The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SER(2307hit)

461-480hit(2307hit)

  • Service Outage Constrained Outage Probability Minimizing Joint Channel, Power and Rate Allocation for Cognitive Radio Multicast Networks

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E98-A No:8
      Page(s):
    1854-1857

    We propose a joint channel, power and rate allocation scheme to minimize the weighted group outage probability of the secondary users (SUs) in a downlink cognitive radio (CR) multicast network coexisting with a primary network, subject to the service outage constraint as well as the interference power constraint and the transmit power constraint. It is validated by simulation results that, compared to the existing schemes, the proposed scheme achieves lower group outage probability.

  • Base Station Cooperative Multiuser MIMO Using Block-Diagonalized Random Beamforming with Online Update

    Nobuhide NONAKA  Anass BENJEBBOUR  Kenichi HIGUCHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:8
      Page(s):
    1622-1629

    This paper proposes applying random (opportunistic) beamforming to base station (BS) cooperative multiuser multiple-input multiple-output (MIMO) transmission. This proposal comprises two parts. First, we propose a block-diagonalized random unitary beamforming matrix. The proposed beamforming matrix achieves better throughput distribution compared to the purely random unitary beamforming matrix when the average path loss determined by distance-dependent loss and shadowing loss is largely different among transmitter antennas, which is true in BS cooperative MIMO. Second, we propose an online update algorithm for a random beamforming matrix to improve the throughput compared to the purely random and channel-independent beamforming matrix generation, especially when the number of users is low. Different from conventional approaches, the proposed online update algorithm does not increase the overhead of the reference signal transmission and control delay. Simulation results show the effectiveness of the proposed method using a block-diagonalized random unitary beamforming matrix with online updates in a BS cooperative multiuser MIMO scenario.

  • A Sequential Iterative Resource Allocation Scheme for a 2-hop OFDMA Virtual Cellular Network

    Gerard Jimmy PARAISON  Eisuke KUDOH  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:8
      Page(s):
    1640-1650

    Multi-hop networks have been proposed to increase the data transmission rate in wireless mobile networks, and consequently improve the quality of experience of cell-edge users. A successive resource allocation scheme (SAS) has been proposed for a 2-hop virtual cellular network (VCN). In a multi-cell environment, the performance of SAS degrades because of intra-cell and inter-cell interference. In order to alleviate the effect of intra-cell and inter-cell interference and consequently increase the channel capacity of the VCN, this paper proposes the sequential iterative allocation scheme (SIS). Computer simulation results show that, compared to SAS, SIS can improve the fairness, the ergodic, and the outage channel capacity per mobile terminal (MT) of the VCN in a multi-cell environment. This paper also analyzes the performance of the VCN compared to that of the single hop network (SHN) when SIS is applied in a multi-cell environment. Using SIS, VCN can provide higher ergodic channel capacity, and better degree of fairness than SHN in a multi-cell environment. The effect of the number of wireless ports (WPs) in the VCN is also investigated, and the results suggest that adding more WPs per virtual cell in the VCN can enhance the outage channel capacity per MT and the degree of fairness of the VCN.

  • A Throughput Evaluation of an Over-Distributed Antenna System with Limited Pilot Resources

    Yuki NAKANISHI  Toshihiko NISHIMURA  Takeo OHGANE  Yasutaka OGAWA  Yusuke OHWATARI  Yoshihisa KISHIYAMA  

     
    PAPER

      Vol:
    E98-B No:8
      Page(s):
    1465-1473

    A distributed antenna system, where the antennas of a base station are spatially distributed throughout the cell, can achieve better throughput at the cell edge than a centralized antenna system. On the other hand, the peak throughput degrades in general because each remote antenna unit has only a few antennas. To achieve both high peak and cell-edge throughputs, we need to increase the total number of antennas. However, this is not easy due to the pilot resource limitation when we use frequency division duplexing. In this paper, we propose using more antennas than pilot resources. The number mismatch between antennas and signals is solved by using a connection matrix. Here, we test two types of connection matrix: signal-distributing and signal-switching. Simulation results show that the sum throughput is improved by increasing the number of antenna elements per remote antenna unit under a constraint on the same number of pilot resources.

  • Using Pulse/Tone Signals as an Alternative to Boost Channel Reservation on Directional Communications

    Lucas DE M. GUIMARÃES  Jacir L. BORDIM  Koji NAKANO  

     
    PAPER

      Vol:
    E98-A No:8
      Page(s):
    1647-1656

    Directional communications have been considered as a feasible alternative to improve spatial division and throughput in mobile communication environments. In general, directional MAC protocols proposed in the literature rely on channel reservation based on control frames, such as RTS/CTS. Notwithstanding, channel reservation based on control frames increases latency and has an impact on the network throughput. The main contribution of this paper is to propose a channel reservation technique based on pulse/tone signals. The proposed scheme, termed directional pulse/tone channel reservation (DPTCR), allows for efficient channel reservation without resorting to control frames such as RTS and CTS. Theoretical and empirical results show that the proposed scheme has a low probability of failure while providing significant throughput gains. The results show that DPTCR is able to provide throughput improvement up to 158% higher as compared to traditional channel reservation employing RTS/CTS frames.

  • Using Designed Structure of Visual Content to Understand Content-Browsing Behavior

    Erina ISHIKAWA  Hiroaki KAWASHIMA  Takashi MATSUYAMA  

     
    PAPER-Human-computer Interaction

      Pubricized:
    2015/05/08
      Vol:
    E98-D No:8
      Page(s):
    1526-1535

    Studies on gaze analysis have revealed some of the relationships between viewers' gaze and their internal states (e.g., interests and intentions). However, understanding content browsing behavior in uncontrolled environments is still challenging because human gaze can be very complex; it is affected not only by viewers' states but also by the spatio-semantic structures of visual content. This study proposes a novel gaze analysis framework which introduces the content creators' point of view to understand the meaning of browsing behavior. Visual content such as web pages, digital articles and catalogs are comprised of structures intentionally designed by content creators, which we refer to as designed structure. This paper focuses on two design factors of designed structure: spatial structure of content elements (content layout), and their relationships such as “being in the same group”. The framework was evaluated with an experiment involving 12 participants, wherein the participant's state was estimated from their gaze behavior. The results from the experiment show that the use of design structure improved estimation accuracies of user states compared to other baseline methods.

  • Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function

    Nam-Su JHO  Ku-Young CHANG  Do-Won HONG  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E98-B No:7
      Page(s):
    1276-1283

    Order-Preserving Encryption (OPE) is an encryption system that preserves the numerical (or alphabetical) order of plaintexts. Since many operations of communications and databases are based on order relations of data (plaintexts), OPE is regarded as a core technique for various applications. However, the intrinsic property of OPE makes constructing an efficient and secure OPE system hard to achieve. In particular, OPE can guarantee only limited security compared to general encryption systems. Only a few results on OPE systems were presented, and no theoretical research based on provable security has been presented until recently. Lately, some approaches have been suggested. However, every known result is unsatisfactory for formalizing the provable security of OPE systems. In this paper, we propose a new OPE system that employs only a simple pseudorandom number function, and therefore has an advantage for practical usage.

  • A Fine-Grained Power Gating Control on Linux Monitoring Power Consumption of Processor Functional Units

    Atsushi KOSHIBA  Motoki WADA  Ryuichi SAKAMOTO  Mikiko SATO  Tsubasa KOSAKA  Kimiyoshi USAMI  Hideharu AMANO  Masaaki KONDO  Hiroshi NAKAMURA  Mitaro NAMIKI  

     
    PAPER

      Vol:
    E98-C No:7
      Page(s):
    559-568

    The authors have been researching on reducing the power consumption of microprocessors, and developed a low-power processor called “Geyser” by applying power gating (PG) function to the individual functional units of the processor. PG function on Geyser reduces the power consumption of functional units by shutting off the power voltage of idle units. However, the energy overhead of switching the supply voltage for units on and off causes power increases. The amount of the energy overhead varies with the behavior of each functional unit which is influenced by running application, and also with the core temperature. It is therefore necessary to switch the PG function itself on or off according to the state of the processor at runtime to reduce power consumption more effectively. In this paper, the authors propose a PG control method to take the power overhead into account by the operating system (OS). In the proposed method, for achieving much power reduction, the OS calculates the power consumption of each functional unit periodically and inhibits the PG function of the unit whose energy overhead is judged too high. The method was implemented in the Linux process scheduler and evaluated. The results show that the average power consumption of the functional units is reduced by up to 17.2%.

  • Centralized Inter-Cell Interference Coordination Using Multi-Band 3D Beam-Switching in Cellular Networks

    Hiroyuki SEKI  Fumiyuki ADACHI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E98-B No:7
      Page(s):
    1363-1372

    The deployment of small cells is one of the most effective means to cope with the traffic explosion of cellular mobile systems. However, a small cell system increases the inter-cell interference, which limits the capacity and degrades the cell-edge user throughput. Inter-cell interference coordination (ICIC), such as fractional frequency reuse (FFR), is a well-known scheme that autonomously mitigates inter-cell interference. In the Long Term Evolution (LTE)-Advanced, the three-dimensional (3D) beamforming, which combines conventional horizontal beamforming and vertical beamforming, has been gaining increasing attention. This paper proposes a novel centralized ICIC scheme that controls the direction of narrow 3D beam for each frequency band of each base station. The centralized controller collects information from the base stations and calculates sub-optimum combinations of narrow beams so as to maximize the proportional fair (PF) utility of all users. This paper describes the throughput of the new centralized ICIC scheme as evaluated by computer simulations and shows it has a significant gain in both average user throughput and cell-edge user throughput compared with the conventional ICIC scheme. This paper also investigates the feasibility of the scheme by assessing its throughput performance in a realistic deployment scenario.

  • FLEXII: A Flexible Insertion Policy for Dynamic Cache Resizing Mechanisms

    Masayuki SATO  Ryusuke EGAWA  Hiroyuki TAKIZAWA  Hiroaki KOBAYASHI  

     
    PAPER

      Vol:
    E98-C No:7
      Page(s):
    550-558

    As energy consumption of cache memories increases, an energy-efficient cache management mechanism is required. While a dynamic cache resizing mechanism is one promising approach to the energy reduction of microprocessors, one problem is that its effect is limited by the existence of dead-on-fill blocks, which are not used until their evictions from the cache memory. To solve this problem, this paper proposes a cache management policy named FLEXII, which can reduce the number of dead-on-fill blocks and help dynamic cache resizing mechanisms further reduce the energy consumption of the cache memories.

  • Rejection of the Position Dependent Disturbance Torque of Motor System with Slowly Varying Parameters and Time Delays

    Daesung JUNG  Youngjun YOO  Sangchul WON  

     
    PAPER-Systems and Control

      Vol:
    E98-A No:7
      Page(s):
    1494-1503

    This paper proposes an updating state dependent disturbance observer (USDDOB) to reject position dependent disturbances when parameters vary slowly, and input and output are time-delayed. To reject the effects of resultant slowly-varying position dependent disturbances, the USDDOB uses the control method of the state dependent disturbance observer (SDDOB) and time-invariance approximation. The USDDOB and a main proportional integral (PI) controller constitute a robust controller. Simulations and experiments using a 1-degree-of-freedom (1-DOF) tilted planar robot show the effectiveness of the proposed method.

  • Countering Malicious Nodes of Inconsistent Behaviors in WSNs: A Combined Approach of Statistic Reputation and Time Series

    Fang WANG  Zhe WEI  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E98-A No:7
      Page(s):
    1584-1587

    In wireless sensor networks, or WSNs, a malicious node is able to cover itself by switching between good and bad behaviors. Even when running under a reputation mechanism, such a node can still behave maliciously now and then so long as its reputation is within the acceptable level. To address this inconsistent behavior issue, a combined approach of statistic reputation and time series is proposed in this study, in which the negative binomial reputation is applied to rate the nodes' reputation and concept of time series is borrowed to analyze the reputation results. Simulations show that the proposed method can effectively counter inconsistent behavior nodes and thus improves the overall system performance.

  • Adding Robustness to Cascade Control of DC Motor Velocity via Disturbance Observers

    In Hyuk KIM  Young Ik SON  

     
    LETTER-Systems and Control

      Vol:
    E98-A No:6
      Page(s):
    1305-1309

    Since the conventional cascade controller for electric motor drives requires accurate information about the system parameters and load conditions to achieve a desired performance, this paper presents a new practical control structure to improve the robust performance against parameter uncertainties. Two first-order disturbance observers (DOB) are incorporated with the cascade structure, to preserve the nominal performance. The analysis of the robust performance of the DOB is presented by using the singular perturbation theory. Simulation results suggest that the proposed controller can be used effectively as an additional compensator to the conventional cascade scheme.

  • Two-Switch Voltage Equalizer Using a Series-Resonant Voltage Multiplier Operating in Frequency-Multiplied Discontinuous Conduction Mode for Series-Connected Supercapacitors

    Masatoshi UNO  Akio KUKITA  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E98-B No:5
      Page(s):
    842-853

    Cell voltage equalizers are necessary to ensure years of operation and maximize the chargeable/dischargeable energy of series-connected supercapacitors (SCs). A two-switch voltage equalizer using a series-resonant voltage multiplier operating in frequency-multiplied discontinuous conduction mode (DCM) is proposed for series-connected SCs in this paper. The frequency-multiplied mode virtually increases the operation frequency and hence mitigates the negative impact of the impedance mismatch of capacitors on equalization performance, allowing multi-layer ceramic capacitors (MLCCs) to be used instead of bulky and costly tantalum capacitors, the conventional approach when using voltage multipliers in equalizers. Furthermore, the DCM operation inherently provides the constant current characteristic, realizing the excessive current protection that is desirable for SCs, which experience 0V and equivalently become an equivalent short-circuit load. Experimental equalization tests were performed for eight SCs connected in series under two frequency conditions to verify the improved equalization performance at the increased virtual operation frequencies. The standard deviation of cell voltages under the higher-frequency condition was lower than that under the lower-frequency condition, demonstrating superior equalization performance at higher frequencies.

  • RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model Open Access

    Hung-Yu CHIEN  Tzong-Chen WU  Chien-Lung HSU  

     
    INVITED PAPER

      Pubricized:
    2014/12/04
      Vol:
    E98-D No:4
      Page(s):
    750-759

    Secure authentication of low cost Radio Frequency Identification (RFID) tag with limited resources is a big challenge, especially when we simultaneously consider anonymity, un-traceability, and forward secrecy. The popularity of Internet of Things (IoT) further amplifies this challenge, as we should authenticate these mobile tags in the partial-distributed-server environments. In this paper, we propose an RFID authentication scheme in the partial-distributed-server environments. The proposed scheme owns excellent performance in terms of computational complexity and scalability as well as security properties.

  • Advantages and Drawbacks of Smartphones and Tablets for Visually Impaired People —— Analysis of ICT User Survey Results ——

    Tetsuya WATANABE  Toshimitsu YAMAGUCHI  Kazunori MINATANI  

     
    PAPER-Rehabilitation Engineering and Assistive Technology

      Pubricized:
    2014/12/26
      Vol:
    E98-D No:4
      Page(s):
    922-929

    A survey was conducted on the use of ICT by visually impaired people. Among 304 respondents, 81 used smartphones and 44, tablets. Blind people used feature phones at a higher rate and smartphones and tablets at lower rates than people with low vision. The most popular smartphone model was iPhone and the most popular tablet model was iPad. While almost all blind users used the speech output accessibility feature and only a few of them used visual features, low vision users used both visual features such as Zoom, Large text, and Invert colors and speech output at high rates both on smartphones and tablets. The most popular text entry methods were different between smartphones and tablets. For smartphones flick and numeric keypad input were popular among low vision users while voice input was the most popular among blind users. For tablets a software QWERTY keyboard was the most popular among both blind and low vision users. The advantages of smartphones were access to geographical information, quick Web browsing, voice input, and extensibility for both blind and low vision users, object recognition for blind users, and readability for low vision users. Tablets also work as a vision aid for people with low vision. The drawbacks of smartphones and tablets were text entry and touch operation difficulties and inaccessible apps for both blind and low vision users, problems in speech output for blind users, and problems in readability for low vision users. Researchers and makers of operating systems (OS) and apps should assume responsibility for solving these problems.

  • A New Approach to Identify User Authentication Methods toward SSH Dictionary Attack Detection

    Akihiro SATOH  Yutaka NAKAMURA  Takeshi IKENAGA  

     
    PAPER-Authentication

      Pubricized:
    2014/12/04
      Vol:
    E98-D No:4
      Page(s):
    760-768

    A dictionary attack against SSH is a common security threat. Many methods rely on network traffic to detect SSH dictionary attacks because the connections of remote login, file transfer, and TCP/IP forwarding are visibly distinct from those of attacks. However, these methods incorrectly judge the connections of automated operation tasks as those of attacks due to their mutual similarities. In this paper, we propose a new approach to identify user authentication methods on SSH connections and to remove connections that employ non-keystroke based authentication. This approach is based on two perspectives: (1) an SSH dictionary attack targets a host that provides keystroke based authentication; and (2) automated tasks through SSH need to support non-keystroke based authentication. Keystroke based authentication relies on a character string that is input by a human; in contrast, non-keystroke based authentication relies on information other than a character string. We evaluated the effectiveness of our approach through experiments on real network traffic at the edges in four campus networks, and the experimental results showed that our approach provides high identification accuracy with only a few errors.

  • A Practical Two-Step Friction Determination for Motion Control Using LuGre Model

    In Hyuk KIM  Young Ik SON  

     
    LETTER-Systems and Control

      Vol:
    E98-A No:3
      Page(s):
    890-893

    In order to improve the motion control performance, a new friction determination method, using the LuGre model, is proposed. The model parameters are determined by performing two-step closed-loop experiments using a proportional-integral observer (PIO). The PIO is also used to develop a robust motion controller to deal with additional uncertainties including the effect of the inaccurate estimation of the friction. The experimental results reveal improved performance compared to that of a single-PIO-based controller.

  • Experimental Validation of Digital Pre-distortion Technique for Dual-band Dual-signal Amplification by Single Feedback Architecture Employing Dual-band Mixer

    Ikuma ANDO  Gia Khanh TRAN  Kiyomichi ARAKI  Takayuki YAMADA  Takana KAHO  Yo YAMAGUCHI  Tadao NAKAGAWA  

     
    PAPER-Electromagnetic Theory

      Vol:
    E98-C No:3
      Page(s):
    242-251

    In this paper we describe and experimentally validate a dual-band digital predistortion (DPD) model we propose that takes account of the intermodulation and harmonic distortion produced when the center frequencies of input bands have a harmonic relationship. We also describe and experimentally validate our proposed novel dual-band power amplifier (PA) linearization architecture consisting of a single feedback loop employing a dual-band mixer. Experiment results show that the DPD linearization the proposed model provides can compensate for intermodulation and harmonic distortion in a way that the conventional two-dimensional (2-D) DPD approach cannot. The proposed feedback architecture should make it possible to simplify analog-to-digital converter (ADC) design and eliminate the time lag between different feedback paths.

  • Node Query Preservation for Deterministic Linear Top-Down Tree Transducers

    Kazuki MIYAHARA  Kenji HASHIMOTO  Hiroyuki SEKI  

     
    PAPER

      Vol:
    E98-D No:3
      Page(s):
    512-523

    This paper discusses the decidability of node query preservation problems for tree transducers. We assume a transformation given by a deterministic linear top-down data tree transducer (abbreviated as DLTV) and an n-ary query based on runs of a tree automaton. We say that a DLTV Tr strongly preserves a query Q if there is a query Q' such that for every tree t, the answer set of Q' for Tr(t) is equal to the answer set of Q for t. We also say that Tr weakly preserves Q if there is a query Q' such that for every t, the answer set of Q' for Tr(t) includes the answer set of Q for t. We show that the weak preservation problem is coNP-complete and the strong preservation problem is in 2-EXPTIME. We also show that the problems are decidable when a given transducer is a functional extended linear top-down data tree transducer with regular look-ahead, which is a more expressive transducer than DLTV.

461-480hit(2307hit)