Kazuo MORI Katsuhiro NAITO Hideo KOBAYASHI Hamid AGHVAMI
The traffic with asymmetry between uplink and downlink has recently been getting remarkable on mobile communication systems providing multimedia communication services. In the future mobile communications, the accommodation of asymmetric traffic is essential to realize efficient multimedia mobile communication systems. This paper discusses asymmetric traffic accommodation in CDMA/FDD cellular packet communication systems and proposes its efficient scheme using an adaptive cell sizing technique. In the proposed scheme, each base station autonomously controls its coverage area so that almost the same communication quality can be achieved across the service area under the asymmetric traffic conditions. We present some numerical examples to demonstrate the effectiveness of the proposed scheme by using computer simulation. The simulation results show that, under asymmetric traffic conditions, the proposed scheme can provide fair communication quality across the service area in both links and can improve total transmission capacity in the uplink.
Masayoshi NAITO Yohko MICHIOKA Kuniaki OZAWA Yoshitoshi ITO Masashi KIGUCHI Tsuneo KANAZAWA
A communication means is presented for patients with amyotrophic lateral sclerosis in totally locked-in state who are completely unable to move any part of the body and have no usual communication means. The method utilizes changes in cerebral blood volume accompanied with changes in brain activity. When a patient is asked a question and the answer to it is 'yes', the patient makes his or her brain active. The change in blood volume at the frontal lobe is detected with near-infrared light. The instantaneous amplitude and phase of the change are calculated, and the maximum amplitude and phase change are obtained. The answer 'yes' or 'no' of the patient is detected using a discriminant analysis with these two quantities as variables. The rate of correct detection is 80% on average.
Hirosato SEKI Hiroaki ISHII Masaharu MIZUMOTO
Yubazaki et al. have proposed "single input rule modules connected type fuzzy reasoning method" (SIRMs method, for short) whose final output is obtained by summarizing the product of the importance degrees and the inference results from single input fuzzy rule module. Another type of single input type fuzzy reasoning method proposed by Hayashi et al. (we call it "Single Input Connected fuzzy reasoning method" (SIC method, for short) in this paper) uses rule modules to each input item as well as SIRMs method. We expect that inference results of SIRMs method and SIC method have monotonicity if the antecedent parts and consequent parts of fuzzy rules in SIRMs rule modules have monotonicity. However, this paper points out that even if fuzzy rules in SIRMs rule modules have monotonicity, the inference results do not necessarily have monotonicity. Moreover, it clarifies the conditions for the monotonicity of inference results by SIRMs method and SIC method.
This letter proposes a new bandpass shielding enclosure (BPSE) for modern handheld communication devices. This enclosure is characterized by high transmittance at the specified wireless signal band and high shielding effectiveness (SE) outside this band. In addition, it has little influence on the impedance-matching bandwidth and antenna patterns of an internal antenna embedded inside the device. A prototype was created, simulated and measured. The simulated and measured results demonstrate the promising performance of this newly proposed shielding enclosure.
Takehiro TAKAHASHI Hironori OKANIWA Takashi SAKUSABE Noboru SCHIBUYA
In this research, the performance degradation of the digital electronic equipment under electromagnetic (EM) disturbance was studied in order to investigate the interference of intra-equipment. To develop the evaluation method of the performance degradation, some communication indexes were measured under EM disturbance. From some experimental results, it is known that the performance degradation of the electronic equipment was estimated by the degradation of "through-put," one of the communication performance indexes. For further investigation of the interference of intra-equipment, the near EM field from a PCB of the electronic equipment and its performance degradation under EM disturbance were measured and compared. From the measured results, the relationship between near field measurement and performance degradation could be obtained in some extent. These facts enable us that the weak area under the EM disturbance application on PCB can be foreseen by measuring the near field emission from the equipment and vise versa.
Qiang CHEN Yasunori KOMUKAI Kunio SAWAYA
The peak SAR values of two-element array antennas for mobile handsets in the vicinity of a spherical phantom of a human head are evaluated numerically as a function of the distance between the array antenna and the head phantom when the two elements of a two-element array antenna are either co-phase voltage-fed or reverse-phase voltage-fed. It is found that relation between the worst case of the SAR and the phase difference of array elements strongly depends on the distance. When part of the head phantom is located in the reactive near-field region of the array antenna, although the co-phase feed SAR value is slightly smaller than the reverse-phase feed SAR value, the SAR value is practically independent of the phase difference, but when the head is completely outside the reactive near-field region, the co-phase feed SAR value is larger than the reverse-phase feed SAR value.
Mohsen ASLONI Khayrollah HADIDI Abdollah KHOEI
In this paper, a new operational amplifier is presented that improves the specifications such as dc gain, common mode rejection ratio. To obtain these improvements, we have used the two important concepts of feedback and bulk amplification.
Yoshikazu HANATANI Yuichi KOMANO Kazuo OHTA Noboru KUNIHIRO
Although a great deal of research has been done on electronic cash schemes with blind multisignatures to prevent an insider attack, there is no discussion of a formal security model in the literature. Firstly we discussed the security model of e-cash schemes based on the blind multisignature scheme against a (restricted) attack model and proposed a concrete scheme proven to be secure in the model [1]; however, this attack model disallows an attacker from corrupting an issuing bank and shops in the forgery game. In this paper, first, we reconsider the security model to remove the restriction of the attack model. Second, we propose a new untraceable e-cash scheme with a blind multisignature scheme and prove that the proposed scheme is secure against the (non-restricted) attacks under the DDH assumption in the random oracle model.
A nonlinear harmonic estimator (NHE) is proposed for extracting a harmonic signal and its fundamental frequency in the presence of white noise. This estimator is derived by applying an extended complex Kalman filter (ECKF) to a multiple sinusoidal model with state-representation and then efficiently specializing it for the case of harmonic estimation. The effectiveness of the NHE is verified using computer simulations.
This paper proposes the most effective deployment scenario of the passive double-star (PON) system to provide multiple broadband services, such as high speed Internet access and broadcast services. The deployment costs of the two major PON technologies, wavelength division multiplexing (WDM) and 10 Gbps time division multiplexing (TDM), are analyzed using the latest cost trend and the most popular access network architecture. These two technologies are compared using the cost analysis results to identify the cost-effective scenarios of PON system deployment. Based on the comparison, this paper reveals that the WDM network becomes cost effective when the service penetration and the shift ratio becomes high.
Young-Jin RYOO Kyu-Ha SONG Whan-Woo KIM
In electronic warfare support systems, the analysis of PRI (Pulse Repetition Interval) modulation characteristics for a radar pulse signal has attracted much interest because of the problem of the identification ambiguity in dense electronic warfare signal environments. A new method of recognizing the PRI modulation type of a radar pulse signal is proposed for electronic warfare support. The proposed method recognizes the PRI modulation types using classifiers based on the property of the autocorrelation of the PRI sequences for each PRI modulation type. In addition, the proposed method estimates the PRI modulation period for the PRI modulation type with the periodicity. Simulation results are presented to show the performance of the proposed method.
Abdullah AL AMIN Kenji SAKURAI Tomonari SHIODA Masakazu SUGIYAMA Yoshiaki NAKANO
An 8ch, 400 GHz monolithically integrated WDM channel selector featuring an array of quantum well semiconductor optical amplifiers (SOA) and arrayed waveguidegrating demultiplexer is presented. Reduction of fabrication complexity was achieved by using a single step selective area MOVPE to realize the different bandgap profiles for the SOA array and passive region. The selective growth mask dimensions were optimized by simulation. Dry-etching with short bending radii of 200 µm resulted in compact device size of 7 mm2.5 mm. Static channel selection with high ON-OFF ratio of >40 dB was achieved.
Abubaker KHUMSI Kazuo MORI Katsuhiro NAITO Hideo KOBAYASHI Hamid AGHVAMI
In this letter we investigated the packet transmission control in downlink CDMA cellular systems. The downlink packet transmission control scheme based on the soft handoff status was proposed to enhance the system performance. The proposed scheme controls the downlink packet transmissions by employing a transmission window which is individually resolved to each mobile station according to its propagation condition and soft handoff status. Computer simulation shows that compared with the conventional scheme the proposed scheme improved the delay performance and fairness of service in packet reception.
Shojiro KAWAKAMI Yoshihiko INOUE
Autocloned photonic crystals have corrugated multilayer structure. By related process technology, we can easily fabricate an array of polarizers or waveplates. Patterned photonic crystals are versatile component of many optical systems. This paper focuses on their use in optical microscopy. The main topics are: 1. Use of polarization imaging in microscopy, 2. generation of radial/circular polarization by a polarizer having concentric corrugations, 3. a "longitudinal polarization slit" (a new component) and its function in confocal microscopy, and 4. a polarization converter for generating "z-polarized" light at the focal point. In every application above, autocloned photonic crystals play a central role.
The present paper introduces the construction of a class of sequence sets with zero-correlation zones called zero-correlation zone sequence sets. The proposed zero-correlation zone sequence set can be generated from an arbitrary perfect sequence, the length of which is longer than 4. The proposed sets of ternary sequences, which can be constructed from an arbitrary perfect sequence, can successfully provide CDMA communication without co-channel interference. In an ultrasonic synthetic aperture imaging system, the proposed sequence set can improve the signal-to-noise ratio of the acquired image.
Akira ENOKIHARA Hiroyoshi YAJIMA Hiroshi MURATA Yasuyuki OKAMURA
A novel structure of a resonator type guided-wave electro-optic intensity modulator is introduced that uses a higher-order harmonic resonant electrode of coupled microstrip lines combined with polarization-reversed structure. The light modulation cancellation caused by the light transit-time effect in the resonant electrode, which is longer than the wavelength of the standing wave, is compensated for to enhance modulation efficiency. The modulator for 26 GHz operation was designed and fabricated with a LiTaO3 substrate. The modulation electrode is 9.03 mm long for seventh order harmonic resonance by RF signal. The workability of the modulator was confirmed by experiments with 1.3 µm wavelength light.
Isamu MATSUNAMI Akihiro KAJIWARA
Ultra-wideband impulse-radio systems have the ability to resolve multiple paths of the transmit radio and to mitigate the fading. Rake reception is capable of combining these paths, thereby improving the signal-to-noise ratio. In LOS channel, however, the improvement may be comparatively small for the cost of increasing receiver system complexity. This is because the LOS path should be dominant for the total energy in all paths. In this paper the distribution of the energy captured by Rake receiver is first presented for 160 measured LOS channel cases and then discussed. Rake reception with reflector is next suggested in order to effectively increase the signal energy without increasing the complexity, that is, increased number of Rake fingers. The use of reflector is also suggested for non-LOS channel and experimentally discussed where the Rake gain is compared with conventional Rake without reflector. The measurement results show the usefulness.
Heeyoul KIM Younho LEE Yongsu PARK Hyunsoo YOON
To control various access privileges in group-oriented applications having multiple data streams, we present a novel reactive key management scheme where each member can obtain the key of a data stream from public parameters only when necessary. Compared with the previous schemes, this scheme significantly reduces the amount of rekey messages for dynamic membership change due to its reactive nature.
Takayuki WARABINO Keizou SUGIYAMA
This paper proposes a new identifier scheme for Internet Indirection Infrastructure (i3). i3 is an overlay network on top of IP, and realizes rendezvous-based communications. It provides a general solution to deal with communication primitives such as host mobility, multicast and anycast. Although i3 provides flexible communication mechanisms, it is not optimized for mobile and wireless communications. Thus, three key problems still remain to be addressed: header overhead, multiple trigger updates and detection of a close i3 server after handover. The proposed identifier scheme, called local ID, significantly reduces the overhead without sacrificing the flexibility of i3. In a typical case, the local ID makes the total header size nearly half that of the original protocol. This paper also discusses how to adapt the local ID to various types of i3 primitives, so that a mobile host can receive all the benefits of i3 communications.
The transport network paradigm is changing as evidenced by IP convergence and the divergence of architectures and technologies. Harnessing the full power of light will spur the creation of new broadband and ubiquitous services networks. To attain this, however, not only must photonic technologies be optimized, but they must also be coordinated with complementary electrical technologies. With regard to photonic network design technologies, further developments are necessary including very large scale network design, quasi-dynamic network design, and multi-layer optical path network design.