The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] MOBILE(969hit)

361-380hit(969hit)

  • MIMO-OFDM MAP Receiver with Spatial-Temporal Filters Employing Decision-Directed Recursive Eigenvalue Decomposition Parameter Estimation

    Fan LISHENG  Kazuhiko FUKAWA  Hiroshi SUZUKI  Satoshi SUYAMA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:4
      Page(s):
    1112-1121

    This paper proposes a new parameter estimation method for the MIMO-OFDM MAP receiver with spatial-temporal filters. The proposed method employs eigenvalue decomposition (EVD) so as to attain precise estimates especially under interference-limited conditions in MIMO-OFDM mobile communications. Recursive EVD is introduced to reduce the computational complexity compared to the nonrecursive EVD. The spatial-temporal prewhitening is placed prior to FFT because this arrangement is superior to that of conventional prewhitening posterior to FFT in accuracy of the parameter estimation. In order to improve tracking capability to fast fading, the proposed scheme applies a decision-directed algorithm to the parameter estimation by using log-likelihood ratios of coded bits. Computer simulations demonstrate that the proposed scheme can track fast fading and reduce the complexity to 18 percents of the conventional one, and that the spatial-temporal filtering prior to FFT outperforms the conventional one posterior to FFT.

  • Design Method for a Low-Profile Dual-Shaped Reflector Antenna with an Elliptical Aperture by the Suppression of Undesired Scattering

    Yoshio INASAWA  Shinji KURODA  Kenji KUSAKABE  Izuru NAITO  Yoshihiko KONISHI  Shigeru MAKINO  Makio TSUCHIYA  

     
    PAPER-Electromagnetic Theory

      Vol:
    E91-C No:4
      Page(s):
    615-624

    A design method is proposed for a low-profile dual-shaped reflector antenna for the mobile satellite communications. The antenna is required to be low-profile because of mount restrictions. However, reduction of its height generally causes degradation of antenna performance. Firstly, an initial low-profile reflector antenna with an elliptical aperture is designed by using Geometrical Optics (GO) shaping. Then a Physical Optics (PO) shaping technique is applied to optimize the gain and sidelobes including mitigation of undesired scattering. The developed design method provides highly accurate design procedure for electrically small reflector antennas. Fabrication and measurement of a prototype antenna support the theory.

  • Multiple Tree Multicast Ad Hoc On-Demand Distance Vector (MT-MAODV) Routing Protocol for Video Multicast over Mobile Ad Hoc Networks

    Chee-Onn CHOW  Hiroshi ISHII  

     
    PAPER-Network

      Vol:
    E91-B No:2
      Page(s):
    428-436

    Video multicast over wireless medium has gained increasing popularity in a wide range of applications, such as video-on-demand and group video conferencing. With mobile ad hoc networks emerging as a promising solution for future ubiquitous communications, supporting reliable video multicast over mobile ad hoc networks is a timely research topic. In this paper we tackle this issue by using multiple tree multicast routing protocol. Specifically, we introduce an extension to the Multicast Ad Hoc On-demand Distance Vector (MAODV) routing protocol to construct two optimally disjoint trees in a single routine. The extended protocol is called Multiple Tree Multicast Ad Hoc On-demand Distance Vector (MT-MAODV) routing protocol. In order to distribute the video evenly and independently between these disjoint trees, the Multiple Description Coding (MDC) scheme is used for video coding. Simulation shows that the proposed protocol demonstrates video multicast with better quality than the conventional video multicast using a single tree only.

  • An Enhanced Route Recovery Protocol for Mobile Ad Hoc Networks

    Sangkyung KIM  Noyeul PARK  Changhwa KIM  Seung-sik CHOI  

     
    LETTER-Network

      Vol:
    E91-B No:2
      Page(s):
    597-600

    In case of link failures, many ad hoc routing protocols recover a route by employing source-initiated route re-discovery, but this approach can degrade system performance. Some use localized route recovery, which may yield non-optimal paths. Our proposal provides a mechanism that can enhance the overall routing performance by initiating route recovery at the destination node. We elucidate the effects through simulations including comparisons with AODV and AODV with local repair.

  • Dynamic Resource Adjustment to Provide Seamless Streaming Services on Multimedia Mobile Cellular Networks

    Chow-Sing LIN  Fang-Zhi YEN  

     
    PAPER-Multimedia Systems for Communications

      Vol:
    E91-B No:2
      Page(s):
    553-561

    With the rapid advances in wireless network communication, multimedia presentation has become more applicable. However, due to the limited wireless network resource and the mobility of Mobile Host (MH), QoS for wireless streaming is much more difficult to maintain. How to decrease Call Dropping Probability (CDP) in multimedia traffic while still keeping acceptable Call Block Probability (CBP) without sacrificing QoS has become an significant issue in providing wireless streaming services. In this paper, we propose a novel Dynamic Resources Adjustment (DRA) algorithm, which can dynamically borrow idle reserved resources in the serving cell or the target cell for handoffing MHs to compensate the shortage of bandwidth in media streaming. The experimental simulation results show that compared with traditional No Reservation (NR), and Resource Reservation in the six neighboring cells (RR-nb), and Resource Reservation in the target cell(RR-t), our proposed DRA algorithm can fully utilize unused reserved resources to effectively decrease the CDP while still keeping acceptable CBP with high bandwidth utilization.

  • A Scalable and Practical Authentication Protocol in Mobile IP

    Yong Lee   Goo-Yeon LEE  Hwa-Jong KIM  

     
    LETTER-Network

      Vol:
    E91-B No:2
      Page(s):
    601-604

    Due to the proliferation of mobile devices connected to the Internet, implementing a secure and practical Mobile IP has become an important goal. A mobile IP can not work properly without authentication between the mobile node (MN), the home agent (HA) and the foreign agent (FA). In this paper, we propose a practical Mobile IP authentication protocol that uses public key cryptography only during the initial authentication. The proposed scheme is compatible with the conventional Mobile IP protocol and provides scalability against the number of MN's. We also show that the proposed protocol offers secure operation.

  • Energy-Efficient Processing of Complex Queries over a Wireless Broadcast Data Stream

    Yon Dohn CHUNG  Chang-Sup PARK  

     
    PAPER-Database

      Vol:
    E91-D No:1
      Page(s):
    15-22

    Energy-efficiency is one of the main concerns in the wireless information dissemination system. This paper presents a wireless broadcast stream organization scheme which enables complex queries (e.g., aggregation queries) to be processed in an energy-efficient way. For efficient processing of complex queries, we propose an approach of broadcasting their pre-computed results with the data stream, wherein the way of replication of index and pre-computation results are investigated. Through analysis and experiments, we show that the new approach can achieve significant performance enhancement for complex queries with respect to the access time and tuning time.

  • Fault-Tolerance for the Mobile Ad-Hoc Environment

    Taesoon PARK  Kwangho KIM  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Vol:
    E91-A No:1
      Page(s):
    413-416

    Fault-tolerance is an important design issue in building a reliable mobile computing system. This paper considers checkpointing recovery services for a mobile computing system based on the ad-hoc network environment. Since potential problems of this new environment are insufficient power and limited storage capacity, the proposed scheme tries to reduce disk access frequency for saving recovery information, and also the amount of information saved for recovery. A brief simulation study has been performed and the results show that the proposed scheme takes advantage of the existing checkpointing recovery schemes.

  • Topology Management and Route Establishment Method for Base Station Networks Using Cognitive Radio

    Yujin NOISHIKI  Misato SASAKI  Akira IDOUE  Kazunori TAKEUCHI  

     
    PAPER-Cognitive Network

      Vol:
    E91-B No:1
      Page(s):
    29-37

    Cognitive radio, which utilizes the radio frequency spectrum efficiently by recognizing radio resource availability, is an attractive technology for overcoming the shortage of radio frequency. From the perspective of networking, cognitive radio technologies are also useful since they allow flexible network construction. This paper proposes base station networks using cognitive radio technologies. In order to achieve efficient utilization of the radio frequency spectrum and flexible network construction, we also propose a topology management and route control method for our proposed base station network. Our method shares the status of the wireless links along with topology information and establishes routes by using this information. Through simulation, we evaluate that our method significantly improves the throughput by efficient utilization of the radio frequency spectrum. Moreover, we demonstrate that our method works well when the size of the network gets larger.

  • Informant Driven e-Health Service for Identification of Heart Rate Changes from Mental Stress

    Chan-Hyun YOUN  Jinho KIM  Hyewon SONG  Desok KIM  Eun Bo SHIM  

     
    LETTER-Networks

      Vol:
    E90-D No:12
      Page(s):
    2104-2107

    Recently, many studies reported various advanced e-Health service systems in patient care monitoring utilizing sensor networks and questionnaire systems. We propose an informant driven e-Health service system for the identification of heart rate related mental stress factors with a simple operation of informant-client model. Through performance analysis, we show that the proposed system is a cost-effective stress identification system applicable to mobile wireless networks.

  • A Generic Localized Broadcast Framework in Mobile Ad Hoc Ubiquitous Sensor Networks

    Hui XU  Brian J. D'AURIOL  Jinsung CHO  Sungyoung LEE  Byeong-Soo JEONG  

     
    PAPER

      Vol:
    E90-B No:12
      Page(s):
    3434-3444

    In this paper, we investigate the critical low coverage problem of position aware localized efficient broadcast in mobile ad hoc ubiquitous sensor networks and propose a generic framework for it. The framework is to determine a small subset of nodes and minimum transmission radiuses based on snapshots of network state (local views) along the broadcast process. To guarantee the accuracy of forward decisions, based on historical location information nodes will predict neighbors' positions at future actual transmission time and then construct predicted and synchronized local views rather than simply collect received "Hello" messages. Several enhancement technologies are also proposed to compensate the inaccuracy of prediction and forward decisions. To verify the effectiveness of our framework we apply existing efficient broadcast algorithms to it. Simulation results show that new algorithms, which are derived from the generic framework, can greatly increase the broadcast coverage ratio.

  • Localized Proxy-MIPv6 with Route Optimization in IP-Based Networks

    Sihun PARK  Namhi KANG  Younghan KIM  

     
    LETTER-Internet

      Vol:
    E90-B No:12
      Page(s):
    3682-3686

    Proxy Mobile IPv6 (PMIPv6) is designed not only to avoid tunneling overhead over the air but also to manage the mobility of hosts that are not equipped with any mobility management software. However, PMIPv6 leads to increasing signaling cost as mobile nodes move frequently because the protocol is based on the global mobility management protocol. In this letter we propose Localized PMIPv6 with Route Optimization (LPMIPv6-RO). Our numerical analysis shows that the proposed scheme outperforms previously proposed mobility protocols in terms of both signaling and packet delivery cost.

  • Activity Recorder: A Device to Record User's Activities Using RFIDs and Sensors

    Jun'ichi YURA  Hiroshi SAKAKIBARA  Jin NAKAZAWA  Hideyuki TOKUDA  

     
    PAPER

      Vol:
    E90-B No:12
      Page(s):
    3480-3495

    We have been investigating a new class of ubiquitous services, called Activity Logging, which takes advantage for private and public sensors and the RFID tags on real-world objects. The purpose of Activity Logging is to digitally record users' interests with real-world objects and users' context to describe the users' activity. Such digital information acquired from a range of sensors and tags, if being accumulated, forms a great data source for users to recall their activities later or to share the activities with others. This paper explores the design space to realize Activity Logging, and proposes a simple mobile device called Activity Recorder that marries public and private sensors to provide a powerful Activity Logging service. An Activity Recorder contains a range of private sensors, and has communication capability to work with public sensors around the user.

  • Mobile Positioning and Tracking Based on TOA/TSOA/TDOA/AOA with NLOS-Reduced Distance Measurements

    Wei-Kai CHAO  Kuen-Tsair LAY  

     
    PAPER-Navigation, Guidance and Control Systems

      Vol:
    E90-B No:12
      Page(s):
    3643-3653

    In this paper, we address the issue of mobile positioning and tracking after measurements have been made on the distances and possibly directions between an MS (mobile station) and its nearby base stations (BS's). The measurements can come from the time of arrival (TOA), the time sum of arrival (TSOA), the time difference of arrival (TDOA), and the angle of arrival (AOA). They are in general corrupted with measurement noise and NLOS (non-line-of-sight) error. The NLOS error is the dominant factor that degrades the accuracy of mobile positioning. Assuming specific statistic models for the NLOS error, however, we propose a scheme that significantly reduces its effect. Regardless of which of the first three measurement types (i.e. TOA, TSOA, or TDOA) is used, the proposed scheme computes the MS location in a mathematically unified way. We also propose a method to identify the TOA measurements that are not or only slightly corrupted with NLOS errors. We call them nearly NLOS-error-free TOA measurements. From the signals associated with TOA measurements, AOA information can be obtained and used to aid the MS positioning. Finally, by combining the proposed MS positioning method with Kalman filtering, we propose a scheme to track the movement of the MS.

  • An On-Demand QoS Service Composition Protocol for MANETs

    Songqiao HAN  Shensheng ZHANG  Guoqi LI  Yong ZHANG  

     
    LETTER-Networks

      Vol:
    E90-D No:11
      Page(s):
    1877-1880

    This paper presents an active quality of service (QoS) aware service composition protocol for mobile ad hoc networks (MANETs), with the goal of conserving resources subject to QoS requirements. A problem of QoS based service composition in MANETs is transformed into a problem of the service path discovery. We extend Dynamic Source Routing protocol to discover and compose elementary services across the network. Some message processing measures are taken to effectively reduce control overhead. Simulation results demonstrate the effectiveness of the proposed protocol.

  • Development of a Topology Controllable Testing Environment for Mobile Ad Hoc Network Software

    Atsushi KAWANO  Tomoyuki OHTA  Kaori MAEDA  Kenji ISHIDA  Yoshiaki KAKUDA  

     
    LETTER

      Vol:
    E90-B No:11
      Page(s):
    3104-3107

    A mobile ad hoc network is an autonomous wireless network which consists of mobile nodes without any base stations. Many routing schemes and services have been proposed for mobile ad hoc networks. However, since these schemes tend to be evaluated through simulation experiments, it is not known whether they work effectively in real environments or not. Therefore, in order to verify their practical use in mobile ad hoc networks, it is necessary to perform field experiments using actual mobile nodes. If the network size is large, it is difficult to perform field experiments due to problems with limited battery, difficulty of topology control and so on. Realization of rapid topology change of the ad hoc networks topology is especially difficult. In order to solve this problem, this paper proposes a testing environment for mobile ad hoc network software, which emulates field experiments in wired networks.

  • IP Encapsulation Mechanism for Efficient RSVP Tunnel in Next Generation Mobile Networks

    Jeong-Beom KIM  Ki-Sik KONG  Chong-Sun HWANG  

     
    PAPER

      Vol:
    E90-B No:11
      Page(s):
    3052-3060

    This paper describes IP encapsulation technologies for the Mobile RSVP tunnel in next generation networks. Bandwidth is inherently a scarce network resource, and hence signaling overhead should be minimized as much as possible. However, because of duplicate RSVP messages, the existing RSVP tunnel-based mechanism suffers from bandwidth overhead and tunnel problems. The waste of network resources prevents low-cost network construction and the maximization of integrated network utility, which are the goals of next generation networks, and can lower the reliability of networks with the increase of service subscribers and resultant expansion of resource consumption. To solve these problems and to support end-to-end QoS efficiently, RSVP needs to be changed at a minimum degree. In this paper, a new IP encapsulation mechanism for saving of network resources in the Mobile RSVP tunnel (IPEnc-RSVP) is proposed. In order to compare the proposed mechanism and the existing RSVP tunnel-based mechanism in Mobile IP-based networks, we perform a comparative analysis of bandwidth consumption gain, throughput, mean packet delay, etc., and demonstrate the superiority of the proposed mechanism. In addition, we analyze several performance factors of RSVP protocols by applying the existing RSVP tunnel-based mechanism and the proposed mechanism, respectively.

  • A Proposal of Wireless Network Routing Protocol for Heterogeneous Mobility

    Tomohiko YAGYU  Masahiro JIBIKI  Kenichi YOSHIDA  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2693-2701

    Most wireless networks consist of heterogeneous nodes with diverse characteristics. These heterogeneous nodes have various moving characteristics such as speed and pausing time. Since conventional wireless routing schemes are designed for networks with homogeneous mobility, it is difficult to accomplish communication without degrading its quality, e.g., packet reachability and delay, in networks with heterogeneous mobility. In this paper, we propose efficient extensions of a proactive routing protocol to achieve sufficient communication quality in networks with heterogeneous mobility. The proposed extensions consist of three features, i.e., differential topology update, unidirectional movement notification and link quality based route calculation. Complementary actions among these functions can improve communication quality with acceptable control overhead. Simulation results reveal that the proposed scheme can achieve higher packet reachability and lower delay with low control overhead compared with existing routing schemes.

  • An Efficient Cache Invalidation Method in Mobile Client/Server Environment

    Hakjoo LEE  Jonghyun SUH  Sungwon JUNG  

     
    PAPER-Database

      Vol:
    E90-D No:10
      Page(s):
    1672-1677

    In mobile computing environments, cache invalidation techiniques are widely used. However, theses techniques require a large-sized invalidation report and show low cache utilization under high server update rate. In this paper, we propose a new cache-level cache invalidation technique called TTCI (Timestamp Tree-based Cache Invalidation technique) to overcome the above two problems. TTCI also supports selective tuning for a cache-level cache invalidation. We show in our experiment that our technique requires much smaller size of cache invalidation report and improves cache utilization.

  • Autonomous Correlated Services Access for High Response in Multi-Agent Systems

    Xiaodong LU  Kinji MORI  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2712-2719

    To meet users' multi-service requests under dynamic and heterogenous environment with high-assurance, the Autonomous Network-Based Integration System based on Faded Information Field (FIF) has been proposed, which permits to actively integrate the correlated information services according to the current situation of the system. However, the increase in the total number of users' requests and changes in users' preferences cause the unbalancing load in the system and the overload in the locality. In this paper, based on the autonomous access distribution in the locality, a new approach of autonomous correlated services access is proposed to reduce the load of the system and achieve the adaptability and timeliness of correlated services utilization. We proved the effectiveness of the proposed technology through the simulation and the results show that the system can improve the average response time not only for joint requests of correlated services, but also for separate requests of each service under changing environments.

361-380hit(969hit)