The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] IR(5768hit)

801-820hit(5768hit)

  • Optimal Design Method of MIMO Antenna Directivities and Corresponding Current Distributions by Using Spherical Mode Expansion

    Maki ARAI  Masashi IWABUCHI  Kei SAKAGUCHI  Kiyomichi ARAKI  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/03/15
      Vol:
    E100-B No:10
      Page(s):
    1891-1903

    This paper proposes a new methodology to design optimal antennas for MIMO (Multi-Input Multi-Output) communication systems by using spherical mode expansion. Given spatial channel properties of a MIMO channel, such as the angular profile at both sides, the optimal MIMO antennas should provide the largest channel capacity with a constraint of the limited implementation space (volume). In designing a conventional MIMO antenna, first the antenna structure (current distribution) is determined, second antenna directivity is calculated based on the current distribution, and thirdly MIMO channel capacity is calculated by using given angular profiles and obtained antenna directivity. This process is repeated by adjusting the antenna structure until the performance satisfies a predefined threshold. To the contrary, this paper solves the optimization problem analytically and finally gives near optimal antenna structure (current distribution) without any greedy search. In the proposed process, first the optimal directivity of MIMO antennas is derived by applying spherical mode expansion to the angular profiles, and second a far-near field conversion is applied on the derived optimal directivity to achieve near optimal current distributions on a limited surface. The effectiveness of the proposed design methodology is validated via numerical calculation of MIMO channel capacity as in the conventional design method while giving near optimal current distribution with constraint of an antenna structure derived from proposed methodology.

  • Fast Optical Circuit Switch for Intra-Datacenter Networking Open Access

    Koh UEDA  Yojiro MORI  Hiroshi HASEGAWA  Hiroyuki MATSUURA  Kiyo ISHII  Haruhiko KUWATSUKA  Shu NAMIKI  Toshio WATANABE  Ken-ichi SATO  

     
    INVITED PAPER

      Pubricized:
    2017/04/20
      Vol:
    E100-B No:10
      Page(s):
    1740-1746

    This paper presents a fast and large-scale optical circuit-switch architecture for intra-datacenter applications that uses a combination of space switches and wavelength-routing switches are utilized. A 1,440 × 1,440 optical switch is designed with a fast-tunable laser, 8×8 delivery-and-coupling switch, and a 180×180 wavelength-routing switch. We test the bit-error-ratio characteristics of all ports of the wavelength-routing switch using 180-wavelength 10-Gbps signals in the full C-band. The worst switching time, 498 microseconds, is confirmed and all bit-error ratios are acceptable.

  • Multi-Environment Analysis System for Evaluating the Impact of Malicious Web Sites Changing Their Behavior

    Yoshiaki SHIRAISHI  Masaki KAMIZONO  Masanori HIROTOMO  Masami MOHRI  

     
    PAPER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2449-2457

    In the case of drive-by download attacks, most malicious web sites identify the software environment of the clients and change their behavior. Then we cannot always obtain sufficient information appropriate to the client organization by automatic dynamic analysis in open services. It is required to prepare for expected incidents caused by re-accessing same malicious web sites from the other client in the organization. To authors' knowledge, there is no study of utilizing analysis results of malicious web sites for digital forensic on the incident and hedging the risk of expected incident in the organization. In this paper, we propose a system for evaluating the impact of accessing malicious web sites by using the results of multi-environment analysis. Furthermore, we report the results of evaluating malicious web sites by the multi-environment analysis system, and show how to utilize analysis results for forensic analysis and risk hedge based on actual cases of analyzing malicious web sites.

  • A Support System for Solving Problems of Two-Triangle Congruence Using ‘Backward Chaining’

    Ryosuke ONDA  Yuki HIRAI  Kay PENNY  Bipin INDURKHYA  Keiichi KANEKO  

     
    PAPER-Educational Technology

      Pubricized:
    2017/07/07
      Vol:
    E100-D No:10
      Page(s):
    2567-2577

    We developed a system called DELTA that supports the students' use of backward chaining (BC) to prove the congruence of two triangles. DELTA is designed as an interactive learning environment and supports the use of BC by providing hints and a function to automatically check the proofs inputted by the students. DELTA also has coloring, marking, and highlighting functions to support students' attempts to prove the congruence of two triangles. We evaluated the efficacy of DELTA with 36 students in the second grade of a junior high school in Japan. We found that (1) the mean number of problems, which the experimental group (EG) completely solved, was statistically higher than that of the control group on the post-test; (2) the EG effectively used the BC strategy to solve problems; and (3) the students' attempt to use both the forward chaining strategy and the BC strategy led to solving the problems completely.

  • Proposal of Waveguide-Type Polarization Switch Based on Microring Resonator

    Keita SUZUKI  Tomoki HIRAYAMA  Yasuo KOKUBUN  Taro ARAKAWA  

     
    PAPER

      Vol:
    E100-C No:10
      Page(s):
    767-774

    We proposed and theoretically discussed a polarization switch based on a multiple quantum well (MQW) microring resonator (MRR) with an L-shaped waveguide as a dynamic polarization control device. The L-shaped waveguide was useful to obtain the rotation angle of the principal axis of 45° even when the core layer has form birefringence such as an MQW. The MRR functions as both a polarization converter and a wavelength filter. As an MQW core layer, a multiple five-layer asymmetric coupled quantum well (FACQW) was assumed. Polarization switching of an inputted light with a selected wavelength was successfully demonstrated at an operation voltage as low as 0.2 V using the electrorefractive index change in the MRR waveguide. The maximum polarization extinction ratio was more than 35 dB. The high-speed and low-voltage polarization switching can be realized with the proposed MRR polarization switch.

  • Cavity Resonator Wireless Power Transfer in an Enclosed Space with Scatterers Utilizing Metal Mesh

    Ippei TAKANO  Daigo FURUSU  Yosuke WATANABE  Masaya TAMURA  

     
    PAPER

      Vol:
    E100-C No:10
      Page(s):
    841-849

    In this paper, we applied cavity resonator wireless power transfer (CR WPT) to an enclosed space with scatterers and revealed that high transfer efficiency at line-of-sight (LOS) and non-line-of-sight (NLOS) position in the power transmitter can be achieved by this method. In addition, we propose a method for limiting the wireless power transfer space utilizing metal mesh and show its effectiveness by experiment. First, we confirm that the constructed experimental model is working as a cavity resonator by theoretical formula and electromagnetic field analysis. Next, we calculate the maximum power transfer efficiency using a model including a plurality of scatterers by installing a power receiver at LOS and NLOS positions in the power transmitter, and it was confirmed that transfer efficiency of 30% or more could be expected even at the NLOS position. Then, we measured the frequency characteristics of a model in which one surface of the outer wall was replaced with a metal mesh, and it was clarified that the characteristics hardly changed in the power transfer frequency band. Finally, we confirmed that simultaneous communication can be performed with driving of the battery-less sensor by CR WPT, and clarify effectiveness of the proposed method.

  • The Invulnerability of Traffic Networks under New Attack Strategies

    Xin-Ling GUO  Zhe-Ming LU  Hui LI  

     
    PAPER-Graphs and Networks

      Vol:
    E100-A No:10
      Page(s):
    2106-2112

    In this paper, invulnerability and attack strategies are discussed for the undirected unweighted urban road networks and the directed weighted taxi networks of Beijing. Firstly, five new attack strategies, i.e., Initial All Degree (IAD), Initial All Strength (IAS), Recalculated Closeness (RC), Recalculated All Degree (RAD) and Recalculated All Strength (RAS) and five traditional attack strategies, i.e., Initial Degree (ID), Initial Betweenness (IB), Initial Closeness (IC), Recalculated Degree (RD) and Recalculated Betweenness (RB) are adopted to provoke the nodes failure. Secondly, we assess the impacts of these attack strategies using two invulnerability metrics, i.e., S (the relative size of the giant component) and E (the average network efficiency) through simulation experiments by MATLAB. Furthermore, we obtain some conclusions on the basis of the simulation results. Firstly, we discover that IB is more efficient than others for the undirected unweighted 5th ring Beijing road network based on S, and IB is more efficient than others at the beginning while ID is more efficient than IB at last based on E, while IAD causes a greater damage than IAS for the directed weighted 5th ring Beijing taxi network no matter with metrics S or E. Secondly, we find that dynamic attacks are more efficient than their corresponding static attacks, and RB is more destructive than others in all attack graphs while RAD is more destructive than RAS in all attack graphs. Moreover, we propose some suggestions to advance the reliability of the networks according to the simulation results. Additionally, we notice that the damage between ID (RD) and IAD (RAD) is similar due to the large proportion of two-way roads, and we realize that global measures should be employed to estimate the best attack strategy on the basis of that we find the best attack strategy changes with the nodes failure.

  • Performance Analysis of RSS-AoA-Based Key Generation Scheme for Mobile Wireless Nodes

    Yida WANG  Xinrong GUAN  Weiwei YANG  Yueming CAI  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Vol:
    E100-A No:10
      Page(s):
    2167-2171

    By exploiting the reciprocity and randomness properties of wireless channels, physical-layer-based key generation provides a stable secrecy channel even when the main channel suffers from a bad condition. Even though the channel variation due to the mobility of nodes in wireless channels provides an improvement of key generation rate (KGR), it decreases the key consistency probability (KCP) between the node pairs. Inspired by the received signal strength(RSS)-angle of arrival(AoA)-based geolocation research, in this work, we analyze the performance of the key extraction using the RSS and AoA. We aim to identify a way to utilize the high KGR of the AoA-based method to overcome the major drawback of having a low KGR in the most common RSS-based scheme. Specifically, we derive the KCP and KGR of the RSS-AoA-based key generation scheme. Further, we propose a new performance metric called effective key generation rate (EKGR), to evaluate the designed key generation scheme in practical scenarios. Finally, we provide numerical results to verify the accuracy of the presented theoretical analysis.

  • Polarization-Reconfigurable Flat Transmitarray Based on Square Frame and Crossed Dipole Elements

    Yujie LIU  Yuehe GE  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/04/07
      Vol:
    E100-B No:10
      Page(s):
    1904-1910

    A novel element is proposed for manipulating two orthogonally-polarized electromagnetic waves, resulting in a polarization-reconfigurable flat transmitarray. This element consists of four identical metallic patterns, including a square frame loaded with short stubs and an internal crossed dipole, which are printed on the two sides of three identical flat dielectric slabs, with no air gap among them. With a linearly-polarized (LP) feeder, the flat transmitarray can transform the LP incident wave into a circular, horizontal or vertical polarization wave in a convenient way. By rotating the LP feeder so that the polarization angle is 0°, 45°, 90° or 135°, the waves of linear horizontal, right-handed circular, linear vertical or left-handed circular polarization can be obtained alternately. Simulations and experiments are conducted to validate the performance. The measured axial ratio bandwidths for RHCP and LHCP transmitarrays are about 7.1% and 5.1%, respectively, the 3dB gain bandwidths are 16.19% and 22.4%, and the peak gains are 25.56dBi and 24.2dBi, respectively.

  • 5G Distributed Massive MIMO with Ultra-High Density Antenna Deployment in Low SHF Bands

    Tatsuki OKUYAMA  Satoshi SUYAMA  Jun MASHINO  Yukihiko OKUMURA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/03/10
      Vol:
    E100-B No:10
      Page(s):
    1921-1927

    In order to tackle rapidly increasing traffic, dramatic performance enhancements in radio access technologies (RATs) are required for fifth-generation (5G) mobile communication system. In 5G, small/semi-macro cells using Massive MIMO (M-MIMO) with much wider bandwidth in higher frequency bands are overlaid on macro cell with existing frequency band. Moreover, high density deployment of small/semi-macro cell is expected to improve areal capacity. However, in low SHF band (below 6GHz), antenna array size of M-MIMO is large so that it cannot be installed on some environments. Therefore, to improve system throughput on various use cases in 5G, we have proposed distributed Massive MIMO (DM-MIMO). DM-MIMO coordinates lots of distributed transmission points (TPs) that are located in ultra-high density (UHD). Furthermore, DM-MIMO uses various numbers of antenna elements for each TP. In addition, DM-MIMO with UHD-TPs can create user-centric virtual cells corresponding to user mobility, and design of flexible antenna deployment for DM-MIMO is applicable to various use cases. Then, some key parameters such as the number of the distributed TPs, the number of antenna elements for each TP, and proper distance between TPs, should be determined. This paper presents such parameters for 5G DM-MIMO with flexible antenna deployment under fixed total transmission power and constant total number of antenna elements. Computer simulations show that DM-MIMO can achieve more than 1.9 times higher system throughput than an M-MIMO system using 128 antenna elements.

  • Design of Multi-Way LC-Ladder Dividers with Multi-Band Operation

    Yosuke OKADA  Tadashi KAWAI  Akira ENOKIHARA  

     
    PAPER

      Vol:
    E100-C No:10
      Page(s):
    893-900

    In this paper, we propose a design method of compact multi-way Wilkinson power divider with a multiband operation for size reduction and band broadening. The proposed divider consists of multisection LC-ladder circuits in the division arms and isolation circuits between the output ports. To validate design procedures, we fabricated a trial divider at VHF band. The circuit layout of the trial divider was decided by using an electromagnetic simulator (Sonnet EM). Because the proposed divider consists of lumped element circuits, we can realize great miniaturization of a circuit area compared to that of the conventional Wilkinson power divider. The circuit size of the trial divider is 35 mm square. The measurement results for the trial divider by using a vector network analyzer indicates a relative bandwidth of about 60% under -17 dB reflection, flat power division within ±0.1 dB, and very low phase imbalances under 1.0 degree over the wide frequency range.

  • Establishment of EMC Research in Japan and its Future Prospects Open Access

    Osamu FUJIWARA  

     
    INVITED SURVEY PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2017/03/27
      Vol:
    E100-B No:9
      Page(s):
    1623-1632

    Systematic research on electromagnetic compatibility (EMC) in Japan started in 1977 by the establishment of a technical committee on “environmental electromagnetic engineering” named EMCJ, which was founded both in the Institute of Electronics and Communication Engineers or the present IEICE (Institute of Electronics, Information and Communication Engineers) and in the Institute of Electrical Engineers of Japan or the IEEJ. The research activities have been continued as the basic field of interdisciplinary study to harmonize even in the electromagnetic (EM) environment where radio waves provide intolerable EM disturbances to electronic equipment and to that environment itself. The subjects and their outcomes which the EMCJ has dealt with during about 40 years from the EMCJ establishment include the evaluation of EM environment, EMC of electric and electronic equipment, and EMC of biological effects involving bioelectromagnetics and so on. In this paper, the establishment history and structure of the EMCJ are reviewed along with the change in activities, and topics of the technical reports presented at EMCJ meetings from 2006 to 2016 are surveyed. In addition, internationalization and its related campaign are presented in conjunction with the EMCJ research activities, and the status quo of the EMCJ under the IEICE is also discussed along with the prospects.

  • An Algorithm to Evaluate Appropriateness of Still Images for Learning Concrete Nouns of a New Foreign Language

    Mohammad Nehal HASNINE  Masatoshi ISHIKAWA  Yuki HIRAI  Haruko MIYAKODA  Keiichi KANEKO  

     
    PAPER-Educational Technology

      Pubricized:
    2017/06/21
      Vol:
    E100-D No:9
      Page(s):
    2156-2164

    Vocabulary acquisition based on the traditional pen-and-paper approach is outdated, and has been superseded by the multimedia-supported approach. In a multimedia-supported foreign language learning environment, a learning material comprised of a still-image, a text, and the corresponding sound data is considered to be the most effective way to memorize a noun. However, extraction of an appropriate still image for a noun has always been a challenging and time-consuming process for learners. Learners' burden would be reduced if a system could extract an appropriate image for representing a noun. Therefore, the present study purposed to extract an appropriate image for each noun in order to assist foreign language learners in acquisition of foreign vocabulary. This study presumed that, a learning material created with the help of an appropriate image would be more effective in recalling memory compared to the one created with an inappropriate image. As the first step to finding appropriate images for nouns, concrete nouns have been considered as the subject of investigation. Therefore, this study, at first proposed a definition of an appropriate image for a concrete noun. After that, an image re-ranking algorithm has been designed and implemented that is able to extract an appropriate image from a finite set of corresponding images for each concrete noun. Finally, immediate-after, short- and long-term learning effects of those images with regard to learners' memory retention rates have been examined by conducting immediate-after, delayed and extended delayed posttests. The experimental result revealed that participants in the experimental group significantly outperformed the control group in their long-term memory retention, while no significant differences have been observed in immediate-after and in short-term memory retention. This result indicates that our algorithm could extract images that have a higher learning effect. Furthermore, this paper briefly discusses an on-demand learning system that has been developed to assist foreign language learners in creation of vocabulary learning materials.

  • A ROM Driving Circuit for RFID Tags Based on a-IGZO TFTs

    Shaolong LIN  Ruohe YAO  Fei LUO  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E100-C No:9
      Page(s):
    746-748

    This paper proposes a read-only memory driving circuit for RFID tags based on a-IGZO thin-film transistors. The circuit consists of a Johnson counter and monotype complementary gates. By utilizing complementary signals to drive a decoder based on monotype complementary gates, the propagation delay can be decreased and the redundant current can be reduced. The Johnson counter reduces the number of registers. The new circuit can effectively avoid glitch generation, and reduce circuit power consumption and delay.

  • Efficient Fault-Aware Routing for Wireless Sensor Networks

    Jaekeun YUN  Daehee KIM  Sunshin AN  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E100-A No:9
      Page(s):
    1985-1992

    Since the sensor nodes are subject to faults due to the highly-constrained resources and hostile deployment environments, fault management in wireless sensor networks (WSNs) is essential to guarantee the proper operation of networks, especially routing. In contrast to existing fault management methods which mainly aim to be tolerant to faults without considering the fault type, we propose a novel efficient fault-aware routing method where faults are classified and dealt with accordingly. More specifically, we first identify each fault and then try to set up the new routing path according to the fault type. Our proposed method can be easily integrated with any kind of existing routing method. We show that our proposed method outperforms AODV, REAR, and GPSR, which are the representative works of single-path routing, multipath routing and location based routing, in terms of energy efficiency and data delivery ratio.

  • Visual Indexing of Large Scale Train-Borne Video for Rail Condition Perceiving

    Peng DAI  Shengchun WANG  Yaping HUANG  Hao WANG  Xinyu DU  Qiang HAN  

     
    PAPER

      Pubricized:
    2017/06/14
      Vol:
    E100-D No:9
      Page(s):
    2017-2026

    Train-borne video captured from the camera installed in the front or back of the train has been used for railway environment surveillance, including missing communication units and bolts on the track, broken fences, unpredictable objects falling into the rail area or hanging on wires on the top of rails. Moreover, the track condition can be perceived visually from the video by observing and analyzing the train-swaying arising from the track irregularity. However, it's a time-consuming and labor-intensive work to examine the whole large scale video up to dozens of hours frequently. In this paper, we propose a simple and effective method to detect the train-swaying quickly and automatically. We first generate the long rail track panorama (RTP) by stitching the stripes cut from the video frames, and then extract track profile to perform the unevenness detection algorithm on the RTP. The experimental results show that RTP, the compact video representation, can fast examine the visual train-swaying information for track condition perceiving, on which we detect the irregular spots with 92.86% recall and 82.98% precision in only 2 minutes computation from the video close to 1 hour.

  • Centralized Contention Based MAC for OFDMA WLAN

    Gunhee LEE  Cheeha KIM  

     
    LETTER-Information Network

      Pubricized:
    2017/06/06
      Vol:
    E100-D No:9
      Page(s):
    2219-2223

    The IEEE 802.11 wireless local area network (WLAN) is the most widely deployed communication standard in the world. Currently, the IEEE 802.11ax draft standard is one of the most advanced and promising among future wireless network standards. However, the suggested uplink-OFDMA (UL-OFDMA) random access method, based on trigger frame-random access (TF-R) from task group ax (TGax), does not yet show satisfying system performance. To enhance the UL-OFDMA capability of the IEEE 802.11ax draft standard, we propose a centralized contention-based MAC (CC-MAC) and describe its detailed operation. In this paper, we analyze the performance of CC-MAC by solving the Markov chain model and evaluating BSS throughput compared to other methods, such as DCF and TF-R, by computer simulation. Our results show that CC-MAC is a scalable and efficient scheme for improving the system performance in a UL-OFDMA random access situation in IEEE 802.11ax.

  • A Compact Tree Representation of an Antidictionary

    Takahiro OTA  Hiroyoshi MORITA  

     
    PAPER-Information Theory

      Vol:
    E100-A No:9
      Page(s):
    1973-1984

    In both theoretical analysis and practical use for an antidictionary coding algorithm, an important problem is how to encode an antidictionary of an input source. This paper presents a proposal for a compact tree representation of an antidictionary built from a circular string for an input source. We use a technique for encoding a tree in the compression via substring enumeration to encode a tree representation of the antidictionary. Moreover, we propose a new two-pass universal antidictionary coding algorithm by means of the proposal tree representation. We prove that the proposed algorithm is asymptotic optimal for a stationary ergodic source.

  • Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols

    Kazuki YONEYAMA  

     
    PAPER

      Vol:
    E100-A No:9
      Page(s):
    1794-1803

    Asymmetric bilinear maps using Type-3 pairings are known to be advantageous in several points (e.g., the speed and the size of a group element) to symmetric bilinear maps using Type-1 pairings. Kremer and Mazaré introduce a symbolic model to analyze protocols based on bilinear maps, and show that the symbolic model is computationally sound. However, their model only covers symmetric bilinear maps. In this paper, we propose a new symbolic model to capture asymmetric bilinear maps. Our model allows us to analyze security of various protocols based on asymmetric bilinear maps (e.g., Joux's tripartite key exchange, and Scott's client-server ID-based key exchange). Also, we show computational soundness of our symbolic model under the decisional bilinear Diffie-Hellman assumption.

  • Designs of Zero Correlation Zone Sequence Pair Set with Inter-Subset Uncorrelated Property

    Xiaoli ZENG  Longye WANG  Hong WEN  

     
    LETTER

      Vol:
    E100-A No:9
      Page(s):
    1936-1941

    An inter-subset uncorrelated zero-correlation zone (ZCZ) sequence pair set is one consisting of multiple ZCZ sequence pair subsets. What's more, two arbitrary sequence pairs which belong to different subsets should be uncorrelated sequence pairs in this set, i.e., the cross-correlation function (CCF) between arbitrary sequence pairs in different subsets are zeros at everywhere. Meanwhile, each subset is a typical ZCZ sequence pair set. First, a class of uncorrelated ZCZ (U-ZCZ) sequence pair sets is proposed from interleaving perfect sequence pairs. An U-ZCZ sequence pair set is a type of ZCZ sequence pair set, which of most important property is that the CCF between two arbitrary sequence pairs is zero at any shift. Then, a type of inter-subset uncorrelated ZCZ sequence pair set is obtained by interleaving proposed U-ZCZ sequence pair set. In particular, the novel inter-subset uncorrelated ZCZ sequence pair sets are expected to be useful for designing spreading codes for QS-CDMA systems.

801-820hit(5768hit)