The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

10721-10740hit(21534hit)

  • Performance Enhancement of Transport Layer Handover on Single-Homed Mobile Nodes

    Michio HONDA  Yoshifumi NISHIDA  Jin NAKAZAWA  Hideyuki TOKUDA  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2683-2692

    Many handover techniques in the Internet have been introduced with the development of mobile computing technologies. Although many proposed handover schemes utilize multiple wireless interfaces, having multiple wireless interfaces in a mobile device increases its power consumption, device installation space, and hardware costs. We have been studying handover schemes for mobile nodes with a single wireless interface. To achieve seamless and efficient handover, we focus on Stream Control Transmission Protocol (SCTP) that offers a message-oriented, reliable and connection-oriented delivery transport service. Unlike other transport protocols like TCP, SCTP can provide an end-to-end handover mechanism with multi-homing feature. However, the handover mechanism in the current SCTP causes large handover latency particularly when a mobile node has only one single wireless interface. This paper investigates the current issues of the SCTP handover mechanism, and proposes a new efficient handover scheme based on SCTP, which identifies a communication path as a pair of source and destination address. Additionally, we modified SCTP behavior when an SCTP endpoint received a SET PRIMARY message to change primary destination of peer endpoint. This paper shows that our scheme can reduce the handover latency by two to thirty seconds.

  • Design of Optimum M-Phase Spreading Sequences of Markov Chains

    Hiroshi FUJISAKI  

     
    PAPER-Communications and Sequences

      Vol:
    E90-A No:10
      Page(s):
    2055-2065

    We design M(≥3)-phase spreading sequences of Markov chains optimal in terms of bit error probabilities in asynchronous SSMA (spread spectrum multiple access) communication systems. To this end, we obtain the distributions of the normalized MAI (multiple access interference) for such systems and find a necessary and sufficient condition that the distributions become independent of the phase shifts.

  • Method for Visualizing Complicated Structures Based on Unified Simplification Strategy

    Hiroki OMOTE  Kozo SUGIYAMA  

     
    PAPER

      Vol:
    E90-D No:10
      Page(s):
    1649-1656

    In this paper, we present a novel force-directed method for automatically drawing intersecting compound mixed graphs (ICMGs) that can express complicated relations among elements such as adjacency, inclusion, and intersection. For this purpose, we take a strategy called unified simplification that can transform layout problem for an ICMG into that for an undirected graph. This method is useful for various information visualizations. We describe definitions, aesthetics, force model, algorithm, evaluation, and applications.

  • Chaotic UWB Communication System for Low-Rate Wireless Connectivity Applications

    Sang-Min HAN  Mi-Hyun SON  Young-Hwan KIM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E90-B No:10
      Page(s):
    2891-2896

    A chaotic UWB communication system based on IEEE 802.15.4a is proposed for wireless connectivity applications. A compact and simple architecture is implemented by using a chaotic UWB signal and a non-coherent detection scheme. The chaotic UWB signal has noise-like characteristics in time and frequency domains and naturally wide spectrum within a limited bandwidth. The chaotic UWB signal generator is designed on two methods with the bandwidth of 3.1 to 5.1 GHz, and a baseband process is realized on an FPGA including an adaptive decision and a channel code for non-source coded data stream. The system performance is evaluated by transmitting MP3 audio/voice with 32-byte length PSDUs and measuring PERs for assessing the system sensitivity and the interferer compatibility. The proposed system can be an excellent candidate for short-range connectivity services, as well as an inexpensive system with good capability for narrow-band interferences.

  • Intrusion Detection by Monitoring System Calls with POSIX Capabilities

    Takahiro HARUYAMA  Hidenori NAKAZATO  Hideyoshi TOMINAGA  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2646-2654

    Existing anomaly intrusion detection that monitors system calls has two problems: vast false positives and lack of risk information on detection. In order to solve the two problems, we propose an intrusion detection method called "Callchains." Callchains reduces the false positives of existing anomaly intrusion detection by restricting monitoring to the activities with process capabilities prescribed by POSIX 1003.1e. Additionally, Callchains provides an administrator information of used POSIX capabilities in sytem call execution as an indicator of risk. This paper shows Callchains' design, its implementation, and experimental results comparing Callchains with existing approaches.

  • Architectural-Level Soft-Error Modeling for Estimating Reliability of Computer Systems

    Makoto SUGIHARA  Tohru ISHIHARA  Kazuaki MURAKAMI  

     
    PAPER-VLSI Design Technology

      Vol:
    E90-C No:10
      Page(s):
    1983-1991

    This paper proposes a soft-error model for accurately estimating reliability of a computer system at the architectural level within reasonable computation time. The architectural-level soft-error model identifies which part of memory modules are utilized temporally and spatially and which single event upsets (SEUs) are critical to the program execution of the computer system at the cycle accurate instruction set simulation (ISS) level. The soft-error model is capable of estimating reliability of a computer system that has several memory hierarchies with it and finding which memory module is vulnerable in the computer system. Reliability estimation helps system designers apply reliable design techniques to vulnerable part of their design. The experimental results have shown that the usage of the soft-error model achieved more accurate reliability estimation than conventional approaches. The experimental results demonstrate that reliability of computer systems depends on not only soft error rates (SERs) of memories but also the behavior of software running in computer systems.

  • Normalization of Output Information for a Turbo Decoder Using SOVA

    Yi-Nan LIN  Wei-Wen HUNG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E90-A No:10
      Page(s):
    2336-2339

    It has been shown that the output information produced by the soft output Viterbi algorithm (SOVA) is too optimistic. To compensate for this, the output information should be normalized. This letter proposes a simple normalization technique that extends the existing sign difference ratio (SDR) criterion. The new normalization technique counts the sign differences between the a-priori information and the extrinsic information, and then adaptively determines the corresponding normalization factor for each data block. Simulations comparing the new technique with other well-known normalization techniques show that the proposed normalization technique can achieve about 0.2 dB coding gain improvement on average while reducing up to about 1/2 iteration for decoding.

  • Evaluation of Reliable Multicast Applications for Large-Scale Contents Delivery

    Teruji SHIROSHITA  Shingo KINOSHITA  Takahiko NAGATA  Tetsuo SANO  Yukihiro NAKAMURA  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2738-2745

    Reliable Multicast has been applied to large-scale contents delivery systems for distributing digital contents to a large number of users without data loss. Reliable contents distribution is indispensable for software updates and management data sharing in actual delivery services. This paper evaluates the implementation and performance of RMTP; a reliable multicast protocol for bulk-data transfer, through the developments of contents delivery systems. Software configuration is also examined including operation functions such as delivery scheduling. Furthermore, applicability of reliable multicast to emerging broadband networks is also discussed based on the experimentation results. Through the deployment of the protocol and the software, performance estimation has played a key role for constructing the delivery systems as well as for designing the communication protocol.

  • Relaxed Monotonic Conditions for Schur Stability of Real Polynomials

    Thang V. NGUYEN  Yoshihiro MORI  Takehiro MORI  

     
    LETTER-Systems and Control

      Vol:
    E90-A No:10
      Page(s):
    2326-2328

    Monotonic condition, a well-known sufficient condition for Schur stability of real polynomials, is relaxed. The condition reads that a series of strictly and monotonically decreasing positive coefficients of the polynomials yields Schur stability. It is shown by inspecting the original proof that equalities are allowed in all the inequalities but two which are located at appropriate positions.

  • Formalization and Analysis of Routing Loops by Inconsistencies in IP Forwarding Tables

    Kazuya SUZUKI  Masahiro JIBIKI  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2755-2763

    The effect of inconsistencies in forwarding tables on the reachability of IP packets is evaluated. To improve a router's availability, in the architecture of current routers, the control element is separated from the forwarding element. However, a router with the current architecture cannot handle a notification for which the topology of the network system changes when its control element has stopped. In such a case, the router cannot update its own forwarding table, and an inconsistency between the forwarding tables of the router and those of the other routers will occur. To investigate the influence of this inconsistency, we formalize the network system, and derive the conditions under which such an inconsistency leads to unreachable routes. After that, the number of routes that are unreachable is evaluated by simulations. These simulations show that routing loops occur more frequently under the condition that a failed node is close to the restarting node or fewer links exist in the network system.

  • An Energy Management Circuit for Self-Powered Ubiquitous Sensor Modules Using Vibration-Based Energy

    Jun PAN  Yasuaki INOUE  Zheng LIANG  

     
    PAPER-Nonlinear Circuits

      Vol:
    E90-A No:10
      Page(s):
    2116-2123

    An energy management circuit is proposed for self-powered ubiquitous sensor modules using vibration-based energy. With the proposed circuit, the sensor modules work with low duty cycle operation. Moreover, a two-tank circuit as a part of the energy management circuit is utilized to solve the problem that the average power density of ambient energy always varies with time while the power consumption of the sensor modules is constant and larger than it. In addition, the long start-up time problem is also avoided with the timing control of the proposed energy management circuit. The CMOS implementation and silicon verification results of the proposed circuit are also presented. Its validity is further confirmed with a vibration-based energy generation. The sensor module is used to supervise the vibration of machines and transfer the vibration signal discontinuously. A piezoelectric element acts as the vibration-to-electricity converter to realize battery-free operation.

  • Parasitic Effects in Multi-Gate MOSFETs

    Yusuke KOBAYASHI  C. Raghunathan MANOJ  Kazuo TSUTSUI  Venkanarayan HARIHARAN  Kuniyuki KAKUSHIMA  V. Ramgopal RAO  Parhat AHMET  Hiroshi IWAI  

     
    PAPER-Integrated Electronics

      Vol:
    E90-C No:10
      Page(s):
    2051-2056

    In this paper, we have systematically investigated parasitic effects due to the gate and source-drain engineering in multi-gate transistors. The potential impact of high-K dielectrics on multi-gate MOSFETs (MuGFETs), such as FinFET, is evaluated through 2D and 3D device simulations over a wide range of proposed dielectric values. It is observed that introduction of high-K dielectrics will significantly degrade the short channel effects (SCEs), however a combination of oxide and high-K stack can effectively control this degradation. The degradation is mainly due to the increase in the internal fringe capacitance coupled with the decrease in gate-channel capacitance. From the circuit perspective, an optimum K value has been identified through mixed mode simulations. Further, as a part of this work, the importance of optimization of the shape of the spacer region is highlighted through full 3D simulations.

  • Optical Beat Noise Reduction Using FM to AM Conversion of Injection-Locked FP-Laser Diode in Reflective SOA Based WDM/SCM-Passive Optical Networks

    Yong-Yuk WON  Hyuk-Choon KWON  Sang-Kook HAN  

     
    LETTER-Fiber-Optic Transmission for Communications

      Vol:
    E90-B No:10
      Page(s):
    2953-2956

    A new scheme for reducing optical beat interference noise in a reflective semiconductor optical amplifier based wavelength division multiplexed/subcarrier multiplexing -- passive optical network is proposed. This method uses an Fabry Perot laser locked by modulated lights from optical network units in a central office. As an experimental verification, it is reported that carrier to noise ratio is enhanced by 10 dB and power penalty is improved by 16 dB.

  • Direct Coherency Identification of Synchronous Generators in Taiwan Power System Based on Fuzzy c-Means Clustering

    Shu-Chen WANG  Pei-Hwa HUANG  Chi-Jui WU  Yung-Sung CHUANG  

     
    PAPER-Soft Computing

      Vol:
    E90-A No:10
      Page(s):
    2223-2231

    This paper is to investigate the application of fuzzy c-means clustering to the direct identification of coherent synchronous generators in power systems. Because of the conceptual appropriateness and computational simplicity, this approach is essentially a fast and flexible method. At first, the coherency measures are derived from the time-domain responses of generators in order to reveal the relations between any pair of generators. And then they are used as initial element values of the membership matrix in the clustering procedures. An application of the proposed method to the Taiwan power (Taipower) system is demonstrated in an attempt to show the effectiveness of this clustering approach. The effects of short circuit fault locations, operating conditions, data sampling interval, and power system stabilizers are also investigated, as well. The results are compared with those obtained from the similarity relation method. And thus it is found that the presented approach needs less computation time and can directly initialize a clustering process for any number of clusters.

  • A Basic Theory for Available Operation of Extremely Complicated Large-Scale Network Systems

    Kazuo HORIUCHI  

     
    PAPER-Systems Theory and Control

      Vol:
    E90-A No:10
      Page(s):
    2232-2238

    In this paper, we shall describe about a basic theory based on the concept of set-valued operators, suitable for available operation of extremely complicated large-scale network systems. Fundamental conditions for availability of system behaviors of such network systems are clarified in a form of fixed point theorem for system of set-valued operators. Here, the proof of this theorem is accomplished by the concept of Hausdorff's ball measure of non-compactness.

  • Exploiting Eye Movements for Evaluating Reviewer's Performance in Software Review

    Hidetake UWANO  Masahide NAKAMURA  Akito MONDEN  Ken-ichi MATSUMOTO  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E90-A No:10
      Page(s):
    2290-2300

    This paper proposes to use eye movements to characterize the performance of individuals in reviewing software documents. We design and implement a system called DRESREM, which measures and records eye movements of document reviewers. Based on the eye movements captured by eye tracking device, the system computes the line number of the document that the reviewer is currently looking at. The system can also record and play back how the eyes moved during the review process. To evaluate the effectiveness of the system we conducted an experiment to analyze 30 processes of source code review (6 programs, 5 subjects) using the system. As a result, we have identified a particular pattern, called scan, in the subject's eye movements. Quantitative analysis showed that reviewers who did not spend enough time on the scan took more time to find defects on average.

  • A Proposal of Wireless Network Routing Protocol for Heterogeneous Mobility

    Tomohiko YAGYU  Masahiro JIBIKI  Kenichi YOSHIDA  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2693-2701

    Most wireless networks consist of heterogeneous nodes with diverse characteristics. These heterogeneous nodes have various moving characteristics such as speed and pausing time. Since conventional wireless routing schemes are designed for networks with homogeneous mobility, it is difficult to accomplish communication without degrading its quality, e.g., packet reachability and delay, in networks with heterogeneous mobility. In this paper, we propose efficient extensions of a proactive routing protocol to achieve sufficient communication quality in networks with heterogeneous mobility. The proposed extensions consist of three features, i.e., differential topology update, unidirectional movement notification and link quality based route calculation. Complementary actions among these functions can improve communication quality with acceptable control overhead. Simulation results reveal that the proposed scheme can achieve higher packet reachability and lower delay with low control overhead compared with existing routing schemes.

  • A Compensatory Packet Dropping Routine for Proportional Loss Rate Differentiation

    Hyoup-Sang YOON  Bong-Jin YUM  

     
    PAPER-Internet

      Vol:
    E90-B No:10
      Page(s):
    2865-2873

    Service differentiation is one of the key issues in the current Internet. In this paper, we focus on a recent proposal for proportional loss rate differentiation which employs a single FIFO queue, an AQM algorithm for computing the packet drop probability, and a counter-based packet dropping routine for achieving the intended proportional loss rate differentiation among classes. It is first shown that, when the target dropping probability of a class is large, the counter-based packet dropping routine may yield a significant amount of error between the target and measured drop probabilities for the class, and subsequently, fails to maintain the loss rate ratios between classes as intended. To avoid this problem, a new compensatory packet dropping routine is developed in this paper. Then, a series of simulation experiments are conducted using the ns-2 simulator to assess the performances of the two dropping routines under various congestion conditions and quality spacings between classes. The simulation results show that, unlike the counter-based dropping routine, the proposed compensatory dropping routine is effective in keeping the loss rate ratios between classes closely on target regardless of the degree of congestion and quality spacing between classes, while the two dropping routines perform similarly in terms of throughput and queueing delay in the bottleneck link. In addition, such robustness of the proposed routine is achieved without any additional control parameter or computational effort compared to the counter-based routine.

  • Maximal-Period Sequences Generated by Feedback-Limited Nonlinear Shift Registers

    Akio TSUNEDA  Kunihiko KUDO  Daisaburo YOSHIOKA  Takahiro INOUE  

     
    PAPER-Communications and Sequences

      Vol:
    E90-A No:10
      Page(s):
    2079-2084

    We propose feedback-limited NFSRs (nonlinear feedback shift registers) which can generate periodic sequences of period 2k-1, where k is the length of the register. We investigate some characteristics of such periodic sequences. It is also shown that the scale of such NFSRs can be reduced by the feedback limitation. Some simulation and experimental results are shown including comparison with LFSRs (linear feedback shift registers) for conventional M-sequences and Gold sequences.

  • Newly Developed Optical Fiber Line Testing System Employing Bi-Directional OTDRs for PON and In-Service Line Testing Criteria

    Yusuke KOSHIKIYA  Noriyuki ARAKI  Hisashi IZUMITA  Fumihiko ITO  

     
    PAPER-Optical Fiber for Communications

      Vol:
    E90-B No:10
      Page(s):
    2793-2802

    A passive optical network (PON) that provides fiber to the home (FTTH) services is a fundamental access network topology in Japan. An optical fiber line monitoring and testing system is essential if we are to improve service reliability and reduce the maintenance costs of optical access networks. PONs have optical splitters in their optical fiber lines. It is difficult to find a fault in an optical fiber line equipped with an optical splitter by using a conventional optical fiber line testing system, which uses optical time-domain reflectometer (OTDR) in a central office (CO), because Rayleigh backscattering from the branched fibers accumulates in the OTDR trace. This paper describes a newly developed optical fiber line testing method that employs bi-directional OTDRs with two wavelengths at branched fiber regions in a PON to locate a fault precisely. Optical fiber line testing is conducted by two OTDRs that are installed in a CO and on a customer's premises, respectively. The OTDR in the CO has a U-band maintenance wavelength. We present two kinds of maintenance wavelength allocation for OTDRs on a customer's premises, which are in the U-band and C-band respectively. An OTDR whose maintenance wavelength is in the U-band enables us to test in-service PON lines simply by filtering the U-band wavelength. For the maintenance wavelengths in the C-band, we can use a cost-effective conventional OTDR to test the PON from the customer's premises on condition that we clarify the peak pulse power limit and dynamic range. We describe the test procedures for both cases. We also clarify the insertion loss design for an optical filter in the CO when using the U-band to provide the maintenance wavelength and the criteria for in-service line testing when the using C-band to provide the maintenance wavelength. To confirm the feasibility of our approach, we demonstrate a bi-directional OTDR method using the U-band and the C-band, and the test procedure, which successfully detected fault locations in branched fiber regions. We also describe the use of packet loss measurements to investigate the effect of in-service line testing with an OTDR in the C-band on data communication quality.

10721-10740hit(21534hit)