Tutomu MURASE Kosuke UCHIYAMA Yumi HIRANO Shigeo SHIODA Shiro SAKATA
QoS (Quality of Service) control in WLAN (IEEE802.11 Wireless LAN) is becoming increasingly important because WLAN is widely deployed as an access network and also plays a key role in providing seamless QoS communication between wired networks and wireless terminals. Although previous research has attempted to increase total throughput or available bandwidth in WLAN, few studies have treated individual TCP/UDP flow QoS. EDCA in IEEE802.11e might provide prioritized QoS functions that would partially address this problem. However, in uplink flow, which is defined as data moving from a terminal toward an Access Point, EDCA has limitations. These manifest themselves both across classes and in differentiated QoS control between terminals in the same class. Furthermore, 802.11e requires modification of terminals as well as other alterations proposed by other researchers. Instead of 802.11e or other modifications of 802.11, we propose an approach to controlling QoS that requires no terminal modifications or installation of additional software/hardware. The proposed idea is MAC-frame Receiving-Opportunity Control (ROC), in which a MAC (Media Access Control) frame is completely delivered only if it has sufficiently high priority; otherwise either the MAC frame is discarded or an Acknowledge (ACK) to the frame is not sent. The frame that was discarded is forced to accept a back-off waiting time for retransmission, consistent with 802.11DCF. This results in QoS degradation for low priority flows and eventually results in QoS improvements for high priority flows. Performance evaluation shows that the ROC causes some performance degradation in total WLAN throughput but can achieve not only QoS priority control but also arbitrary throughput performance. In particular, the ROC (in the MAC layer) can also permit different throughputs for high priority and low priority flows, conditioned on control processes in other layers. These may include rate adaptation (in the MAC layer) and TCP congestion control (in the TCP layer).
An odd composite number n for which an-1 ≡ 1 (mod n) for all integers a coprime to n is called a Carmichael number. This paper shows that some class of Carmichael numbers which have relatively large prime factors can be recognized in deterministic polynomial time under the assumption of the Extended Riemann Hypothesis (ERH). Also some related problems are discussed.
Khoongming KHOO Guanhan CHEW Guang GONG Hian-Kiat LEE
In this paper, we present the time-memory-data (TMD) trade-off attack on stream ciphers filter function generators and filter cominers based on Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-data trade-off attack of Mihaljevic and Imai on Toyocrypt. First, we substitute the filter function in Toyocrypt (which has the same size as the LFSR) with a general Maiorana-McFarland function. This allows us to apply the attack to a wider class of stream ciphers. Second, we highlight how the choice of different Maiorana-McFarland functions can affect the effectiveness of our attack. Third, we show that the attack can be modified to apply on filter functions which are smaller than the LFSR and on filter-combiner stream ciphers. This allows us to cryptanalyze other configurations commonly found in practice. Finally, filter functions with vector output are sometimes used in stream ciphers to improve the throughput. Therefore the case when the Maiorana-McFarland functions have vector output is investigated. We found that the extra speed comes at the price of additional weaknesses which make the attacks easier.
Michinari SHIMODA Masazumi MIYOSHI Kazunori MATSUO Yoshitada IYAMA
An inverse scattering problem of estimating the reflection coefficient and the surface impedance from two sets of absolute values of the near field with periodic change is investigated. The problem is formulated in terms of a nonlinear simultaneous equations which is derived from the relation between the two sets of absolute values and the field defined by a finite summation of the modal functions by applying the Fourier analysis. The reflection coefficient is estimated by solving the equations by Newton's method through the successive algorithm with the increment of the number of truncation in the summation one after another. Numerical examples are given and the accuracy of the estimation is discussed.
Junichi NAKAYAMA Yasuhiko TAMURA Kiyoshi TSUTSUMI
This paper deals with the scattering of a transverse magnetic (TM) plane wave from a perfectly conductive surface with a finite periodic array of rectangular grooves. By use of the method in a previous paper [IEICE TRANS. ELECTRON. VOL.E90-C, no.4, pp.903-906, APRIL 2007], the total scattering cross section is numerically calculated for several different numbers of grooves at a low grazing angle of incidence. It is newly found that, when the corrugation width becomes thousands times of wavelength, the total scattering cross section slightly depends on the groove depth and the period, and becomes almost proportional to square root of the corrugation width with a small correction.
The Green's function of free space for the fast inhomogeneous plane wave algorithm is represented by an integration in the complex plane. The error in the computational process is determined by the number of sampling points, the truncation of the integration path, and the extrapolation. Therefore, the error control method is different from that for the fast multipole method. We will discuss the worst-case interactions of the fast inhomogeneous plane wave algorithm for the box implementation and define the upper and lower bounds of the computational error.
In this paper, for odd n and any k with gcd(n,k) = 1, new binary sequence families Sk of period 2n-1 are constructed. These families have maximum correlation , family size 22n+2n+1 and maximum linear span . The correlation distribution of Sk is completely determined as well. Compared with the modified Gold codes with the same family size, the proposed families have the same period and correlation properties, but larger linear span. As good candidates with low correlation and large family size, the new families contain the Gold sequences and the Gold-like sequences. Furthermore, Sk includes a subfamily which has the same period, correlation distribution, family size and linear span as the family So(2) recently constructed by Yu and Gong. In particular, when k=1, is exactly So(2).
Nararat RUANGCHAIJATUPON Yusheng JI
Orthogonal Frequency Division Multiple Access (OFDMA) is the technique for the next generation wireless networks, whose enhanced capacity is to serve a combination of traffic with diverse QoS requirements. To realize this, the resource allocation scheme has to be carefully designed so that the instantaneous channel condition, QoS provision, and the network utilization are integrated. In this paper, we propose the resource allocation scheme for downlink traffic of 2 classes; guaranteed and non-guaranteed, having different traffic contracts. We provide guaranteed throughput for the guaranteed class by considering the cost incurred from serving this class. Then, we formulate the assignment problem with the objective of minimizing this cost. For the non-guaranteed class, we aim to maximize network utilization and to maintain throughput fairness, by employing Proportional Fairness (PF) utility function and emphasizing on the portion of network resource that the user received and the individual user's queue length. We use a heuristic approach to schedule users' data into the downlink subframe by exploiting multi-user multi-channel diversity to utilize system's bandwidth efficiently. Intensive simulation shows that our scheme differentiates classes of traffic and provides satisfied throughput, lower packet drop rate, and lower queuing delay to the guaranteed class, comparing with those of the non-guaranteed class. Furthermore, the results also show that the scheme is fair to users in the same class in both throughput and service time.
Ranga HETTIARACHCHI Mitsuo YOKOYAMA Hideyuki UEHARA Takashi OHIRA
In this paper, performance of a novel interference cancellation technique for the single user detection in a direct-sequence code-division multiple access (DS-CDMA) system has been investigated. This new algorithm is based on the Cycle-and-Add property of PN (Pseudorandom Noise) sequences and can be applied for both synchronous and asynchronous systems. The proposed strategy provides a simple method that can delete interference signals one by one in spite of the power levels of interferences. Therefore, it is possible to overcome the near-far problem (NFP) in a successive manner without using transmit power control (TPC) techniques. The validity of the proposed procedure is corroborated by computer simulations in additive white Gaussian noise (AWGN) and frequency-nonselective fading channels. Performance results indicate that the proposed receiver outperforms the conventional receiver and, in many cases, it does so with a considerable gain.
Hidehiro KATO Yasuyuki NOGAMI Tomoki YOSHIDA Yoshitaka MORIKAWA
In this paper, a multiplication algorithm in extension field Fpm is proposed. Different from the previous works, the proposed algorithm can be applied for an arbitrary pair of characteristic p and extension degree m only except for the case when 4p divides m(p-1) and m is an even number. As written in the title, when p>m, 4p does not divide m(p-1). The proposed algorithm is derived by modifying cyclic vector multiplication algorithm (CVMA). We adopt a special class of Gauss period normal bases. At first in this paper, it is formulated as an algorithm and the calculation cost of the modified algorithm is evaluated. Then, compared to those of the previous works, some experimental results are shown. Finally, it is shown that the proposed algorithm is sufficient practical when extension degree m is small.
Fumihito SASAMORI Yuya ISHIKAWA Shiro HANDA Shinjiro OSHITA
Both adaptive modulation and diversity combining are attractive techniques to combat fading and these two can be applicable to each digital-modulated symbol in OFDM transmission. In this letter, aiming to combat severe fading more effectively than the adaptive modulation, we theoretically analyze the benefit of a frequency diversity scheme within one OFDM symbol, which is a simple kind of coded OFDM (COFDM) based on IEEE 802.16 protocols. A simple closed form equation of bit error rate (BER) is derived, and then the advantages of correlated diversity gain and interference suppression by the diversity scheme are verified by both theoretical analysis and Monte Carlo simulation.
Yuichi HAMAMURA Chizu MATSUMOTO Yoshiyuki TSUNODA Koji KAMODA Yoshio IWATA Kenji KANAMITSU Daisuke FUJIKI Fujihiko KOJIKA Hiromi FUJITA Yasuo NAKAGAWA Shun'ichi KANEKO
To improve product yield in high-product-mix semiconductor manufacturing, it is important to estimate the systematic yield inherent to each product and to extract problematic products that have low systematic yields. We propose a simplified and available yield model using a critical area analysis. This model enables the extraction of problematic products by the relationship between actual yields and the short sensitivities of the products. Furthermore, we present an enterprise-wide yield management system using this model and some useful applications. As a result, the system increases the efficiency of the yield management and enhancement dramatically.
Yasuhisa TAKIZAWA Akira YAMAGUCHI Sadao OBANA
The expansion and diversification of wireless systems are proceeding rapidly, and the wireless communication environment will become a hybrid environment composed of multiple wireless systems. On the other hand, the resources of wireless systems are finite. Therefore, there is increasing concern that the growing use ofwireless systems will exhaust the finite wireless resources. Cognitive radio has been proposed as a solution to this problem. Cognitive radio aims to optimize the utilization of wireless resources by combining multiple wireless interfaces. Therefore, the future wireless access networks will be composed of multiple wireless systems. In this paper, we propose a packet distribution for communications using multiple IEEE802.11 wireless interfaces. The proposed method optimizes the utilization efficiency of multiple IEEE802.11 wireless interfaces based on a link cost which shows the load of the wireless link, and it improves delay and throughput in the access network. Furthermore, we show its impact on TCP.
Nobutaka OMAKI Tetsu SHIJO Makoto ANDO
We have proposed a unique and simple modification to the definition of surface-normal vectors in Physical optics (PO). The modified surface-normal vectors are so defined as that the reflection law is satisfied at every point on the surface. The PO with currents defined by this new surface-normal vector has the enhanced accuracy for the edged scatterers to the level of Geometrical Theory of Diffraction (GTD), though it dispenses with the knowledge of high frequency asymptotic techniques. In this paper, firstly, the remarkable simplicity and the high accuracy of the modified PO as applied to the analysis of Radar Cross Section (RCS) is demonstrated for 2 dimensional problems. Noteworthy is that the scattering not only from edge but also from wedge is accurately predicted. This fringe advantage is confirmed asymptotically by comparing the edge and wedge diffraction coefficients of GTD. Finally, the applicability for three dimensional cube is also demonstrated by comparison with experimental data.
Zhaoxi FANG Liangbin LI Zongxin WANG
This letter studies the asymptotic bit error rate (BER) performance of multihop communication systems with amplify-and-forward relaying over Nakagami-m fading channels. Since it is difficult to find the exact probability density function (PDF) of the output signal-to-noise ratio (SNR) at the destination, we resort to the series expansion of this PDF in the neighborhood of zero. Building upon this result, a closed-form expression for the average BER in the high SNR region is derived. Numeric results show that the derived asymptotic BER expression is accurate at medium and high SNR for both independent identically distributed (i.i.d.) and independent non-identically distributed (i.n.i.d.) channels.
Ruicong ZHI Qiuqi RUAN Jiying WU
This paper proposes a novel algorithm for image feature extraction-the dual two-dimensional fuzzy class preserving projections ((2D)2FCPP). The main advantages of (2D)2FCPP over two-dimensional locality preserving projections (2DLPP) are: (1) utilizing the fuzzy assignation mechanisms to construct the weight matrix, which can improve the classification results; (2) incorporating 2DLPP and alternative 2DLPP to get a more efficient dimensionality reduction method-(2D)2LPP.
In this letter, we derive a very accurate closed-form approximate formula for the average achievable rate of stacked orthogonal space-time block code (OSTBC) in Rayleigh fading channels. Some simulations are performed to demonstrate that the derived formula shows better agreement with Monte-Carlo simulation results than the existing closed-form approximate expressions.
IEEE 802.11 Media Access Control (MAC) is the most widely used protocol in Wireless Ad-hoc Networks (WANETs). However, it cannot guarantee fair channel allocation among the flows contending for the channel. In this paper, we propose a new media access control algorithm to achieve per-flow fairness while maximizing WANETs throughput.
A detector for space-time block coding is proposed to combat time-selective fading. To suppress both noise and interference, a minimum mean square error (MMSE) based detector is introduced for space-time block coding. It is shown by simulations that the proposed detector outperforms the conventional detectors when the channel is time-selective fading.
Keiichi SUEMITSU Toshiaki ITO Toshiki KANAMOTO Masayuki TERAI Satoshi KOTANI Shigeo SAWADA
This paper proposes a new parallel method of producing the adjacent net pair list from the LSI layouts, which is run on workstations connected with the network. The pair list contains pairs of adjacent nets and the probability of a bridging fault between them, and is used in fault diagnosis of LSIs. The proposed method partitions into regions each mask layer of the LSI layout, produces a pair list corresponding to each region in parallel and merges them into the entire pair list. It yields the accurate results, because it considers the faults between two wires containing different adjacent regions. The experimental results show that the proposed method has greatly reduced the processing time from more than 60 hrs. to 3 hrs. in case of 42M-gate LSIs.