The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

9581-9600hit(21534hit)

  • Experiment on Synchronous Timing Signal Detection from ISDB-T Terrestrial Digital TV Signal with Application to Autonomous Distributed ITS-IVC Network

    Yoshio KARASAWA  Taichi KUMAGAI  Atsushi TAKEMOTO  Takeo FUJII  Kenji ITO  Noriyoshi SUZUKI  

     
    PAPER-Integrated Systems for Communications

      Vol:
    E92-B No:1
      Page(s):
    296-305

    A novel timing synchronizing scheme is proposed for use in inter-vehicle communication (IVC) with an autonomous distributed intelligent transport system (ITS). The scheme determines the timing of packet signal transmission in the IVC network and employs the guard interval (GI) timing in the orthogonal frequency divisional multiplexing (OFDM) signal currently used for terrestrial broadcasts in the Japanese digital television system (ISDB-T). This signal is used because it is expected that the automotive market will demand the capability for cars to receive terrestrial digital TV broadcasts in the near future. The use of broadcasts by automobiles presupposes that the on-board receivers are capable of accurately detecting the GI timing data in an extremely low carrier-to-noise ratio (CNR) condition regardless of a severe multipath environment which will introduce broad scatter in signal arrival times. Therefore, we analyzed actual broadcast signals received in a moving vehicle in a field experiment and showed that the GI timing signal is detected with the desired accuracy even in the case of extremely low-CNR environments. Some considerations were also given about how to use these findings.

  • Performance Evaluation of MIMO-OFDM with Twin Turbo Decoder

    Yasuyuki HATAKAWA  Noriaki MIYAZAKI  Toshinori SUZUKI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:1
      Page(s):
    228-236

    This paper proposes Twin Turbo (T2) MIMO-OFDM (Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing). The advanced iterative decoder, called the T2 decoder, decreases the transmission error rate compared to conventional turbo decoders because it uses the correlation information among the bits mapped on an identical symbol of multi-level modulation and updates the channel reliability. When T2 is applied to a MIMO-OFDM, the required symbol energy to noise power density ratio (Es/N0) can be reduced more effectively than when T2 is applied to SISO (Single Input Single Output). This is because T2 can use the correlation among the bits not only mapped on an identical symbol but also transmitted from different antennas. Moreover, T2 achieves good performance in a correlated MIMO channel because the average minimum squared Euclidean distances between symbol replica candidates consisting of signals transmitted from multiple transmitter antennas are reduced. Computer simulations verify that the required Es/N0 of T2 MIMO-OFDM using 16QAM is 1.9 dB lower than that of a conventional turbo decoder when the correlation coefficients of transmitter and receiver antennas are 0.8. A computational complexity analysis clarifies the relation between the increase in computational complexity and the reduction in the required Es/N0.

  • An ISI Suppressing Method for SIMO-OFDM System Utilizing the Characteristic of the ETP-OFDM Model

    Quoc-Anh VU  Yoshio KARASAWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:1
      Page(s):
    268-276

    This paper proposes a Inter-symbol Interference (ISI) suppressing method For Orthogonal Frequency Division Multiplexing (OFDM) system. In the environments where the delay spread exceeds the guard interval, the occurrence of ISI results in a degradation of system performance. A receiving method based on the Equivalent Transmission Path (ETP) model is proposed for Single-Input Multiple-Output (SIMO) OFDM system. Compared to the receiving scheme using Maximal Ratio Combining (MRC) method, the proposed one shows better performance in suppressing errors due to ISI. The paper also points out that the ETP-based model can be used for detecting the desired signal in the multi-user OFDM system. Simulation results of the system performance show the effectiveness of the proposed method over the conventional OFDM system in suppressing ISI.

  • Shadow Theory of Diffraction Grating

    Junichi NAKAYAMA  

     
    PAPER

      Vol:
    E92-C No:1
      Page(s):
    17-24

    This paper deals with a new formulation for the diffraction of a plane wave by a periodic grating. As a simple example, the diffraction of a transverse magnetic wave by a perfectly conductive periodic array of rectangular grooves is discussed. On the basis of a shadow hypothesis such that no diffraction takes place and only the reflection occurs with the reflection coefficient -1 at a low grazing limit of incident angle, this paper proposes the scattering factor as a new concept. In terms of the scattering factor, several new formulas on the diffraction amplitude, the diffraction efficiency and the optical theorem are obtained. It is newly found that the scattering factor is an even function due to the reciprocity. The diffraction efficiency is defined for a propagating incident wave as well as an evanescent incident wave. Then, it is theoretically found that the 0th order diffraction efficiency becomes unity and any other order diffraction efficiencies vanish when a real angle of incidence becomes low grazing. Numerical examples of the scattering factor and diffraction efficiency are illustrated in figures.

  • A Variable Step Size Algorithm for Speech Noise Reduction Method Based on Noise Reconstruction System

    Naoto SASAOKA  Masatoshi WATANABE  Yoshio ITOH  Kensaku FUJII  

     
    PAPER-Digital Signal Processing

      Vol:
    E92-A No:1
      Page(s):
    244-251

    We have proposed a noise reduction method based on a noise reconstruction system (NRS). The NRS uses a linear prediction error filter (LPEF) and a noise reconstruction filter (NRF) which estimates background noise by system identification. In case a fixed step size for updating tap coefficients of the NRF is used, it is difficult to reduce background noise while maintaining the high quality of enhanced speech. In order to solve the problem, a variable step size is proposed. It makes use of cross-correlation between an input signal and an enhanced speech signal. In a speech section, a variable step size becomes small so as not to estimate speech, on the other hand, large to track the background noise in a non-speech section.

  • Dependable Networks as a Paradigm for Network Innovation Open Access

    Tetsuya MIKI  

     
    INVITED PAPER

      Vol:
    E92-B No:1
      Page(s):
    2-8

    In past, dependable networks meant minimizing network outages or the impact of the outages. However, over the decade, major network services have shifted from telephone and data transmission to Internet and to mobile communication, where higher layer services with a variety of contents are provided. Reviewing these backgrounds of network development, the importance of the dependability of higher layer network services are pointed out. Then, the main aspects to realize the dependability are given for lower, middle and higher layer network services. In addition, some particular issues for dependable networks are described.

  • A Study on Temporal Dark Image Sticking in AC-PDP Using Vacuum-Sealing Method

    Choon-Sang PARK  Heung-Sik TAE  

     
    PAPER-Electronic Displays

      Vol:
    E92-C No:1
      Page(s):
    161-165

    Minimizing the residual impurity gases is a key factor for reducing temporal dark image sticking. Therefore, this paper uses a vacuum-sealing method that minimizes the residual impurity gases by enhancing the base vacuum level, and the resultant change in temporal dark image sticking is then examined in comparison to that with the conventional sealing method using 42-in. ac-PDPs with a high Xe (11%) content. As a result of monitoring the difference in the display luminance, infrared emission, and perceived luminance between the cells with and without temporal dark image sticking, the vacuum-sealing method is demonstrated to reduce temporal dark image sticking by decreasing the residual impurity gases and increasing the oxygen vacancy in the MgO layer. Furthermore, the use of a modified driving waveform along with the vacuum-sealing method is even more effective in reducing temporal dark image sticking.

  • Quantum Interference Crossover-Based Clonal Selection Algorithm and Its Application to Traveling Salesman Problem

    Hongwei DAI  Yu YANG  Cunhua LI  Jun SHI  Shangce GAO  Zheng TANG  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E92-D No:1
      Page(s):
    78-85

    Clonal Selection Algorithm (CSA), based on the clonal selection theory proposed by Burnet, has gained much attention and wide applications during the last decade. However, the proliferation process in the case of immune cells is asexual. That is, there is no information exchange during different immune cells. As a result the traditional CSA is often not satisfactory and is easy to be trapped in local optima so as to be premature convergence. To solve such a problem, inspired by the quantum interference mechanics, an improved quantum crossover operator is introduced and embedded in the traditional CSA. Simulation results based on the traveling salesman problems (TSP) have demonstrated the effectiveness of the quantum crossover-based Clonal Selection Algorithm.

  • Attribute-Based Encryption with Partially Hidden Ciphertext Policies

    Takashi NISHIDE  Kazuki YONEYAMA  Kazuo OHTA  

     
    PAPER-Public Key Cryptography

      Vol:
    E92-A No:1
      Page(s):
    22-32

    We propose attribute-based encryption schemes where encryptor-specified policies (called ciphertext policies) are hidden. By using our schemes, an encryptor can encrypt data with a hidden access control policy. A decryptor obtains her secret key associated with her attributes from a trusted authority in advance and if the attributes associated with the decryptor's secret key do not satisfy the access control policy associated with the encrypted data, the decryptor cannot decrypt the data or guess even what access control policy was specified by the encryptor. We prove security of our construction based on the Decisional Bilinear Diffie-Hellman assumption and the Decision Linear assumption. In our security notion, even the legitimate decryptor cannot obtain the information about the access control policy associated with the encrypted data more than the fact that she can decrypt the data.

  • Analysis and Uniform Design of a Single-Layer Slotted Waveguide Array Antenna with Baffles

    Takehito SUZUKI  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Devices/Circuits for Communications

      Vol:
    E92-B No:1
      Page(s):
    150-158

    This paper presents the formulation for the evaluation of external coupling in the alternating-phase feed single-layer slotted waveguide array antenna with baffles by using the Spectrum of Two-Dimensional Solutions (S2DS) method. A one-dimensional slot array is extracted from the array by assuming the periodicity in transversal direction and introducing the perfect electric conductors in the external region. The uniform excitation over the finite array is synthesized iteratively to demonstrate the fast and accurate results by S2DS. A unit design model with the baffles is introduced to determine the initial parameters of the slot pair which accelerate the iteration. Experiment at 25.3 GHz demonstrates good uniformity of the aperture field distribution as well as the effects of the baffles. The directivity is 32.7 dB which corresponds to the aperture efficiency 90.5% and the reflection is below -15.0 dB over 1.3 GHz.

  • Low Grazing Scattering from a Surface with a Finite Periodic Array of Rectangular Grooves

    Junichi NAKAYAMA  Yasuhiko TAMURA  Kiyoshi TSUTSUMI  

     
    LETTER-Electromagnetic Theory

      Vol:
    E92-C No:1
      Page(s):
    166-168

    This paper deals with the scattering of a transverse magnetic (TM) plane wave from a perfectly conductive surface with a finite periodic array of rectangular grooves. By use of the method in a previous paper [IEICE TRANS. ELECTRON. VOL.E90-C, no.4, pp.903-906, APRIL 2007], the total scattering cross section is numerically calculated for several different numbers of grooves at a low grazing angle of incidence. It is newly found that, when the corrugation width becomes thousands times of wavelength, the total scattering cross section slightly depends on the groove depth and the period, and becomes almost proportional to square root of the corrugation width with a small correction.

  • Name-Based Address Mapping for Virtual Private Networks

    Peter SURANYI  Yasushi SHINJO  Kazuhiko KATO  

     
    PAPER-Internet

      Vol:
    E92-B No:1
      Page(s):
    200-208

    IPv4 private addresses are commonly used in local area networks (LANs). With the increasing popularity of virtual private networks (VPNs), it has become common that a user connects to multiple LANs at the same time. However, private address ranges for LANs frequently overlap. In such cases, existing systems do not allow the user to access the resources on all LANs at the same time. In this paper, we propose name-based address mapping for VPNs, a novel method that allows connecting to hosts through multiple VPNs at the same time, even when the address ranges of the VPNs overlap. In name-based address mapping, rather than using the IP addresses used on the LANs (the real addresses), we assign a unique virtual address to each remote host based on its domain name. The local host uses the virtual addresses to communicate with remote hosts. We have implemented name-based address mapping for layer 3 OpenVPN connections on Linux and measured its performance. The communication overhead of our system is less than 1.5% for throughput and less than 0.2 ms for each name resolution.

  • An Enhanced Front-End Algorithm for Reducing Channel Change Time in DVB-T System

    Inwhee JOE  Jongsung CHOI  

     
    LETTER-Broadcast Systems

      Vol:
    E92-B No:1
      Page(s):
    350-353

    To address the low performance for channel scanning in the DVB-T system, we propose an enhanced front-end algorithm in this paper. The proposed algorithm consists of Auto Scan and Normal Scan, which is a part of the tuning algorithm for front-end (tuner) drivers in the DVB-T receiver. The key idea is that the frequency offset is saved when performing Auto Scan in order to reduce the channel change time for Normal Scan. In addition, the results of a performance evaluation demonstrate that our enhanced front-end algorithm improves the performance of channel scanning significantly, as compared to the generic front-end algorithm.

  • Bandwidth Enhancement of Aperture Feed by an Air Rectangular Cavity Backing in a LTCC Post-Wall Waveguide

    JungAun LEE  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E92-C No:1
      Page(s):
    121-126

    The aperture feed with an air cavity in a LTCC (Low Temperature Co-fired Ceramics) post-wall waveguide with dielectric constant εr more than 5 is proposed for bandwidth enhancement in the millimeter wave band. A rectangular cavity is adopted because only one mask pattern of a rectangular can be used for each layer of LTCC for reducing the number of the design parameters and the cost. The fabrication limitation such as the spacing between the post edge and the aperture edge reduces the bandwidth. The feeding structures are designed at 61.25 GHz for a range of εr from 2.0 to 9.0. In the case of εr = 7.0, the bandwidth for reflection below -15 dB with the air cavity is 4.25 times that without the air cavity in simulation, and 3.10 times in measurement.

  • Analysis of Two-Phase Path Management Scheme for MPLS Traffic Engineering

    Hitomi TAMURA  Kenji KAWAHARA  Yuji OIE  

     
    PAPER

      Vol:
    E92-B No:1
      Page(s):
    59-67

    Traffic Engineering (TE) is important for improving QoS in forwarding paths by efficient use of network resources. In fact, MPLS allows several detour paths to be (pre-)established for some source-destination pair as well as its primary path of minimum hops. Thus, we focus on a two-phase path management scheme using these two kinds of paths. In the first phase, each primary path is allocated to a flow on a specific source-destination pair if the path is not congested, i.e., if its utilization is less than some predetermined threshold; otherwise, as the second phase, one of the detour paths is allocated randomly if the path is available. Therefore, in this paper, we analytically evaluate this path management scheme by extending the M/M/c/c queueing system, and through some numerical results we investigate the impact of a threshold on the flow-blocking probability. Through some numerical results, we discuss the adequacy of the path management scheme for MPLS-TE.

  • A Framework for Detection of Traffic Anomalies Based on IP Aggregation

    Marat ZHANIKEEV  Yoshiaki TANAKA  

     
    PAPER-Networks

      Vol:
    E92-D No:1
      Page(s):
    16-23

    Traditional traffic analysis is can be performed online only when detection targets are well specified and are fairly primitive. Local processing at measurement point is discouraged as it would considerably affect major functionality of a network device. When traffic is analyzed at flow level, the notion of flow timeout generates differences in flow lifespan and impedes unbiased monitoring, where only n-top flows ordered by a certain metric are considered. This paper proposes an alternative manner of traffic analysis based on source IP aggregation. The method uses flows as basic building blocks but ignores timeouts, using short monitoring intervals instead. Multidimensional space of metrics obtained through IP aggregation, however, enhances capabilities of traffic analysis by facilitating detection of various anomalous conditions in traffic simultaneously.

  • A Velocity-Based Bicasting Handover Scheme for 4G Mobile Systems

    Dongwook KIM  Hanjin LEE  Namgi KIM  Hyunsoo YOON  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E92-B No:1
      Page(s):
    288-295

    We propose a velocity-based bicasting handover scheme for the efficient utilization of backhaul network resources in fourth-generation mobile systems. The original bicasting handover scheme adopts the mechanism of holding the data of a mobile station (MS) in all potential target base stations in advance, before the actual handover execution of the MS. The scheme minimizes the packet transmission delay caused by handover and achieves the goal of seamless connectivity, however, it results in an aggressive consumption of the backhaul network resources. Moreover, as the scheme gets widely adopted for high data rate real-time services and the demand for these services grows, the amount of the resources consumed due to the bicasting will increase tremendously. In this paper, we present a new bicasting handover scheme that reduces the data bicasting time, thereby improving the backhaul network resource utilization. Our scheme exploits the velocity parameter of MS and introduces a novel concept of bicasting threshold determined for the specific mobile speed groups. Simulations prove the efficiency of our scheme over the original one in overcoming the aggressive resource consumption at the backhaul network.

  • A Study on Performance Enhancement of Packet Detection in MB-OFDM UWB Systems

    Kyu-Min KANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:1
      Page(s):
    237-245

    This paper presents a high performance and hardware efficient packet detection structure, which employs a cross correlator for the M-sample time delayed correlation operation and a signal power calculator using the received input samples less than or equal to a zero-padded suffix of length M. We investigate the detailed characteristics of the proposed packet detector. In this paper, the performance of a class of packet detection algorithms in the ultra-wideband (UWB) channel environments is also studied. The best packet detection algorithm for the multi-band orthogonal frequency division multiplexing (MB-OFDM) UWB transmission is determined through analysis and extensive simulations. The results of analysis show that the proposed packet detection structure has advantages in the hardware complexity as well as performance when compared with the existing packet detection structures. In order to effectively conduct the packet detection before the automatic gain control (AGC) mode, we investigate the effects of both a frequency offset and the initial gain level of a variable gain amplifier (VGA) on the performance of the packet detection. We also suggest a VGA gain control technique to enhance the performance of packet detection.

  • Context-Aware Resource Management in Heterogenous Smart Environments

    Abhishek ROY  Navrati SAXENA  Jitae SHIN  

     
    LETTER-Network

      Vol:
    E92-B No:1
      Page(s):
    318-321

    An information-theoretic, optimal framework is developed for tracking the residents in a Context-aware Heterogenous Smart Environment. The resident-tracking problem is formulated in terms of weighted entropy. The framework provides an optimal, online learning and prediction of users movement, location as well as most probable path segments from the symbolic domain. Successful prediction helps in on-demand operations of automated indoor devices along the users future paths and locations, thus providing the necessary comfort at a near-optimal cost. Simulation results corroborate the high prediction success, thereby providing resident-comfort while reducing energy consumption and manual operations.

  • Scalar Multiplication Using Frobenius Expansion over Twisted Elliptic Curve for Ate Pairing Based Cryptography

    Yasuyuki NOGAMI  Yumi SAKEMI  Takumi OKIMOTO  Kenta NEKADO  Masataka AKANE  Yoshitaka MORIKAWA  

     
    PAPER-Mathematics

      Vol:
    E92-A No:1
      Page(s):
    182-189

    For ID-based cryptography, not only pairing but also scalar multiplication must be efficiently computable. In this paper, we propose a scalar multiplication method on the circumstances that we work at Ate pairing with Barreto-Naehrig (BN) curve. Note that the parameters of BN curve are given by a certain integer, namely mother parameter. Adhering the authors' previous policy that we execute scalar multiplication on subfield-twisted curve (Fp2) instead of doing on the original curve E(Fp12), we at first show sextic twisted subfield Frobenius mapping (ST-SFM) in (Fp2). On BN curves, note is identified with the scalar multiplication by p. However a scalar is always smaller than the order r of BN curve for Ate pairing, so ST-SFM does not directly applicable to the above circumstances. We then exploit the expressions of the curve order r and the characteristic p by the mother parameter to derive some radices such that they are expressed as a polynomial of p. Thus, a scalar multiplication [s] can be written by the series of ST-SFMs . In combination with the binary method or multi-exponentiation technique, this paper shows that the proposed method runs about twice or more faster than plain binary method.

9581-9600hit(21534hit)