The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SER(2307hit)

661-680hit(2307hit)

  • Burst Error Resilient Channel Coding for SVC over Mobile Networks

    GunWoo KIM  Yongwoo CHO  Jihyeok YUN  DougYoung SUH  

     
    LETTER-Multimedia Environment Technology

      Vol:
    E95-A No:11
      Page(s):
    2032-2035

    This paper proposes Burst Error Resilient coding (BRC) technology in mobile broadcasting network. The proposed method utilizes Scalable Video Coding (SVC) and Forward Error Correction (FEC) to overcome service outage due to burst loss in mobile network. The performance evaluation is performed by comparing PSNR of SVC and the proposed method under MBSFN simulation channel. The simulation result shows PSNR of SVC equal error protection (EEP), unequal error protection (UEP) and proposed BRC using Raptor FEC code.

  • Effective Design of Transmit Weights for Nonregenerative Multiuser MIMO Relay Downlink System

    Cong LI  Yasunori IWANAMI  Ryota YAMADA  Naoki OKAMOTO  

     
    PAPER-Mobile Information Network

      Vol:
    E95-A No:11
      Page(s):
    1894-1903

    In this paper, we focus on the cancellation of interference among Destination Users (DU's) and the improvement of achievable sum rate of the nonregenerative multiuser Multiple-Input Multiple-Output (MIMO) relay downlink system. A novel design method of transmit weight is proposed to successively eliminate the interference among DU's, each of which is equipped with multiple receive antennas. We firstly investigate the transmit weight design for the Amplify-and-Forward (AF) relay scheme where the Relay Station (RS) just retransmits the received signals from Base Station (BS), then extend it to the joint design scheme of transmit weights at the both BS and RS. In the proposed joint design scheme, through the comparison of lower bound of achievable rate, an effective DU selection algorithm is proposed to generate the transmit weight at the RS and obtain the multiuser diversity. Dirty Paper Coding (DPC) technique is employed to remove the interference among DU's and ensures the achievable rate of downlink. Theoretical derivation and simulation results demonstrate the effectiveness of the proposed scheme in obtaining the achievable rate performance and BER characteristics.

  • Game Theory Based Distributed Beamforming for Multiuser MIMO Relay Networks

    Fan LIU  Hongbo XU  Jun LI  Ping ZHANG  

     
    PAPER-Mobile Information Network

      Vol:
    E95-A No:11
      Page(s):
    1888-1893

    In this paper, we propose a decentralized strategy to find out the linear precoding matrices for a two-hop multiuser relay communication system. From a game-theoretic perspective, we model the source allocation process as a strategic noncooperative game for fixing relay precoding matrix and the multiuser interference treating as additive colored noise. Alternately, from the global optimization perspective, we prove that the optimum relay precoding matrix follows the transceiver Winner filter structure for giving a set of source transmit matrices. Closed-form solutions are finally obtained by using our proposed joint iterative SMSE algorithm and numerical results are provided to give insights on the proposed algorithms.

  • Factor Analysis of Neighborhood-Preserving Embedding for Speaker Verification

    Chunyan LIANG  Lin YANG  Qingwei ZHAO  Yonghong YAN  

     
    LETTER-Speech and Hearing

      Vol:
    E95-D No:10
      Page(s):
    2572-2576

    In this letter, we adopt a new factor analysis of neighborhood-preserving embedding (NPE) for speaker verification. NPE aims at preserving the local neighborhood structure on the data and defines a low-dimensional speaker space called neighborhood-preserving embedding space. We compare the proposed method with the state-of-the-art total variability approach on the telephone-telephone core condition of the NIST 2008 Speaker Recognition Evaluation (SRE) dataset. The experimental results indicate that the proposed NPE method outperforms the total variability approach, providing up to 24% relative improvement.

  • Interoperable Real-Time Medical Systems for Assured Healthcare Services

    Eunjeong PARK  Hyo Suk NAM  

     
    LETTER

      Vol:
    E95-B No:10
      Page(s):
    3100-3102

    We propose a system to provide accurate data and timely medical services, unconstrained by location, through the use of a platform that can utilize mobile devices, interface with sensors and medical information systems. As the application of integrated platform, we aim to develop medical services that manage thrombolytic therapy for emergent stroke patients.

  • Fabrication of Polarization-Maintaining Photonic Crystal Fiber Coupler with Air Hole State Control Using CO2 Laser Irradiation Technique

    Hirohisa YOKOTA  Yusuke ITO  Hiroki KAWASHIRI  Hideyuki KIUE  Hideo TOBITA  Yoh IMAI  Yutaka SASAKI  

     
    BRIEF PAPER-Optoelectronics

      Vol:
    E95-C No:10
      Page(s):
    1689-1691

    Polarization-maintaining photonic crystal fiber couplers (PM-PCFCs) were fabricated using a CO2 laser irradiation technique. We could control the states of air holes in the tapered region of couplers by adjusting the laser power density in the fusion and the elongation processes. It was demonstrated that the air hole remaining PM-PCFC exhibited polarization-splitting characteristics and that the air hole collapsed PM-PCFC had polarization insensitive coupling characteristics.

  • Practical Distributed Location Service for Wireless Sensor Networks with Mobile Sinks

    Heng CHEN  Depei QIAN  Weiguo WU  

     
    PAPER-Network

      Vol:
    E95-B No:9
      Page(s):
    2838-2851

    The location-based routing protocol has proven to be scalable and efficient in large wireless sensor networks with mobile sinks. A great challenge in location-based routing protocols is the design of scalable distributed location service that tracks the current locations of mobile sinks. Although various location services have been proposed in the literature, hierarchical-based location services have the significant advantage of high scalability. However, most of them depend on a global hierarchy of grids. A major disadvantage of this design is that high control overhead occurs when mobile sinks cross the boundaries of the top level grids. In this paper, we introduce Hierarchical Ring Location Service (HRLS) protocol, a practical distributed location service that provides sink location information in a scalable and distributed manner. In contrast to existing hierarchical-based location services, each sink in HRLS constructs its own hierarchy of grid rings distributively. To reduce the communication overhead of location update, sinks utilize the lazy update mechanism with their indirect location. Once a sensor node detects a target, it queries the location of a sink by sending request packets in eight directions. HRLS is evaluated through mathematical analysis and simulations. Compared with a well-known hierarchical-based location service, our results show that HRLS provides a more scalable and efficient distributed location service in scenarios with various network size, sink mobility and increasing number of source nodes.

  • Analysis of Effect of User Misbehaviours on the Reservation-Based MAC Protocols in Wireless Communication Networks Open Access

    Norrarat WATTANAMONGKHOL  Warakorn SRICHAVENGSUP  Pisit VANICHCHANUNT  Robithoh ANNUR  Jun-ichi TAKADA  Lunchakorn WUTTISITTIKULKIJ  

     
    PAPER-Network

      Vol:
    E95-B No:9
      Page(s):
    2794-2806

    In a shared medium communication system, mobile users contend for channel access according to a given set of rules to avoid collisions and achieve efficient use of the medium. If one or more users do not comply with the agree rules either due to selfish or malicious behaviours, they will cause some impacts on the system performance, especially to the well-behaved users. In this paper, we consider the problem of user misbehaviours on the performance of a wireless infrastructure-based network using reservation-based MAC protocols. Key misbehaving strategies possible in such a network are identified and explained. To quantify the impact of these misbehaviours upon the network performance, three different misbehaving scenarios are developed to allow a systematic investigation of each misbehaving strategy. For each scenario, we have derived mathematical formulations for evaluating and analyzing the key performance metrics, i.e., probabilities of success of well-behaved and misbehaved users and the fairness index. Numerical results show that the presence of misbehaviours can cause different levels of damage depending on the misbehavior strategy used. The combined multi-token and increasing permission probability strategies where the misbehaved user selfishly accesses the channel more times and with higher probabilities than allowed is shown to cause the most severe impairment of performance and fairness.

  • Bandwidth Enhanced Operation of Single Mode Semiconductor Laser by Intensity Modulated Signal Light Injection

    Hiroki ISHIHARA  Yosuke SAITO  Wataru KOBAYASHI  Hiroshi YASAKA  

     
    BRIEF PAPER-Lasers, Quantum Electronics

      Vol:
    E95-C No:9
      Page(s):
    1549-1551

    3 dB bandwidth enhancement of single mode semiconductor lasers is confirmed numerically and experimentally when they are operated by intensity modulated signal light injection. 3 dB bandwidth is enlarged to 2.5 times of resonant frequency. The numerical analysis of rate equations predicts that the bandwidth enhancement is accomplished by the modal gain control of semiconductor lasers with injected intensity modulated signal light through non-linear gain coefficient term.

  • Cryptanalysis of a Smartcard-Based User Authentication Scheme for Multi-Server Environments

    Debiao HE  Hao HU  

     
    LETTER-Multimedia Systems for Communications

      Vol:
    E95-B No:9
      Page(s):
    3052-3054

    Recently, Lee et al. [Y. Lee, E. Kim, S. Seok, and M. Jung, A smartcard-based user authentication scheme to ensure the PFS in multi-server environments, IEICE Transactions on Communications, vol.E95-B, no.2, pp.619–622, 2012] proposed a smartcard-based user authentication scheme for multi-server environments. They claimed that their scheme could withstand various attacks and provide the perfect forward secrecy (PFS). However, in this letter, we will point out that their scheme is vulnerable to three kinds of attacks and cannot provide the PFS.

  • RING: A Cross-Layer P2P Group Conferencing Mechanism over Mobile Ad-Hoc Networks

    Jun-Li KUO  Chen-Hua SHIH  Cheng-Yuan HO  Ming-Ching WANG  Yaw-Chung CHEN  

     
    PAPER

      Vol:
    E95-B No:9
      Page(s):
    2759-2768

    In the infrastructure-less disaster environment, the application of the peer-to-peer (P2P) group conference over mobile ad hoc network (MANET) can be used to communicate with each other when the rescue crews search the survivors but work separately. However, there still are several problems of in-time multimedia delivery in P2P-MANET: (1) MANET mobility influences the maintenance of P2P overlay. (2) P2P overlay is not proximal to MANET topology, this leads to the inefficient streaming delivery. (3) The unreliable wireless connection leads to the difficulty of multi-source P2P group conferencing. Therefore, P2P conferencing cannot work well on MANET. To overcome the above disadvantages, in this paper, we present a cross-layer P2P group conferencing mechanism over MANET, called RING (Real-time Intercommunication Network Gossip). The RING uses the ring overlay to manage peers and utilizes the cross-layer mechanism to force the ring overlay to be proximal to MANET topology. Therefore, RING can lead efficient in-time multimedia streaming delivery. On the other hand, the ring overlay can deal with peer joining/leaving fast and simply, and improves the delivery efficiency with the minimum signaling overhead. Through mathematical theory and a series of experiments, we demonstrate that RING is workable and it can shorten the source-to-end delay with minimal signaling overhead.

  • Throughput Improvement Technique Using Adaptive Control of Perturbation Interval for Downlink Multi-User MIMO Based on Vector Perturbation

    Hiroki MORI  Yuji TOHZAKA  Tsuguhide AOKI  Yasuhiko TANABE  

     
    PAPER-Antennas and Propagation

      Vol:
    E95-B No:9
      Page(s):
    2861-2869

    In a downlink multi-user multiple-input multiple-output (MU-MIMO) system, the vector perturbation (VP) method, which is one of the non-linear precoding methods, is a promising technique with which to maximize the channel capacity. In the VP method, the receiver requires the modulo operation to remove the perturbation signal added at the transmitter. However, owing to noise, the modulo operation may not run correctly which makes the soft demapper produce unreliable log-likelihood ratios (LLRs), resulting in a degradation of system throughput. To enhance the throughput performance, we propose a method that expands the basic perturbation interval and adaptively controls the expansion rate according to the modulation and coding scheme (MCS). The optimum expansion rate is derived by link-level simulation and the system throughput is measured by system-level simulation. The system-level simulation results show that the proposed VP method can obtain higher throughput than the conventional VP method.

  • Flow Control Scheme Using Adaptive Receiving Opportunity Control for Wireless Multi-Hop Networks

    Atsushi TAKAHASHI  Nobuyoshi KOMURO  Shiro SAKATA  Shigeo SHIODA  Tutomu MURASE  

     
    PAPER

      Vol:
    E95-B No:9
      Page(s):
    2751-2758

    In wireless single-hop networks, IEEE 802.11e Enhanced Distributed Channel Access (EDCA) is the standard for Quality of Service (QoS) control. However, it is necessary for controlling QoS to modify the currently used IEEE 802.11 Distributed Coordination Function (DCF)-compliant terminals as well as Access Points (APs). In addition, it is necessary to modify the parameter of IEEE 802.11e EDCA when the traffic is heavy. This paper proposes a novel scheme to guarantee QoS of high-priority flow with Receiving Opportunity Control in MAC Frame (ROC) employed adaptive flow control in wireless multi-hop network. In the proposed scheme, the edge APs which are directly connected to user terminals estimate the network capacity, and calculate appropriate ACK prevention probability against low-priority flow according to traffic load. Simulation evaluation results show that the proposed scheme guarantees QoS.

  • Dynamic Resource Management in Clouds: A Probabilistic Approach Open Access

    Paulo GONÇALVES  Shubhabrata ROY  Thomas BEGIN  Patrick LOISEAU  

     
    INVITED PAPER

      Vol:
    E95-B No:8
      Page(s):
    2522-2529

    Dynamic resource management has become an active area of research in the Cloud Computing paradigm. Cost of resources varies significantly depending on configuration for using them. Hence efficient management of resources is of prime interest to both Cloud Providers and Cloud Users. In this work we suggest a probabilistic resource provisioning approach that can be exploited as the input of a dynamic resource management scheme. Using a Video on Demand use case to justify our claims, we propose an analytical model inspired from standard models developed for epidemiology spreading, to represent sudden and intense workload variations. We show that the resulting model verifies a Large Deviation Principle that statistically characterizes extreme rare events, such as the ones produced by “buzz/flash crowd effects” that may cause workload overflow in the VoD context. This analysis provides valuable insight on expectable abnormal behaviors of systems. We exploit the information obtained using the Large Deviation Principle for the proposed Video on Demand use-case for defining policies (Service Level Agreements). We believe these policies for elastic resource provisioning and usage may be of some interest to all stakeholders in the emerging context of cloud networking.

  • Bit-Error and Soft-Error Resilient 7T/14T SRAM with 150-nm FD-SOI Process

    Shusuke YOSHIMOTO  Takuro AMASHITA  Shunsuke OKUMURA  Koji NII  Masahiko YOSHIMOTO  Hiroshi KAWAGUCHI  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E95-A No:8
      Page(s):
    1359-1365

    This paper presents measurement results of bit error rate (BER) and soft error rate (SER) improvement on 150-nm FD-SOI 7T/14T (7-transistor/ 14-transistor) SRAM test chips. The reliability of the 7T/14T SRAM can be dynamically changed by a control signal depending on an operating condition and application. The 14T dependable mode allocates one bit in a 14T cell and improves the BER in a read operation and SER in a retention state, simultaneously. We investigate its error rate mitigating mechanisms using Synopsys TCAD simulator. In our measurements, the minimum operating voltage was improved by 100 mV, the alpha-induced SER was suppressed by 80.0%, and the neutron-induced SER was decreased by 34.4% in the 14T dependable mode over the 7T normal mode.

  • Laser Radar Receiver Performance Improvement by Inter Symbol Interference

    Xuesong MAO  Daisuke INOUE  Hiroyuki MATSUBARA  Manabu KAGAMI  

     
    PAPER-Sensing

      Vol:
    E95-B No:8
      Page(s):
    2631-2637

    The power of laser radar received echoes varies over a large range due to many factors such as target distance, size, reflection ratio, etc, which leads to the difficulty of decoding codes from the received noise buried signals for spectrum code modulated laser radar. Firstly, a pseudo-random noise (PN) code modulated laser radar model is given, and the problem to be addressed is discussed. Then, a novel method based on Inter Symbol Interference (ISI) is proposed for resolving the problem, providing that only Additive White Gaussian Noise (AWGN) exists. The ISI effect is introduced by using a high pass filter (HPF). The results show that ISI improves laser radar receiver decoding ratio, thus the peak of the correlation function of decoded codes and modulation codes. Finally, the effect of proposed method is verified by a simple experiment.

  • Primary Traffic Based Cooperative Multihop Relaying with Preliminary Farthest Relay Selection in Cognitive Radio Ad Hoc Networks

    I-Te LIN  Iwao SASASE  

     
    PAPER-Network

      Vol:
    E95-B No:8
      Page(s):
    2586-2599

    We propose a primary traffic based multihop relaying algorithm with cooperative transmission (PTBMR-CT). It enlarges the hop transmission distances to reduce the number of cognitive relays on the route from the cognitive source (CS) to the cognitive destination (CD). In each hop, from the cognitive nodes in a specified area depending on whether the primary source (PS) transmits data to the primary destination (PD), the cognitive node that is farthest away from the cognitive relay that sends data is selected as the other one that receives data. However, when the PS is transmitting data to the PD, from the cognitive nodes in a specified area, another cognitive node is also selected and prepared to be the cognitive relay that receives data of cooperative transmission. Cooperative transmission is performed if the PS is still transmitting data to the PD when the cognitive relay that receives data of the next hop transmission is being searched. Simulation results show that the average number of cognitive relays is reduced by PTBMR-CT compared to conventional primary traffic based farthest neighbor relaying (PTBFNR), and PTBMR-CT outperforms conventional PTBFNR in terms of the average end-to-end reliability, the average end-to-end throughput, the average required transmission power of transmitting data from the CS to the CD, and the average end-to-end transmission latency.

  • Reduction of Intensity Noise in Semiconductor Lasers by Simultaneous Usage of the Superposition of High Frequency Current and the Electric Negative Feedback

    Minoru YAMADA  Itaru TERA  Kenjiro MATSUOKA  Takuya HAMA  Yuji KUWAMURA  

     
    BRIEF PAPER-Lasers, Quantum Electronics

      Vol:
    E95-C No:8
      Page(s):
    1444-1446

    Reduction of the intensity noise in semiconductor lasers is an important subject for the higher performance of an application. Simultaneous usage of the superposition of high frequency current and the electric negative feedback loop was proposed to suppress the noise for the higher power operation of semiconductor lasers. Effective noise reduction of more than 25 dB with 80 mW operation was experimentally demonstrated.

  • Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity

    Jung Hee CHEON  Stanislaw JARECKI  Jae Hong SEO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:8
      Page(s):
    1366-1378

    Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such a task could have multiple potential applications in commerce, health care, and security. However, all currently known secure set intersection protocols for n > 2 parties have computational costs that are quadratic in the (maximum) number of entries in the dataset contributed by each party, making secure computation of the set intersection only practical for small datasets. In this paper, we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. For a fixed security parameter, our protocols require O(n2k) bits of communication and Õ(n2k) group multiplications per player in the malicious adversary setting, where k is the size of each dataset. Our protocol follows the basic idea of the protocol proposed by Kissner and Song, but we gain efficiency by using different representations of the polynomials associated with users' datasets and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently. Moreover, the proposed protocol is robust. This means that the protocol outputs the desired result even if some corrupted players leave during the execution of the protocol.

  • High-Temperature Operation of Photonic-Crystal Lasers for On-Chip Optical Interconnection Open Access

    Koji TAKEDA  Tomonari SATO  Takaaki KAKITSUKA  Akihiko SHINYA  Kengo NOZAKI  Chin-Hui CHEN  Hideaki TANIYAMA  Masaya NOTOMI  Shinji MATSUO  

     
    PAPER

      Vol:
    E95-C No:7
      Page(s):
    1244-1251

    To meet the demand for light sources for on-chip optical interconnections, we demonstrate the continuous-wave (CW) operation of photonic-crystal (PhC) nanocavity lasers at up to 89.8 by using InP buried heterostructures (BH). The wavelength of a PhC laser can be precisely designed over a wide range exceeding 100 nm by controlling the lattice constant of the PhC. The dynamic responses of the PhC laser are also demonstrated with a 3-dB bandwidth of over 7.0 GHz at 66.2. These results reveal the laser's availability for application to wavelength division multiplexed (WDM) optical interconnection on CMOS chips. We discuss the total bandwidths of future on-chip optical interconnections, and report the capabilities of PhC lasers.

661-680hit(2307hit)