The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

6661-6680hit(21534hit)

  • Attacker Detection Based on Dissimilarity of Local Reports in Collaborative Spectrum Sensing

    Junnan YAO  Qihui WU  Jinlong WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:9
      Page(s):
    3024-3027

    In this letter, we propose a dissimilarity metric (DM) to measure the deviation of a cognitive radio from the network in terms of local sensing reports. Utilizing the probability mass function of the DM, we present a dissimilarity-based attacker detection algorithm to distinguish Byzantine attackers from honest users. The proposed algorithm is able to identify the attackers without a priori information of the attacking styles and is robust against both independent and dependent attacks.

  • An Adaptive Method to Acquire QoS Class Allocation Policy Based on Reinforcement Learning

    Nagao OGINO  Hajime NAKAMURA  

     
    PAPER-Network

      Vol:
    E95-B No:9
      Page(s):
    2828-2837

    For real-time services, such as VoIP and videoconferencing supplied through a multi-domain MPLS network, it is vital to guarantee end-to-end QoS of the inter-domain paths. Thus, it is important to allocate an appropriate QoS class to the inter-domain paths in each transit domain. Because each domain has its own policy for QoS class allocation, each domain must then allocate an appropriate QoS class adaptively based on the estimation of the QoS class allocation policies adopted in other domains. This paper proposes an adaptive method for acquiring a QoS class allocation policy through the use of reinforcement learning. This method learns the appropriate policy through experience in the actual QoS class allocation process. Thus, the method can adapt to a complex environment where the arrival of inter-domain path requests does not follow a simple Poisson process and where the various QoS class allocation policies are adopted in other domains. The proposed method updates the allocation policy whenever a QoS class is actually allocated to an inter-domain path. Moreover, some of the allocation policies often utilized in the real operational environment can be updated and refined more frequently. For these reasons, the proposed method is designed to adapt rapidly to variances in the surrounding environment. Simulation results verify that the proposed method can quickly adapt to variations in the arrival process of inter-domain path requests and the QoS class allocation policies in other domains.

  • Numerical Analysis of Monopole Multi-Sector Antenna with Dielectric Cylinder

    Yuto SUZUKI  Naoki HONMA  

     
    LETTER-Antennas and Propagation

      Vol:
    E95-B No:9
      Page(s):
    2991-2994

    This letter proposes a monopole multi-sector antenna with dielectric cylinder, and shows some results of simulations that examined the antenna characteristics. The dependency of radiation characteristics on relative permittivity εr shows the lens effect with increase of εr. Furthermore, the characteristics of the proposed antenna are improved by optimizing the termination conditions at the quiescent antennas. The backlobe level is lower than -10 dB. Also, the vertical HPBW and the conical HPBW are around 70.5° and 63.4°, respectively. The optimization improved the actual gain by 2 dB. It is found that the diameter of the proposed antenna is 1/3rd that of the conventional one.

  • An Improved Large Frequency Offset Estimator Using Interpolation of Expanded Periodogram

    Seunghyun NAM  Jong-Min PARK  Heewook KIM  Tae Chul HONG  Kunseok KANG  Bon Jun KU  Do Seob AHN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:9
      Page(s):
    3007-3010

    The periodogram scheme is a versatile method for large frequency offset estimation which requires preambles, in general, and only a few reference signals. However, the drawback of the conventional scheme is its inaccuracy in detecting the integer part of frequency offset which dominates the accuracy of frequency offset estimation. In order to increase the accuracy of the estimation, we directly interpolate a coefficient of the periodogram. The conventional periodogram and proposed schemes are compared in terms of the mean square error performance in the long term evolution system. The performance of the proposed method is compared with the conventional one and the simulation results indicate the better performance of the proposed one.

  • Key Index-Based Routing for Filtering False Event Reports in Wireless Sensor Networks

    Soo Young MOON  Tae Ho CHO  

     
    PAPER-Network

      Vol:
    E95-B No:9
      Page(s):
    2807-2814

    The wireless sensor network (WSN) is a technology that senses environmental information and provides appropriate services to users. There are diverse application areas for WSNs such as disaster prevention, military, and facility management. Despite the many prospective applications, WSN s are vulnerable to various malicious attacks. In false report attacks, a malicious attacker steals a few sensor nodes and obtains security materials such as authentication keys from the nodes. The attacker then injects false event reports to the network through the captured nodes. The injected false reports confuse users or deplete the limited energy of the nodes in the network. Many filtering schemes have been proposed to detect and remove false reports. In the statistical en route filtering (SEF) scheme, each node shares authentication keys selected from a global key pool. Due to the limited memory, each node is able to store only a small portion of the global key pool. Therefore, the routing paths of the event reports significantly affect the filtering (i.e., detecting) probability of false reports. In this paper, we propose a method to determine the routing paths of event reports both hop by hop and on demand at each node. In this method, each node chooses the next node on the path from the event source to the sink node based on the key indexes of its neighbor nodes. Experiments show that the proposed method is far more energy efficient than the SEF when the false traffic ratio (FTR) is ≥ 50% in the network.

  • Cooperation-Aware Topology Control for Wireless Ad Hoc Networks with Opportunistic Interference Cancellation

    Xin AO  F. Richard YU  Shengming JIANG  Quansheng GUAN  Gang WEI  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E95-B No:9
      Page(s):
    3047-3051

    In this letter, we propose a Cooperation-aware topology control scheme with Opportunistic Interference Cancellation (COIC) to improve network capacity in wireless ad hoc networks by jointly considering both upper layer network capacity and physical layer cooperative communications with interference cancellation. We show that the benefits brought by cooperative communications are opportunistic and rely on network structures and channel conditions. Such opportunistic advantages have significant impacts on network capacity, and our proposed COIC can effectively capture these opportunities to substantially improve network capacity.

  • Swift Communication Range Recognition Method for Quick and Accurate Position Estimation of Passive RFID Tags

    Manato FUJIMOTO  Tomotaka WADA  Atsuki INADA  Kouichi MUTSUURA  Hiromi OKADA  

     
    PAPER-Measurement Technology

      Vol:
    E95-A No:9
      Page(s):
    1596-1605

    Radio frequency identification (RFID) system has gained attention as a new identification source that achieves a ubiquitous environment. Each RFID tag has a unique ID and is attached to an object. A user reads the unique ID of an RFID tag by using RFID readers and obtains the information on the object. One of the important technologies that use the RFID systems is the position estimation of RFID tags. Position estimation means estimating the location of the object with the RFID tag. Acquiring the location information of the RFID tag can be very useful. If a user can know the position of the RFID tag, the position estimation can be applied to a navigation system for walkers. In this paper, we propose a new position estimation method named Swift Communication Range Recognition (S-CRR) as an extended improvement on previous CRR that shortens the estimation delay. In this method, the position of an RFID tag is estimated by selecting the communication area model that corresponds to its boundary angles. We evaluated its performance by experiments and simulations of the RFID system. As the results, we found that S-CRR can estimate the position of an RFID tag comparatively accurately and quickly.

  • Voice-Activity Detection Using Long-Term Sub-Band Entropy Measure

    Kun-Ching WANG  

     
    LETTER-Engineering Acoustics

      Vol:
    E95-A No:9
      Page(s):
    1606-1609

    A novel long-term sub-band entropy (LT-SubEntropy) measure, which uses improved long-term spectral analysis and sub-band entropy, is proposed for voice activity detection (VAD). Based on the measure, we can accurately exploit the inherent nature of the formant structure on speech spectrogram (the well-known as voiceprint). Results show that the proposed VAD is superior to existing standard VAD methods at low SNR levels, especially at variable-level noise.

  • Connection Setup Signaling Scheme with Flooding-Based Path Searching for Diverse-Metric Network

    Ko KIKUTA  Daisuke ISHII  Satoru OKAMOTO  Eiji OKI  Naoaki YAMANAKA  

     
    PAPER-Network

      Vol:
    E95-B No:8
      Page(s):
    2600-2609

    Connection setup on various computer networks is now achieved by GMPLS. This technology is based on the source-routing approach, which requires the source node to store metric information of the entire network prior to computing a route. Thus all metric information must be distributed to all network nodes and kept up-to-date. However, as metric information become more diverse and generalized, it is hard to update all information due to the huge update overhead. Emerging network services and applications require the network to support diverse metrics for achieving various communication qualities. Increasing the number of metrics supported by the network causes excessive processing of metric update messages. To reduce the number of metric update messages, another scheme is required. This paper proposes a connection setup scheme that uses flooding-based signaling rather than the distribution of metric information. The proposed scheme requires only flooding of signaling messages with requested metric information, no routing protocol is required. Evaluations confirm that the proposed scheme achieves connection establishment without excessive overhead. Our analysis shows that the proposed scheme greatly reduces the number of control messages compared to the conventional scheme, while their blocking probabilities are comparable.

  • Suppression of Current Collapse of High-Voltage AlGaN/GaN HFETs on Si Substrates by Utilizing a Graded Field-Plate Structure

    Tadayoshi DEGUCHI  Hideshi TOMITA  Atsushi KAMADA  Manabu ARAI  Kimiyoshi YAMASAKI  Takashi EGAWA  

     
    PAPER-GaN-based Devices

      Vol:
    E95-C No:8
      Page(s):
    1343-1347

    Current collapse of AlGaN/GaN heterostructure field-effect transistors (HFETs) formed on qualified epitaxial layers on Si substrates was successfully suppressed using graded field-plate (FP) structures. To improve the reproducibility of the FP structure manufacturing process, a simple process for linearly graded SiO2 profile formation was developed. An HFET with a graded FP structure exhibited a significant decrease in an on-resistance increase ratio of 1.16 even after application of a drain bias of 600 V.

  • Lightweight and Distributed Connectivity-Based Clustering Derived from Schelling's Model

    Sho TSUGAWA  Hiroyuki OHSAKI  Makoto IMASE  

     
    PAPER

      Vol:
    E95-B No:8
      Page(s):
    2549-2557

    In the literature, two connectivity-based distributed clustering schemes exist: CDC (Connectivity-based Distributed node Clustering scheme) and SDC (SCM-based Distributed Clustering). While CDC and SDC have mechanisms for maintaining clusters against nodes joining and leaving, neither method assumes that frequent changes occur in the network topology. In this paper, we propose a lightweight distributed clustering method that we term SBDC (Schelling-Based Distributed Clustering) since this scheme is derived from Schelling's model – a popular segregation model in sociology. We evaluate the effectiveness of the proposed SBDC in an environment where frequent changes arise in the network topology. Our simulation results show that SBDC outperforms CDC and SDC under frequent changes in network topology caused by high node mobility.

  • Beam Tilting Slot Antenna Elements with a Forced Resonance by Reactance Loading

    Ki-Chai KIM  Kazuhiro HIRASAWA  

     
    PAPER-Antennas and Propagation

      Vol:
    E95-B No:8
      Page(s):
    2610-2618

    This paper presents the basic characteristics of a beam tilting slot antenna element whose forced resonance is realized by reactance loading; its structure complements that of a dipole antenna element. The radiation pattern is tilted using a properly determined driving point position; a single loading reactance is used to obtain the forced resonance without great changes in the tilt angle. Numerical results show that the reactance element needs to be loaded near the driving point in order to obtain the forced resonance of the antenna and the minimum changes in the beam tilt angle at the same time. When the proposed forced resonant beam tilting slot antenna with a 0.8 λ length is driven at -0.2 λ from the center, the main beam tilt angle of 57.7 degrees and the highest power gain of 3.8 dB are obtained. This slot element has a broad bandwidth, unlike the complementary dipole element.

  • Heating and Burning of Optical Fibers and Cables by Light Scattered from Bubble Train Formed by Optical Fiber Fuse

    Makoto YAMADA  Akisumi TOMOE  Takahiro KINOSHITA  Osanori KOYAMA  Yutaka KATUYAMA  Takashi SHIBUYA  

     
    LETTER-Optical Fiber for Communications

      Vol:
    E95-B No:8
      Page(s):
    2638-2641

    We investigate in detail the scattering properties and heating characteristics in various commercially available optical fibers and fiber cables when a bubble train forms in the middle of the fiber as a result of the fiber fuse phenomenon that occurs when a high power signal is launched into the fiber. We found theoretically and experimentally that almost all the optical light is scattered at the top of the bubble train. The scattered light heats UV coated fiber, nylon jacketed silica fiber, fire-retardant jacketed fiber (PVC or FRPE jacketed fiber) and fire-retardant fiber cable (PVC or FRPE fiber cable), to around 100, over 200 and over 600, respectively, and finally the fiber burns and is destroyed at a launched optical power of 3 W. Furthermore, it is confirmed that the combustion does not spread when we use fire retardant jacketed fibers.

  • Multipath Routing Algorithm Applied to Cloud Data Center Services

    Hiroshi MATSUURA  

     
    PAPER

      Vol:
    E95-B No:8
      Page(s):
    2558-2567

    Cloud data center services, such as video on demand (VoD) and sensor data monitoring, have become popular. The quality of service (QoS) between a client and a cloud data center should be assured by satisfying each service's required bandwidth and delay. Multipath traffic engineering is effective for dispersing traffic flows on a network; therefore, an improved k-shortest paths first (k-SPF) algorithm is applied to these cloud data center services to satisfy their required QoS. k-SPF can create a set of multipaths between a cloud data center and all edge routers, to which client nodes are connected, within one algorithm process. Thus, k-SPF can produce k shortest simple paths between a cloud data center and every access router faster than with conventional Yen's algorithm. By using a parameter in the algorithm, k-SPF can also impartially use links on a network and shorten the average hop-count and number of necessary MPLS labels for multiple paths that comprise a multipath.

  • Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function

    Dukjae MOON  Deukjo HONG  Daesung KWON  Seokhie HONG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E95-A No:8
      Page(s):
    1379-1389

    We assume that the domain extender is the Merkle-Damgård (MD) scheme and he message is padded by a ‘1', and minimum number of ‘0' s, followed by a fixed size length information so that the length of padded message is multiple of block length. Under this assumption, we analyze securities of the hash mode when the compression function follows the Davies-Meyer (DM) scheme and the underlying block cipher is one of the plain Feistel or Misty scheme or the generalized Feistel or Misty schemes with Substitution-Permutation (SP) round function. We do this work based on Meet-in-the-Middle (MitM) preimage attack techniques, and develop several useful initial structures.

  • Template Matching Method Based on Visual Feature Constraint and Structure Constraint

    Zhu LI  Kojiro TOMOTSUNE  Yoichi TOMIOKA  Hitoshi KITAZAWA  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E95-D No:8
      Page(s):
    2105-2115

    Template matching for image sequences captured with a moving camera is very important for several applications such as Robot Vision, SLAM, ITS, and video surveillance systems. However, it is difficult to realize accurate template matching using only visual feature information such as HSV histograms, edge histograms, HOG histograms, and SIFT features, because it is affected by several phenomena such as illumination change, viewpoint change, size change, and noise. In order to realize robust tracking, structure information such as the relative position of each part of the object should be considered. In this paper, we propose a method that considers both visual feature information and structure information. Experiments show that the proposed method realizes robust tracking and determine the relationships between object parts in the scenes and those in the template.

  • Superior DC and RF Performance of AlGaN-Channel HEMT at High Temperatures

    Maiko HATANO  Norimasa YAFUNE  Hirokuni TOKUDA  Yoshiyuki YAMAMOTO  Shin HASHIMOTO  Katsushi AKITA  Masaaki KUZUHARA  

     
    PAPER-GaN-based Devices

      Vol:
    E95-C No:8
      Page(s):
    1332-1336

    This paper describes high-temperature electron transport properties of AlGaN-channel HEMT fabricated on a free-standing AlN substrate, estimated at temperatures between 25 and 300. The AlGaN-channel HEMT exhibited significantly reduced temperature dependence in DC and RF device characteristics, as compared to those for the conventional AlGaN/GaN HEMT, resulting in larger values in both saturated drain current and current gain cutoff frequency at 300. Delay time analyses suggested that the temperature dependence of the AlGaN-channel HEMT was primarily dominated by the effective electron velocity in the AlGaN channel. These results indicate that an AlGaN-channel HEMT fabricated on an AlN substrate is promising for high-performance device applications at high temperatures.

  • Position-Based k-Disjoint Path Routing for Reliable Data Gathering in Wireless Sensor Networks

    Jang Woon BAEK  Young Jin NAM  Dae-Wha SEO  

     
    LETTER-Network

      Vol:
    E95-B No:8
      Page(s):
    2658-2660

    This paper proposes a novel routing algorithm that constructs position-based k-disjoint paths to realize greater resiliency to patterned failure. The proposed algorithm constructs k-disjoint paths that are spatially distributed by using the hop-count based positioning system. Simulation results reveal that the proposed algorithm is more resilient to patterned failure than other routing algorithms, while it has low power consumption and small delay.

  • A Study of Stereoscopic Image Quality Assessment Model Corresponding to Disparate Quality of Left/Right Image for JPEG Coding

    Masaharu SATO  Yuukou HORITA  

     
    LETTER-Quality Metrics

      Vol:
    E95-A No:8
      Page(s):
    1264-1269

    Our research is focused on examining a stereoscopic quality assessment model for stereoscopic images with disparate quality in left and right images for glasses-free stereo vision. In this paper, we examine the objective assessment model of 3-D images, considering the difference in image quality between each view-point generated by the disparity-compensated coding. A overall stereoscopic image quality can be estimated by using only predicted values of left and right 2-D image qualities based on the MPEG-7 descriptor information without using any disparity information. As a result, the stereoscopic still image quality is assessed with high prediction accuracy with correlation coefficient=0.98 and average error=0.17.

  • Convergence Analysis of TAPPM Decoders for Deep Space Optical Channels

    Nikhil JOSHI  Adrish BANERJEE  Jeong Woo LEE  

     
    LETTER-Communication Theory and Signals

      Vol:
    E95-A No:8
      Page(s):
    1435-1438

    The convergence behavior of turbo APPM (TAPPM) decoding is analyzed by using a three-dimensional extrinsic information transfer (EXIT) chart and the decoding trajectory. The signal-to-noise ratio (SNR) threshold, below which iterative decoding fails to converge, is predicted by using the 3-D EXIT chart analysis. Bit error rate performances of TAPPM schemes validate the EXIT-chart-based SNR threshold predictions. Outer constituent codes of TAPPM are chosen to show the lowest SNR threshold with the aid of EXIT chart analysis.

6661-6680hit(21534hit)