The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SER(2307hit)

761-780hit(2307hit)

  • QoS Aware Energy Efficiency Analysis in the Cellular Networks

    Bei LIU  Ling QIU  Jie XU  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:10
      Page(s):
    2925-2928

    In cellular networks, maximizing the energy efficiency (EE) while satisfying certain QoS requirements is challenging. In this article, we utilize effective capacity (EC) theory as an effective means of meeting these challenges. Based on EC and taking a realistic base station (BS) power consumption model into account, we develop a novel energy efficiency (EE) metric: effective energy efficiency (EEE), to represent the delivered service bit per energy consumption at the upper layer with QoS constraints. Maximizing the EEE problem with EC constraints is addressed and then an optimal power control scheme is proposed to solve it. After that, the EEE and EC tradeoff is discussed and the effects of diverse QoS parameters on EEE are investigated through simulations, which provides insights into the quality of service (QoS) provision, and helps the system power consumption optimization.

  • Towards Opening Network Knowledge for User-Centric Services in NGN

    Yoo-mi PARK  Aekyung MOON  Byung-sun LEE  Sangha KIM  

     
    PAPER-Network

      Vol:
    E94-B No:9
      Page(s):
    2501-2510

    In this paper, we propose a Network Knowledge Layer (NKL) that is a service platform overlaid onto the existing networks to provide network knowledge for user-centric services in the Next Generation Network (NGN). Most traditional networks lack capabilities for accommodating user-centric service paradigm. Taking this into consideration, the proposed NKL has capabilities to acquire contextual information from various sources, to evolve this information with legacy information into high-level knowledge, and to expose the high-level knowledge to entities outside the network. For easy knowledge exposure, we specify a set of abstracted application programming interfaces (APIs). For efficient handling of network knowledge accessed by the APIs, we design and compare the three different network knowledge models. With the proposed APIs and the three knowledge models, we accomplish the experimental performance evaluation of NKL to verify its feasibility. The results of the various tests on knowledge models and APIs give good guidelines for efficient design and exposing network knowledge in developing a user-centric service platform. Finally, we expect NKL can support the effective development and execution of user-centric services by providing rich network knowledge with the APIs.

  • Numerical Simulations for Wearable BAN Propagation Channel during Various Human Movements

    Takahiro AOYAGI  Minseok KIM  Jun-ichi TAKADA  Kiyoshi HAMAGUCHI  Ryuji KOHNO  

     
    LETTER

      Vol:
    E94-B No:9
      Page(s):
    2496-2500

    In this paper, we performed six human movement simulation by a commercial software (Poser7). We performed FDTD simulations for body area network propagation with one transmitter and six receivers. Received amplitudes were calculated for every time frame of 1/30 s interval. We also demonstrated a polarization diversity effectiveness for dynamic wearable body area network propagation.

  • Software-Based Parallel Cryptographic Solution with Massive-Parallel Memory-Embedded SIMD Matrix Architecture for Data-Storage Systems

    Takeshi KUMAKI  Tetsushi KOIDE  Hans Jurgen MATTAUSCH  Masaharu TAGAMI  Masakatsu ISHIZAKI  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E94-D No:9
      Page(s):
    1742-1754

    This paper presents a software-based parallel cryptographic solution with a massive-parallel memory-embedded SIMD matrix (MTX) for data-storage systems. MTX can have up to 2,048 2-bit processing elements, which are connected by a flexible switching network, and supports 2-bit 2,048-way bit-serial and word-parallel operations with a single command. Furthermore, a next-generation SIMD matrix called MX-2 has been developed by expanding processing-element capability of MTX from 2-bit to 4-bit processing. These SIMD matrix architectures are verified to be a better alternative for processing repeated-arithmetic and logical-operations in multimedia applications with low power consumption. Moreover, we have proposed combining Content Addressable Memory (CAM) technology with the massive-parallel memory-embedded SIMD matrix architecture to enable fast pipelined table-lookup coding. Since both arithmetic logical operation and table-lookup coding execute extremely fast on these architectures, efficient execution of encryption and decryption algorithms can be realized. Evaluation results of the CAM-less and CAM-enhanced massive-parallel SIMD matrix processor for the example of the Advanced Encryption Standard (AES), which is a widely-used cryptographic algorithm, show that a throughput of up to 2.19 Gbps becomes possible. This means that several standard data-storage transfer specifications, such as SD, CF (Compact Flash), USB (Universal Serial Bus) and SATA (Serial Advanced Technology Attachment) can be covered. Consequently, the massive-parallel SIMD matrix architecture is very suitable for private information protection in several data-storage media. A further advantage of the software based solution is the flexible update possibility of the implemented-cryptographic algorithm to a safer future algorithm. The massive-parallel memory-embedded SIMD matrix architecture (MTX and MX-2) is therefore a promising solution for integrated realization of real-time cryptographic algorithms with low power dissipation and small Si-area consumption.

  • Monolithically Integrated Wavelength-Routing Switch Using Tunable Wavelength Converters with Double-Ring-Resonator Tunable Lasers Open Access

    Toru SEGAWA  Shinji MATSUO  Takaaki KAKITSUKA  Yasuo SHIBATA  Tomonari SATO  Yoshihiro KAWAGUCHI  Yasuhiro KONDO  Ryo TAKAHASHI  

     
    PAPER-Optoelectronics

      Vol:
    E94-C No:9
      Page(s):
    1439-1446

    We present an 88 wavelength-routing switch (WRS) that monolithically integrates tunable wavelength converters (TWCs) and an 88 arrayed-waveguide grating. The TWC consists of a double-ring-resonator tunable laser (DRR TL) allowing rapid and stable switching and a semiconductor-optical-amplifier-based optical gate. Two different types of dry-etched mirrors form the laser cavity of the DRR TL, which enable integration of the optical components of the WRS on a single chip. The monolithic WRS performed 18 high-speed wavelength routing of a non-return-to-zero signal at 10 Gbit/s. The switching operation was demonstrated by simultaneously using two adjacent TWCs.

  • Reliable Decision-Aided Multiuser Detection for Cooperative CDMAs

    Hoang-Yang LU  Yen-Yu CHEN  

     
    LETTER-Spread Spectrum Technologies and Applications

      Vol:
    E94-A No:9
      Page(s):
    1892-1895

    In this paper, we propose a simple, yet effective, multiuser detection scheme for a two-hop cooperative CDMAs. In phase 1, the minimum mean square error (MMSE) detector at the destination is used to identify reliable decisions of direct transmissions from the sources and return them to the relays. Then, in phase 2, based on the reliable decisions, the relays and the destination successively utilize the maximum likelihood (ML) detectors to estimate the residual symbols. Due to the destination estimating the symbols separately from direct transmissions and the relaying signals, as a result the destination does not need the information about the relays' decision performance for the construction of the ML detector. Hence, the proposed scheme is more feasible than existing approaches for practical implementation. In addition, due to the ML detectors in phase 2 only estimating the residual symbols, the number of computations performed by the ML detectors can be reduced significantly. The results of simulations and complexity analysis demonstrate the efficiency and effectiveness of the proposed scheme.

  • VoIP Accounting Model: Using the Gap Ratio as a Quality Metric

    Younchan JUNG  J. William ATWOOD  

     
    LETTER-Network

      Vol:
    E94-B No:9
      Page(s):
    2638-2641

    Providing quality-of service (QoS) guarantees in VoIP applications has become an urgent demand in wireless and mobile networks. One of the important issues is to find a simple quality metric fitted to low power mobile devices such as smart phones. This paper considers the gap ratio (the proportion of the accumulated gap periods over the whole call session) as a simple quality metric. Our study aims to find the optimum packet count threshold between two adjacent lost packets (referred to as Gmin in RTCP-XR), which is needed for the purpose of identifying whether the current packet at the receiver belongs to the gap state or the burst state, because quality prediction errors depend on the Gmin value when the gap ratio is used as a simple quality metric. Based on this metric, we propose an accounting model that can be a candidate accounting metric useful for a quality-based accounting mechanism.

  • Detection of Tongue Protrusion Gestures from Video

    Luis Ricardo SAPAICO  Hamid LAGA  Masayuki NAKAJIMA  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E94-D No:8
      Page(s):
    1671-1682

    We propose a system that, using video information, segments the mouth region from a face image and then detects the protrusion of the tongue from inside the oral cavity. Initially, under the assumption that the mouth is closed, we detect both mouth corners. We use a set of specifically oriented Gabor filters for enhancing horizontal features corresponding to the shadow existing between the upper and lower lips. After applying the Hough line detector, the extremes of the line that was found are regarded as the mouth corners. Detection rate for mouth corner localization is 85.33%. These points are then input to a mouth appearance model which fits a mouth contour to the image. By segmenting its bounding box we obtain a mouth template. Next, considering the symmetric nature of the mouth, we divide the template into right and left halves. Thus, our system makes use of three templates. We track the mouth in the following frames using normalized correlation for mouth template matching. Changes happening in the mouth region are directly described by the correlation value, i.e., the appearance of the tongue in the surface of the mouth will cause a decrease in the correlation coefficient through time. These coefficients are used for detecting the tongue protrusion. The right and left tongue protrusion positions will be detected by analyzing similarity changes between the right and left half-mouth templates and the currently tracked ones. Detection rates under the default parameters of our system are 90.20% for the tongue protrusion regardless of the position, and 84.78% for the right and left tongue protrusion positions. Our results demonstrate the feasibility of real-time tongue protrusion detection in vision-based systems and motivates further investigating the usage of this new modality in human-computer communication.

  • Estimating Environment-Independent Parameters on Basis of Comparative Assessment of User's Subjectivity

    Yasuhiro SATO  Shin'ichiro KITANO  Shingo ATA  Ikuo OKA  

     
    PAPER-Network

      Vol:
    E94-B No:8
      Page(s):
    2265-2273

    We analyze subjective assessments by comparative evaluations of bulk data transmission by using two psychological methods (the method of successive categories and the constant method). From the results of the first experiment, the thresholds at which participants downloading a data file began to feel dissatisfaction with service degradation are 15.7 Mbps and 11.6 Mbps obtained by the two different methods when the throughput without the service degradation is approximately 22 Mbps. In the second experiment, we investigate the threshold of user satisfaction for various network environments. The threshold is 63% of the throughput of the user's usual network environment. Moreover, from the viewpoint of download time, users feel dissatisfaction with the quality when download time becomes 1.5 times longer. These values can be used to more effectively allocate network resources and thereby achieve higher service quality.

  • Performance Analysis of AF Cooperative Networks with Nth User Selection over Rayleigh Fading Channel

    Xuefang LIU  Qinghai YANG  Fenglin FU  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:8
      Page(s):
    2423-2426

    In this letter, we investigate the Nth-best user selection scheme for amplify-and-forward cooperative systems over Rayleigh fading channels. We deduce the probability density function, the cumulative density function, and the moment generating function of the end-to-end signal-to-noise ratio of the system. Then, the respective closed-form expressions of the average symbol error probability and the outage probability at the destination are derived. The diversity order obtained in the scheme increases with user number but becomes less as the selection sequence number N increases. Simulation results verify the analytical results.

  • Handoff Scheme Considering Service History Adaptively in Heterogeneous Networks

    Kyungkoo JUN  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:8
      Page(s):
    2435-2438

    Multiple-attribute based handoff schemes suffer from instability because of the dynamic nature of attributes and the distribution of handoff procedure over candidate networks, resulting in frequent handoffs that degrade the efficiency of resource management. To alleviate such instability, a service-history based scheme was proposed but it has several improper design decisions, e.g. it considers the history factors too optimistically and employs fixed weights that are likely to distort handoff decisions. This letter proposes to improve handoff performance by considering network state along with the service history. It takes into account the network utilization to avoid the optimistic dependency on the history and adaptively determines the weight to the service history in order to adjust its effect on the handoff decision. Simulation results show that the proposed scheme optimizes the number of handoff and the dropping probability when compared with existing schemes.

  • Modeling of Electric Vehicle Charging Systems in Communications Enabled Smart Grids

    Seung Jun BAEK  Daehee KIM  Seong-Jun OH  Jong-Arm JUN  

     
    LETTER-Information Network

      Vol:
    E94-D No:8
      Page(s):
    1708-1711

    We consider a queuing model with applications to electric vehicle (EV) charging systems in smart grids. We adopt a scheme where an Electric Service Company (ESCo) broadcasts a one bit signal to EVs, possibly indicating 'on-peak' periods during which electricity cost is high. EVs randomly suspend/resume charging based on the signal. To model the dynamics of EVs we propose an M/M/∞ queue with random interruptions, and analyze the dynamics using time-scale decomposition. There exists a trade-off: one may postpone charging activity to 'off-peak' periods during which electricity cost is cheaper, however this incurs extra delay in completion of charging. Using our model we characterize achievable trade-offs between the mean cost and delay perceived by users. Next we consider a scenario where EVs respond to the signal based on the individual loads. Simulation results show that peak electricity demand can be reduced if EVs carrying higher loads are less sensitive to the signal.

  • Speed Enhancement Technique for Pulsed Laser Rangefinders Based on Lagrange's Theorem Using an Undersampling Method

    Masahiro OHISHI  Fumio OHTOMO  Masaaki YABE  Mitsuru KANOKOGI  Takaaki SAITO  Yasuaki SUZUKI  Chikao NAGASAWA  

     
    PAPER-Measurement Technology

      Vol:
    E94-A No:8
      Page(s):
    1738-1746

    A new speed enhancement technique for pulsed laser rangefinders based on Lagrange's theorem in group theory using an undersampling method has been developed. In the undersampling method, frequency conversion for high-resolution ranging and digitizing are conducted by sampling a reference frequency signal at the timings of the reception of pulsed light from the target. In the present work, the rangefinder generates different sampling intervals of the reference frequency signal: different numbers of sampling points within the period of a reference signal, over a wide range. This is accomplished by slightly changing the period of the pulsed light emitted, without changing the synthesizer frequency which generates the period. This technique requires a minimum of additional hardware. In this paper, we describe the detail of the selection of the number of sampling points based on Lagrange's theorem. And we demonstrate a possibility of expanding the sampling interval to the point where an aliasing of the harmonic components of the reference signal occurs by simulations that focus on the calculation of the phase of the fundamental frequency of the reference signal. And we report on the results of rangefinder experiments for a reduction in the number of the sampling points. We have achieved a 10-fold enhancement of speed by selecting 10 sampling points over the results from the previous studies that had 100 sampling points within a period of a reference signal. And we have confirmed that the reduction in sampling points has a very little influence on the linearity, which is an acceptable trade-off for achieving the speed enhancement. This technique, based on Lagrange's theorem in group theory, allows us to control the minimum number of samplings required to calculate distances, so that high-speed data acquisition for coarse measurements and normal-speed data acquisition for fine measurements become selectable. Such a system with high flexibility in measurement modes has been developed.

  • QoS-Sensitive Dynamic Voltage Scaling Algorithm for Wireless Multimedia Services

    Sungwook KIM  

     
    LETTER-Network

      Vol:
    E94-B No:8
      Page(s):
    2390-2393

    The past decade has seen a surge of research activities in the fields of mobile computing and wireless communication. In particular, recent technological advances have made portable devices, such as PDA, laptops, and wireless modems to be very compact and affordable. To effectively operate portable devices, energy efficiency and Quality of Service (QoS) provisioning are two primary concerns. Dynamic Voltage Scaling (DVS) is a common method for energy conservation for portable devices. However, due to the amount of data that needs to be dynamically handled in varying time periods, it is difficult to apply conventional DVS techniques to QoS sensitive multimedia applications. In this paper, a new adaptive DVS algorithm is proposed for QoS assurance and energy efficiency. Based on the repeated learning model, the proposed algorithm dynamically schedules multimedia service requests to strike the appropriate performance balance between contradictory requirements. Experimental results clearly indicate the performance of the proposed algorithm over that of existing schemes.

  • Resource Allocation in Cooperative OFDMA Systems Supporting Heterogeneous Services

    Danhua ZHANG  Xiaoming TAO  Jianhua LU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:7
      Page(s):
    2043-2050

    Most existing works on resource allocation in cooperative OFDMA systems have focused on homogeneous users with same service and demand. In this paper, we focus on resource allocation in a service differentiated cooperative OFDMA system where each user has a different QoS requirement. We investigate joint power allocation, relay selection and subcarrier assignment to maximize overall system rates with consideration of QoS guarantees and service support. By introducing QoS price, this combinatorial problem with exponential complexity is converted into a convex one, and a two-level dual-primal decomposition based QoS-aware resource allocation (QARA) algorithm is proposed to tackle the problem. Simulation results reveal that our proposed algorithm significantly outperforms previous works in terms of both services support and QoS satisfaction.

  • Time-Interleaved Access Control to Common RF Subsystem for Concurrent WiFi and WiMAX

    Byoung-Soon JANG  Taehyoun KIM  Chu-Shik JHON  Hyo-Joong SUH  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E94-B No:7
      Page(s):
    2118-2122

    We achieve concurrent access to WiFi and WiMAX networks on a mobile terminal equipped with a common RF subsystem by providing time-interleaved RF access control schemes to both of the MAC layers. We propose cooperative and competitive sharing schemes, neither of which requires any modification to other network components. We implement our schemes on a WiFi/WiMAX dual-mode SoC platform. Experimental results show that these schemes work and have affordable overheads.

  • Personal Event Management among Multiple Devices Based on User Intention Recognition Using Dynamic Bayesian Networks

    Hocheol JEON  Taehwan KIM  Joongmin CHOI  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E94-D No:7
      Page(s):
    1440-1448

    This paper proposes a proactive management system for the events that occur across multiple personal user devices, including desktop PCs, laptops, and smart phones. We implemented the Personal Event Management Service using Dynamic Bayesian Networks (PEMS-DBN) system that proactively executes appropriate tasks across multiple devices without explicit user requests by recognizing the user's device reuse intention, based on the observed actions of the user for specific devices. The client module of PEMS-DBN installed on each device monitors the user actions and recognizes user intention by using dynamic Bayesian networks. The server provides data sharing and maintenance for the clients. A series of experiments were performed to evaluate user satisfaction and system accuracy, and also the amounts of resource consumption during intention recognition and proactive execution are measured to ensure the system efficiency. The experimental results showed that the PEMS-DBN system can proactively provide appropriate, personalized services with a high degree of satisfaction to the user in an effective and efficient manner.

  • Yb-Doped and Hybrid-Structured Solid Photonic Bandgap Fibers and Linearly-Polarized Fiber Lasers Oscillating above 1160 nm Open Access

    Masahiro KASHIWAGI  Katsuhiro TAKENAGA  Kentaro ICHII  Tomoharu KITABAYASHI  Shoji TANIGAWA  Kensuke SHIMA  Shoichiro MATSUO  Munehisa FUJIMAKI  Kuniharu HIMENO  

     
    INVITED PAPER

      Vol:
    E94-C No:7
      Page(s):
    1145-1152

    We review our recent work on Yb-doped and hybrid-structured solid photonic bandgap fibers (Yb-HS-SPBGFs) for linearly-polarized fiber lasers oscillating in the small gain wavelength range from 1160 nm to 1200 nm. The stack-and-draw or pit-in-jacket method is employed to fabricate two Yb-HS-SPBGFs. Both of the fiber shows optical filtering property for eliminating ASE in the large gain wavelength range from 1030 nm to 1130 nm and enough high birefringence for maintaining linear polarization, thanks to the photonic bandgap effect and the induced birefringence of the hybrid structure. The fiber attenuation of the Yb-HS-SPBGF fabricated by the pit-in-jacket method is much lower than that of the Yb-HS-SPBGF fabricated by stack-and-draw method. Linearly-polarized single stage fiber lasers using Yb-HS-SPBGFs are also demonstrated. Laser oscillation at 1180 nm is confirmed without parasitic lasing in the fiber lasers. High output power and high slope efficiency in linearly-polarized single-cavity fiber laser using the low-loss Yb-HS-SPGF fabricated by the pit-in-jacket method are achieved. Narrow linewidth, high polarization extinction ratio and high beam quality are also confirmed, which are required for high-efficient frequency-doubling. A compact and high-power yellow-orange frequency-doubling laser would be realized by using a linearly-polarized single-cavity fiber laser employing a low-loss Yb-HS-SPBGF.

  • Numerical Analysis on MIMO Performance of the Modulated Scattering Antenna Array in Indoor Environment

    Lin WANG  Qiang CHEN  Qiaowei YUAN  Kunio SAWAYA  

     
    LETTER-Antennas and Propagation

      Vol:
    E94-B No:6
      Page(s):
    1752-1756

    The multiple-input multiple-output (MIMO) performance of the modulated scattering antenna array (MSAA) is analyzed numerically for the first time in indoor environment based on an approach to hybridization of the Volterra series method and method of moments (MoM) in this letter. Mutual coupling effect between the Modulated scattering element (MSE) and the normal antenna element is also considered in this analysis. It is found that MIMO performance of the MSAA is improved with reducing the array spacing of the MSAA in 4 different indoor receiving areas. At the same time, the simulated results of the MSAA are compared with those of the dipole antenna array at the same condition.

  • Extracting User Interest for User Recommendation Based on Folksonomy

    Junki SAITO  Takashi YUKAWA  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E94-D No:6
      Page(s):
    1329-1332

    In the present paper, a method for extracting user interest by constructing a hierarchy of words from social bookmarking (SBM) tags and emphasizing nouns based on the hierarchical structure (folksonomy) is proposed. Co-occurrence of the SBM tags basically have a semantic relationship. As a result of an experimental evaluation using the user profiles on Twitter, the authors discovered that the SBM tags and their word hierarchy have a rich vocabulary for extracting user interest.

761-780hit(2307hit)