The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] IR(5768hit)

981-1000hit(5768hit)

  • Wideband DOA Estimation Based on Co-Prime Arrays with Sub-Nyquist Sampling

    Wanghan LV  Huali WANG  Feng LIU  Zheng DAI  

     
    LETTER-Digital Signal Processing

      Vol:
    E99-A No:9
      Page(s):
    1717-1720

    In this letter, a method of wideband direction of arrival (DOA) estimation based on co-prime arrays with sub-Nyquist sampling is proposed. Previous works have employed co-prime arrays for wideband DOA estimation, which can increase the degrees of freedom (DOFs) in the spatial domain. However, they are all based on Nyquist sampling. Different from existing methods, we incorporate a sub-Nyquist sampling scheme called multicoset sampling for DOA estimation to relax hardware condition. Simulation results show the correctness and effectiveness.

  • Scenario Retrieval Method Using Differential Scenario

    Eiji SHIOTA  Atsushi OHNISHI  

     
    PAPER

      Pubricized:
    2016/07/06
      Vol:
    E99-D No:9
      Page(s):
    2202-2209

    In a scenario-based software development, a lot of scenarios should be described in order to clarify the whole behaviors of the target software. By reusing scenarios of similar software systems, it becomes more efficient to newly describe scenarios of the target software. A differential scenario includes the difference between sequences of events of the two scenarios and the difference between nouns in the scenarios. If the nouns of the two scenarios are commonly used in the two scenarios, we regard the two scenarios specify the same or similar system. If the sequences of the events of the two scenarios are corresponding each other, we regard behavior of the two scenarios are similar. In this paper, we derive differential information including different words and events from two scenarios. Then, we propose a method of scenario retrieval using differential information between two scenarios. This method enables to detect similar scenarios for a given scenario. The proposed retrieval method and a prototype system for creating and visualizing differential scenario will be illustrated with examples.

  • Interest-Selective Retransmision Protocol for Wireless Content-Centric Networks

    Chan-Min PARK  Byung-Seo KIM  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E99-A No:9
      Page(s):
    1753-1757

    One problem in the use of wireless Content Centric Networks (CCNs) is the need for substantial overhead to achieve reliability in content delivery due to the requirement for a request packet per each data packet transmission. This paper introduces a novel protocol to reduce overhead and achieve reliability. The protocol allows an interest packet to request multiple data packets and an intermediate node, rather than the provider, to send the data packet. Simulation results show that the proposed protocol improves the performance of wireless CCN.

  • Virtual Edge Architecture with Optical Bandwidth Resource Control

    Akira MISAWA  Konomi MOCHIZUKI  Hideo TSUCHIYA  Masahiro NAKAGAWA  Kyota HATTORI  Masaru KATAYAMA  Jun-ichi KANI  

     
    PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1805-1812

    A virtual network edge using live migration of virtualized network functions (VNFs) can be expected to reduce computation time and save resources instead of conventional network edge routers that have complex functions. Wavelength-division-multiplexing/time-division-multiplexing (WDM/TDM) photonic switching technology for metro ring networks is proposed to provide fast bandwidth resource allocation for rapidly changing service-flow demand. However, there are no reports on the coexistence of high-speed path switching for live migration with fast bandwidth resource allocation, as far as we know. We propose an architecture that achieves both high-speed path switching and fast dynamic bandwidth allocation control for service flows with in-service live migration. The feature of this architecture is that the VNF for the virtual edge corresponds to each 10-gigabit Ethernet-passive optical network (10G-EPON) and fast route change can be achieved with a simple point-to-point path between VNFs and optical line terminals (OLTs). The second feature is that the live migration of a VNF is limited to a part of it that contains a larger number of subscribers. Owing to the reduction in the number of total paths, fast resource allocation can be provided.

  • A Prediction-Based Approach to Moving-Phenomenon Monitoring Using Mobile Sensor Nodes

    Duc Van LE  Hoon OH  Seokhoon YOON  

     
    PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1754-1762

    Deploying a group of mobile sensor (MS) nodes to monitor a moving phenomenon in an unknown and open area includes a lot of challenges if the phenomenon moves quickly and due to the limited capabilities of MS nodes in terms of mobility, sensing and communication ranges. To address these challenges and achieve a high weighted sensing coverage, in this paper, we propose a new algorithm for moving-phenomenon monitoring, namely VirFID-MP (Virtual Force (VF)-based Interest-Driven phenomenon monitoring with Mobility Prediction). In VirFID-MP, the future movement of the phenomenon is first predicted using the MS nodes' movement history data. Then, the prediction information is used to calculate a virtual force, which is utilized to speed up MS nodes toward the moving phenomenon. In addition, a prediction-based oscillation-avoidance algorithm is incorporated with VirFID-MP movement control to reduce the nodes' energy consumption. Our simulation results show that VirFID-MP outperforms original VirFID schemes in terms of weighted coverage efficiency and energy consumption.

  • Data Association in Bistatic MIMO of T/R-R Mode: Basis Decision and Performance Analysis

    Xiang DUAN  Zishu HE  Hongming LIU  Jun LI  

     
    PAPER-Digital Signal Processing

      Vol:
    E99-A No:8
      Page(s):
    1567-1575

    Bistatic multi-input multi-output (MIMO) radar has the capability of measuring the transmit angle from the receiving array, which means the existence of information redundancy and benefits data association. In this paper, a data association decision for bistatic MIMO radar is proposed and the performance advantages of bistatic MIMO radar in data association is analyzed and evaluated. First, the parameters obtained by receiving array are sent to the association center via coordinate conversion. Second, referencing the nearest neighbor association (NN) algorithm, an improved association decision is proposed with the transmit angle and target range as association statistics. This method can evade the adverse effects of the angle system errors to data association. Finally, data association probability in the presence of array directional error is derived and the correctness of derivation result is testified via Monte Carlo simulation experiments. Besides that performance comparison with the conventional phased array radar verifies the excellent performance of bistatic MIMO Radar in data association.

  • Design and Deployment of Enhanced VNode Infrastructure — Deeply Programmable Network Virtualization Open Access

    Kazuhisa YAMADA  Akihiro NAKAO  Yasusi KANADA  Yoshinori SAIDA  Koichiro AMEMIYA  Yuki MINAMI  

     
    INVITED PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1629-1637

    We introduce the design and deployment of the latest version of the VNode infrastructure, VNode-i. We present new extended VNode-i functions that offer high performance and provide convenient deep programmability to network developers. We extend resource abstraction to the transport network and achieve highly precise slice measurement for resource elasticity. We achieve precise resource isolation for VNode-i. We achieve coexistence of high performance and programmability. We also enhance AGW functions. In addition, we extend network virtualization from the core network to edge networks and terminals. In evaluation experiments, we deploy the enhanced VNode-i on the JGN-X testbed and evaluate its performance. We successfully create international federation slices across VNode-i, GENI, and Fed4FIRE. We also present experimental results on video streaming on a federated slice across VNode-i and GENI. Testbed experiments confirm the practicality of the enhanced VNode-i.

  • A Linear Combining Scheme to Suppress Interference in Multiple Relay Systems

    Ahmet Ihsan CANBOLAT  Kazuhiko FUKAWA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/02/17
      Vol:
    E99-B No:8
      Page(s):
    1867-1873

    This paper proposes an interference suppression scheme based on linear combining for multiple relay systems. Interference from base stations and relays in neighboring cells degrades the bit error rate (BER) performance of mobile stations (MSs) near cell boundaries. To suppress such interference for half-duplex relay systems, the proposed scheme linearly combines received signals of the first and second phases at MS. Without channel state information (CSI) feedback, weight coefficients for the linear combining are estimated by the recursive least-squares (RLS) algorithm, which requires only information on preamble symbols of the target MS. Computer simulations of orthogonal frequency-division multiplexing (OFDM) transmission under two-cell and frequency selective fading conditions are conducted. It is demonstrated that the RLS-based linear combining with decision directed estimation is superior to the RLS-based linear combining using only the preamble and can outperform the minimum mean-squared error (MMSE) combining with estimated CSI when the number of preamble symbols is two and four that correspond to the minimum requirements for MMSE and RLS, respectively.

  • Multi-Cell Structure Backscatter Based Wireless-Powered Communication Network (WPCN)

    Shin Hyuk CHOI  Dong In KIM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1687-1696

    In this paper, we propose a multi-cell structure backscatter based wireless-powered communication network (WPCN) where a number of backscatter cells are locally separated, each containing a subset of users around a carrier emitter. The multi-cell structure backscatter based WPCN can be implemented in two ways, namely time-division multiplexing (TDM) and frequency-division multiplexing (FDM). Here users harvest energy from the carrier signal transmitted by the carrier emitter, and then transmit their own information in a passive way via the reflection of the carrier signal using frequency-shift keying modulation. We characterize the energy-free condition and the signal-to-noise ratio (SNR) outage zone in a backscatter based WPCN. Also, a backscatter based harvest-then-transmit protocol is adopted to maximize the sum-throughput of all users by optimally allocating time for energy harvesting and information transmission. Numerical results demonstrate that the backscatter based WPCN ensures an increased long-range coverage and a diminished SNR outage zone compared to conventional radio based WPCNs. Also, comparing the two types of multi-cell structure backscatter based WPCN, TDM within each backscatter cell and FDM across backscatter cells versus FDM within each backscatter cell and TDM across backscatter cells, numerical results confirm that which one yields a better performance.

  • Information and Communications Technology in Disaster Mitigation Technology

    Yoshiyuki MATSUBARA  

     
    INVITED PAPER

      Vol:
    E99-A No:8
      Page(s):
    1504-1509

    We arrange disaster mitigation activities into temporal order and discuss the contribution of information and communications technology (ICT) to the reduction of disaster damage in the stages of precaution, emergency response, and post-mortem study. Examples of the current contribution of ICT are introduced and future possible uses of ICT are discussed. We focus on the contribution of ICT to decision-making in emergency responses by augmenting human intelligence. Research directions of ICT for disaster mitigation technology are summarized in the categories “tough ICT”, “intelligence amplification for decision-making in disaster mitigation” and “safe ICT.”

  • A Short-Time Three-Phase Single-Rail Precharge Logic against Differential Power Analysis

    Wenyi TANG  Song JIA  Yuan WANG  

     
    PAPER-Electronic Circuits

      Vol:
    E99-C No:8
      Page(s):
    956-962

    Side channel attacks (SCAs) on security devices have become a major concern for system security. Existing SCA countermeasures are costly in terms of area and power consumption. This paper presents a novel differential power analysis (DPA) countermeasure referred to as short-time three-phase single-rail precharge logic (STSPL). The proposed logic is based on a single-rail three-phase operation scheme providing effective DPA-resistance with low cost. In the scheme, a controller is inserted to discharge logic gates by reusing evaluation paths to achieve more balanced power consumption. This reduces the latency between different phases, increasing the difficult of the adversary to conduct DPA, compared with the state-of-the-art DPA-resistance logics. To verify the chip's power consumption in practice, a 4-bit ripple carry adder and a 4-bit inverter of AES-SBOX were implemented. The testing and simulation results of DPA attacks prove the security and efficiency of the proposed logic.

  • Proposal of a Simple Ultra-Low Contention CD ROADM

    Ayako IWAKI  Akio SAHARA  Mitsunori FUKUTOKU  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E99-B No:8
      Page(s):
    1772-1779

    We propose a simple configuration for colorless and directionless (CD) reconfigurable optical add/drop multiplexers that enables ultra-low contention add/drop operation to be achieved. In the configuration, we apply a combination of multiple small-port-count CD add/drop banks (CD banks) and round-robin CD bank assignment. Evaluation results show that the proposed configuration can substantially reduce intra-node contention rate, which is less than 0.1%. We also find that the proposed configuration can improve the utilization efficiency of wavelength resources and transponders. We discuss the mechanism of how the proposed configuration reduces intra-node contention by analyzing the status of wavelength assignments in direction ports and CD banks.

  • Array Correlation Matrix Element Properties and Their Application to Low-Cost DOA Estimation

    Koichi ICHIGE  Yu IWABUCHI  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:8
      Page(s):
    1859-1866

    We study the correlation matrix element properties in array signal processing and apply them to a Direction-Of-Arrival (DOA) estimation problem of coherent or highly-correlated sources for a Uniform Linear Array (ULA). The proposed algorithm is generally based on the relation between the elements of the array correlation matrix and does not need an eigendecomposition, iteration, or angular peak-search. The performance of the proposed method was evaluated through a computer simulation.

  • A Graphical Game Theoretic Approach to Optimization of Energy Efficiency in Multihop Wireless Sensor Networks

    Hui JING  Hitoshi AIDA  

    This paper was deleted on February 16, 2024 because it was found to be a a illegal submission (see details in the pdf file).
     
    PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1789-1798

    Recently, multihop wireless sensor networks (WSNs) are widely developed and applied to energy efficient data collections from environments by establishing reliable transmission radio links and employing data aggregation algorithms, which can eliminate redundant transmissions and provide fusion information. In this paper, energy efficiency which consists of not only energy consumptions but also the amount of received data by the base station, as the performance metric to evaluate network utilities is presented for achieving energy efficient data collections. In order to optimize energy efficiency for improvements of network utilization, we firstly establish a graphical game theoretic model for energy efficiency in multihop WSNs, considering message length, practical energy consumptions and packet success probabilities. Afterwards, we propose a graphical protocol for performance optimization from Nash equilibrium of the graphical game theory. The approach also consists of the distributed protocol for generating optimum tree networks in practical WSNs. The experimental results show energy efficient multihop communications can be achieved by optimum tree networks of the approach. The quantitative evaluation and comparisons with related work are presented for the metric with respect to network energy consumptions and the amount of received data by the base station. The performances of our proposal are improved in all experiments. As an example, our proposal can achieve up to about 52% energy efficiency more than collection tree protocol (CTP). The corresponding tree structure is provided for the experiment.

  • Effects of Adding/Dropping Nyquist WDM Superchannels on Linear and Nonlinear Transmission Impairments in an Elastic Optical Network

    Masahiko JINNO  Takuya NAKAGAWA  Yutaka MORI  Koichi MARU  Haruna MATSUSHITA  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E99-B No:8
      Page(s):
    1669-1676

    We investigate through simulation simultaneous linear and nonlinear impairments using a realistic reconfigurable optical add drop multiplexer (ROADM) model while considering optical filtering and in-band coherent crosstalk at each ROADM and the nonlinear interfering effects from neighbor superchannels with the QPSK or 16QAM modulation format.

  • MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs

    Anfeng LIU  Xiao LIU  He LI  Jun LONG  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2010-2018

    In this paper, a multi-data and multi-ACK verified selective forwarding attacks (SFAs) detection scheme is proposed for containing SFAs. In our scheme, each node (in addition to the nodes in the hotspots area) generates multiple acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. In multiple ACK message, one ACK is returned along the data forwarding path, other ACKs are returned along different routing paths, and thus malicious nodes can be located accurately. At the same time, source node send multiple data routing, one is primary data routing, the others are backup data routing. Primary data is routed to sink directly, but backup data is routed to nodes far from sink, and then waits for the returned ACK of sink when primary data is routed to sink. If a node doesn't receive the ACK, the backup data is routed to sink, thus the success rate of data transmission and lifetime can be improved. For this case, the MDMA scheme has better potential to detect abnormal packet loss and identify suspect nodes as well as resilience against attack. Theoretical analysis and experiments show that MDMA scheme has better ability for ensuring success rate of data transmission, detecting SFA and identifying malicious nodes.

  • FEM Simulations of Implantable Cardiac Pacemaker EMI Triggered by HF-Band Wireless Power Transfer System

    Naoki TANAKA  Takashi HIKAGE  Toshio NOJIMA  

     
    BRIEF PAPER

      Vol:
    E99-C No:7
      Page(s):
    809-812

    This paper describes a numerical assessment methodology of pacemaker EMI triggered by HF-band wireless power transfer system. By using three dimensional full-wave numerical simulation based on finite element method, interference voltage induced at the connector of the pacemaker inside the phantom that is used for in-vitro EMI assessment is obtained. Simulated example includes different exposure scenarios in order to estimate the maximum interference voltage.

  • Transmission Characteristics and Shielding Effectiveness of Shielded-Flexible Printed Circuits for Differential-Signaling

    Yoshiki KAYANO  Hiroshi INOUE  

     
    PAPER

      Vol:
    E99-C No:7
      Page(s):
    766-773

    To provide basic considerations for the realization of method for suppressing the EMI from differential-paired lines on flexible printed circuits (FPC), the characteristics of the SI performance and shielding effectiveness (SE) of shielded-flexible printed circuits for differential-signaling are investigated in this paper experimentally and by a numerical modeling. Firstly, transmission characteristics of TDR measurement and frequency response of |Sdd21| are discussed, from view point of signal integrity. Secondly, as the characteristics of the SE performance for EMI, frequency responses of magnetic field are investigated. Although placement of conductive shield near the paired-lines decreases characteristics impedance, |Sdd21| for the “with Cu 5.5 µm-thickness copper shield” is not deteriorated compared with “without shield” and sufficient SE performance for magnetic field can be established. But, thin-shield deteriorates SI as well as SE performances. The frequency response of |Sdd21| at higher frequencies for the “Ag 0.1 µm” case has the steep loss roll off. A reflection loss resulted from impedance-mismatching is not dominant factor of the losses. The dominant factor may be magnetic field leakage due to very thin-conductive shield.

  • Fast and Efficient Signature-Based Sub-Circuit Matching

    Amir Masoud GHAREHBAGHI  Masahiro FUJITA  

     
    PAPER

      Vol:
    E99-A No:7
      Page(s):
    1355-1365

    This paper presents a new approach for circuit matching using signatures. We have defined a signature based on topology of the fanin cones of the circuit elements. Given two circuits, first we find all the circuit elements with unique signature between the two input circuits. After that, we try to expand the matching area by our expansion rules as much as possible. We iteratively find the unique matches and expand the matching area until no further matching is possible. Our experiments on IWLS2005 benchmark suite show that our method is able to find the perfect matching between two 160,000-gate IP in 5 minutes. In addition, our method is more than one order of magnitude faster than our previous signature-based matching method, while the size of the matched area is comparable or larger.

  • Stimulating Multi-Service Forwarding under Node-Selfishness Information in Selfish Wireless Networks

    Jinglei LI  Qinghai YANG  Kyung Sup KWAK  

     
    PAPER-Network

      Vol:
    E99-B No:7
      Page(s):
    1426-1434

    In this paper, we investigate multi-service forwarding in selfish wireless networks (SeWN) with selfish relay nodes (RN). The RN's node-selfishness is characterized from the perspectives of its residual energy and the incentive paid by the source, by which the degree of intrinsic selfishness (DeIS) and the degree of extrinsic selfishness (DeES) are defined. Meanwhile, a framework of the node-selfishness management is conceived to extract the RNs' node-selfishness information (NSI). Based on the RN's NSI, the expected energy cost and expected service profit are determined for analyzing the effect of the RN's node-selfishness on the multi-service forwarding. Moreover, the optimal incentive paid by the source is obtained for minimizing its cost and, at the same time, effectively stimulating the multi-service delivery. Simulation validate our analysis.

981-1000hit(5768hit)