The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Z(5900hit)

1061-1080hit(5900hit)

  • Bufferless Bidirectional Multi-Ring Networks with Sharing an Optical Burst Mode Transceiver for Any Route

    Kyota HATTORI  Masahiro NAKAGAWA  Toshiya MATSUDA  Masaru KATAYAMA  Katsutoshi KODA  

     
    PAPER

      Pubricized:
    2017/02/08
      Vol:
    E100-D No:5
      Page(s):
    948-962

    Improvement of conventional networks with an incremental approach is an important design method for the development of the future internet. For this approach, we are developing a future aggregation network based on passive optical network (PON) technology to achieve both cost-effectiveness and high reliability. In this paper, we propose a timeslot (TS) synchronization method for sharing a TS from an optical burst mode transceiver between any route of arbitrary fiber length by changing both the route of the TS transmission and the TS control timing on the optical burst mode transceiver. We show the effectiveness of the proposed method for exchanging TSs in bidirectional bufferless wavelength division multiplexing (WDM) and time division multiplexing (TDM) multi-ring networks under the condition of the occurrence of a link failure through prototype systems. Also, we evaluate the reduction of the required number of optical interfaces in a multi-ring network by applying the proposed method.

  • A Miniaturized Absorptive/Transmissive Radome with Switchable Passband and Wide Absorbing Band

    Bo YI  Peiguo LIU  Qihui ZHOU  Tengguang FAN  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2016/11/21
      Vol:
    E100-B No:5
      Page(s):
    788-792

    In this paper, a miniaturized absorptive/transmissive radome with switchable passband and wide absorbing band is designed. Pin diodes are loaded on the radome in order to obtain switchable passband and miniaturized unit cells, while the resistor loaded double square loops are used to absorb the incident wave. The total thickness of the radome is only 4.5mm. Its transmission and absorbing properties are verified by both synthetic experiments and measurements in the anechoic chamber. Furthermore, the switchable passband of the radome is also evaluated using a waveguide simulator.

  • Performance Analysis of Distributed OSTBC-MIMO Systems Using Adaptive M-QAM Transmission over i.n.i.d. Generalized-K Fading Channels

    Jie HE  Kun XIAO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/12/06
      Vol:
    E100-B No:5
      Page(s):
    843-851

    In this paper, the performance of orthogonal space-time block codes (OSTBC) for distributed multiple-input multiple-output (MIMO) systems employing adaptive M-QAM transmission is investigated over independent but not necessarily identically distributed (i.n.i.d.) generalized-K fading channels with arbitrary positive integer-valued k(inversely reflects the shadowing severity) and m (inversely reflects the fading severity). Before this, i.n.i.d. generalized-K fading channel has never been considered for distributed OSTBC-MIMO systems. Especially, the effects of the shape parameter k on the distributed OSTBC-MIMO system performance are unknown. Thus, we investigate mainly the significance of the shape parameter k on the distributed OSTBC-MIMO system performance, in terms of the average symbol error probability (SEP), outage probability, and spectral efficiency (SE). By establishing the system model, the approximated probability density function (PDF) of the equivalent signal to noise ratio (SNR) is derived and thereafter the approximated closed-form expressions of the above performance metrics are obtained successively. Finally, the derived expressions are validated via a set of Monte-Carlo simulations and the implications of the shape parameter k on the overall performance are highlighted.

  • Resource Sharing Strategy for D2D Communication Underlaying Multichannel Cellular Networks

    Yingjing QIAN  Ni ZHOU  Dajiang HE  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/11/21
      Vol:
    E100-B No:5
      Page(s):
    818-825

    Device-to-device (D2D) communication enables two local users to communicate with each other directly instead of relaying through a third party, e.g., base station. In this paper, we study a subchannel sharing strategy underlaying multichannel cellular network for D2D pairs and existing cellular users (CUs). In the investigated scenario, we try to improve the spectrum efficiency of D2D pairs, but inevitably brings cross interference between two user groups. To combat interference, we attempt to assign each D2D pair with appropriate subchannels, which may belong to different CUs, and manipulate transmission power of all users so as to maximize the sum rate of all D2D pairs, while assuring each CU with a minimum data rate on its subchannel set. The formulated problem is a nonconvex problem and thus, obtaining its optimal solution is a tough task. However, we can find optimal power and subchannel assignment for a special case by setting an independent data rate constraint on each subchannel. Then we find an efficient method to calculate a gradient for our original problem. Finally, we propose a gradient-based search method to address the problem with coupled minimum data rate constraint. The performance of our proposed subchannel sharing strategy is illustrated via extensive simulation results.

  • 2D Central DOA Estimation of Coherently Distributed Sources Using a Pair of Uniform Circular Arrays

    Zheng DAI  Weimin SU  Hong GU  

     
    PAPER-Communication Theory and Signals

      Vol:
    E100-A No:5
      Page(s):
    1179-1187

    In this paper, we consider a coherently distributed (CD) source model. Since the CD source is characterized by four parameters: central azimuth direction-of-arrival (DOA), azimuth angular spread, central elevation DOA and elevation angular spread, the parameter estimation is normally complex. We propose an algorithm that combines the rotational invariance techniques (ESPRIT) and the generalized ESPRIT algorithm for the 2-dimensional (2D) central DOA estimation of CD sources. Using a pair of uniform circular arrays (UCAs), the proposed solution is able to obtain the central DOAs with both high accuracy and low computational complexity. The central elevation DOAs are estimated by using the rotational invariance relation between the two uniform circular sub-arrays. Based on the centrosymmetric structure of UCA, the generalized ESPRIT algorithm is then applied to estimate the central azimuth DOAs through one-dimensional searching. It is noteworthy that the central DOAs are estimated without any information of the deterministic angular distribution function (DADF). The performance of the proposed algorithm is demonstrated via computer simulations.

  • Deterministic Particle Swarm Optimizer with the Convergence and Divergence Dynamics

    Tomoyuki SASAKI  Hidehiro NAKANO  Arata MIYAUCHI  Akira TAGUCHI  

     
    LETTER-Nonlinear Problems

      Vol:
    E100-A No:5
      Page(s):
    1244-1247

    In this paper, we propose a new paradigm of deterministic PSO, named piecewise-linear particle swarm optimizer (PPSO). In PPSO, each particle has two search dynamics, a convergence mode and a divergence mode. The trajectory of each particle is switched between the two dynamics and is controlled by parameters. We analyze convergence condition of each particle and investigate parameter conditions to allow particles to converge to an equilibrium point through numerical experiments. We further compare solving performances of PPSO. As a result, we report here that the solving performances of PPSO are substantially the same as or superior to those of PSO.

  • Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud

    Qing WU  Leyou ZHANG  Jingxia ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E100-A No:5
      Page(s):
    1257-1261

    Fuzzy techniques can implement the fine-grained access control of encrypted data in the Cloud because they support error-tolerance. In this system, using biometric attributes such as fingerprints, faces and irises as pubic parameters is advantageous over those systems based on Public Key Infrastructure (PKI). This is because biometric information is unique, unforgettable and non-transferable. However the biometric-attribute measurements are noisy and most of the existing encryption systems can not support the biometric-attribute encryption. Additionally, the previous fuzzy encryption schemes only achieve the selective security which is a weak security model. To overcome these drawbacks, we propose a new fuzzy encryption scheme based on the lattice in this letter. The proposed scheme is based on a hierarchical identity-based encryption with fixed-dimensional private keys space and thus has short public parameters and short private keys, which results in high computation efficiency. Furthermore, it achieves the strong security, i.e., adaptive security. Lastly, the security is reduced to the learning with errors (LWE) problem in the standard model.

  • T-Shaped Probe Waveguide Antenna: A Wideband Reconfigurable Circular-Polarized Single-Port Antenna

    Naoto USAMI  Akira HIROSE  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E100-C No:5
      Page(s):
    490-495

    We propose a wideband reconfigurable circular-polarized single-port antenna to realize high-density linear integration for use in ground penetrating radars. We switch PIN diodes at a T-shaped probe to change its polarization. The forward- and reverse-biased probes work in cooperation to generate circular polarization. Experiments demonstrate the working bandwidths of 20.0% and 18.6% in the left- and right-hand polarization states, respectively, with 7.2 GHz center frequency. They are wider than those of conventional reconfigurable single-port circular-polarized antennas.

  • Variance Analysis for Least p-Norm Estimator in Mixture of Generalized Gaussian Noise

    Yuan CHEN  Long-Ting HUANG  Xiao Long YANG  Hing Cheung SO  

     
    LETTER-Digital Signal Processing

      Vol:
    E100-A No:5
      Page(s):
    1226-1230

    Variance analysis is an important research topic to assess the quality of estimators. In this paper, we analyze the performance of the least ℓp-norm estimator in the presence of mixture of generalized Gaussian (MGG) noise. In the case of known density parameters, the variance expression of the ℓp-norm minimizer is first derived, for the general complex-valued signal model. Since the formula is a function of p, the optimal value of p corresponding to the minimum variance is then investigated. Simulation results show the correctness of our study and the near-optimality of the ℓp-norm minimizer compared with Cramér-Rao lower bound.

  • Fast Montgomery Modular Multiplication and Squaring on Embedded Processors

    Yang LI  Jinlin WANG  Xuewen ZENG  Xiaozhou YE  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2016/12/06
      Vol:
    E100-B No:5
      Page(s):
    680-690

    Montgomery modular multiplication is one of the most efficient algorithms for modular multiplication of large integers. On resource-constraint embedded processors, memory-access operations play an important role as arithmetic operations in the modular multiplication. To improve the efficiency of Montgomery modular multiplication on embedded processors, this paper concentrates on reducing the memory-access operations through adding a few working registers. We first revisit previous popular Montgomery modular multiplication algorithms, and then present improved algorithms for Montgomery modular multiplication and squaring for arbitrary prime fields. The algorithms adopt the general ideas of hybrid multiplication algorithm proposed by Gura and lazy doubling algorithm proposed by Lee. By careful optimization and redesign, we propose novel implementations for Montgomery multiplication and squaring called coarsely integrated product and operand hybrid scanning algorithm (CIPOHS) and coarsely integrated lazy doubling algorithm (CILD). Then, we implement the algorithms on general MIPS64 processor and OCTEON CN6645 processor equipped with specific multiply-add instructions. Experiments show that CIPOHS and CILD offer the best performance both on the general MIPS64 and OCTEON CN6645 processors. But the proposed algorithms have obvious advantages for the processors with specific multiply-add instructions such as OCTEON CN6645. When the modulus is 2048 bits, the CIPOHS and CILD outperform the CIOS algorithm by a factor of 47% and 58%, respectively.

  • SDN-Based Self-Organizing Energy Efficient Downlink/Uplink Scheduling in Heterogeneous Cellular Networks Open Access

    Seungil MOON  Thant Zin OO  S. M. Ahsan KAZMI  Bang Ju PARK  Choong Seon HONG  

     
    INVITED PAPER

      Pubricized:
    2017/02/18
      Vol:
    E100-D No:5
      Page(s):
    939-947

    The increase in network access devices and demand for high quality of service (QoS) by the users have led to insufficient capacity for the network operators. Moreover, the existing control equipment and mechanisms are not flexible and agile enough for the dynamically changing environment of heterogeneous cellular networks (HetNets). This non-agile control plane is hard to scale with ever increasing traffic demand and has become the performance bottleneck. Furthermore, the new HetNet architecture requires tight coordination and cooperation for the densely deployed small cell base stations, particularly for interference mitigation and dynamic frequency reuse and sharing. These issues further complicate the existing control plane and can cause serious inefficiencies in terms of users' quality of experience and network performance. This article presents an SDN control framework for energy efficient downlink/uplink scheduling in HetNets. The framework decouples the control plane from data plane by means of a logically centralized controller with distributed agents implemented in separate entities of the network (users and base stations). The scheduling problem consists of three sub-problems: (i) user association, (ii) power control, (iii) resource allocation and (iv) interference mitigation. Moreover, these sub-problems are coupled and must be solved simultaneously. We formulate the DL/UL scheduling in HetNet as an optimization problem and use the Markov approximation framework to propose a distributed economical algorithm. Then, we divide the algorithm into three sub-routines for (i) user association, (ii) power control, (iii) resource allocation and (iv) interference mitigation. These sub-routines are then implemented on different agents of the SDN framework. We run extensive simulation to validate our proposal and finally, present the performance analysis.

  • Design Differences in Pedestrian Navigation Systems Depending on the Availability of Carriable Navigation Information

    Tetsuya MANABE  Takaaki HASEGAWA  

     
    PAPER-Intelligent Transport System

      Vol:
    E100-A No:5
      Page(s):
    1197-1205

    In this paper, the differences in navigation information design, which is important for kiosk-type pedestrian navigation systems, were experimentally examined depending on presence or absence of carriable navigation information in order to acquire the knowledge to contribute design guidelines of kiosk-type pedestrian navigation systems. In particular, we used route complexity information calculated using a regression equation that contained multiple factors. In the absence of carriable navigation information, both the destination arrival rate and route deviation rate improved. Easy routes were designed as M (17 to 39 characters in Japanese), while complicated routes were denoted as L (40 or more characters in Japanese). On the contrary, in the presence of carriable navigation information, the user's memory load was found to be reduced by carrying the same navigation information as kiosk-type terminals. Thus, the reconsideration of kiosk-type pedestrian navigation systems design, e.g., the means of presenting navigation information, is required. For example, if the system attaches importance to a high destination arrival rate, L_Carrying without regard to route complexity is better. If the system attaching importance to the low route deviation rate, M_Carrying in the case of easy routes and L_Carrying in the case of complicated routes have been better. Consequently, this paper presents the differences in the designs of pedestrian navigation systems depending on whether carriable navigation information is absent or present.

  • A Priority Control Method for Media Access Control Method SP-MAC to Improve Throughput of Bidirectional Flows

    Ryoma ANDO  Ryo HAMAMOTO  Hiroyasu OBATA  Chisa TAKANO  Kenji ISHIDA  

     
    PAPER

      Pubricized:
    2017/02/08
      Vol:
    E100-D No:5
      Page(s):
    984-993

    In IEEE802.11 Wireless Local Area Networks (WLANs), frame collisions occur drastically when the number of wireless terminals connecting to the same Access Point (AP) increases. It causes the decrease of the total throughput of all terminals. To solve this issue, the authors have proposed a new media access control (MAC) method, Synchronized Phase MAC (SP-MAC), based on the synchronization phenomena of coupled oscillators. We have addressed the network environment in which only uplink flows from the wireless terminal to an AP exist. However, it is necessary to take into consideration of the real network environment in which uplink and downlink flows are generated simultaneously. If many bidirectional data flows exist in the WLAN, the AP receives many frames from both uplink and downlink by collision avoidance of SP-MAC. As a result, the total throughput decreases by buffer overflow in the AP. In this paper, we propose a priority control method based on SP-MAC for avoiding the buffer overflow in the AP under the bidirectional environment. Also, we show that the proposed method has an effect for improving buffer overflow in the AP and total throughput by the simulation.

  • Effect of Nitrogen-Doped LaB6 Interfacial Layer on Device Characteristics of Pentacene-Based OFET

    Yasutaka MAEDA  Shun-ichiro OHMI  Tetsuya GOTO  Tadahiro OHMI  

     
    PAPER

      Vol:
    E100-C No:5
      Page(s):
    463-467

    In this paper, the effect of a nitrogen-doped (N-doped) LaB6 interfacial layer (IL) on p-type pentacene-based OFET was investigated. The pentacene-based OFET with top-contact/back-gate geometry was fabricated. A 2-nm-thick N-doped LaB6 interfacial layer deposited on an 8-nm-thick SiO2 gate insulator. A 10-nm-thick pentacene film was deposited by thermal evaporation at 100°C followed by Au contact and Al back gate electrodes formation. The fabricated OFET showed normally- off characteristics and a steep subthreshold swing (SS) of 84 mV/dec. from ID-VG and ID-VD characteristics. Furthermore, the aging characteristics of 6 months after the fabrication were investigated and it was found that VTH and SS were stable when the N-doped LaB6 IL was introduced at the interface between SiO2 gate insulator and pentacene.

  • Adaptive Updating Probabilistic Model for Visual Tracking

    Kai FANG  Shuoyan LIU  Chunjie XU  Hao XUE  

     
    LETTER-Pattern Recognition

      Pubricized:
    2017/01/06
      Vol:
    E100-D No:4
      Page(s):
    914-917

    In this paper, an adaptive updating probabilistic model is proposed to track an object in real-world environment that includes motion blur, illumination changes, pose variations, and occlusions. This model adaptively updates tracker with the searching and updating process. The searching process focuses on how to learn appropriate tracker and updating process aims to correct it as a robust and efficient tracker in unconstrained real-world environments. Specifically, according to various changes in an object's appearance and recent probability matrix (TPM), tracker probability is achieved in Expectation-Maximization (EM) manner. When the tracking in each frame is completed, the estimated object's state is obtained and then fed into update current TPM and tracker probability via running EM in a similar manner. The highest tracker probability denotes the object location in every frame. The experimental result demonstrates that our method tracks targets accurately and robustly in the real-world tracking environments.

  • A Linear-Correction Method for TDOA and FDOA-Based Moving Source Localization

    Bing DENG  Zhengbo SUN  Le YANG  Dexiu HU  

     
    LETTER-Digital Signal Processing

      Vol:
    E100-A No:4
      Page(s):
    1066-1069

    A linear-correction method is developed for source position and velocity estimation using time difference of arrival (TDOA) and frequency difference of arrival (FDOA) measurements. The proposed technique first obtains an initial source location estimate using the first-step processing of an existing algebraic algorithm. It then refines the initial localization result by estimating via weighted least-squares (WLS) optimization and subtracting out its estimation error. The new solution is shown to be able to achieve the Cramer-Rao lower bound (CRLB) accuracy and it has better accuracy over several benchmark methods at relatively high noise levels.

  • An Effective and Simple Solution for Stationary Target Localization Using Doppler Frequency Shift Measurements

    Li Juan DENG  Ping WEI  Yan Shen DU  Wan Chun LI  Ying Xiang LI  Hong Shu LIAO  

     
    LETTER-Digital Signal Processing

      Vol:
    E100-A No:4
      Page(s):
    1070-1073

    Target determination based on Doppler frequency shift (DFS) measurements is a nontrivial problem because of the nonlinear relation between the position space and the measurements. The conventional methods such as numerical iterative algorithm and grid searching are used to obtain the solution, while the former requires an initial position estimate and the latter needs huge amount of calculations. In this letter, to avoid the problems appearing in those conventional methods, an effective solution is proposed, in which two best linear unbiased estimators (BULEs) are employed to obtain an explicit solution of the proximate target position. Subsequently, this obtained explicit solution is used to initialize the problem of original maximum likelihood estimation (MLE), which can provide a more accurate estimate.

  • Internet Data Center IP Identification and Connection Relationship Analysis Based on Traffic Connection Behavior Analysis

    Xuemeng ZHAI  Mingda WANG  Hangyu HU  Guangmin HU  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2016/10/21
      Vol:
    E100-B No:4
      Page(s):
    510-517

    Identifying IDC (Internet Data Center) IP addresses and analyzing the connection relationship of IDC could reflect the IDC network resource allocation and network layout which is helpful for IDC resource allocation optimization. Recent research mainly focuses on minimizing electricity consumption and optimizing network resource allocation based on IDC traffic behavior analysis. However, the lack of network-wide IP information from network operators has led to problems like management difficulties and unbalanced resource allocation of IDC, which are still unsolved today. In this paper, we propose a method for the IP identification and connection relationship analysis of IDC based on the flow connection behavior analysis. In our method, the frequent IP are extracted and aggregated in backbone communication network based on the traffic characteristics of IDC. After that, the connection graph of frequent IP (CGFIP) are built by analyzing the behavior of the users who visit the IDC servers, and IDC IP blocks are thus identified using CGFIP. Furthermore, the connection behavior characteristics of IDC are analyzed based on the connection graphs of IDC (CGIDC). Our findings show that the method can accurately identify the IDC IP addresses and is also capable of reflecting the relationships among IDCs effectively.

  • Improve the Prediction of Student Performance with Hint's Assistance Based on an Efficient Non-Negative Factorization

    Ke XU  Rujun LIU  Yuan SUN  Keju ZOU  Yan HUANG  Xinfang ZHANG  

     
    PAPER

      Pubricized:
    2017/01/17
      Vol:
    E100-D No:4
      Page(s):
    768-775

    In tutoring systems, students are more likely to utilize hints to assist their decisions about difficult or confusing problems. In the meanwhile, students with weaker knowledge mastery tend to choose more hints than others with stronger knowledge mastery. Hints are important assistances to help students deal with questions. Students can learn from hints and enhance their knowledge about questions. In this paper we firstly use hints alone to build a model named Hints-Model to predict student performance. In addition, matrix factorization (MF) has been prevalent in educational fields to predict student performance, which is derived from their success in collaborative filtering (CF) for recommender systems (RS). While there is another factorization method named non-negative matrix factorization (NMF) which has been developed over one decade, and has additional non-negative constrains on the factorization matrices. Considering the sparseness of the original matrix and the efficiency, we can utilize an element-based matrix factorization called regularized single-element-based NMF (RSNMF). We compared the results of different factorization methods to their combination with Hints-Model. From the experiment results on two datasets, we can find the combination of RSNMF with Hints-Model has achieved significant improvement and obtains the best result. We have also compared the Hints-Model with the pioneer approach performance factor analysis (PFA), and the outcomes show that the former method exceeds the later one.

  • Content-Aware Image Retargeting Incorporated with Letterboxing

    Kazu MISHIBA  Yuji OYAMADA  Katsuya KONDO  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2017/01/17
      Vol:
    E100-D No:4
      Page(s):
    865-873

    Conventional image retargeting methods fail to avoid distortion in the case where visually important regions are distributed all over the image. To reduce distortions, this paper proposes a novel image retargeting method that incorporates letterboxing into an image warping framework. Letterboxing has the advantage of producing results without distortion or content loss although being unable to use the entire display area. Therefore, it is preferable to combine a retargeting method with a letterboxing operator when displaying images in full screen. Experimental results show that the proposed method is superior to conventional methods in terms of visual quality measured by an objective metric.

1061-1080hit(5900hit)