The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] access(874hit)

341-360hit(874hit)

  • Performance Analysis of Control Signal Transmission Technique for Cognitive Radios in Dynamic Spectrum Access Networks

    Ren SAKATA  Tazuko TOMIOKA  Takahiro KOBAYASHI  

     
    PAPER-Spectrum Allocation

      Vol:
    E92-B No:12
      Page(s):
    3597-3605

    When cognitive radio (CR) systems dynamically use the frequency band, a control signal is necessary to indicate which carrier frequencies are currently available in the network. In order to keep efficient spectrum utilization, this control signal also should be transmitted based on the channel conditions. If transmitters dynamically select carrier frequencies, receivers have to receive control signals without knowledge of their carrier frequencies. To enable such transmission and reception, this paper proposes a novel scheme called DCPT (Differential Code Parallel Transmission). With DCPT, receivers can receive low-rate information with no knowledge of the carrier frequencies. The transmitter transmits two signals whose carrier frequencies are spaced by a predefined value. The absolute values of the carrier frequencies can be varied. When the receiver acquires the DCPT signal, it multiplies the signal by a frequency-shifted version of the signal; this yields a DC component that represents the data signal which is then demodulated. The performance was evaluated by means of numerical analysis and computer simulation. We confirmed that DCPT operates successfully even under severe interference if its parameters are appropriately configured.

  • Efficient Frequency Sharing of Baseband and Subcarrier Coding UHF RFID Systems

    Jin MITSUGI  Yuusuke KAWAKITA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:12
      Page(s):
    3794-3802

    UHF band passive RFID systems are being steadily adopted by industries because of their capability of long range automatic identification with passive tags. For an application which demands a large number of readers located in a limited geographical area, referred to as dense reader mode, interference rejection among readers is important. The coding method, baseband or subcarrier coding, in the tag-to-reader communication link results in a significant influence on the interference rejection performance. This paper examines the frequency sharing of baseband and subcarrier coding UHF RFID systems from the perspective of their transmission delay using a media access control (MAC) simulator. The validity of the numerical simulation was verified by an experiment. It is revealed that, in a mixed operation of baseband and subcarrier systems, assigning as many channels as possible to baseband system unless they do not exploit the subcarrier channels is the general principle for efficient frequency sharing. This frequency sharing principle is effective both to baseband and subcarrier coding systems. Otherwise, mixed operation fundamentally increases the transmission delay in subcarrier coding systems.

  • A Novel Dynamic Channel Access Scheme Using Overlap FFT Filter-Bank for Cognitive Radio

    Motohiro TANABE  Masahiro UMEHIRA  Koichi ISHIHARA  Yasushi TAKATORI  

     
    PAPER-Spectrum Allocation

      Vol:
    E92-B No:12
      Page(s):
    3589-3596

    An OFDMA based channel access scheme is proposed for dynamic spectrum access to utilize frequency spectrum efficiently. Though the OFDMA based scheme is flexible enough to change the bandwidth and channel of the transmitted signals, the OFDMA signal has large PAPR (Peak to Average Power Ratio). In addition, if the OFDMA receiver does not use a filter to extract sub-carriers before FFT (Fast Fourier Transform) processing, the designated sub-carriers suffer large interference from the adjacent channel signals in the FFT processing on the receiving side. To solve the problems such as PAPR and adjacent channel interference encountered in the OFDMA based scheme, this paper proposes a novel dynamic channel access scheme using overlap FFT filter-bank based on single carrier modulation. It also shows performance evaluation results of the proposed scheme by computer simulation.

  • Dynamic Spectrum Access to the Combined Resource of Commercial and Public Safety Bands Based on a WCDMA Shared Network

    Hyoungsuk JEON  Sooyeol IM  Youmin KIM  Seunghee KIM  Jinup KIM  Hyuckjae LEE  

     
    LETTER-Spectrum Allocation

      Vol:
    E92-B No:12
      Page(s):
    3581-3585

    The public safety spectrum is generally under-utilized due to the unique traffic characteristics of bursty and mission critical. This letter considers the application of dynamic spectrum access (DSA) to the combined spectrum of public safety (PS) and commercial (CMR) users in a common shared network that can provide both PS and CMR services. Our scenario includes the 700 MHz Public/Private Partnership which was recently issued by the Federal Communications Commission. We first propose an efficient DSA mechanism to coordinate the combined spectrum, and then establish a call admission control that reflects the proposed DSA in a wideband code division multiple access based network. The essentials of our proposed DSA are opportunistic access to the public safety spectrum and priority access to the commercial spectrum. Simulation results show that these schemes are well harmonized in various network environments.

  • A Simple MAC Protocol for Cognitive Wireless Networks

    Abdorasoul GHASEMI  S. Mohammad RAZAVIZADEH  

     
    PAPER-Protocols

      Vol:
    E92-B No:12
      Page(s):
    3693-3700

    A simple distributed Medium Access Control (MAC) protocol for cognitive wireless networks is proposed. It is assumed that the network is slotted, the spectrum is divided into a number of channels, and the primary network statistical aggregate traffic model on each channel is given by independent Bernoulli random variables. The objective of the cognitive MAC is to maximize the exploitation of the channels idle time slots. The cognitive users can achieve this aim by appropriate hopping between the channels at each decision stage. The proposed protocol is based on the rule of least failures that is deployed by each user independently. Using this rule, at each decision stage, a channel with the least number of recorded collisions with the primary and other cognitive users is selected for exploitation. The performance of the proposed protocol for multiple cognitive users is investigated analytically and verified by simulation. It is shown that as the number of users increases the user decision under this protocol comes close to the optimum decision to maximize its own utilization. In addition, to improve opportunity utilization in the case of a large number of cognitive users, an extension to the proposed MAC protocol is presented and evaluated by simulation.

  • A Novel Interference Cancellation Approach for Interleaved OFDMA Uplink System

    Ruiqin MIAO  Jun SUN  Lin GUI  Jian XIONG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:11
      Page(s):
    3432-3438

    In this paper, the issue of carrier frequency offset (CFO) compensation in interleaved orthogonal frequency division multiple access (OFDMA) uplink system is investigated. To mitigate the effect of multiple access interference (MAI) caused by CFOs of different users, a new parallel interference cancellation (PIC) compensation algorithm is proposed. This scheme uses minimum mean square error (MMSE) criterion to obtain the estimation of interference users, then circular convolutions are employed to restore MAI and compensate CFO. To tackle the complexity problem of circular convolutions, an efficient MAI restoration and cancellation method is developed. Simulations illustrate the good performance and low computational complexity of the proposed algorithm.

  • Throughput and Packet Delay Analysis of the Intermittent DCF for Overlay Access Networks

    Athanassios V. ADAMIS  Konstantinos N. MALIATSOS  Philip CONSTANTINOU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:11
      Page(s):
    3448-3458

    Overlay Access Technology can compensate for the spectrum underutilization problem by exploiting Cognitive Radios capabilities. MAC design is an important aspect of Overlay Access research. In this paper we present the overlay access environment and the challenges it poses to MAC design. Then, we propose the use of a modified Distributed Coordination Function as the MAC protocol for distributed Overlay Access networks. The resulted Intermittent DCF performs with robustness in the demanding overlay access environment, which is characterized by frequent spectrum scan procedure interruptions and low achievable transmission rates. The most recent DCF Markov Chain Model is extended in order to include the overlay operation modifications. Our extension concerns the slot duration expectations calculation which, in the overlay environment, have not constant values but depend on overlay operation parameters. Using the analytical model we evaluate the performance of the DCF under the effect of certain overlay access parameters. The new analytical model predictions are validated with simulations, and are found to accurately capture many interesting features of the overlay operation. Our model can be used in feasibility studies of realistic overlay scenarios and in admission control algorithms of QoS enabled distributed overlay access networks that engage the Intermittent DCF.

  • DOA Estimation Using Iterative MUSIC Algorithm for CDMA Signals

    Ann-Chen CHANG  Jui-Chung HUNG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:10
      Page(s):
    3267-3269

    In conjunction with a first-order Taylor series approximation of the spatial scanning vector, this letter presents an iterative multiple signal classification (MUSIC) direction-of-arrival (DOA) estimation for code-division multiple access signals. This approach leads to a simple one-dimensional optimization problem to find each iterative optimal search grid. It can not only accurately estimate DOA, but also speed up the estimating process. Computer results demonstrate the effectiveness of the proposed algorithm.

  • Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation

    Akira YAMADA  Ayumu KUBOTA  Yutaka MIYAKE  Kazuo HASHIMOTO  

     
    PAPER-DRM and Security

      Vol:
    E92-D No:10
      Page(s):
    1961-1970

    Using Web-based content management systems such as Blog, an end user can easily publish User Generated Content (UGC). Although publishing of UGCs is easy, controlling access to them is a difficult problem for end users. Currently, most of Blog sites offer no access control mechanism, and even when it is available to users, it is not sufficient to control users who do not have an account at the site, not to mention that it cannot control accesses to content hosted by other UGC sites. In this paper, we propose new access control architecture for UGC, in which third party entities can offer access control mechanism to users independently of UGC hosting sites. With this architecture, a user can control accesses to his content that might be spread over many different UGC sites, regardless of whether those sites have access control mechanism or not. The key idea to separate access control mechanism from UGC sites is to apply cryptographic access control and we implemented the idea in such a way that it requires no modification to UGC sites and Web browsers. Our prototype implementation shows that the proposed access control architecture can be easily deployed in the current Web-based communication environment and it works quite well with popular Blog sites.

  • Scalable Parallel Interface for Terabit LAN

    Shoukei KOBAYASHI  Yoshiaki YAMADA  Kenji HISADOME  Osamu KAMATANI  Osamu ISHIDA  

     
    PAPER

      Vol:
    E92-B No:10
      Page(s):
    3015-3021

    We propose a scalable parallel interface that provides an ideal aggregated bandwidth link for an application. The scalable parallel interface uses time information to align packets and allows dynamic lane and/or path change, a large difference in transmission delays among lanes, and so on. The basic performance of the scalable parallel interface in 10 Gb/s 2 lanes is verified using an estimation board that is newly developed to evaluate the basic functions used in a Terabit LAN. The evaluation shows that the scalable parallel interface achieves a very low delay variation that is almost the same as that under back-to-back conditions. The difference in the delay variation between the scalable parallel interface and the back-to-back condition is approximately 10 ns when the transmission delay time varies from 10 µs to 1 s.

  • A Self-Adaptive Routing Protocol in Wireless LANs Based on Attractor Selection

    Gen NISHIKAWA  Tomoko IZUMI  Fukuhito OOSHITA  Hirotsugu KAKUGAWA  Toshimitsu MASUZAWA  

     
    PAPER-Computation and Computational Models

      Vol:
    E92-D No:10
      Page(s):
    2016-2024

    Wireless LANs, which consist of access points and wireless stations, have widely spread in recent years. Routing in wireless LANs suffers the problem that each wireless station selects an access point and a wired path to its destination station. It is desired to design an adaptive routing protocol for wireless LANs since throughputs of communications are dynamically affected by selections of other wireless stations and external environmental changes. In this paper, we propose a routing protocol for wireless LANs based on attractor selection. Attractor selection is a biologically inspired approach, and it has high adaptability to dynamic environmental changes. By applying attractor selection, each wireless station can adaptively select its access point and wired path with high throughput against environmental changes. In addition, we design the protocol with a new technique: combination of multiple attractor selections. The technique is useful because it enables us to divide a problem into several simpler problems. To the best of our knowledge, our protocol is the first one designed around a combination of multiple attractor selections. We show the effectiveness and adaptability of our protocol by simulations.

  • A Random Access Scheme Robust to Timing Offsets for Uplink OFDMA Systems

    Minjoong RIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E92-B No:10
      Page(s):
    3274-3276

    If ranging processes are not frequent in an uplink OFDMA system, timing synchronization between the base and mobile stations may not be maintained and the performance may be degraded. This paper proposes a random access scheme in which a short OFDMA symbol is transmitted to maintain the orthogonality with timing offsets. A short symbol is constructed by inserting zero-padding to an OFDMA symbol.

  • Error Analysis of Hybrid DS-Multiband-UWB Multiple Access System in the Presence of Narrowband Interference

    Chin-Sean SUM  Mohammad Azizur RAHMAN  Shigenobu SASAKI  Hiroshi HARADA  Shuzo KATO  

     
    PAPER-Ultra Wideband System

      Vol:
    E92-A No:9
      Page(s):
    2167-2176

    This paper proposes a hybrid multiband (MB) ultra wideband (UWB) system with direct sequence (DS) spreading. The theoretical error analysis for the DS-MB-UWB multiple access system with Rake receiver in the presence of multipath and narrowband interference is developed. The developed theoretical framework models the multiple access interference (MAI), multipath interference (MI) and narrowband interference for the designed UWB system. It is shown that the system error performance corresponding to the combining effects of these interference can be accurately modeled and calculated. Monte Carlo simulation results are provided to validate the accuracy of the model. Additionally, it is found that narrowband interference can be mitigated effectively in the multiband UWB system by suppressing the particular UWB sub-band co-existing with the interfering narrowband signal. A typical improvement of 5 dB can be achieved with 75% sub-band power suppression. On the other hand, suppression of UWB sub-band is also found to decrease frequency diversity, thus facilitating the increase of MAI. In this paper, the developed model is utilized to determine the parameters that optimize the UWB system performance by minimizing the effective interference.

  • Power Saving Control for Battery-Powered Portable WLAN APs

    Masakatsu OGAWA  Takefumi HIRAGURI  

     
    LETTER

      Vol:
    E92-A No:9
      Page(s):
    2253-2256

    This paper proposes a power saving control function for battery-powered portable wireless LAN (WLAN) access points (APs) to extend the battery life. The IEEE802.11 standard does not support power saving control for APs. To enable a sleep state for an AP, the AP forces the stations (STAs) to refrain from transmitting frames using the network allocation vector (NAV) while the AP is sleeping. Thus the sleep state for the AP can be employed without causing frame loss at the STAs. Numerical analysis and computer simulation reveal that the newly proposed control technique conserves power compared to the conventional control.

  • A Reliable and Efficient Broadcasting Scheme for Mobile Ad Hoc Networks

    Kewang ZHANG  Deyun ZHANG  

     
    LETTER-Networks

      Vol:
    E92-D No:7
      Page(s):
    1470-1474

    This letter proposes a busy-tone based scheme for reliable and efficient broadcasting in mobile ad hoc networks. Control packets such as RTS, CTS and ACK are ignored in the broadcast scheme, and two busy tones are used, one for channel reservation and the other for negative acknowledgement. Unlike traditional schemes for reliable broadcasting, the proposed scheme is highly efficient as it achieves both collision avoidance and fast packet loss recovery. Simulation results are presented which show the effectiveness of the proposed scheme.

  • Nonorthogonal Pulse Position Modulation for Time-Hopping Multiple Access UWB Communications

    Hao ZHANG  T. Aaron GULLIVER  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E92-B No:6
      Page(s):
    2102-2111

    In this paper, we study the capacity and performance of nonorthogonal pulse position modulation (NPPM) for Ultra-Wideband (UWB) communication systems over both AWGN and IEEE802.15.3a channels. The channel capacity of NPPM is determined for a time-hopping multiple access UWB communication system. The error probability and performance bounds are derived for a multiuser environment. It is shown that with proper selection of the pulse waveform and modulation index, NPPM can achieve a higher capacity than orthogonal PPM, and also provide better performance than orthogonal PPM with the same throughput.

  • Performance Analysis of a De-correlated Modified Code Tracking Loop for Synchronous DS-CDMA System under Multiuser Environment

    Ya-Ting WU  Wai-Ki WONG  Shu-Hung LEUNG  Yue-Sheng ZHU  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E92-B No:6
      Page(s):
    1991-1999

    This paper presents the performance analysis of a De-correlated Modified Code Tracking Loop (D-MCTL) for synchronous direct-sequence code-division multiple-access (DS-CDMA) systems under multiuser environment. Previous studies have shown that the imbalance of multiple access interference (MAI) in the time lead and time lag portions of the signal causes tracking bias or instability problem in the traditional correlating tracking loop like delay lock loop (DLL) or modified code tracking loop (MCTL). In this paper, we exploit the de-correlating technique to combat the MAI at the on-time code position of the MCTL. Unlike applying the same technique to DLL which requires an extensive search algorithm to compensate the noise imbalance which may introduce small tracking bias under low signal-to-noise ratio (SNR), the proposed D-MCTL has much lower computational complexity and exhibits zero tracking bias for the whole range of SNR, regardless of the number of interfering users. Furthermore, performance analysis and simulations based on Gold codes show that the proposed scheme has better mean square tracking error, mean-time-to-lose-lock and near-far resistance than the other tracking schemes, including traditional DLL (T-DLL), traditional MCTL (T-MCTL) and modified de-correlated DLL (MD-DLL).

  • Optimum Hard-Decision Detector for Energy-Spreading Transform Based Multiple Access

    Jaeho LEE  Taewon HWANG  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E92-B No:6
      Page(s):
    2243-2246

    Multiple access based on energy spreading transform (EST) in [1] has been shown to effectively separate multiuser signals in an iterative manner. In this paper, an optimum hard-decision detector for the EST-based multiple access is proposed. The proposed scheme employs minimum mean square error (MMSE) processing at each iteration to enhance the performance of the original scheme. Analysis and simulation results show the significant performance improvement of the proposed scheme over the original method.

  • Comparison of the Expressive Power of Language-Based Access Control Models

    Yoshiaki TAKATA  Hiroyuki SEKI  

     
    LETTER

      Vol:
    E92-D No:5
      Page(s):
    1033-1036

    This paper compares the expressive power of five language-based access control models. We show that the expressive powers are incomparable between any pair of history-based access control, regular stack inspection and shallow history automata. Based on these results, we introduce an extension of HBAC, of which expressive power exceeds that of regular stack inspection.

  • An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding

    Su-Wan PARK  Sang Uk SHIN  

     
    PAPER-Contents Protection

      Vol:
    E92-D No:5
      Page(s):
    851-858

    This paper proposes a new selective encryption scheme and a key management scheme for layered access control of H.264/SVC. This scheme encrypts three domains in hierarchical layers using different keys: intra prediction modes, motion vector difference values and sign bits of texture data. The proposed scheme offers low computational complexity, low bit-overhead, and format compliance by utilizing the H.264/SVC structure. It provides a high encryption efficiency by encrypting domains selectively, according to each layer type in the enhancement-layer. It also provides confidentiality and implicit authentication using keys derived in the proposed key management scheme for encryption. Simulation results show the effectiveness of the proposed scheme.

341-360hit(874hit)