propose an efficient algorithm for calculating correlation coefficients between Elmore interconnect delays with the use of Gaussian distributions. Our algorithm is efficient and yields reasonable results for correlations between interconnect delays of different nets. In order to evaluate the performance of the proposed algorithm, we show experimental results compared against Monte-Carlo simulations using SPICE.

  • Hierarchically Aggregated Fair Queueing (HAFQ) for Per-Flow Fair Bandwidth Allocation

    Ichinoshin MAKI  Hideyuki SHIMONISHI  Tutomu MURASE  Masayuki MURATA  

     
    PAPER-Switching for Communications

      Vol:
    E89-B No:2
      Page(s):
    427-435

    Because of the development of recent broadband access technologies, fair service among users is becoming more important goal. The most promising router mechanisms for providing fair service is per-flow traffic management. However, it is difficult to implement in high-speed core routers because per-flow state management is prohibitively expensive; thus, a large number of flows are aggregated into a small number of queues. This is not an acceptable situation because fairness degrades as the number of flows so aggregated increases. In this paper, we propose a new traffic management scheme called Hierarchically Aggregated Fair Queueing (HAFQ) to provide per-flow fair service. Our scheme can adjust flow aggregation levels according to the queue handling capability of various routers. This means the proposed scheme scales well in high-speed networks. HAFQ improves the fairness among aggregated flows by estimating the number of flows aggregated in a queue and allocating bandwidth to the queue proportionally. In addition, since HAFQ can identify flows having higher arrival rates simultaneously while estimating the number of flows, it enhances the fairness by preferentially dropping their packets. We show that our scheme can provide per-flow fair service through extensive simulation and experiments using a network processor. Since the currently available network processors (Intel IXP1200 in our case) are not high capacity, we also give extensive discussions on the applicability of our scheme to the high-speed core routers.

  • MORR: A Novel Regional Location Management Scheme Based on User Movement Behavior in Mobile IP

    Kuan-Rong LEE  Mong-Fong HORNG  Yau-Hwang KUO  

     
    PAPER-Mobile Computing

      Vol:
    E89-D No:2
      Page(s):
    487-497

    A novel distributed dynamic regional location management scheme called MORR (Mobility Oriented Regional Registration) is proposed for Mobile IP to improve the signaling traffic cost of a mobile node. This improvement is achieved by adjusting each mobile node's optimal regional domains according to its mobility behavior. With Mobile IP, the capricious mobility and variable traffic load of a mobile node has an impact on its average signaling traffic cost. In this paper, the mobility of all mobile nodes is classified into two modes: random mobility mode and regular mobility mode. We develop new analytical models to formulate the movement behavior and mathematically evaluate their characteristics when applied to these two modes. MORR has the adaptability to manipulate various mobility modes of each mobile node in dedicated ways to determine an optimal regional domain of this mobile node. Simulation results show that anywhere from 3 to 15 percent of the signaling cost is saved by MORR in comparison with the previous distributed dynamic location management schemes for various scenarios.

  • Signaling Overhead Analysis of Distributed Control for Partition-Based Protection in WDM Mesh Networks

    Chen-Shie HO  Sy-Yen KUO  

     
    PAPER-Network Protocols, Topology and Fault Tolerance

      Vol:
    E89-D No:2
      Page(s):
    728-737

    While the survivability becomes more and more important in WDM backbone network design, the signaling strategy corresponding to a protection/restoration scenario upon failures will have significant influence on the performance and then determine the integrity of the total solution. In this paper we will discuss the control mechanisms for several representative protection schemes, analyze their adaptation and application, and propose the corresponding signaling model and control protocol for a novel dynamic group protection strategy. The simulation results show that the control overhead of our proposed method outperforms the segmented protection and has the benefit on resource utilization and failure restoration speed.

  • Real-Time Measurement of End-to-End Available Bandwidth: A Feasibility Study

    Masahiro MIYASAKA  Takanori IWAI  Hideki KASAHARA  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E89-B No:2
      Page(s):
    401-412

    We propose a real-time measurement method, DPDC (Detection of Packet-Delay Correlation), which models both available bandwidth and the averaging time scale. In this method, measurement periods are short and constant, while the theoretical measurement error is reduced. DPDC is established based on the discussion of the systematic error of the packet pair/train measurement. We evaluate through simulations its accuracy and robustness against the multihop effect. We also verify the feasibility of real-time measurements through testbed experiments using a tool called Linear that implements DPDC. Efficiency is demonstrated through simulations and testbed experiments by analyzing accidental and systematic errors. Finally, we discuss the available bandwidth variation in an Internet path using real-time data produced by Linear measurements and passive monitoring.

  • Superimposed Frequency Symbol Based Adaptive Downlink OFDM with Frequency Spreading and Equalization

    Chang-Jun AHN  Hiroshi HARADA  Yukiyoshi KAMIO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:2
      Page(s):
    500-508

    In AMS/OFDM systems, a base station controls the modulation level of each subcarrier with feedback information (FBI), and then, adaptive modulated packets are transmitted from the base station to the mobile station. In this case, the mobile station requires modulation level information (MLI) to demodulate the received packet. The MLI is generally transmitted as a data symbol, so the throughput is degraded. To overcome this problem and increase the total throughput, in this paper, we propose superimposed frequency symbol based adaptive OFDM with frequency spreading and equalization. In the proposed system, each S/P transformed signal is spread by orthogonal spreading codes and combined. This means that each subcarrier holds several superimposed S/P transformed signals with the same power rate. In this case, the frequency-selective faded subcarriers obtain the same power rate for each S/P transformed signal. Therefore, the detected signals also obtain the same SINR, and as a result, we can assign the same modulation level for each frequency symbol spreading block. Hence, the proposed system requires only one piece of FBI and MLI for each frequency symbol spreading block, as compared with conventional adaptive OFDM.

  • Performance Comparison of Task Allocation Schemes Depending upon Resource Availability in a Grid Computing Environment

    Hiroshi YAMAMOTO  Kenji KAWAHARA  Tetsuya TAKINE  Yuji OIE  

     
    PAPER-Performance Evaluation

      Vol:
    E89-D No:2
      Page(s):
    459-468

    Recent improvements in the performance of end-computers and networks have made it feasible to construct a grid system over the Internet. A grid environment consists of many computers, each having a set of components and a distinct performance. These computers are shared among many users and managed in a distributed manner. Thus, it is important to focus on a situation in which the computers are used unevenly due to decentralized management by different task schedulers. In this study, which is a preliminary investigation of the performance of task allocation schemes employed in a decentralized environment, the average execution time of a long-lived task is analytically derived using the M/G/1-PS queue. Furthermore, assuming a more realistic condition, we evaluate the performance of some task allocation schemes adopted in the analysis, and clarify which scheme is applicable to a realistic grid environment.

  • Foveation Based Error Resilience Optimization for H.264 Intra Coded Frame in Wireless Communication

    Yu CHEN  XuDong ZHANG  DeSheng WANG  

     
    LETTER-Multimedia Systems for Communications" Multimedia Systems for Communications

      Vol:
    E89-B No:2
      Page(s):
    633-636

    Based on the observation that foveation analysis can be used to find most critical content in terms of human visual perception in video and image, one effective error resilience method is proposed for robust transmission of H.264 intra-coded frame in wireless channel. It firstly exploits the results of foveation analysis to find foveated area in picture, and then considers the results of pre-error concealment effect analysis to search for the center of foveation macro-blocks (MB) in foveated area, finally new error resilient alignment order of MB and new coding order of MB are proposed that are used in video encoder. Extensive experimental results on different portrait video sequences over random bit error wireless channel demonstrate that this proposed method can achieve better subjective and objective effect than original JM 8.2 H.264 video codec with little effect on coding rate and image quality.

  • Formulation of Tunneling Impact on Multicast Efficiency

    Takeru INOUE  Ryosuke KUREBAYASHI  

     
    PAPER-Network Protocols, Topology and Fault Tolerance

      Vol:
    E89-D No:2
      Page(s):
    687-699

    In this paper, we examine the efficiency of tunneling techniques since they will accelerate multicast deployment. Our motivation is that, despite the many proposals focused on tunneling techniques, their impact on multicast efficiency has yet to be assessed sufficiently. First, the structure of multicast delivery trees is examined based on the seminal work of Phillips et al. [26]. We then quantitatively assess the impact of tunneling, such as loads imposed on the tunnel endpoints and redundant traffic. We also formulate a critical size of multicast island, above which the loads are suddenly diminished. Finally, a unique delivery tree model is introduced, which is so simple yet practical, to better understand the performance of the multicast-related protocols. This paper is the first to formulate the impact of tunneling.

  • An Online Scheduling Algorithm for Assigning Jobs in the Computational Grid

    Chuliang WENG  Minglu LI  Xinda LU  

     
    PAPER-Grid Computing

      Vol:
    E89-D No:2
      Page(s):
    597-604

    The computational grid provides a promising platform for the deployment of various high-performance computing applications. Problem in implementing computational grid environments is how to effectively use various resources in the system, such as CPU cycle, memory, communication network, and data storage. There are many effective heuristic algorithms for scheduling in the computational grid, however most scheduling strategies have no theoretical guarantee at all. In this paper, a cost-based online scheduling algorithm is presented for job assignment in the grid environment with theoretical guarantee. Firstly, a scheduling framework is described, where the grid environment is characterized, and the online job model is defined. Secondly, the cost-based online scheduling algorithm is presented where costs of resources are exponential functions of their loads, and the performance of this algorithm is theoretically analyzed against the performance of the optimal offline algorithm. Finally, we implement the algorithm in the grid simulation environment, and compare the performance of the presented algorithm with the other three algorithms, and experimental results indicate that the cost-based online scheduling algorithm can outperform the other three online algorithms.

  • Analog Integrated Circuit for Detection of an Approaching Object with Simple-Shape Recognition Based on Lower Animal Vision

    Kimihiro NISHIO  Hiroo YONEZU  Yuzo FURUKAWA  

     
    PAPER

      Vol:
    E89-A No:2
      Page(s):
    416-427

    A network for the detection of an approaching object with simple-shape recognition is proposed based on lower animal vision. The locust can detect an approaching object through a simple process in the descending contralateral movement detector (DCMD) in the locust brain, by which the approach velocity and direction of the object is determined. The frog can recognize simple shapes through a simple process in the tectum and thalamus in the frog brain. The proposed network is constructed of simple analog complementary metal oxide semiconductor (CMOS) circuits. The integrated circuit of the proposed network is fabricated with the 1.2 µm CMOS process. Measured results for the proposed circuit indicate that the approach velocity and direction of an object can be detected by the output current of the analog circuit based on the DCMD response. The shape of moving objects having simple shapes, such as circles, squares, triangles and rectangles, was recognized using the proposed frog-visual-system-based circuit.

  • An Approximation Algorithm for Minimum Certificate Dispersal Problems

    Hua ZHENG  Shingo OMURA  Koichi WADA  

     
    PAPER-Graphs and Networks

      Vol:
    E89-A No:2
      Page(s):
    551-558

    We consider a network, where a special data called certificate is issued between two users, and all certificates issued by the users in the network can be represented by a directed graph. For any two users u and v, when u needs to send a message to v securely, v's public-key is needed. The user u can obtain v's public-key using the certificates stored in u and v. We need to disperse the certificates to the users such that when a user wants to send a message to the other user securely, there are enough certificates in them to get the reliable public-key. In this paper, when a certificate graph and a set of communication requests are given, we consider the problem to disperse the certificates among the nodes in the network, such that the communication requests are satisfied and the total number of certificates stored in the nodes is minimized. We formulate this problem as MINIMUM CERTIFICATE DISPERSAL (MCD for short). We show that MCD is NP-Complete, even if its input graph is restricted to a strongly connected graph. We also present a polynomial-time 2-approximation algorithm MinPivot for strongly connected graphs, when the communication requests satisfy some restrictions. We introduce some graph classes for which MinPivot can compute optimal dispersals, such as trees, rings, and some Cartesian products of graphs.

  • Designing Coplanar Superconducting Lumped-Element Bandpass Filters Using a Mechanical Tuning Method

    Shigeki HONTSU  Kazuyuki AGEMURA  Hiroaki NISHIKAWA  Masanobu KUSUNOKI  

     
    PAPER

      Vol:
    E89-C No:2
      Page(s):
    151-155

    A coplanar type lumped-element 6-pole microwave Chebyshev bandpass filter (BPF) of center frequency (f0) 2.0 GHz and fractional bandwidth (FBW) 1.0 % was designed. For the design method, theory of direct coupled resonator filters using K-inverters was employed. Coplanar type lumped-element BPFs are composed of a meander-line L and interdigital C elements. The frequency response was simulated and analyzed using an electromagnetic field simulator (Sonnet-EM). Further, the changes in f0 and FBW of the BPF were also realized by the mechanical tuning method.

  • Controller/Precompiler for Portable Checkpointing

    Gabriel RODRIGUEZ  María J. MARTIN  Patricia GONZALEZ  Juan TOURIÑO  

     
    PAPER-Parallel/Distributed Programming Models, Paradigms and Tools

      Vol:
    E89-D No:2
      Page(s):
    408-417

    This paper presents CPPC (Controller/Precompiler for Portable Checkpointing), a checkpointing tool designed for heterogeneous clusters and Grid infrastructures through the use of portable protocols, portable checkpoint files and portable code. It works at variable level being user-directed, thus generating small checkpoint files. It allows parallel processes to checkpoint independently, without runtime coordination or message-logging. Consistency is achieved at restart time by negotiating the restart point. A directive-based checkpointing precompiler has also been implemented to ease up user's effort. CPPC was designed to work with parallel MPI programs, though it can be used with sequential ones, and easily extended to parallel programs written using different message-passing libraries, due to its highly modular design. Experimental results are shown using CPPC with different test applications.

11701-11720hit(20498hit)