The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Ti(30728hit)

20461-20480hit(30728hit)

  • Adaptive MIMO Channel Estimation and Multiuser Detection Based on Kernel Iterative Inversion

    Feng LIU  Taiyi ZHANG  Jiancheng SUN  

     
    PAPER-Communication Theory and Systems

      Vol:
    E87-A No:3
      Page(s):
    649-655

    In this paper a new adaptive multi-input multi-output (MIMO) channel estimation and multiuser detection algorithm based kernel space iterative inversion is proposed. The functions of output signals are mapped from a low dimensional space to a high dimensional reproducing kernel Hilbert space. The function of the output signals is represented as a linear combination of a set of basis functions, and a Mercer kernel function is constructed by the distribution function. In order to avoid finding the function f(.) and g(.), the correlation among the output signals is calculated in the low dimension space by the kernel. Moreover, considering the practical application, the algorithm is extended to online iteration of mixture system. The computer simulation results illustrated that the new algorithm increase the performance of channel estimation, the global convergence, and the system stability.

  • Probability Distribution of Time-Series of Speech Spectral Components

    Rajkishore PRASAD  Hiroshi SARUWATARI  Kiyohiro SHIKANO  

     
    PAPER-Audio/Speech Coding

      Vol:
    E87-A No:3
      Page(s):
    584-597

    This paper deals with the statistical modeling of a Time-Frequency Series of Speech (TFSS), obtained by Short-Time Fourier Transform (STFT) analysis of the speech signal picked up by a linear microphone array with two elements. We have attempted to find closer match between the distribution of the TFSS and theoretical distributions like Laplacian Distribution (LD), Gaussian Distribution (GD) and Generalized Gaussian Distribution (GGD) with parameters estimated from the TFSS data. It has been found that GGD provides the best models for real part, imaginary part and polar magnitudes of the time-series of the spectral components. The distribution of the polar magnitude is closer to LD than that of the real and imaginary parts. The distributions of the real and imaginary parts of TFSS correspond to strongly LD. The phase of the TFSS has been found uniformly distributed. The use of GGD based model as PDF in the fixed-point Frequency Domain Independent Component Analysis (FDICA) provides better separation performance and improves convergence speed significantly.

  • Finite-Difference Time-Domain Simulation of Two-Dimensional Photonic Crystal Surface-Emitting Laser Having a Square-Lattice Slab Structure

    Mitsuru YOKOYAMA  Susumu NODA  

     
    PAPER

      Vol:
    E87-C No:3
      Page(s):
    386-392

    By means of the three-dimensional (3D) finite-difference time domain (FDTD) method, we have investigated in detail the optical properties of a two-dimensional photonic crystal (PC) surface-emitting laser having a square-lattice structure. The 3D-FDTD calculation is carried out for the finite size PC slab structure. The device is based on band-edge resonance, and plural band edges are present at the corresponding band edge point. For these band edges, we calculate the mode profile in the PC slab, far field pattern (FFP) and polarization mode of the surface-emitted component, and photon lifetime. FFPs are shown to be influenced by the finiteness of the structure. Quality (Q) factor, which is a dimensionless quantity representing photon lifetime, is introduced. The out-plane radiation loss in the direction normal to the PC plane greatly influences the total Q factor of resonant mode and is closely related with the band structure. As a result, Q factors clearly differ among these band edges. These results suggest that these band edges include resonant modes that are easy to lase and resonant modes that are difficult to lase.

  • An Efficient FEC Method for High-Quality Video Transmission on the Broadband Internet

    Tohru KONDO  Kouji NISHIMURA  Reiji AIBARA  

     
    PAPER-Multicast

      Vol:
    E87-B No:3
      Page(s):
    643-650

    FEC (Forward Error Correction) can repair the damage to communication quality due to packet loss. The growing requirement of FEC for high-quality video transmission is inevitable on broadband networks. We have designed and implemented FEC, and integrated it to our developed video transmission system named "mpeg2ts." Our goal is to make it possible to deploy this system on the broadband Internet. However, the problem with constant redundancy of FEC is that weakness to fluctuation of network condition. To resolve this problem, in this paper, we propose and evaluate an efficient FEC method for high-quality video transmission. The proposed mechanisms can provide robustness as well as saving of processing load and optimization of bandwidth consumption. Moreover, we integrate it into a system to deploy it on the real broadband Internet. Transmission experiment demonstrates availability of developed system deployed on the network.

  • Real-Time Frame-Layer Rate Control for Low Bit Rate Video over the Internet

    Yoon KIM  Jae-Young PYUN  Jae-Hwan JEONG  Sung-Jea KO  

     
    PAPER-Multimedia Communication

      Vol:
    E87-B No:3
      Page(s):
    598-604

    A real-time frame-layer rate control algorithm using sliding window method is proposed for low bit rate video coding over the Internet. The proposed rate control method performs bit allocation at the frame level to minimize the average distortion over an entire sequence as well as variations in distortion between frames. A new frame-layer rate-distortion model is derived, and a non-iterative optimization method is used for low computational complexity. In order to reduce the quality fluctuation, we use a sliding window scheme which does not require the pre-analysis process. Therefore, the proposed algorithm does not produce time delay from encoding, and is suitable for real-time low-complexity video encoder. Experimental results indicate that the proposed control method provides better visual and PSNR performance than the existing TMN8 rate control method.

  • Inverse Problem Techniques for the Design of Photonic Crystals

    Martin BURGER  Stanley J. OSHER  Eli YABLONOVITCH  

     
    INVITED PAPER

      Vol:
    E87-C No:3
      Page(s):
    258-265

    This paper provides a review on the optimal design of photonic bandgap structures by inverse problem techniques. An overview of inverse problems techniques is given, with a special focus on topology design methods. A review of first applications of inverse problems techniques to photonic bandgap structures and waveguides is given, as well as some model problems, which provide a deeper insight into the structure of the optimal design problems.

  • Open 6 to 4 Relay Router Operation for Promoting IPv6 Deployment

    Yuichiro HEI  Katsuyuki YAMAZAKI  

     
    PAPER-Implementation and Operation

      Vol:
    E87-B No:3
      Page(s):
    421-428

    The 6to4 method enables separate IPv6 sites to connect to the IPv6 Internet via a 6to4 relay router without an explicit IPv6-over-IPv4 tunnel setup. There are about a dozen open 6to4 relay routers worldwide but none of these have been installed in Japan. We therefore decided to evaluate the 6to4 mechanism and set ourselves the goal of improving the 6to4 operation within Japan. To accomplish this, in March 2002, we installed an open 6to4 relay router in Japan with the cooperation of the WIDE project and started this experiment. This paper describes our experiment and analysis of IPv6 traffic through our 6to4 relay router, as well as considerations derived from our experiment.

  • An MMSE Based Calibration of a LINC Transmitter

    Riichiro NAGAREDA  Kazuhiko FUKAWA  Hiroshi SUZUKI  

     
    PAPER-Wireless Communication Technology

      Vol:
    E87-B No:3
      Page(s):
    689-694

    This paper proposes a new correction technique for a linear amplification with nonlinear components (LINC) transmitter. The technique, which is based on the minimum mean squared error (MMSE) criterion, estimates the gain and phase imbalance between the two amplifier branches. With information on the estimation, the imbalance is offset by controlling the amplitude and phase of the input signal that is fed into one of the two amplifiers. Computer simulations with a DS-CDMA system demonstrate that this method can compensate for the imbalance and sufficiently suppress the out-of-band distortion spectrum.

  • A Mobile Multicast Protocol with Error Control for IP Networks

    Chunhung Richard LIN  Chang-Jai CHUNG  

     
    PAPER-Network

      Vol:
    E87-B No:3
      Page(s):
    695-704

    We propose a new protocol to achieve fault recovery of multicast applications in IP internetwork with mobile participators. Our protocol uses the basic unicast routing capability of IETF Mobile IP as the foundation, and leverages existing IP multicast models to provide reliable multicast services for mobile hosts as well. We believe that the resulting scheme is simple, scalable, transparent, and independent of the underlying multicast routing facility. A key feature of our protocol is the use of multicast forwarding agent (MFA) to address the scalability and reliability issues in the reliable mobile multicast applications. Our simulation results show the distinct performance advantages of our protocol using MFAs over two other approaches proposed for the mobile multicast service, namely Mobile Multicast Protocol (MoM) and bi-directional tunneling, particularly as the number of mobile group members and home agents (HAs) increases.

  • On Carrier Spacing in Multicarrier CDMA Systems

    Ha H. NGUYEN  Ed SHWEDYK  

     
    LETTER-Wireless Communication Technology

      Vol:
    E87-B No:3
      Page(s):
    768-771

    This letter considers multicarrier CDMA systems using rectangular chip waveform, where each user's data stream is serial to parallel converted to a number of lower rate streams. Each lower rate stream is then spread by a random spreading code and a suitable chip rate before modulating orthogonal carriers. It is shown that, for a fixed system bandwidth and a given number of carriers, there exists an optimal carrier spacing that minimizes the multiple access interference. Numerical examples also show that the multicarrier DS-CDMA system previously proposed in performs very close to the muticarrier CDMA system using the optimal carrier spacing.

  • On Range Inclusion of Polynomials Applying Interval Arithmetic

    Shinya MIYAJIMA  Masahide KASHIWAGI  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E87-A No:3
      Page(s):
    725-731

    Interval arithmetic is able to be applied when we include the ranges of various functions. When we include them applying the interval arithmetic, the serious problem that the widths of the range inclusions increase extremely exists. In range inclusion of polynomials particularly, Horner's method and Alefeld's method are well known as the conventional methods which mitigates this problem. The purpose of this paper is to propose the new methods which are able to mitigate this problem more efficiently than the conventional methods. And in this paper, we show and compare the efficiencies of the new methods by some numerical examples.

  • Performance Analysis of an Enhanced Time-Based Location Registration Scheme

    Goo-Yeon LEE  Yong LEE  

     
    LETTER-Wireless Communication Switching

      Vol:
    E87-B No:3
      Page(s):
    776-779

    In this letter, we propose an enhanced time-based registration method and analyze the performance numerically. In the analysis, we assume Poisson call arrival distribution and exponential cell resident time. The performance of the enhanced time-based registration method is compared with the performance of the original time-based registration method. In the comparisons, we see that in a certain range of parameters, the enhanced time-based registration method has better performance.

  • Delay Aware Two-Step Timers for Large Groups Scalability

    Achmad Husni THAMRIN  Hidetaka IZUMIYAMA  Hiroyuki KUSUMOTO  Jun MURAI  

     
    PAPER-Implementation and Operation

      Vol:
    E87-B No:3
      Page(s):
    437-444

    This paper investigates modified random timers based on uniform and exponentially distributed timers for feedback scalability for large groups. We observe the widely-used probability distribution functions and propose new ones that are aware of network delays. The awareness of network delays of our proposed modified p.d.fs proves to be able to achieve lower expected number of messages compared to the original ones given that the parameters are optimized for the network variables: the number of receivers, and the network delay. In our analysis we derive an equation to estimate the optimized parameter based on these network variables. We also simulate the p.d.fs for heterogenous network delays and find that each receiver only needs to be aware of its network delay.

  • The Basis for an Adaptive IP QoS Management

    Miguel FRANKLIN DE CASTRO  Lela MERGHEM  Dominique GAITI  Abdallah M'HAMED  

     
    PAPER-Congestion Control

      Vol:
    E87-B No:3
      Page(s):
    564-572

    The new Internet has to provide the Quality of Services to converged multimedia services, in which each one may choose its own requirements. Managing such a dynamic network is not an easy task. A more intelligent and adaptive behavior is required from network management. We argue that agents are able to realize this task by dynamically adapting management mechanisms to the current network conditions. This article presents a Behavioral Multi-Agent-based model for QoS-enabled Internet. Based on this behavioral approach, we analyze network management mechanisms (or "elementary behaviors") in terms of performance and applicability profile. We use simulation to observe services performances when submitted to diverse QoS management elementary behaviors.

  • A Fingerprint Matching Algorithm Using Phase-Only Correlation

    Koichi ITO  Hiroshi NAKAJIMA  Koji KOBAYASHI  Takafumi AOKI  Tatsuo HIGUCHI  

     
    PAPER-Digital Signal Processing for Pattern Recognition

      Vol:
    E87-A No:3
      Page(s):
    682-691

    This paper presents an algorithm for fingerprint matching using the Phase-Only Correlation (POC) function. One of the most difficult problems in human identification by fingerprints has been that the matching performance is significantly influenced by fingertip surface condition, which may vary depending on environmental or personal causes. This paper proposes a new fingerprint matching algorithm using phase spectra of fingerprint images. The proposed algorithm is highly robust against fingerprint image degradation due to inadequate fingertip conditions. A set of experiments is carried out using fingerprint images captured by a pressure sensitive fingerprint sensor. The proposed algorithm exhibits efficient identification performance even for difficult fingerprint images that could not be identified by the conventional matching algorithms.

  • Enhanced Mobile Network Protocol for Its Robustness and Policy Based Routing

    Ryuji WAKIKAWA  Susumu KOSHIBA  Thierry ERNST  Julien CHARBON  Keisuke UEHARA  Jun MURAI  

     
    PAPER-Mobile Networking

      Vol:
    E87-B No:3
      Page(s):
    445-452

    In this paper, we discuss the performance of a basic scheme to support network mobility. Network mobility arises when an entire network segment, such as a network inside a vehicle, changes its topological location and thus its access point to the fixed backbone network. Mechanisms to support network mobility are necessary to maintain sessions. The approach followed by the IETF (NEMO Basic Support) and us (B-ORC) is to establish a bi-directional tunnel between the mobile network and the Internet. As we show, this bi-directional tunnel is a performance bottleneck and leads to single points of failure. In order to address the issues of the existing mobile network architecture, we propose enhanced operations of the basic mobile network protocol to achieve reliability and efficiency: (1) multiple bi-directional tunnels between the mobile network and the Internet, and (2) policy-based routing. The proposed operations could be realized by extending the existing architecture and protocol. The performance of various multihoming configurations is evaluated based on the implementation of our own basic scheme. The evaluation criteria are delay, throughput and latency. The results are encouraging and show we can achieve a better throughput.

  • All-Optical Regeneration Using a Vertical-Cavity Surface-Emitting Laser with External Light Injection

    Yutaka ONISHI  Fumio KOYAMA  

     
    PAPER-Lasers, Quantum Electronics

      Vol:
    E87-C No:3
      Page(s):
    409-415

    We propose a novel optical signal processing using an optically pumped vertical-cavity surface-emitting laser (VCSEL) with an external light input. The mode transition between a fundamental and a 1st-high-order transverse mode is induced by an external light injection. Since a single mode fiber (SMF) spatially selects a fundamental transverse mode as an output signal, we are able to realize a nonlinear transfer function, which will be useful in future photonic networks. The mode transition characteristic of a 1.55 µm optically pumped two-mode VCSEL has been simulated by using a two-mode rate equation, which includes the effects of spatial hole burning and spectral hole burning as gain saturation coefficients. We focus on the detuning effect in the injection locking. When the wavelength of an input light with a fundamental mode is slightly longer than that of a VCSEL operating in a 1st-high-order transverse mode, the transverse mode of the VCSEL is switched to a fundamental mode at a critical input power level. This gives us an ideal transfer function for 2R (reamplification and reshaping) regeneration. Also, the proposed scheme may enable polarization insensitive signal processing, which is a unique feature in surface emitting lasers.

  • Route Optimization Methods for Network Mobility with Mobile IPv6

    Yasushi TAKAGI  Hiroyuki OHNISHI  Keisuke SAKITANI  Ken-ichi BABA  Shinji SHIMOJO  

     
    PAPER-Mobile Networking

      Vol:
    E87-B No:3
      Page(s):
    480-489

    A new mobility management architecture is proposed to optimize end-to-end routes for mobile nodes (MNs) and mobile routers (MRs) within a nested mobile network environment. By applying local network mobility management mechanisms based on Hierarchical Mobile IPv6 (HMIPv6) to a mobile network, the proposed approach can optimize the route to the mobile network effectively. Combining the proposed route optimization methods and HMIPv6 functionality can enable it to provide more effective route optimization, reducing the burden of location registration for handovers. A route optimization method for local fixed nodes in a mobile network has also been developed by adding proxy mobile node and correspondent node functions to the MRs. Numerical evaluations on mean route length and traffic routed through network nodes demonstrate the effectiveness and applicability of the proposed methods especially in large-scale networks.

  • Transient Time Period Analysis of Smooth Handoff in Mobile IP Networks

    Dongwook LEE  JongWon KIM  

     
    PAPER-Mobile Networking

      Vol:
    E87-B No:3
      Page(s):
    497-506

    The handoff in Mobile IP networks causes packet sequence disruption during a packet forwarding procedure and may result in performance degradation in higher layer protocols. We investigate the impact of handoff in the Mobile IPv6 networks, where an optimized routing with the smooth handoff is adopted. The impact on the packet sequence is measured by an 'unstable time period (UTP)' and a 'silence time period (STP).' The UTP explains the time duration of out-of-sequence packets while the STP reflects the blackout duration of a mobile node after the initiation of handoff procedure. With the analysis on the UTP and STP, the total transient time period (denoted as handoff time period or HTP) after the handoff initiation can be estimated. In our previous work, focusing on the UTP, the packet flow sequence under the smooth handoff is analyzed for the Mobile IPv4 networks. The proposed queuing-based analysis is extended in this work for the Mobile IPv6 networks. That is, several modifications are made to conform to Mobile IPv6 and at the same time the queuing analysis itself is improved to better model the handoff procedure. The numerical results show that the queuing delay for the handoff packets (affected by background traffic) and the involved link (or route) capacities affect the estimated UTP, STP, and HTP. In addition, two schemes such as priority queuing and buffered packet forwarding are introduced to reduce the transient period and the improvements are analyzed for comparison.

  • One-Time Password Authentication Protocol against Theft Attacks

    Takasuke TSUJI  Akihiro SHIMIZU  

     
    PAPER-Security

      Vol:
    E87-B No:3
      Page(s):
    523-529

    Software applications for the transfer of money or personal information are increasingly common on the Internet. These applications require user authentication for confirming legitimate users. One-time password authentication methods risk a stolen-verifier problem or other steal attacks because the authentication on the Internet server stores the user's verifiers and secret keys. The SAS-2 (Simple And Secure password authentication protocol, ver.2) and the ROSI (RObust and SImple password authentication protocol) are secure password authentication protocols. However, we have found attacks on SAS-2 and ROSI. Here, we propose a new method which eliminates such problems without increasing the processing load and can perform high security level same as S/Key systems without resetting the verifier.

20461-20480hit(30728hit)