The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] EE(4079hit)

1681-1700hit(4079hit)

  • Performance Bound for Turbo-Coded 2-D FSO/CDMA Systems over Atmospheric Turbulence Channels

    Anh T. PHAM  Tu A. LUU  Ngoc T. DANG  

     
    LETTER

      Vol:
    E93-A No:12
      Page(s):
    2696-2699

    We propose Turbo-coded two-dimensional (2-D) free-space optical (FSO) CDMA systems for broadband access networks. The performance bound for the proposed system over atmospheric turbulence channels is obtained considering multiple-access interference (MAI) and receiver noise. The results show that the proposed system offers a better performance than that of previously proposed ones. Also, it has a better tolerance to the atmospheric turbulence and the increase in the number of users.

  • Energy Saving Scheme with an Extra Active Period for LAN Switches

    Hitomi TAMURA  Ritsuko TOMIHARA  Yutaka FUKUDA  Kenji KAWAHARA  Yuji OIE  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E93-B No:12
      Page(s):
    3542-3554

    An immense number of LAN switches are currently in use worldwide. Therefore, methods that can reduce the energy consumption of these devices are of great practical interest. A simple way to save power in LAN switches is to switch the interfaces to sleep mode when no packets are buffered and to keep the interfaces in active mode while there are packets to be transmitted. Although this would appear to be the most effective energy saving scheme, mode switching gives rise to in-rush current, which can cause electrical damage to devices. This problem arises from excessive mode switching, which should be avoided. Thus, the main objective is to develop a method by which to reduce the number of mode switchings that result in short-duration sleep modes because these switchings do not contribute greatly to energy efficiency but can damage the device. To this end, a method is adopted whereby the interface is kept in active mode for an "extra" period of time after all packets have been flushed from the buffer. This period is the "extra active period (EAP)" and this scheme protects the device at the expense of energy saving efficiency. In this paper, this scheme is evaluated analytically in terms of its power reduction ratio and frequency of mode changes by modifying the M/M/1 and IPP/M/1 queuing models. The numerical results show how the duration of the extra active period degrades the energy saving performance while reducing the number of mode changes. We analytically show an exact trade-off between the power reduction ratio and the average number of turn-ons in the EAP model with Poisson packet arrival. Furthermore, we extend the scheme to determine the EAP dynamically and adaptively depending on the short-term utilization of the interface and demonstrate the effectiveness of the extended scheme by simulation. The newly developed scheme will enable LAN switches to be designed with energy savings in mind without exceeding the constraints of the device.

  • Logical Position Exchange Algorithm for Efficient Management in ZigBee Tree Networks

    Saeyoung AHN  Sunshin AN  

     
    LETTER

      Vol:
    E93-B No:12
      Page(s):
    3526-3529

    Currently, there are various routing methods that consider the energy in a wireless sensor environment. The algorithm we consider is a low-rate wireless personal area network, viz., 802.15.4, and ZigBee routing network. Considering, the overall organization of the network energy efficiency, we suggest a logical position exchange (LPE) algorithm between specified nodes. Logical positioning means connecting high sub-networks and low sub-networks based on the neighbor nodes information of the address ID, and depth in the ZigBee tree topology network. When one of the nodes of the tree topology network, which is responsible for connecting multiple low sub-networks and high sub-networks, has difficulty performing its important roles in the network, because of energy exhaustion, it exchanges essential information and entrusts logical positioning to another node that is capable of it. A partial change in the logical topology enhances the energy efficiency in the network.

  • Generalized Spot-Checking for Reliable Volunteer Computing

    Kan WATANABE  Masaru FUKUSHI  

     
    PAPER

      Vol:
    E93-D No:12
      Page(s):
    3164-3172

    While volunteer computing (VC) systems reach the most powerful computing platforms, they still have the problem of guaranteeing computational correctness, due to the inherent unreliability of volunteer participants. Spot-checking technique, which checks each participant by allocating spotter jobs, is a promising approach to the validation of computation results. The current spot-checking is based on the implicit assumption that participants never distinguish spotter jobs from normal ones; however generating such spotter jobs is still an open problem. Hence, in the real VC environment where the implicit assumption does not always hold, spot-checking-based methods such as well-known credibility-based voting become almost impossible to guarantee the computational correctness. In this paper, we generalize spot-checking by introducing the idea of imperfect checking. This generalization allows to guarantee the computational correctness under the situation that spot-checking is not fully-reliable and participants may distinguish spotter jobs. Moreover, we develop a generalized formula of the credibility, which enables credibility-based voting to utilize check-by-voting technique. Simulation results show that check-by-voting improves the performance of credibility-based voting, while guaranteeing the same level of computational correctness.

  • A Contention Access Mechanism Based on a Partitioned Contention Access Period in IEEE 802.15.4 MAC

    Sueng Jae BAE  Tae-Jin LEE  Hyoung-Kee CHOI  Min Young CHUNG  

     
    PAPER-Network

      Vol:
    E93-B No:12
      Page(s):
    3577-3590

    In the contention access period (CAP) of IEEE 802.15.4 beacon-enabled mode, collision probability increases, and network performance decreases as the number of contending devices increases. In this paper, we propose an enhanced contention access mechanism (ECAM) to reduce the collision probability in low rate -- wireless personal area networks (LR-WPANs). In ECAM, since the duration of each CAP is divided into multiple sub-CAPs, the number of devices contending for frame transmissions in each sub-CAP can be reduced by approximately one over the number of sub-CAPs. Further, this lowers the probability of collision due to two or more simultaneous frame transmissions. In addition, since ECAM shortens the channel access duration of devices, devices with ECAM have lower power consumption. To compare the performance of ECAM with that of the IEEE 802.15.4 standard, we carry out extensive simulations. The results show that ECAM yields better performance than the IEEE 802.15.4 standard, especially for dense networks with a heavy traffic load.

  • Single-Event-Upset Tolerant RS Flip-Flop with Small Area

    Kazuteru NAMBA  Kengo NAKASHIMA  Hideo ITO  

     
    LETTER-Dependable Computing

      Vol:
    E93-D No:12
      Page(s):
    3407-3409

    This paper presents a construction of a single-event-upset (SEU) tolerant reset-set (RS) flip-flop (FF). The proposed RS-FF consists of four identical parts which form an interlocking feedback loop just like DICE. The area and average power consumption of the proposed RS-FFs are 1.101.48 and 1.201.63 times smaller than those of the conventional SEU tolerant RS-FFs, respectively.

  • Component Identification and Evaluation for Legacy Systems--An Empirical Study--

    JianFeng CUI  HeungSeok CHAE  

     
    PAPER-Software Engineering

      Vol:
    E93-D No:12
      Page(s):
    3306-3320

    In the field of software reengineering, many component identification approaches have been proposed for evolving legacy systems into component-based systems. Understanding the behaviors of various component identification approaches is the first important step to meaningfully employ them for legacy systems evolution, therefore we performed an empirical study on component identification technology with considerations of their similarity measures, clustering approaches and stopping criteria. We proposed a set of evaluation criteria and developed the tool CIETool to automate the process of component identification and evaluation. The experimental results revealed that many components of poor quality were produced by the employed component identification approaches; that is, many of the identified components were tightly coupled, weakly cohesive, or had inappropriate numbers of implementation classes and interface operations. Finally, we presented an analysis on the component identification approaches according to the proposed evaluation criteria, which suggested that the weaknesses of these clustering approaches were the major reasons that caused components of poor-quality.

  • Parallel DFA Architecture for Ultra High Throughput DFA-Based Pattern Matching

    Yi TANG  Junchen JIANG  Xiaofei WANG  Chengchen HU  Bin LIU  Zhijia CHEN  

     
    PAPER

      Vol:
    E93-D No:12
      Page(s):
    3232-3242

    Multi-pattern matching is a key technique for implementing network security applications such as Network Intrusion Detection/Protection Systems (NIDS/NIPSes) where every packet is inspected against tens of thousands of predefined attack signatures written in regular expressions (regexes). To this end, Deterministic Finite Automaton (DFA) is widely used for multi-regex matching, but existing DFA-based researches have claimed high throughput at an expense of extremely high memory cost, so fail to be employed in devices such as high-speed routers and embedded systems where the available memory is quite limited. In this paper, we propose a parallel architecture of DFA called Parallel DFA (PDFA) taking advantage of the large amount of concurrent flows to increase the throughput with nearly no extra memory cost. The basic idea is to selectively store the underlying DFA in memory modules that can be accessed in parallel. To explore its potential parallelism we intensively study DFA-split schemes from both state and transition points in this paper. The performance of our approach in both the average cases and the worst cases is analyzed, optimized and evaluated by numerical results. The evaluation shows that we obtain an average speedup of 100 times compared with traditional DFA-based matching approach.

  • Estimation of Speech Intelligibility Using Speech Recognition Systems

    Yusuke TAKANO  Kazuhiro KONDO  

     
    PAPER-Speech and Hearing

      Vol:
    E93-D No:12
      Page(s):
    3368-3376

    We attempted to estimate subjective scores of the Japanese Diagnostic Rhyme Test (DRT), a two-to-one forced selection speech intelligibility test. We used automatic speech recognizers with language models that force one of the words in the word-pair, mimicking the human recognition process of the DRT. Initial testing was done using speaker-independent models, and they showed significantly lower scores than subjective scores. The acoustic models were then adapted to each of the speakers in the corpus, and then adapted to noise at a specified SNR. Three different types of noise were tested: white noise, multi-talker (babble) noise, and pseudo-speech noise. The match between subjective and estimated scores improved significantly with noise-adapted models compared to speaker-independent models and the speaker-adapted models, when the adapted noise level and the tested level match. However, when SNR conditions do not match, the recognition scores degraded especially when tested SNR conditions were higher than the adapted noise level. Accordingly, we adapted the models to mixed levels of noise, i.e., multi-condition training. The adapted models now showed relatively high intelligibility matching subjective intelligibility performance over all levels of noise. The correlation between subjective and estimated intelligibility scores increased to 0.94 with multi-talker noise, 0.93 with white noise, and 0.89 with pseudo-speech noise, while the root mean square error (RMSE) reduced from more than 40 to 13.10, 13.05 and 16.06, respectively.

  • The Firing Squad Synchronization Problems for Number Patterns on a Seven-Segment Display and Segment Arrays

    Kazuya YAMASHITA  Mitsuru SAKAI  Sadaki HIROSE  Yasuaki NISHITANI  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E93-D No:12
      Page(s):
    3276-3283

    The Firing Squad Synchronization Problem (FSSP), one of the most well-known problems related to cellular automata, was originally proposed by Myhill in 1957 and became famous through the work of Moore [1]. The first solution to this problem was given by Minsky and McCarthy [2] and a minimal time solution was given by Goto [3]. A significant amount of research has also dealt with variants of this problem. In this paper, from a theoretical interest, we will extend this problem to number patterns on a seven-segment display. Some of these problems can be generalized as the FSSP for some special trees called segment trees. The FSSP for segment trees can be reduced to a FSSP for a one-dimensional array divided evenly by joint cells that we call segment array. We will give algorithms to solve the FSSPs for this segment array and other number patterns, respectively. Moreover, we will clarify the minimal time to solve these problems and show that there exists no such solution.

  • SLA-Based Scheduling of Bag-of-Tasks Applications on Power-Aware Cluster Systems

    Kyong Hoon KIM  Wan Yeon LEE  Jong KIM  Rajkumar BUYYA  

     
    PAPER

      Vol:
    E93-D No:12
      Page(s):
    3194-3201

    Power-aware scheduling problem has been a recent issue in cluster systems not only for operational cost due to electricity cost, but also for system reliability. In this paper, we provide SLA-based scheduling algorithms for bag-of-tasks applications with deadline constraints on power-aware cluster systems. The scheduling objective is to minimize power consumption as long as the system provides the service levels of users. A bag-of-tasks application should finish all the sub-tasks before the deadline as the service level. We provide the power-aware scheduling algorithms for both time-shared and space-shared resource sharing policies. The simulation results show that the proposed algorithms reduce much power consumption compared to static voltage schemes.

  • Time Domain Feedback Equalizer for Fast Fading Channel in OFDM with Scattered Pilot

    Yutaro NAKAGAWA  Yukitoshi SANADA  

     
    LETTER

      Vol:
    E93-A No:12
      Page(s):
    2691-2695

    In this letter, a new feedback equalization scheme to suppress inter-carrier interference (ICI) in an OFDM system using scattered pilot is investigated. On a fast fading channel severe ICI occurs due to a Doppler shift and it deteriorates a bit error rate (BER) seriously because of small subcarrier spacing. In an ISDB-T receiver the equalization is mainly processed in a frequency domain because the scattered pilot is transmitted over the subcarriers. However, the frequency domain equalization may not suppress severe ICI in the case of the fast fading channel with a large Doppler shift. The proposed equalization scheme uses the scattered pilot symbols transformed in a time domain as the reference signal for feedback taps. Numerical results through computer simulation show that the proposed scheme improves the BER performance especially with low carrier-to-noise ratio (CNR) conditions.

  • A Channel-Hopping MAC Protocol for Cognitive IEEE 802.16d Mesh Networks

    Ming-Tuo ZHOU  Hiroshi HARADA  

     
    PAPER

      Vol:
    E93-B No:12
      Page(s):
    3417-3428

    A channel-hopping medium access control (MAC) protocol is proposed for cognitive operation of the 802.16d Mesh networks. The proposal mainly includes a channel-hopping algorithm of channel accessing for control messages transmission and reception, an algorithm of bandwidth allocation in cognitive operation, a cognition-enhanced frame structure, a method of spectrum sensing results reporting, and a method of incumbent detection. Compared to other studies, the channel-hopping algorithm for control messages transmission and reception requires no extra common control channels and operation of mesh clusters, thus it is more cost-effective and simpler in operation. Analysis shows that with this algorithm a Mesh node with any available channels has fair opportunities to receive beacon and network configuration information. Numerical results show that, compared to the mesh cluster method, the proposed channel-hopping algorithm has gain, e.g., as high as 3 times, in getting the data scheduling control messages received by one-hop neighbors, thus it has advantages in minimizing bandwidth allocation collisions. The algorithm of bandwidth allocation details the three-way handshake framework for bandwidth application and grant that is defined in 802.16d Mesh standard, and it enables dynamical resource allocations in cognitive operations. The feasibility of the channel-hopping MAC protocol is confirmed by simulations. And simulation results show that with the parameters set, a normalized aggregate saturation throughput of about 70% is achievable.

  • Traffic Adaptive MAC Mechanism for IEEE 802.15.4 Cluster Based Wireless Sensor Networks with Various Traffic Non-uniformities

    Mario ARZAMENDIA  Kazuo MORI  Katsuhiro NAITO  Hideo KOBAYASHI  

     
    PAPER-Network

      Vol:
    E93-B No:11
      Page(s):
    3035-3047

    This paper proposes a medium access control (MAC) mechanism for the recently developed IEEE 802.15.4 standard, a promising candidate to become the physical (PHY) and MAC layer standard for Wireless Sensor Networks (WSNs). The main concern in WSNs is the energy consumption, and this paper presents a mechanism that adapts properly the duty cycle operation according to the traffic conditions. Various traffic adaption mechanisms have been presented for the MAC layer of the IEEE 802.15.4. However these conventional mechanisms only consider the temporal traffic fluctuations. The proposed mechanism outperforms the conventional mechanism when applied to cluster-tree based WSNs, because it considers not only the temporal fluctuations but also the spatial (geographical) fluctuations, which are intrinsic characteristics of traffic in WSNs with the cluster tree topology. Evaluations showed that the proposed mechanism achieves less energy consumption than the conventional traffic adaptation mechanism, with maintaining almost the same transmission performance.

  • Sorted Sector Covering Combined with Image Condensation -- An Efficient Method for Local Dimming of Direct-Lit and Edge-Lit LCDs Open Access

    Marc ALBRECHT  Andreas KARRENBAUER  Tobias JUNG  Chihao XU  

     
    INVITED PAPER

      Vol:
    E93-C No:11
      Page(s):
    1556-1563

    We consider the backlight calculation of local dimming as an optimization problem. The luminance produced by many LEDs at each pixel considered is calculated which should cover the gray value of each pixel, while the sum of LED currents is to be minimized. For this purpose a specific approach called as "Sorted Sector Covering" (SSC) was developed and is described in this paper. In our pre-processing unit called condenser the source image is reduced to a matrix of much lower resolution so that the computation effort of the SSC algorithm is drastically reduced. During this preprocessing phase, filter functions can be integrated so that a further reduction of the power consumption is achieved. Our processing system allows high power saving and high visual quality at low processor cost. We approach the local dimming problem in the physical viewing direction -- from LED to pixel. The luminance for the pixel is based on the light spread function (LSF) and the PWM values of the LEDs. As the physical viewing direction is chosen, this method is universal and can be applied for any kind of LED arrangement -- direct-lit as well as edge-lit. It is validated on prototypes, e.g., a locally dimmed edge-lit TV.

  • Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols

    SeongHan SHIN  Kazukuni KOBARA  Hideki IMAI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E93-A No:11
      Page(s):
    2092-2095

    An augmented PAKE (Password-Authenticated Key Exchange) protocol is said to be secure against server-compromise impersonation attacks if an attacker who obtained password verification data from a server cannot impersonate a client without performing off-line dictionary attacks on the password verification data. There are two augmented PAKE protocols where the first one [12] was proposed in the IEEE Communications Letters and the second one [15] was submitted to the IEEE P1363.2 standard working group [9]. In this paper, we show that these two augmented PAKE protocols [12], [15] (claimed to be secure) are actually insecure against server-compromise impersonation attacks. More specifically, we present generic server-compromise impersonation attacks on these augmented PAKE protocols [12],[15].

  • Autonomous Traffic Engineering for Boosting Application Fidelity in Wireless Sensor Networks

    Md. Abdur RAZZAQUE  Choong Seon HONG  Sungwon LEE  

     
    PAPER-Network

      Vol:
    E93-B No:11
      Page(s):
    2990-3003

    This paper presents an autonomous traffic engineering framework, named ATE, a highly efficient data dissemination mechanism for multipath data forwarding in Wireless Sensor Networks (WSNs). The proposed ATE has several salient features. First, ATE utilizes three coordinating schemes: an incipient congestion inference scheme, an accurate link quality estimation scheme and a dynamic traffic diversion scheme. It significantly minimizes packet drops due to congestion by dynamically and adaptively controlling the data traffic over congested nodes and/or poorer quality links, and by opportunistically exploiting under-utilized nodes for traffic diversion, while minimizing the estimation and measurement overhead. Second, ATE can provide with high application fidelity of the network even for increasing values of bit error rates and node failures. The proposed link quality estimation and congestion inference schemes are light weight and distributed, improving the energy efficiency of the network. Autonomous Traffic Engineering has been evaluated extensively via NS-2 simulations, and the results have shown that ATE provides a better performance with minimum overhead than those of existing approaches.

  • Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication

    Shun WATANABE  Yasutada OOHAMA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:11
      Page(s):
    1976-1983

    We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show a closed form expression of the optimal trade-off between the rate of key generation and the rate of the public communication. Our results clarify an essential difference between the key agreement from discrete sources and that from continuous sources.

  • Improved Subset Difference Method with Ternary Tree

    Kazuhide FUKUSHIMA  Shinsaku KIYOMOTO  Toshiaki TANAKA  Kouichi SAKURAI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:11
      Page(s):
    2034-2044

    This paper proposes a ternary subset difference method (SD method) that is resistant to coalition attacks. In order to realize a secure ternary SD method, we design a new cover-finding algorithm, label assignment algorithm and encryption algorithm. These algorithms are required to revoke one or two subtrees simultaneously while maintaining resistance against coalition attacks. We realize this two-way revocation mechanism by creatively using labels and hashed labels. Then, we evaluate the efficiency and security of the ternary SD method. We show that the number of labels on each client device can be reduced by about 20.4 percent. The simulation results show that the proposed scheme reduces the average header length by up to 15.0 percent in case where the total number of devices is 65,536. On the other hand, the computational cost imposed on a client device stays within O(log n). Finally, we prove that the ternary SD method is secure against coalition attacks.

  • A Cross Layer Perceptual Speech Quality Based Wireless VoIP Service

    Tein-Yaw CHUNG  Yung-Mu CHEN  Liang-Yi HUANG  

     
    PAPER

      Vol:
    E93-A No:11
      Page(s):
    2153-2162

    This paper proposes a cross layer wireless VoIP service which integrates an Adaptive QoS Playout (AQP) algorithm, E-model, Stream Control Transmission Protocol (SCTP), IEEE 802.21 Media Independent Handover (MIH) middleware and two user motion detection services. The proposed AQP algorithm integrates the effect of playout control and lost packet retransmission based on the E-model. Besides, by using the partial reliable transmission service from SCTP and the handoff notification from MIH services in a cross layer manner, AQP can reduce the lateness loss rate and improve speech quality under high frame error rates. In the simulations, the performance of AQP is compared with a fixed playout algorithm and four adaptive playout strategies. The simulation results show that the lateness loss rate of AQP is 2% lower than that of existing playout algorithms and the R-factor is 16% higher than the compared algorithms when a network has 50 ms wired propagation delay and 2.5% frame error rate.

1681-1700hit(4079hit)