The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Z(5915hit)

2601-2620hit(5915hit)

  • On the User-Level Satisfactions with User-Level Utility Functions: A Case Study with Scheduling in TDMA Wireless Networks

    Sungyeon KIM  Jang-Won LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:4
      Page(s):
    1037-1040

    In most cases in wireless networks, a user has a two-way communication that consists of two sessions: uplink and downlink sessions, and its overall satisfaction to the communication depends on the quality of service of both sessions. However, in most previous approaches in wireless resource allocation, the satisfactions of a user for its uplink and downlink sessions are modeled separately and treated independently, which fails to accurately model user's overall satisfaction to its communication. Hence, in this paper we model user's overall satisfaction to its communication considering both its uplink and downlink sessions. To this end, we propose a novel concept for a utility function to model user's overall satisfaction to its communication, which is called a user-level utility function, considering user's satisfaction to uplink and downlink sessions jointly. To show the appropriateness of our approach, we apply our user-level utility functions to scheduling problems in TDMA wireless networks and show the performance improvement of our approach over the traditional approach that does not treat uplink and downlink sessions of a user jointly.

  • Queueing Delay and Energy Efficiency Analyses of Sleep Based Power Saving Mechanism

    Fan ZHU  Yiqun WU  Zhisheng NIU  

     
    LETTER-Energy in Electronics Communications

      Vol:
    E93-B No:4
      Page(s):
    1069-1072

    In wireless networks, sleep mode based power saving mechanisms can reduce the energy consumption at the expense of additional packet delay. This letter analyzes its packet queueing delay and wireless terminals' energy efficiency. Based on the analysis, optimal sleep window size can be derived to optimize terminal energy efficiency with delay constraint.

  • Design of Narrow Wall Windows in a Waveguide to Feed Partially-Dielectric-Filled Oversized-Rectangular Waveguide Based on 2-Dimensional Analyses of Two Orthogonal Directions

    Miroslav SAMARDIJA  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Devices/Circuits for Communications

      Vol:
    E93-B No:4
      Page(s):
    871-878

    A series of windows in the narrow wall of a fully-dielectric-filled rectangular waveguide to feed partially-dielectric-filled oversized-rectangular waveguide is presented. The overall structure is single-layer and 3-dimensional however; the waveguide which is uniform along the height is analyzed by the 2-dimensional method of moments and the oversized waveguide which is uniform in the longitudinal direction of the waveguide is analyzed by the 2-dimensional mode matching. It is found that utilizing simple mode conversions between the two orthogonally uniform structures is sufficient for obtaining the results similar to those of a 3-dimensional solver HFSS. The parameters for the windows designed for a uniform input division are presented. A simulation shows that a 12 window array provides a 3.5% bandwidth in terms of reflection below -20 dB. The uniform excitation of the quasi-TEM wave is confirmed in the 60 GHz band by measuring a uniform aperture field in amplitude and phase over the slotted oversized-waveguide.

  • Approximation to the Minimum Cost Edge Installation Problem

    Ehab MORSY  Hiroshi NAGAMOCHI  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E93-A No:4
      Page(s):
    778-786

    We consider the minimum cost edge installation problem (MCEI) in a graph G=(V,E) with edge weight w(e)≥ 0, e∈ E. We are given a vertex s∈ V designated as a sink, an edge capacity λ>0, and a source set S⊆ V with demand q(v)∈ [0,λ], v∈ S. For each edge e∈ E, we are allowed to install an integer number h(e) of copies of e. MCEI asks to send demand q(v) from each source v∈ S along a single path Pv to the sink s without splitting the demand of any source v∈ S. For each edge e∈ E, a set of such paths can pass through a single copy of e in G as long as the total demand along the paths does not exceed the edge capacity λ. The objective is to find a set P={Pv| v∈ S∈ of paths of G that minimizes the installing cost ∑e∈ E h(e)w(e). In this paper, we propose a (15/8+ρST)-approximation algorithm to MCEI, where ρST is any approximation ratio achievable for the Steiner tree problem.

  • On Detecting Target Acoustic Signals Based on Non-negative Matrix Factorization

    Yu Gwang JIN  Nam Soo KIM  

     
    LETTER-Pattern Recognition

      Vol:
    E93-D No:4
      Page(s):
    922-925

    In this paper, we propose a novel target acoustic signal detection approach which is based on non-negative matrix factorization (NMF). Target basis vectors are trained from the target signal database through NMF, and input vectors are projected onto the subspace spanned by these target basis vectors. By analyzing the distribution of time-varying normalized projection error, the optimal threshold can be calculated to detect the target signal intervals during the entire input signal. Experimental results show that the proposed algorithm can detect the target signal successfully under various signal environments.

  • Some Constacyclic and Cyclic Codes Over Fq[u]/<ut+1>

    Reza SOBHANI  Morteza ESMAEILI  

     
    PAPER-Coding Theory

      Vol:
    E93-A No:4
      Page(s):
    808-813

    A generalized Gray map for codes over the ring Fq[u]/ is introduced, where q=pm is a prime power. It is shown that the generalized Gray image of a linear length-N (1-ut)-cyclic code over Fq[u]/ is a distance-invariant linear length-qtN quasi-cyclic code of index qt/p over Fq. It turns out that if (N,p)=1 then every linear code over Fq that is the generalized Gray image of a length-N cyclic code over Fq[u]/, is also equivalent to a linear length-qtN quasi-cyclic code of index qt/p over Fq. The relationship between linear length-pN cyclic codes with (N,p)=1 over Fp and linear length-N cyclic codes over Fp+uFp is explicitly determined.

  • Low Noise Receivers Based on Superconducting Niobium Nitride Hot Electron Bolometer Mixers from 0.65 to 3.1 Terahertz Open Access

    Min LIANG  Jian CHEN  Lin KANG  Biaobing JIN  Weiwei XU  Peiheng WU  

     
    INVITED PAPER

      Vol:
    E93-C No:4
      Page(s):
    473-479

    Low noise terahertz (THz) receivers based on superconducting niobium nitride (NbN) hot electron bolometer (HEB) mixers have been designed, fabricated and measured for applications in astronomy and cosmology. The NbN HEB mixer consists of a planar antenna and an NbN bridge connecting across the antenna's inner terminals on a high-resistivity Si substrate. To eliminate the influence of direct detection and instability of the local oscillation (LO) power, a wire grid has been used to change the input LO power for compensating the shift of bias current during Y-factor measurement. The double sideband (DSB) receiver noise temperatures at 4.2 K without corrections have been measured from 0.65 to 3.1 THz. The excess quantum noise factor β of about 4 has been obtained, which agrees well with the calculated value. Allan variance of the HEB has been characterized, and Allan time TA longer than 0.4 s is obtained. We also estimated the temperature resolution of the HEB from the Allan variance and obtained the minimum temperature resolution of 1.1 K using a Gunn oscillator with its multipliers at 0.65 THz as an LO source.

  • Adaptive Spread-Transform Dither Modulation Using a New Perceptual Model for Color Image Watermarking

    Lihong MA  Dong YU  Gang WEI  Jing TIAN  Hanqing LU  

     
    PAPER-Information Network

      Vol:
    E93-D No:4
      Page(s):
    843-857

    Major challenges of the conventional spread-transform dither modulation (STDM) watermarking approach are two-fold: (i) it exploits a fixed watermarking strength (more particularly, the quantization index step size) to the whole cover image; and (ii) it is fairly vulnerable to the amplitude changes. To tackle the above challenges, an adaptive spread-transform dither modulation (ASTDM) approach is proposed in this paper for conducting robust color image watermarking by incorporating a new perceptual model into the conventional STDM framework. The proposed approach exploits a new perceptual model to adjust the quantization index step sizes according to the local perceptual characteristics of a cover image. Furthermore, in contrast to the conventional Watson's model is vulnerable to the amplitude changes, our proposed new perceptual model makes the luminance masking thresholds be consistent with any amplitude change, while keeping the consistence to the properties of the human visual system. In addition, certain color artifacts could be incurred during the watermark embedding procedure, since some intensity values are perceptibly changed to label the watermark. For that, a color artifact suppression algorithm is proposed by mathematically deriving an upper bound for the intensity values according to the inherent relationship between the saturation and the intensity components. Extensive experiments are conducted using 500 images selected from Corel database to demonstrate the superior performance of the proposed ASTDM approach.

  • Development of Generation System of Simplified Digital Maps

    Keiichi UCHIMURA  Masato KAWANO  Hiroki TOKITSU  Zhencheng HU  

     
    PAPER

      Vol:
    E93-A No:4
      Page(s):
    700-710

    In recent years, digital maps have been used in a variety of scenarios, including car navigation systems and map information services over the Internet. These digital maps are formed by multiple layers of maps of different scales; the map data most suitable for the specific situation are used. Currently, the production of map data of different scales is done by hand due to constraints related to processing time and accuracy. We conducted research concerning technologies for automatic generation of simplified map data from detailed map data. In the present paper, the authors propose the following: (1) a method to transform data related to streets, rivers, etc. containing widths into line data, (2) a method to eliminate the component points of the data, and (3) a method to eliminate data that lie below a certain threshold. In addition, in order to evaluate the proposed method, a user survey was conducted; in this survey we compared maps generated using the proposed method with the commercially available maps. From the viewpoint of the amount of data reduction and processing time, and on the basis of the results of the survey, we confirmed the effectiveness of the automatic generation of simplified maps using the proposed methods.

  • Overlay Transmission System on Wireless LAN with RTS/CTS Exchange Taking into Account Timing Synchronization

    Kilsoo JEONG  Kazuto YANO  Satoshi TSUKAMOTO  Makoto TAROMARU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:3
      Page(s):
    640-649

    This paper proposes a new overlay transmission system for wireless LAN with RTS/CTS exchange. Conventional timing synchronization schemes may fail in the presence of inter-system interference, because they have not been designed for overlay transmission. In the proposed system, a transmitter estimates the transmission timing of the next wireless LAN DATA frame, and then sends its DATA frame at almost the same time as the estimated transmission timing to easily establish timing synchronization at the receiver. Moreover, we employ a tapped delay line adaptive array antenna at both transmitter and receiver to effectively suppress interference due to overlay transmission in a rich multipath propagation environment. The frame error rate performances of the proposed system and the IEEE 802.11a wireless LAN are evaluated through computer simulations that assume an exponentially decaying 8-path non-line-of-sight fading channel and include a timing synchronization process. Simulation results demonstrate that the proposed system can achieve overlay transmission while avoiding interference in a rich multipath propagation environment.

  • LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network

    Xiaofeng LU  Pan HUI  Don TOWSLEY  Juhua PU  Zhang XIONG  

     
    PAPER

      Vol:
    E93-D No:3
      Page(s):
    503-509

    In this paper, we propose an anonymous routing protocol, LOPP, to protect the originator's location privacy in Delay/Disruption Tolerant Network (DTN). The goals of our study are to minimize the originator's probability of being localized (Pl) and maximize the destination's probability of receiving the message (Pr). The idea of LOPP is to divide a sensitive message into k segments and send each of them to n different neighbors. Although message fragmentation could reduce the destination's probability to receive a complete message, LOPP can decrease the originator's Pl. We validate LOPP on a real-world human mobility dataset. The simulation results show that LOPP can decrease the originator's Pl by over 54% with only 5.7% decrease in destination's Pr. We address the physical localization issue of DTN, which was not studied in the literature.

  • Self Organizing Topology Transformation for Peer-To-Peer (P2P) Networks

    Suyong EUM  Shin'ichi ARAKAWA  Masayuki MURATA  

     
    PAPER

      Vol:
    E93-B No:3
      Page(s):
    516-524

    Topological structure of peer-to-peer (P2P) networks affects their operating performance. Thus, various models have been proposed to construct an efficient topology for the P2P networks. However, due to the simultaneous failures of peers and other disastrous events, it is difficult to maintain the originally designed topological structure that provides the network with some performance benefits. For this reason, in this paper we propose a simple local rewiring method that changes the network topology to have small diameter as well as highly clustered structure. Moreover, the presented evaluation study shows how these topological properties are involved with the performance of P2P networks.

  • Development of an XYZ Digital Camera with Embedded Color Calibration System for Accurate Color Acquisition

    Maciej KRETKOWSKI  Ryszard JABLONSKI  Yoshifumi SHIMODAIRA  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E93-D No:3
      Page(s):
    651-653

    Acquisition of accurate colors is important in the modern era of widespread exchange of electronic multimedia. The variety of device-dependent color spaces causes troubles with accurate color reproduction. In this paper we present the outlines of accomplished digital camera system with device-independent output formed from tristimulus XYZ values. The outstanding accuracy and fidelity of acquired color is achieved in our system by employing an embedded color calibration system based on emissive device generating reference calibration colors with user-defined spectral distribution and chromaticity coordinates. The system was tested by calibrating the camera using 24 reference colors spectrally reproduced from 24 color patches of the Macbeth Chart. The average color difference (CIEDE2000) has been found to be ΔE = 0.83, which is an outstanding result compared to commercially available digital cameras.

  • Virtualized Optical Network (VON) for Future Internet and Applications

    Masahiko JINNO  Yukio TSUKISHIMA  Hidehiko TAKARA  Bartlomiej KOZICKI  Yoshiaki SONE  Toshikazu SAKANO  

     
    PAPER

      Vol:
    E93-B No:3
      Page(s):
    470-477

    A virtualized optical network (VON) is proposed as a key to implementing increased agility and flexibility into the future Internet and applications by providing any-to-any connectivity with the appropriate optical bandwidth at the appropriate time. The VON is enabled by introducing optical transparentization and optical fine granular grooming based on optical orthogonal frequency division multiplexing.

  • Equations of States in Statistical Learning for an Unrealizable and Regular Case

    Sumio WATANABE  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E93-A No:3
      Page(s):
    617-626

    Many learning machines that have hierarchical structure or hidden variables are now being used in information science, artificial intelligence, and bioinformatics. However, several learning machines used in such fields are not regular but singular statistical models, hence their generalization performance is still left unknown. To overcome these problems, in the previous papers, we proved new equations in statistical learning, by which we can estimate the Bayes generalization loss from the Bayes training loss and the functional variance, on the condition that the true distribution is a singularity contained in a learning machine. In this paper, we prove that the same equations hold even if a true distribution is not contained in a parametric model. Also we prove that, the proposed equations in a regular case are asymptotically equivalent to the Takeuchi information criterion. Therefore, the proposed equations are always applicable without any condition on the unknown true distribution.

  • Integer Frequency Offset Estimator by Frequency Domain Spreading for UWB Multiband-OFDM

    Hyun YANG  Kwang-Soo JEONG  Jae-Hoon YI  Young-Hwan YOU  

     
    LETTER-Communication Theory and Signals

      Vol:
    E93-A No:3
      Page(s):
    648-650

    In this letter, we propose an integer carrier frequency offset (IFO) estimator in the presence of symbol timing error for an ultra-wideband multi-band orthogonal frequency division multiplexing (UWB MB-OFDM) system. The proposed IFO estimator uses frequency-domain spreaded data symbol which is provided in the MB-OFDM system. To demonstrate the accuracy of the proposed IFO estimator, comparisons are made with conventional estimators via computer simulation.

  • Evolutionary Game Theoretic Approach to Self-Organized Data Aggregation in Delay Tolerant Networks

    K. Habibul KABIR  Masahiro SASABE  Tetsuya TAKINE  

     
    PAPER

      Vol:
    E93-B No:3
      Page(s):
    490-500

    Custody transfer in delay tolerant networks (DTNs) provides reliable end-to-end data delivery by delegating the responsibility of data transfer among special nodes (custodians) in a hop-by-hop manner. However, storage congestion occurs when data increases and/or the network is partitioned into multiple sub-networks for a long time. The storage congestion can be alleviated by message ferries which move around the network and proactively collect data from the custodians. In such a scenario, data should be aggregated to some custodians so that message ferries can collect them effectively. In this paper, we propose a scheme to aggregate data into selected custodians, called aggregators, in a fully distributed and autonomous manner with the help of evolutionary game theoretic approach. Through theoretical analysis and several simulation experiments, taking account of the uncooperative behavior of nodes, we show that aggregators can be selected in a self-organized manner and the number of aggregators can be controlled to a desired value.

  • Architectures and Technologies for the Future Mobile Internet Open Access

    Dipankar RAYCHAUDHURI  

     
    INVITED LETTER

      Vol:
    E93-B No:3
      Page(s):
    436-441

    This position paper outlines the author's view on architectural directions and key technology enablers for the future mobile Internet. It is pointed out that mobile and wireless services will dominate Internet usage in the near future, and it is therefore important to design next-generation network protocols with features suitable for efficiently serving emerging wireless scenarios and applications. Several key requirements for mobile/wireless scenarios are identified - these include new capabilities such as dynamic spectrum coordination, cross-layer support, disconnection tolerant routing, content addressing, and location awareness. Specific examples of enabling technologies which address some of these requirements are given from ongoing research projects at WINLAB. Topics covered briefly include wireless network virtualization, the cache-and-forward (CNF) protocol, geographic (GEO) protocol stack, cognitive radio protocols, and open networking testbeds.

  • A 58-µW Single-Chip Sensor Node Processor with Communication Centric Design

    Shintaro IZUMI  Takashi TAKEUCHI  Takashi MATSUDA  Hyeokjong LEE  Toshihiro KONISHI  Koh TSURUDA  Yasuharu SAKAI  Hiroshi KAWAGUCHI  Chikara OHTA  Masahiko YOSHIMOTO  

     
    PAPER

      Vol:
    E93-C No:3
      Page(s):
    261-269

    This paper presents an ultra-low-power single-chip sensor-node VLSI for wireless-sensor-network applications. A communication centric design approach has been introduced to reduce the power consumption of the RF circuits and the entire sensor network system, through a vertical cooperative design among circuits, architecture, and communication protocols. The sensor-node LSI features a synchronous media access control (MAC) protocol and integrates a transceiver, i8051 microcontroller, and dedicated MAC processor. The test chip occupies 33 mm2 in a 180-nm CMOS process, including 1.38 M transistors. It dissipates 58.0 µW under a network environment.

  • An Ultrasonic and Air Pressure Sensing System for Detection of Behavior before Getting out of Bed Aided by Fuzzy Theory

    Hayato YAMAGUCHI  Hiroshi NAKAJIMA  Kazuhiko TANIGUCHI  Syoji KOBASHI  Yutaka HATA  

     
    PAPER-Computation and Computational Models

      Vol:
    E93-D No:3
      Page(s):
    542-549

    This paper proposes a sensing system for a behavior detection system using an ultrasonic oscillosensor and an air pressure sensor. The ultrasonic oscillosensor sensor has a cylindrical tank filled with water. It detects the vibration of the target object from the signal reflected from the water surface. This sensor can detect a biological vibration by setting to the bottom bed frame. The air pressure sensor consists of a polypropylene sheet and an air pressure sensor, and detects the pressure information by setting under the bed's mattress. An increase (decrease) in the load placed on the bed is detected by the increase (decrease) in the pressure of the air held in the tube attached to the sheet. We propose a behavior detection system using both sensors, complementally. The system recognizes three states (nobody in bed, keeping quiet in bed, moving in bed) using both sensors, and we detect the behavior before getting out of bed by recognized these states. Fuzzy logic plays a primary role in the system. As the fundamental experiment, we applied the system to five healthy volunteers, the system successfully recognized three states, and detected the behavior before getting out of bed. As the clinical experiment, we applied the system to four elderly patients with dementia, the system exactly detected the behavior before getting out of the bed with enough time for medical care support.

2601-2620hit(5915hit)