The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

7601-7620hit(21534hit)

  • A Network-Based Localized Mobility Approach for Locator/ID Separation Protocol

    Ping DONG  Jia CHEN  Hongke ZHANG  

     
    PAPER

      Vol:
    E94-B No:6
      Page(s):
    1536-1545

    Locator/ID Separation Protocol (LISP) is an efficient proposal for solving the severe routing scalability problems existing in the current IPv4-based Internet and the future IPv6-based Internet. However, the basic LISP architecture does not specify how to support mobility in detail. As mobility is a fundamental issue faced by the future Internet, LISP mobility architecture (LISP-MN) was proposed recently to extend LISP to support mobility. Nevertheless, LISP-MN is a host-based mobility approach which requires software changes in end systems. To some extent, such a design breaks the primary design principles of LISP, which is a network-based protocol and requires no modification to the hosts. In addition, LISP-MN faces the same inherent problems as other host-based approaches (e.g., MIPv4, MIPv6), such as handover latency, packet loss, and signalling overhead. To solve the above problems, this paper proposes MobileID, which is a network-based localized mobility approach for LISP. In our design, a mobile node is not aware of its mobility and does not participate in handover signalling. Instead, the network takes the responsibility for managing mobility on behalf of the mobile node. We present a general overview of MobileID architecture, and introduce the detailed protocol operations in terms of the basic MobileID handover process and the route optimization procedures. Furthermore, we describe a MobileID analytic model, and compare MobileID handover performance with three representative mobility solutions, i.e., LISP-MN, MIPv6 and PMIPv6. Numerical results show the superior performance of MobileID. The handover latency of MobileID is much lower than those of LISP-MN and MIPv6, and it becomes lower than that of PMIPv6 in case of a long wireless link delay.

  • A New Formalism of the Sliding Window Recursive Least Squares Algorithm and Its Fast Version

    Kiyoshi NISHIYAMA  

     
    PAPER-Digital Signal Processing

      Vol:
    E94-A No:6
      Page(s):
    1394-1400

    A new compact form of the sliding window recursive least squares (SWRLS) algorithm, the I-SWRLS algorithm, is derived using an indefinite matrix. The resultant algorithm has a form similar to that of the traditional recursive least squares (RLS) algorithm, and is more computationally efficient than the conventional SWRLS algorithm including two Riccati equations. Furthermore, a computationally reduced version of the I-SWRLS algorithm is developed utilizing a shift property of the correlation matrix of input data. The resulting fast algorithm reduces the computational complexity from O(N2) to O(N) per iteration when the filter length (tap number) is N, but retains the same tracking performance as the original algorithm. This fast algorithm is much easier to implement than the existing SWC FTF algorithms.

  • How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model

    Yusuke SAKAI  Goichiro HANAOKA  Kaoru KUROSAWA  Kazuo OHTA  

     
    PAPER

      Vol:
    E94-A No:6
      Page(s):
    1293-1305

    This paper shows a simple methodology for shortening a ciphertext of reproducible key encapsulation mechanisms. Specifically, it transforms a key encapsulation mechanism having OW-CCCA security and reproducibility into that of IND-CCA secure in the random oracle model whose ciphertext is shorter. Various existing chosen-ciphertext secure key encapsulation mechanisms (in the standard model) are reproducible, and thus their ciphertext can be shortened by the proposed transformation. The transformed scheme requires only one additional hashing for encryption. This property enables us to implement both the original scheme and the transformed scheme into a single chip simultaneously with small gate-size overhead. Using this chip, a sender can flexibly switch schemes to encrypt a message in a message-by-message manner. Such a use of schemes is also analyzed.

  • Digitally-Controlled Polarization-Forming Transmitting Antenna for Mobile Satellite Communication Systems

    Yoshinori SUZUKI  Kiyoshi KOBAYASHI  

     
    PAPER-Satellite Communications

      Vol:
    E94-B No:6
      Page(s):
    1707-1715

    This paper presents a novel electrical polarization forming antenna for mobile satellite communication systems using linear polarization. To electrically form the desired polarization, it is necessary to excite the two orthogonal polarization antenna planes with appropriate weights. The proposed antenna uses digitally-based polarization and calibration functions to characterize the two RF paths. The calibration techniques used are critical to accurately forming the desired polarization. Proposed calibration techniques are very simple; the feedback signal consists of just amplitude levels. The proposals are validated by polarization forming measurements conducted on a fabricated antenna.

  • Introduction of the Parameter “Approach Ratio” for the Improvement of Higher Delivery Rate with Suppressing Network Resource Consumption in Delay Tolerant Network

    Masato HAYASHI  Susumu MATSUI  Naoki WAKAMIYA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E94-B No:6
      Page(s):
    1669-1679

    The delay/disruption tolerant network (DTN) has been researched actively in the last years because of its high applicability to ubiquitous network services such as sensor networks and intelligent transport system (ITS) networks. An efficient data forwarding method for those network services is one of the key components in DTN due to the limitation of wireless network resources. This paper proposes a new DTN scheme for vehicle network systems by introducing the parameter, “approach ratio”, which represents node movement history. The proposal utilizes passive copy strategy, where nodes within one hop area of packet forwarders receive, copy and store packets (namely, passive copies) for future forwarding, in order to obtain higher delivery rate and lower delivery delay whilst suppressing the network resource consumption. Depending on its approach ratio, a node with passive copy decides whether it forwards the passive copy or not by referring to the approach ratio threshold. The approach ratio allows our proposal to adjust the property of both single-copy type scheme, that can lower network resource consumption, and multi-copy type scheme, that can enhance the performance of delivery rate and delay time. In simulation evaluation, the proposal is compared with three typical existing schemes with respect to network consumption, delivery rate and delivery delay. Our proposal shows the superior performance regarding the targeted purpose. It is shown that the approach ratio plays the significant role to obtain the higher delivery rate and lower delay time, while keeping network resource consumption lower.

  • Coexistence of WiFi and WiMAX Systems Based on Coexistence Zone within WiMAX Frame Structure and Modified Power Saving Mode of WiFi System

    Jongwoo KIM  Suwon PARK  Seung Hyong RHEE  Yong-Hoon CHOI  Ho Young HWANG  Young-uk CHUNG  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E94-B No:6
      Page(s):
    1781-1784

    Various co-sited wireless communication systems may share the same frequency band. This causes mutual interference between the wireless communication systems, and degrades the performance of each wireless communication system. In this paper, we analyze the effect of mutual interference between WiFi and WiMAX systems sharing the same frequency band. We propose novel methods based on a proposed coexistence zone within the WiMAX frame structure and a modified power saving mode of the WiFi system to solve the problem. We evaluate the performance of the proposed methods by computer simulation.

  • 0.6 V Voltage Shifter and Clocked Comparator for Sampling Correlation-Based Impulse Radio UWB Receiver

    Lechang LIU  Takayasu SAKURAI  Makoto TAKAMIYA  

     
    PAPER

      Vol:
    E94-C No:6
      Page(s):
    985-991

    A 0.6-V voltage shifter and a 0.6-V clocked comparator are presented for sampling correlation-based impulse radio UWB receiver. The voltage shifter is used for a novel split swing level scheme-based CMOS transmission gate which can reduce the power consumption by four times. Compared to the conventional voltage shifter, the proposed voltage shifter can reduce the required capacitance area by half and eliminate the non-overlapping complementary clock generator. The proposed 0.6-V clocked comparator can operate at 100-MHz clock with the voltage shifter. To reduce the power consumption of the conventional continuous-time comparator based synchronization control unit, a novel clocked-comparator based control unit is presented, thereby achieving the lowest energy consumption of 3.9 pJ/bit in the correlation-based UWB receiver with the 0.5 ns timing step for data synchronization.

  • A Differential Input/Output Linear MOS Transconductor

    Pravit TONGPOON  Fujihiko MATSUMOTO  Takeshi OHBUCHI  Hitoshi TAKEUCHI  

     
    PAPER

      Vol:
    E94-C No:6
      Page(s):
    1032-1041

    In this paper, a differential input/output linear MOS transconductor using an adaptively biasing technique is proposed. The proposed transconductor based on a differential pair is linearized by employing an adaptively biasing circuit. The linear characteristic of the individual differential output currents are obtained by introducing the adaptively biased currents to terminate the differential output terminals. Using the proposed technique, the common-mode rejection ration (CMRR) becomes high. Simulation results show that the proposed technique is effective for improvement of the linearity and other performances.

  • An Electrically Adjustable 3-Terminal Regulator for Post-Fabrication Level-Trimming with a Reliable 1-Wire Serial I/O

    Hiroyuki MORIMOTO  Hiroki KOIKE  Kazuyuki NAKAMURA  

     
    PAPER

      Vol:
    E94-C No:6
      Page(s):
    945-952

    This paper describes a new technique for the design of 3-terminal regulators in which the output voltage level can be adjusted without additional terminals or extra off-chip components. This circuit restricts the increase in the number of terminal pins by using a pin as both a voltage supply output and a voltage setup input. The voltage setup information is introduced using a serial control signal from outside the chip. Using the intermediate voltage level between the supply voltage and the regulator output, the adjustment data in the internal nonvolatile memory are safely updated without noise disturbance. To input the setup information into the chip in a stable manner, we developed a new 1-wire serial interface which combines key pattern matching and burst signal detection. To ensure high reliability, we suggested a quantitative method for evaluating the influence of noise in our new interface using a simple model with superimposed random noise. Circuits additional to those for a conventional 3-terminal regulator, include a 1-wire serial communication circuit, a low-capacity non-volatile memory, and a digital to analog (D/A) converter. A test chip was developed using 0.35 µm standard CMOS process, and there was almost no overhead to the conventional 3-terminal regulator in both chip area and power dissipation. In an on-board test with the test chip, we confirmed successful output voltage adjustment from 1.0 V to 2.7 V with approximately 6.5 mV precision.

  • A Head-Local-Exposure System for Rats Using a Figure-8 Loop Antenna in the 2 GHz Band

    Hiroki KAWAI  Kanako WAKE  Takuji ARIMA  Soichi WATANABE  

     
    LETTER-Electromagnetic Compatibility(EMC)

      Vol:
    E94-B No:6
      Page(s):
    1757-1760

    This paper proposes a head-local-exposure system using a figure-8 loop antenna for 2-GHz band operation. This system allows us to observe biological effects through microcirculation of the rat brain simultaneously with exposure through a cranial window, i.e., the window made by transparent glass and implanted on the surface of the rat brain. The specific absorption rate (SAR) in a rat exposed to microwaves due to the new exposure system is estimated numerically and experimentally. The ratio of averaged SAR between the target area, which is the brain's surface just under the cranial window, and the whole body is about 59 for the 8-week rat model and 13 for the 2-week rat model. This antenna achieves local exposure for the rat brain for 2-GHz band operation.

  • A 2 Gb/s 1.8 pJ/bit Differential BPSK UWB-IR Transmitter Using 65 nm CMOS Technology

    Mohiuddin HAFIZ  Shinichi KUBOTA  Nobuo SASAKI  Kentaro KIMOTO  Takamaro KIKKAWA  

     
    PAPER

      Vol:
    E94-C No:6
      Page(s):
    977-984

    A differential BPSK transmitter for ultra-wideband impulse-radio communication has been presented in this paper. The transmitter, developed in a 65 nm CMOS process,is simple in design and occupies a core area of 0.0017 mm2. The differential Gaussian monocycle pulses (GMP) are generated using some logic blocks and delay elements. The generated GMP, having a center frequency above 5 GHz, meets the FCC regulations. Measured results show that the transmitter consumes 1.8 pJ/bit to transmit BPSK modulated GMP at a data rate of 2 Gb/s. The interface circuitries eliminate the need for external networks for chip to antenna matching. Using an off-chip differential bow-tie antenna, data can easily be transmitted up to a distance of 10 cm which made it suitable for low power far field non-coherent applications.

  • Network Design Methods for Minimizing Number of Links Added to a Network to Alleviate Performance Degradation Following a Link Failure

    Nozomu KATAYAMA  Takeshi FUJIMURA  Hiroyoshi MIWA  Noriaki KAMIYAMA  Haruhisa HASEGAWA  Hideaki YOSHINO  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E94-B No:6
      Page(s):
    1630-1639

    When a link or node fails in a network, the affected flows are automatically rerouted. This increases the hop counts of the flows, which can drastically degrade network performance. Keeping the hop lengths as stable as possible, i.e., minimizing the difference in hop length between the original flow and the rerouted flow is important for network reliability. Therefore, network service providers need a method for designing networks that stabilizes the flow hop length and maintains connectivity during a link or node failure with limited investment cost. First, we formulate the network design problem used for determining the set of links to be added that satisfies the required constraints on flow hop length stability, connectivity, and node degree. Next, we prove that this problem is NP-complete and present two approximation algorithms for the optimization problem so as to minimize the number of links added. Evaluation of the performance of these algorithms by using 39 backbone networks of commercial ISPs and networks generated by two well-known models showed that the proposed algorithms provide effective solutions in sufficiently short computation time.

  • A Handover Decision Strategy with a Novel Modified Load-Based Adaptive Hysteresis Adjustment in 3GPP LTE System

    Doo-Won LEE  Gye-Tae GIL  Dong-Hoi KIM  

     
    PAPER

      Vol:
    E94-D No:6
      Page(s):
    1130-1136

    This paper introduces a hard handover strategy with a novel adaptive hysteresis adjustment that is needed to reduce handover drop rate in 3GPP long term evolution (LTE). First of all, we adopt a Hybrid handover scheme considering both the received signal strength (RSS) and the load information of the adjacent evolved Node Bs (eNBs) as a factor for deciding the target eNB. The Hybrid scheme causes the load status between the adjacent eNBs to be largely similar. Then, we propose a modified load-based adaptive hysteresis scheme to find a suitable handover hysteresis value utilizing the feature of the small load difference between the target and serving eNBs obtained from the result of the Hybrid scheme. As a result, through the proposed modified load-based adaptive hysteresis scheme, the best target cell is very well selected according to the dynamically changing communication environments. The simulation results show that the proposed scheme provides good performance in terms of handover drop rate.

  • Numerical Analysis on MIMO Performance of the Modulated Scattering Antenna Array in Indoor Environment

    Lin WANG  Qiang CHEN  Qiaowei YUAN  Kunio SAWAYA  

     
    LETTER-Antennas and Propagation

      Vol:
    E94-B No:6
      Page(s):
    1752-1756

    The multiple-input multiple-output (MIMO) performance of the modulated scattering antenna array (MSAA) is analyzed numerically for the first time in indoor environment based on an approach to hybridization of the Volterra series method and method of moments (MoM) in this letter. Mutual coupling effect between the Modulated scattering element (MSE) and the normal antenna element is also considered in this analysis. It is found that MIMO performance of the MSAA is improved with reducing the array spacing of the MSAA in 4 different indoor receiving areas. At the same time, the simulated results of the MSAA are compared with those of the dipole antenna array at the same condition.

  • Real-Time Freight Train Driver Rescheduling during Disruption

    Keisuke SATO  Naoto FUKUMURA  

     
    PAPER

      Vol:
    E94-A No:6
      Page(s):
    1222-1229

    Railway operators adjust timetables, and accordingly reschedule rolling stock circulation and crew duties, when the train operations are disrupted by accidents or adverse weather conditions. This paper discusses the problem of rescheduling driver assignment to freight trains after timetable adjustment has been completed. We construct a network from the disrupted situation, and model the problem as an integer programming problem with set-covering constraints combined with set-partitioning constraints. The integer program is solved by column generation in which we reduce the column generation subproblem to a shortest path problem and such paths by utilizing data parallelism. Numerical experiments using a real timetable, driver scheduling plan and major disruption data in the highest-frequency freight train operation area in Japan reveal that our method provides a quality driver rescheduling solution within 25 seconds.

  • Stereo Image Retargeting with Shift-Map

    Ryo NAKASHIMA  Kei UTSUGI  Keita TAKAHASHI  Takeshi NAEMURA  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E94-D No:6
      Page(s):
    1345-1348

    We propose a new stereo image retargeting method based on the framework of shift-map image editing. Retargeting is the process of changing the image size according to the target display while preserving as much of the richness of the image as possible, and is often applied to monocular images and videos. Retargeting stereo images poses a new challenge because pixel correspondences between the stereo pair should be preserved to keep the scene's structure. The main contribution of this paper is integrating a stereo correspondence constraint into the retargeting process. Among several retargeting methods, we adopt shift-map image editing because this framework can be extended naturally to stereo images, as we show in this paper. We confirmed the effectiveness of our method through experiments.

  • Probabilistic Analysis on the Optimal Combination of Trial Division and Probabilistic Primality Tests for Safe Prime Generation

    Heejin PARK  Dong Kyue KIM  

     
    PAPER-Information Network

      Vol:
    E94-D No:6
      Page(s):
    1210-1215

    A safe prime p is a prime such that (p-1)/2 is also a prime. A primality test or a safe primality test is normally a combination of trial division and a probabilistic primality test. Since the number of small odd primes used in the trial division affects the performance of the combination, researchers have studied how to obtain the optimal number of small odd primes to be used in the trial division and the expected running time of the combination for primality tests. However, in the case of safe primality tests, the analysis of the combination is more difficult, and thus no such results have been given. In this paper, we present the first probabilistic analysis on the expected running time and the optimal number of small odd primes to be used in the trial division for optimizing the tests. Experimental results show that our probabilistic analysis estimates the behavior of the safe primality tests very well.

  • Secure Broadcast System with Simultaneous Individual Messaging

    Arisa FUJII  Go OHTAKE  Goichiro HANAOKA  Nuttapong ATTRAPADUNG  Hajime WATANABE  Kazuto OGAWA  Hideki IMAI  

     
    PAPER

      Vol:
    E94-A No:6
      Page(s):
    1328-1337

    Broadcasters transmit TV programs and often need to transmit an individual message, e.g. an individual contract, to each user. The programs have to be encrypted in order to protect the copyright and the individual messages have to be encrypted to preserve the privacy of users. For these purposes, broadcasters transmit not only encrypted content but also encrypted personalized messages to individual users. Current broadcasting services employ an inefficient encryption scheme based on a symmetric key. Recently, several broadcast encryption schemes using a public key have been proposed in which the broadcaster encrypts a message for some subset S of users with a public key and any user in S can decrypt the broadcast with his/her private key. However, it is difficult to encrypt a personalized message and transmit it to every user efficiently. In this paper, we propose a broadcast encryption scheme that has a personalized message encryption function. We show that our scheme is efficient in terms of the ciphertext size.

  • Neary: Conversational Field Detection Based on Situated Sound Similarity

    Toshiya NAKAKURA  Yasuyuki SUMI  Toyoaki NISHIDA  

     
    PAPER

      Vol:
    E94-D No:6
      Page(s):
    1164-1172

    This paper proposes a system called Neary that detects conversational fields based on similarity of auditory situation among users. The similarity of auditory situation between each pair of the users is measured by the similarity of frequency property of sound captured by head-worn microphones of the individual users. Neary is implemented with a simple algorithm and runs on portable PCs. Experimental result shows Neary can successfully distinguish groups of conversations and track dynamic changes of them. This paper also presents two examples of Neary deployment to detect user contexts during experience sharing in touring at the zoo and attending an academic conference.

  • Transformation and Chained Structure for a Class of Nonlinear Affine Control Systems

    Tatsuya KAI  

     
    LETTER-Nonlinear Problems

      Vol:
    E94-A No:6
      Page(s):
    1468-1472

    This letter is devoted to derivation of a transformation law which converts a class of nonlinear affine control systems with n-states and 2-iputs into simpler systems with chained structure. First, we give a problem formulation that we consider throughout this letter. We next introduce a transformation law and gives its mathematical certification. Then, we apply the transformation method to an example and consider control design based on chained structure for the example in order to confirm the effectiveness of our approach.

7601-7620hit(21534hit)