The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] IR(5768hit)

1121-1140hit(5768hit)

  • An AM-PM Noise Mitigation Technique in Class-C VCO

    Kento KIMURA  Aravind THARAYIL NARAYANAN  Kenichi OKADA  Akira MATSUZAWA  

     
    PAPER-Electronic Circuits

      Vol:
    E98-C No:12
      Page(s):
    1161-1170

    This paper presents a 20GHz Class-C VCO using a noise sensitivity mitigation technique. A radio frequency Class-C VCO suffers from the AM-PM conversion, caused by the non-linear capacitance of cross coupled pair. In this paper, the phase noise degradation mechanism is discussed, and a desensitization technique of AM-PM noise is proposed. In the proposed technique, AM-PM sensitivity is canceled by tuning the tail impedance, which consists of 4-bit resistor switches. A 65-nm CMOS prototype of the proposed VCO demonstrates the oscillation frequency from 19.27 to 22.4GHz, and the phase noise of -105.7dBc/Hz at 1-MHz offset with the power dissipation of 6.84mW, which is equivalent to a Figure-of-Merit of -183.73dBc/Hz.

  • Magnetic Field Measurement for Human Exposure Assessment near Wireless Power Transfer Systems in Kilohertz and Megahertz Bands

    Satoshi ISHIHARA  Teruo ONISHI  Akimasa HIRATA  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E98-B No:12
      Page(s):
    2470-2476

    A method for measuring the magnetic field strength for human exposure assessment closer than 20cm to wireless power transfer (WPT) systems for information household appliances is investigated based on numerical simulations and measurements at 100kHz and 6.78MHz. Four types of magnetic sources are considered: a simple 1-turn coil and three types of coils simulating actual WPT systems. A magnetic sensor whose cross sectional area is 100cm2 as prescribed in International Electrotechnical Commission 62233 is used. Simulation results show that the magnetic field strength detected by the magnetic sensor is affected by its placement angle. The maximum coefficient of variation (CV) is 27.2% when the magnetic source and the sensor are in contact. The reason for this deviation is attributable to the localization of the magnetic field distribution around the magnetic source. The coupling effect between the magnetic source and the sensor is negligible. Therefore, the sensor placement angle is an essential factor in magnetic field measurements. The CV due to the sensor placement angle is reduced from 21% to 4% if the area of the sensor coil is reduced from 100 to 0.75cm2 at 6.78MHz. However, the sensitivity of the sensor coil is decreased by 42.5dB. If measurement uncertainty that considers the deviation in the magnetic field strength due to the sensor placement angle is large, the measured magnetic field strength should be corrected by the uncertainty. If the magnetic field distribution around the magnetic source is known, conservative exposure assessments can be achieved by placing the magnetic sensor in locations at which the spatial averaged magnetic field strengths perpendicular to the magnetic sensor coils become maximum.

  • Syndrome Decoding of Symbol-Pair Codes

    Makoto TAKITA  Masanori HIROTOMO  Masakatu MORII  

     
    PAPER-Coding Theory

      Vol:
    E98-A No:12
      Page(s):
    2423-2428

    Cassuto and Blaum proposed new error correcting codes which are called symbol-pair codes. They presented a coding framework for channels whose outputs are overlapping pairs of symbols in storage applications. Such channels are called symbol-pair read channels. The pair distance and pair error are used in symbol-pair read channels. Cassuto et al. and Yaakobi et al. presented decoding algorithms for symbol-pair codes. However, their decoding algorithms cannot always correct errors whose number is not more than half the minimum pair distance. In this paper, we propose a new decoding algorithm using syndromes of symbol-pair codes. In addition, we show that the proposed algorithm can correct all pair errors within the pair error correcting capability.

  • A Length Matching Routing Algorithm for Set-Pair Routing Problem

    Yuta NAKATANI  Atsushi TAKAHASHI  

     
    PAPER-Physical Level Design

      Vol:
    E98-A No:12
      Page(s):
    2565-2571

    In the routing design of interposer and etc., the combination of a pin pair to be connected by wire is often flexible, and the reductions of the total wire length and the length difference are pursued to keep the circuit performance. Even though the total wire length can be minimized by finding a minimum cost maximum flow in set pair routing problems, the length difference is often large, and the reduction of it is not easy. In this paper, an algorithm that reduces the length difference while keeping the total wire length small is proposed. In the proposed algorithm, an initial routing first obtained by a minimum cost maximum flow. Then it is modified to reduce the maximum length while keeping the minimum total wire length, and a connection of the minimum length is detoured to reduce the length difference. The effectiveness of the proposed algorithm is confirmed by experiments.

  • Unique Decoding of Certain Reed-Solomon Codes

    Lin-Zhi SHEN  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Coding Theory

      Vol:
    E98-A No:12
      Page(s):
    2728-2732

    In this paper, we consider the Reed-Solomon codes over Fqm with evaluations in a subfield Fq. By the “virtual extension”, we can embed these codes into homogeneous interleaved Reed-Solomon codes. Based on this property and the collaborative decoding algorithm, a new probabilistic decoding algorithm that can correct errors up to $ rac{m}{m+1}(n-k)$ for these codes is proposed. We show that whether the new decoding algorithm fails or not is only dependent on the error. We also give an upper bound on the failure probability of the new decoding algorithm for the case s=2. The new decoding algorithm has some advantages over some known decoding algorithms.

  • Smart Packet Transmission Scheduling Combined with Rate Adaptation for Enhancing Total Throughput against Channel Fading in Wireless LAN

    Shiori YOSHIOKA  Yosuke TANIGAWA  Hideki TODE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:12
      Page(s):
    2496-2507

    This paper deals with the inefficient channel utilization of wireless LANs that use rate adaptation. Recently, wireless LANs are being utilized in various environments. However, inefficient channel utilization is still a serious problem. The effective solutions include to decrease the frequency of packet loss and to transmit packets at a higher rate. While the backoff algorithm in IEEE 802.11 avoids only the packet loss caused by collision, other previous works tackle the packet loss caused by channel fading by means of transmission at a lower rate. This approach is called rate adaptation and a simple rate adaptation scheme is widely diffused in commercial 802.11 wireless LAN devices. However, utilizing lower transmission rate degrades transmission efficiency because the channel is occupied for a longer time. In this paper, decreasing transmission rate is avoided with novel transmission scheduling. Specifically, the proposed scheduling interrupts packet transmission to receiver stations under fading channel condition until the condition improves. Instead, other packets to other stations are transmitted in advance. To implement this proposed scheduling, only access points (APs) need to be modified. Hence, legacy wireless stations can benefit from higher communication bandwidth simply by introducing the modified APs. Moreover, although wireless stations must also be modified, an extended RTS/CTS handshake is also proposed to quickly detect the improvement of channel condition and to minimize the wasted time even if fading loss occurs. Here, wireless stations must also be modified to adopt the extended RTS/CTS handshake but further bandwidth increase is achievable. Evaluation results demonstrate that network throughput is improved without degrading the throughput fairness among receiver stations and packet transfer delay of interrupted stations.

  • A Current-Mirror-Based GaAs-HBT RF Power Detector Suitable for Base Terminal Monitoring in an HBT Power Stage

    Kazuya YAMAMOTO  Hitoshi KURUSU  Miyo MIYASHTA  Satoshi SUZUKI  Hiroaki SEKI  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E98-C No:12
      Page(s):
    1150-1160

    This paper describes the circuit design and measurement results of a new GaAs-HBT RF power detector proposed for use in WiMAX and wireless LAN transmitter applications. The detector, which is based on a simple current-mirror topology, occupies a small die area. It is, therefore, not only easy to implement together with a GaAs-HBT power amplifier, but can also offer approximately logarithmic (linear-in-dB) characteristics. Because it can also be driven with small voltage amplitudes, it is suitable for base-terminal monitoring at an HBT power stage. When the detector is used as a base-terminal power monitor, an appropriate base resistance added to the detection HBT effectively suppresses frequency dispersion of the detected voltage characteristics. Measurements of a prototype detector incorporated into a single-stage HBT power amplifier fabricated on the same die are as follows. The detector is capable of delivering a detected voltage of 0.35-2.5 V with a slope of less than 0.17 V/dB over a 4-to-24-dBm output power range at 3.5 GHz while drawing a current of less than 1.8 mA from a 2.85-V supply. While satisfying a log conformance error of less than 1 dB over an amplifier output power range from 4 dBm to 24 dBm, it can also suppress the detected power dispersion within 0.18 dB at approximately 15 dBm of output power over a 3.1-3.9-GHz-wide frequency range. This dispersion value is approximately one-tenth that of a conventional collector-terminal-monitor-type diode detector.

  • A Self-Recoverable, Frequency-Aware and Cost-Effective Robust Latch Design for Nanoscale CMOS Technology

    Aibin YAN  Huaguo LIANG  Zhengfeng HUANG  Cuiyun JIANG  Maoxiang YI  

     
    PAPER-Electronic Circuits

      Vol:
    E98-C No:12
      Page(s):
    1171-1178

    In this paper, a self-recoverable, frequency-aware and cost-effective robust latch (referred to as RFC) is proposed in 45nm CMOS technology. By means of triple mutually feedback Muller C-elements, the internal nodes and output node of the latch are self-recoverable from single event upset (SEU), i.e. particle striking induced logic upset, regardless of the energy of the striking particle. The proposed robust latch offers a much wider spectrum of working clock frequency on account of a smaller delay and insensitivity to high impedance state. The proposed robust latch performs with lower costs regarding power and area than most of the compared latches. SPICE simulation results demonstrate that the area-power-delay product is 73.74% saving on average compared with previous radiation hardened latches.

  • SP-MAC: A Media Access Control Method Based on the Synchronization Phenomena of Coupled Oscillators over WLAN

    Hiroyasu OBATA  Ryo HAMAMOTO  Chisa TAKANO  Kenji ISHIDA  

     
    PAPER-Wireless System

      Pubricized:
    2015/09/15
      Vol:
    E98-D No:12
      Page(s):
    2060-2070

    Wireless local area networks (LANs) based on the IEEE802.11 standard usually use carrier sense multiple access with collision avoidance (CSMA/CA) for media access control. However, in CSMA/CA, if the number of wireless terminals increases, the back-off time derived by the initial contention window (CW) tends to conflict among wireless terminals. Consequently, a data frame collision often occurs, which sometimes causes the degradation of the total throughput in the transport layer protocols. In this study, to improve the total throughput, we propose a new media access control method, SP-MAC, which is based on the synchronization phenomena of coupled oscillators. Moreover, this study shows that SP-MAC drastically decreases the data frame collision probability and improves the total throughput when compared with the original CSMA/CA method.

  • Circularity of the Fractional Fourier Transform and Spectrum Kurtosis for LFM Signal Detection in Gaussian Noise Model

    Guang Kuo LU  Man Lin XIAO  Ping WEI  Hong Shu LIAO  

     
    LETTER-Digital Signal Processing

      Vol:
    E98-A No:12
      Page(s):
    2709-2712

    This letter investigates the circularity of fractional Fourier transform (FRFT) coefficients containing noise only, and proves that all coefficients coming from white Gaussian noise are circular via the discrete FRFT. In order to use the spectrum kurtosis (SK) as a Gaussian test to check if linear frequency modulation (LFM) signals are present in a set of FRFT points, the effect of the noncircularity of Gaussian variables upon the SK of FRFT coefficients is studied. The SK of the α th-order FRFT coefficients for LFM signals embedded in a white Gaussian noise is also derived in this letter. Finally the signal detection algorithm based on FRFT and SK is proposed. The effectiveness and robustness of this algorithm are evaluated via simulations under lower SNR and weaker components.

  • Tehrahertz CMOS Design for Low-Power and High-Speed Wireless Communication Open Access

    Minoru FUJISHIMA  Shuhei AMAKAWA  Kyoya TAKANO  Kosuke KATAYAMA  Takeshi YOSHIDA  

     
    INVITED PAPER

      Vol:
    E98-C No:12
      Page(s):
    1091-1104

    There have recently been more and more reports on CMOS integrated circuits operating at terahertz (≥ 0.1THz) frequencies. However, design environments and techniques are not as well established as for RF CMOS circuits. This paper reviews recent progress made by the authors in terahertz CMOS design for low-power and high-speed wireless communication, including device characterization and modeling techniques. Low-power high-speed wireless data transfer at 11Gb/s and 19pJ/bit and a 7-pJ/bit ultra-low-power transceiver chipset are presented.

  • A Software Approach of Controlling the CPU Resource Assignment in Network Virtualization

    Shin MURAMATSU  Ryota KAWASHIMA  Shoichi SAITO  Hiroshi MATSUO  Hiroki NAKAYAMA  Tsunemasa HAYASHI  

     
    PAPER

      Vol:
    E98-B No:11
      Page(s):
    2171-2179

    Many public cloud datacenters have adopted the Edge-Overlay model which supports virtual switch-based network virtualization using IP tunneling. However, software-implemented virtual switches can cause performance degradation because the packet processing load can concentrate on a particular CPU core. As a result, such load concentration decreases and destabilizes the performance of virtual networks. Although multi-queue functions like Receive Side Scaling (RSS) can distribute the load onto multiple CPU cores, they still have performance problems such as IRQ core collision between priority flows as well as competitive resource use between host and guest machines for received packet processing. In this paper, we propose Virtual Switch Extension (VSE) that adaptively determines CPU core assignment for SoftIRQ to prevent performance degradation. VSE supports two types of SoftIRQ core selection mechanisms, on-the-fly or predetermined. In the on-the-fly mode, VSE selects a SoftIRQ core based on current CPU load to exploit low-loaded CPU resources. In the predetermined mode, SoftIRQ cores are assigned in advance to differentiate the performance of priority flows. This paper describes a basic architecture and implementation of VSE and how VSE assigns a SoftIRQ cores. Moreover, we evaluate fundamental throughput of various CPU assignment models in the predetermined mode. Finally, we evaluate the performance of a priority VM in two VM usecases, the client-usecase which is receive-oriented and the router-usecase which performs bi-directional communications. In the client-usecase, the throughput of the priority VM was improved by 31% compared with RSS when the priority VM had one dedicated core. In the router-usecase, the throughput was improved by 29% when three dedicated cores were provided for the VM.

  • Application Specific Slicing for MVNO through Software-Defined Data Plane Enhancing SDN Open Access

    Akihiro NAKAO  Ping DU  Takamitsu IWAI  

     
    INVITED PAPER

      Vol:
    E98-B No:11
      Page(s):
    2111-2120

    In this paper, we apply the concept of software-defined data plane to defining new services for Mobile Virtual Network Operators (MVNOs). Although there are a large number of MVNOs proliferating all over the world and most of them provide low bandwidth at low price, we propose a new business model for MVNOs and empower them with capability of tailoring fine-grained subscription plans that can meet users' demands. For example, abundant bandwidth can be allocated for some specific applications, while the rest of the applications are limited to low bandwidth. For this purpose, we have recently proposed the concept of application and/or device specific slicing that classifies application and/or device specific traffic into slices and applies fine-grained quality of services (QoS), introducing various applications of our proposed system [9]. This paper reports the prototype implementation of such proposal in the real MVNO connecting customized smartphones so that we can identify applications from the given traffic with 100% accuracy. In addition, we propose a new method of identifying applications from the traffic of unmodified smartphones by machine learning using the training data collected from the customized smartphones. We show that a simple machine learning technique such as random forest achives about 80% of accuracy in applicaton identification.

  • Multiple Attribute Authorities Attribute-Based Designated Confirmer Signature Scheme with Unified Verification

    Yan REN  Guilin WANG  Yunhong HU  Qiuyan WANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:11
      Page(s):
    2341-2348

    In this paper, we first propose a notion of multiple authorities attribute-based designated confirmer signature scheme with unified verification. In a multiple authorities attribute-based designated confirmer signature scheme with unified verification, both the signer and the designated confirmer can run the same protocols to confirm a valid signature or disavow an invalid signature. Then, we construct a multiple authorities attribute-based designated confirmer signature scheme with unified verification. Finally, we prove the correctness and security of the proposed scheme.

  • Fast Repairing from Large-Scale Failure Using Hierarchical SDN Controllers

    Shohei KAMAMURA  Hiroshi YAMAMOTO  Kouichi GENDA  Yuki KOIZUMI  Shin'ichi ARAKAWA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E98-B No:11
      Page(s):
    2269-2279

    This paper proposes fast repairing methods that uses hierarchical software defined network controllers for recovering from massive failure in a large-scale IP over a wavelength-division multiplexing network. The network consists of multiple domains, and slave controllers are deployed in each domain. While each slave controller configures transport paths in its domain, the master controller manages end-to-end paths, which are established across multiple domains. For fast repair of intra-domain paths by the slave controllers, we define the optimization problem of path configuration order and propose a heuristic method, which minimizes the repair time to move from a disrupted state to a suboptimal state. For fast repair of end-to-end path through multiple domains, we also propose a network abstraction method, which efficiently manages the entire network. Evaluation results suggest that fast repair within a few minutes can be achieved by applying the proposed methods to the repairing scenario, where multiple links and nodes fail, in a 10,000-node network.

  • Facilitating Incentive-Compatible Access Probability Selection in Wireless Random Access Networks

    Bo GU  Cheng ZHANG  Kyoko YAMORI  Zhenyu ZHOU  Song LIU  Yoshiaki TANAKA  

     
    PAPER-Network

      Vol:
    E98-B No:11
      Page(s):
    2280-2290

    This paper studies the impact of integrating pricing with connection admission control (CAC) on the congestion management practices in contention-based wireless random access networks. Notably, when the network is free of charge, each self-interested user tries to occupy the channel as much as possible, resulting in the inefficient utilization of network resources. Pricing is therefore adopted as incentive mechanism to encourage users to choose their access probabilities considering the real-time network congestion level. A Stackelberg leader-follower game is formulated to analyze the competitive interaction between the service provider and the users. In particular, each user chooses the access probability that optimizes its payoff, while the self-interested service provider decides whether to admit or to reject the user's connection request in order to optimize its revenue. The stability of the Stackelberg leader-follower game in terms of convergence to the Nash equilibrium is established. The proposed CAC scheme is completely distributed and can be implemented by individual access points using only local information. Compared to the existing schemes, the proposed scheme achieves higher revenue gain, higher user payoff, and higher QoS performance.

  • A Fair Resource Sharing Mechanism between Mobile Virtual Network Operators

    Wei LIU  Rui HU  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  

     
    PAPER

      Vol:
    E98-B No:11
      Page(s):
    2141-2150

    Mobile virtual network operators (MVNOs) are mobile operators without their own infrastructure or government issued spectrum licenses. They purchase spectrum resources from primary mobile network operators (MNOs) to provide communication services under their own brands. MVNOs are expected to play an important role in mobile network markets, as this will increase the competition in retail markets and help to meet the demand of niche markets. However, with the rapidly increasing demand of mobile data traffic, efficient utilization of the limited spectrum resources owned by MVNOs has become an important issue. We propose here a resource sharing mechanism between MVNOs against the background of network functions virtualization (NFV). The proposed mechanism enables MVNOs to improve their quality of service (QoS) by sharing spectrum resources with each other. A nash bargaining solution based decision strategy is also devised to ensure the fairness of resource sharing. Extensive numerical evaluation results validate the effectiveness of the proposed models and mechanisms.

  • Virtual Network Allocation for Fault Tolerance Balanced with Physical Resources Consumption in a Multi-Tenant Data Center

    Yukio OGAWA  Go HASEGAWA  Masayuki MURATA  

     
    PAPER

      Vol:
    E98-B No:11
      Page(s):
    2121-2131

    In a multi-tenant data center, nodes and links of tenants' virtual networks (VNs) share a single component of the physical substrate network (SN). The failure of a single SN component can thereby cause the simultaneous failures of multiple nodes and links in a single VN; this complex of failures must significantly disrupt the services offered on the VN. In the present paper, we clarify how the fault tolerance of each VN is affected by a single SN failure, especially from the perspective of VN allocation in the SN. We propose a VN allocation model for multi-tenant data centers and formulate a problem that deals with the bandwidth loss in a single VN due a single SN failure. We conduct numerical simulations (with the setting that has 1.7×108bit/s bandwidth demand on each VN, (denoted by Ci)). When each node in each VN is scattered and mapped to an individual physical server, each VN can have the minimum bandwidth loss (5.3×102bit/s (3.0×10-6×Ci)) but the maximum required bandwidth between physical servers (1.0×109bit/s (5.7×Ci)). The balance between the bandwidth loss and the required physical resources can be optimized by assigning every four nodes of each VN to an individual physical server, meaning that we minimize the bandwidth loss without over-provisioning of core switches.

  • Scalable Centralized Control Architecture of Virtual Switch on Large-Scale Network

    Hiroki DATE  Kenichi HIGUCHI  Masaru KATAYAMA  Katsutoshi KODA  

     
    PAPER

      Vol:
    E98-B No:11
      Page(s):
    2160-2170

    Router virtualization is becoming more common as a method that uses network (NW) equipment effectively and robustly similar to server virtualization. Edge routers, which are gateways of core NWs, should be virtualized because they have many functions and resources just as servers do. To virtualize edge routers, a metro NW, which is a wide area layer-2 NW connecting each user's residential gateway to edge routers, must trace dynamic edge router re-allocation by changing the route of each Ethernet flow. Therefore, we propose a scalable centralized control architecture of a virtual layer-2 switch on a metro NW to trace virtual router re-allocation and use metro NW equipment effectively. The proposed scalable control architecture improves the centralized route control performance by processing in parallel on a flow-by-flow basis taking into account route information even in the worst case where edge routers fail. In addition, the architecture can equalize the load among parallel processes dynamically by using two proposed load re-allocation methods to increase the route control performance stably while minimizing the amount of resources for the control. We evaluate the scalability of the proposed architecture through theoretical analysis and experiments on a prototype and show that the proposed architecture increases the number of flows accommodated in a metro NW. Moreover, we evaluate the load re-allocation methods through simulation and show that they can evenly distribute the load among parallel processes. Finally, we show that the proposed architecture can be applied to not only large-scale metro NWs but also to data center NWs, which have recently become an important type of large-scale layer-2 NW.

  • Autonomous Decentralized Control for Indirectly Controlling System Performance Variable of Large-Scale and Wide-Area Networks

    Yusuke SAKUMOTO  Masaki AIDA  Hideyuki SHIMONISHI  

     
    PAPER-Network

      Vol:
    E98-B No:11
      Page(s):
    2248-2258

    In this paper, we propose a novel Autonomous Decentralized Control (ADC) scheme for indirectly controlling a system performance variable of large-scale and wide-area networks. In a large-scale and wide-area network, since it is impractical for any one node to gather full information of the entire network, network control must be realized by inter-node collaboration using information local to each node. Several critical network problems (e.g., resource allocation) are often formulated by a system performance variable that is an amount to quantify system state. We solve such problems by designing an autonomous node action that indirectly controls, via the Markov Chain Monte Carlo method, the probability distribution of a system performance variable by using only local information. Analyses based on statistical mechanics confirm the effectiveness of the proposed node action. Moreover, the proposal is used to implement traffic-aware virtual machine placement control with load balancing in a data center network. Simulations confirm that it can control the system performance variable and is robust against system fluctuations. A comparison against a centralized control scheme verifies the superiority of the proposal.

1121-1140hit(5768hit)