The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SER(2308hit)

481-500hit(2308hit)

  • Node Query Preservation for Deterministic Linear Top-Down Tree Transducers

    Kazuki MIYAHARA  Kenji HASHIMOTO  Hiroyuki SEKI  

     
    PAPER

      Vol:
    E98-D No:3
      Page(s):
    512-523

    This paper discusses the decidability of node query preservation problems for tree transducers. We assume a transformation given by a deterministic linear top-down data tree transducer (abbreviated as DLTV) and an n-ary query based on runs of a tree automaton. We say that a DLTV Tr strongly preserves a query Q if there is a query Q' such that for every tree t, the answer set of Q' for Tr(t) is equal to the answer set of Q for t. We also say that Tr weakly preserves Q if there is a query Q' such that for every t, the answer set of Q' for Tr(t) includes the answer set of Q for t. We show that the weak preservation problem is coNP-complete and the strong preservation problem is in 2-EXPTIME. We also show that the problems are decidable when a given transducer is a functional extended linear top-down data tree transducer with regular look-ahead, which is a more expressive transducer than DLTV.

  • New Directions for a Japanese Academic Backbone Network Open Access

    Shigeo URUSHIDANI  Shunji ABE  Kenjiro YAMANAKA  Kento AIDA  Shigetoshi YOKOYAMA  Hiroshi YAMADA  Motonori NAKAMURA  Kensuke FUKUDA  Michihiro KOIBUCHI  Shigeki YAMADA  

     
    INVITED PAPER

      Pubricized:
    2014/12/11
      Vol:
    E98-D No:3
      Page(s):
    546-556

    This paper describes an architectural design and related services of a new Japanese academic backbone network, called SINET5, which will be launched in April 2016. The network will cover all 47 prefectures with 100-Gigabit Ethernet technology and connect each pair of prefectures with a minimized latency. This will enable users to leverage evolving cloud-computing powers as well as draw on a high-performance platform for data-intensive applications. The transmission layer will form a fully meshed, SDN-friendly, and reliable network. The services will evolve to be more dynamic and cloud-oriented in response to user demands. Cyber-security measures for the backbone network and tools for performance acceleration and visualization are also discussed.

  • 1.5-GHz Spread-Spectrum PHY Using Reference Clock with 400-ppm Frequency Tolerance for SATA Application

    Takashi KAWAMOTO  Masato SUZUKI  Takayuki NOTO  

     
    PAPER

      Vol:
    E98-A No:2
      Page(s):
    485-491

    A serial ATA PHY fabricated in a 0.15-µm CMOS process performs the serial ATA operation in an asynchronous transition by using large variation in the reference clock. This technique calibrates a transmission signal frequency by utilizing the received signal. This is achieved by calibrating the divide ratio of a spread-spectrum clock generator (SSCG). This technique enables a serial ATA PHY to use reference oscillators with a production-frequency tolerance of less than 400ppm, i.e., higher than the permissible TX frequency variations (i.e., 350ppm). The calibrated transmission signal achieved a total jitter of 3.9ps.

  • Online Synthesis of Conjunctive Decentralized Diagnosers for Discrete Event Systems

    Takashi YAMAMOTO  Shigemasa TAKAI  

     
    LETTER

      Vol:
    E98-A No:2
      Page(s):
    650-653

    In this paper, we consider a decentralized failure diagnosis problem for discrete event systems. For a conjunctively codiagnosable system, there exists a conjunctive decentralized diagnoser that can detect the occurrence of any failure within a uniformly bounded number of steps. We present a method for synthesizing such a conjunctive decentralized diagnoser as an online diagnoser.

  • Zero Forcing Beamforming Based Coordinated Scheduling Algorithm for Downlink Coordinated Multi-Point Transmission System

    Ping WANG  Lei DING  Huifang PANG  Fuqiang LIU  Nguyen Ngoc VAN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:2
      Page(s):
    352-359

    In a multi-cell MIMO system, the rate of edge users is limited by the inter-cell co-channel interference. The CoMP scheme which includes Joint Process (JP) and Coordinated Scheduling/Beamforming (CS/CB) was developed to reduce the inter-cell interference and enhance the edge rate. Because CS/CB can alleviate the overhead of network, it gains attention recently. In this paper, a modified zero forcing beamforming (ZFBF) is applied to downlink transmission in a two-cell MIMO system. In order to enhance system sum rate, a novel coordinated user scheduling algorithm is proposed. Firstly, we select users with high correlation among cross-channels as candidates, and then group users from candidates with high orthogonality among direct-channels, and match user groups in different cells as the final scheduling group pair. Simulations show that the proposed algorithm can achieve a higher system sum rate with low complexity than traditional scheduling algorithms.

  • Experimental Evaluation of Low Complexity User Selection Schemes for Multi-User MIMO Systems

    Satoshi NISHINO  Hidekazu MURATA  

     
    LETTER

      Vol:
    E98-A No:2
      Page(s):
    606-610

    We consider user selection schemes for multi-user MIMO systems with linear precoding. In this work, we apply two user selection schemes based on the orthogonality between the propagation channel of MSs. Indoor transmission experiments are carried out under several scenarios and the performances of user selection schemes are evaluated. It is shown that the transmission performance is improved and the user selection schemes are remarkably affected by the path loss between MSs.

  • Blind Residual CFO Estimation under Single Data Block for Uplink Interleaved OFDMA

    Ann-Chen CHANG  Chih-Chang SHEN  

     
    LETTER-Digital Signal Processing

      Vol:
    E98-A No:1
      Page(s):
    411-414

    In this letter, an iterative carrier frequency offset (CFO) estimation approach is presented which finds a new CFO vector based on first order Taylor series expansion of the one initially given for interleaved orthogonal frequency division multiple access uplink systems. The problem of finding the new CFO vector is formulated as the closed form of a generalized eigenvalue problem, which allows one to readily solve it. The proposed estimator combined center-symmetric trimmed correlation matrix and orthogonal projection technique, which doesn't require eigenvalue decomposition and it only needs single data block.

  • A Service Design Method for Transmission Rate Control in Multitasking That Takes Attention Shift into Account

    Sumaru NIIDA  Satoshi UEMURA  Shigehiro ANO  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    71-78

    With the rapid growth of high performance ICT (Information Communication Technologies) devices such as smart phones and tablet PCs, multitasking has become one of the popular ways of using mobile devices. The reasons users have adopted multitask operation are that it reduces the level of dissatisfaction regarding waiting time and makes effective use of time by switching their attention from the waiting process to other content. This is a good solution to the problem of waiting; however, it may cause another problem, which is the increase in traffic volume due to the multiple applications being worked on simultaneously. Thus, an effective method to control throughput adapted to the multitasking situation is required. This paper proposes a transmission rate control method for web browsing that takes multitasking behavior into account and quantitatively demonstrates the effect of service by two different field experiments. The main contribution of this paper is to present a service design process for a new transmission rate control that takes into account human-network interaction based on the human-centered approach. We show that the degree of satisfaction in relation to waiting time did not degrade even when a field trial using a testbed showed that throughput of the background task was reduced by 40%.

  • Modeling User Behavior in P2P Data Storage System

    Masato UCHIDA  Hideaki IIDUKA  Isao SUGINO  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    33-41

    In recent years, there has been growing interest in systems for sharing resources, which were originally used for personal purposes by individual users, among many unspecified users via a network. An example of such systems is a peer-to-peer (P2P) data storage system that enables users to share a portion of unused space in their own storage devices among themselves. In a recent paper on a P2P data storage system, the user behavior model was defined based on supply and demand functions that depend only on the storage space unit price in a virtual marketplace. However, it was implicitly assumed that other factors, such as unused space of storage devices possessed by users and additional storage space asked by users, did not affect the characteristics of the supply and demand functions. In addition, it was not clear how the values of parameters used in the user behavior model were determined. Therefore, in this paper, we modify the supply and demand functions and determine the values of their parameters by taking the above mentioned factors as well as the price structure of storage devices in a real marketplace into account. Moreover, we provide a numerical example to evaluate the social welfare realized by the P2P data storage system as a typical application of the modified supply and demand functions.

  • Novel Vehicle Information Acquisition Method Using 2D Reflector Code for Automotive Infrared Laser Radar

    Tomotaka WADA  Yusuke SHIKIJI  Keita WATARI  Hiromi OKADA  

     
    PAPER

      Vol:
    E98-A No:1
      Page(s):
    294-303

    In recent years, there are many collision accidents between vehicles due to human errors. As one of countermeasures against the collision accidents, automotive radar systems have been supporting vehicle drivers. By the automotive radar mounted on the vehicle, it is possible to recognize the situation around the vehicle. The ranging with automotive infrared laser radar is very accurate, and able to understand the object existence in the observation around the vehicle. However, in order to grasp the situation around the vehicle, it is necessary to be aware of the attribute of the detected object. The information obtained by the automotive radar vehicle is only the direction and the distance of the object. Thus, the recognition of the attribute of the detected object is very difficult. In this paper, we propose a novel vehicle information acquisition method by using 2D reflector code. Through experiments, we show that the proposed method is able to detect 2D reflector code and is effective for vehicle information acquisition.

  • Behavior Analysis of Video Application Users on Smart Phones Based on State Transition Diagram

    Norihiro FUKUMOTO  Shigehiro ANO  Shigeki GOTO  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    42-50

    Video traffic occupies a major part of current mobile traffic. The characteristics of video traffic are dominated by the behavior of the video application users. This paper uses a state transition diagram to analyze the behavior of video application users on smart phones. Video application users are divided into two categories; keyword search users and initial screen users. They take different first action in video viewing. The result of our analysis shows that the patience of video application users depends on whether they have a specific purpose when they launch a video application or not. Mobile network operators can improve the QoE of video application users by utilizing the results of this study.

  • A QoS-Aware Dual Crosspoint Queued Switch with Largest Weighted Occupancy First Scheduling Algorithm

    Gordana GARDASEVIC  Soko DIVANOVIC  Milutin RADONJIC  Igor RADUSINOVIC  

     
    PAPER-Network

      Vol:
    E98-B No:1
      Page(s):
    201-208

    Support of incoming traffic differentiation and Quality of Service (QoS) assurance is very important for the development of high performance packet switches, capable of separating traffic flows. In our previous paper, we proposed the implementation of two buffers at each crosspoint of a crossbar fabric that leads to the Dual Crosspoint Queued (DCQ) switch. Inside DCQ switch, one buffer is used to store the real-time traffic and the other for the non-real-time traffic. We also showed that the static priority algorithms can provide the QoS only for the real-time traffic due to their greedy nature that gives the absolute priority to that type of traffic. In order to overcome this problem, in our paper we propose the DCQ switch with the Largest Weighted Occupancy First scheduling algorithm that provides the desired QoS support for both traffic flows. Detailed analysis of the simulation results confirms the validity of proposed solution.

  • Hue-Preserving Unsharp-Masking for Color Image Enhancement

    Zihan YU  Kiichi URAHAMA  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2014/09/22
      Vol:
    E97-D No:12
      Page(s):
    3236-3238

    We propose an unsharp-masking technique which preserves the hue of colors in images. This method magnifies the contrast of colors and spatially sharpens textures in images. The contrast magnification ratio is adaptively controlled. We show by experiments that this method enhances the color tone of photographs while keeping their perceptual scene depth.

  • Strict Prioritization of New Requests over Retransmissions for Enhancing Scalability of SIP Servers

    Demir Y. YAVAS  Ibrahim HOKELEK  Bilge GUNSEL  

     
    PAPER

      Vol:
    E97-B No:12
      Page(s):
    2680-2688

    As the quantity of mobile application traffic keeps increasing, operators are facing the scalability limits of VoIP protocols. Higher queuing delays at the Session Initiation Protocol (SIP) server create significantly more retransmissions in the network. When the message arrival rate including retransmissions exceeds the message serving capacity of a SIP server, the queue size increases and eventually the SIP server can crash. Our analysis demonstrates that server crash can be prevented if the buffer size of the SIP server is limited. However, having smaller buffer sizes yields side effects such as lower successful transaction ratio for bursty traffic. In this paper, we propose a new SIP server scheduling mechanism in which the original incoming SIP requests have strict priority over the retransmitted requests. The priority based scheduling mechanism provides network administrator with the ability to configure the buffer size of a SIP server to a moderately high value. We implement the proposed priority-based scheduling mechanism in the JAIN-SIP stack and confirm that the implementation requires minimal changes to the SIP standard. Numerical experiments show that the proposed scheduling mechanism provides significantly and consistently better scalability at high buffer sizes compared to the heavily used first-in-first-out scheduling, thus enabling us to avoid server overloads.

  • Channel Prediction Techniques for a Multi-User MIMO System in Time-Varying Environments

    Kanako YAMAGUCHI  Huu Phu BUI  Yasutaka OGAWA  Toshihiko NISHIMURA  Takeo OHGANE  

     
    PAPER-Antennas and Propagation

      Vol:
    E97-B No:12
      Page(s):
    2747-2755

    Although multi-user multiple-input multiple-output (MI-MO) systems provide high data rate transmission, they may suffer from interference. Block diagonalization and eigenbeam-space division multiplexing (E-SDM) can suppress interference. The transmitter needs to determine beamforming weights from channel state information (CSI) to use these techniques. However, MIMO channels change in time-varying environments during the time intervals between when transmission parameters are determined and actual MIMO transmission occurs. The outdated CSI causes interference and seriously degrades the quality of transmission. Channel prediction schemes have been developed to mitigate the effects of outdated CSI. We evaluated the accuracy of prediction of autoregressive (AR)-model-based prediction and Lagrange extrapolation in the presence of channel estimation error. We found that Lagrange extrapolation was easy to implement and that it provided performance comparable to that obtained with the AR-model-based technique.

  • Removing Deep Faded Subcarrier Channel for Cooperative Multiuser Diversity OFDMA Based on Low Granularity Block

    Yuta IDA  Chang-Jun AHN  Takahiro MATSUMOTO  Shinya MATSUFUJI  

     
    PAPER-Communication Theory and Signals

      Vol:
    E97-A No:12
      Page(s):
    2586-2594

    To achieve more high speed and high quality systems of wireless communications, orthogonal frequency division multiple access (OFDMA) has been proposed. Moreover, OFDMA considering the multiuser diversity (MUDiv) has been also proposed to achieve more high system performance. On the other hand, the conventional MUDiv/OFDMA requires large complexity to select the subcarrier of each user. To solve this problem, we have proposed a MUDiv/OFDMA based on the low granularity block (LGB). However, it degrades the system performance in the environment which contains many deep faded subcarrier channels. Therefore, in this paper, we propose a cooperative LGB-MUDiv/OFDMA to mitigate the influence due to the deep faded subcarrier channel.

  • Optimal Threshold Configuration Methods for Flow Admission Control with Cooperative Users

    Sumiko MIYATA  Katsunori YAMAOKA  Hirotsugu KINOSHITA  

     
    PAPER-Network

      Vol:
    E97-B No:12
      Page(s):
    2706-2719

    We have proposed a novel call admission control (CAC) method for maximizing total user satisfaction in a heterogeneous traffic network and showed their effectiveness by using the optimal threshold from numerical analysis [1],[2]. With these CAC methods, it is assumed that only selfish users exist in a network. However, we need to consider the possibility that some cooperative users exist who would agree to reduce their requested bandwidth to improve another user's Quality of Service (QoS). Under this assumption, conventional CAC may not be optimal. If there are cooperative users in the network, we need control methods that encourage such user cooperation. However, such “encourage” control methods have not yet been proposed. Therefore, in this paper, we propose novel CAC methods for cooperative users by using queueing theory. Numerical analyses show their effectiveness. We also analyze the characteristics of the optimal control parameter of the threshold.

  • In-Network Cache Management Based on Differentiated Service for Information-Centric Networking

    Qian HU  Muqing WU  Hailong HAN  Ning WANG  Chaoyi ZHANG  

     
    PAPER

      Vol:
    E97-B No:12
      Page(s):
    2616-2626

    As a promising future network architecture, Information-centric networking (ICN) has attracted much attention, its ubiquitous in-network caching is one of the key technologies to optimize the dissemination of information. However, considering the diversity of contents and the limitation of cache resources in the Internet, it is usually difficult to find a one-fit-all caching strategy. How to manage the ubiquitous in-network cache in ICN has become an important problem. In this paper, we explore ways to improve cache performance from the three perspectives of spatiality, temporality and availability, based on which we further propose an in-network cache management strategy to support differentiated service. We divide contents requested in the network into different levels and the selection of caching strategies depends on the content level. Furthermore, the corresponding models of utilizing cache resources in spatiality, temporality and availability are also derived for comparison and analysis. Simulation verifies that our differentiated service based cache management strategy can optimize the utilization of cache resources and get higher overall cache performance.

  • Underlay MIMO Cognitive Transceivers Designs with Channel Uncertainty

    Bassant ABDELHAMID  Maha ELSABROUTY  Masoud ALGHONIEMY  Salwa ELRAMLY  Osamu MUTA  Hiroshi FURUKAWA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E97-B No:11
      Page(s):
    2543-2551

    Underlay cognitive radio (CR) permits unlicensed secondary users (SUs) to transmit their own data over the licensed spectrum unless the interference from the SUs on the licensed primary user (PU) exceeds an acceptable level. This paper proposes two generalized interference alignment (IA)-based distributed optimization designs for multiple secondary transceivers in the underlay CR case with channel uncertainty under assumption that the actual channel error norm is below a certain bound. One of the designs is an extension to an existing method and the other one is a new design. In these methods, the precoding and power allocation matrices for each SU are either independently or jointly optimized for imperfect channel knowledge to maximize the secondary rates and to hold the secondary interference on the primary receiver under an acceptable limit that is determined by the primary receiver. Numerical results prove the ability of the proposed methods to support significant secondary rates provided that the PU is protected from extra interference from SUs, even in presence of channel uncertainty.

  • Large Scale Cooperation in Cellular Networks with Non-uniform User Distribution

    Roya E. REZAGAH  Gia Khanh TRAN  Kei SAKAGUCHI  Kiyomichi ARAKI  Satoshi KONISHI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E97-B No:11
      Page(s):
    2512-2523

    In conventional wireless cellular networks, cell coverage is static and fixed, and each user equipment (UE) is connected to one or a few local base stations (BS). However, the users' distribution in the network area commonly fluctuates during a day. When there are congeries of users in some areas, conventional networks waste idle network resources in sparse areas. To address this issue, we propose a novel approach for cooperative cluster formation to dynamically transfer idle network resources from sparse cells to crowded cells or hotspots. In our proposed scheme, BS coverage is directed to hotspots by dynamically changing the antennas' beam angles, and forming large optimal cooperative clusters around hotspots. In this study, a cluster is a group of BSs that cooperatively perform joint transmission (JT) to several UEs. In this paper, a mathematical framework for calculation of the system rate of a cooperative cluster is developed. Next, the set of BSs for each cluster and the antennas' beam angles of each BS are optimized so that the system rate of the network is maximized. The trend of performance variation versus cluster size is studied and its limitations are determined. Numerical results using 3GPP specifications show that the proposed scheme attains several times higher capacity than conventional systems.

481-500hit(2308hit)