The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] NIST(134hit)

41-60hit(134hit)

  • Maximally Permissive Similarity Enforcing Supervisors for Nondeterministic Discrete Event Systems under Event and State Observations

    Katsuyuki KIMURA  Shigemasa TAKAI  

     
    PAPER-Systems and Control

      Vol:
    E97-A No:7
      Page(s):
    1500-1507

    In this paper, we consider a similarity control problem for plants and specifications, modeled as nondeterministic automata. This problem requires us to synthesize a nondeterministic supervisor such that the supervised plant is simulated by a given specification. We assume that a supervisor can observe not only the event occurrence but also the current state of the plant. First, we derive a necessary and sufficient condition for the existence of a complete supervisor, which is a solution to the similarity control problem. Then, we present a method for synthesizing a maximally permissive similarity enforcing supervisor when the existence condition is satisfied.

  • Bisimilarity Control of Nondeterministic Discrete Event Systems under Event and State Observations

    Katsuyuki KIMURA  Shigemasa TAKAI  

     
    PAPER-Formal Verification

      Vol:
    E97-D No:5
      Page(s):
    1140-1148

    In this paper, we study a supervisory control problem for plants and specifications modeled by nondeterministic automata. This problem requires to synthesize a nondeterministic supervisor such that the supervised plant is bisimilar to a given specification. We assume that a supervisor can observe not only the event occurrence but also the current state of the plant, and introduce a notion of completeness of a supervisor which guarantees that all nondeterministic transitions caused by events enabled by the supervisor are defined in the supervised plant. We define a notion of partial bisimulation between a given specification and the plant, and prove that it serves as a necessary and sufficient condition for the existence of a bisimilarity enforcing complete supervisor.

  • The Impact of Opportunistic User Scheduling on Outage Probability of CR-MIMO Systems

    Donghun LEE  Byung Jang JEONG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:3
      Page(s):
    686-690

    In this paper, we study the impact of opportunistic user scheduling on the outage probability of cognitive radio (CR) multiple-input multiple-output (MIMO) systems in the high power region where the peak transmit power constraint is higher than the peak interference constraint. The primary contributions of this paper are the derivation of exact closed-form expressions of the proposed scheduled CR-MIMO systems for outage probability and asymptotic analysis to quantify the diversity order and signal to noise ratio (SNR) gain. Through exact analytical results, we provide the achievable outage probability of the proposed scheduled systems as a function of SNR. Also, through asymptotic analysis, we show that the scheduled CR-MIMO systems provide some diversity order gain over the non-scheduled CR-MIMO systems which comes from multi-user diversity (MUD). Also, the SNR gain of the proposed scheduled systems is identical to that of the non-scheduled CR-MIMO systems.

  • Teachability of a Subclass of Simple Deterministic Languages

    Yasuhiro TAJIMA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E96-D No:12
      Page(s):
    2733-2742

    We show teachability of a subclass of simple deterministic languages. The subclass we define is called stack uniform simple deterministic languages. Teachability is derived by showing the query learning algorithm for this language class. Our learning algorithm uses membership, equivalence and superset queries. Then, it terminates in polynomial time. It is already known that simple deterministic languages are polynomial time query learnable by context-free grammars. In contrast, our algorithm guesses a hypothesis by a stack uniform simple deterministic grammar, thus our result is strict teachability of the subclass of simple deterministic languages. In addition, we discuss parameters of the polynomial for teachability. The “thickness” is an important parameter for parsing and it should be one of parameters to evaluate the time complexity.

  • Deployment of OpenFlow/SDN Technologies to Carrier Services Open Access

    Yoichi SATO  Ichiro FUKUDA  Tomonori FUJITA  

     
    INVITED PAPER

      Vol:
    E96-B No:12
      Page(s):
    2946-2952

    The use of computing resources on network is becoming active in the Internet and private networks. OpenFlow/Software-Defined Networking (SDN) is drawing attention as a method to control network virtualization for the cloud computing services and other carrier services. This paper introduces examples of OpenFlow/SDN technologies applied to commercial cloud services. Various activities to expand coverage over commercial carrier networks are also mentioned.

  • Opportunistic Feedback and User Selection for Multiuser Two-Way Amplify-and-Forward Relay in Time-Varying Channels

    Yong-Up JANG  Eui-Rim JEONG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:10
      Page(s):
    2661-2667

    This paper proposes an opportunistic feedback and user selection method for a multiuser two-way relay channel (MU-TWRC) in a time-varying environments where a base station (BS) and a selected mobile station (MS), one of K moving MSs, exchange messages during two time slots via an amplify-and-forward relay station. Specifically, under the assumption of perfect channel reciprocity, we analyze the outage probabilities of several channel feedback scenarios, including the proposed scheme. Based on the analysis, the transmission rates are optimized and the optimal user selection method is proposed to maximize the expected sum throughput. The simulation results indicate that, with opportunistic feedback, the performance can be significantly improved compared to that without feedback. Moreover, the performance is nearly identical to that with full feedback, and close to the case of perfect channel state information at BS for low mobility MSs.

  • A Bayesian Framework Using Multiple Model Structures for Speech Recognition

    Sayaka SHIOTA  Kei HASHIMOTO  Yoshihiko NANKAKU  Keiichi TOKUDA  

     
    PAPER-Speech and Hearing

      Vol:
    E96-D No:4
      Page(s):
    939-948

    This paper proposes an acoustic modeling technique based on Bayesian framework using multiple model structures for speech recognition. The aim of the Bayesian approach is to obtain good prediction of observation by marginalizing all variables related to generative processes. Although the effectiveness of marginalizing model parameters was recently reported in speech recognition, most of these systems use only “one” model structure, e.g., topologies of HMMs, the number of states and mixtures, types of state output distributions, and parameter tying structures. However, it is insufficient to represent a true model distribution, because a family of such models usually does not include a true distribution in most practical cases. One of solutions of this problem is to use multiple model structures. Although several approaches using multiple model structures have already been proposed, the consistent integration of multiple model structures based on the Bayesian approach has not seen in speech recognition. This paper focuses on integrating multiple phonetic decision trees based on the Bayesian framework in HMM based acoustic modeling. The proposed method is derived from a new marginal likelihood function which includes the model structures as a latent variable in addition to HMM state sequences and model parameters, and the posterior distributions of these latent variables are obtained using the variational Bayesian method. Furthermore, to improve the optimization algorithm, the deterministic annealing EM (DAEM) algorithm is applied to the training process. The proposed method effectively utilizes multiple model structures, especially in the early stage of training and this leads to better predictive distributions and improvement of recognition performance.

  • Interference Monitoring-Based Spectrum Management to Maximize White Space Utilization for Cognitive Radios

    Kazushi MURAOKA  Hiroto SUGAHARA  Masayuki ARIYOSHI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E96-B No:3
      Page(s):
    869-879

    For opportunistic spectrum access (OSA), spectrum management is a key function to effectively utilize white space without causing harmful interference to incumbent receivers. Geo-location database approaches using radio propagation estimation have been regarded as practical spectrum management methods. However, propagation models inevitably fail to accurately estimate the path loss in actual radio environments, resulting in estimation error of carrier to interference ratio (CIR) of the incumbent receivers. This could prevent white space from being efficiently utilized, because the allowable transmit power of the opportunistic system has to be limited to keep the CIR at the required level. To improve the accuracy of CIR estimation, we propose the new concept of Interference Monitoring which works in combination with spectrum management. In this method, a monitoring node located near the incumbent receivers actually measures both the interference signals and the incumbent signals. Using the measurement results, the CIR estimates are corrected based on the minimum mean square error (MMSE) criterion. The proposed Interference Monitoring can be extended to establish cooperation among multiple monitoring nodes and thus spatial diversity. Analytical evaluations assuming a simple cellular system model show that Interference Monitoring can more accurately estimate CIR, and thus it can significantly increase the allowable transmit power. For an urban macro cell, Interference Monitoring with a single node achieved about a 6.5 dB increase in the transmit power; Cooperative Interference Monitoring with 4 nodes achieved about a 13.5 dB increase. Thus, Interference Monitoring-based spectrum management can maximize opportunities for white space utilization without imposing additional interference to the incumbent system.

  • Outage Analysis of Cognitive Spectrum Sharing for Two-Way Relaying Schemes with Opportunistic Relay Selection over i.n.i.d. Rayleigh Fading Channels

    Tran Trung DUY  Hyung Yun KONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    348-351

    In this letter, we analyze the outage performance of cognitive spectrum sharing in two-way relaying systems. We derive expressions of outage probability for the primary and secondary network over independent but not necessarily identically distributed (i.n.i.d.) Rayleigh fading channels. Monte Carlo simulations are presented to verify the theoretical analyses.

  • Security of Hash-then-CBC Key Wrapping Revisited

    Yasushi OSAKI  Tetsu IWATA  

     
    PAPER-Symmetric Key Cryptography

      Vol:
    E96-A No:1
      Page(s):
    25-34

    Key wrapping schemes are used to encrypt data of high entropy, such as cryptographic keys. There are two known security definitions for key wrapping schemes. One captures the security against chosen plaintext attacks (called DAE-security), and the other captures known plaintext attacks (called AKW-security). In this paper, we revisit the security of Hash-then-CBC key wrapping schemes. In [17], Osaki and Iwata showed that the UCC-then-CBC key wrapping scheme, a key wrapping scheme that uses the UCC hash function and CBC mode, has provable AKW-security. In this paper, we show that the scheme achieves the stronger notion of DAE-security. We also show our proof in the variable input length setting, where the adversary is allowed making queries of varying lengths. Furthermore, we consider the scheme that incorporates the use of headers. To handle such a setting, we generalize the previous definition of the UCC hash function to the variable input length setting and to take the header as its input, and show an efficient construction that meets the definition.

  • Effect of Multiple Antennas on the Transport Capacity in Large-Scale Ad Hoc Networks

    Won-Yong SHIN  Koji ISHIBASHI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E95-B No:10
      Page(s):
    3113-3119

    A one-dimensional ad hoc network with a single active source–destination pair is analyzed in terms of transport capacity, where each node uses multiple antennas. The analysis is based on using a multi-hop opportunistic routing transmission in the presence of fading. Specifically, the lower and upper bounds on the transport capacity are derived and their scaling law is analyzed as the node density, λ, is assumed to be infinitely large. The lower and upper bounds are shown to have the same scaling (ln λ)1/α, where α denotes the path-loss exponent. We also show that using multiple antennas at each node does not fundamentally change the scaling law.

  • Opportunistic Cooperative Positioning in OFDMA Systems

    Ziming HE  Yi MA  Rahim TAFAZOLLI  

     
    LETTER-Information Theory

      Vol:
    E95-A No:9
      Page(s):
    1642-1645

    This letter presents a novel opportunistic cooperative positioning approach for orthogonal frequency-division multiple access (OFDMA) systems. The basic idea is to allow idle mobile terminals (MTs) opportunistically estimating the arrival timing of the training sequences for uplink synchronization from active MTs. The major advantage of the proposed approach over state-of-the-arts is that the positioning-related measurements among MTs are performed without the paid of training overhead. Moreover, Cramer-Rao lower bound (CRLB) is utilized to derive the positioning accuracy limit of the proposed approach, and the numerical results show that the proposed approach can improve the accuracy of non-cooperative approaches with the a-priori stochastic knowledge of clock bias among idle MTs.

  • Exact Average SER Performance Analysis for the Nth Best Opportunistic Amplify-and-Forward Relay Systems

    Sangho NAM  Kyunbyoung KO  Daesik HONG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:5
      Page(s):
    1852-1855

    This letter presents a method for obtaining an exact average symbol error rate (ASER) of M-phase shift keying (M-PSK) transmission for the Nth best opportunistic amplify-and-forward (OAF) relay systems over Rayleigh fading channels. This approach begins with deriving the relay selection probability when a relay is selected as the Nth best one with respect to the received signal-to-noise ratio. We then derive the modified moment generating function (MGF) for the Nth best OAF relay systems by taking the given Nth best-relay selection probability into consideration. Based on the modified MGF, we derive the exact ASER which accurately explicates the Nth best OAF relay system characteristics. Simulation results confirm the exactness of the analysis results for M-PSK transmission with respect to the number of relays, the Nth best relay selection, and the relay position.

  • A Tree-Structured Deterministic Small-World Network

    Shi-Ze GUO  Zhe-Ming LU  Guang-Yu KANG  Zhe CHEN  Hao LUO  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E95-D No:5
      Page(s):
    1536-1538

    Small-world is a common property existing in many real-life social, technological and biological networks. Small-world networks distinguish themselves from others by their high clustering coefficient and short average path length. In the past dozen years, many probabilistic small-world networks and some deterministic small-world networks have been proposed utilizing various mechanisms. In this Letter, we propose a new deterministic small-world network model by first constructing a binary-tree structure and then adding links between each pair of brother nodes and links between each grandfather node and its four grandson nodes. Furthermore, we give the analytic solutions to several topological characteristics, which shows that the proposed model is a small-world network.

  • Opportunistic Scheduling for Hybrid Network Coding and Cooperative Relaying Techniques in Wireless Networks Open Access

    Lin SHAN  Hidekazu MURATA  Sonia AISSA  Susumu YOSHIDA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E95-B No:5
      Page(s):
    1751-1760

    With the purpose of improving the performance of next generation wireless networks, cooperative relaying (CoR) and network coding (NC) are promising techniques. The number of time slots required for NC in bidirectional transmission is less than that required for CoR, and hence, NC can achieve higher throughput performance than CoR. However, the disadvantage of NC is that asymmetric traffic ratio conditions might cause a significant decrease in the bidirectional throughput. In contrast, CoR is robust to asymmetric traffic ratio conditions. In this paper, in order to improve the throughput of NC even under asymmetric traffic ratio conditions, we propose an opportunistic scheduling scheme for hybrid NC and CoR. In the proposed scheduling scheme, the transmission protocol with best throughput performance can be adaptively selected based on instantaneous channel state information. Computer simulation results reveal that the proposed scheduling scheme not only achieve higher throughput than the conventional scheduling scheme but is also robust against asymmetric traffic ratio conditions. By adjusting the scheduler's parameter, the proposed scheduling scheme can provide a tradeoff between the throughput and the traffic ratio. Moreover, in certain cases, maximizing the throughput of NC and guaranteeing the offered traffic ratio can be achieved at the same time.

  • Network Coordinated Opportunistic Beamforming in Downlink Cellular Networks

    Won-Yong SHIN  Bang Chul JUNG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:4
      Page(s):
    1393-1396

    We propose a network coordinated opportunistic beamforming (NC-OBF) protocol for downlink K-cell networks with M-antenna base stations (BSs). In the NC-OBF scheme, based on pseudo-randomly generated BF vectors, a user scheduling strategy is introduced, where each BS opportunistically selects a set of mobile stations (MSs) whose desired signals generate the minimum interference to the other MSs. Its performance is then analyzed in terms of degrees-of-freedom (DoFs). As our achievability result, it is shown that KM DoFs are achievable if the number N of MSs in a cell scales at least as SNRKM-1, where SNR denotes the received signal-to-noise ratio. Furthermore, by deriving the corresponding upper bound on the DoFs, it is shown that the NC-OBF scheme is DoF-optimal. Note that the proposed scheme does not require the global channel state information and dimension expansion, thereby resulting in easier implementation.

  • Call Admission Control on Single Node Networks under Output Rate-Controlled Generalized Processor Sharing (ORC-GPS) Scheduler

    Masaki HANADA  Hidenori NAKAZATO  Hitoshi WATANABE  

     
    PAPER-Network

      Vol:
    E95-B No:2
      Page(s):
    401-414

    Multimedia applications such as music or video streaming, video teleconferencing and IP telephony are flourishing in packet-switched networks. Applications that generate such real-time data can have very diverse quality-of-service (QoS) requirements. In order to guarantee diverse QoS requirements, the combined use of a packet scheduling algorithm based on Generalized Processor Sharing (GPS) and leaky bucket traffic regulator is the most successful QoS mechanism. GPS can provide a minimum guaranteed service rate for each session and tight delay bounds for leaky bucket constrained sessions. However, the delay bounds for leaky bucket constrained sessions under GPS are unnecessarily large because each session is served according to its associated constant weight until the session buffer is empty. In order to solve this problem, a scheduling policy called Output Rate-Controlled Generalized Processor Sharing (ORC-GPS) was proposed in [17]. ORC-GPS is a rate-based scheduling like GPS, and controls the service rate in order to lower the delay bounds for leaky bucket constrained sessions. In this paper, we propose a call admission control (CAC) algorithm for ORC-GPS, for leaky-bucket constrained sessions with deterministic delay requirements. This CAC algorithm for ORC-GPS determines the optimal values of parameters of ORC-GPS from the deterministic delay requirements of the sessions. In numerical experiments, we compare the CAC algorithm for ORC-GPS with one for GPS in terms of schedulable region and computational complexity.

  • Opportunistic Cooperative Multicast Based on Coded Cooperation

    Jiang YU  Youyun XU  Jinlong WANG  

     
    LETTER

      Vol:
    E94-B No:12
      Page(s):
    3378-3381

    In this letter, we study cooperative transmission in wireless multicast networks. An opportunistic cooperative multicast scheme based on coded cooperation (OCM-CC) is proposed and its closed-form expression of outage performance is obtained. Through numeric evaluation, we analyze its outage probability with different numbers of relays and different cooperative ratios.

  • Accelerated Adaptive Deterministic Packet Marking

    Chengwei WAN  Julong LAN  Hongchao HU  

     
    LETTER-Internet

      Vol:
    E94-B No:12
      Page(s):
    3592-3594

    The accurate and fast estimation of link price is the key component of network-based congestion control schemes. A fast estimation method A2DPM is presented. Multiple hashes on IP identifier of packet header are adopted to accelerate the side information transmission, so accurate estimation of maximum price on the flow forwarding path can be realized after the receipt of just a few probe packets, and the sender is capable of reacting to congestion more quickly, making it suitable to meet the demands of dynamic networks.

  • A Simple Model for Nonsaturated Opportunistic Spectrum Access Networks

    Yutae LEE  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E94-B No:11
      Page(s):
    3125-3127

    We propose a simple approximate model for unslotted opportunistic spectrum access networks under nonsaturation conditions. The main simplification we introduce is that all secondary users, except a tagged one, in nonsaturated setting can be approximated by saturated ones with a scaled version of backoff interval. We analyze the approximate model and verify the model using simulations.

41-60hit(134hit)