The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

4961-4980hit(21534hit)

  • Physical Optics Radiation Integrals with Frequency-Independent Number of Division utilizing Fresnel Zone Number Localization and Adaptive Sampling Method

    Takayuki KOHAMA  Makoto ANDO  

     
    PAPER-Electromagnetic Theory

      Vol:
    E97-C No:12
      Page(s):
    1134-1141

    The physical optics (PO) approximation is one of the widely-used techniques to calculate scattering fields with a reasonable accuracy in the high frequency region. The computational load of PO radiation integral dramatically increases at higher frequencies since it is proportional to the electrical size of scatterer. In order to suppress this load, a variety of techniques, such as the asymptotic evaluation by the stationary phase method (SP), the equivalent edge currents (EECs), the low-order polynomial expansion method and the fast physical optics (FPO), have been proposed and developed. The adaptive sampling method (ASM) proposed by Burkholder is also one of the techniques where the sampling points in radiation integral should be adaptively determined based upon the phase change of integrand. We proposed a quite different approach named ``Localization of the radiation integrals.'' This localization method suggests that only the small portions of the integration with a slow phase change contribute to the scattering field. In this paper, we newly introduce the ASM in the localization method and applied the proposed method into the radar cross section (RCS) analysis of 2-dimensional strip and cylinder. We have confirmed that the proposed method provides the frequency-independent number of division in the radiation integrals and computational time and accuracy. As the starting point for extension to 3-D case, the application of the proposed method for a reflection from an infinite PEC plane and a part of sphere was also examined.

  • A Low EMI Circuit Design with Asynchronous Multi-Frequency Clocking

    Jeong-Gun LEE  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E97-C No:12
      Page(s):
    1158-1161

    In this paper, we propose a new design technique called extit{asynchronous multi-frequency clocking} for suppressing EMI at a chip design level by combining two independent EMI-suppressing approaches: extit{multi-frequency clocking} and extit{asynchronous circuit design} techniques. To show the effectiveness of our approach, a five-stage pipelined asynchronous MIPS with multi-frequency clocking has been implemented on a commercial Xilinx FPGA device. Our approach shows 11.05 dB and 5.88 dB reductions of peak EM radiation in the prototyped implementation when compared to conventional synchronous and bundled-data asynchronous circuit counterparts, respectively.

  • Illumination Modeling Method for Office Lighting Control by Using RBFNN

    Wa SI  Xun PAN  Harutoshi OGAI  Katsumi HIRAI  Noriyoshi YAMAUCHI  Tansheng LI  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E97-D No:12
      Page(s):
    3192-3200

    This paper represents an illumination modeling method for lighting control which can model the illumination distribution inside office buildings. The algorithm uses data from the illumination sensors to train Radial Basis Function Neural Networks (RBFNN) which can be used to calculate 1) the illuminance contribution from each luminaire to different positions in the office 2) the natural illuminance distribution inside the office. This method can be used to provide detailed illumination contribution from both artificial and natural light sources for lighting control algorithms by using small amount of sensors. Simulations with DIALux are made to prove the feasibility and accuracy of the modeling method.

  • An Anonymous Reputation System with Reputation Secrecy for Manager

    Toru NAKANISHI  Nobuo FUNABIKI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E97-A No:12
      Page(s):
    2325-2335

    In anonymous reputation systems, where after an interaction between anonymous users, one of the users evaluates the peer by giving a rating. Ratings for a user are accumulated, which becomes the reputation of the user. By using the reputation, we can know the reliability of an anonymous user. Previously, anonymous reputation systems have been proposed, using an anonymous e-cash scheme. However, in the e-cash-based systems, the bank grasps the accumulated reputations for all users, and the fluctuation of reputations. These are private information for users. Furthermore, the timing attack using the deposit times is possible, which makes the anonymity weak. In this paper, we propose an anonymous reputation system, where the reputations of users are secret for even the reputation manager such as the bank. Our approach is to adopt an anonymous credential certifying the accumulated reputation of a user. Initially a user registers with the reputation manager, and is issued an initial certificate. After each interaction with a rater, the user as the ratee obtains an updated certificate certifying the previous reputation summed up by the current rating. The update protocol is based on the zero-knowledge proofs, and thus the reputations are secret for the reputation manager. On the other hand, due to the certificate, the user cannot maliciously alter his reputation.

  • Energy Minimization of Full TMR Design with Optimized Selection of Temporal/Spatial TMR Mode and Supply Voltage

    Kazuhito ITO  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E97-A No:12
      Page(s):
    2530-2539

    While Triple modular Redundancy (TMR) is effective in eliminating soft errors in LSIs, the overhead of the triplicated area as well as the triplicated energy consumption is the problem. In addition to the spatial TMR mode where executions are simply tripricated and the majority is taken, the temporal TMR mode is available where only two copies of an operation are executed and the results are compared, then if the results differ, the third copy is executed to get the correct result. Appropriately selecting the power supply voltage is also an effective technique to reduce the energy consumption. In this paper, a method to derive a TMR design is proposed which selects the TMR mode and supply voltage for each operation to minimize the energy consumption within the time and area constraints.

  • An Integrated Framework for Energy Optimization of Embedded Real-Time Applications

    Hideki TAKASE  Gang ZENG  Lovic GAUTHIER  Hirotaka KAWASHIMA  Noritoshi ATSUMI  Tomohiro TATEMATSU  Yoshitake KOBAYASHI  Takenori KOSHIRO  Tohru ISHIHARA  Hiroyuki TOMIYAMA  Hiroaki TAKADA  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E97-A No:12
      Page(s):
    2477-2487

    This paper presents a framework for reducing the energy consumption of embedded real-time systems. We implemented the presented framework as both an optimization toolchain and an energy-aware real-time operating system. The framework consists of the integration of multiple techniques to optimize the energy consumption. The main idea behind our approach is to utilize trade-offs between the energy consumption and the performance of different processor configurations during task checkpoints, and to maintain memory allocation during task context switches. In our framework, a target application is statically analyzed at both intra-task and inter-task levels. Based on these analyzed results, runtime optimization is performed in response to the behavior of the application. A case study shows that our toolchain and real-time operating systems have achieved energy reduction while satisfying the real-time performance. The toolchain has also been successfully applied to a practical application.

  • A Geometric Sequence Binarized with Legendre Symbol over Odd Characteristic Field and Its Properties

    Yasuyuki NOGAMI  Kazuki TADA  Satoshi UEHARA  

     
    PAPER-Sequence

      Vol:
    E97-A No:12
      Page(s):
    2336-2342

    Let p be an odd characteristic and m be the degree of a primitive polynomial f(x) over the prime field Fp. Let ω be its zero, that is a primitive element in F*pm, the sequence S={si}, si=Tr(ωi) for i=0,1,2,… becomes a non-binary maximum length sequence, where Tr(·) is the trace function over Fp. On this fact, this paper proposes to binarize the sequence by using Legendre symbol. It will be a class of geometric sequences but its properties such as the period, autocorrelation, and linear complexity have not been discussed. Then, this paper shows that the generated binary sequence (geometric sequence by Legendre symbol) has the period n=2(pm-1)/(p-1) and a typical periodic autocorrelation. Moreover, it is experimentally observed that its linear complexity becomes the maximum, that is the period n. Among such experimental observations, especially in the case of m=2, it is shown that the maximum linear complexity is theoretically proven. After that, this paper also demonstrates these properties with a small example.

  • Optimal Threshold Configuration Methods for Flow Admission Control with Cooperative Users

    Sumiko MIYATA  Katsunori YAMAOKA  Hirotsugu KINOSHITA  

     
    PAPER-Network

      Vol:
    E97-B No:12
      Page(s):
    2706-2719

    We have proposed a novel call admission control (CAC) method for maximizing total user satisfaction in a heterogeneous traffic network and showed their effectiveness by using the optimal threshold from numerical analysis [1],[2]. With these CAC methods, it is assumed that only selfish users exist in a network. However, we need to consider the possibility that some cooperative users exist who would agree to reduce their requested bandwidth to improve another user's Quality of Service (QoS). Under this assumption, conventional CAC may not be optimal. If there are cooperative users in the network, we need control methods that encourage such user cooperation. However, such “encourage” control methods have not yet been proposed. Therefore, in this paper, we propose novel CAC methods for cooperative users by using queueing theory. Numerical analyses show their effectiveness. We also analyze the characteristics of the optimal control parameter of the threshold.

  • Proposal of Analysis Method for Three-Phase Filter Using Fortescue-Mode S-Parameters

    Yoshikazu FUJISHIRO  Takahiko YAMAMOTO  Kohji KOSHIJI  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E97-B No:12
      Page(s):
    2756-2766

    This study proposes a novel method for evaluating the transmission characteristics of a three-phase filter using the “Fortescue-mode S-parameters,” which are S-parameters whose variables are transformed into symmetrical coordinates (i.e., zero-/positive-/negative-phase sequences). The behavior of the filter under three-phase current, including its non-symmetry, can be represented by these S-parameters, without regard to frequency. This paper also describes a methodology for creating modal equivalent circuits that reflect Fortescue-mode S-parameters allowing the effects of circuit components on filter characteristics to be estimated. Thus, this method is useful not only for the measurement and evaluation but also for the analysis and design of a three-phase filter. In addition, the physical interpretation of asymmetrical/symmetrical insertion losses and the conversion method based on Fortescue-mode S-parameters are clarified.

  • 3-Dimensional Imaging and Motion Estimation Method of Multiple Moving Targets for Multi-Static UWB Radar Using Target Point and Its Normal Vector

    Ryo YAMAGUCHI  Shouhei KIDERA  Tetsuo KIRIMOTO  

     
    PAPER-Sensing

      Vol:
    E97-B No:12
      Page(s):
    2819-2829

    Radar systems using ultra-wideband (UWB) signals have definitive advantages in high range resolution. These are suitable for accurate 3-dimensional (3-D) sensing by rescue robots operating in disaster zone settings, where optical sensing is not applicable because of thick smog or high-density gas. For such applications, where no a priori information of target shape and position is given, an accurate method for 3-D imaging and motion estimation is strongly required for effective target recognition. In addressing this issue, we have already proposed a non-parametric 2-dimensional (2-D) imaging method for a target with arbitrary target shape and motion including rotation and translation being tracked using a multi-static radar system. This is based on matching target boundary points obtained using the range points migration (RPM) method extended to the multi-static radar system. Whereas this method accomplishes accurate imaging and motion estimation for single targets, accuracy is degraded severely for multiple targets, due to interference effects. For a solution of this difficulty, this paper proposes a method based on a novel matching scheme using not only target points but also normal vectors on the target boundary estimated by the Envelope method; interference effects are effectively suppressed when incorporating the RPM approach. Results from numerical simulations for both 2-D and 3-D models show that the proposed method simultaneously achieves accurate target imaging and motion tracking, even for multiple moving targets.

  • On the Wyner-Ziv Source Coding Problem with Unknown Delay

    Tetsunao MATSUTA  Tomohiko UYEMATSU  

     
    PAPER-Shannon Theory

      Vol:
    E97-A No:12
      Page(s):
    2288-2299

    In this paper, we consider the lossy source coding problem with delayed side information at the decoder. We assume that delay is unknown but the maximum of delay is known to the encoder and the decoder, where we allow the maximum of delay to change with the block length. In this coding problem, we show an upper bound and a lower bound of the rate-distortion (RD) function, where the RD function is the infimum of rates of codes in which the distortion between the source sequence and the reproduction sequence satisfies a certain distortion level. We also clarify that the upper bound coincides with the lower bound when maximums of delay per block length converge to a constant. Then, we give a necessary and sufficient condition in which the RD function is equal to that for the case without delay. Furthermore, we give an example of a source which does not satisfy this necessary and sufficient condition.

  • Self-Organizing Name Resolution System in a Small World

    Suyong EUM  Masahiro JIBIKI  Masayuki MURATA  Hitoshi ASAEDA  Nozomu NISHINAGA  

     
    PAPER

      Vol:
    E97-B No:12
      Page(s):
    2606-2615

    This article introduces a self-organizing model which builds the topology of a DHT mapping system for ICN. Due to its self-organizing operation and low average degree of maintenance, the management overhead of the system is reduced dramatically, which yields inherent scalability. The proposed model can improve latency by around 10% compared to an existing approach which has a near optimal average distance when the number of nodes and degree are given. In particular, its operation is simple which eases maintenance concerns. Moreover, we analyze the model theoretically to provide a deeper understanding of the proposal.

  • A Two-Tier Spatial Index for Non-flat Spatial Data Broadcasting on Air

    SeokJin IM  HeeJoung HWANG  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E97-B No:12
      Page(s):
    2809-2818

    To support the processing of spatial window queries efficiently in a non-flat wireless data broadcasting system, we propose a Two-Tier Spatial Index (TTSI) that uses a two tier data space to distinguish hot and regular data items. Unlike an existing index which repeats regular data items located near hot items at the same time as the hot data items during the broadcast cycle, TTSI makes it possible to repeat only hot data items during a cycle. Simulations show that the proposed TTSI outperforms the existing scheme with respect to access time and energy consumption.

  • ZNA: A Six-Layer Network Architecture for New Generation Networks —— Focusing on the Session Layer, the Network Layer, and Cross-Layer Cooperation —— Open Access

    Fumio TERAOKA  Sho KANEMARU  Kazuma YONEMURA  Motoki IDE  Shinji KAWAGUCHI  Kunitake KANEKO  

     
    INVITED PAPER

      Vol:
    E97-B No:12
      Page(s):
    2583-2595

    Using “clean-slate approach” to redesign the Internet has attracted considerable attention. ZNA (Z Network Architecture) is one of clean-slate network architectures based on the layered model. The major features of ZNA are as follows: (1) introducing the session layer to provide the applications with sophisticated communication services, (2) employing inter-node cross-layer cooperation to adapt to the dynamically changing network conditions, (3) splitting the node identifier and the node locator for mobility, multi-homing, and heterogeneity of network layer protocols, (4) splitting the data plane and the control plane for high manageability, and (5) introducing a recursive layered model to support network virtualization. This paper focuses on the first three topics as well as the basic design of ZNA.

  • In-Network Cache Management Based on Differentiated Service for Information-Centric Networking

    Qian HU  Muqing WU  Hailong HAN  Ning WANG  Chaoyi ZHANG  

     
    PAPER

      Vol:
    E97-B No:12
      Page(s):
    2616-2626

    As a promising future network architecture, Information-centric networking (ICN) has attracted much attention, its ubiquitous in-network caching is one of the key technologies to optimize the dissemination of information. However, considering the diversity of contents and the limitation of cache resources in the Internet, it is usually difficult to find a one-fit-all caching strategy. How to manage the ubiquitous in-network cache in ICN has become an important problem. In this paper, we explore ways to improve cache performance from the three perspectives of spatiality, temporality and availability, based on which we further propose an in-network cache management strategy to support differentiated service. We divide contents requested in the network into different levels and the selection of caching strategies depends on the content level. Furthermore, the corresponding models of utilizing cache resources in spatiality, temporality and availability are also derived for comparison and analysis. Simulation verifies that our differentiated service based cache management strategy can optimize the utilization of cache resources and get higher overall cache performance.

  • A Tenant Network Provisioning Platform with Provisioning Template for Multi-Tenancy Data Centers

    Yoji OZAWA  Yoshiko YASUDA  Yosuke HIMURA  

     
    PAPER

      Vol:
    E97-B No:12
      Page(s):
    2658-2667

    Tenant network provisioning in multi-tenancy data centers is time-consuming and error-prone due to the need to configure network devices with hundreds of parameter values (e.g., VLAN ID, IP address) determined according to complicated operational rules. Past works have aimed to automate such operational rule-based provisioning processes by implementing data center-specific provisioning programs, but a crucial problem is the high cost of adapting the programs to suit multiple data centers. In this paper, we aim to solve this problem by enabling to describe the provisioning processing, which has been hard-coded programs in conventional approaches, in easy-to-edit “provisioning template” files. The key component of the provisioning template is the parameter decision rule, which is a declarative abstract representation of parameter dependency and parameter assignment. We design the provisioning template so that it can handle various configuration items while preserving its editability for tenant provisioning. We design and implement the provisioning platform, and the evaluation based on a production data center shows that the provisioning platform can adopt multiple data centers with a single program, leading to less development cost compared to past approaches (i.e., program development for each data center).

  • Improvement of Interruptibility Estimation during PC Work by Reflecting Conversation Status

    Satoshi HASHIMOTO  Takahiro TANAKA  Kazuaki AOKI  Kinya FUJITA  

     
    PAPER-Human-computer Interaction

      Vol:
    E97-D No:12
      Page(s):
    3171-3180

    Frequently interrupting someone who is busy will decrease his or her productivity. To minimize this risk, a number of interruptibility estimation methods based on PC activity such as typing or mouse clicks have been developed. However, these estimation methods do not take account of the effect of conversations in relation to the interruptibility of office workers engaged in intellectual activities such as scientific research. This study proposes an interruptibility estimation method that takes account of the conversation status. Two conversation indices, “In conversation” and “End of conversation” were used in a method that we developed based on our analysis of 50 hours worth of recorded activity. Experiments, using the conversation status as judged by the Wizard-of-OZ method, demonstrated that the estimation accuracy can be improved by the two indices. Furthermore, an automatic conversation status recognition system was developed to replace the Wizard-of-OZ procedure. The results of using it for interruptibility estimation suggest the effectiveness of the automatically recognized conversation status.

  • Region-Based Distributed Estimation Using Quantized Data

    Yoon Hak KIM  

     
    PAPER-Information Network

      Vol:
    E97-D No:12
      Page(s):
    3155-3162

    In this paper, we consider distributed estimation where the measurement at each of the distributed sensor nodes is quantized before being transmitted to a fusion node which produces an estimate of the parameter of interest. Since each quantized measurement can be linked to a region where the parameter is found, aggregating the information obtained from multiple nodes corresponds to generating intersections between the regions. Thus, we develop estimation algorithms that seek to find the intersection region with the maximum likelihood rather than the parameter itself. Specifically, we propose two practical techniques that facilitate fast search with significantly reduced complexity and apply the proposed techniques to a system where an acoustic amplitude sensor model is employed at each node for source localization. Our simulation results show that our proposed algorithms achieve good performance with reasonable complexity as compared with the minimum mean squared error (MMSE) and the maximum likelihood (ML) estimators.

  • A Novel Construction of Asymmetric ZCZ Sequence Sets from Interleaving Perfect Sequence

    Longye WANG  Xiaoli ZENG  Hong WEN  

     
    PAPER-Sequences

      Vol:
    E97-A No:12
      Page(s):
    2556-2561

    An asymmetric zero correlation zone (A-ZCZ) sequence set is a type of ZCZ sequence set and consists of multiple sequence subsets. It is the most important property that is the cross-correlation function between arbitrary sequences belonging to different sequence subsets has quite a large zero-cross-correlation zone (ZCCZ). Our proposed A-ZCZ sequence sets can be constructed based on interleaved technique and orthogonality-preserving transformation by any perfect sequence of length P=Nq(2k+1) and Hadamard matrices of order T≥2, where N≥1, q≥1 and k≥1. If q=1, the novel sequence set is optimal ZCZ sequence set, which has parameters (TP,TN,2k+1) for all positive integers P=N(2k+1). The proposed A-ZCZ sequence sets have much larger ZCCZ, which are expected to be useful for designing spreading sequences for QS-CDMA systems.

  • MAHI: A Multiple Stage Approach for Home Network Interoperability

    Hark-Jin LEE  Eun-Seo LEE  Kwangil LEE  Jun-Hee PARK  Jae-Cheol RYOU  

     
    PAPER

      Vol:
    E97-B No:12
      Page(s):
    2689-2697

    Interoperability is one of the fundamental functions of a home network because such networks must support many different types of devices and services. Interoperability can be realized by converting messages among different middleware with rules. However, it is very difficult to define common rules to accommodate all differences among various middleware. In addition, most interoperability approaches only address the conversion of the message format and schema, and occasionally these are not enough for a semantic conversion. In this paper, we propose a systematic approach to solve the interoperability problem. For this, we classify three interoperability types, i.e., schema, profile, and procedure, and define the rules for each type. We called this interoperability scheme the Multiple stage Approach for Home network Interoperability (MAHI). In this paper, we present the design and implementation of MAHI for a three-stage conversion process. Finally, we illustrate some experimental and quantitative results. In the experiments, MAHI can provide efficient interoperability among different middleware and MAHI will be a method to deal with a complex home network interoperability.

4961-4980hit(21534hit)