The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

6341-6360hit(21534hit)

  • Examination of Effective UWB Avoidance Based on Experiments for Coexistence with Other Wireless Systems

    Huan-Bang LI  Kunio YATA  Kenichi TAKIZAWA  Noriaki MIYAZAKI  Takashi OKADA  Kohei OHNO  Takuji MOCHIZUKI  Eishin NAKAGAWA  Takehiko KOBAYASHI  

     
    PAPER

      Vol:
    E96-A No:1
      Page(s):
    274-284

    An ultra-wideband (UWB) system usually occupies a large frequency band, which may overlap with the spectrum of a narrow band system. The latter is referred to as a victim system. To effectively use frequency, a UWB system may create a notch in its spectrum to accommodate the victim signal for interference avoidance. Parameters of the notch such as the depth and the width of a notch need to be decided in accordance to victim systems. In this paper, we investigate the effective UWB avoidance by examining the suitable notch based on experimental evaluation. In the experiments, 3GPP LTE, Mobile WiMAX, as well as an IMT Advanced Test-bed are respectively employed to represent different types of victim systems. The UWB system is set up based on WiMedia specifications and operates at the UWB low band of 3.1–4.8 GHz. A notch is fabricated by nullifying the related subcarriers of the UWB signal. In addition, a filter or a window function is formed and employed to further smooth the notch. Bit error rate (BER) or packet error rate (PER) performances of victim systems are measured and used to evaluate the UWB interference. Our results show that when a notch is properly formed, the interference level introduced by UWB can be below the permitted level by regulations.

  • Network-Resource Isolation for Virtualization Nodes

    Yasusi KANADA  Kei SHIRAISHI  Akihiro NAKAO  

     
    PAPER

      Vol:
    E96-B No:1
      Page(s):
    20-30

    One key requirement for achieving network virtualization is resource isolation among slices (virtual networks), that is, to avoid interferences between slices of resources. This paper proposes two methods, per-slice shaping and per-link policing for network-resource isolation (NRI) in terms of bandwidth and delay. These methods use traffic shaping and traffic policing, which are widely-used traffic control methods for guaranteeing QoS. Per-slice shaping utilizes weighted fair queuing (WFQ) usually applied to a fine-grained flow such as a flow from a specific server application to a user. Since the WFQ for fine-grained flows requires many queues, it may not scale to a large number of slices with a large number of virtual nodes. Considering that the purpose of NRI is not thoroughly guaranteeing QoS but avoiding interferences between slices, we believe per-slice (not per virtual link) shaping satisfies our objective. In contrast, per-link policing uses traffic policing per virtual link. It requires less resource and achieves less-strict but more-scalable isolation between hundreds of slices (500 to 700 slices in estimation). Our results show that both methods perform NRI well but the performance of the former is better in terms of delay. Accordingly, per-slice shaping (with/without policing) is effective for delay-sensitive services while per-link policing may be sufficiently used for the other types of services.

  • Construction of Shift Distinct Sequence Sets with Zero or Low Correlation Zone

    Xiaoyu CHEN  Chengqian XU  Yubo LI  Kai LIU  

     
    LETTER-Coding Theory

      Vol:
    E96-A No:1
      Page(s):
    377-382

    A construction of shift sequence sets is proposed. Multiple distinct shift sequence sets are obtained by changing the parameters of the shift sequences. The shift sequences satisfy the conditions that P|L and P ≥ 2, where P is the length of the shift sequences, L is the length of the zero-correlation zone or low-correlation zone (ZCZ/LCZ). Then based on these shift sequence sets, many shift distinct ZCZ/LCZ sequence sets are constructed by using interleaving technique and complex Hadamard matrices. Furthermore, the new construction is optimal under the conditions proposed in this paper. Compared with previous constructions, the proposed construction extends the number of shift distinct ZCZ/LCZ sequence sets, so that more sequence sets are obtained for multi-cell quasi-synchronous code-division multiple access (QS-CDMA) systems.

  • A Wide Input Range, High-Efficiency Multi-Mode Active Rectifier for Magnetic Resonant Wireless Power Transfer System

    Hyung-Gu PARK  SoYoung KIM  Kang-Yoon LEE  

     
    PAPER-Electronic Circuits

      Vol:
    E96-C No:1
      Page(s):
    102-107

    In this paper, a wide input range CMOS multi-mode active rectifier is presented for a magnetic resonant wireless battery charging system. The configuration is automatically changed with respect to the magnitude of the input AC voltage. The output voltage of the multi-mode rectifier is sensed by a comparator. Furthermore, the mode of the multi-mode rectifier is automatically selected by switches among the original rectifier mode, 1-stage voltage multiplier mode, and 2-stage voltage multiplier mode. In the original rectifier, the range of the rectified output DC voltage is from 9 V to 19 V for an input AC voltage from 10 V to 20 V. In the multi-mode rectifier, the input-range is wider compared to the original rectifier by 5 V. As a result, the rectified output DC voltage ranges from 7.5 V to 19 V for an input AC voltage from 5 V to 20 V. The proposed multi-mode rectifier is fabricated in a 0.35 µm CMOS process with an active area of around 2500 µm 1750 µm. When the magnitude of the input AC voltage is 10 V, the power conversion efficiency is about 94%.

  • Integrating Ontologies Using Ontology Learning Approach

    Lihua ZHAO  Ryutaro ICHISE  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E96-D No:1
      Page(s):
    40-50

    The Linking Open Data (LOD) cloud is a collection of linked Resource Description Framework (RDF) data with over 31 billion RDF triples. Accessing linked data is a challenging task because each data set in the LOD cloud has a specific ontology schema, and familiarity with the ontology schema used is required in order to query various linked data sets. However, manually checking each data set is time-consuming, especially when many data sets from various domains are used. This difficulty can be overcome without user interaction by using an automatic method that integrates different ontology schema. In this paper, we propose a Mid-Ontology learning approach that can automatically construct a simple ontology, linking related ontology predicates (class or property) in different data sets. Our Mid-Ontology learning approach consists of three main phases: data collection, predicate grouping, and Mid-Ontology construction. Experiments show that our Mid-Ontology learning approach successfully integrates diverse ontology schema with a high quality, and effectively retrieves related information with the constructed Mid-Ontology.

  • Channel Localization Mechanism for Wi-Fi Systems

    Sungho HWANG  Kyungjun KIM  

     
    LETTER-Communication Theory and Signals

      Vol:
    E96-A No:1
      Page(s):
    383-386

    This paper identifies a ripple effect problem (REP) that spreads interference to neighbors and proposes a novel channel localization mechanism to decrease the REP in a Wi-Fi system. The proposed mechanism has less blocking probability when compared to a random channel allocation mechanism and also has increased channel reusability. The proposed mechanism in simulation yields less channels BEm as the number of users and Tused increase.

  • Interoperable Spatial Information Model and Design Environment Based on ucR Technology

    Yukihiko SHIGESADA  Shinsuke KOBAYASHI  Noboru KOSHIZUKA  Ken SAKAMURA  

     
    PAPER-Information Network

      Vol:
    E96-D No:1
      Page(s):
    51-63

    Context awareness is one of the ultimate goals of ubiquitous computing, and spatial information plays an important role in building context awareness. In this paper, we propose a new interoperable spatial information model, which is based on ucode relation (ucR) and Place Identifier (PI), for realizing ubiquitous spatial infrastructure. In addition, we propose a design environment for spatial information database using our model. Our model is based on ucode and its relation. ucode is 128 bits number and the number itself has no meaning. Hence, it is difficult to manage the relation between ucodes without using a tool. Our design environment provides to describe connection between each ucode visually and is able to manipulate data using the target space map interactively. To evaluate the proposed model and environment, we designed three spaces using our tool. In addition, we developed a web application using our spatial model. From evaluation, we have been showed that our model is effective and our design environment is useful to develop our spatial information model.

  • Checkpoint Time Arrangement Rotation in Hybrid State Saving with a Limited Number of Periodical Checkpoints

    Ryo SUZUKI  Mamoru OHARA  Masayuki ARAI  Satoshi FUKUMOTO  Kazuhiko IWASAKI  

     
    LETTER-Dependable Computing

      Vol:
    E96-D No:1
      Page(s):
    141-145

    This paper discusses hybrid state saving for applications in which processes should create checkpoints at constant intervals and can hold a finite number of checkpoints. We propose a reclamation technique for checkpoint space, that provides effective checkpoint time arrangements for a rollback distance distribution. Numerical examples show that when we cannot use the optimal checkpoint interval due to the system requirements, the proposed technique can achieve lower expected overhead compared to the conventional technique without considering the form of the rollback distance distribution.

  • Complexity Reduction of Iterative MMSE-ML Signal Detection for MIMO SC-FDMA Systems

    Jaeyoung PARK  Jaekwon KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    344-347

    In this letter, we reduce the computational complexity of the conventional iterative MMSE-ML signal detection method for multiple input multiple output (MIMO) single carrier FDMA (SC-FDMA) systems, without compromising the error performance. Complexity analysis confirms the efficacy of the proposed modification.

  • User-Initiated Flow Mobility in the PMIPv6-Based Evolved Packet System

    Jiwon JANG  Seil JEON  Younghan KIM  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E96-B No:1
      Page(s):
    379-383

    Flow mobility is an emerging technology to support flexible network selection for an application flow and to spread concentrated load to less-overloaded Internet access. Network-based flow mobility (FMO) does not require a massive amount of software logic and system resources on the mobile node. Under this approach, there are two kinds of modes available: network-initiated and user-initiated. Network-initiated FMO decides the best access network suited for a specific flow, but the decisions depend on the operator's policy. Therefore, it has limitations in supporting the user's preference and private network selection. In the user-initiated mode, users can hand off specific flow so that information of both the current user's preference and the conditions of private network are reflected. User-initiated flow mobility method has not been what should be specified and how it can be supported with the protocol sequence for real deployment. This paper extends Internet Exchange Key v2 (IKEv2) and an Attach request message to support user-initiated FMO when a flow moves between 3G and Wi-Fi access. Through performance analysis, we confirm that user-initiated FMO is superior to network-initiated FMO in terms of signaling overhead and handover latency costs.

  • An Architecture for International Federation of Network Testbeds Open Access

    Robert RICCI  Gary WONG  Leigh STOLLER  Jonathon DUERIG  

     
    INVITED PAPER

      Vol:
    E96-B No:1
      Page(s):
    2-9

    Testbeds play a key role in the advancement of network science and the exploration of new network architectures. Because the scale and scope of any individual testbed is necessarily limited, federation is a useful technique for constructing testbeds that serve a wide range of experimenter needs. In a federated testbed, individual facilities maintain local autonomy while cooperating to provide a unified set of abstractions and interfaces to users. Forming an international federation is particularly challenging, because issues of trust, user access policy, and local laws and regulations are of greater concern that they are for federations within a single country. In this paper, we describe an architecture, based on the US National Science Foundation's GENI project, that is capable of supporting the needs of an international federation.

  • OpenTag: Tag-Based User-Driven In-Network Packet Processing on Commercial Network Devices

    Ryoji FURUHASHI  Akihiro NAKAO  

     
    PAPER

      Vol:
    E96-B No:1
      Page(s):
    31-39

    Network slicing for wide-area coordinated packet processing has attracted attentions for improving efficiency of handling network traffic. We have recently proposed a tag-based network slicing mechanism called OpenTag, and introduced the prototype implementation of the OpenTag redirector on an evaluation board. In this paper, we investigate the integration of the OpenTag redirector into a commercial network device. Our contributions are three-fold: (1) designing the architecture aiming OpenTag-capable intermediaries embedded on commercial network devices, (2) implementing a prototype of the embedded OpenTag redirector using the Advanced Mezzanine Card (AMC) which has an OCTEON network processor, (3) showing our implementation can tolerate high bandwidth environment.

  • Security of Hash-then-CBC Key Wrapping Revisited

    Yasushi OSAKI  Tetsu IWATA  

     
    PAPER-Symmetric Key Cryptography

      Vol:
    E96-A No:1
      Page(s):
    25-34

    Key wrapping schemes are used to encrypt data of high entropy, such as cryptographic keys. There are two known security definitions for key wrapping schemes. One captures the security against chosen plaintext attacks (called DAE-security), and the other captures known plaintext attacks (called AKW-security). In this paper, we revisit the security of Hash-then-CBC key wrapping schemes. In [17], Osaki and Iwata showed that the UCC-then-CBC key wrapping scheme, a key wrapping scheme that uses the UCC hash function and CBC mode, has provable AKW-security. In this paper, we show that the scheme achieves the stronger notion of DAE-security. We also show our proof in the variable input length setting, where the adversary is allowed making queries of varying lengths. Furthermore, we consider the scheme that incorporates the use of headers. To handle such a setting, we generalize the previous definition of the UCC hash function to the variable input length setting and to take the header as its input, and show an efficient construction that meets the definition.

  • Correlated Noise Reduction for Electromagnetic Analysis

    Hongying LIU  Xin JIN  Yukiyasu TSUNOO  Satoshi GOTO  

     
    PAPER-Implementation

      Vol:
    E96-A No:1
      Page(s):
    185-195

    Electromagnetic emissions leak confidential data of cryptographic devices. Electromagnetic Analysis (EMA) exploits such emission for cryptanalysis. The performance of EMA dramatically decreases when correlated noise, which is caused by the interference of clock network and exhibits strong correlation with encryption signal, is present in the acquired EM signal. In this paper, three techniques are proposed to reduce the correlated noise. Based on the observation that the clock signal has a high variance at the signal edges, the first technique: single-sample Singular Value Decomposition (SVD), extracts the clock signal with only one EM sample. The second technique: multi-sample SVD is capable of suppressing the clock signal with short sampling length. The third one: averaged subtraction is suitable for estimation of correlated noise when background samplings are included. Experiments on the EM signal during AES encryption on the FPGA and ASIC implementation demonstrate that the proposed techniques increase SNR as much as 22.94 dB, and the success rates of EMA show that the data-independent information is retained and the performance of EMA is improved.

  • A Theoretical Analysis of a Circular Microstrip Antenna in a Parallel-Plate Waveguide

    Narihiro NAKAMOTO  Tomohiro OKA  Shoichi KITAZAWA  Hiroshi BAN  Kiyoshi KOBAYASHI  

     
    PAPER-Antennas and Propagation

      Vol:
    E96-B No:1
      Page(s):
    173-181

    To better understand antenna properties in a narrow space such as in a densely-packed device, a circular microstrip antenna in a narrow parallel-plate waveguide is theoretically studied. An analytical expression is derived for the input impedance in a parallel-plate waveguide by using the cavity model with surface admittance on the side wall. The surface admittance is defined by the external magnetic field due to the equivalent magnetic current at the aperture and takes into account the contribution of the parallel plates to the antenna. The magnetic field external to the antenna, that is in the parallel-plate region, is determined by using a dyadic Green's function. The input impedance is then calculated by a basic definition based on the conservation of the complex power. An analytical expression which couples the resonant frequency and the surface susceptance is also formulated. Presented expressions are validated by comparison with experimental results.

  • Deterioration of Visibility of Scrolling Text Presented Nearby Image Moving in the Opposite Direction

    Ken KIHARA  Marina SEKI  Sakuichi OHTSUKA  

     
    PAPER-Vision

      Vol:
    E96-A No:1
      Page(s):
    340-344

    We investigate the visibility of scrolling text presented nearby a dynamically moving image. In two experiments, we evaluate the subjective speed and readability of scrolled fake addresses presented immediately above a moving grating pattern that covers a large part of the visual field. The drift speed and direction of the grating were controlled to reveal the visibility of the text. The results show that the scrolling addresses exhibited slower subjective speed and better readability when the grating moved in the same direction as the scrolling addresses. On the contrary, faster subjective speed and worse readability of the scrolling addresses were raised by the grating moving in the opposite direction. The strength of these effects was dependent on the speed difference between the scrolling addresses and the grating. These results suggest that the visibility of the scrolling text, assessed in terms of subjective speed and readability, strongly depends on nearby moving images.

  • Reduced Reconfigurable Logic Circuit Design Based on Double Gate CNTFETs Using Ambipolar Binary Decision Diagram

    Hiroshi NINOMIYA  Manabu KOBAYASHI  Shigeyoshi WATANABE  

     
    LETTER-Circuit Theory

      Vol:
    E96-A No:1
      Page(s):
    356-359

    This letter describes the design methodology for reduced reconfigurable logic circuits based on double gate carbon nanotube field effect transistors (DG-CNTFETs) with ambipolar propoerty. Ambipolar Binary Decision Diagram (Am-BDD) which represents the cornerstone for automatic pass transistor logic (PTL) synthesis flows of ambipolar devices was utilized to build DG-CNTFET based n-input reconfigurable cells in the conventional approach. The proposed method can reduce the number of ambipolar devices for 2-inputs reconfigurable cells, incorporating the simple Boolean algebra in the Am-BDD compared with the conventional approach. As a result, the static 2-inputs reconfigurable circuit with 16 logic functions can be synthesized by using 8 DG-CNTFETs although the previous design method needed 12 DG-CNTFETs for the same purpose.

  • Non-cooperative Limited Feedback Precoding with Subchannel Selection in MIMO Interference Channels

    Jong-Ho LEE  Yong-Hwa KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    352-355

    In this letter, we propose a non-cooperative limited feedback precoding and subchannel selection scheme for non-reciprocal multiple-input multiple-output (MIMO) interference channels. At each iteration of the proposed scheme, each user updates its precoder selection for each subchannel and then chooses the predetermined number of subchannels in a distributed and non-cooperative way. We present simulation results to verify the performance of the proposed scheme.

  • A Coordinated Scheduling Scheme for HSDPA

    Fei XU  Ling QIU  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E96-B No:1
      Page(s):
    335-339

    Due to universal frequency reuse, cell edge users in HSDPA suffer from serious inter-cell interference (ICI). In this letter we present a coordinated scheme for HSDPA which can mitigate ICI by interference avoidance in spatial domain. A system level simulation shows that our scheme can effectively improve the performance of the cell edge users.

  • Efficient Implementation of NTRU Cryptosystem Using Sliding Window Methods

    Mun-Kyu LEE  Jung Woo KIM  Jeong Eun SONG  Kunsoo PARK  

     
    PAPER-Implementation

      Vol:
    E96-A No:1
      Page(s):
    206-214

    NTRU is a public key cryptosystem based on hard problems over lattices. In this paper, we present efficient methods for convolution product computation which is a dominant operation of NTRU. The new methods are based on the observation that repeating patterns in coefficients of an NTRU polynomial can be used for the construction of look-up tables, which is a similar approach to the sliding window methods for exponentiation. We provide efficient convolution algorithms to implement this idea, and we make a comprehensive analysis of the complexity of the new algorithms. We also give software implementations over a Pentium IV CPU, a MICAz mote, and a CUDA-based GPGPU platform. According to our analyses and experimental results, the new algorithms speed up the NTRU encryption and decryption operations by up to 41%.

6341-6360hit(21534hit)