The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

4581-4600hit(21534hit)

  • Uplink Non-Orthogonal Multiple Access (NOMA) with Single-Carrier Frequency Division Multiple Access (SC-FDMA) for 5G Systems

    Anxin LI  Anass BENJEBBOUR  Xiaohang CHEN  Huiling JIANG  Hidetoshi KAYAMA  

     
    PAPER

      Vol:
    E98-B No:8
      Page(s):
    1426-1435

    Non-orthogonal multiple access (NOMA) utilizing the power domain and advanced receiver has been considered as one promising multiple access technology for further cellular enhancements toward the 5th generation (5G) mobile communications system. Most of the existing investigations into NOMA focus on the combination of NOMA with orthogonal frequency division multiple access (OFDMA) for either downlink or uplink. In this paper, we investigate NOMA for uplink with single carrier-frequency division multiple access (SC-FDMA) being used. Differently from OFDMA, SC-FDMA requires consecutive resource allocation to a user equipment (UE) in order to achieve low peak to average power ratio (PAPR) transmission by the UE. Therefore, sophisticated designs of scheduling algorithm for NOMA with SC-FDMA are needed. To this end, this paper investigates the key issues of uplink NOMA scheduling such as UE grouping method and resource widening strategy. Because the optimal schemes have high computational complexity, novel schemes with low computational complexity are proposed for practical usage for uplink resource allocation of NOMA with SC-FDMA. On the basis of the proposed scheduling schemes, the performance of NOMA is investigated by system-level simulations in order to provide insights into the suitability of using NOMA for uplink radio access. Key issues impacting NOMA performance are evaluated and analyzed, such as scheduling granularity, UE number and the combination with fractional frequency reuse (FFR). Simulation results verify the effectiveness of the proposed algorithms and show that NOMA is a promising radio access technology for 5G systems.

  • Adaptive Multi-Rate Designs and Analysis for Hybrid FSO/RF Systems over Fading Channels

    Vuong V. MAI  Anh T. PHAM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:8
      Page(s):
    1660-1671

    This paper proposes the concept of adaptive multi-rate (AMR), which jointly employs switching between two links and adaptive rate on each link, for hybrid free-space optical/radio-frequency (FSO/RF) systems. Moreover, we present the cross-layer design of AMR switching, which is based on both the physical and link layers with an automatic-repeat request (ARQ) scheme. We develop an analytical framework based on a Markov chain model for system performance analysis. System performance metrics, including frame-error rate, goodput and link switching probability, are analytically studied over fading channels. Numerical results quantitatively show how the proposal significantly outperforms conventional ones with physical layer-based design and/or fixed-rate switching operation.

  • Effect of Load-Balancing against Disaster Congestion with Actual Subscriber Extension Telephone Numbers

    Daisuke SATOH  Hiromichi KAWANO  Yoshiyuki CHIBA  

     
    PAPER

      Vol:
    E98-A No:8
      Page(s):
    1637-1646

    We demonstrated that load balancing using actual subscriber extension numbers was practical and effective against traffic congestion after a disaster based on actual data. We investigated the ratios of the same subscriber extension numbers in each prefecture and found that most of them were located almost evenly all over the country without being concentrated in a particular area. The ratio of every number except for the fourth-last digit in the last group of four numbers in a telephone number was used almost equally and located almost evenly all over the country. Tolerance against overload in the last, second-, and third-last single digits stays close to that in the ideal situation if we assume that each session initiation protocol server has a capacity in accordance with the ratio of each number on every single digit in the last group of four numbers in Japan. Although tolerance against overload in double-, triple-, and quadruple-digit numbers does not stay close to that in the ideal situation, it still remains sufficiently high in the case of double- and triple-digit numbers. Although tolerance against overload in the quadruple-digit numbers becomes low, disaster congestion is still not likely to occur in almost half of the area of Japan (23 out of 47 prefectures).

  • Generation of Arbitrarily Patterned Pulse Trains in the THz Range by Spectral Synthesis of Optical Combs

    Isao MOROHASHI  Takahide SAKAMOTO  Norihiko SEKINE  Tetsuya KAWANISHI  Akifumi KASAMATSU  Iwao HOSAKO  

     
    PAPER-MWP Subsystem

      Vol:
    E98-C No:8
      Page(s):
    793-798

    We demonstrated generation of arbitrarily patterned optical pulse trains and frequency tunable terahertz (THz) pulses by spectral synthesis of optical combs generated by a Mach-Zehnder-modulator-based flat comb generator (MZ-FCG). In our approach, THz pulses were generated by photomixing of a multi-tone signal, which is elongated pulse train, and a single-tone signal. Both signals were extracted from a comb signal by using optical tunable bandpass filters. In the case of optical pulse train generation, the MZ-FCG generated comb signals with 10 GHz-spacing and 330 GHz-width, which was converted to a 2.85 ps-width pulse train by chirp compensation using a single-mode fiber. By combining the MZ-FCG with a pulse picker composed of a 40 Gbps intensity modulator, divided pulse trains and arbitrarily bit sequences were successfully generated. The single-mode light was extracted by an optical bandpass filter and the band-controlled pulse train was extracted by an optical bandpass filter. By photomixing them, a THz pulse was successfully generated. In the case of THz pulse generation, by photomixing a single-tone and a multi-tone signals extracted by tunable bandpass filters, THz pulses with a center frequency of 300 GHz was successfully generated. Furthermore, frequency tunability of the center frequency was also demonstrated.

  • ND-POR: A POR Based on Network Coding and Dispersal Coding

    Kazumasa OMOTE  Phuong-Thao TRAN  

     
    PAPER-Information Network

      Pubricized:
    2015/05/15
      Vol:
    E98-D No:8
      Page(s):
    1465-1476

    Nowadays, many individuals and organizations tend to outsource their data to a cloud storage for reducing the burden of data storage and maintenance. However, a cloud provider may be untrustworthy. The cloud thus leads to a numerous security challenges: data availability, data integrity, and data confidentiality. In this paper, we focus on data availability and data integrity because they are the prerequisites of the existence of a cloud system. The approach of this paper is the network coding-based Proof of Retrievability (POR) scheme which allows a client to check whether his/her data stored on the cloud servers are intact. Although many existing network coding-based PORs have been proposed, most of them still incur high costs in data check and data repair, and cannot prevent the small corruption attack which is a common attack in the POR scheme. This paper proposes a new network coding-based POR using the dispersal coding technique, named the ND-POR (Network coding - Dispersal coding POR) to improve the efficiency in data check and data repair and to protect against the small corruption attack.

  • Performance of Uplink Packetized LTE-A Signal Transmission on a Cascaded Radio-on-Radio and Radio-over-Fiber System

    Pham TIEN DAT  Atsushi KANNO  Tetsuya KAWANISHI  

     
    PAPER-RoF and Applications

      Vol:
    E98-C No:8
      Page(s):
    840-848

    In this paper, we propose a flexible and high-capacity front-haul link for the uplink transmission of high-speed mobile signals using a cascade of radio-on-radio (RoR) and radio-over-fiber (RoF) systems. To emulate the cases that may occur in the uplink direction, we experimentally investigate the performance of superposing an uplink bursty LTE-A signal on the cascaded system using optical packet signal transmission. The performance of systems using different types of erbium-doped fiber amplifiers (EDFAs), including a high-transient EDFA, an automatic-gain-control EDFA, and a burst-mode (BM) EDFA is evaluated and compared. We confirm that the dynamic transience of the EDFAs has a significant influence on the signal performance. By using a BM-EDFA, we confirm successful transmission of the uplink packetized LTE-A signal on the cascaded system. Both the measured error vector magnitude and the received optical power range metrics exceed the requirements. We also estimate the maximum transmission range of the RoR link, and it is confirmed that a sufficiently long range could be achieved for the applications in mobile front-haul networks.

  • Constrained Weighted Least Square Filter for Chrominance Recovery of High Resolution Compressed Image

    Takamichi MIYATA  Tomonobu YOSHINO  Sei NAITO  

     
    PAPER

      Vol:
    E98-A No:8
      Page(s):
    1718-1726

    Ultra high definition (UHD) imaging systems have attracted much attention as a next generation television (TV) broadcasting service and video streaming service. However, the state of the art video coding standards including H.265/HEVC has not enough compression rate for streaming, broadcasting and storing UHD. Existing coding standard such as H.265/HEVC normaly use RGB-YCbCr color transform before compressing RGB color image since that procedure can decorrelate color components well. However, there is room for improvement on the coding efficiency for color image based on an observation that the luminance and chrominance components changes in same locations. This observation inspired us to propose a new post-processing method for compressed images by using weighted least square (WLS) filter with coded luminance component as a guide image, for refining the edges of chrominance components. Since the computational cost of WLS tends to superlinearly increase with increasing image size, it is difficult to apply it to UHD images. To overcome this problem, we propose slightly overlapped block partitioning and a new variant of WLS (constrained WLS, CWLS). Experimental results of objective quality comparison and subjective assessment test using 4K images show that our proposed method can outperform the conventional method and reduce the bit amount for chrominance component drastically with preserving the subjective quality.

  • Characterization of an F-Band Horn Antenna Based on Electro-Optic Near-Field Measurements

    Hai Huy NGUYEN PHAM  Shintaro HISATAKE  Tadao NAGATSUMA  

     
    PAPER-MWP Sensing Technique

      Vol:
    E98-C No:8
      Page(s):
    866-872

    We demonstrate the characterization of a horn antenna in the full F-band (90 ∼ 140 GHz) based on far-field transformation from near-field electro-optic (EO) measurement. Our nonpolarimetric self-heterodyne EO sensing system enables us to simultaneously measure the spatial distribution of the amplitude and phase of the RF signal. Because free-running lasers are used to generate and detect the RF signal, our EO sensing system has wide frequency tunability. Owing to the stable and reliable amplitude and phase measurements with minimal field perturbation, the estimated far-field patterns agree well with those of the simulated results. We have evaluated the estimation errors of the 3-dB beamwidth and position of the first sidelobe. The largest standard error of the measurements was 1.1° for 3-dB beamwidth and 3.5° for the position of first sidelobe at frequency 90 GHz. Our EO sensing system can be used to characterize and evaluate terahertz antennas for indoor communication applications such as small-size slot array antennas.

  • A Sequential Iterative Resource Allocation Scheme for a 2-hop OFDMA Virtual Cellular Network

    Gerard Jimmy PARAISON  Eisuke KUDOH  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:8
      Page(s):
    1640-1650

    Multi-hop networks have been proposed to increase the data transmission rate in wireless mobile networks, and consequently improve the quality of experience of cell-edge users. A successive resource allocation scheme (SAS) has been proposed for a 2-hop virtual cellular network (VCN). In a multi-cell environment, the performance of SAS degrades because of intra-cell and inter-cell interference. In order to alleviate the effect of intra-cell and inter-cell interference and consequently increase the channel capacity of the VCN, this paper proposes the sequential iterative allocation scheme (SIS). Computer simulation results show that, compared to SAS, SIS can improve the fairness, the ergodic, and the outage channel capacity per mobile terminal (MT) of the VCN in a multi-cell environment. This paper also analyzes the performance of the VCN compared to that of the single hop network (SHN) when SIS is applied in a multi-cell environment. Using SIS, VCN can provide higher ergodic channel capacity, and better degree of fairness than SHN in a multi-cell environment. The effect of the number of wireless ports (WPs) in the VCN is also investigated, and the results suggest that adding more WPs per virtual cell in the VCN can enhance the outage channel capacity per MT and the degree of fairness of the VCN.

  • Discreet Method to Match Safe Site-Pairs in Short Computation Time for Risk-Aware Data Replication

    Takaki NAKAMURA  Shinya MATSUMOTO  Hiroaki MURAOKA  

     
    PAPER-Dependable Computing

      Pubricized:
    2015/04/28
      Vol:
    E98-D No:8
      Page(s):
    1493-1502

    Risk-aware Data Replication (RDR), which replicates data at primary sites to nearby safe backup sites, has been proposed to mitigate service disruption in a disaster area even after a widespread disaster that damages a network and a primary site. RDR assigns a safe backup site to a primary site while considering damage risk for both the primary site and the backup candidate site. To minimize the damage risk of all site-pairs the Integer Programing Problem (IPP), which is a mathematical optimization problem, is applied. A challenge for RDR is to choose safe backup sites within a short computation time even for a huge number of sites. As described in this paper, we propose a Discreet method for RDR to surmount this hurdle. The Discreet method first judges the backup sites of a potentially unsafe primary site and avoids assigning a very safe primary site with a very safe backup site. We evaluated the computation time for site-paring and the data availability in the cases of Earthquake and Tsunami using basic disaster simulations. We confirmed that the computation rate of the proposed method is more than 1000 times faster than the existing method when the number of sites is greater than 1000. We also confirmed the data availability of the proposed method; it provides almost equal rates to existing methods of strict optimization. These results mean that the proposed method makes RDR more practical for massively multiple sites.

  • Low Chirp Modulation by Electro-Optic Intensity Modulator Using Microwave 180-Degree Hybrid Directly Formed on LiNbO3 Substrate

    Akira ENOKIHARA  Masashi YAMAMOTO  Tadashi KAWAI  Tetsuya KAWANISHI  

     
    PAPER-MWP Device and Application

      Vol:
    E98-C No:8
      Page(s):
    777-782

    An electro-optic (EO) modulator integrated with the microwave planar circuit directly formed on a LiNbO3 (LN) substrate for low frequency-chirp performance and compact configuration is introduced. Frequency chirp of EO intensity modulators was investigated and a dual-electrode Mach-Zehnder (MZ) modulator combined with a microwave rat-race (RR) circuit was considered for the low-chirp modulation. The RR circuit, which operates as a 180-degree hybrid, was designed on a z-cut LN substrate to create two modulation signals of the same amplitude in anti-phase with each other from a single input signal. Output ports of the RR were connected to the modulation electrodes on the substrate. The two signals of the equal amplitude drive two phase modulation parts of the modulator so that the symmetric interference are realized to obtain intensity modulation of low frequency-chirp. The modulator was designed and fabricated on a single LN substrate for around 10 GHz modulation frequencies and 1550 nm light wavelength. The chirp parameters were measured to be less than 0.2 in the frequency range between 8 and 12 GHz. By compensating imbalance of the light power splitting in the waveguide MZ interferometer the chirp could be reduced even more.

  • Offline Vehicle Detection at Night Using Center Surround Extremas

    Naoya KOSAKA  Ryota OGURA  Gosuke OHASHI  

     
    PAPER

      Vol:
    E98-A No:8
      Page(s):
    1727-1734

    Recently, Intelligent Transport Systems (ITS) are being researched and developed briskly. As a part of ITS, detecting vehicles from images taken by a camera loaded on a vehicle are conducted. From such backgrounds, authors have been conducting vehicle detection in nighttime. To evaluate the accuracy of this detection, gold standards of the detection are required. At present, gold standards are created manually, but manually detecting vehicles take time. Accordingly, a system which detects vehicles accurately without human help is needed to evaluate the accuracy of the vehicle detection in real time. Therefore the purpose of this study is to automatically detect vehicles in nighttime images, taken by an in-vehicle camera, with high accuracy in offline processing. To detect vehicles we focused on the brightness of the headlights and taillights, because it is difficult to detect vehicles from their shape in nighttime driving scenes. The method we propose uses Center Surround Extremas, called CenSurE for short, to detect blobs. CenSurE is a method that uses the difference in brightness between the lights and the surroundings. However, blobs obtained by CenSurE will also include objects other than headlights and taillights. For example, streetlights and delineators would be detected. To distinguish such blobs, they are tracked in inverse time and vehicles are detected using tags based on the characteristics of each object. Although every object appears from the same point in forward time process, each object appears from different places in images in inverse time processing, allowing it to track and tag blobs easily. To evaluate the effectiveness of this proposed method, experiment of detecting vehicles was conducted using nighttime driving scenes taken by a camera loaded on a vehicle. Experimental results of the proposed method were nearly equivalent to manual detection.

  • Intra-AS Performance Analysis of Distributed Mobility Management Schemes

    Oshani ERUNIKA  Kunitake KANEKO  Fumio TERAOKA  

     
    PAPER-Information Network

      Pubricized:
    2015/05/12
      Vol:
    E98-D No:8
      Page(s):
    1477-1492

    Distributed Mobility Management (DMM) defines Internet Protocol (IP) mobility which does not depend on centralized manipulation. DMM leads to the abatement of non-optimal routing, a single point of failure, and scalability problems appearing in centralized Mobility Management (MM). The fact that most DMM schemes are in the proposal phase and non-existence of a standardization, urge to investigate the proposed schemes thoroughly to confirm their capabilities and thereby, to determine the best candidate practice for DMM. This paper examines five novel DMM proposals discussed in the Internet Engineering Task Force (IETF) using router-level Internet Service Provider (ISP) topologies of Sprint (USA), Tiscali (Europe), Telstra (AUS), and Exodus (USA), as user mobility within an ISP network is considered the most realistic and recurrent user movement in the modern scope. Results reflect behavioral differences of schemes depending on the network. ISPs closer to the Internet core with high density of Point of Presences (PoPs) such as Sprint show poorer outcome when centralized anchors/controllers are employed while Proxy Mobile IP (PMIP) based enhancements offer higher reliability. In contrast, smaller ISPs that reside farther away from the Internet core yield better performance with SDN-Based and Address Delegation schemes. Although the PMIP-Based DMM schemes perform better during handover, their outturn is trivialized due to higher latency in the data plane. In contrast, the Address Delegation and SDN-Based schemes have excessive cost and latency in performing handover due to routing table updates, but perform better in data plane, suggesting that control/data plane split may best address the optimal routing.

  • Estimation of Subjective Image Quality for Combinations of Display Physical Factors Based on the Mahalanobis-Taguchi System

    Yusuke AMANO  Gosuke OHASHI  Shogo MORI  Kazuya SAWADA  Takeshi HOSHINO  Yoshifumi SHIMODAIRA  

     
    LETTER

      Vol:
    E98-A No:8
      Page(s):
    1743-1746

    The present study proposes a method for estimation of subjective image quality, for combinations of display physical factors, based on the Mahalanobis-Taguchi system in the field of quality engineering. The proposed method estimates subjective image quality by the estimated equation based on the Mahalanobis-Taguchi System and subjective evaluation experiments using the method of successive categories for images of which parameters are combinations of gamma, maximum luminance and minimum luminance. The estimated image quality is in good agreement with the experimental subjective image quality.

  • Millimeter-Wave Ellipsometry Using Interface-Planarization Prism

    Hiroshi YAMAMOTO  Hiroshi ITO  

     
    PAPER-MWP Sensing Technique

      Vol:
    E98-C No:8
      Page(s):
    873-877

    The use of an interface-planarization (IP) prism in millimeter-wave ellipsometry is proposed to achieve reproducible measurements of soft, protean, and non-flat samples. The complex relative dielectric constants of a slice of bovine tissue were successfully measured at frequencies from 90 to 140 GHz using the IP prism to confirm its applicability. The use of the IP prism was found to be advantageous for protecting the sample surface from the desiccation during the measurements.

  • Simple Derivation of the Lifetime and the Distribution of Faces for a Binary Subdivision Model

    Yukio HAYASHI  

     
    LETTER-Graphs and Networks

      Vol:
    E98-A No:8
      Page(s):
    1841-1844

    The iterative random subdivision of rectangles is used as a generation model of networks in physics, computer science, and urban planning. However, these researches were independent. We consider some relations in them, and derive fundamental properties for the average lifetime depending on birth-time and the balanced distribution of rectangle faces.

  • 3D CG Image Quality Metrics by Regions with 8 Viewpoints Parallax Barrier Method

    Norifumi KAWABATA  Masaru MIYAO  

     
    PAPER

      Vol:
    E98-A No:8
      Page(s):
    1696-1708

    Many previous studies on image quality assessment of 3D still images or video clips have been conducted. In particular, it is important to know the region in which assessors are interested or on which they focus in images or video clips, as represented by the ROI (Region of Interest). For multi-view 3D images, it is obvious that there are a number of viewpoints; however, it is not clear whether assessors focus on objects or background regions. It is also not clear on what assessors focus depending on whether the background region is colored or gray scale. Furthermore, while case studies on coded degradation in 2D or binocular stereoscopic videos have been conducted, no such case studies on multi-view 3D videos exist, and therefore, no results are available for coded degradation according to the object or background region in multi-view 3D images. In addition, in the case where the background region is gray scale or not, it was not revealed that there were affection for gaze point environment of assessors and subjective image quality. In this study, we conducted experiments on the subjective evaluation of the assessor in the case of coded degradation by JPEG coding of the background or object or both in 3D CG images using an eight viewpoint parallax barrier method. Then, we analyzed the results statistically and classified the evaluation scores using an SVM.

  • Development of “WBS Manager” to Design Disaster Response Plan

    Munenari INOGUCHI  Keiko TAMURA  Haruo HAYASHI  

     
    LETTER

      Vol:
    E98-A No:8
      Page(s):
    1674-1675

    Local governments usually designed disaster response plan by themselves in order to overcome disasters. In previous research, we developed the effective analysis method for disaster response which is “BFD (Business Flow Diagram)”. In this research, in order to improve effect of BFD analysis, we designed and developed WBS Manager focusing on the process of WBS development which is a part of BFD analysis, because WBS development is fundamental process of BFD method. Especially we developed WBS Manager as web-based application, and implemented it to actual studies at local governments in planning their disaster response operations. In this paper, we introduced the overview of WBS Manager.

  • Information Centric Networking for Disaster Information Sharing Services

    Zheng WEN  Di ZHANG  Keping YU  Takuro SATO  

     
    PAPER

      Vol:
    E98-A No:8
      Page(s):
    1610-1617

    Information Centric Networking (ICN) had merits in terms of mobility, security, power consumption and network traffic. When a large-scale disaster occurred, the current communication system might be fragile and the server based network service might be unavailable due to the damages, network congestions, and power failure, etc. In this paper, we proposed an ICN based Disaster Information Sharing Service (DISS) [1], [2] system. DISS could provide robust information sharing service. Users could publish disaster information as a content message with the help of our DISS. In addition, by utilizing DISS's message naming strategy, users could retrieve disaster information even without a server connection. The ICN based DISS could reduce the probability of network congestion when a large number of simultaneous connections occurring. It could provide server-less service in poor network condition. DISS allows users retrieve disaster information from terminals or ICN nodes. During disasters, sharing information timely and effective could protect people from disaster, ensure people's safety.

  • Automatic Soccer Player Tracking in Single Camera with Robust Occlusion Handling Using Attribute Matching

    Houari SABIRIN  Hiroshi SANKOH  Sei NAITO  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2015/05/14
      Vol:
    E98-D No:8
      Page(s):
    1580-1588

    This paper presents an automatic method to track soccer players in soccer video recorded from a single camera where the occurrence of pan-tilt-zoom can take place. The automatic object tracking is intended to support texture extraction in a free viewpoint video authoring application for soccer video. To ensure that the identity of the tracked object can be correctly obtained, background segmentation is performed and automatically removes commercial billboards whenever it overlaps with the soccer player. Next, object tracking is performed by an attribute matching algorithm for all objects in the temporal domain to find and maintain the correlation of the detected objects. The attribute matching process finds the best match between two objects in different frames according to their pre-determined attributes: position, size, dominant color and motion information. Utilizing these attributes, the experimental results show that the tracking process can handle occlusion problems such as occlusion involving more than three objects and occluded objects with similar color and moving direction, as well as correctly identify objects in the presence of camera movements.

4581-4600hit(21534hit)