The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

2801-2820hit(22683hit)

  • Path Loss Model Considering Blockage Effects of Traffic Signs Up to 40GHz in Urban Microcell Environments

    Motoharu SASAKI  Minoru INOMATA  Wataru YAMADA  Naoki KITA  Takeshi ONIZAWA  Masashi NAKATSUGAWA  Koshiro KITAO  Tetsuro IMAI  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/02/21
      Vol:
    E101-B No:8
      Page(s):
    1891-1902

    This paper presents the characteristics of path loss produced by traffic sign blockage. Multi frequency bands including high frequency bands up to 40 GHz are analyzed on the basis of measurement results in urban microcell environments. It is shown that the measured path loss increases compared to free space path loss even on a straight line-of-sight road, and that the excess attenuation is caused by the blockage effects of traffic signs. It is also shown that the measurement area affected by the blockage becomes small as frequency increases. The blocking object occupies the same area for all frequencies, but it takes up a larger portion of the Fresnel Zone as frequency increases. Therefore, if blockage occurs, the excess loss in high frequency bands becomes larger than in low frequency bands. In addition, the validity of two blockage path loss models is verified on the basis of measurement results. The first is the 3GPP blockage model and the second is the proposed blockage model, which is an expanded version of the basic diffraction model in ITU-R P.526. It is shown that these blockage models can predict the path loss increased by the traffic sign blockage and that their root mean square error can be improved compared to that of the 3GPP two slope model and a free space path loss model. The 3GPP blockage model is found to be more accurate for 26.4 and 37.1GHz, while the proposed model is more accurate for 0.8, 2.2, and 4.7GHz. The results show the blockage path loss due to traffic signs is clarified in a wide frequency range, and it is verified that the 3GPP blockage model and the proposed blockage model can accurately predict the blockage path loss.

  • Full-Duplex Cooperative Cognitive Radio Networks with Simultaneous Transmit and Receive Antennas in MIMO Channels

    Sangwoo PARK  Iickho SONG  Seungwon LEE  Seokho YOON  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/01/31
      Vol:
    E101-B No:8
      Page(s):
    1903-1915

    We propose a cooperative cognitive radio network (CCRN) with secondary users (SUs) employing two simultaneous transmit and receive (STAR) antennas. In the proposed framework of full-duplex (FD) multiple-input-multiple-output (MIMO) CCRN, the region of achievable rate is expanded via FD communication among SUs enabled by the STAR antennas adopted for the SUs. The link capacity of the proposed framework is analyzed theoretically. It is shown through numerical analysis that the proposed FD MIMO-CCRN framework can provide a considerable performance gain over the conventional frameworks of CCRN and MIMO-CCRN.

  • Decentralized Event-Triggered Control of Composite Systems Using M-Matrices

    Kenichi FUKUDA  Toshimitsu USHIO  

     
    PAPER-Systems and Control

      Vol:
    E101-A No:8
      Page(s):
    1156-1161

    A composite system consists of many subsystems, which have interconnections with other subsystems. For such a system, in general, we utilize decentralized control, where each subsystem is controlled by a local controller. On the other hand, event-triggered control is one of useful approaches to reduce the amount of communications between a controller and a plant. In the event-triggered control, an event triggering mechanism (ETM) monitors the information of the plant, and determines the time to transmit the data. In this paper, we propose a design of ETMs for the decentralized event-triggered control of nonlinear composite systems using an M-matrix. We consider the composite system where there is an ETM for each subsystem, and ETMs monitor local states of the corresponding subsystems. Each ETM is designed so that the composite system is stabilized. Moreover, we deal with the case of linear systems. Finally, we perform simulation to show that the proposed triggering rules are useful for decentralized control.

  • Weighted Subtask Controller for Redundant Manipulator Using Auxiliary Positive Function

    Youngjun YOO  Daesung JUNG  Sangchul WON  

     
    PAPER-Systems and Control

      Vol:
    E101-A No:8
      Page(s):
    1162-1171

    We propose a weighted subtask controller and sufficient conditions for boundedness of the controller both velocity and acceleration domain. Prior to designing the subtask controller, a task controller is designed for global asymptotic stability of task space error and subtask error. Although the subtask error converges to zero by the task controller, the boundedness of the subtask controller is also important, therefore its boundedness conditions are presented. The weighted pseudo inverse is introduced to relax the constraints of the null-space of Jacobian. Using the pseudo inverse, we design subtask controller and propose sufficient conditions for boundedness of the auxiliary signal to show the existence of the inverse kinematic solution. The results of experiments using 7-DOF WAM show the effectiveness of the proposed controller.

  • An Extended Generalized Minimum Distance Decoding for Binary Linear Codes on a 4-Level Quantization over an AWGN Channel

    Shunsuke UEDA  Ken IKUTA  Takuya KUSAKA  Md. Al-Amin KHANDAKER  Md. Arshad ALI  Yasuyuki NOGAMI  

     
    PAPER-Coding Theory

      Vol:
    E101-A No:8
      Page(s):
    1235-1244

    Generalized Minimum Distance (GMD) decoding is a well-known soft-decision decoding for linear codes. Previous research on GMD decoding focused mainly on unquantized AWGN channels with BPSK signaling for binary linear codes. In this paper, a study on the design of a 4-level uniform quantizer for GMD decoding is given. In addition, an extended version of a GMD decoding algorithm for a 4-level quantizer is proposed, and the effectiveness of the proposed decoding is shown by simulation.

  • Autonomous, Decentralized and Privacy-Enabled Data Preparation for Evidence-Based Medicine with Brain Aneurysm as a Phenotype

    Khalid Mahmood MALIK  Hisham KANAAN  Vian SABEEH  Ghaus MALIK  

     
    PAPER

      Pubricized:
    2018/02/22
      Vol:
    E101-B No:8
      Page(s):
    1787-1797

    To enable the vision of precision medicine, evidence-based medicine is the key element. Understanding the natural history of complex diseases like brain aneurysm and particularly investigating the evidences of its rupture risk factors relies on the existence of semantic-enabled data preparation technology to conduct clinical trials, survival analysis and outcome prediction. For personalized medicine in the field of neurological diseases, it is very important that multiple health organizations coordinate and cooperate to conduct evidence based observational studies. Without the means of automating the process of privacy and semantic-enabled data preparation to conduct observational studies at intra-organizational level would require months to manually prepare the data. Therefore, this paper proposes a semantic and privacy enabled, multi-party data preparation architecture and a four-tiered semantic similarity algorithm. Evaluation shows that proposed algorithm achieves a precision of 79%, high recall at 83% and F-measure of 81%.

  • Frequency-Dependent LOD-FDTD Method in Cylindrical Coordinates

    Jun SHIBAYAMA  Tatsuyuki HARA  Masato ITO  Junji YAMAUCHI  Hisamatsu NAKANO  

     
    BRIEF PAPER

      Vol:
    E101-C No:8
      Page(s):
    637-639

    The locally one-dimensional finite-difference time-domain (FDTD) method in cylindrical coordinates is extended to a frequency-dependent version. The fundamental scheme is utilized to perform matrix-operator-free formulations in the right-hand sides. For the analysis of surface plasmon polaritons propagating along a plasmonic grating, the computation time is significantly reduced to less than 10%, compared with the explicit cylindrical FDTD method.

  • Tighter Generalization Bounds for Matrix Completion Via Factorization Into Constrained Matrices

    Ken-ichiro MORIDOMI  Kohei HATANO  Eiji TAKIMOTO  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2018/05/18
      Vol:
    E101-D No:8
      Page(s):
    1997-2004

    We prove generalization error bounds of classes of low-rank matrices with some norm constraints for collaborative filtering tasks. Our bounds are tighter, compared to known bounds using rank or the related quantity only, by taking the additional L1 and L∞ constraints into account. Also, we show that our bounds on the Rademacher complexity of the classes are optimal.

  • Pseudonym and Key Management Scheme for Supporting Social Smart Applications

    Yusuke FUKUSHIMA  Ved P. KAFLE  Hiroaki HARAI  

     
    PAPER

      Pubricized:
    2018/02/22
      Vol:
    E101-B No:8
      Page(s):
    1775-1786

    Both placing responsibility of message sending on every IoT object and obfuscating the object's location from other objects are essential to realize a secure and privacy-preserved communication service. Two or more short-lived link identifiers (or pseudonyms) authorized by a trustable authority are often used in related studies, instead of a persistent or long-term use link identifier (i.e. vendor assigned MAC address). However, related studies have limitations in terms of frequently changing pseudonyms to enhance location privacy because the cryptographic algorithms used in them fixedly couple object's identifiers with its security keys. To overcome those limitations, we present a new pseudonym and key management scheme that enables dynamic coupling of pseudonym and key pairs without incurring any adverse impacts. Furthermore, we propose two lightweight pseudonym allocation protocols to effectively reduce the volume of message carrying the allocation parameters. Through qualitative analyses, we verify that the proposed scheme is more scalable than related approaches as it can efficiently allocate enough number of pseudonym/key pairs by reducing the control message overhead by more than 90%.

  • Revealing of the Underlying Mechanism of Different Node Centralities Based on Oscillation Dynamics on Networks

    Chisa TAKANO  Masaki AIDA  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/02/01
      Vol:
    E101-B No:8
      Page(s):
    1820-1832

    In recent years, with the rapid development of the Internet and cloud computing, an enormous amount of information is exchanged on various social networking services. In order to handle and maintain such a mountain of information properly by limited resources in the network, it is very important to comprehend the dynamics for propagation of information or activity on the social network. One of many indices used by social network analysis which investigates the network structure is “node centrality”. A common characteristic of conventional node centralities is that it depends on the topological structure of network and the value of node centrality does not change unless the topology changes. The network dynamics is generated by interaction between users whose strength is asymmetric in general. Network structure reflecting the asymmetric interaction between users is modeled by a directed graph, and it is described by an asymmetric matrix in matrix-based network model. In this paper, we showed an oscillation model for describing dynamics on networks generated from a certain kind of asymmetric interaction between nodes by using a symmetric matrix. Moreover, we propose a new extended index of well-known two node centralities based on the oscillation model. In addition, we show that the proposed index can describe various aspect of node centrality that considers not only the topological structure of the network, but also asymmetry of links, the distribution of source node of activity, and temporal evolution of activity propagation by properly assigning the weight of each link. The proposed model is regarded as the fundamental framework for different node centralities.

  • A Reactive Management System for Reliable Power Supply in a Building Microgrid with Vehicle-to-Grid Interaction

    Shoko KIMURA  Yoshihiko SUSUKI  Atsushi ISHIGAME  

     
    PAPER-Systems and Control

      Vol:
    E101-A No:8
      Page(s):
    1172-1184

    We address a BEMS (Building Energy Management System) to guarantee reliability of electric-power supply in dynamic uncertain environments. The building microgrid as the target of BEMS has multiple distributed power sources including a photo-voltaic power system and Electric-Vehicle (EV). EV is regarded as an autonomously-moving battery due to the original means of transportation and is hence a cause of dynamic uncertainty of the building microgrid. The main objective of synthesis of BEMS in this paper is to guarantee the continuous supply of power to the most critical load in a building microgrid and to realize the power supply to the other loads according to a ranking of load importance. We synthesize the BEMS as a reactive control system that monitors changes of dynamic uncertain environment of the microgrid including departure and arrival of an EV, and determines a route of power supply to the most critical load. Also, we conduct numerical experiments of the reactive BEMS using models of power flows in the building and of charging states of the batteries. The experiments are incorporated with data measured in a practical office building and demonstration project of EMS at Osaka, Japan. We show that the BEMS works for extending the time duration of continuous power supply to the most critical load.

  • Analysis of the k-Error Linear Complexity and Error Sequence for 2pn-Periodic Binary Sequence

    Zhihua NIU  Deyu KONG  Yanli REN  Xiaoni DU  

     
    PAPER-Cryptography and Information Security

      Vol:
    E101-A No:8
      Page(s):
    1197-1203

    The k-error linear complexity of a sequence is a fundamental concept for assessing the stability of the linear complexity. After computing the k-error linear complexity of a sequence, those bits that cause the linear complexity reduced also need to be determined. For binary sequences with period 2pn, where p is an odd prime and 2 is a primitive root modulo p2, we present an algorithm which computes the minimum number k such that the k-error linear complexity is not greater than a given constant c. The corresponding error sequence is also obtained.

  • An Energy-Efficient Mobile Group Clustering Protocol for Wireless Sensor Networks

    Mochammad Zen Samsono HADI  Yuichi MIYAJI  Hideyuki UEHARA  

     
    PAPER-Network

      Pubricized:
    2018/02/19
      Vol:
    E101-B No:8
      Page(s):
    1866-1875

    In this paper, we present an Energy-efficient Mobile Group Clustering (EMGC) protocol that supports group mobility and a group handover scheme. The mobile sensor nodes are divided into three categories, namely cluster heads, group leaders and group members. In our cluster formation and group handover scheme, group leaders and cluster heads do most of the communications to save on energy consumption during which group members are placed in the sleep condition. This scheme will reduce the number of control packets and frequent topology changes in the networks. Simulation results show that the EMGC protocol outperforms MN-LEACH, GMAC, MBC protocols in terms of energy dissipation and the number of data items received at a base station.

  • An On-The-Fly Jitter Suppression Technique for Plain-CMOS-Logic-Based Timing Verniers: Dynamic Power Compensation with the Extensions of Digitally Variable Delay Lines

    Nobutaro SHIBATA  Mitsuo NAKAMURA  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E101-A No:8
      Page(s):
    1185-1196

    Timing vernier (i.e., digital-to-time converter) is a key component of the pin-electronics circuit board installed in automated digital-VLSI test equipment, and it is used to create fine delays of less than one-cycle time of a clock signal. This paper presents a new on-the-fly (timing-) jitter suppression technique which makes it possible to use low-power plain-CMOS-logic-based timing verniers. Using a power-compensation line installed at the poststage of the digitally variable delay line, we make every pulse (used as a timing signal) consume a fixed amount of electric energy independent of the required delay amount. Since the power load of intrapowerlines is kept constantly, the jitter increase in the situation of changing the required delay amount on the fly is suppressed. On the basis of the concept, a 10-ns span, 125-MHz timing-vernier macro was designed and fabricated with a CMOS process for logic VLSIs. Every macro installed in a real-time timing-signal generator VLSI achieved the required timing resolution of 31.25ps with a linearity error within 15ps. The on-the-fly jitter was successfully suppressed to a random jitter level (<26ps p-p).

  • Efficient Transceiver Design for Large-Scale SWIPT System with Time-Switching and Power-Splitting Receivers

    Pham-Viet TUAN  Insoo KOO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2018/01/12
      Vol:
    E101-B No:7
      Page(s):
    1744-1751

    The combination of large-scale antenna arrays and simultaneous wireless information and power transfer (SWIPT), which can provide enormous increase of throughput and energy efficiency is a promising key in next generation wireless system (5G). This paper investigates efficient transceiver design to minimize transmit power, subject to users' required data rates and energy harvesting, in large-scale SWIPT system where the base station utilizes a very large number of antennas for transmitting both data and energy to multiple users equipped with time-switching (TS) or power-splitting (PS) receive structures. We first propose the well-known semidefinite relaxation (SDR) and Gaussian randomization techniques to solve the minimum transmit power problems. However, for these large-scale SWIPT problems, the proposed scheme, which is based on conventional SDR method, is not suitable due to its excessive computation costs, and a consensus alternating direction method of multipliers (ADMM) cannot be directly applied to the case that TS or PS ratios are involved in the optimization problem. Therefore, in the second solution, our first step is to optimize the variables of TS or PS ratios, and to achieve simplified problems. After then, we propose fast algorithms for solving these problems, where the outer loop of sequential parametric convex approximation (SPCA) is combined with the inner loop of ADMM. Numerical simulations show the fast convergence and superiority of the proposed solutions.

  • Multi-Beam Massive MIMO with Beam-Selection Using Only Amplitude Information in Uplink Channel

    Fumiya MURAMATSU  Kentaro NISHIMORI  Ryotaro TANIGUCHI  Takefumi HIRAGURI  

     
    PAPER

      Pubricized:
    2018/01/22
      Vol:
    E101-B No:7
      Page(s):
    1544-1551

    Massive multiple-input multiple-output (MIMO) transmission, in which the number of antennas is considerably more than the number of user terminals, has attracted attention as a key technology in next-generation mobile communication systems, because it enables improvements in the service area and interference mitigation with simple signal processing. Multi-beam massive MIMO employing high-power beam selection in the analog part and a blind algorithm in the digital part, such as the constant modulus algorithm that does not need channel state information, has been proposed and shown to offer high transmission efficiency. In this paper, in order to realize higher transmission rates and communication efficiency, we propose a beam-selection method that uses multi-beam amplitude information only. Furthermore, this method can be realized through signal processing with a simple configuration and is highly suitable for hybrid analog-digital massive MIMO, which is advantageous in terms of cost and power consumption. Here, the effectiveness of the proposed method is verified by computer simulation.

  • Secrecy Throughput Analysis for Time-Switching SWIPT Networks with Full-Duplex Jamming

    Xuanxuan TANG  Wendong YANG  Yueming CAI  Weiwei YANG  Yuyang ZHANG  Xiaoli SUN  Yufeng QIAN  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Vol:
    E101-A No:7
      Page(s):
    1136-1140

    This paper studies the secrecy throughput performance of the three-node wireless-powered networks and proposes two secure transmission schemes, namely the half-duplex maximal ratio combining (HD&MRC) scheme and the full-duplex jamming scheme based on time switching simultaneous wireless information and power transfer (FDJ&TS-SWIPT). The closed-form expressions of the secrecy throughput are derived, and intuitive comparison of the two schemes is provided. It is illustrated that the HD&MRC scheme only applies to the low and medium signal-to-noise ratio (SNR) regime. On the contrary, the suitable SNR regime of the FDJ&TS-SWIPT is much wider. It is depicted that FDJ&TS-SWIPT combing with current passive self-interference cancellation (SIC) algorithm outperforms HD&MRC significantly, especially when a medium or high transmit SNR is provided. Numerical simulations are conducted for verifying the validity of the analysis.

  • Novel Access Control Scheme with Collision Detection Utilizing MIMO Transmission Procedure in WLAN Systems

    Takefumi HIRAGURI  Kentaro NISHIMORI  Yoshiaki MORINO  Mamoru UGAJIN  Hideaki YOSHINO  

     
    PAPER

      Pubricized:
    2018/01/22
      Vol:
    E101-B No:7
      Page(s):
    1561-1574

    This paper proposes a novel access control scheme with collision detection that utilizes multiple-input multiple-output (MIMO) technology. Carrier sense multiple access with collision detection (CSMA/CD) is used in Ethernet wired local area networks (LANs) for media access control (MAC). CSMA/CD can immediately abort a transmission if any collision is detected and is thus able to change to a retransmission state. In Ethernet, CSMA/CD results in a transmission efficiency of approximately 90% because the protocol makes the transmission band available for useful communication by this retransmission function. Conversely, in conventional wireless LANs (WLANs), the packet collisions due to interfering signals and the retransmission due to collisions are significant issues. Because conventional WLANs cannot detect packet collisions during signal transmission, the success of a transmission can only be determined by whether an acknowledgment (ACK) frame has been received. Consequently, the transmission efficiency is low — approximately 60%. The objective of our study is to increase the transmission efficiency of WLANs to make it at least equal to that of Ethernet. Thus, we propose a novel access control scheme with collision detection that utilizes MIMO technology. When preamble signals are transmitted before transmitting data packets from an antenna, the proposed scheme can detect packet collisions during signal transmission at another antenna; then, the affected packets are retransmitted immediately. Two fundamental technologies are utilized to realize our proposed scheme. The first technology is the access control protocol in the MAC layer in the form of the MIMO frame sequence protocol, which is used to detect signal interference. The other technology is signal processing in the physical (PHY) layer that actualizes collision detection. This paper primarily deals with the proposed MAC layer scheme, which is evaluated by theoretical analyses and computer simulations. Evaluation by computer simulations indicate that the proposed scheme in a transmission efficiency of over 90%.

  • Energy-Efficient Mobile Video Delivery Utilizing Moving Route Navigation and Video Playout Buffer Control

    Kenji KANAI  Sakiko TAKENAKA  Jiro KATTO  Tutomu MURASE  

     
    PAPER

      Pubricized:
    2018/01/22
      Vol:
    E101-B No:7
      Page(s):
    1635-1644

    Because mobile users demand a high quality and energy-friendly video delivery service that efficiently uses wireless resources, we introduce an energy-efficient video delivery system by applying moving route navigation and playout buffer control based on the mobile throughput history data. The proposed system first determines the optimal travel route to achieve high-speed and energy-efficient communications. Then when a user enters a high throughput area, our system temporarily extends the video playout buffer size, and the user aggressively downloads video segments via a high-speed and energy-efficient wireless connection until the extended buffer is filled. After leaving this area, the user consumes video segments from the extended buffer in order to keep smooth video playback without wireless communications. We carry out computer simulations, laboratory and field experiments and confirm that the proposed system can achieve energy-efficient mobile video delivery.

  • Multimodal Interference in Perfluorinated Polymer Optical Fibers: Application to Ultrasensitive Strain and Temperature Sensing Open Access

    Yosuke MIZUNO  Goki NUMATA  Tomohito KAWA  Heeyoung LEE  Neisei HAYASHI  Kentaro NAKAMURA  

     
    INVITED PAPER

      Vol:
    E101-C No:7
      Page(s):
    602-610

    We review the recent advances on strain and temperature sensing techniques based on multimodal interference in perfluorinated (PF) graded-index (GI) polymer optical fibers (POFs). First, we investigate their fundamental characteristics at 1300nm. When the core diameter is 62.5µm, we obtain strain and temperature sensitivities of -112pm/µε and +49.8nm/°C, the absolute values of which are, by simple calculation, approximately 13 and over 1800 times as large as those in silica GI multimode fibers, respectively. These ultra-high strain and temperature sensitivities probably originate from the unique PF polymer used as core material. Subsequently, we show that the temperature sensitivity (absolute value) is significantly enhanced with increasing temperature toward ∼70°C, which is close to the glass-transition temperature of the core polymer. When the core diameter is 62.5µm, the sensitivity at 72°C at 1300nm is 202nm/°C, which is approximately 26 times the value obtained at room temperature and >7000 times the highest value previously reported using a silica multimode fiber. Then, we develop a single-end-access configuration of this strain and temperature sensing system, which enhances the degree of freedom in embedding the sensors into structures. The light Fresnel-reflected at the distal open end of the POF is exploited. The obtained strain and temperature sensitivities are shown to be comparable to those in two-end-access configurations. Finally, we discuss the future prospects and give concluding remarks.

2801-2820hit(22683hit)