The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PU(3318hit)

761-780hit(3318hit)

  • Isolated VM Storage on Clouds

    Jinho SEOL  Seongwook JIN  Seungryoul MAENG  

     
    LETTER-Dependable Computing

      Pubricized:
    2015/06/08
      Vol:
    E98-D No:9
      Page(s):
    1706-1710

    Even though cloud users want to keep their data on clouds secure, it is not easy to protect the data because cloud administrators could be malicious and hypervisor could be compromised. To solve this problem, hardware-based memory isolation schemes have been proposed. However, the data in virtual storage are not protected by the memory isolation schemes, and thus, a guest OS should encrypt the data. In this paper, we address the problems of the previous schemes and propose a hardware-based storage isolation scheme. The proposed scheme enables to protect user data securely and to achieve performance improvement.

  • Utility-Based Distributed Association Control Scheme with User Guidance for IEEE802.11 Wireless LANs

    Takahiro IWAMI  Irda ROSLAN  Yumi TAKAKI  Kyoko YAMORI  Chikara OHTA  Hisashi TAMAKI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E98-B No:8
      Page(s):
    1700-1714

    At present, wireless local area networks (WLANs) based on IEEE802.11 are widely deployed in both private premises and public areas. In a public environment offering several access points (APs), a station (STA) needs to choose which AP to associate with. In this paper, we propose a distributed association control scheme with user guidance to increase users' utility based on uplink and downlink throughputs of individual stations. As part of the scheme, we also present a simple throughput estimation method that considers physical data rate, traffic demand, and frame length in both uplink and downlink. Basically, in the proposed scheme, an AP selects a user and suggests that the user moves to another AP if certain conditions are met. The user then decides whether to accept the suggestion or not in a self-interested manner or in a voluntary manner for the benefit of all users including the user's own self. Through simulations under this condition, we confirm that our distributed association control scheme can improve user utility and fairness even though the channel quality of the new AP is unknown in advance.

  • Throughput Capacity Study for MANETs with Erasure Coding and Packet Replication

    Bin YANG  Yin CHEN  Guilin CHEN  Xiaohong JIANG  

     
    PAPER-Network

      Vol:
    E98-B No:8
      Page(s):
    1537-1552

    Throughput capacity is of great importance for the design and performance optimization of mobile ad hoc networks (MANETs). We study the exact per node throughput capacity of MANETs under a general 2HR-(g, x, f) routing scheme which combines erasure coding and packet replication techniques. Under this scheme, a source node first encodes a group of g packets into x (x ≥ g) distinct coded packets, and then replicates each of the coded packets to at most f relay nodes which help to forward them to the destination node. All original packets can be recovered once the destination node receives any g distinct coded packets of the group. To study the throughput capacity, we first construct two absorbing Markov chain models to depict the complicated packet delivery process under the routing scheme. Based on these Markov models, an analytical expression of the throughput capacity is derived. Extensive simulation and numerical results are provided to verify the accuracy of theoretical results on throughput capacity and to illustrate how system parameters will affect the throughput capacity in MANETs. Interestingly, we find that the replication of coded packets can improve the throughput capacity when the parameter x is relatively small.

  • Codeword Metric Calculation Scheme for Outer Code in Overloaded MIMO-OFDM System

    Yoshihito DOI  Yukitoshi SANADA  

     
    PAPER-Antennas and Propagation

      Vol:
    E98-B No:8
      Page(s):
    1598-1605

    This paper presents a codeword metric calculation scheme for two step joint decoding of block coded signals in overloaded multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) systems. A two step joint decoding scheme has been proposed for the complexity reduction as compared to joint maximum likelihood decoding in overloaded MIMO systems. Outer codes are widely used in wireless LANs such as IEEE802.11n. However, the two step joint decoding has not been combined with an outer code. In the first step of the two step joint decoding candidate codewords for metric calculation in the second step are selected. The selection of the candidate codewords in the inner block code may not always be able to provide the metric of a binary coded symbol for the outer code. Moreover, a bit flipping based codeword selection scheme in the two step joint decoding may not always provide the second best candidate codeword. Thus, in the proposed scheme the metric of the binary coded symbol calculated in the first step is reused in the second step of two step joint decoding. It is shown that the two step joint decoding with the proposed metric calculation scheme achieves better performance than that of the joint decoding with the bit flipping based codeword calculation scheme and reduces the complexity by about 0.013 for 4 signal streams with the cost of bit error rate degradation within 0.5dB.

  • Uplink Non-Orthogonal Multiple Access (NOMA) with Single-Carrier Frequency Division Multiple Access (SC-FDMA) for 5G Systems

    Anxin LI  Anass BENJEBBOUR  Xiaohang CHEN  Huiling JIANG  Hidetoshi KAYAMA  

     
    PAPER

      Vol:
    E98-B No:8
      Page(s):
    1426-1435

    Non-orthogonal multiple access (NOMA) utilizing the power domain and advanced receiver has been considered as one promising multiple access technology for further cellular enhancements toward the 5th generation (5G) mobile communications system. Most of the existing investigations into NOMA focus on the combination of NOMA with orthogonal frequency division multiple access (OFDMA) for either downlink or uplink. In this paper, we investigate NOMA for uplink with single carrier-frequency division multiple access (SC-FDMA) being used. Differently from OFDMA, SC-FDMA requires consecutive resource allocation to a user equipment (UE) in order to achieve low peak to average power ratio (PAPR) transmission by the UE. Therefore, sophisticated designs of scheduling algorithm for NOMA with SC-FDMA are needed. To this end, this paper investigates the key issues of uplink NOMA scheduling such as UE grouping method and resource widening strategy. Because the optimal schemes have high computational complexity, novel schemes with low computational complexity are proposed for practical usage for uplink resource allocation of NOMA with SC-FDMA. On the basis of the proposed scheduling schemes, the performance of NOMA is investigated by system-level simulations in order to provide insights into the suitability of using NOMA for uplink radio access. Key issues impacting NOMA performance are evaluated and analyzed, such as scheduling granularity, UE number and the combination with fractional frequency reuse (FFR). Simulation results verify the effectiveness of the proposed algorithms and show that NOMA is a promising radio access technology for 5G systems.

  • A Survey on the Audible Quality of Outdoor Public Address Speakers for the Disaster Reduction Broadcasting System in the Central Area of Ishinomaki City

    Shosuke SATO  Masaharu NAKAGAWA  Masahiro IWASAKI  Fumihiko IMAMURA  

     
    LETTER

      Vol:
    E98-A No:8
      Page(s):
    1671-1673

    In the case of a disaster such as an earthquake or a tsunami, the city, town, and village administration usually issues an evacuation advisory and other information through the Outdoor Public Address Speakers for the disaster reduction broadcasting system covering its area of jurisdiction. However, in areas those have previous experience of a disaster, people frequently voice the lack of audibility of the disaster reduction broadcast. In this research, we conducted a questionnaire survey on the residents in the central area of Ishinomaki City, Miyagi Prefecture, who are the victims of the Great East Japan Earthquake Disaster, on the audible quality of outdoor public address (PA) speakers of the disaster reduction broadcasting system so as to understand the current state of such broadcasts and to propose ideal methods of sending and receiving information at the time of a future disaster.

  • Output Amplification Feedback Control of an Input-Delayed Chain of Integrators under General Sensor Noise

    Ho-Lim CHOI  

     
    LETTER-Systems and Control

      Vol:
    E98-A No:8
      Page(s):
    1834-1837

    We consider a chain of integrators system that has an uncertain delay in the input. Also, there is a measurement noise in the feedback channel that only noisy output is available. We develop a new output feedback control scheme along with amplification such that the ultimate bounds of all states and output of the controlled system can be made arbitrarily small. We note that the condition imposed on the sensor noise is quite general over the existing results such that the sensor noise is uncertain and is only required to be bounded by a known bound. The benefit of our control method is shown via an example.

  • A Throughput Evaluation of an Over-Distributed Antenna System with Limited Pilot Resources

    Yuki NAKANISHI  Toshihiko NISHIMURA  Takeo OHGANE  Yasutaka OGAWA  Yusuke OHWATARI  Yoshihisa KISHIYAMA  

     
    PAPER

      Vol:
    E98-B No:8
      Page(s):
    1465-1473

    A distributed antenna system, where the antennas of a base station are spatially distributed throughout the cell, can achieve better throughput at the cell edge than a centralized antenna system. On the other hand, the peak throughput degrades in general because each remote antenna unit has only a few antennas. To achieve both high peak and cell-edge throughputs, we need to increase the total number of antennas. However, this is not easy due to the pilot resource limitation when we use frequency division duplexing. In this paper, we propose using more antennas than pilot resources. The number mismatch between antennas and signals is solved by using a connection matrix. Here, we test two types of connection matrix: signal-distributing and signal-switching. Simulation results show that the sum throughput is improved by increasing the number of antenna elements per remote antenna unit under a constraint on the same number of pilot resources.

  • One to Six Wavelength Multicasting of RZ-OOK Based on Picosecond-Width-Tunable Pulse Source with Distributed Raman Amplification

    Irneza ISMAIL  Quang NGUYEN-THE  Motoharu MATSUURA  Naoto KISHI  

     
    PAPER-Advanced Photonics

      Vol:
    E98-C No:8
      Page(s):
    816-823

    All-optical 1-to-6 wavelength multicasting of a 10-Gb/s picosecond-tunable-width converted return-to-zero (RZ)-on-off-keying (OOK) data signal using a wideband-parametric pulse source from a distributed Raman amplifier (DRA) is experimentally demonstrated. Width-tunable wavelength multicasting within the C-band with approximately 40.6-nm of separation with various compressed RZ data signal inputs have been proposed and demonstrated. The converted multicast pulse widths can be flexibly controlled down to 2.67 ps by tuning the Raman pump powers of the DRA. Nearly equal pulse widths at all multicast wavelengths are obtained. Furthermore, wide open eye patterns and penalties less than 1.2 dB at the 10-9 bit-error-rate (BER) level are found.

  • Waveform Conversion and Wavelength Multicasting with Pulsewidth Tunability Using Raman Amplification Multiwavelength Pulse Compressor

    Quynh NGUYEN QUANG NHU  Quang NGUYEN-THE  Hung NGUYEN TAN  Motoharu MATSUURA  Naoto KISHI  

     
    PAPER-Advanced Photonics

      Vol:
    E98-C No:8
      Page(s):
    824-831

    A combination of nonreturn-to-zero (NRZ)-to-return-to-zero (RZ) waveform conversion and wavelength multicasting with pulsewidth tunability is experimentally demonstrated. A NRZ data signal is injected into a highly nonlinear fiber (HNLF)-based four-wave mixing (FWM) switch with four RZ clocks compressed by a Raman amplification-based multiwavelength pulse compressor (RA-MPC). The NRZ signal is multicast and converted to RZ signals in a continuously wide pulsewidth tuning range between around 12.17 and 4.68 ps by changing the Raman pump power of the RA-MPC. Error-free operations of the converted RZ signals with different pulsewidths are achieved with negative power penalties compared with the back-to-back NRZ signal and the small variation among received powers of RZ output channels at a bit-error-rate (BER) of 10-9. The NRZ-to-RZ waveform conversion and wavelength multicasting without using the RA-MPC are also successfully implemented.

  • NOCOA+: Multimodal Computer-Based Training for Social and Communication Skills

    Hiroki TANAKA  Sakriani SAKTI  Graham NEUBIG  Tomoki TODA  Satoshi NAKAMURA  

     
    PAPER-Educational Technology

      Pubricized:
    2015/04/28
      Vol:
    E98-D No:8
      Page(s):
    1536-1544

    Non-verbal communication incorporating visual, audio, and contextual information is important to make sense of and navigate the social world. Individuals who have trouble with social situations often have difficulty recognizing these sorts of non-verbal social signals. In this article, we propose a training tool NOCOA+ (Non-verbal COmmuniation for Autism plus) that uses utterances in visual and audio modalities in non-verbal communication training. We describe the design of NOCOA+, and further perform an experimental evaluation in which we examine its potential as a tool for computer-based training of non-verbal communication skills for people with social and communication difficulties. In a series of four experiments, we investigated 1) the effect of temporal context on the ability to recognize social signals in testing context, 2) the effect of modality of presentation of social stimulus on ability to recognize non-verbal information, 3) the correlation between autistic traits as measured by the autism spectrum quotient (AQ) and non-verbal behavior recognition skills measured by NOCOA+, 4) the effectiveness of computer-based training in improving social skills. We found that context information was helpful for recognizing non-verbal behaviors, and the effect of modality was different. The results also showed a significant relationship between the AQ communication and socialization scores and non-verbal communication skills, and that social skills were significantly improved through computer-based training.

  • An Evaluation on Two-Handed and One-Handed Control Methods for Positioning Object in Immersive Virtual Environments

    Noritaka OSAWA  Kikuo ASAI  

     
    PAPER-Human-computer Interaction

      Pubricized:
    2015/03/20
      Vol:
    E98-D No:7
      Page(s):
    1316-1324

    A two-handed distance control method is proposed for precisely and efficiently manipulating a virtual 3D object by hand in an immersive virtual reality environment. The proposed method enhances direct manipulation by hand and is used to precisely control and efficiently adjust the position of an object and the viewpoint using the distance between the two hands. The two-handed method is evaluated and compared with the previously proposed one-handed speed control method, which adjusts the position of an object in accordance with the speed of one hand. The results from experimental evaluation show that two-handed methods, which make position and viewpoint adjustments, are the best among six combinations of control and adjustment methods.

  • Statistical Timing Modeling Based on a Lognormal Distribution Model for Near-Threshold Circuit Optimization

    Jun SHIOMI  Tohru ISHIHARA  Hidetoshi ONODERA  

     
    PAPER

      Vol:
    E98-A No:7
      Page(s):
    1455-1466

    Near-threshold computing has emerged as one of the most promising solutions for enabling highly energy efficient and high performance computation of microprocessors. This paper proposes architecture-level statistical static timing analysis (SSTA) models for the near-threshold voltage computing where the path delay distribution is approximated as a lognormal distribution. First, we prove several important theorems that help consider architectural design strategies for high performance and energy efficient near-threshold computing. After that, we show the numerical experiments with Monte Carlo simulations using a commercial 28nm process technology model and demonstrate that the properties presented in the theorems hold for the practical near-threshold logic circuits.

  • System Status Aware Hadoop Scheduling Methods for Job Performance Improvement

    Masatoshi KAWARASAKI  Hyuma WATANABE  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2015/03/26
      Vol:
    E98-D No:7
      Page(s):
    1275-1285

    MapReduce and its open software implementation Hadoop are now widely deployed for big data analysis. As MapReduce runs over a cluster of massive machines, data transfer often becomes a bottleneck in job processing. In this paper, we explore the influence of data transfer to job processing performance and analyze the mechanism of job performance deterioration caused by data transfer oriented congestion at disk I/O and/or network I/O. Based on this analysis, we update Hadoop's Heartbeat messages to contain the real time system status for each machine, like disk I/O and link usage rate. This enhancement makes Hadoop's scheduler be aware of each machine's workload and make more accurate decision of scheduling. The experiment has been done to evaluate the effectiveness of enhanced scheduling methods and discussions are provided to compare the several proposed scheduling policies.

  • Construction of High-Rate Punctured Convolutional Codes through Dual Codes

    Sen MORIYA  Kana KIKUCHI  Hiroshi SASANO  

     
    LETTER-Coding Theory

      Vol:
    E98-A No:7
      Page(s):
    1579-1583

    This paper considers a method for constructing good high-rate punctured convolutional codes through dual codes. A low-rate R=1/n convolutional code has a dual code identical to a punctured convolutional code with rate R=(n-1)/n. This implies that a low-rate R=1/n convolutional code encoder can help the search of punctured convolutional code encoders. This paper provides the procedures that obtain all the useful dual code encoders to a given CC with rate R=1/n easily, and the best PCC encoder with rate R=(n-1)/n among the encoders we derive from all the obtained dual code encoders. This paper also shows an example of the PCC the procedures obtain from some CC.

  • Experiment on Driving a Low-Power DC Motor by Microwave Power Transfer in Continuous-Wave and Pulsed-Wave

    Yong HUANG  Tomohiko MITANI  Takaki ISHIKAWA  Naoki SHINOHARA  

     
    PAPER-Power Applications

      Vol:
    E98-C No:7
      Page(s):
    693-700

    In order to efficiently drive a low-power DC motor using microwave power transfer (MPT), a compact power-receiving device is developed, which consists of a rectenna array and an improved DC-DC converter with constant input resistance characteristics. Since the conversion efficiency of the rectenna is strongly affected by the output load, it is difficult to efficiently drive a dynamic load resistance device such as DC motor. Using both continuous-wave (CW) and pulsed-wave MPT, experiments are carried out on driving the DC motor whose load resistance is varying from 36 to 140 Ω. In the CW case, the measured overall efficiency of the power-receiving device is constant over 50% for the power density of 0.25 to 2.08 mW/cm2. In particular, the overall efficiency is 62%, 70.8% for the power density of 0.25, 0.98 mW/cm2 where the received power of the single antenna is 13, 50 mW, respectively. In the pulsed-wave case, the measured overall efficiency is over 44% for a duty ratio of 0.2 to 1 for the power density of 0.98 mW/cm2.

  • Software Maintenance Evaluation of Agile Software Development Method Based on OpenStack

    Yoji YAMATO  Shinichiro KATSURAGI  Shinji NAGAO  Norihiro MIURA  

     
    LETTER-Software Engineering

      Pubricized:
    2015/04/20
      Vol:
    E98-D No:7
      Page(s):
    1377-1380

    We evaluated software maintenance of an open source cloud platform system we developed using an agile software development method. We previously reported on a rapid service launch using the agile software development method in spite of large-scale development. For this study, we analyzed inquiries and the defect removal efficiency of our recently developed software throughout one-year operation. We found that the defect removal efficiency of our recently developed software was 98%. This indicates that we could achieve sufficient quality in spite of large-scale agile development. In term of maintenance process, we could answer all enquiries within three business days and could conduct version-upgrade fast. Thus, we conclude that software maintenance of agile software development is not ineffective.

  • Memoryless and Adaptive State Feedback Controller for a Chain of Integrators with an Unknown Delay in the Input

    Ho-Lim CHOI  

     
    LETTER-Systems and Control

      Vol:
    E98-A No:7
      Page(s):
    1565-1568

    For systems with a delay in the input, the predictor method has been often used in state feedback controllers for system stabilization or regulation. In this letter, we show that for a chain of integrators with even an unknown input delay, a much simpler and memoryless controller is a good candidate for system regulation. With an adaptive gain-scaling factor, the proposed state feedback controller can deal with an unknown time-varying delay in the input. An example is given for illustration.

  • Countering Malicious Nodes of Inconsistent Behaviors in WSNs: A Combined Approach of Statistic Reputation and Time Series

    Fang WANG  Zhe WEI  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E98-A No:7
      Page(s):
    1584-1587

    In wireless sensor networks, or WSNs, a malicious node is able to cover itself by switching between good and bad behaviors. Even when running under a reputation mechanism, such a node can still behave maliciously now and then so long as its reputation is within the acceptable level. To address this inconsistent behavior issue, a combined approach of statistic reputation and time series is proposed in this study, in which the negative binomial reputation is applied to rate the nodes' reputation and concept of time series is borrowed to analyze the reputation results. Simulations show that the proposed method can effectively counter inconsistent behavior nodes and thus improves the overall system performance.

  • A Participating Fine-Grained Cloud Computing Platform with In-Network Guidance

    Kento NISHII  Yosuke TANIGAWA  Hideki TODE  

     
    PAPER-Network

      Vol:
    E98-B No:6
      Page(s):
    1008-1017

    What should be the ultimate form of the cloud computing environment? The solution should have two important features; “Fine-Granularity” and “Participation.” To realize an attractive and feasible solution with these features, we propose a “participating fine-grained cloud computing platform” that a large number of personal or small-company resource suppliers participate in, configure and provide cloud computing on. This enables users to be supplied with smaller units of resources such as computing, memory, content, and applications, in comparison with the traditional Infrastructure as a Service (IaaS). Furthermore, to search for nearby resources efficiently among the many available on the platform, we also propose Resource Breadcrumbs (RBC) as a key technology of our proposed platform to provide in-network guidance capability autonomously for users' queries. RBC allows supplier-nodes to distribute guidance information directed to themselves with dedicated control messages; in addition, the information can be logged along the trail of message from supplier to user. With this distributed information, users can to autonomously locate nearby resources. Distributed management also reduces computational load on the central database and enables a participating fine-grained cloud platform at lower cost.

761-780hit(3318hit)