The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] IR(5768hit)

741-760hit(5768hit)

  • Real-Time Road-Direction Point Detection in Complex Environment

    Huimin CAI  Eryun LIU  Hongxia LIU  Shulong WANG  

     
    PAPER-Software System

      Pubricized:
    2017/11/13
      Vol:
    E101-D No:2
      Page(s):
    396-404

    A real-time road-direction point detection model is developed based on convolutional neural network architecture which can adapt to complex environment. Firstly, the concept of road-direction point is defined for either single road or crossroad. For single road, the predicted road-direction point can serve as a guiding point for a self-driving vehicle to go ahead. In the situation of crossroad, multiple road-direction points can also be detected which will help this vehicle to make a choice from possible directions. Meanwhile, different types of road surface can be classified by this model for both paved roads and unpaved roads. This information will be beneficial for a self-driving vehicle to speed up or slow down according to various road conditions. Finally, the performance of this model is evaluated on different platforms including Jetson TX1. The processing speed can reach 12 FPS on this portable embedded system so that it provides an effective and economic solution of road-direction estimation in the applications of autonomous navigation.

  • A Low-Power Pulse-Shaped Duobinary ASK Modulator for IEEE 802.11ad Compliant 60GHz Transmitter in 65nm CMOS

    Bangan LIU  Yun WANG  Jian PANG  Haosheng ZHANG  Dongsheng YANG  Aravind Tharayil NARAYANAN  Dae Young LEE  Sung Tae CHOI  Rui WU  Kenichi OKADA  Akira MATSUZAWA  

     
    PAPER-Electronic Circuits

      Vol:
    E101-C No:2
      Page(s):
    126-134

    An energy efficient modulator for an ultra-low-power (ULP) 60-GHz IEEE transmitter is presented in this paper. The modulator consists of a differential duobinary coder and a semi-digital finite-impulse-response (FIR) pulse-shaping filter. By virtue of differential duobinary coding and pulse shaping, the transceiver successfully solves the adjacent-channel-power-ratio (ACPR) issue of conventional on-off-keying (OOK) transceivers. The proposed differential duobinary code adopts an over-sampling precoder, which relaxes timing requirement and reduces power consumption. The semi-digital FIR eliminates the power hungry digital multipliers and accumulators, and improves the power efficiency through optimization of filter parameters. Fabricated in a 65nm CMOS process, this modulator occupies a core area of 0.12mm2. With a throughput of 1.7Gbps/2.6Gbps, power consumption of modulator is 24.3mW/42.8mW respectively, while satisfying the IEEE 802.11ad spectrum mask.

  • 2-D DOA Estimation of Multiple Signals Based on Sparse L-Shaped Array

    Zhi ZHENG  Yuxuan YANG  Wen-Qin WANG  Guangjun LI  Jiao YANG  Yan GE  

     
    PAPER-DOA Estimation

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    383-391

    This paper proposes a novel method for two-dimensional (2-D) direction-of-arrival (DOA) estimation of multiple signals employing a sparse L-shaped array structured by a sparse linear array (SLA), a sparse uniform linear array (SULA) and an auxiliary sensor. In this method, the elevation angles are estimated by using the SLA and an efficient search approach, while the azimuth angle estimation is performed in two stages. In the first stage, the rough azimuth angle estimates are obtained by utilizing a noise-free cross-covariance matrix (CCM), the estimated elevation angles and data from three sensors including the auxiliary sensor. In the second stage, the fine azimuth angle estimates can be achieved by using the shift-invariance property of the SULA and the rough azimuth angle estimates. Without extra pair-matching process, the proposed method can achieve automatic pairing of the 2-D DOA estimates. Simulation results show that our approach outperforms the compared methods, especially in the cases of low SNR, snapshot deficiency and multiple sources.

  • Workload Estimation for Firewall Rule Processing on Network Functions Virtualization

    Dai SUZUKI  Satoshi IMAI  Toru KATAGIRI  

     
    PAPER-Network

      Pubricized:
    2017/08/08
      Vol:
    E101-B No:2
      Page(s):
    528-537

    Network Functions Virtualization (NFV) is expected to provide network systems that offer significantly lower cost and greatly flexibility to network service providers and their users. Unfortunately, it is extremely difficult to implement Virtualized Network Functions (VNFs) that can equal the performance of Physical Network Functions. To realize NFV systems that have adequate performance, it is critical to accurately grasp VNF workload. In this paper, we focus on the virtual firewall as a representative VNF. The workload of the virtual firewall is mostly determined by firewall rule processing and the Access Control List (ACL) configurations. Therefore, we first reveal the major factors influencing the workload of the virtual firewall and some issues of monitoring CPU load as a traditional way of understanding the workload of virtual firewalls through preliminary experiments. Additionally, we propose a new workload metric for the virtual firewall that is derived by mathematical models of the firewall workload in consideration of the packet processing in each rule and the ACL configurations. Furthermore, we show the effectiveness of the proposed workload metric through various experiments.

  • Performance Evaluation of Variable Bandwidth Channel Allocation Scheme in Multiple Subcarrier Multiple Access

    Nitish RAJORIA  Hiromu KAMEI  Jin MITSUGI  Yuusuke KAWAKITA  Haruhisa ICHIKAWA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/08/03
      Vol:
    E101-B No:2
      Page(s):
    564-572

    Multiple Subcarrier Multiple Access (MSMA) enables concurrent sensor data streamings from multiple wireless and batteryless sensors using the principle of subcarrier backscatter used extensively in passive RFID. Since the interference cancellation performance of MSMA depends on the Signal to Interference plus Noise Ratio of each subcarrier, the choice of channel allocation scheme is essential. Since the channel allocation is a combinatorial problem, obtaining the true optimal allocation requires a vast amount of examinations which is impracticable in a system where we have tens of sensor RF tags. It is particularly true when we have variable distance and variable bandwidth sensor RF tags. This paper proposes a channel allocation scheme in the variable distance and variable bandwidth MSMA system based on a newly introduced performance index, total contamination power, to prioritize indecision cases. The performance of the proposal is evaluated with existing methods in terms of average communication capacity and system fairness using MATLAB Monte Carlo simulation to reveal its advantage. The accuracy of the simulation is also verified with the result obtained from the brute force method.

  • Receiver Performance Evaluation and Fading Duration Analysis for Concurrent Transmission

    Chun-Hao LIAO  Makoto SUZUKI  Hiroyuki MORIKAWA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/08/07
      Vol:
    E101-B No:2
      Page(s):
    582-591

    Concurrent transmission (CT) is a revolutionary multi-hop protocol that significantly improves the MAC- and network-layer efficiency by allowing synchronized packet collisions. Although its superiority has been empirically verified, there is still a lack of studies on how the receiver survives such packet collisions, particularly in the presence of the carrier frequency offsets (CFO) between the transmitters. This work rectifies this omission by providing a comprehensive evaluation of the physical-layer receiver performance under CT, and a theoretical analysis on the fading duration of the beating effect resulting from the CFO. The main findings from our evaluations are the following points. (1) Beating significantly affects the receiver performance, and an error correcting mechanism is needed to combat the beating. (2) In IEEE 802.15.4 systems, the direct sequence spread spectrum (DSSS) plays such a role in combatting the beating. (3) However, due to the limited length of DSSS, the receiver still suffers from the beating if the fading duration is too long. (4) On the other hand, the basic M-ary FSK mode of IEEE 802.15.4g is vulnerable to CT due to the lack of error correcting mechanism. In view of the importance of the fading duration, we further theoretically derive the closed form of the average fading duration (AFD) of the beating under CT in terms of the transmitter number and the standard deviation of the CFO. Moreover, we prove that the receiver performance can be improved by having higher CFO deviations between the transmitters due to the shorter AFD. Finally, we estimate the AFD in the real system by actually measuring the CFO of a large number of sensor nodes.

  • Robust Secure Transmit Design for SWIPT System with Many Types of Wireless Users and Passive Eavesdropper

    Pham-Viet TUAN  Insoo KOO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    441-450

    This paper studies a simultaneous wireless information and power transfer (SWIPT) system in which the transmitter not only sends data and energy to many types of wireless users, such as multiple information decoding users, multiple hybrid power-splitting users (i.e., users with a power-splitting structure to receive both information and energy), and multiple energy harvesting users, but also prevents information from being intercepted by a passive eavesdropper. The transmitter is equipped with multiple antennas, whereas all users and the eavesdropper are assumed to be equipped with a single antenna. Since the transmitter does not have any channel state information (CSI) about the eavesdropper, artificial noise (AN) power is maximized to mask information as well as to interfere with the eavesdropper as much as possible. The non-convex optimization problem is formulated to minimize the transmit power satisfying all signal-to-interference-plus-noise (SINR) and harvested energy requirements for all users so that the remaining power for generating AN is maximized. With perfect CSI, a semidefinite relaxation (SDR) technique is applied, and the optimal solution is proven to be tight. With imperfect CSI, SDR and a Gaussian randomization algorithm are proposed to find the suboptimal solution. Finally, numerical performance with respect to the maximum SINR at the eavesdropper is determined by a Monte-Carlo simulation to compare the proposed AN scenario with a no-AN scenario, as well as to compare perfect CSI with imperfect CSI.

  • An Overview of China Millimeter-Wave Multiple Gigabit Wireless Local Area Network System Open Access

    Wei HONG  Shiwen HE  Haiming WANG  Guangqi YANG  Yongming HUANG  Jixing CHEN  Jianyi ZHOU  Xiaowei ZHU  Nianzhu ZHANG  Jianfeng ZHAI  Luxi YANG  Zhihao JIANG  Chao YU  

     
    INVITED PAPER

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    262-276

    This paper presents an overview of the advance of the China millimeter-wave multiple gigabit (CMMG) wireless local area network (WLAN) system which operates in the 45 GHz frequency band. The CMMG WLAN system adopts the multiple antennas technologies to support data rate up to 15Gbps. During the progress of CMMG WLAN standardization, some new key technologies were introduced to adapt the millimeter-wave characteristic, including the usage of the zero correlation zone (ZCZ) sequence, a novel lower density parity check code (LDPC)-based packet encoding, and multiple input multiple output (MIMO) single carrier transmission. Extensive numerical results and system prototype test are also given to validate the performance of the technologies adopted by CMMG WLAN system.

  • A Waffle-Iron Ridge Guide with Combined Fast- and Slow-Wave Modes for Array Antenna Applications

    Hideki KIRINO  Kazuhiro HONDA  Kun LI  Koichi OGAWA  

     
    PAPER-Antennas

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    349-356

    A new Waffle-iron Ridge Guide (WRG) structure that has the ability to control both wavelength and impedance is proposed. With the proposed structure, not only can the wavelength be controlled over a wide range for both fast- and slow-waves in free space but the impedance can also be controlled. These features can improve the performance of array antennas in terms of reducing grating lobes and side lobes. In this paper, we discuss and evaluate a design scheme using equivalent circuits and EM-simulation. This paper also discusses how the conductivity and dielectric loss in the WRG affect the total gain of the array antenna.

  • Measurement of Accommodation and Convergence Eye Movement when a Display and 3D Movie Move in the Depth Direction Simultaneously

    Shinya MOCHIDUKI  Yuki YOKOYAMA  Keigo SUKEGAWA  Hiroki SATO  Miyuki SUGANUMA  Mitsuho YAMADA  

     
    PAPER-Image

      Vol:
    E101-A No:2
      Page(s):
    488-498

    In this study, we first developed a simultaneous measurement system for accommodation and convergence eye movement and evaluated its precision. Then, using a stuffed animal as the target, whose depth should be relatively easy to perceive, we measured convergence eye movement and accommodation at the same time while a tablet displaying a 3D movie was moved in the depth direction. By adding the real 3D display depth movement to the movement of the 3D image, subjects showed convergence eye movement that corresponds appropriately to the dual change of parallax in the 3D movie and real display, even when a subject's convergence changed very little. Accommodation also changed appropriately according to the change in depth.

  • RSSI-Based Localization Using Wireless Beacon with Three-Element Array

    Ryota TAZAWA  Naoki HONMA  Atsushi MIURA  Hiroto MINAMIZAWA  

     
    PAPER-DOA Estimation

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    400-408

    In this paper, we propose an indoor localization method that uses only the Received Signal Strength Indicator (RSSI) of signals transmitted from wireless beacons. The beacons use three-element array antennas, and the position of the receiving terminal is estimated by using multiple DOD information. Each beacon transmits four beacon signals with different directivities by feeding signals to the three-element array antennas via 180-degree and 90-degree hybrids. The correlation matrix of the propagation channels is estimated from just the strength of the signals, and the DOD is estimated from the calculated correlation matrix. For determining the location of the receiving terminal, the existence probability function is introduced. Experiments show that the proposed method attains lower position estimation error than the conventional method.

  • CSI Feedback Reduction Method for Downlink Multiuser MIMO Transmission Using Dense Distributed Antenna Selection

    Tomoki MURAKAMI  Koichi ISHIHARA  Yasushi TAKATORI  Masato MIZOGUCHI  Kentaro NISHIMORI  

     
    PAPER-MIMO

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    426-433

    This paper proposes a novel method of reducing channel state information (CSI) feedback by using transmit antenna selection for downlink multiuser multiple input multiple output (DL-MU-MIMO) transmission in dense distributed antenna systems. It is widely known that DL-MU-MIMO transmission achieves higher total bit-rate by mitigating inter-user interference based on pre-coding techniques. The pre-coding techniques require CSI between access point (AP) and multiple users. However, overhead for CSI acquisition degrades the transmission efficiency of DL-MU-MIMO transmission. In the proposed CSI feedback reduction method, AP first selects the antenna set that maximizes the received power at each user, second it skips the sequence of CSI feedback for users whose signal to interference power ratio is larger than a threshold, and finally it performs DL-MU-MIMO transmission to multiple users by using the selected antenna set. To clarify the proposed method, we evaluate it by computer simulations in an indoor scenario. The results show that the proposed method can offer higher transmission efficiency than the conventional DL-MU-MIMO transmission with the usual CSI feedback method.

  • A Fuzzy Rule-Based Key Redistribution Method for Improving Security in Wireless Sensor Networks

    Jae Kwan LEE  Tae Ho CHO  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2017/07/27
      Vol:
    E101-B No:2
      Page(s):
    489-499

    Wireless Sensor Networks (WSNs) are randomly deployed in a hostile environment and left unattended. These networks are composed of small auto mouse sensor devices which can monitor target information and send it to the Base Station (BS) for action. The sensor nodes can easily be compromised by an adversary and the compromised nodes can be used to inject false vote or false report attacks. To counter these two kinds of attacks, the Probabilistic Voting-based Filtering Scheme (PVFS) was proposed by Li and Wu, which consists of three phases; 1) Key Initialization and assignment, 2) Report generation, and 3) En-route filtering. This scheme can be a successful countermeasure against these attacks, however, when one or more nodes are compromised, the re-distribution of keys is not handled. Therefore, after a sensor node or Cluster Head (CH) is compromised, the detection power and effectiveness of PVFS is reduced. This also results in adverse effects on the sensor network's lifetime. In this paper, we propose a Fuzzy Rule-based Key Redistribution Method (FRKM) to address the limitations of the PVFS. The experimental results confirm the effectiveness of the proposed method by improving the detection power by up to 13.75% when the key-redistribution period is not fixed. Moreover, the proposed method achieves an energy improvement of up to 9.2% over PVFS.

  • Far-End Reactor Matching to a Traveling Load Along an RF Power Transmission Line

    Sonshu SAKIHARA  Satoshi KITABAYASHI  Naoki SAKAI  Takashi OHIRA  

     
    PAPER

      Vol:
    E101-A No:2
      Page(s):
    396-401

    This paper presents a novel circuit for impedance matching to a load moving along a transmission line. This system is called FERMAT: Far-End Reactor MATching. The FERMAT consists of a power transmission line and a variable reactor at its far-end. The proposed system moves standing-wave antinodes to the position of the vehicle in motion. Therefore, the moving vehicle can be fed well at any position on the line. As a theoretical result, we derive adjustable matching conditions in FERMAT. We verified that the experimental result well agrees with the theory.

  • Dual-Circularly Polarized Offset Parabolic Reflector Antenna with Microstrip Antenna Array for 12-GHz Band Satellite Broadcasting Reception

    Masafumi NAGASAKA  Susumu NAKAZAWA  Shoji TANAKA  

     
    PAPER-Antennas

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    340-348

    Japan Broadcasting Corporation (NHK) started test satellite broadcasting of ultra-high-definition television (UHDTV) on August 1st, 2016. The test broadcasting is being provided in the 12-GHz (11.7 to 12.75GHz) band with right-hand circular polarization. In 2018, left-hand circular polarization in the same frequency band will be used for satellite broadcasting of UHDTV. Because UHDTV satellite broadcasting uses the 16APSK modulation scheme, which requires a higher carrier-to-noise ratio than that used for HDTV in Japan, it is important to mitigate the cross-polarization interference. Therefore, we fabricated and tested a dual-circularly polarized offset parabolic reflector antenna that has a feed antenna composed of a 2×2 microstrip antenna array, which is sequentially rotated to enhance the polarization purity. Measured results showed that the fabricated antenna complied with our requirements, a voltage standing wave ratio of less than 1.4, antenna gain of 34.5dBi (i.e., the aperture efficiency was 69%), and cross-polarization discrimination of 28.7dB.

  • Joint Information and Energy Packet Scheduling in Wireless Powered Sensor Network

    Sungbok LEE  Jaehyun PARK  Jonghyeok LEE  

     
    PAPER-Network

      Pubricized:
    2017/08/07
      Vol:
    E101-B No:2
      Page(s):
    520-527

    In this paper, we consider wireless powered sensor networks. In these networks, the energy access point (EAP) transmits the energy packets to the sensor nodes and then, the sensor nodes send their sensing data to the information access point (IAP) by exploiting the harvested energy. Because the sensor nodes have a limited information queue (data storage) and energy queue (battery), energy packet/data packet scheduling is important. Accordingly, to reduce the total energy required to support the associated sensor network and simultaneously avoid sensing data loss, the energy packet/data packet transmission periods are jointly optimized. Furthermore, analyses identify the optimal location of EAP which will yield energy-efficient wireless powered sensor networks. Through the computer simulations, the performance of the proposed packet scheduling and deployment policy is demonstrated.

  • Concurrency Control Protocol for Parallel B-Tree Structures That Improves the Efficiency of Request Transfers and SMOs within a Node

    Tomohiro YOSHIHARA  Dai KOBAYASHI  Haruo YOKOTA  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2017/10/18
      Vol:
    E101-D No:1
      Page(s):
    152-170

    Many concurrency control protocols for B-trees use latch-coupling because its execution is efficient on a single machine. Some studies have indicated that latch-coupling may involve a performance bottleneck when using multicore processors in a shared-everything environment, but no studies have considered the possible performance bottleneck caused by sending messages between processing elements (PEs) in shared-nothing environments. We propose two new concurrency control protocols, “LCFB” and “LCFB-link”, which require no latch-coupling in optimistic processes. The LCFB-link also innovates B-link approach within each PE to reduce the cost of modifications in the PE, as a solution to the difficulty of consistency management for the side pointers in a parallel B-tree. The B-link algorithm is well known as a protocol without latch-coupling, but B-link has the difficulty of guaranteeing the consistency of the side pointers in a parallel B-tree. Experimental results in various environments indicated that the system throughput of the proposed protocols was always superior to those of the conventional protocols, particularly in large-scale configurations, and using LCFB-link was effective for higher update ratios. In addition, to mitigate access skew, data should migrate between PEs. We have demonstrated that our protocols always improve the system throughput and are effective as concurrency controls for data migration.

  • On Mitigating On-Off Attacks in Wireless Sensor Networks

    Zhe WEI  Fang WANG  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E101-A No:1
      Page(s):
    298-301

    In wireless sensor networks, the on-off attacker nodes can present good behaviors and then opportunistically and selectively behave badly to compromise the network. Such misbehaving nodes are usually difficult to be spotted by the network system in a short term. To address this issue, in this study, we propose a reputation scheme to mitigate the on-off attack. In addition, a penalty module is properly designed so that the reputation scheme can effectively respond to the on-off misbehaviors and make such nodes quickly detected by the system, hence the minimization of their influence. We confirm the feasibility and effectiveness of the proposed scheme through simulation tests.

  • Analysis of DNS TXT Record Usage and Consideration of Botnet Communication Detection

    Hikaru ICHISE  Yong JIN  Katsuyoshi IIDA  

     
    PAPER

      Pubricized:
    2017/07/05
      Vol:
    E101-B No:1
      Page(s):
    70-79

    There have been several recent reports that botnet communication between bot-infected computers and Command and Control servers (C&C servers) using the Domain Name System (DNS) protocol has been used by many cyber attackers. In particular, botnet communication based on the DNS TXT record type has been observed in several kinds of botnet attack. Unfortunately, the DNS TXT record type has many forms of legitimate usage, such as hostname description. In this paper, in order to detect and block out botnet communication based on the DNS TXT record type, we first differentiate between legitimate and suspicious usages of the DNS TXT record type and then analyze real DNS TXT query data obtained from our campus network. We divide DNS queries sent out from an organization into three types — via-resolver, and indirect and direct outbound queries — and analyze the DNS TXT query data separately. We use a 99-day dataset for via-resolver DNS TXT queries and an 87-day dataset for indirect and direct outbound DNS TXT queries. The results of our analysis show that about 30%, 8% and 19% of DNS TXT queries in via-resolver, indirect and direct outbound queries, respectively, could be identified as suspicious DNS traffic. Based on our analysis, we also consider a comprehensive botnet detection system and have designed a prototype system.

  • Research Challenges for Network Function Virtualization - Re-Architecting Middlebox for High Performance and Efficient, Elastic and Resilient Platform to Create New Services - Open Access

    Kohei SHIOMOTO  

     
    INVITED SURVEY PAPER-Network

      Pubricized:
    2017/07/21
      Vol:
    E101-B No:1
      Page(s):
    96-122

    Today's enterprise, data-center, and internet-service-provider networks deploy different types of network devices, including switches, routers, and middleboxes such as network address translation and firewalls. These devices are vertically integrated monolithic systems. Software-defined networking (SDN) and network function virtualization (NFV) are promising technologies for dis-aggregating vertically integrated systems into components by using “softwarization”. Software-defined networking separates the control plane from the data plane of switch and router, while NFV decouples high-layer service functions (SFs) or Network Functions (NFs) implemented in the data plane of a middlebox and enables the innovation of policy implementation by using SF chaining. Even though there have been several survey studies in this area, this area is continuing to grow rapidly. In this paper, we present a recent survey of this area. In particular, we survey research activities in the areas of re-architecting middleboxes, state management, high-performance platforms, service chaining, resource management, and trouble shooting. Efforts in these research areas will enable the development of future virtual-network-function platforms and innovation in service management while maintaining acceptable capital and operational expenditure.

741-760hit(5768hit)