The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SER(2307hit)

1421-1440hit(2307hit)

  • Architecture of a Fine-Grain Field-Programmable VLSI Based on Multiple-Valued Source-Coupled Logic

    Md.Munirul HAQUE  Michitaka KAMEYAMA  

     
    PAPER

      Vol:
    E87-C No:11
      Page(s):
    1869-1875

    A novel Multiple-Valued Field-Programmable VLSI (MV-FPVLSI) architecture using the Multiple-Valued Source-Coupled Logic (MVSCL) is proposed to implement special-purpose processors. An MV-FPVLSI consists of identical cells, which are connected to 8-neighborhood ones. To reduce the complexity of the interconnection block between two cells in an MV-FPVLSI, a bit-serial fine-grain pipeline architecture is introduced which allows single-wire data transmission and as a result, the data-transmission delay becomes very small in comparison with that of a conventional FPGA. To reduce the number of switches in the interconnection block further, a cell, using multiple-valued source-coupled logic circuits, is proposed, where the input currents can be linearly summed just by wiring without using any active devices. Not only the data, but also the control signal can be superposed by linear summation. As a result, no input switch is required which contributes to smaller data transmission delay. Moreover, an arbitrary 2-input logic function can be generated by linear summation of the input currents and threshold operations using these reconfigurable MVSCL circuits. As the MVSCL circuit has high driving capability in comparison with that of an equivalent CMOS circuit, high-speed logic operation is also possible while maintaining low power.

  • Dynamic Class Assignment for Stream Flows Considering Characteristics of Non-stream Flow Classes

    Kenta YASUKAWA  Ken-ichi BABA  Katsunori YAMAOKA  

     
    PAPER-Network

      Vol:
    E87-B No:11
      Page(s):
    3242-3254

    In this paper, we term multimedia streaming application traffic "stream flows" and the other usual application traffic "non-stream flows." Many problems occur when both flows are aggregated on a shared link because the different TCP and UDP behaviors cause negative interactions. One way to solve these problems is to isolate stream and non-stream flows to different classes. However, it is difficult to determine the bandwidth allocation for each class and dynamic bandwidth allocation schemes are hard to implement on large scale networks. We therefore propose a dynamic class assignment method that maintains the QoS and that has a higher scalability than dynamic bandwidth allocation schemes. It is workable on Diffserv AF PHB. The outline is as follows. We classify non-stream flows into four classes and dynamically assign stream flows to the classes, taking the conditions and characteristics of the classes into consideration. On assigning classes to stream flows, we map them to a higher drop precedence than non-stream flows not to degrade the QoS of them, based on the assumption that occasional packets being dropped do not create serious problems for them. In this paper, we first discuss our classification of non-stream flows, and present the characteristics of non-stream flows in each class. We then discuss our drop precedence mapping. After this, we propose an algorithm for our method of dynamic class assignment and provide some simulation results where it could provide constant qualities with stream and non-stream flows, adapting to changing traffic.

  • Efficient Masquerade Detection Using SVM Based on Common Command Frequency in Sliding Windows

    Han-Sung KIM  Sung-Deok CHA  

     
    PAPER-Application Information Security

      Vol:
    E87-D No:11
      Page(s):
    2446-2452

    Masqueraders who impersonate other users pose serious threat to computer security. Unfortunately, firewalls or misuse-based intrusion detection systems are generally ineffective in detecting masqueraders. Anomaly detection techniques have been proposed as a complementary approach to overcome such limitations. However, they are not accurate enough in detection, and the rate of false alarm is too high for the technique to be applied in practice. For example, recent empirical studies on masquerade detection using UNIX commands found the accuracy to be below 70%. In this research, we performed a comparative study to investigate the effectiveness of SVM (Support Vector Machine) technique using the same data set and configuration reported in the previous experiments. In order to improve accuracy of masquerade detection, we used command frequencies in sliding windows as feature sets. In addition, we chose to ignore commands commonly used by all the users and introduce the concept of voting engine. Though still imperfect, we were able to improve the accuracy of masquerade detection to 80.1% and 94.8%, whereas previous studies reported accuracy of 69.3% and 62.8% in the same configurations. This study convincingly demonstrates that SVM is useful as an anomaly detection technique and that there are several advantages SVM offers as a tool to detect masqueraders.

  • On the Code Synchronization of PPM/OPPM Fiber-Optic CDMA Systems

    Anh T. PHAM  Hiroyuki YASHIMA  

     
    PAPER

      Vol:
    E87-A No:10
      Page(s):
    2692-2701

    This paper proposes and theoretically evaluates two different schemes of code acquisition for pulse-position modulation (PPM) and overlapping PPM (OPPM) fiber-optic code-division multiple-access (CDMA) systems, namely threshold-based and demodulator-based code acquisition. Single-dwell detector and serial-search algorithm are employed for both schemes. Theoretical analysis is carried out for shot-noise-limited photon-counting receiver. Discussions upon effects of various parameter settings on the performance of code acquisition for PPM/OPPM fiber-optic CDMA systems, such as index of overlap, PPM/OPPM multiplicity, average photon counts per information nat, and darkcurrents, are presented. It is shown that when the threshold is properly selected, the threshold-based code acquisition system offers better performance, in terms of mean number of training frames, than the demodulator-based one.

  • Simulation-Based Analysis of DoS Attacks in Wireless Ad Hoc Networks

    Soonjwa HONG  Seung Hyong RHEE  Jae-Cheol RYOU  

     
    LETTER-Application Information Security

      Vol:
    E87-D No:10
      Page(s):
    2415-2418

    We investigate the effects of DoS (Denial of Service) attacks in wireless ad hoc networks using simulations, concentrating on the problem of energy availability. Our results show that the damages due to the DoS attack may quite different with those in wired networks: First, the nodes along the transmission route mostly suffer damages rather than the victim node itself. Second, if the mobile nodes are crowded and close together, the damage becomes more severe. Lastly, if the nodes have random mobility, the attacker itself consumes more energy.

  • Performance and Convergence Analysis of Improved MIN-SUM Iterative Decoding Algorithm

    Jun HEO  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E87-B No:10
      Page(s):
    2847-2858

    Density evolution has recently been used to analyze the iterative decoding of Low Density Parity Check (LDPC) codes, Turbo codes, and Serially Concatenated Convolutional Codes (SCCC). The density evolution technique makes it possible to explain many characteristics of iterative decoding including convergence of performance and preferred structures for the constituent codes. While the analytic density evolution methods were applied to LDPC codes, the simulation based density evolution methods were used for Turbo codes and SCCC due to analytic difficulties. In this paper, several density evolution ideas in the literature are used to analyze common code structures and it is shown that those ideas yield consistent results. In order to do that, we derive expressions for density evolution of SCCC with a simple 2-state constituent code. The analytic expressions are based on the sum-product and min-sum algorithms, and the thresholds are evaluated for both message passing algorithms. Particularly, for the min-sum algorithm, the density evolution with Gaussian approximation is derived and used to analyze the effect of scaling soft information. The scaling of extrinsic information slows down the convergence of soft information or avoids an overestimation effect of it and results in better performance, and its gain is maximized in particular constituent codes. Similar approaches are made for LDPC code. We show that the scaling gain is noticeable in the LDPC code as well. This scaling gain is analyzed with both density evolution and simulation performance. The expected scaling gain by density evolution matches well with the achievable scaling gain from simulation results. These results can be extended to the irregular LDPC codes based on the degree distribution for the min-sum algorithm. All density evolution algorithms used in this paper are based on the Gaussian approximation for the exchanged messages.

  • A New Priority-Based QoS Supporting MAC Protocol

    Younggoo KWON  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E87-B No:10
      Page(s):
    3003-3010

    Supporting quality of service (QoS) capabilities for multi-media applications is one of the major issues in medium access control (MAC) research. In distributed contention-based MAC algorithms, it is a challenging task to support the desired QoS because of the inherent random access characteristics. In this paper, we propose an efficient prioritized fast collision resolution algorithm. The MAC protocol with this new algorithm attempts to provide significantly high throughput performance for data services and support QoS for real-time services. We incorporate the priority algorithm based on service differentiations with the fast collision resolution algorithm, and show that this algorithm can simultaneously achieve high throughput and good QoS support for real-time and data services.

  • Virtual 3D Gearbox Widget Technique for Precise Adjustment by Hand Motion in Immersive VR

    Noritaka OSAWA  Xiangshi REN  

     
    PAPER-Multimedia Pattern Processing

      Vol:
    E87-D No:10
      Page(s):
    2408-2414

    Direct manipulation by hand is an intuitive and simple way of positioning objects in an immersive virtual environment. However, this technique is not suitable for making precise adjustments to virtual objects in an immersive environment because it is difficult to hold a hand unsupported in midair and to then release an object at a fixed point. We therefore propose an alternative technique using a virtual 3D gearbox widget that we have designed, which enables users to adjust values precisely. We tested the technique in a usability study along with the use of hand manipulation and a slider. The results showed that the gearbox was the best of the three techniques for precise adjustment of small targets, in terms of both performance data and subject preference.

  • Evaluation of Intensity Noise in Semiconductor Fabry-Perot Lasers

    Kenji SATO  

     
    PAPER-Components and Devices

      Vol:
    E87-C No:9
      Page(s):
    1510-1516

    Intensity-noise characteristics of stable multi-mode Fabry-Perot semiconductor lasers are analyzed experimentally and theoretically. Mode-partition noise caused by optical filtering and propagation through optical fibers is investigated by evaluating the relative intensity noise and signal-to-noise ratio. The experimental results indicate that the simplified two-mode analysis provides a good approximation. Suppression of the mode-partition noise by nonlinear gain is experimentally confirmed.

  • A New Handover Control in the Current and Future Wireless Networks

    Hakima CHAOUCHI  Guy PUJOLLE  

     
    PAPER-Mobility Management

      Vol:
    E87-B No:9
      Page(s):
    2537-2547

    In this article we propose a new framework to support QoS and 4G enabled mobility management. The key feature of this framework is twofold; the Policy based Handover control, and the adaptive handover mechanisms. On one hand, the adaptive handover mechanism will allow the selection of different handover schemes based on the user service level specification in order to differentiate the handover quality provided for the required service level, thus optimizing the network resources usage and providing the agreed service level to users. On the other hand, the proposed handover control mechanism considers resource availability and other constraints during the handover decision in order to provide support for QoS aware mobility on the contrary of the classical naïve mobility management that considers only signal strength fading. This decision mechanism will provide mainly the interaction between the mobility and QoS management frameworks but also a 4G handover control. In addition, the QoS aware handover will provide the knowledge necessary to achieve a proactive handover's procedures control.

  • A Feedback Controller for Overloaded Web Requests

    Sukyong JUNG  Bongjik KANG  Jangbok KIM  Kyunghee CHOI  Gihyun JUNG  

     
    LETTER-Multimedia Systems for Communications" Multimedia Systems for Communications

      Vol:
    E87-B No:9
      Page(s):
    2816-2819

    We propose a feedback controller to efficiently control web requests especially on overloaded networks. The controller is designed based on a feedback closed loop that prevents overload of web server and enforces target CPU utilization via controlling the amount of input web requests. The main contribution of this letter is the use of feedback control theory to design the controller that delicately regulates web requests even under the dynamic changes in processing power of web server. In contrast with many previous heuristic methods, the proposed controller uses a systematic approach to adaptively control web requests taking account of the dynamic behavior of web server. Simulation results performed in overloaded cases show that the proposed controller lets web server effectively control input web requests and reach its CPU utilization to desired levels in relatively small settling times.

  • Analysis of Blocking Probabilities for Prioritized Multi-Classes in Optical Burst Switching Networks

    Sungchang KIM  Jin Seek CHOI  Minho KANG  

     
    LETTER-Switching for Communications

      Vol:
    E87-B No:9
      Page(s):
    2791-2793

    In this letter, we analyze blocking probabilities for prioritized multi-classes in optical burst switching (OBS) networks. The blocking probability of each traffic class can be analytically evaluated by means of class aggregation and iteration method. The analytic results are validated with results garnered from simulation tests.

  • A Formal Linearization for a General Class of Time-Varying Nonlinear Systems and Its Applications

    Kazuo KOMATSU  Hitoshi TAKATA  

     
    PAPER

      Vol:
    E87-A No:9
      Page(s):
    2203-2209

    In this paper we consider an approximation method of a formal linearization which transform time-varying nonlinear systems into time-varying linear ones and its applications. This linearization is a kind of a coordinate transformation by introducing a linearizing function which consists of the Chebyshev polynomials. The nonlinear time-varying systems are approximately transformed into linear time-varying systems with respect to this linearizing functions using Chebyshev expansion to the state variable and Laguerre expansion to the time variable. As applications, nonlinear observer and filter are synthesized for time-varying nonlinear systems. Numerical experiments are included to demonstrate the validity of the linearization. The results show that the accuracy of the approximation by the linearization improves as the order of the Chebyshev and Laguerre polynomials increases.

  • Bit Error Rate Calculation for Multi-User Coherent Chaos-Shift-Keying Communication Systems

    Ji YAO  Anthony J. LAWRANCE  

     
    PAPER

      Vol:
    E87-A No:9
      Page(s):
    2280-2291

    Analytical derivation of bit error rates for multi-user coherent chaos-shift-keying (CSK) communication systems are presented in this paper. Nearly exact results are obtained by applying the central limit theorem of statistics to sums of independent variables. Based on χ2 distribution approximations, more viable but still very accurate results decrease complexity of the calculations. The χ2 approach is compared with the widely used Gaussian approximation approach to show its superiority in most cases. Bit error performance bounds for the multi-user CSK system from the approach are deduced as further contributions of this paper. The theoretical results obtained are entirely consistent with a range of simulations.

  • Current Mode Circuits for Fast and Accurate Optical Level Monitoring with Wide Dynamic Range

    Johan BAUWELINCK  Dieter VERHULST  Peter OSSIEUR  Xing-Zhi QIU  Jan VANDEWEGE  Benoit DE VOS  

     
    PAPER-Devices/Circuits for Communications

      Vol:
    E87-B No:9
      Page(s):
    2641-2647

    This paper presents a new approach based on current mode circuits for fast and accurate optical level monitoring with wide dynamic range of a gigabit burst-mode laser driver chip. Our proposed solution overcomes the drawbacks that voltage mode implementations show at higher bit rates or in other technologies. The main speed-limiting factor of the level monitoring circuitry is the parasitic capacitance of the back facet monitor photodiode. We propose the use of an active-input current mirror to reduce the impact of this parasitic capacitance. The mirror produces two copies of the photo current, one to be used for the "0" level measurement and another for the "1" level measurement. The mirrored currents are compared to two reference currents by two current comparators. Every reference current needs only one calibration at room temperature. A pattern detection block scans the incoming data for patterns of sufficiently long consecutive 0's or 1's. At the end of such a pattern a valid measurement is present at the output of one of the current comparators. Based on these measurements the digital Automatic Power Control (APC) will adjust the bias (IBIAS) and modulation current (IMOD) setting of the laser driver. Tests show that the chip can stabilize and track the launched optical power with a tolerance of less than 1 dB. In these tests the pattern detection was programmed to sample the current comparators after 5 bytes (32 ns at 1.25 Gbps) of consecutive 1's and 0's. Automatic power control on such short strings of data has not been demonstrated before. Although this laser transmitter was developed for FSAN GPON applications at a speed of 1.25 Gbps upstream, the design concept is generic and can be applied for developing a wide range of burst mode laser transmitters. This chip was developed in a 0.35 µm SiGe BiCMOS process.

  • A Multicarrier Transmit Diversity Scheme with Antenna Selection for MC-CDMA

    Xiaodong REN  Shidong ZHOU  Zucheng ZHOU  

     
    LETTER-Wireless Communication Technology

      Vol:
    E87-B No:8
      Page(s):
    2394-2396

    In this letter, Multicarrier Code Division Multiple Access (MC-CDMA) technique combined with Space Time Block Code (STBC) is analyzed in the case of two transmit antennas. A multicarrier transmit diversity scheme with antenna selection is proposed. The transmission power is allocated onto the antenna which has larger channel gain instead of the two antennas uniformly. Simulation results show that the new scheme has considerable performance gain compared to the Alamouti's scheme.

  • A Proposal of a New Evaluation Scheme of Pips and Craters Formed by Arc Discharges on Electrical Contact Surfaces

    Makoto HASEGAWA  Koichiro SAWA  

     
    LETTER

      Vol:
    E87-C No:8
      Page(s):
    1277-1280

    A new scheme for evaluation of shapes of pips and craters formed by arc discharges on electrical contact surfaces is proposed. Measuring a height of a pip or a depth of a crater as well as an average diameter thereof with a scanning laser microscope and then putting a plot having the measured values as its vertical and horizontal coordinates enable us to numerically and briefly evaluate shapes of those pips and craters on arc-damaged contact surfaces. Some exemplary results obtained by this evaluation scheme are presented here.

  • A New Experimental Method for the Determination of Connector Parameters in Insertion and Extraction Phase

    Abdelaaziz EL MANFALOUTI  Noureddine BEN JEMAA  Rochdi EL ABDI  

     
    INVITED PAPER

      Vol:
    E87-C No:8
      Page(s):
    1289-1294

    Inside a connector an interface with low insertion force and contact resistance is required, utilizing low cost materials such as copper alloys surrounded by tin coating. Relating to the application, the operating parameters have a wide range of values of currents, forces and materials. In this paper, we present a new experimental method based on non-intrusive probing of the deflection of the spring terminal with a laser technique. The main feature is that the reflection of the Laser beam onto the spring allows the determination of the contact force of the lamella-spring inside the female part. The technique requires the following insertion parameters during the insertion stroke: contact deflection δ, which allows contact force Fc, insertion force Fi and contact resistance Rc. It was found that the insertion force has a maximum value which decreases to the stable value, and depends on the size and the material of the pin. However contact resistance decreases sharply when first inserting, and tends to stable values on completing the insertion process, which is less sensitive to the pin diameter. Furthermore the final value which is important for the connector characterization is related and discussed. Finally, discrepancies were observed between the experimental and calculated data with simple numerical models. More complex models are in progress, which should improve the convergence of the theoretical approach to experimental results and proceed to the optimization of the connector parameters.

  • The Impact of Source Traffic Distribution on Quality of Service (QoS) in ATM Networks

    Seshasayi PILLALAMARRI  Sumit GHOSH  

     
    PAPER-Network

      Vol:
    E87-B No:8
      Page(s):
    2290-2307

    A principal attraction of ATM networks, in both wired and wireless realizations, is that the key quality of service (QoS) parameters of every call, including end-to-end delay, jitter, and loss are guaranteed by the network when appropriate cell-level traffic controls are imposed at the user network interface (UNI) on a per call basis, utilizing the peak cell rate (PCR) and the sustainable cell rate (SCR) values for the multimedia--voice, video, and data, traffic sources. There are three practical difficulties with these guarantees. First, while PCR and SCR values are, in general, difficult to obtain for traffic sources, the typical user-provided parameter is a combination of the PCR, SCR, and the maximum burstiness over the entire duration of the traffic. Second, the difficulty in accurately defining PCR arises from the requirement that the smallest time interval must be specified over which the PCR is computed which, in the limit, will approach zero or the network's resolution of time. Third, the literature does not contain any reference to a scientific principle underlying these guarantees. Under these circumstances, the issue of providing QoS guarantees in the real world, through traffic controls applied on a per call basis, is rendered uncertain. This paper adopts a radically different, high level approach to the issue of QoS guarantees. It aims at uncovering through systematic experimentation a relationship, if any exists, between the key high level user traffic characteristics and the resulting QoS measures in a realistic operational environment. It may be observed that while each user is solely interested in the QoS of his/her own traffic, the network provider cares for two factors: (1) Maximize the link utilization in the network since links constitute a significant investment, and (2) ensure the QoS guarantees for every user traffic, thereby maintaining customer satisfaction. Based on the observations, this paper proposes a two-phase strategy. Under the first phase, the average "link utilization" computed over all the links in a network is maintained within a range, specified by the underlying network provider, through high level call admission control, i.e. by limiting the volume of the incident traffic on the network, at any time. The second phase is based on the hypothesis that the number of traffic sources, their nature--audio, video, or data, and the bandwidth distribution of the source traffic, admitted subject to a specific chosen value of "link utilization" in the network, will exert a unique influence on the cumulative delay distribution at the buffers of the representative nodes and, hence, on the QoS guarantees of each call. The underlying thinking is as follows. The cumulative buffer delay distribution, at any given node and at any time instant, will clearly reflect the cumulative effect of the traffic distributions of the multiple connections that are currently active on the input links. Any bounds imposed on the cumulative buffer delay distribution at the nodes of the network will also dominate the QoS bounds of each of the constituent user traffic. Thus, for each individual traffic source, the buffer delay distributions at the nodes of the network, obtained for different traffic distributions, may serve as its QoS measure. If the hypothesis is proven true, in essence, the number of traffic sources and their bandwidth distribution will serve asa practically realizable high level traffic control in providing realistic QoS guarantees for every call. To verify the correctness of the hypothesis, an experiment is designed that consists of a representative ATM network, traffic sources that are characterized through representative and realistic user-provided parameters, and a given set of input traffic volumes appropriate for a network provider approved link utilization measure. The key source traffic parameters include the number of sources that are incident on the network and the constituent links at any given time, the bandwidth requirement of the sources, and their nature. For each call, the constituent cells are generated stochastically, utilizing the typical user-provided parameter as an estimate of the bandwidth requirement. Extensive simulations reveal that, for a given link utilization level held uniform throughout the network, while the QoS metrics--end-to-end cell delay, jitter, and loss, are superior in the presence of many calls each with low bandwidth requirement, they are significantly worse when the network carries fewer calls of very high bandwidths. The findings demonstrate the feasibility of guaranteeing QoS for each and every call through high level traffic controls. As for practicality, call durations are relatively long, ranging from ms to even minutes, thereby enabling network management to exercise realistic controls over them, even in a geographically widely dispersed ATM network. In contrast, current traffic controls that act on ATM cells at the UNI face formidable challenge from high bandwidth traffic where cell lifetimes may be extremely short, in the range of µs. The findings also underscore two additional important contributions of this paper. First, the network provider may collect data on the high level user traffic characteristics, compute the corresponding average link utilization in the network, and measure the cumulative buffer delay distributions at the nodes, in an operational network. The provider may then determine, based on all relevant criteria, a range of input and system parameters over which the network may be permitted to operate, the intersection of all of which may yield a realistic network operating point (NOP). During subsequent operation of the network, the network provider may guide and maintain the network at a desired NOP by exercising control over the input and system parameters including link utilization, call admittance based on the requested bandwidth, etc. Second, the finding constitutes a vulnerability of ATM networks which a perpetrator may exploit to launch a performance attack.

  • Design, Analysis, and Implementation of a Low-Profile Resonant DC-to-DC Converter Using PCB Transformer

    Byungcho CHOI  Donghyung KIM  Kijo LEE  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E87-B No:8
      Page(s):
    2335-2341

    The current paper presents the design, analysis, and implementation of a low-profile resonant dc-to-dc converter that utilizes a coreless printed circuit board transformer as a substitute for the conventional magnetic core-based transformer. A prototype series resonant converter, fabricated in a 40 mm80 mm area with a 4 mm thickness while achieving the maximum efficiency of 85% at a 58 W output power, is used as an example to address the theoretical and practical issues involved in the design, analysis, and implementation of a PCB transformer-based low-profile dc-to-dc converter.

1421-1440hit(2307hit)