The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] REM(1013hit)

541-560hit(1013hit)

  • Aggregation Efficiency-Aware Greedy Incremental Tree Routing for Wireless Sensor Networks

    Shinji MIKAMI  Takafumi AONISHI  Hironori YOSHINO  Chikara OHTA  Hiroshi KAWAGUCHI  Masahiko YOSHIMOTO  

     
    PAPER

      Vol:
    E89-B No:10
      Page(s):
    2741-2751

    In most research work for sensor network routings, perfect aggregation has been assumed. Such an assumption might limit the application of the wireless sensor networks. We address the impact of aggregation efficiency on energy consumption in the context of GIT routing. Our questions are how the most efficient aggregation point changes according to aggregation efficiency and the extent to which energy consumption can decrease compared to the original GIT routing and opportunistic routing. To answer these questions, we analyze a two-source model, which yields results that lend insight into the impact of aggregation efficiency. Based on analytical results, we propose an improved GIT: "aggregation efficiency-aware GIT," or AGIT. We also consider a suppression scheme for exploratory messages: "hop exploratory." Our simulation results show that the AGIT routing saves the energy consumption of the data transmission compared to the original GIT routing and opportunistic routing.

  • A Refined Theory for Available Operation of Extremely Complicated Large-Scale Network Systems

    Kazuo HORIUCHI  

     
    PAPER-Modelling, Systems and Simulation

      Vol:
    E89-A No:10
      Page(s):
    2692-2696

    In this paper, we shall describe about a refined theory based on the concept of set-valued operators, suitable for available operation of extremely complicated large-scale network systems. The deduction of theory is accomplished in a weak topology introduced into the Banach space. Fundamental conditions for availability of system behaviors of such network systems are clarified, as a result, in a form of fixed point theorem for system of set-valued operators.

  • A Simultaneous Inline Measurement Mechanism for Capacity and Available Bandwidth of End-to-End Network Path

    Cao LE THANH MAN  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E89-B No:9
      Page(s):
    2469-2479

    We previously proposed a new version of TCP, called Inline measurement TCP (ImTCP), in [2],[3]. The ImTCP sender adjusts the transmission intervals of data packets and then utilizes the arrival intervals of ACK packets for available bandwidth estimation. This type of active measurement is preferred because the obtained results are as accurate as those of other conventional types of active measurement, even though no extra probe traffic is injected onto the network. In the present research, we develop a new capacity measurement function and combine it with ImTCP in order to enable simultaneous measurement of both capacity and available bandwidth in ImTCP. The capacity measurement algorithm is a new packet-pair-based measurement technique that utilizes the estimated available bandwidth values for capacity calculation. This new algorithm promises faster measurement than current packet-pair-based measurement algorithms for various situations and works well for high-load networks, in which current algorithms do not work properly. Moreover, the new algorithm provides a confidence interval for the measurement result.

  • The Central Limit Theorem for the Normalized Sums of the MAI for SSMA Communication Systems Using Spreading Sequences of Markov Chains

    Hiroshi FUJISAKI  Gerhard KELLER  

     
    PAPER

      Vol:
    E89-A No:9
      Page(s):
    2307-2314

    We extend the sliding block code in symbolic dynamics to transform J (≥2) sequences of Markov chains with time delays. Under the assumption that the chains are irreducible and aperiodic, we prove the central limit theorem (CLT) for the normalized sums of extended sliding block codes from J sequences of Markov chains. We apply the theorem to the system analysis of asynchronous spread spectrum multiple access (SSMA) communication systems using spreading sequences of Markov chains. We find that the standard Gaussian approximation (SGA) for estimations of bit error probabilities in such systems is the 0-th order approximation of the evaluation based on the CLT. We also provide a simple theoretical evaluation of bit error probabilities in such systems, which agrees properly with the experimental results even for the systems with small number of users and low length of spreading sequences.

  • Scattering of a TM Plane Wave from a Periodic Surface with Finite Extent: Perturbation Solution

    Junichi NAKAYAMA  Yujiro OCHI  Yasuhiko TAMURA  

     
    LETTER-Electromagnetic Theory

      Vol:
    E89-C No:9
      Page(s):
    1358-1361

    This paper studies the scattering of a TM plane wave from a perfectly conductive sinusoidal surface with finite extent by the small perturbation method. We obtain the first and second order perturbed solutions explicitly, in terms of which the differential scattering cross section and the total scattering cross section per unit surface are calculated and are illustrated in figures. By comparison with results by a numerical method, it is concluded that the perturbed solution is reasonable even for a critical angle of incidence if the surface is small in roughness and gentle in slope and if the corrugation width is less than certain value. A brief discussion is given on multiple scattering effects.

  • The Bump Hunting Method Using the Genetic Algorithm with the Extreme-Value Statistics

    Takahiro YUKIZANE  Shin-ya OHI  Eiji MIYANO  Hideo HIROSE  

     
    INVITED PAPER

      Vol:
    E89-D No:8
      Page(s):
    2332-2339

    In difficult classification problems of the z-dimensional points into two groups giving 0-1 responses due to the messy data structure, we try to find the denser regions for the favorable customers of response 1, instead of finding the boundaries to separate the two groups. Such regions are called the bumps, and finding the boundaries of the bumps is called the bump hunting. The main objective of this paper is to find the largest region of the bumps under a specified ratio of the number of the points of response 1 to the total. Then, we may obtain a trade-off curve between the number of points of response 1 and the specified ratio. The decision tree method with the Gini's index will provide the simple-shaped boundaries for the bumps if the marginal density for response 1 shows a rather simple or monotonic shape. Since the computing time searching for the optimal trees will cost much because of the NP-hardness of the problem, some random search methods, e.g., the genetic algorithm adapted to the tree, are useful. Due to the existence of many local maxima unlike the ordinary genetic algorithm search results, the extreme-value statistics will be useful to estimate the global optimum number of captured points; this also guarantees the accuracy of the semi-optimal solution with the simple descriptive rules. This combined method of genetic algorithm search and extreme-value statistics use is new. We apply this method to some artificial messy data case which mimics the real customer database, showing a successful result. The reliability of the solution is discussed.

  • Background TCP Data Transfer with Inline Network Measurement

    Tomoaki TSUGAWA  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Internet

      Vol:
    E89-B No:8
      Page(s):
    2152-2160

    In the present paper, ImTCP-bg, a new background TCP data transfer mechanism that uses an inline network measurement technique, is proposed. ImTCP-bg sets the upper limit of the congestion window size of the sender TCP based on the results of the inline network measurement, which measures the available bandwidth of the network path between the sender and receiver hosts. ImTCP-bg can provide background data transfer without affecting the foreground traffic, whereas previous methods cannot avoid network congestion. ImTCP-bg also employs an enhanced RTT-based mechanism so that ImTCP-bg can detect and resolve network congestion, even when reliable measurement results cannot be obtained. The performance of ImTCP-bg is investigated through simulations, and the effectiveness of ImTCP-bg in terms of the degree of interference with foreground traffic and the link bandwidth utilization is also investigated.

  • An Efficient Distributed Power Control for Infeasible Downlink Scenarios--Global-Local Fixed-Point-Approximation Technique

    Noriyuki TAKAHASHI  Masahiro YUKAWA  Isao YAMADA  

     
    PAPER

      Vol:
    E89-A No:8
      Page(s):
    2107-2118

    In this paper, we present an efficient downlink power control scheme, for wireless networks, based on two key ideas: (i) global-local fixed-point-approximation technique (GLOFPAT) and (ii) bottleneck removal criterion (BRC). The proposed scheme copes with all scenarios including infeasible case where no power allocation can provide all multiple accessing users with target quality of service (QoS). For feasible case, the GLOFPAT efficiently computes a desired power allocation which corresponds to the allocation achieved by conventional algorithms. For infeasible case, the GLOFPAT offers valuable information to detect bottleneck users, to be removed based on the BRC, which deteriorate overall QoS. The GLOFPAT is a mathematically-sound distributed algorithm approximating desired power allocation as a unique fixed-point of an isotone mapping. The unique fixed-point of the global mapping is iteratively computed by fixed-point-approximations of multiple distributed local mappings, which can be computed in parallel by base stations respectively. For proper detection of bottleneck users, complete analysis of the GLOFPAT is presented with aid of the Tarski's fixed-point theorem. Extensive simulations demonstrate that the proposed scheme converges faster than the conventional algorithm and successfully increases the number of happy users receiving target QoS.

  • Removal of Adherent Waterdrops from Images Acquired with a Stereo Camera System

    Yuu TANAKA  Atsushi YAMASHITA  Toru KANEKO  Kenjiro T. MIURA  

     
    PAPER-Stereo and Multiple View Analysis

      Vol:
    E89-D No:7
      Page(s):
    2021-2027

    In this paper, we propose a new method that can remove view-disturbing noises from stereo images. One of the thorny problems in outdoor surveillance by a camera is that adherent noises such as waterdrops on the protecting glass surface lens disturb the view from the camera. Therefore, we propose a method for removing adherent noises from stereo images taken with a stereo camera system. Our method is based on the stereo measurement and utilizes disparities between stereo image pair. Positions of noises in images can be detected by comparing disparities measured from stereo images with the distance between the stereo camera system and the glass surface. True disparities of image regions hidden by noises can be estimated from the property that disparities are generally similar with those around noises. Finally, we can remove noises from images by replacing the above regions with textures of corresponding image regions obtained by the disparity referring. Experimental results show the effectiveness of the proposed method.

  • Skeletons and Asynchronous RPC for Embedded Data and Task Parallel Image Processing

    Wouter CAARLS  Pieter JONKER  Henk CORPORAAL  

     
    PAPER-Parallel and Distributed Computing

      Vol:
    E89-D No:7
      Page(s):
    2036-2043

    Developing embedded parallel image processing applications is usually a very hardware-dependent process, often using the single instruction multiple data (SIMD) paradigm, and requiring deep knowledge of the processors used. Furthermore, the application is tailored to a specific hardware platform, and if the chosen hardware does not meet the requirements, it must be rewritten for a new platform. We have proposed the use of design space exploration [9] to find the most suitable hardware platform for a certain application. This requires a hardware-independent program, and we use algorithmic skeletons [5] to achieve this, while exploiting the data parallelism inherent to low-level image processing. However, since different operations run best on different kinds of processors, we need to exploit task parallelism as well. This paper describes how we exploit task parallelism using an asynchronous remote procedure call (RPC) system, optimized for low-memory and sparsely connected systems such as smart cameras. It uses a futures [16]-like model to present a normal imperative C-interface to the user in which the skeleton calls are implicitly parallelized and pipelined. Simulation provides the task dependency graph and performance numbers for the mapping, which can be done at run time to facilitate data dependent branching. The result is an easy to program, platform independent framework which shields the user from the parallel implementation and mapping of his application, while efficiently utilizing on-chip memory and interconnect bandwidth.

  • Design of a Signal Processing Module with Various Filters Characteristics for Fully Implantable Middle Ear Hearing Devices

    Young-Ho YOON  Hyung-Gyu LIM  Jyung-Hyun LEE  Hee-Joon PARK  Il-Yong PARK  Min-Kyu KIM  Chul-Ho WON  Byung-Seop SONG  Jin-Ho CHO  

     
    LETTER

      Vol:
    E89-A No:6
      Page(s):
    1695-1698

    In this paper, the voice signal processing module has been designed using the micro processor for the use of fully implantable middle ear devices (F-IMEHD). The voice signal processing module for F-IMEHD should be designed to compensate for the hearing loss of hearing impaired person and have the flexibility for compensating various hearing threshold level. So, the voice signal processing module has been designed and implemented to present the various frequency characteristics using the low-power micro processor, MSP430F169. The different voice signal path to the inner ear entrance was considered so that two voice signal would be combined in-phase using an all pass filter with a constant time-delay to improve the vibration of the ossicles.

  • Interference Effect Measurements of UWB Devices on Broadcasting System and SDMB System

    Hong Jong SONG  Dong Ku KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E89-B No:6
      Page(s):
    1926-1930

    This letter describes experiments conducted to measure the interference effects of two kinds of UWB sources, which are OFDM UWB source and pulse radio UWB source, to broadcasting relay system and SDMB system. The received power degradation of a broadcasting system is presented. experimental results show that UWB system can coexist 35 m distance as close as to in-band broadcasting network and can also coexist 1.8 m as close as with the SDMB terminal without causing any dangerous interference.

  • Bounds on the Client-Server Incremental Computing

    Cho-chin LIN  Da-wei WANG  Tsan-sheng HSU  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1198-1206

    We discuss the problem of finding a dominant sequence for sending input data items from a low-end client to a server for computational intensive tasks under the realistic assumption of unpredictable communication behavior. Under this assumption, the client has to send the input data items using a specified sequence to maximize the number of computations performed by the server at any time. The sequence-finding problem is NP-hard for the general case. In this paper, we address three fundamental and useful applications: the product of two polynomials, matrices multiplication and Fast Fourier Transform. We show that the sequence-finding problems of the three applications can be solved optimally in linear time. However, we also show counter examples to rule out any possibility of finding a dominant sequence for sparse cases of the three applications. Finally, a simulation is conducted to show the usefulness of our method.

  • Evaluation of the T-DMB Standard and the Transmission System by Using Ensemble Remultiplexer

    Byungjun BAE  Joungil YUN  Chunghyun AHN  Soo-In LEE  Kyu-Ik SOHNG  

     
    LETTER-Multimedia Environment Technology

      Vol:
    E89-A No:5
      Page(s):
    1518-1521

    This paper briefly introduces the T-DMB standard based on Eureka-147 DAB and presents a new T-DMB transmission system, which uses a device called the Ensemble Remultiplexer, for mobile multimedia broadcasting service. And we verify the T-DMB standard by using the new transmission system with commercial equipment in the laboratory and in the field as moving on a car in high speed around urban districts surrounded by high buildings.

  • A Fast Edge-Splitting Algorithm in Edge-Weighted Graphs

    Hiroshi NAGAMOCHI  

     
    PAPER

      Vol:
    E89-A No:5
      Page(s):
    1263-1268

    Let H be a graph with a designated vertex s, where edges are weighted by nonnegative reals. Splitting edges e={u,s} and e'={s,v} at s is an operation that reduces the weight of each of e and e' by a real δ>0 while increasing the weight of edge {u,v} by δ. It is known that all edges incident to s can be split off while preserving the edge-connectivity of H and that such a complete splitting is used to solve many connectivity problems. In this paper, we give an O(mn+n2log n) time algorithm for finding a complete splitting in a graph with n vertices and m edges.

  • A Block Smoothing-Based Method for Flicker Removal in Image Sequences

    Lei ZHOU  Qiang NI  Yuanhua ZHOU  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E89-D No:4
      Page(s):
    1578-1581

    An automatic and efficient algorithm for removal of intensity flicker is proposed. The novel repair process is founded on the block-based estimation and restoration algorithm with regard to luminance variation. It is easily realized and controlled to remove most intensity flicker and preserve the wanted effects, like fade in and fade out.

  • Estimating Method of Short-Interval-Traffic Distribution Considering Long-Term-Traffic Dynamics for Multimedia QoS Management

    Tadayoshi FUKAMI  Hiroki NISHIKAWA  Takuya ASAKA  Tatsuro TAKAHASHI  Noriteru SHINAGAWA  

     
    PAPER

      Vol:
    E89-B No:4
      Page(s):
    1110-1118

    Analyzing short-interval-traffic behaviors is important for network performance management to realize high quality multimedia applications. However, it is difficult to measure short-interval-traffic volumes because there are complications in collecting short-interval-traffic data from routers. An example is a heavy load on routers or inaccurate measurement by the short-polling interval; it even demands expensive measurement tools. To resolve these disadvantages, an estimating method of short-interval-traffic distribution (EMSIT) has been proposed. This method estimates short-interval-traffic distributions using MIB (Management Information Base) data, which collects traffic volumes in cycles of several minutes. In this paper, we propose a new estimation method (EMSIT-LD) based on EMSIT, which applies to the case of long-term-traffic dynamics. We evaluate it using computer simulations and actual traffic data.

  • Performance Comparison of Two SDMA Approaches for OFDM Signals Using Measured Indoor Channel Data

    Yunjian JIA  Quoc Tuan TRAN  Shinsuke HARA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:4
      Page(s):
    1315-1324

    We have proposed two space division multiple access (SDMA) approaches for OFDM signals: "Virtual Subcarrier Assignment (VISA)" and "Preamble Subcarrier Assignment (PASA)," both of which can enhance the system capacity without significant change of transmitter/receiver structures for already-existing OFDM-based standards such as IEEE802.11a. In order to investigate the performance of the proposed approaches in real wireless scenarios, we conducted a measurement campaign to obtain real channel state data at 5-GHz band in an indoor environment. Using the measured channel data, we can make the performance evaluation realistic. In this paper, after the brief overview of the two proposed SDMA approaches, we describe our measurement campaign in detail. Furthermore, we evaluate the performance of VISA-based system and PASA-based system by computer simulations using the measured channel state data and present a comparative study on the performance of the two proposed SDMA approaches in the realistic wireless environment.

  • Improvement of the Correctness of Scenarios with Rules

    Atsushi OHNISHI  

     
    PAPER

      Vol:
    E89-D No:4
      Page(s):
    1337-1346

    Scenarios that describe concrete situations of software operation play an important role in software development, especially in requirements engineering. Since scenarios are informal, the correctness of scenarios is hard to be verified. The authors have developed a language for describing scenarios in which simple action traces are embellished. The purposes are to include typed frames based on a simple case grammar of actions and to describe the sequence among events. Based on this scenario language, this paper describes both (1) a correctness-checking method using rules to detect errors (lack of events, extra events, and wrong sequence among events) in a scenario and (2) a retrieval method of rules from rule DB that applicable to scenarios using pre and post- conditions.

  • Locating Congested Segments over the Internet Based on Multiple End-to-End Path Measurements

    Atsuo TACHIBANA  Shigehiro ANO  Toru HASEGAWA  Masato TSURU  Yuji OIE  

     
    PAPER

      Vol:
    E89-B No:4
      Page(s):
    1099-1109

    Since congestion is very likely to happen in the Internet, locating congested areas (path segments) along a congested path is vital to appropriate actions by Internet Service Providers to mitigate or prevent network performance degradation. We propose a practical method to locate congested segments by actively measuring one-way end-to-end packet losses on appropriate paths from multiple origins to multiple destinations, using a network tomographic approach. Then we conduct a long-term experiment measuring packet losses on multiple paths over the Japanese commercial Internet. The experimental results indicate that the proposed method is able to precisely locate congested segments. Some findings on congestion over the Japan Internet are also given based on the experiment.

541-560hit(1013hit)