The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] FA(3430hit)

561-580hit(3430hit)

  • Study on RCS Reduction of Patch Array Using Switchable Absorption/Transmission Surface

    Shinya KITAGAWA  Ryosuke SUGA  Osamu HASHIMOTO  Kiyomichi ARAKI  

     
    BRIEF PAPER

      Vol:
    E99-C No:7
      Page(s):
    805-808

    Radar cross section (RCS) of a patch array antenna is reduced using a switchable absorption/transmission surface. The switchable surface performs as between a radar absorber and transmission surface using diodes at 9GHz. The switchable surface was applied to the radome of a patch array and its radiation pattern and RCS reduction were evaluated. The gain and the radiation pattern with the radome was equivalent to that without the radome. The RCS reduction with the radome was 25dB compared to that without the radome.

  • Efficient Aging-Aware SRAM Failure Probability Calculation via Particle Filter-Based Importance Sampling

    Hiromitsu AWANO  Masayuki HIROMOTO  Takashi SATO  

     
    PAPER

      Vol:
    E99-A No:7
      Page(s):
    1390-1399

    An efficient Monte Carlo (MC) method for the calculation of failure probability degradation of an SRAM cell due to negative bias temperature instability (NBTI) is proposed. In the proposed method, a particle filter is utilized to incrementally track temporal performance changes in an SRAM cell. The number of simulations required to obtain stable particle distribution is greatly reduced, by reusing the final distribution of the particles in the last time step as the initial distribution. Combining with the use of a binary classifier, with which an MC sample is quickly judged whether it causes a malfunction of the cell or not, the total number of simulations to capture the temporal change of failure probability is significantly reduced. The proposed method achieves 13.4× speed-up over the state-of-the-art method.

  • Underground Facility Management System Supporting Heterogeneous Duplex Communication

    Seokhyun SON  Myoungjin KIM  Hyoseop SHIN  

     
    LETTER-Systems and Control

      Vol:
    E99-A No:7
      Page(s):
    1478-1480

    In this letter, an underground facility management system for effective underground facility management is suggested. The present underground facility management system uses a wired and wireless duplex communication method to enable seamless communication, and rapid responses to any failures encountered. In this letter, the architecture and components of underground facility management system supporting heterogeneous duplex communication is suggested, and relevant work flow is presented.

  • Fairness Improvement of Multiple-Bottleneck Flow in Data Center Networks

    Kenta MATSUSHIMA  Kouji HIRATA  Miki YAMAMOTO  

     
    PAPER-Network

      Vol:
    E99-B No:7
      Page(s):
    1445-1454

    Quantized congestion notification (QCN), discussed in IEEE 802.1Qau, is one of the most promising Layer 2 congestion control methods for data center networks. Because data center networks have fundamentally symmetric structures and links are designed to have high link utilization, data center flows often pass through multiple bottleneck links. QCN reduces its transmission rate in a probabilistic manner with each congestion notification feedback reception, which might cause excessive regulation of the transmission rate in a multiple-bottleneck case because each bottleneck causes congestion feedbacks. We have already proposed QCN with bottleneck selection (QCN/BS) for multicast communications in data center networks. Although QCN/BS was originally proposed for multicast communications, it can also be applied to unicast communications with multiple bottleneck points. QCN/BS calculates the congestion level for each switch based on feedback from the switch and adjusts its transmission rate to the worst congestion level. In this paper, we preliminarily evaluate QCN/BS in unicast communications with multiple tandem bottleneck points. Our preliminary evaluation reveals that QCN/BS can resolve the excessive rate regulation problem of QCN but has new fairness problems for long-hop flows. To resolve this, we propose a new algorithm that integrates QCN/BS and our already proposed Adaptive BC_LIMIT. In Adaptive BC_LIMIT, the opportunities for rate increase are almost the same for all flows even if their transmission rates differ, enabling an accelerated convergence of fair rate allocation among flows sharing a bottleneck link. The integrated algorithm is the first congestion control mechanism that takes into account unicast flows passing through multiple tandem bottleneck points based on QCN. Furthermore, it does not require any modifications of switches used in QCN. Our simulation results show that our proposed integration of QCN/BS and Adaptive BC_LIMIT significantly mitigates the fairness problem for unicast communications with multiple bottleneck points in data center networks.

  • RTCO: Reliable Tracking for Continuous Objects Using Redundant Boundary Information in Wireless Sensor Networks

    Sang-Wan KIM  Yongbin YIM  Hosung PARK  Ki-Dong NAM  Sang-Ha KIM  

     
    PAPER-Network

      Vol:
    E99-B No:7
      Page(s):
    1464-1480

    Energy-efficient tracking of continuous objects such as fluids, gases, and wild fires is one of the important challenging issues in wireless sensor networks. Many studies have focused on electing fewer nodes to report the boundary information of continuous objects for energy saving. However, this approach of using few reporting packets is very sensitive to packet loss. Many applications based on continuous objects tracking require timely and precise boundary information due to the danger posed by the objects. When transmission of reporting packets fails, applications are unable to track the boundary reliably and a delay is imposed to recover. The transmission failure can fatally degrade application performance. Thus, it is necessary to consider just-in-time recovery for reliable continuous object tracking. Nevertheless, most schemes did not consider the reliable tracking to handle the situation that packet loss happen. Recently, a scheme called I-COD with retransmission was proposed to recover lost packets but it leads to increasing both the energy consumption and the tracking latency owing to the retransmission. Thus, we propose a reliable tracking scheme that uses fast recovery with the redundant boundary information to track continuous objects in real-time and energy-efficiently. In the proposed scheme, neighbor nodes of boundary nodes gather the boundary information in duplicate and report the redundant boundary information. Then the sink node can recover the lost packets fast by using the redundant boundary information. The proposed scheme provides the reliable tracking with low latency and no retransmissions. In addition, the proposed scheme saves the energy by electing fewer nodes to report the boundary information and performing the recovery without retransmissions. Our simulation results show that the proposed scheme provides the energy-efficient and reliable tracking in real-time for the continuous objects.

  • Energy Efficient Power Control and Resource Allocation in Downlink OFDMA HetNets with Cross-Tier Interference Constraint

    Guodong ZHANG  Wei HENG  Jinming HU  Tian LIANG  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:7
      Page(s):
    1599-1608

    Heterogeneous network (HetNet) is now considered to be a promising technique for enhancing the coverage and reducing the transmit power consumption of the next 5G system. Deploying small cells such as femtocells in the current macrocell networks achieves great spatial reuse at the cost of severe cross-tier interference from concurrent transmission. In this situation, two novel energy efficient power control and resource allocation schemes in terms of energy efficiency (EE)-fairness and EE-maximum, respectively, are investigated in this paper. In the EE-fairness scheme, we aim to maximize the minimum EE of the femtocell base stations (FBSs). Generalized Dinkelbach's algorithm (GDA) is utilized to tackle this optimization problem and a distributed algorithm is proposed to solve the subproblem in GDA with limited intercell coordination, in which only a few scalars are shared among FBSs. In the EE-maximum scheme, we aim to maximize the global EE of all femtocells which is defined as the aggregate capacity over the aggregate power consumption in the femtocell networks. Leveraged by means of the lower-bound of logarithmic function, a centralized algorithm with limited computational complexity is proposed to solve the global EE maximization problem. Simulation results show that the proposed algorithms outperform previous schemes in terms of the minimum EE, fairness and global EE.

  • Time-Domain Solver for 3D Electromagnetic Problems Using the Method of Moments and the Fast Inverse Laplace Transform

    Shinichiro OHNUKI  Yuya KITAOKA  Takashi TAKEUCHI  

     
    BRIEF PAPER

      Vol:
    E99-C No:7
      Page(s):
    797-800

    A novel computational method based on a combination of the method of moments in the complex frequency domain and the fast inverse Laplace transform is proposed for solving time-domain electromagnetic problems. Using our proposed method, it is easy to estimate and control the computational error, and the observation time can be selected independently. We investigate canonical scattering problems and verify these advantages.

  • Area-Efficient Soft-Error Tolerant Datapath Synthesis Based on Speculative Resource Sharing

    Junghoon OH  Mineo KANEKO  

     
    PAPER

      Vol:
    E99-A No:7
      Page(s):
    1311-1322

    As semiconductor technologies have advanced, the reliability problem caused by soft-errors is becoming one of the serious issues in LSIs. Moreover, multiple component errors due to single soft-errors also have become a serious problem. In this paper, we propose a method to synthesize multiple component soft-error tolerant application-specific datapaths via high-level synthesis. The novel feature of our method is speculative resource sharing between the retry parts and the secondary parts for time overhead mitigation. A scheduling algorithm using a special priority function to maximize speculative resource sharing is also an important feature of this study. Our approach can reduce the latency (schedule length) in many applications without deterioration of reliability and chip area compared with conventional datapaths without speculative resource sharing. We also found that our method is more effective when a computation algorithm possesses higher parallelism and a smaller number of resources is available.

  • Power Aware Routing Protocols in Wireless Sensor Network

    Mohammed ALSULTAN  Kasim OZTOPRAK  Reza HASSANPOUR  

     
    PAPER-Network

      Vol:
    E99-B No:7
      Page(s):
    1481-1491

    Wireless Sensor Networks (WSNs) have gained importance with a rapid growth in their applications during the past decades. There has also been a rise in the need for energy-efficient and scalable routing along with the data aggregation protocols for the large scale deployments of sensor networks. The traditional routing algorithms suffer from drawbacks such as the presence of one hop long distance data transmissions, very large or very small clusters within a network at the same moment, over-accumulated energy consumption within the cluster-heads (CHs) etc. The lifetime of WSNs is also decreased due to these drawbacks. To overcome them, we have proposed a new method for the Multi-Hop, Far-Zone and Load-Balancing Hierarchical-Based Routing Algorithm for Wireless Sensor Network (MFLHA). Various improvements have been brought forward by MFLHA. The first contribution of the proposed method is the existence of a large probability for the nodes with higher energy to become the CH through the introduction of the energy decision condition and energy-weighted factor within the electing threshold of the CH. Secondly, MFLHA forms a Far-Zone, which is defined as a locus where the sensors can reach the CH with an energy less than a threshold. Finally, the energy consumption by CHs is reduced by the introduction of a minimum energy cost method called the Multi-Hop Inter-Cluster routing algorithm. Our experimental results indicate that MFLHA has the ability to balance the network energy consumption effectively as well as extend the lifetime of the networks. The proposed method outperforms the competitors especially in the middle range distances.

  • Performance Analysis of DF Relaying Cooperative Systems

    Jingjing WANG  Lingwei XU  Xinli DONG  Xinjie WANG  Wei SHI  T. Aaron GULLIVER  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:7
      Page(s):
    1577-1583

    In this paper, the average symbol error probability (SEP) performance of decode-and-forward (DF) relaying mobile-to-mobile (M2M) systems with transmit antenna selection (TAS) over N-Nakagami fading channels is investigated. The moment generating function (MGF) method is used to derive exact SEP expressions, and the analysis is verified via simulation. The optimal power allocation problem is investigated. Performance results are presented which show that the fading coefficient, number of cascaded components, relative geometrical gain, number of antennas, and power allocation parameter have a significant effect on the SEP.

  • SmartUI: Resource-Saving and Editable Smartphone User Interface for Fast Remote PC Control

    Haeyoung LEE  

     
    PAPER-Human-computer Interaction

      Pubricized:
    2016/03/30
      Vol:
    E99-D No:7
      Page(s):
    1852-1861

    There have been many previous studies to facilitate the use of smartphones as remote controllers of PCs. Image-based user interfaces have been suggested to provide fully functioning remote applications. However, most previous image-based interfaces consume high battery power and network bandwidth. Also most users have specific preferences on various applications on remote PCs, but previous smartphone interface systems would not allow users to define their own smartphone interfaces to set their preferences. This paper presents a new smartphone user interface system, SmartUI, for remote PC control. SmartUI is designed as a text-oriented web-based interface, so that it can be used on any smartphone with a built-in web browser while saving battery power and network bandwidth. Moreover, SmartUI enables a user to create buttons on a smartphone; for a quick launch and for shortcut keys, associated with a specific remote PC application. As a result, SmartUI allows a user to create his or her own smartphone interface for remote PC control, while saving battery power and network bandwidth. SmartUI has been tested with various smartphones and the results are also presented in this paper.

  • Value-Driven V-Model: From Requirements Analysis to Acceptance Testing

    Youngsub HAN  Dong-hyun LEE  Byoungju CHOI  Mike HINCHEY  Hoh Peter IN  

     
    PAPER-Software Engineering

      Pubricized:
    2016/04/05
      Vol:
    E99-D No:7
      Page(s):
    1776-1785

    The goal of software testing should go beyond simply finding defects. Ultimately, testing should be focused on increasing customer satisfaction. Defects that are detected in areas of the software that the customers are especially interested in can cause more customer dissatisfaction. If these defects accumulate, they can cause the software to be shunned in the marketplace. Therefore, it is important to focus on reducing defects in areas that customers consider valuable. This article proposes a value-driven V-model (V2 model) that deals with customer values and reflects them in the test design for increasing customer satisfaction and raising test efficiency.

  • Miniaturization of Double Stub Resonators Using Lumped-Element Capacitors for MMIC Applications

    Shinichi TANAKA  Takao KATAYOSE  Hiroki NISHIZAWA  Ken'ichi HOSOYA  Ryo ISHIKAWA  Kazuhiko HONJO  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E99-C No:7
      Page(s):
    830-836

    We present a design method for miniaturizing double stub resonators that are potentially very useful for wide range of applications but have limited usage for MMICs due to their large footprint. The analytical design model, which we introduce in this paper, allows for determining the capacitances needed to achieve the targeted shrinking ratio while maintaining the original loaded-Q before miniaturization. To verify the model, 18-GHz stub resonators that are around 40% of the original sizes were designed and fabricated in GaAs MMIC technology. The effectiveness of the proposed technique is also demonstrated by a 9-GHz low phase-noise oscillator using the miniaturized resonator.

  • A New Design Formula of Coupling Coefficient between Antenna and Resonator for Efficient Design of Filtering Antenna

    Masataka OHIRA  Kazuma YAMANAKA  Zhewang MA  

     
    PAPER

      Vol:
    E99-C No:7
      Page(s):
    744-750

    This paper proposes a new design formula of coupling coefficient between antenna and resonator for an efficient design of filtering antennas consisting of an antenna and resonators. The filtering antenna can be designed by introducing a well-established filter design theory. For such a design approach, an external Q factor at input port, coupling coefficients, and a radiation Q factor of the antenna need to be evaluated. However, conventional design methods have a time-consuming procedure, since there are no effective techniques to evaluate the coupling coefficient between resonator and antenna. To solve the problem, we derive the new design formula using only amplitude property of input reflection responses obtained from a coupled structure of resonator and antenna. As an example, a third-order filtering antenna is synthesized, designed, and tested at 2.45 GHz, which numerically and experimentally validates the effectiveness of the derived equation.

  • Analysis of Two- and Three-Dimensional Plasmonic Waveguide Band-Pass Filters Using the TRC-FDTD Method

    Jun SHIBAYAMA  Yusuke WADA  Junji YAMAUCHI  Hisamatsu NAKANO  

     
    BRIEF PAPER

      Vol:
    E99-C No:7
      Page(s):
    817-819

    Two plasmonic band-bass filters are analyzed: one is a grating-type filter and the other is a slit-type filter. The former shows a band-pass characteristic with a high transmission for a two-dimensional structure, while the latter exhibits a high transmission even for a three-dimensional structure with a thin metal layer.

  • Subblock-Level Matching Layout for Analog Block-Pair and Its Layout-Dependent Manufacturability Evaluation

    Takuya HIRATA  Ryuta NISHINO  Shigetoshi NAKATAKE  Masaya SHIMOYAMA  Masashi MIYAGAWA  Ryoichi MIYAUCHI  Koichi TANNO  Akihiro YAMADA  

     
    PAPER

      Vol:
    E99-A No:7
      Page(s):
    1381-1389

    This paper presents a layout-dependent manufacturability for analog integrated circuits. We focus on the relative variability of an input op-amp-pair used in an instrumentation amplifier (in-amp). We propose a subblock-level matching layout style such that subblocks of the op-amp-pair are superimposed aiming to suppress the relative variability dependent on the layout. We fabricate chips according to five superposed layout styles and evaluate the relative variability in terms of the DC-offset, so that we demonstrate the most effective layout style. Besides, we provide a manufacturability simulation methodology to evaluate the in-amp considering the relative variability of the op-amp-pair based on the measurement results. Comparing the simulation result and the performances of fabricated in-amps, we are convinced our methodology can evaluate the layout-dependency of the manufacturability by the simulation.

  • A Simple Improvement for Integer Factorizations with Implicit Hints

    Ryuichi HARASAWA  Heiwa RYUTO  Yutaka SUEYOSHI  

     
    PAPER

      Vol:
    E99-A No:6
      Page(s):
    1090-1096

    In this paper, we describe an improvement of integer factorization of k RSA moduli Ni=piqi (1≤i≤k) with implicit hints, namely all pi share their t least significant bits. May et al. reduced this problem to finding a shortest (or a relatively short) vector in the lattice of dimension k obtained from a given system of k RSA moduli, for which they applied Gaussian reduction or the LLL algorithm. In this paper, we improve their method by increasing the determinant of the lattice obtained from the k RSA moduli. We see that, after our improvement, May et al.'s method works smoothly with higher probability. We further verify the efficiency of our method by computer experiments for various parameters.

  • The Failure Probabilities of Random Linear Network Coding at Sink Nodes

    Dan LI  Xuan GUANG  Fang-Wei FU  

     
    LETTER-Information Theory

      Vol:
    E99-A No:6
      Page(s):
    1255-1259

    In the paradigm of network coding, when the network topology information cannot be utilized completely, random linear network coding (RLNC) is proposed as a feasible coding scheme. But since RLNC neither considers the global network topology nor coordinates codings between different nodes, it may not achieve the best possible performance of network coding. Hence, the performance analysis of RLNC is very important for both theoretical research and practical applications. Motivated by a fact that different network topology information can be available for different network communication problems, we study and obtain several upper and lower bounds on the failure probability at sink nodes depending on different network topology information in this paper, which is also the kernel to discuss some other types of network failure probabilities. In addition, we show that the obtained upper bounds are tight, the obtained lower bound is asymptotically tight, and we give the worst cases for different scenarios.

  • User-Centric Approach for Bandwidth Allocation Method Based on Quality of Experience

    Huong PHAM-THI  Takumi MIYOSHI  

     
    PAPER

      Vol:
    E99-B No:6
      Page(s):
    1282-1290

    This paper focuses on the bandwidth allocation methods based on real user experience for web browsing applications. Because the Internet and its services are rapidly increasing, the bandwidth allocation problem has become one of the typical challenges for Internet service providers (ISPs) and network planning with respect to providing high service quality. The quality of experience (QoE) plays an important role in the success of services, and the guarantee of QoE accordingly represents an important goal in network resource control schemes. To cope with this issue, this paper proposes two user-centric bandwidth resource allocation methods for web browsing applications. The first method dynamically allocates bandwidth by considering the same user's satisfaction in terms of QoE with respect to all users in the system, whereas the second method introduces an efficient trade-off between the QoE of each user group and the average QoE of all users. The purpose of these proposals is to provide a flexible solution to reasonably allocate limited network resources to users. By considering service quality from real users' perception viewpoint, the proposed allocation methods enable us to understand actual users' experiences. Compared to previous works, the numerical results show that the proposed bandwidth allocation methods achieve the following contributions: improving the QoE level for dissatisfied users and providing a fair distribution, as well as retaining a reasonable average QoE.

  • Efficient Usage of Cover Free Families in Broadcast Encryption

    Maki YOSHIDA  Toru FUJIWARA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E99-A No:6
      Page(s):
    1216-1221

    A cover free family (CFF) is a useful mathematical tool for cryptographic schemes where any pre-defined number of sets in the family do not cover another set in the family. The common disadvantage of CFF-based schemes is the requirement for a significantly large amount of data such as public keys and ciphertexts. This paper proposes a simple method to reduce the size of ciphertexts in CFF-based broadcast encryption schemes by removing redundant elements from sets in the family, and then analyzes the size of cihpertexts. As a result, in a typical distribution case, the average amount of ciphertexts is reduced to 83 percents (from 691Kbits to 576Kbits).

561-580hit(3430hit)