Yihjia TSAI Ching-Chang LIN Ping-Nan HSIAO
Recently, the small-world network model has been popular to describe a wide range of networks such as human social relations and networks formed by biological entities. The network model achieves a small diameter with relatively few links as measured by the ratio of clustering coefficient and the number of links. It is quite natural to consider email communication similar to social network patterns. Quite surprisingly, we find from our empirical study that local email networks follow a different type of network model that falls into the category of scale-free network. We propose new network models to describe such communication structure.
Dirk B.M. KLAASSEN Ronald van LANGEVELDE Andries J. SCHOLTEN
The rapid down-scaling of minimum feature size in CMOS technologies has boosted the RF performance, thereby opening up the RF application area to CMOS. The concurrent reduction of supply voltage pushes the MOSFETs used in circuit design more and more into the moderate-inversion regime of operation. As a consequence, compact MOS models are needed that are accurate in all operating regimes, including the moderate-inversion regime. Advanced analogue applications require accurate modelling of distortion, capacitances and noise. RF application of MOSFETs require the extension of this accurate modelling up to high frequencies and in addition accurate modelling of impedance levels and power gain. The implications for compact MOS models will be discussed, together with the state-of-the-art in compact MOS modelling. Special attention will be paid to some well-known circuit examples, and the compact model requirements needed for a correct description. Where relevant MOS Model 11 will be used to illustrate the discussion.
Xiaoxiao BAI Qinyu ZHANG Yohsuke KINOUCHI Tadayoshi MINATO
The goal of source localization in the brain is to estimate a set of parameters for representing source characteristics; one of such parameters is the source number. We here propose a method combining the Powell algorithm with the information criterion method for determining the optimal dipole number. The potential errors can be calculated by the Powell algorithm with the concentric 4-sphere head model and 32 electrodes, then the number of dipoles is determined by the information criterion method with the potential errors mentioned above. This method has the advantages of a high identification accuracy of dipole number and a small number of EEG data because in this method: (1) only one EEG topography is used in the computation, (2) 32 electrodes are used to obtain the EEG data, (3) the optimal dipole number can be obtained by this method. In order to prove our method to be efficient, precise and robust to noise, 10% white noise is introduced to test this method theoretically. Some investigations are presented here to show our method is an advanced approach for determining the optimal dipole number.
Byeong-Ok LIM Tae-Shin KANG Bok-Hyung LEE Mun-Kyo LEE Jin-Koo RHEE
The parasitic capacitances induced in the spaces between an air-bridge interconnection and a drain pad (Cad), and between an air-bridge interconnection and a gate head (Cag) from a power CPW PHEMT are not negligible. In this paper, a modified equivalent circuit model for a CPW PHEMT and an improved CPW PHEMT for millimeter-wave applications are proposed. These were proved by measuring the fabricated CPW PHEMT and improved CPW PHEMT. These capacitances were confirmed by measuring the gate-source coupling using CPW PHEMT patterns without an active layer. From the measurements, the improved CPW PHEMT has the lowest coupling (loss) and the highest S21 gain among four different types tested at 60 GHz. And the improved CPW PHEMT is a feasible device which can be directly applied in millimeter-waves as a power device.
Timothy BOLT Sadahiko KANO Akihisa KODATE
This paper offers an initial analysis of economic and market issues in the development and deployment of mobile remote physiological monitoring services for medical patients through wireless wearable sensors and actuators. Examining the characteristics of the service technologies and related industries, this study focuses on the structure, participants and roles of standardisation of the layers within the emerging mobile remote physiological monitoring industry. The study concludes that the structure of the emerging mobile remote physiological monitoring industry will be oriented about service provision, be integrated with other personal / patient data storage services and be heavily influenced by the interplay of technological developments, the health market structure, existing players and regulation. Additionally, the keys players are likely to be the system integrators and service providers concentrating on large institutional customers. A focus of the paper is analysing both the causes and implications of a modular, horizontally layered industry structure likely to result from the mix of technologies, suppliers and customers as this market develops. The paper discusses why, although horizontal specialisation is the most likely outcome, there is little risk of key layers becoming commoditised. The paper also discusses the appropriate types and levels of standardisation and equipment certification activities that should be encouraged, along with from which groups and industries the pressure for these will come.
Byung-Chul KIM You-Ze CHO Doug MONTGOMERY
In this letter, we investigate the path length priority effect of existing just-enough-time (JET) scheme for optical burst switching (OBS) in the multiple hop network environments. And, we propose a novel hop-by-hop priority increasing (HPI) scheme using the input fiber delay lines (FDLs) at each node. Simulation results showed that the proposed FDL/delayed reservation (DR) with HPI scheme can avoid the path length priority effect and enhance the end-to-end throughput in multiple hop network environments.
Takuji TACHIBANA Shoji KASAHARA
In this paper, we consider QoS-guaranteed wavelength allocation for WDM networks with limited-range wavelength conversion. In the wavelength allocation, the pre-determined number of wavelengths are allocated to each QoS class depending on the required loss probability. Moreover, we consider two wavelength selection rules and three combinations of the rules. We analyze the connection loss probability of each QoS class for a single link using continuous-time Markov chain. We also investigate the connection loss probability for a uni-directional ring network by simulation. In numerical examples, we compare connection loss probabilities for three combinations of selection rules and show how each combination of selection rules affects the connection loss probability of each QoS class. Furthermore, we show how wavelength conversion capability affects the connection loss probability. It is shown that the proposed allocation with appropriate wavelength selection rule is effective for QoS provisioning when the number of wavelengths is large. We also show the effective combination of wavelength selection rules for the case with small wavelength conversion capability.
Toshiaki KOIKE Hidekazu MURATA Susumu YOSHIDA
An automatic-repeat-request (ARQ) scheme for improving the system throughput efficiency is evaluated in coded multiple-input multiple-output (MIMO) transmissions. Supplementary trellis-coded modulation (TCM) code has been proposed for hybrid ARQ schemes. The free distance of the TCM after code combining can be increased by employing different TCM codes for retransmissions. The MIMO scheme offers additional flexibility in preventing successive frame errors by changing the connections between transmitters and transmit antennas upon retransmission. In this paper, an ARQ strategy employing both TCM reassignment and antenna permutation technique is investigated. It is shown through computer simulations that this ARQ scheme achieves high throughput even in severe conditions of low signal-to-noise ratio and high Rician factor over spatially and temporally correlated Nakagami-Rice fading MIMO channels.
Jianhua HE Lin ZHENG Zongkai YANG Chun Tung CHOU Zuoyin TANG
This paper considers the problem of providing relative service differentiation in IEEE 802.11 Wireless LAN by using different Medium Access Control (MAC) parameters for different service classes. We present an analytical model which predicts the saturation throughput of IEEE 802.11 Distributed Coordination Function with multiple classes of service. This model allows us to show that relative service differentiation can be achieved by varying the initial contention window alone. In this case, the saturation throughput of a station can be shown to be approximately inversely proportional to the initial contention window size being used by that station. The simulation results validate our analytical model.
Takasuke TSUJI Akihiro SHIMIZU
The Internet and mobile communication systems are being developed, and related applications for managing personal information require user authentication for confirming legitimate users. One-time password authentication methods secure user's authorities by changing the verifier every time. The S/Key is a famous one-time password authentication scheme, which is based on Lamport's scheme. T.-C. Yeh et al. have point out security problems of the S/Key scheme and have proposed a variant of the S/Key scheme, which can be applied to smart cards. However, this method risks certain attacks, too. Those two proposed schemes use counter value, which can easily be modified by an attacker. Herein we discuss security problems of the S/Key and Yeh-Shen-Hwang's password authentication schemes using forgery attacks and stolen-verifier attacks.
Sequential estimation of arrival angles allows us to resolve closely located sources that the standard MUSIC fails to do so. A new sequential estimation method is proposed which utilizes only the signal subspace components of the steering vectors for some estimates of the arrival angles. It is theoretically shown that the asymptotic performance of the proposed method is better than that of the conventional sequential method which exploits both the signal and the noise subspace components. Simulation results show that the former outperforms the latter in correlated sources as well as in uncorrelated sources.
Chung-Seok (Andy) SEO Abhijit CHATTERJEE
A new approach to optical clock distribution utilizing optical waveguide interconnect technology is introduced. In this paper, we develop a new algorithm for design and optimization of embedded optical clock distribution networks for printed wiring boards. The optimization approach takes into account bending and propagation losses of optical waveguides. Less than 26.1 psec in signal timing skew is obtained for a signal flight time of 614.38 psec. About 15% reduction in optical power consumption is also obtained over clock nets routed with existing (optical) methods.
This paper describes an analysis of IP-network traffic in terms of the time variation of self-similarity. To get a comprehensive view in analyzing the degree of long-range dependence (LRD) of IP-network traffic, this paper used a self-organizing map, which provides a way to map high-dimensional data onto a low-dimensional domain. Also, in the LRD-based analysis, this paper employed detrended fluctuation analysis (DFA), which is applicable to the analysis of long-range power-law correlations or LRD in non-stationary time-series signals. In applying this method to traffic analysis, this paper performed two kinds of traffic measurement: one based on IP-network traffic flowing into NTT Musashino R&D center (Tokyo, Japan) from the Internet and the other based on IP-network traffic flowing through at an interface point between an access provider (Tokyo, Japan) and the Internet. Based on sequential measurements of IP-network traffic, this paper derived corresponding values for the LRD-related parameter α of measured traffic. As a result, we found that the characteristic of self-similarity seen in the measured traffic fluctuated over time, with different time variation patterns for two measurement locations. In training the self-organizing map, this paper used three parameters: two α values for different plot ranges, and Shannon-based entropy, which reflects the degree of concentration of measured time-series data. We visually confirmed that the traffic data could be projected onto the map in accordance with the traffic properties, resulting in a combined depiction of the effects of the degree of LRD and network utilization rates. The proposed method can deal with multi-dimensional parameters, projecting its results onto a two-dimensional space in which the projected data positions give us an effective depiction of network conditions at different times.
An information retrieval (IR) system with query expansion on a low-cost high-performance PC cluster environment is implemented. We study how query performance is affected by query expansion and two declustering methods using two standard Korean test collections. According to the experiments, the greedy method shows about 20% enhancement overall when compared with the lexical method.
This paper proposes a novel feature selection method for the fuzzy neural networks and presents an application example for 'personalized' facial expression recognition. The proposed method is shown to result in a superior performance than many existing approaches.
Hiroki HIGA Ikuo NAKAMURA Nozomu HOSHIMIYA
As one of control command input methods for functional electrical stimulation (FES) system, using the head movements was considered in this paper. In order to detect the head movements, we designed a prototype control command input device using acceleration sensors and verified its validity in experiments. The experimental results showed that the head movements in the lateral flexion and in the flexion/extension were highly detected and separated by the acceleration sensors.
A low cost printed omni-directional spiral-mode mono-pole antenna for wireless communication applications has been designed. This antenna has an integrated open-stub to adjust impedance matching. The 10 dB bandwidth is 336 MHz that achieved 13.7 and radiating characteristics are presented.
Guangyi LIU Yang YANG Xiaokang LIN
Internet traffic engineering is much important for Internet Service Providers (ISPs) today, since it can be used to fully utilize already deployed network resources. For ISPs, the requirements for traffic engineering should be simple, easy to configure, cost-effective and efficient. Based on these considerations, we propose an algorithm called Web First Adaptive Traffic Engineering (WFATE). Since World Wide Web (WWW) services dominate most of the total Internet traffic and WWW flows are not long-lived, we only apply load balancing to WWW traffic in the algorithm. It can be shown that the number of coexistent WWW flows at an ingress node is almost certainly below a bound, and thus a forward-per-flow mechanism without keeping track of the state of each flow is feasible. This mechanism can balance traffic load at fine granularity and therefore get better performance. Through simulations and performance comparison, it is shown that WFATE is quite efficient, which can improve the network throughput averagely by 26% under the "dense source" traffic pattern and 9% under the "sparse source" traffic pattern.
Steve VALLERAND Masayuki KANBARA Naokazu YOKOYA
In order to perform the registration of virtual objects in vision-based augmented reality systems, the estimation of the relation between the real and virtual worlds is needed. This paper presents a three-point vision-based registration method for video see-through augmented reality systems using binocular cameras. The proposed registration method is based on a combination of monocular and stereoscopic registration methods. A correction method that performs an optimization of the registration by correcting the 2D positions in the images of the marker feature points is proposed. Also, an extraction strategy based on color information is put forward to allow the system to be robust to fast user's motion. In addition, a quantification method is used in order to evaluate the stability of the produced registration. Timing and stability results are presented. The proposed registration method is proven to be more stable than the standard stereoscopic registration method and to be independent of the distance. Even when the user moves quickly, our developed system succeeds in producing stable three-point based registration. Therefore, our proposed methods can be considered as interesting alternatives to produce the registration in binocular augmented reality systems when only three points are available.
We analyze the Lagarias-Odlyzko low-density attack precisely, and show that this low-density attack can be applied to the Chor-Rivest and the Okamoto-Tanaka-Uchiyama cryptosystemes, which are considered to be secure against the low-density attack. According to our analysis, these schemes turn out to be no longer secure against the low-density attack.