The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] REM(1013hit)

641-660hit(1013hit)

  • An Approach to Develop Requirement as a Core Asset in Product-Line

    Mikyeong MOON  Keunhyuk YEOM  

     
    PAPER-Software Engineering

      Vol:
    E87-D No:12
      Page(s):
    2744-2753

    The methodologies of product-line engineering emphasize proactive reuse to construct high-quality products more quickly that are less costly. Requirement engineering for software product families differs significantly from requirement engineering for single software products. The requirements for a product line are written for the group of systems as a whole, with requirements for individual systems specified by a delta or an increment to the generic set. Therefore, it is necessary to identify and explicitly denote the regions of commonality and points of variation at the requirement level. In this paper, we suggest a method of producing requirements that will be a core asset in the product line. Briefly, requirements for families of similar systems (i.e. domain) are collected and generalized which are then analyzed and modeled. The domain requirement as a core asset explicitly manages the commonality and variability. Through this method, the reuse of domain requirements can be enhanced. As a result, the cost and time of software development can be reduced and the productivity increased while significantly reducing error in the requirements.

  • Real-Time IP Flow Measurement Tool with Scalable Architecture

    Yoshinori KITATSUJI  Katsuyuki YAMAZAKI  Masato TSURU  Yuji OIE  

     
    PAPER-Traffic Measurement and Analysis

      Vol:
    E87-D No:12
      Page(s):
    2665-2677

    There is an emerging requirement for real-time flow-based traffic monitoring, which is vital to detecting and/or tracing DoS attacks as well as troubleshooting and traffic engineering in the ISP networks. We propose the architecture for a scalable real-time flow measurement tool in order to allow operators to flexibly define "the targeted flows" on-demand, to obtain various statistics on those flows, and to visualize them in a real-time manner. A traffic distribution device and multiple traffic capture devices processing packets in parallel are included in the architecture, in which the former device copies traffic and distributes it to the latter devices. We evaluate the performance of a proto-type implementation on PC-UNIX in testbed experiments to demonstrate the scalability of our architecture. The evaluation shows that the performance increases in proportion to the number of the capture devices and the maximum performance reaches 80 K pps with six capture devices. Finally we also show applications of our tool, which indicate the advantage of flexible fine-grained flow measurements.

  • Semi-Parametric Effective-Bandwidth Estimator Based on Buffer Measurements

    Shigeo SHIODA  Daisuke ISHII  

     
    PAPER-Network

      Vol:
    E87-B No:12
      Page(s):
    3627-3636

    The notion of effective bandwidth provides an elegant and powerful mathematical basis for the provision of QoS-assured services over IP networks. In this paper, we propose a semi-parametric estimator of effective bandwidth, called Gaussian estimator using buffer masurement, for superposition of sources in IP networks. In contrast to most existing proposals concerning the effective bandwidth estimator, our proposal works based on a small set of measurements of the workload in the buffer of a router. We analytically show the property of the proposed estimator with respect to the dependence on the service rate. We provide numerical results to show that our proposed estimator is more accurate than estimators that rely only on the amount of traffic from sources.

  • Experimental Determination of Propagation Paths for the ETC System--Equipment Development and Field Test--

    Katsuyuki HANEDA  Jun-ichi TAKADA  Takeo IWATA  Yoshitaka WAKINAKA  Takeshi KUNISHIMA  

     
    PAPER-Intelligent Transport System

      Vol:
    E87-A No:11
      Page(s):
    3008-3015

    Electronic Toll Collection (ETC), an application of Dedicated Short Range Wireless Communication (DSRC), had suffered from wrong operations due to multipath problems. To solve this problem, we proposed to apply a simple configured path determination scheme for the ETC system. The system consists of a vector network analyzer, low-noise amplifier, and X-Y positioner and achieves an automatic measurement of the spatial transfer function with emphasis on accurate measurement and reproducibility. For the reliable identification of the propagating paths, 3-D Unitary ESPRIT and SAGE algorithms were employed. Having developed the system, field experiments at the toll gate of the highway was carried out. In the measurements, we could determine many propagation paths so that the dominant propagation phenomena at the toll gate was identified. They included a ground-canopy twice reflected wave, which was a potential path that caused wrong operation. Consequently, their reflection coefficients and polarization characteristics were investigated. From the results, applicability of the path determination system for short range on-site measurement was confirmed.

  • Technical Trends in P2P-Based Communications

    Hiroshi SUNAGA  Takashige HOSHIAI  Satoshi KAMEI  Shoji KIMURA  

     
    SURVEY PAPER-Internet

      Vol:
    E87-B No:10
      Page(s):
    2831-2846

    This paper outlines and analyses major P2P technologies currently being actively studied at various research organisations or already in use in both business and personal environments. Various technical features of P2P as well as its history and market trends are shown. P2P principles focussing on discovery and network-organisational mechanisms of major P2P systems such as JXTA, SIONet, Freenet, and Chord are first summarised. Also, other technical issues related to delivery, network control, security, digital rights management, and distributed computing are described. Then, P2P technologies to promote next-generation community networks with autonomous and intelligent characteristics are addressed. Based on these, P2P applications are analysed and some examples are shown. Studies of P2P traffic measurement, which is difficult by using traditional evaluation methods, are taken up to consider total network design in the P2P era.

  • Low Area and Low Power Structures of DCT-Based Noise Generation System

    Dae-Ik KIM  

     
    LETTER-VLSI Design Technology and CAD

      Vol:
    E87-A No:9
      Page(s):
    2466-2470

    Noise generation systems are used to generate noise signals with specified characteristics. In recent study, noise generation system using DCT outperforms the conventional noise generation system when a noise model requires complicated PSD(Power Spectral Density) specifications. In this paper, low area and low power structures of non-DCT block in DCT-based noise generation system are proposed. Simulation results show that the low area structure results in area reduction by 61-64% and the low power structure achieves power reduction by 88-89% except DCT blocks.

  • Bit Error Rate Calculation for Multi-User Coherent Chaos-Shift-Keying Communication Systems

    Ji YAO  Anthony J. LAWRANCE  

     
    PAPER

      Vol:
    E87-A No:9
      Page(s):
    2280-2291

    Analytical derivation of bit error rates for multi-user coherent chaos-shift-keying (CSK) communication systems are presented in this paper. Nearly exact results are obtained by applying the central limit theorem of statistics to sums of independent variables. Based on χ2 distribution approximations, more viable but still very accurate results decrease complexity of the calculations. The χ2 approach is compared with the widely used Gaussian approximation approach to show its superiority in most cases. Bit error performance bounds for the multi-user CSK system from the approach are deduced as further contributions of this paper. The theoretical results obtained are entirely consistent with a range of simulations.

  • Numerical Evaluation of Incremental Vector Quantization Using Stochastic Relaxation

    Noritaka SHIGEI  Hiromi MIYAJIMA  Michiharu MAEDA  

     
    PAPER

      Vol:
    E87-A No:9
      Page(s):
    2364-2371

    Learning algorithms for Vector Quantization (VQ) are categorized into two types: batch learning and incremental learning. Incremental learning is more useful than batch learning, because, unlike batch learning, incremental learning can be performed either on-line or off-line. In this paper, we develop effective incremental learning methods by using Stochastic Relaxation (SR) techniques, which have been developed for batch learning. It has been shown that, for batch learning, the SR techniques can provide good global optimization without greatly increasing the computational cost. We empirically investigates the effective implementation of SR for incremental learning. Specifically, we consider five types of SR methods: ISR1, ISR2, ISR3, WSR1 and WSR2. ISRs and WSRs add noise input and weight vectors, respectively. The difference among them is when the perturbed input or weight vectors are used in learning. These SR methods are applied to three types of incremental learning: K-means, Neural-Gas (NG) and Kohonen's Self-Organizing Mapping (SOM). We evaluate comprehensively these combinations in terms of accuracy and computation time. Our simulation results show that K-means with ISR3 is the most comprehensively effective among these combinations and is superior to the conventional NG method known as an excellent method.

  • A Refined Fixed Point Theorem for Recurrent System of Fuzzy-Set-Valued Nonlinear Mapping Equations and Its Application to Ring Nonlinear Network Systems

    Kazuo HORIUCHI  

     
    PAPER

      Vol:
    E87-A No:9
      Page(s):
    2308-2313

    Let us introduce n ( 2) nonlinear mappings fi (i = 1,2,,n) defined on complete linear metric spaces (Xi-1,ρ) (i = 1,2,,n), respectively, and let fi:Xi-1 Xi be completely continuous on bounded convex closed subsets Xi-1, (i = 1,2,,n 0), such that fi() . Moreover, let us introduce n fuzzy-set-valued nonlinear mappings Fi:Xi-1Xi {a family of all non-empty closed compact fuzzy subsets of Xi}. Here, by introducing arbitrary constant βi (0,1], for every integer i (i = 1,2,,n 0), separately, we have a fixed point theorem on the recurrent system of βi -level fuzzy-set-valued mapping equations: xi Fiβi(xi-1, fi(xi-1)), (i = 1,2,,n 0), where the fuzzy set Fi is characterized by a membership function µFi(xi):Xi [0,1], and the βi -level set Fiβi of the fuzzy set Fi is defined as Fiβi {ξi Xi |µFi (ξi) βi}, for any constant βi (0,1]. This theorem can be applied immediately to discussion for characteristics of ring nonlinear network systems disturbed by undesirable uncertain fluctuations and to extremely fine estimation of available behaviors of those disturbed systems. In this paper, its mathematical situation and proof are discussed, in detail.

  • A Note on a User Friendly Remote Authentication Scheme with Smart Cards

    Shyi-Tsong WU  Bin-Chang CHIEU  

     
    LETTER-Information Security

      Vol:
    E87-A No:8
      Page(s):
    2180-2181

    In this letter, we indicate that a proposed user-friendly remote authentication scheme with smart card is insecure. The authentication scheme suffers from the replay attack. An adversity can eavesdrop valid authentication information from the communicating data, modify it, and impersonate the legitimate user to login the remote system. We also present a modified scheme to overcome this vulnerability and improve the robustness. In the modified scheme, the replay attack cannot work successfully. To crack the password from the communicating message is infeasible. Even if the password is compromised, the attacker still cannot pass the authentication and gain the authority of the legitimate user.

  • Theoretical Investigation on the Interference Rejection for the Current Measurement Using Magnetic Sensor Arrays

    Jianjun YAO  Yingsan GENG  Jing WANG  Jianhua WANG  

     
    LETTER

      Vol:
    E87-C No:8
      Page(s):
    1281-1285

    A single solid-state magnetic sensor can be used to measure a current by sensing the field near the conductor in a non-contact way. In order to improve the accuracy of the measuring system, magnetic sensor arrays have been introduced in the current measurement around the conductor. An analytical algorithm based on Discrete Fourier Transform (DFT) is presented in this paper, which can separate the effects of the field generated by the current under measurement from the interference fields. A general mathematical model of the interference analysis is set up, which can be used for both DC and AC current measurement and has no restriction on the shape and number of the current conductors. Numerical simulations associated with preliminary experimental results confirm the validity of the approach.

  • Designing Filters by Successive Projection Using Multiple Extreme Frequency Points Based on Fritz John's Theorem

    Yasunori SUGITA  Naoyuki AIKAWA  

     
    PAPER-Filter Design

      Vol:
    E87-A No:8
      Page(s):
    2029-2036

    In this paper, we propose a design method of filters by successive projection (SP) method using multiple extreme frequency points based on Fritz John's theorem. In conventional SP method, only one extreme frequency point at which the deviation from the given specification is maximized is used in the update of the filter coefficients. Therefore, enormous amount of iteration numbers are necessary for research the solution which satisfies the given specification. In the proposed method, the updating coefficient using multiple extreme frequency points is possible by Fritz John's theorem. As a result, the solution converges less iteration number than the conventional SP method.

  • A Novel Optical Fiber Measurement System of Arc Motion in Molded Case Circuit Breakers

    Zhipeng LI  Degui CHEN  Hongwu LIU  Xingwen LI  

     
    PAPER-Contactor and Relay

      Vol:
    E87-C No:8
      Page(s):
    1329-1335

    To measure the arc motion in interruption process of low voltage molded case circuit breakers (MCCBs) more precisely, a set of novel 2-D optical fiber system is developed. To improve the spatial resolution of optical fibers, lens with inhomogeneous dielectric is fixed on the top of each fiber. Furthermore, the full hardware control logic facilitates the real-time, synchronous and high-speed processing and breaks through the restricted bus operation frequency range and data stream capacity of microprocessor. The Publisher-Subscribe behavioral design pattern is applied to the software and the loosely coupled relationship between glyph and experimental data is once established, the graphic configuration can be implemented for simulation analysis, and the flexibility and applicability of the whole system are obviously improved. It demonstrates that the system provides a better research technique especially for new generation MCCB with gas driven arc.

  • Utilization of the On-Chip L2 Cache Area in CC-NUMA Multiprocessors for Applications with a Small Working Set

    Sung Woo CHUNG  Hyong-Shik KIM  Chu Shik JHON  

     
    PAPER-Networking and System Architectures

      Vol:
    E87-D No:7
      Page(s):
    1617-1624

    In CC-NUMA multiprocessor systems, it is important to reduce the remote memory access time. Based upon the fact that increasing the size of the LRU second-level (L2) cache more than a certain value does not reduce the cache miss rate significantly, in this paper, we propose two split L2 caches to utilize the surplus of the L2 cache. The split L2 caches are composed of a traditional LRU cache and another cache to reduce the remote memory access time. Both work together to reduce total L2 cache miss time by keeping remote (or long-distance) blocks as well as recently used blocks. For another cache, we propose two alternatives: an L2-RVC (Level 2 - Remote Victim Cache) and an L2-DAVC (Level 2 - Distance-Aware Victim Cache). The proposed split L2 caches reduce total execution time by up to 27%. It is also found that the proposed split L2 caches outperform the traditional single LRU cache of double size.

  • A 40 GHz Regeneratively and Harmonically Mode-Locked Erbium-Doped Fiber Laser and Its Longitudinal-Mode Characteristics

    Masato YOSHIDA  Taro YAGUCHI  Shinji HARADA  Masataka NAKAZAWA  

     
    PAPER

      Vol:
    E87-C No:7
      Page(s):
    1166-1172

    The oscillation characteristics of a 40 GHz, 1-3 ps regeneratively and harmonically mode-locked erbium-doped fiber laser have been investigated in detail with respect to stability, linewidth, and mode hopping. We show that because the Q value of the microwave filter in the feedback loop is limited to around 1000, which is almost the same as that in a 10 GHz laser, the cavity length should not be greatly increased as this would result in as much as a fourfold increase in the number of longitudinal beat signals. We undertook a detailed stability analysis by using three cavity lengths, 60, 80, and 230 m. The 80 m long cavity greatly improved the long-term stability of the laser because the supermode noise was suppressed and there were not too many longitudinal modes. We measured the linewidth of the longitudinal mode of the laser using a heterodyne method, and it was less than 1 kHz. We also point out that there is a longitudinal mode hopping effect with time that is induced by very small changes in temperature.

  • Metaheuristic Optimization Algorithms for Texture Classification Using Multichannel Approaches

    Jing-Wein WANG  

     
    PAPER-Image

      Vol:
    E87-A No:7
      Page(s):
    1810-1821

    This paper proposes the use of the ratio of wavelet extrema numbers taken from the horizontal and vertical counts respectively as a texture feature, which is called aspect ratio of extrema number (AREN). We formulate the classification problem upon natural and synthesized texture images as an optimization problem and develop a coevolving approach to select both scalar wavelet and multiwavelet feature spaces of greater discriminatory power. Sequential searches and genetic algorithms (GAs) are comparatively investigated. The experiments using wavelet packet decompositions with the innovative packet-tree selection scheme ascertain that the classification accuracy of coevolutionary genetic algorithms (CGAs) is acceptable enough.

  • Improving TCP Performance over ATM-UBR with FED+ Scheme

    YoonTze CHIN  Shiro HANDA  Fumihito SASAMORI  Shinjiro OSHITA  

     
    PAPER-Switching

      Vol:
    E87-B No:6
      Page(s):
    1514-1523

    We had previously proposed a fuzzy logic-based buffer management scheme (BMS) called fuzzy early detection (FED), which was designed to improve transmission control protocol (TCP) performance over the unspecified bit rate (UBR) service of asynchronous transfer mode (ATM) networks. Since a weakness in FED was discovered later, we present a refined version of it named FED+ here. Maintaining the design architecture and the algorithm of FED, FED+ further adopts a specific per virtual connection accounting algorithm to achieve its design goals. The effects of TCP implementation, TCP maximum segment size, switch buffer size and network propagation delay on FED+ performance are studied through simulation. Its performance is then compared with those of pure early packet discard (EPD), P-random early detection (P-RED) and FED. Our evaluations show that FED+ is superior to the others if the issues of efficiency, fairness, robustness, buffer requirement and the ease of tuning control parameters of a BMS are considered collectively.

  • A New Method to Extract MOSFET Threshold Voltage, Effective Channel Length, and Channel Mobility Using S-parameter Measurement

    Han-Yu CHEN  Kun-Ming CHEN  Guo-Wei HUANG  Chun-Yen CHANG  Tiao-Yuan HUANG  

     
    PAPER-Active Devices and Circuits

      Vol:
    E87-C No:5
      Page(s):
    726-732

    In this work, a simple method for extracting MOSFET threshold voltage, effective channel length and channel mobility by using S-parameter measurement is presented. In the new method, the dependence between the channel conductivity and applied gate voltage of the MOSFET device is cleverly utilized to extract the threshold voltage, while biasing the drain node of the device at zero voltage during measurement. Moreover, the effective channel length and channel mobility can also be obtained with the same measurement. Furthermore, all the physical parameters can be extracted directly on the modeling devices without relying on specifically designed test devices. Most important of all, only one S-parameter measurement is required for each device under test (DUT), making the proposed extraction method promising for automatic measurement applications.

  • Measurement of Complex Permittivity for Liquid Phantom by Transmission Line Method Using Coaxial Line

    Kouji SHIBATA  Kensuke TANI  Osamu HASHIMOTO  Kouji WADA  

     
    PAPER-General Methods, Materials, and Passive Circuits

      Vol:
    E87-C No:5
      Page(s):
    689-693

    This paper is focused on the measurement of the complex permittivity of a liquid phantom by the transmission line method using a coaxial line for measuring high-permittivity and high-loss materials. First, the complex permittivity of the liquid phantom material is measured under various physical lengths of the coaxial line for accurate measurement. Secondly, comparison between the measured result and the result obtained by the coaxial probe method is carried out in the frequency range from 0.5 to 3 GHz. Finally, the measurement error included in the complex permittivity is estimated quantitatively. The discussions lead to the conclusion that accurate measurement of the liquid material with high-permittivity and high-loss is possible by the presented method.

  • A Study on an Advanced QoS Provisioning Scheme Using CDMA Traffic Measurement in ALL-IP Networks

    Seokhoon KIM  Intae RYOO  

     
    PAPER-Mobility Management

      Vol:
    E87-B No:5
      Page(s):
    1184-1192

    Currently, the IP infrastructure is widely available, which reduces the deployment and implementation cost of IP-based wireless networks. But, the corresponding researches on Quality of Service (QoS) in wireless mobile networks have not been done sufficiently. Although All-IP network has gotten the spotlight for both wired and wireless integrated networks, it has some unavoidable defects as it is based on best-effort IP transmission technologies. By focusing our attention on this point, we propose an Advanced QoS Provisioning Scheme (AQPS) that can provide satisfied QoS for multimedia applications based on accurate traffic measurements. With the AQPS, we consider 1xEV-DV system as a target system, extract QoS requirements for this system, and develop a corresponding QoS provisioning method using CDMA traffic measurement. The AQPS is designed to estimate delay parameters between a mobile station and a BTS (or repeater), verify whether the mobile station can support RSVP or not, operate a corresponding scheduler, and assign appropriate time slots based on traffic classes. One of the interesting results of this research is that the capability of distinguishing BTS' traffic from repeater's traffic helps save implementation cost of CDMA systems. The AQPS has been verified to outperform the existing system used in the current CDMA network and to efficiently manage network resources by computer simulations.

641-660hit(1013hit)