The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

4041-4060hit(16314hit)

  • Recent Advances in Elastic Optical Networking Open Access

    Takafumi TANAKA  Masahiko JINNO  

     
    INVITED PAPER

      Vol:
    E97-B No:7
      Page(s):
    1252-1258

    Many detailed studies ranging from networking to hardware as well as standardization activities over the last few years have advanced the performance of the elastic optical network. Thanks to these intensive works, the elastic optical network has been becoming feasible. This paper reviews the recent advances in the elastic optical network from the aspects of networking technology and hardware design. For the former, we focus on the efficient elastic network design technology related to routing and spectrum assignment (RSA) of elastic optical paths including network optimization or standardization activities, and for the latter, two key enabling technologies are discussed: elastic transponders/regenerators and gridless optical switches. Making closely-dependent networking and hardware technologies work synergistically is the key factor in implementing truly effective elastic optical networks.

  • Maximum-Likelihood Acquisition of Spread-Spectrum Signals in Frequency-Selective Fading Channels

    Oh-Soon SHIN  

     
    LETTER-Spread Spectrum Technologies and Applications

      Vol:
    E97-A No:7
      Page(s):
    1642-1645

    A maximum-likelihood code acquisition scheme is investigated for frequency-selective fading channels with an emphasis on the decision strategies. Using the maximum-likelihood estimation technique, we first derive an optimal decision rule, which is optimal in the viewpoint of probability of detection. Based on the derived optimal decision rule, a practical and simple decision rule is also developed, and its performance is assessed for both single dwell and double dwell acquisition systems. Simulation results demonstrate that the proposed acquisition scheme significantly outperforms the previously proposed schemes in frequency-selective fading channels.

  • Analysis of Fuzzy Cluster for Mental Health

    Chieko KATO  Kensei TSUCHIDA  Futoshi SUGIMOTO  Yasunori SHIONO  Takehide GOTO  

     
    LETTER-Rehabilitation Engineering and Assistive Technology

      Vol:
    E97-D No:7
      Page(s):
    1923-1926

    Recently, there are many Japanese citizens living abroad in Asia, including developing countries. However, not many studies have been conducted regarding their mental health. The purpose of this study was to see what kinds of stress people experience when living abroad. Japanese workers living abroad, including some who are married to foreign nationals, and their families were asked seven questions in a survey, and they provided answers to questions in agreement with the intent and purpose of this study. Morphological analysis of the results and category classification by word class was carried out. This category was arranged by word classes. Additionally, the tendencies of responses were categorized according to the KJ method. In response to the question, “Do you have any trouble because of cultural differences?” these responses were classified according to common features. A fuzzy cluster analysis was carried out based on this information. Meaningful clusters were obtained by fuzzy cluster analysis. Differences in the values of stress and family culture can best be described by fuzzy cluster analysis.

  • Parallel Use of Dispersion Devices for Resolution Improvement of Optical Quantization at High Sampling Rate

    Tomotaka NAGASHIMA  Takema SATOH  Petre CATALIN  Kazuyoshi ITOH  Tsuyoshi KONISHI  

     
    PAPER

      Vol:
    E97-C No:7
      Page(s):
    787-794

    We investigate resolution improvement in optical quantization with keeping high sampling rate performance in optical sampling. Since our optical quantization approach uses power-to-wavelength conversion based on soliton self-frequency shift, a spectral compression can improve resolution in exchange for sampling rate degradation. In this work, we propose a different approach for resolution improvement by parallel use of dispersion devices so as to avoid sampling rate degradation. Additional use of different dispersion devices can assist the wavelength separation ability of an original dispersion device. We demonstrate the principle of resolution improvement in 3 bit optical quantization. Simulation results based on experimental evaluation of 3 bit optical quantization system shows 4 bit optical quantization is achieved by parallel use of dispersion devices in 3 bit optical quantization system. The maximum differential non-linearity (DNL) and integral non-linearity (INL) are 0.49 least significant bit (LSB) and 0.50 LSB, respectively. The effective number of bits (ENOB) estimated to 3.62 bit.

  • Secure Mobility Management Application Capable of Fast Layer 3 Handovers for MIPv6-Non-Aware Mobile Hosts

    Younchan JUNG  Marnel PERADILLA  J. William ATWOOD  

     
    PAPER-Network

      Vol:
    E97-B No:7
      Page(s):
    1375-1384

    Currently, a correspondent host will have difficulties in establishing a direct session path to a mobile host because of the partial deployment of MIPv6-aware mobile hosts. Even MIPv6-aware hosts will spend up to several seconds to obtain the new location of the mobile host during Layer 3 (L3) handover. This paper proposes an application-level mobility management scheme that can solve the problems related to the increase of Internet traffic end-to-end delay under the current situation that most of the mobile devices are MIPv6-non-aware. The proposed Secure Mobility Management Application (SMMA) enables the updates of care-of address to be faster and more reliable even when L3 handovers occur frequently. SMMA uses a cross-layer approach for session mobility management with the support of Binding Updates to the home agent via IPSec tunnels. The main feature of SMMA is to handle the session-related mobility management for which operation starts just after the completion of name resolution as a pre-call mobility management, which operates in conjunction with the DNS. Our session-related mobility management introduces three new signaling messages: SS-Create for session state creation, SS-Refresh for session state extension and SS-Renewal for updating new care-of address at the mid-session. Finally, this paper analyzes the work load imposed on a mobile host to create a session state and the security strength of the SS-Renewal message, which depends on the key size used.

  • All-Optical Wavelength-Shift-Free NRZ-DPSK to RZ-DPSK Format Conversion with Pulsewidth Tunability by an SOA-Based Switch

    Gazi Mohammad SHARIF  Quang NGUYEN-THE  Motoharu MATSUURA  Naoto KISHI  

     
    PAPER

      Vol:
    E97-C No:7
      Page(s):
    755-761

    We demonstrate an all-optical non-return-to-zero differential phase shift keying (NRZ-DPSK) to return-to-zero differential phase shift keying (RZ-DPSK) format conversion with wavelength-shift-free and pulsewidth tunable operations by using a semiconductor optical amplifier (SOA)-based switch. An NRZ-DPSK signal is injected into the SOA-based switch with an RZ clock, and is converted to RZ-DPSK signal owing to the nonlinear effects inside the SOA. In this scheme, the wavelength of the converted RZ-DPSK signal is maintained as the original wavelength of the input NRZ-DPSK signal during the format conversion. Moreover, the pulsewidth of the converted signal is tunable in a wider operating range from 30 to 60 ps. The format conversion with pulsewidth tunability is based on cross-phase modulation (XPM) and cross-gain modulation (XGM) effects in the SOA. The clear eye diagrams, optical spectra and the bit-error-rate (BER) characteristics show high conversion performance with the wide pulsewidth tuning range. For all cases of the converted RZ-DPSK signal with different pulsewidths, the receiver sensitivities at a BER of 10$^{-9}$ for the converted RZ-DPSK signal were 0.7 to 1.5 dB higher than the receiver sensitivity of the input NRZ-DPSK signal.

  • Fabrication of MgO:LiNbO3 Domain Inverted Structures with Short Period and Application to Electro-Optic Bragg Deflection Modulator

    Toshiyuki INOUE  Toshiaki SUHARA  

     
    PAPER

      Vol:
    E97-C No:7
      Page(s):
    744-748

    We fabricated high-quality domain-inverted MgO: LiNbO$_3$ structures with 3.0 and 2.0~$mu$m periods using applying votage to the corrugation electrode. We found that keeping the crystal temperature at 150$^{circ}$C for 12 hours before applying voltage was effective for obtaining good uniformity. We also demonstrated an application of the structures with 3.0~$mu$m period to electro-optic Bragg deflection modulator for the first time.

  • Analysis on Effectiveness of Fractional Frequency Reuse for Uplink Using SC-FDMA in Cellular Systems

    Masashi FUSHIKI  Takeo OHSEKI  Satoshi KONISHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:7
      Page(s):
    1457-1466

    Single Carrier — Frequency Domain Multiple Access (SC-FDMA) is a multiple access technique employed in LTE uplink transmission. SC-FDMA can improve system throughput by frequency selective scheduling (FSS). In cellular systems using SC-FDMA in the uplink, interference arising from user equipments (UEs) in neighboring cells degrades the system throughput, especially the throughput of cell-edge UEs. In order to overcome this drawback, many papers have considered fractional frequency reuse (FFR) techniques and analyzed their effectiveness. However, these studies have come to different conclusions regarding the effectiveness of FFR because the throughput gain of FFR depends on the frequency reuse design and evaluation conditions. Previous papers have focused on the frequency reuse design. Few papers have examined the conditions where FFR is effective, and only the UE traffic conditions have been evaluated. This paper reveals other conditions where FFR is effective by demonstrating the throughput gain of FFR. In order to analyze the throughput gain of FFR, we focus on the throughput relationship between FFR and FSS. System level simulation results demonstrate that FFR is effective when the following conditions are met: (i) the number of UEs is small and (ii) the multipath delay spread is large or close to 0.

  • Maximally Permissive Similarity Enforcing Supervisors for Nondeterministic Discrete Event Systems under Event and State Observations

    Katsuyuki KIMURA  Shigemasa TAKAI  

     
    PAPER-Systems and Control

      Vol:
    E97-A No:7
      Page(s):
    1500-1507

    In this paper, we consider a similarity control problem for plants and specifications, modeled as nondeterministic automata. This problem requires us to synthesize a nondeterministic supervisor such that the supervised plant is simulated by a given specification. We assume that a supervisor can observe not only the event occurrence but also the current state of the plant. First, we derive a necessary and sufficient condition for the existence of a complete supervisor, which is a solution to the similarity control problem. Then, we present a method for synthesizing a maximally permissive similarity enforcing supervisor when the existence condition is satisfied.

  • Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random Oracles

    Kazuki YONEYAMA  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1335-1344

    ID-based authenticated key exchange (ID-AKE) is a cryptographic tool to establish a common session key between parties with authentication based on their IDs. If IDs contain some hierarchical structure such as an e-mail address, hierarchical ID-AKE (HID-AKE) is especially suitable because of scalability. However, most of existing HID-AKE schemes do not satisfy advanced security properties such as forward secrecy, and the only known strongly secure HID-AKE scheme is inefficient. In this paper, we propose a new HID-AKE scheme which achieves both strong security and efficiency. We prove that our scheme is eCK-secure (which ensures maximal-exposure-resilience including forward secrecy) without random oracles, while existing schemes is proved in the random oracle model. Moreover, the number of messages and pairing operations are independent of the hierarchy depth; that is, really scalable and practical for a large-system.

  • Weakened Anonymity of Group Signature and Its Application to Subscription Services

    Kazuto OGAWA  Go OHTAKE  Arisa FUJII  Goichiro HANAOKA  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1240-1258

    For the sake of privacy preservation, services that are offered with reference to individual user preferences should do so with a sufficient degree of anonymity. We surveyed various tools that meet requirements of such services and decided that group signature schemes with weakened anonymity (without unlinkability) are adequate. Then, we investigated a theoretical gap between unlinkability of group signature schemes and their other requirements. We show that this gap is significantly large. Specifically, we clarify that if unlinkability can be achieved from any other property of group signature schemes, it becomes possible to construct a chosen-ciphertext secure cryptosystem from any one-way function. This result implies that the efficiency of group signature schemes can be drastically improved if unlinkability is not taken into account. We also demonstrate a way to construct a scheme without unlinkability that is significantly more efficient than the best known full-fledged scheme.

  • Image Retargeting with Protection of Object Arrangement

    Kazu MISHIBA  Takeshi YOSHITOME  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E97-D No:6
      Page(s):
    1583-1589

    The relative arrangement, such as relative positions and orientations among objects, can play an important role in expressing the situation such as sports games and race scenes. In this paper, we propose a retargeting method that allows maintaining the relative arrangement. Our proposed retargeting method is based on a warping method which finds an optimal transformation by solving an energy minimization problem. To achieve protection of object arrangement, we introduce an energy that enforces all the objects and the relative positions among these objects to be transformed by the same transformation in the retargeting process. In addition, our method imposes the following three types of conditions in order to obtain more satisfactory results: protection of important regions, avoiding extreme deformation, and cropping with preservation of the balance of visual importance. Experimental results demonstrate that our proposed method maintains the relative arrangement while protecting important regions.

  • #P-hardness of Computing High Order Derivative and Its Logarithm

    Ei ANDO  

     
    LETTER

      Vol:
    E97-A No:6
      Page(s):
    1382-1384

    In this paper, we show a connection between #P and computing the (real) value of the high order derivative at the origin. Consider, as a problem instance, an integer b and a sufficiently often differentiable function F(x) that is given as a string. Then we consider computing the value F(b)(0) of the b-th derivative of F(x) at the origin. By showing a polynomial as an example, we show that we have FP = #P if we can compute log 2F(b)(0) up to certain precision. The previous statement holds even if F(x) is limited to a function that is analytic at any x ∈ R. It implies the hardness of computing the b-th value of a number sequence from the closed form of its generating function.

  • Sparse Binary-to-Ternary Encoding for Holographic Storage

    Seth PHILLIPS  Ivan FAIR  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1231-1239

    In holographic data storage, information is recorded within the volume of a holographic medium. Typically, the data is presented as an array of pixels with modulation in amplitude and/or phase. In the 4-f orientation, the Fourier domain representation of the data array is produced optically, and this image is recorded. If the Fourier image contains large peaks, the recording material can saturate, which leads to errors in the read-out data array. In this paper, we present a coding process that produces sparse ternary data arrays. Ternary modulation is used because it inherently provides Fourier domain smoothing and allows more data to be stored per array in comparison to binary modulation. Sparse arrays contain fewer on-pixels than dense arrays, and thus contain less power overall, which reduces the severity of peaks in the Fourier domain. The coding process first converts binary data to a sequence of ternary symbols via a high-rate block code, and then uses guided scrambling to produce a set of candidate codewords, from which the most sparse is selected to complete the encoding process. Our analysis of the guided scrambling division and selection processes demonstrates that, with primitive scrambling polynomials, a sparsity greater than 1/3 is guaranteed for all encoded arrays, and that the probability of this worst-case sparsity decreases with increasing block size.

  • Implicit Generation of Pattern-Avoiding Permutations by Using Permutation Decision Diagrams

    Yuma INOUE  Takahisa TODA  Shin-ichi MINATO  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1171-1179

    Pattern-avoiding permutations are permutations where none of the subsequences matches the relative order of a given pattern. Pattern-avoiding permutations are related to practical and abstract mathematical problems and can provide simple representations for such problems. For example, some floorplans, which are used for optimizing very-large-scale integration (VLSI) circuit design, can be encoded into pattern-avoiding permutations. The generation of pattern-avoiding permutations is an important topic in efficient VLSI design and mathematical analysis of patten-avoiding permutations. In this paper, we present an algorithm for generating pattern-avoiding permutations, and extend this algorithm beyond classical patterns to generalized patterns with more restrictions. Our approach is based on the data structure πDDs, which can represent a permutation set compactly and has useful set operations. We demonstrate the efficiency of our algorithm by computational experiments.

  • Verification of Moore's Law Using Actual Semiconductor Production Data

    Junichi HIRASE  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E97-C No:6
      Page(s):
    599-608

    One of the technological innovations that has enabled the VLSI semiconductor industry to reduce the transistor size, increase the number of transistors per die, and also follow Moore's law year after year is the fact that an equivalent yield and equivalent testing quality have been ensured for the same die size. This has contributed to reducing the economically optimum production cost (production cost per component) as advocated by Moore. In this paper, we will verify Moore's law using actual values from VLSI manufacturing sites while introducing some of the technical progress that occurred from 1970 to 2010.

  • Semi-Supervised Learning via Geodesic Weighted Sparse Representation

    Jianqiao WANG  Yuehua LI  Jianfei CHEN  Yuanjiang LI  

     
    LETTER-Pattern Recognition

      Vol:
    E97-D No:6
      Page(s):
    1673-1676

    The label estimation technique provides a new way to design semi-supervised learning algorithms. If the labels of the unlabeled data can be estimated correctly, the semi-supervised methods can be replaced by the corresponding supervised versions. In this paper, we propose a novel semi-supervised learning algorithm, called Geodesic Weighted Sparse Representation (GWSR), to estimate the labels of the unlabeled data. First, the geodesic distance and geodesic weight are calculated. The geodesic weight is utilized to reconstruct the labeled samples. The Euclidean distance between the reconstructed labeled sample and the unlabeled sample equals the geodesic distance between the original labeled sample and the unlabeled sample. Then, the unlabeled samples are sparsely reconstructed and the sparse reconstruction weight is obtained by minimizing the L1-norm. Finally, the sparse reconstruction weight is utilized to estimate the labels of the unlabeled samples. Experiments on synthetic data and USPS hand-written digit database demonstrate the effectiveness of our method.

  • Queue Layouts of Toroidal Grids

    Kung-Jui PAI  Jou-Ming CHANG  Yue-Li WANG  Ro-Yu WU  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1180-1186

    A queue layout of a graph G consists of a linear order of its vertices, and a partition of its edges into queues, such that no two edges in the same queue are nested. The queuenumber qn(G) is the minimum number of queues required in a queue layout of G. The Cartesian product of two graphs G1 = (V1,E1) and G2 = (V2,E2), denoted by G1 × G2, is the graph with {:v1 ∈ V1 and v2 ∈ V2} as its vertex set and an edge (,) belongs to G1×G2 if and only if either (u1,v1) ∈ E1 and u2 = v2 or (u2,v2) ∈ E2 and u1 = v1. Let Tk1,k2,...,kn denote the n-dimensional toroidal grid defined by the Cartesian product of n cycles with varied lengths, i.e., Tk1,k2,...,kn = Ck1 × Ck2 × … × Ckn, where Cki is a cycle of length ki ≥ 3. If k1 = k2 = … = kn = k, the graph is also called the k-ary n-cube and is denoted by Qnk. In this paper, we deal with queue layouts of toroidal grids and show the following bound: qn(Tk1,k2,...,kn) ≤ 2n-2 if n ≥ 2 and ki ≥ 3 for all i = 1,2,...,n. In particular, for n = 2 and k1,k2 ≥ 3, we acquire qn(Tk1,k2) = 2. Recently, Pai et al. (Inform. Process. Lett. 110 (2009) pp.50-56) showed that qn(Qnk) ≤ 2n-1 if n ≥1 and k ≥9. Thus, our result improves the bound of qn(Qnk) when n ≥2 and k ≥9.

  • Dynamic Check Message Majority-Logic Decoding Algorithm for Non-binary LDPC Codes

    Yichao LU  Xiao PENG  Guifen TIAN  Satoshi GOTO  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1356-1364

    Majority-logic algorithms are devised for decoding non-binary LDPC codes in order to reduce computational complexity. However, compared with conventional belief propagation algorithms, majority-logic algorithms suffer from severe bit error performance degradation. This paper presents a low-complexity reliability-based algorithm aiming at improving error correcting ability of majority-logic algorithms. Reliability measures for check nodes are novelly introduced to realize mutual update between variable message and check message, and hence more efficient reliability propagation can be achieved, similar to belief-propagation algorithm. Simulation results on NB-LDPC codes with different characteristics demonstrate that our algorithm can reduce the bit error ratio by more than one order of magnitude and the coding gain enhancement over ISRB-MLGD can reach 0.2-2.0dB, compared with both the ISRB-MLGD and IISRB-MLGD algorithms. Moreover, simulations on typical LDPC codes show that the computational complexity of the proposed algorithm is closely equivalent to ISRB-MLGD algorithm, and is less than 10% of Min-max algorithm. As a result, the proposed algorithm achieves a more efficient trade-off between decoding computational complexity and error performance.

  • An Advanced Cooperative Scheme in the Broadcasting and Cellular System

    Hyun-Jun SHIN  Hyun-Woo JANG  Hyoung-Kyu SONG  

     
    LETTER-Fundamentals of Information Systems

      Vol:
    E97-D No:6
      Page(s):
    1634-1638

    In this letter, a cooperative scheme is proposed for the broadcasting and cellular communication system. The proposed scheme improves bit error rate (BER) performance and throughput on the edge of a cellular base station (CBS) cooperating with another CBS in the same broadcasting coverage. The proposed scheme for the enhancement of BER performance employs two schemes by a channel quality information (CQI) between a broadcasting base station (BBS) and users. In a physical area, the edge of a CBS is concatenated with the edge of another CBS. When users are on the edge of a CBS, they transmit simultaneously the CQI to CBSs, and then a BBS and CBSs transmit signals by the proposed algorithm. The two schemes apply space-time cyclic delay diversity (CDD) and a combination of space-time block code (STBC) with vertical Bell Laboratories Layered Space-Time (V-BLAST) to a signal from a BBS and CBSs. The resulting performance indicates that the proposed scheme is effective for users on the edges of CBSs.

4041-4060hit(16314hit)