The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] REM(1013hit)

621-640hit(1013hit)

  • Band-Limitation Effects on Microwave Oven Noise in the 2.4-GHz Band

    Yasushi MATSUMOTO  Takahide MURAKAMI  Katsumi FUJII  Akira SUGIURA  

     
    LETTER-Electromagnetic Compatibility(EMC)

      Vol:
    E88-B No:3
      Page(s):
    1307-1312

    Electromagnetic noise radiated from microwave ovens may cause serious interference problems in wireless systems using the 2.4-GHz band. Since oven noise waveforms show strong dependence on the frequency selectivity of the receiver filters, the effect of band limitation on the interfering oven noise is an important issue for evaluating or comparing the performance degradation of wireless systems subject to interference. To understand these effects, theoretical and experimental investigations of the waveform, peak amplitude, and pulse width of band-limited oven noise are carried out. It is found that the peak amplitude of the received noise changes with the bandwidth in a way very similar to the case of a simple RF tone-burst input. The pulse width of the received noise also changes with the receiver bandwidth but takes a minimum value at a certain receiver bandwidth, which is an essential feature of band-limited microwave oven noise. In addition, an appropriate resolution bandwidth is determined for using a spectrum analyzer to obtain accurate oven noise parameters.

  • Energy Consumption Measurement of Wireless Interfaces in Multi-Service User Terminals for Heterogeneous Wireless Networks

    Khaled MAHMUD  Masugi INOUE  Homare MURAKAMI  Mikio HASEGAWA  Hiroyuki MORIKAWA  

     
    PAPER-Network

      Vol:
    E88-B No:3
      Page(s):
    1097-1110

    For future generation mobile networks, we expect that the mobile devices like PDAs, note PCs or any VoIP-enabled communicators will have the feature of being always switched on, ready for service, constantly reachable by the wireless Internet. In addition to high access speed, attractive real-time contents or other expected spectacular features of the future wireless Internet environment, the mobile terminals has to be very much energy-aware to enable literal untethered movement of the user. Mechanisms for network activities like maintaining location information and wireless system discovery, which require regular network access, should be energy-efficient and resource-efficient in general. Cellular systems employ the notion of passive connectivity to reduce the power consumption of idle mobile hosts. In IP based Multi-service User Terminal (MUT) that may have multiple wireless interfaces for receiving various classes of services from the network, there should be an efficient addressing of the energy consumption issue. To devise an energy-efficient scheme for simultaneous or single operation of the wireless interfaces attached to such terminals we should have comprehensive understanding of the power consumption of the devices/modules in various operational states. This paper investigates the power consumption pattern or behavior of some selected wireless interfaces that are good candidates for being part of the future of the multi-service user terminals. We propose a simple model for predicting energy consumption in a terminal attributed to the wireless network interfaces. We measured the actual consumption pattern to estimate the parameters of the model.

  • Design Method for Distributed Raman Amplification Systems Based on Statistical Properties in Optical Fibers

    Kunihiro TOGE  Kazuo HOGARI  

     
    PAPER-Optical Fiber for Communications

      Vol:
    E88-B No:3
      Page(s):
    1066-1071

    To avoid over-engineered and expensive systems, it is important that the design takes account of variations in optical fiber characteristics due to the presence of many fiber pieces and splices in optical fiber networks. We present a design method for optical fiber networks that employ distributed Raman amplification (DRA), that considers variations in both optical losses at signal and pump wavelengths, Raman gain characteristics and splice losses. Our method can be applied to the design of both newly developed systems and installed systems. We show design examples based on our method and reveal the practicability of our method.

  • Recursion Removal from Recursive Programs with Only One Descent Function

    Yusuke ICHIKAWA  Zenjiro KONISHI  Yoshihiko FUTAMURA  

     
    PAPER-Fundamentals of Software and Theory of Programs

      Vol:
    E88-D No:2
      Page(s):
    187-196

    Recursive programs are often easier to read and write than iterative ones, but their execution frequently requires large numbers of procedure calls and stack operations. This causes problems in program optimization related to inline coding and the locality of data references. In addition to these problems, defining programs recursively sometimes leads to repetitive execution of similar computations, causing programs to have exponential time complexity. As a result, recursion removal methods, which transform a given recursive program to an iterative one without using the stack and increasing the amount of computation time, have been studied since the 1970s. In 1998, our group proposed a recursion removal method for a linear recursive program. In this paper, we extend the method to deal with non-linear recursive programs with one descent function (RPODs), which are programs of the form f(x) = if p(x) then b(x) else a(c(x),f(d(x)),f(d2(x)),...,f(dn(x))). First, we define the cumulative function for an RPOD. Next, based on the new cumulative function, several transformation techniques for RPODs are shown. These include a unified method of deriving logarithmic-order iterative programs or loop-free programs. Finally, the relationships between our method and various tupling strategies are discussed.

  • A Dynamic and Distributed Routing Algorithm Supporting Bidirectional Multiple QoS Requirements in End-to-End

    NarmHee LEE  

     
    PAPER-Network

      Vol:
    E88-B No:2
      Page(s):
    632-642

    This paper proposes a distributed adaptive routing algorithm that may be applied to inter-domain calls passing over any type of network topology, traffic management and switching techniques on the path, while carrying bidirectional traffic with multiple QoS requirements. The path is searched within a contour area restricted by the number of hops between source and destination while the end-to-end admission of calls is controlled at source node and each hop's admission at each node, reflecting the latest resources availability and network conditions for the given QoS requirements. Performance analysis in various conditions shows good applicability in real networks.

  • Comparison of Throughput Employing Hybrid ARQ Packet Combining in Forward Link OFCDM Broadband Packet Wireless Access

    Nobuhiko MIKI  Hiroyuki ATARASHI  Sadayuki ABETA  Mamoru SAWAHASHI  

     
    PAPER

      Vol:
    E88-B No:2
      Page(s):
    594-603

    This paper compares the throughput performance employing hybrid automatic repeat request (ARQ) packet combining, i.e., Chase combining, and Incremental redundancy, considering the frequency diversity effect in the broadband forward-link channel for Orthogonal Frequency and Code Division Multiplexing (OFCDM) packet wireless access achieving a peak throughput above 100 Mbps. Simulation results show that the achievable throughput at the average received signal energy per symbol-to-background noise power spectrum density ratio (Es/N0) of 0 and 6 dB employing Incremental redundancy is increased by approximately 35 and 30% compared to that using Chase combining for QPSK and 16QAM data modulation schemes with the coding rate of R = 1/2, respectively, considering a large frequency diversity effect in a 12-path exponential decayed Rayleigh fading channel, since the reduced variations in the received signal level in a broadband channel bring about a larger coding gain in Incremental redundancy. We also show that when adaptive modulation and channel coding (AMC) is applied, Incremental redundancy is superior to Chase combining since the large coding gain is effective in achieving a large time diversity gain for a low number of retransmissions such as M = 1 or 2 for a maximum Doppler frequency up to fD = 400 Hz. It is demonstrated, nevertheless, that the total throughput when employing Incremental redundancy associated with a near optimum MCS set according to the channel conditions becomes almost identical to that using Chase combining when a large number of retransmissions, M, is allowed, such as M = 10, owing to time diversity along with frequency diversity.

  • 1/f-Noise Characteristics in 100 nm-MOSFETs and Its Modeling for Circuit Simulation

    Shizunori MATSUMOTO  Hiroaki UENO  Satoshi HOSOKAWA  Toshihiko KITAMURA  Mitiko MIURA-MATTAUSCH  Hans Jurgen MATTAUSCH  Tatsuya OHGURO  Shigetaka KUMASHIRO  Tetsuya YAMAGUCHI  Kyoji YAMASHITA  Noriaki NAKAYAMA  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E88-C No:2
      Page(s):
    247-254

    A systematic experimental and modeling study is reported, which characterizes the low-frequency noise spectrum of 100 nm-MOSFETs accurately. Two kinds of measured spectra are observed: 1/f and non-1/f spectra. The non-1/f spectrum is analysed by forward and backward measurements with exchanged source and drain, and shown to be due to a randomly distributed inhomogeneity of the trap density along the channel and within the gate oxide. By averaging the spectra of identical MOSFETs on a wafer the measured non-1/f noise spectra reduce to a 1/f characteristics. On the basis of these measurement data a noise model for circuit simulation is developed, which reproduces the low-frequency noise spectrum with a single model parameter for all gate lengths and under any bias conditions.

  • Magnetic Marker and High Tc Superconducting Quantum Interference Device for Biological Immunoassays

    Keiji ENPUKU  Katsuhiro INOUE  Kohji YOSHINAGA  Akira TSUKAMOTO  Kazuo SAITOH  Keiji TSUKADA  Akihiko KANDORI  Yoshinori SUGIURA  Shigenori HAMAOKA  Hiroyuki MORITA  Hiroyuki KUMA  Naotaka HAMASAKI  

     
    INVITED PAPER

      Vol:
    E88-C No:2
      Page(s):
    158-167

    Magnetic immunoassays utilizing magnetic marker and high Tc superconducting quantum interference device (SQUID) have been performed. In this magnetic method, binding-reaction between an antigen and its antibody is detected by measuring the magnetic field from the magnetic marker. First, we discuss the magnetic property of the marker, and show that Fe3O4 particles with diameter of 25 nm can be used for remanence measurement. We also show a design of the SQUID for sensitive detection of the magnetic signal from the marker. Next, we developed a measurement system utilizing the SQUID and a reaction chamber with very low magnetic contamination. Finally, we conducted an experiment on the detection of the biological materials called IL8 and IgE. At present, a few atto-mol of IL8 and IgE has been detected, which shows the high sensitivity of the present method.

  • An SPA-Based Extension of Schindler's Timing Attack against RSA Using CRT

    Yuuki TOMOEDA  Hideyuki MIYAKE  Atsushi SHIMBO  Shinichi KAWAMURA  

     
    PAPER-Tamper-Resistance

      Vol:
    E88-A No:1
      Page(s):
    147-153

    At CHES 2000, Schindler introduced a timing attack that enables the factorization of an RSA-modulus if RSA implementations use the Chinese Remainder Theorem and Montgomery multiplication. In this paper we introduce another approach for deriving the secret prime factor by focusing on the conditional branch Schindler used in his attack. One of the countermeasures against Schindler's attack is the blinding method. If input data are blinded with a fixed value or short-period random numbers, Schindler's attack does not work but our method can still factorize the RSA-modulus.

  • WDM-PON Downstream Optical Link Using Wavelength-Locked FP-LD by Spectrally-Sliced FP-LD

    Hyuk-Choon KWON  Won-Seok JANG  Sang-Kook HAN  

     
    LETTER-Fiber-Optic Transmission for Communications

      Vol:
    E88-B No:1
      Page(s):
    384-387

    We have proposed and experimentally demonstrated a novel WDM-PON downstream optical link. It is composed of a wavelength-locked FP-LD with a spectrally-sliced FP-LD as an external-injection optical source and operated as directly-modulating in a downstream-traffic transmitter. The downstream transmissions at 622 Mbps and 2.5 Gbps were performed for four channels over 25 km. The proposed WDM-PON downstream transmitter can be expanded up to eight channels by controlling an external-injection optical source of a spectrally-sliced FP-LD. Also, the transmitter has facility of multi-channel selection by controlling temperature. We verified the potential of the transmitter in WDM-PON optical link.

  • The Distribution of the Spectrum for the Discrete Fourier Transform Test Included in SP800-22

    Kenji HAMANO  

     
    PAPER-Symmetric Key Cryptography

      Vol:
    E88-A No:1
      Page(s):
    67-73

    In this paper, the problem in the distribution of the test statistic of the Discrete Fourier Transform (DFT) test included in SP800-22 released by the National Institute of Standards and Technology (NIST), which causes a very high rate of rejection compared with the significance level, is considered on the basis of the distribution of the spectrum. The statistic of the DFT test, which was supposed to follow the standard normal distribution N(0, 1) according to the central limit theorem, seems to follow the normal distribution N(0.691, 0.5) approximately. The author derived the distribution function of the spectrum, and changed the threshold value from the default value of to the value of 1.7308 , where n is the length of a random number sequence. By this modification, the test statistic becomes to follow the normal distribution N(0, 0.5) approximately. The disagreement between this variance (= 0.5) and that of the standard normal distribution (= 1) can be considered to originate in the dependence of the spectrum. The evidences of the dependence are shown.

  • Two Dimensional Electric Field Measurement in Microstrip-Line Circuits by Coaxial-Type Probe

    Takaharu HIRAOKA  Yoshiaki NEISHI  Tetsuo ANADA  Jui-Pang HSU  

     
    PAPER

      Vol:
    E88-C No:1
      Page(s):
    77-82

    A detailed investigation of the electromagnetic field distributions in high frequency printed circuits and high-speed interconnects is very useful for physical understanding, studies of electromagnetic coupling effects for EMC and EMI and for optimization of electromagnetic circuit designs. The aim of this paper is to show how to measure the electric field distributions in electromagnetic circuits. An electromagnetic analysis for microstrip-line circuits is carried out by using a finite-difference time domain technique and its measurement is carried out by using a small probe antenna. The measurement results are in fairly good agreement with those of the numerical analysis using the FDTD method. Thus, the measurement system offers a valid means for predictions in the theoretical analysis of more complicated discontinuity problems.

  • Analysis of Error Due to Exclusion of Higher Modes on Complex Permittivity Measurement Using Waveguide with Flange

    Kouji SHIBATA  Osamu HASHIMOTO  Ramesh K. POKHAREL  

     
    LETTER-Microwaves, Millimeter-Waves

      Vol:
    E88-C No:1
      Page(s):
    139-142

    In this letter, we discuss the measurement error due to the exclusion of the higher modes when a waveguide with a flange is inserted with lossy dielectric material. The reflection coefficient is calculated by a spectrum-domain approach (SDA), which uses only the dominant (TE10) mode to realize a simplified nondestructive measurement of complex permittivity of lossy dielectric sheets. The analysis shows that the error due to the exclusion of the higher modes decreases as complex permittivity increases. Consequently, we have confirmed that a simplified measurement of complex permittivity is possible by a coverage limitation with the SDA, which excludes the higher modes.

  • Network of Plant Remote Monitoring System Using UDP/IP for Wind-Farms

    Haruhi ETO  Hirofumi MATSUO  Fujio KUROKAWA  

     
    PAPER-Power System Architecture

      Vol:
    E87-B No:12
      Page(s):
    3457-3464

    Wind power generation occupies an important position as a new non-fossil energy in recent years, and the plant scale has been rapidly expanding as wind-farm. Since they are often built in topographically inconvenient places, the remote monitoring system has been required. Ethernet had been said to be unsuitable to the industrial network, it is one of the strong options because of its low cost and easiness to apply. In this case, it is important to secure the throughput enough for updating the data of numerous wind turbines within a fixed time. In order to achieve this, we adopted User Datagram Protocol/Internet Protocol (UDP/IP) and the multi-thread method to make the overhead of software small as possible. This paper presents the scheme of powerful network using Ethernet with multi-thread and multi-cast. The relation between the number of threads and total throughputs of network is clarified. The design procedure to derive the optimum number of threads is shown. And it is demonstrated that this scheme provide the local network of wind-farm with sufficient performance.

  • Measurement-Based Evaluation of TCP Throughput

    Mika ISHIZUKA  Masaki AIDA  Shin-ichi KURIBAYASHI  

     
    PAPER-Internet

      Vol:
    E87-B No:12
      Page(s):
    3637-3649

    Since the TCP is the transport protocol for most Internet applications, evaluation of TCP throughput is important. In this paper, we establish a framework of evaluating TCP throughput by simple measurement. TCP throughput is generally measured by sending TCP traffic and monitoring its arrival or using data from captured packets, neither of which suits our proposal because of heavy loads and lack of scalability. While there has been much research into the analytical modeling of TCP behavior, this has not been concerned with the relationship between modeling and measurement. We thus propose a lightweight method for the evaluation of TCP throughput by associating measurement with TCP modeling. Our proposal is free from the defects of conventional methods, since measurement is performed to obtain the input parameters required to calculate TCP throughput. Numerical examples show the proposed framework's effectiveness.

  • Real-Time IP Flow Measurement Tool with Scalable Architecture

    Yoshinori KITATSUJI  Katsuyuki YAMAZAKI  Masato TSURU  Yuji OIE  

     
    PAPER-Traffic Measurement and Analysis

      Vol:
    E87-D No:12
      Page(s):
    2665-2677

    There is an emerging requirement for real-time flow-based traffic monitoring, which is vital to detecting and/or tracing DoS attacks as well as troubleshooting and traffic engineering in the ISP networks. We propose the architecture for a scalable real-time flow measurement tool in order to allow operators to flexibly define "the targeted flows" on-demand, to obtain various statistics on those flows, and to visualize them in a real-time manner. A traffic distribution device and multiple traffic capture devices processing packets in parallel are included in the architecture, in which the former device copies traffic and distributes it to the latter devices. We evaluate the performance of a proto-type implementation on PC-UNIX in testbed experiments to demonstrate the scalability of our architecture. The evaluation shows that the performance increases in proportion to the number of the capture devices and the maximum performance reaches 80 K pps with six capture devices. Finally we also show applications of our tool, which indicate the advantage of flexible fine-grained flow measurements.

  • Passive Packet Loss Measurement Employing the IP Packet Feature Extraction Technique

    Satoru OHTA  Toshiaki MIYAZAKI  

     
    PAPER-Traffic Measurement and Analysis

      Vol:
    E87-D No:12
      Page(s):
    2627-2634

    Performance measurements are indispensable for managing the Internet. Among the performance measurement techniques known, passive measurement is attractive because of its accuracy; user traffic is observed without inserting additional test traffic. However, the technique is handicapped by its large storage and bandwidth costs. This paper proposes a passive packet loss measurement technique that effectively avoids the difficulty of the conventional passive measurement approaches. Its key advance is utilizing the packet feature computed by a hash function. Since the feature can identify a packet with a short length of data, it becomes possible to greatly decrease the storage and bandwidth costs of passive measurements. The paper details the measurement procedure and assesses the design parameters used in the method. In addition, the validity of the proposed method is confirmed through experiments. The experiments also show the advantage of the method over the conventional active measurement.

  • Semi-Parametric Effective-Bandwidth Estimator Based on Buffer Measurements

    Shigeo SHIODA  Daisuke ISHII  

     
    PAPER-Network

      Vol:
    E87-B No:12
      Page(s):
    3627-3636

    The notion of effective bandwidth provides an elegant and powerful mathematical basis for the provision of QoS-assured services over IP networks. In this paper, we propose a semi-parametric estimator of effective bandwidth, called Gaussian estimator using buffer masurement, for superposition of sources in IP networks. In contrast to most existing proposals concerning the effective bandwidth estimator, our proposal works based on a small set of measurements of the workload in the buffer of a router. We analytically show the property of the proposed estimator with respect to the dependence on the service rate. We provide numerical results to show that our proposed estimator is more accurate than estimators that rely only on the amount of traffic from sources.

  • On the Characteristics of Internet Traffic Variability: Spikes and Elephants

    Tatsuya MORI  Ryoichi KAWAHARA  Shozo NAITO  Shigeki GOTO  

     
    PAPER-Traffic Measurement and Analysis

      Vol:
    E87-D No:12
      Page(s):
    2644-2653

    Analysing and modeling of traffic play a vital role in designing and controlling of networks effectively. To construct a practical traffic model that can be used for various networks, it is necessary to characterize aggregated traffic and user traffic. This paper investigates these characteristics and their relationship. Our analyses are based on a huge number of packet traces from five different networks on the Internet. We found that: (1) marginal distributions of aggregated traffic fluctuations follow positively skewed (non-Gaussian) distributions, which leads to the existence of "spikes", where spikes correspond to an extremely large value of momentary throughput, (2) the amount of user traffic in a unit of time has a wide range of variability, and (3) flows within spikes are more likely to be "elephant flows", where an elephant flow is an IP flow with a high volume of traffic. These findings are useful in constructing a practical and realistic Internet traffic model.

  • An Approach to Develop Requirement as a Core Asset in Product-Line

    Mikyeong MOON  Keunhyuk YEOM  

     
    PAPER-Software Engineering

      Vol:
    E87-D No:12
      Page(s):
    2744-2753

    The methodologies of product-line engineering emphasize proactive reuse to construct high-quality products more quickly that are less costly. Requirement engineering for software product families differs significantly from requirement engineering for single software products. The requirements for a product line are written for the group of systems as a whole, with requirements for individual systems specified by a delta or an increment to the generic set. Therefore, it is necessary to identify and explicitly denote the regions of commonality and points of variation at the requirement level. In this paper, we suggest a method of producing requirements that will be a core asset in the product line. Briefly, requirements for families of similar systems (i.e. domain) are collected and generalized which are then analyzed and modeled. The domain requirement as a core asset explicitly manages the commonality and variability. Through this method, the reuse of domain requirements can be enhanced. As a result, the cost and time of software development can be reduced and the productivity increased while significantly reducing error in the requirements.

621-640hit(1013hit)