The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Q(6809hit)

1401-1420hit(6809hit)

  • A Novel Construction of Asymmetric ZCZ Sequence Sets from Interleaving Perfect Sequence

    Longye WANG  Xiaoli ZENG  Hong WEN  

     
    PAPER-Sequences

      Vol:
    E97-A No:12
      Page(s):
    2556-2561

    An asymmetric zero correlation zone (A-ZCZ) sequence set is a type of ZCZ sequence set and consists of multiple sequence subsets. It is the most important property that is the cross-correlation function between arbitrary sequences belonging to different sequence subsets has quite a large zero-cross-correlation zone (ZCCZ). Our proposed A-ZCZ sequence sets can be constructed based on interleaved technique and orthogonality-preserving transformation by any perfect sequence of length P=Nq(2k+1) and Hadamard matrices of order T≥2, where N≥1, q≥1 and k≥1. If q=1, the novel sequence set is optimal ZCZ sequence set, which has parameters (TP,TN,2k+1) for all positive integers P=N(2k+1). The proposed A-ZCZ sequence sets have much larger ZCCZ, which are expected to be useful for designing spreading sequences for QS-CDMA systems.

  • Properties and Crosscorrelation of Decimated Sidelnikov Sequences

    Young-Tae KIM  Min Kyu SONG  Dae San KIM  Hong-Yeop SONG  

     
    PAPER-Sequences

      Vol:
    E97-A No:12
      Page(s):
    2562-2566

    In this paper, we show that if the d-decimation of a (q-1)-ary Sidelnikov sequence of period q-1=pm-1 is the d-multiple of the same Sidelnikov sequence, then d must be a power of a prime p. Also, we calculate the crosscorrelation magnitude between some constant multiples of d- and d'-decimations of a Sidelnikov sequence of period q-1 to be upper bounded by (d+d'-1)√q+3.

  • KeyQ: A Dynamic Key Establishment Method Using an RFID Anti-Collision Protocol

    You Sung KANG  Dong-Jo PARK  Daniel W. ENGELS  Dooho CHOI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:12
      Page(s):
    2662-2666

    We present a dynamic key generation method, KeyQ, for establishing shared secret keys in EPCglobal Generation 2 (Gen2) compliant systems. Widespread adoption of Gen2 technologies has increased the need for protecting communications in these systems. The highly constrained resources on Gen2 tags limit the usability of traditional key distribution techniques. Dynamic key generation provides a secure method to protect communications with limited key distribution requirements. Our KeyQ method dynamically generates fresh secret keys based on the Gen2 adaptive Q algorithm. We show that the KeyQ method generates fresh and unique secret keys that cannot be predicted with probability greater than 10-250 when the number of tags exceeds 100.

  • Optimal Threshold Configuration Methods for Flow Admission Control with Cooperative Users

    Sumiko MIYATA  Katsunori YAMAOKA  Hirotsugu KINOSHITA  

     
    PAPER-Network

      Vol:
    E97-B No:12
      Page(s):
    2706-2719

    We have proposed a novel call admission control (CAC) method for maximizing total user satisfaction in a heterogeneous traffic network and showed their effectiveness by using the optimal threshold from numerical analysis [1],[2]. With these CAC methods, it is assumed that only selfish users exist in a network. However, we need to consider the possibility that some cooperative users exist who would agree to reduce their requested bandwidth to improve another user's Quality of Service (QoS). Under this assumption, conventional CAC may not be optimal. If there are cooperative users in the network, we need control methods that encourage such user cooperation. However, such “encourage” control methods have not yet been proposed. Therefore, in this paper, we propose novel CAC methods for cooperative users by using queueing theory. Numerical analyses show their effectiveness. We also analyze the characteristics of the optimal control parameter of the threshold.

  • A Geometric Sequence Binarized with Legendre Symbol over Odd Characteristic Field and Its Properties

    Yasuyuki NOGAMI  Kazuki TADA  Satoshi UEHARA  

     
    PAPER-Sequence

      Vol:
    E97-A No:12
      Page(s):
    2336-2342

    Let p be an odd characteristic and m be the degree of a primitive polynomial f(x) over the prime field Fp. Let ω be its zero, that is a primitive element in F*pm, the sequence S={si}, si=Tr(ωi) for i=0,1,2,… becomes a non-binary maximum length sequence, where Tr(·) is the trace function over Fp. On this fact, this paper proposes to binarize the sequence by using Legendre symbol. It will be a class of geometric sequences but its properties such as the period, autocorrelation, and linear complexity have not been discussed. Then, this paper shows that the generated binary sequence (geometric sequence by Legendre symbol) has the period n=2(pm-1)/(p-1) and a typical periodic autocorrelation. Moreover, it is experimentally observed that its linear complexity becomes the maximum, that is the period n. Among such experimental observations, especially in the case of m=2, it is shown that the maximum linear complexity is theoretically proven. After that, this paper also demonstrates these properties with a small example.

  • Asymptotics of Bayesian Inference for a Class of Probabilistic Models under Misspecification

    Nozomi MIYA  Tota SUKO  Goki YASUDA  Toshiyasu MATSUSHIMA  

     
    PAPER-Prediction

      Vol:
    E97-A No:12
      Page(s):
    2352-2360

    In this paper, sequential prediction is studied. The typical assumptions about the probabilistic model in sequential prediction are following two cases. One is the case that a certain probabilistic model is given and the parameters are unknown. The other is the case that not a certain probabilistic model but a class of probabilistic models is given and the parameters are unknown. If there exist some parameters and some models such that the distributions that are identified by them equal the source distribution, an assumed model or a class of models can represent the source distribution. This case is called that specifiable condition is satisfied. In this study, the decision based on the Bayesian principle is made for a class of probabilistic models (not for a certain probabilistic model). The case that specifiable condition is not satisfied is studied. Then, the asymptotic behaviors of the cumulative logarithmic loss for individual sequence in the sense of almost sure convergence and the expected loss, i.e. redundancy are analyzed and the constant terms of the asymptotic equations are identified.

  • In-Network Cache Management Based on Differentiated Service for Information-Centric Networking

    Qian HU  Muqing WU  Hailong HAN  Ning WANG  Chaoyi ZHANG  

     
    PAPER

      Vol:
    E97-B No:12
      Page(s):
    2616-2626

    As a promising future network architecture, Information-centric networking (ICN) has attracted much attention, its ubiquitous in-network caching is one of the key technologies to optimize the dissemination of information. However, considering the diversity of contents and the limitation of cache resources in the Internet, it is usually difficult to find a one-fit-all caching strategy. How to manage the ubiquitous in-network cache in ICN has become an important problem. In this paper, we explore ways to improve cache performance from the three perspectives of spatiality, temporality and availability, based on which we further propose an in-network cache management strategy to support differentiated service. We divide contents requested in the network into different levels and the selection of caching strategies depends on the content level. Furthermore, the corresponding models of utilizing cache resources in spatiality, temporality and availability are also derived for comparison and analysis. Simulation verifies that our differentiated service based cache management strategy can optimize the utilization of cache resources and get higher overall cache performance.

  • Proposal of Analysis Method for Three-Phase Filter Using Fortescue-Mode S-Parameters

    Yoshikazu FUJISHIRO  Takahiko YAMAMOTO  Kohji KOSHIJI  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E97-B No:12
      Page(s):
    2756-2766

    This study proposes a novel method for evaluating the transmission characteristics of a three-phase filter using the “Fortescue-mode S-parameters,” which are S-parameters whose variables are transformed into symmetrical coordinates (i.e., zero-/positive-/negative-phase sequences). The behavior of the filter under three-phase current, including its non-symmetry, can be represented by these S-parameters, without regard to frequency. This paper also describes a methodology for creating modal equivalent circuits that reflect Fortescue-mode S-parameters allowing the effects of circuit components on filter characteristics to be estimated. Thus, this method is useful not only for the measurement and evaluation but also for the analysis and design of a three-phase filter. In addition, the physical interpretation of asymmetrical/symmetrical insertion losses and the conversion method based on Fortescue-mode S-parameters are clarified.

  • A Two-Tier Spatial Index for Non-flat Spatial Data Broadcasting on Air

    SeokJin IM  HeeJoung HWANG  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E97-B No:12
      Page(s):
    2809-2818

    To support the processing of spatial window queries efficiently in a non-flat wireless data broadcasting system, we propose a Two-Tier Spatial Index (TTSI) that uses a two tier data space to distinguish hot and regular data items. Unlike an existing index which repeats regular data items located near hot items at the same time as the hot data items during the broadcast cycle, TTSI makes it possible to repeat only hot data items during a cycle. Simulations show that the proposed TTSI outperforms the existing scheme with respect to access time and energy consumption.

  • A Low EMI Circuit Design with Asynchronous Multi-Frequency Clocking

    Jeong-Gun LEE  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E97-C No:12
      Page(s):
    1158-1161

    In this paper, we propose a new design technique called extit{asynchronous multi-frequency clocking} for suppressing EMI at a chip design level by combining two independent EMI-suppressing approaches: extit{multi-frequency clocking} and extit{asynchronous circuit design} techniques. To show the effectiveness of our approach, a five-stage pipelined asynchronous MIPS with multi-frequency clocking has been implemented on a commercial Xilinx FPGA device. Our approach shows 11.05 dB and 5.88 dB reductions of peak EM radiation in the prototyped implementation when compared to conventional synchronous and bundled-data asynchronous circuit counterparts, respectively.

  • A Closed-Form Design of Linear Phase FIR Band-Pass Maximally Flat Digital Differentiators with an Arbitrary Center Frequency

    Takashi YOSHIDA  Yosuke SUGIURA  Naoyuki AIKAWA  

     
    PAPER-Digital Signal Processing

      Vol:
    E97-A No:12
      Page(s):
    2611-2617

    Maximally flat digital differentiators (MFDDs) are widely used in many applications. By using MFDDs, we obtain the derivative of an input signal with high accuracy around their center frequency of flat property. Moreover, to avoid the influence of noise, it is desirable to attenuate the magnitude property of MFDDs expect for the vicinity of the center frequency. In this paper, we introduce a design method of linear phase FIR band-pass MFDDs with an arbitrary center frequency. The proposed transfer function for both of TYPE III and TYPE IV can be achieved as a closed form function using Jacobi polynomial. Furthermore, we can easily derive the weighting coefficients of the proposed MFDDs using recursive formula. Through some design examples, we confirm that the proposed method can adjust the center frequency arbitrarily and the band width having flat property.

  • Hybrid Integration of Visual Attention Model into Image Quality Metric

    Chanho JUNG  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2014/08/22
      Vol:
    E97-D No:11
      Page(s):
    2971-2973

    Integrating the visual attention (VA) model into an objective image quality metric is a rapidly evolving area in modern image quality assessment (IQA) research due to the significant opportunities the VA information presents. So far, in the literature, it has been suggested to use either a task-free saliency map or a quality-task one for the integration into quality metric. A hybrid integration approach which takes the advantages of both saliency maps is presented in this paper. We compare our hybrid integration scheme with existing integration schemes using simple quality metrics. Results show that the proposed method performs better than the previous techniques in terms of prediction accuracy.

  • New Families of p-Ary Sequences of Period $ rac{p^n-1}{2}$ with Low Maximum Correlation Magnitude

    Wijik LEE  Ji-Youp KIM  Jong-Seon NO  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E97-B No:11
      Page(s):
    2311-2315

    Let p be an odd prime such that p ≡ 3 mod 4 and n be an odd positive integer. In this paper, two new families of p-ary sequences of period $N = rac{p^n-1}{2}$ are constructed by two decimated p-ary m-sequences m(2t) and m(dt), where d=4 and d=(pn+1)/2=N+1. The upper bound on the magnitude of correlation values of two sequences in the family is derived by using Weil bound. Their upper bound is derived as $ rac{3}{sqrt{2}} sqrt{N+ rac{1}{2}}+ rac{1}{2}$ and the family size is 4N, which is four times the period of the sequence.

  • Simple Joint Symbol Timing and Carrier Frequency Offset Estimation for Wireless Body Area Networks

    Byung-Kyu KIM  Young-Hwan YOU  

     
    LETTER-Communication Theory and Signals

      Vol:
    E97-A No:11
      Page(s):
    2276-2278

    In this letter, we propose a simple algorithm to jointly estimate the symbol timing offset (STO) and carrier frequency offset (CFO) of wireless body area network (WBAN) signals. The preamble specified in IEEE 802.15.6 WBAN is used to achieve an accurate timing and frequency estimation based on the differential correlation. Simulations demonstrate that the proposed joint estimation scheme can be effectively employed to get accurate STO and CFO estimate with less complexity.

  • A Novel Structure of HTTP Adaptive Streaming Based on Unequal Error Protection Rateless Code

    Yun SHEN  Yitong LIU  Jing LIU  Hongwen YANG  Dacheng YANG  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E97-D No:11
      Page(s):
    2903-2911

    In this paper, we design an Unequal Error Protection (UEP) rateless code with special coding graph and apply it to propose a novel HTTP adaptive streaming based on UEP rateless code (HASUR). Our designed UEP rateless code provides high diversity on decoding probability and priority for data in different important level with overhead smaller than 0.27. By adopting this UEP rateless channel coding and scalable video source coding, our HASUR ensures symbols with basic quality to be decoded first to guarantee fluent playback experience. Besides, it also provides multiple layers to ensure the most suitable quality for fluctuant bandwidth and packet loss rate (PLR) without estimating them in advance. We evaluate our HASUR against the alternative solutions. Simulation results show that HASUR provides higher video quality and more adapts to bandwidth and PLR than other two commercial schemes under End-to-End transmission.

  • On the Linear Complexity of New Modified Jacobi Sequences

    Qiuyan WANG  Yupeng JIANG  Dongdai LIN  Xuan GUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:11
      Page(s):
    2263-2266

    Jacobi sequences have good cryptography properties. Li et al. [X. Li et al., Linear Complexity of a New Generalized Cyclotomic Sequence of Order Two of Length pq*, IEICE Trans. Fundamentals, vol.E96-A, no.5, pp.1001-1005, 2013] defined a new modified Jacobi sequence of order two and got its linear complexity. In this corresponding, we determine the linear complexity and minimal polynomials of the new modified Jacobi sequence of order d. Our results show that the sequence is good from the viewpoint of linear complexity.

  • Joint Estimation of Channel and Control Signal Using Noise Subspace in OFDM Systems

    Bin SHENG  Pengcheng ZHU  Xin FANG  Wanlin LI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:11
      Page(s):
    2404-2412

    Accurate channel estimation is necessary before we can demodulate orthogonal frequency division multiplexing (OFDM) signals since the radio channel is frequency-selective and time-varying for wideband mobile communication systems. For pilot-symbol-aided channel estimation, pilot sequences are inserted periodically into the data stream enabling coherent detection at receiver. The control signal information can be embedded in pilot sequences and transmitted implicitly in OFDM systems to save the bandwidth. In order to estimate the channel and control signal jointly at the receiver, we propose a novel noise subspace based method in this paper. The proposed method is developed from the DFT-based channel estimator. If the hypothesized sequence coincides with the transmitted pilot sequence, the last part of the channel impulse response (CIR) estimate is only contributed by Gaussian noise and its average power is expected to be the minimum among all possible hypothesized sequences. Simulation results show that the proposed method works well in any of the channels even if integer carrier frequency offset (CFO) is considered.

  • A Study on Minimization of Requisite Design Volume of Small Antennas Inside Handset Terminals

    Tuan Hung NGUYEN  Hiroshi SATO  Yoshio KOYANAGI  Hisashi MORISHITA  

     
    PAPER-Antennas and Propagation

      Vol:
    E97-B No:11
      Page(s):
    2395-2403

    This study presents a proposal for space-saving design of built-in antennas for handset terminals based on the concept of requisite design antenna volume. By investigating the relation between antenna input characteristic and electric near-field around the antenna element and surrounding components inside the terminal, and then evaluating the requisite design antenna volume, we propose the most effective deployment for both the antenna and surrounding components. The results show that our simple proposal can help reduced, by about 17% and 31.75%, the space that the antenna element actually requires at least for stable operation inside the terminal, in the single-band designs for the cellular 2GHz band (1920-2170MHz) and 800MHz band (830-880MHz), respectively. In the dual-band design, we verify that it can reduce, the antenna space by about 35.18%, and completely cover the two above cellular bands with good antenna performance.

  • Statistical Channel Modeling for Aeronautical Cognitive Radio Communications

    Chao ZHANG  Junzhou YU  

     
    LETTER

      Vol:
    E97-A No:11
      Page(s):
    2170-2173

    Due to the high speed mobile environment, the aeronautical Cognitive Radio (CR) communications base on the channel with the time-variant stochastic non-continuous spectrum. The traditional fading channel models, such as Rayleigh, Rice, Nakagami-m and multipath channel models, can not describe the whole property of the channels of CR communications. In this letter, the statistical channel modeling scheme for aeronautical CR communications is proposed with a M/M/s(1) queuing model, which properly describes the random spectrum occupation of the primary users, i.e. aircrafts in aeronautical communications. The proposed channel model can be easily utilized in the channel simulation to testify the validity and efficiency of the aeronautical CR communications.

  • Reusing EPR Pairs for Change of Receiver in Quantum Repeater

    Kenichiro FURUTA  

     
    LETTER-General Fundamentals and Boundaries

      Vol:
    E97-A No:11
      Page(s):
    2283-2286

    We focus on a characteristic which is specific to the quantum repeater protocol. In the quantum repeater protocol, quantum states which are generated by the protocol do not depend on receivers. Therefore, we can reuse EPR pairs which are generated before a change of a receiver for the quantum repeater protocol after the change. The purpose of reusing is advancing the finishing time of sharing EPR pairs, which is not equal to increasing the fidelity. In this paper, we construct concrete methods of reusing EPR pairs and analyze the effectiveness of reusing EPR pairs. Besides, we derive conditions in which reusing EPR pairs is effective.

1401-1420hit(6809hit)