The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] access(874hit)

521-540hit(874hit)

  • Variable Rate Transmission for Higher System Capacity in a Signaling-Only Wireless System

    Khaled MAHMUD  Masugi INOUE  Hiroyuki MORIKAWA  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E88-B No:5
      Page(s):
    2210-2214

    System capacity of a wireless system can be improved greatly by using variable rate transmission. Assuming a low-rate and wide-coverage signaling-only wireless network, in this paper we evaluate, analytically and numerically, the extent of this improvement for various schemes with variable transmission rates. We considered log-normal shadowing as well as the effect of Rayleigh fading. Simulation results show close proximity with the analytical predictions.

  • Development of a Converging Bluetooth Access Point for One-Phone System

    June HWANG  Byungjo MIN  Ilseok HAN  Hagbae KIM  

     
    LETTER-Network

      Vol:
    E88-B No:5
      Page(s):
    2185-2188

    In this paper, we describe a development of a Bluetooth Access Point for the WAN connection of home network devices. Especially, users can access the PSTN at home instead of expensive CDMA network through the AP, using the 'one-phone,' which is the Bluetooth enabled cellular phone. The one-phone service becomes a convergence of wired and wireless communication through the AP.

  • Effects of Frequency and Timing Offsets on the FFH-MA System Over a Rician Fading Channel

    Jeungmin JOO  Kanghee KIM  Hyunduk KANG  Kiseon KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E88-B No:4
      Page(s):
    1714-1717

    The bit error rate (BER) degradations of fast frequency hopping multiple access (FFH-MA) systems due to the frequency and timing offsets are investigated over a Rician fading channel. It is shown that as the received average SNR increases, the BER is affected much larger by frequency and timing offsets. When the frequency offset or the timing offset exists alone, the BER of the FFH-MA system is degraded much more due to the timing offset than due to the frequency offset. The BER degradation due to both the frequency offset and the timing offset is larger than the sum of the degradations due to each offset.

  • Dual Level Access Scheme for Digital Video Sequences

    Thumrongrat AMORNRAKSA  Peter SWEENEY  

     
    PAPER-Broadcast Systems

      Vol:
    E88-B No:4
      Page(s):
    1632-1640

    In this paper, a dual level access scheme is proposed to provide two levels of access to the broadcast data; one to video signals protected for authorized users, another to extra information e.g. advertisements provided for the remaining users in the network. In the scheme, video signals in MPEG format are considered. The video contents are protected from unauthorized viewing by encrypting the DC coefficients of the luminance component in I-frames, which are extracted from the MPEG bit-stream. An improved direct sequence spread spectrum technique is used to add extra information to non-zero AC coefficients, extracted from the same MPEG bit-stream. The resultant MPEG bit-stream still occupies the same existing bandwidth allocated for a broadcast channel. At the receiver, the extra information is recovered and subtracted from the altered AC coefficients. The result is then combined with the decrypted DC coefficients to restore the original MPEG bit-stream. The experimental results show that less than 2.9% of the size of MPEG bit-stream was required to be encrypted in order to efficiently reduce its commercial value. Also, on average, with a 1.125 Mbps MPEG bit-stream, an amount of extra information up to 1.4 kbps could be successfully transmitted, while the video quality (PSNR) was unnoticeably degraded by 2.81 dB.

  • Access Protocol with Efficient Slot Reuse in WDM Metro Ring

    Ming JIANG  Qingji ZENG  Yong OUYANG  

     
    LETTER-Network

      Vol:
    E88-B No:4
      Page(s):
    1685-1688

    This letter provides a scalable slotted ring network architecture with nodes using one fixed transmitter, one tunable transmitter and multiple fixed receivers. Furthermore, the novel access protocol with efficient slot reuse is proposed. Theoretical analysis and simulation results show that protocol can achieve high node throughput and low queuing delay.

  • A 13.56 MHz CMOS RF Identification Passive Tag LSI with Ferroelectric Random Access Memory

    Shoichi MASUI  Toshiyuki TERAMOTO  

     
    INVITED PAPER

      Vol:
    E88-C No:4
      Page(s):
    601-607

    A radio frequency identification tag LSI operating with the carrier frequency of 13.56 MHz as well as storing nonvolatile information in embedded ferroelectric random access memory (FeRAM) has been developed. A full wave rectifier composed of PMOS transistor diodes and NMOS transistor switches achieves RF-to-DC power conversion efficiency over 54%. The entire 16 kbits write and read transaction time can be reduced to 2.1 sec by the use of FeRAM, which corresponds to 2.2 times speed enhancement over conventional EEPROM based tag LSIs. The communication range of the FeRAM based tag LSI can be effectively improved by storing antitheft information in a ferroelectric nonvolatile flip-flop, which can reduce the power consumption of FeRAM from 27 µW to 5 µW. The communication range for the antitheft gate system becomes 70 cm.

  • Location-Aware Power-Efficient Directional MAC Protocol in Ad Hoc Networks Using Directional Antenna

    Tetsuro UEDA  Shinsuke TANAKA  Dola SAHA  Siuli ROY  Somprakash BANDYOPADHYAY  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E88-B No:3
      Page(s):
    1169-1181

    Use of directional antenna in the context of ad hoc wireless networks can largely reduce radio interference, thereby improving the utilization of wireless medium. Our major contribution in this paper is to devise a MAC protocol that exploits the advantages of directional antenna in ad hoc networks for improved system performance. In this paper, we have illustrated a MAC protocol for ad hoc networks using directional antenna with the objective of effective utilization of the shared wireless medium. In order to implement effective MAC protocol in this context, a node should know how to set its transmission direction to transmit a packet to its neighbors and to avoid transmission in other directions where data communications are already in progress. In this paper, we are proposing a receiver-centric approach for location tracking and MAC protocol, so that, nodes become aware of its neighborhood and also the direction of the nodes for communicating directionally. A node develops its location-awareness from these neighborhood-awareness and direction-awareness. In this context, researchers usually assume that the gain of directional antennas is equal to the gain of corresponding omni-directional antenna. However, for a given amount of input power, the range R with directional antenna will be much larger than that using omni-directional antenna. In this paper, we also propose a two level transmit power control mechanism in order to approximately equalize the transmission range R of an antenna operating at omni-directional and directional mode. This will not only improve medium utilization but also help to conserve the power of the transmitting node during directional transmission. Our proposed directional MAC protocol can be effective in both ITS (Intelligent Transportation System), which we simulate in String and Parallel Topology, and in any community network, which we simulate in Random Topology. The performance evaluation on QualNet network simulator clearly indicates the efficiency of our protocol.

  • Approximate Maximum Likelihood Approach for Code Acquisition in DS-CDMA Systems with Multiple Antennas

    Sangchoon KIM  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E88-B No:3
      Page(s):
    1054-1065

    The problem of estimating code timings in DS-CDMA systems with multiple antennas is considered in the presence of multipath time-varying fading channels and near-far environments. We present an efficient algorithm for an approximate maximum likelihood approach of jointly estimating the multipath timings of a desired user for DS-CDMA systems that consist of multiple antennas either uncorrelated or fully correlated in space. The procedures of the algorithm to estimate code-timings are developed in order to better exploit the time-varying characteristics of the fading process. In the multipath fading channels, the solution of the proposed algorithms is based on successively optimizing the criterion for increasing numbers of multipath delays. It is shown via simulation results that the modified approaches of the approximate maximum likelihood algorithm much more improve its acquisition performance in the time-varying fading channels. It is seen that the acquisition performance of multiple antennas based acquisition scheme is much better than that of a single antenna based timing estimator in the presence of multipath fading channels and the near-far problem. Furthermore, it is observed that the proposed algorithms outperform the correlator and MUSIC estimator in the multiuser environments with near-far situation on time-varying Rayleigh fading channels.

  • Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems

    Wook SHIN  Jong-Youl PARK  Dong-Ik LEE  

     
    PAPER-Application Information Security

      Vol:
    E88-D No:3
      Page(s):
    619-627

    The current scheme of access control judges the legality of each access based on immediate information without considering associate information hidden in a series of accesses. Due to the deficiency, access control systems do not efficiently limit attacks consist of ordinary operations. For trusted operating system developments, we extended RBAC and added negative procedural constraints to refuse those attacks. With the procedural constraints, the access control of trusted operating systems can discriminate attack trials from normal behaviors. This paper shows the specification of the extended concept and model, and presents simple analysis results.

  • Access Control for Security and Privacy in Ubiquitous Computing Environments

    Shigeki YAMADA  Eiji KAMIOKA  

     
    INVITED PAPER

      Vol:
    E88-B No:3
      Page(s):
    846-856

    Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous computing environments because this is the underlying core technology to enforce security and privacy policies. We classify access control technologies into three types associated with the three access control phases of prevention, avoidance, and detection, and provide an overview of ubiquitous computing-oriented technologies and solutions, ranging from security and privacy models and policies to the enforcement of policies and system implementation.

  • Adaptive Receivers for DS/CDMA Multiuser Communication in Multipath Fading Channels

    Fang-Biau UENG  Li-Der JENG  Jun-Da CHEN  Jia-Yu YANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E88-B No:2
      Page(s):
    687-697

    In direct-sequence code division multiple access (DS/CDMA) multiuser communication systems with multipath channels, both intersymbol interference (ISI) and multiple-access interference (MAI) must be considered. The multipath effect usually changes the characteristics of the spreading codes. Modification of the conventional receiver structure is needed to account for the interference of the multipath fading. This paper proposes four adaptive receivers for such multiuser DS/CDMA systems in multipath fading channels. We employ least mean square (LMS) and recursive least squares (RLS) algorithms for both finite impulse response (FIR) and infinite impulse response (IIR) receiver structures. Mean square error (MSE) and convergence analysis are also given in this paper. Simulation results show the performance comparisons of the four proposed receivers.

  • Performance Evaluation of Time Alignment Control under High-Mobility Environment for Dynamic Parameter Controlled OF/TDMA

    Ryota KIMURA  Ryuhei FUNADA  Hiroshi HARADA  Shoji SHINODA  

     
    PAPER

      Vol:
    E88-B No:2
      Page(s):
    541-551

    This paper proposes a time alignment control (TAC) for reducing an influence of multiple access interference (MAI) due to propagation delays (PDs) in uplink transmission from multiple mobile stations (MSs) to an access point (AP) for an orthogonal frequency division multiple access (OFDMA) based mobile communication system. In addition, this paper presents our evaluation of the proposed TAC as applied to dynamic parameter control orthogonal frequency and time division multiple access (DPC-OF/TDMA) which has been suggested for use in new generation mobile communication system. This paper also proposes several formats for an activation slot (ACTS) in which the GIs are lengthened in order to avoid the MAI because the TAC cannot be performed yet in an initial registration of the MSs. Computer simulation elucidates that lengthening the GIs of data symbols in the ACTS adequately to compensate a maximum delay improves the transmission performance of the ACTS at the initial registration without PDs compensation. The simulation also elucidates that the proposed TAC is performed to reduce the influence of the MAI effectively and that updating the estimates of the PDs every certain period is needed to compensate the PDs accurately under high-mobility environment.

  • Variable Spreading and Chip Repetition Factors (VSCRF)-CDMA in Reverse Link for Broadband Packet Wireless Access

    Yoshikazu GOTO  Teruo KAWAMURA  Hiroyuki ATARASHI  Mamoru SAWAHASHI  

     
    PAPER

      Vol:
    E88-B No:2
      Page(s):
    509-519

    This paper proposes Variable Spreading and Chip Repetition Factors (VSCRF)-Code Division Multiple Access (CDMA) broadband packet wireless access in the reverse link, which flexibly supports employing the same air interface in various radio environments such as a cellular system with a multi-cell configuration and local areas such as very-small cell, indoor, and isolated-cell environments. In VSCRF-CDMA, we propose two schemes: the first is a combination of time-domain spreading with an orthogonal code and chip repetition that achieves orthogonal multiple access in the frequency domain by utilizing a comb-shaped frequency spectrum, and the other is adaptive control of the spreading factor and chip repetition factor according to the cell configurations, number of simultaneously accessing users, propagation channel conditions, and major radio link parameters. Simulation results show that the proposed VSCRF-CDMA associated with the combination of the spreading factor, SFD, of four and the chip repetition factor, CRF, of four improves the required average received signal energy per bit-to-noise power spectrum density ratio (Eb/N0) for the average packet error rate of 10-2 by approximately 2.0 dB compared to DS-CDMA only employing SFD = 16 assuming four simultaneously accessing users in an exponentially decaying six-path Rayleigh fading channel with two-branch diversity reception.

  • Secure Access of Products in a Process Environment

    Shih-Chien CHOU  Chia-Wei LAI  

     
    PAPER-Software Engineering

      Vol:
    E88-D No:2
      Page(s):
    197-203

    Process-centered software engineering environments (PSEEs) facilitate controlling software processes. Many issues related to PSEEs such as process evolution support have been addressed. We identify an unsolved issue, which is preventing information leakage when the process is being enacted. We developed a model called PsACL for the prevention. This paper proposes PsACL, which offers the following features: (a) controlling both read and write access of software products, (b) preventing indirect information leakage, (c) managing role associations, (d) managing role hierarchies, (e) enforcing static and simple dynamic separation-of-duty constraints, (f) allowing declassification of products, and (g) allowing access control information exchange among software processes.

  • Field Experiments on Throughput Performance above 100 Mbps in Forward Link for VSF-OFCDM Broadband Wireless Access

    Yoshihisa KISHIYAMA  Noriyuki MAEDA  Kenichi HIGUCHI  Hiroyuki ATARASHI  Mamoru SAWAHASHI  

     
    PAPER

      Vol:
    E88-B No:2
      Page(s):
    604-614

    This paper presents throughput performance along with power profiles in the time and frequency domains over 100 Mbps based on field experiments using the implemented Variable Spreading Factor-Orthogonal Frequency and Code Division Multiplexing (VSF-OFCDM) transceiver with a 100-MHz bandwidth in a real multipath fading channel. We conducted field experiments in which a base station (BS) employs a 120-degree sectored beam antenna with the antenna height of 50 m and a van equipped with a mobile station (MS) is driven at the average speed of 30 km/h along measurement courses that are approximately 800 to 1000 m away from the BS, where most of the locations along the courses are under non-line-of-sight conditions. Field experimental results show that, by applying 16QAM data modulation and Turbo coding with the coding rate of R = 1/2 to a shared data channel together with two-branch antenna diversity reception, throughput over 100 and 200 Mbps is achieved when the average received signal-to-interference plus noise power ratio (SINR) is approximately 6.0 and 14.0 dB, respectively in a broadband channel bandwidth where a large number of paths such as more than 20 are observed. Furthermore, the location probability for achieving throughput over 100 and 200 Mbps becomes approximately 90 and 20% in these measurement courses, which experience a large number of paths, when the transmission power of the BS is 10 W with a 120-degree sectored beam transmission.

  • Direct Implementation of Space-Time MC-CDMA Receiver with Adaptive Linearly Constrained Constant Modulus Algorithm

    Shiunn-Jang CHERN  Chung-Yao CHANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E88-B No:2
      Page(s):
    698-705

    To support high data rate wireless communications, in this paper, based on the linearly constrained constant modulus (LCCM) criterion, the reverse link performance of the multi-carrier code division multiple access (MC-CDMA) receiver, with frequency combiner, and having smart antenna arrays beamformer in base station, has been investigated over the Rayleigh fading channel. By using the Kronecker product an equivalent direct formulation, which integrates the information of spatial-domain as well as temporal-domain, with constraint matrix could be obtained. In consequence, the modified normalized LCCM-gradient algorithm is devised to adaptively implement the direct constrained optimal weights solution of the fully space-time MC-CDMA detector. We show that the proposed method outperforms the constrained minimum output energy (CMOE) algorithm and is more robust against to the signal mismatch, due to imperfect channel and direction-of-arrival estimation used in the array beamformer.

  • A More Accurate Analysis of Interference for Rake Combining on DS-CDMA Forward Link in Mobile Radio

    Kaibin HUANG  Fumiyuki ADACHI  Yong Huat CHEW  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E88-B No:2
      Page(s):
    654-663

    In this paper, we improve the performance analysis of the Rake receiver for the DS-CDMA forward link using long random spreading sequences (RSS's) by more accurately evaluating the correlation between the various interference terms. We also extend the analysis to the case of short (periodic) RSS. The accuracy of the expressions obtained in our analysis is verified by computer simulation. We show that for a given normalized spreading factor, the bit error rate (BER) performance of the Rake receiver is the same for BPSK and QPSK data modulation. We also show that when the channel delay spread is smaller than a data symbol duration, the CDMA receiver has similar BER performance for long and short RSS's. However, for large delay spread, the employment of short RSS's may result in severe performance degradation.

  • A Generalized Performance Study of DS-CDMA Uplink/Downlink Receivers in Nakagami Wideband Fading Channel

    Mohammed ABDEL-HAFEZ  Fatih ALAGOZ  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E88-B No:1
      Page(s):
    333-344

    In this paper, we consider a mobile system consisting of a single isolated circular cell with K independent users simultaneously sharing the channel using binary DS-CDMA to establish a full duplex channel with the base station. Both coherent and differential detection RAKE receivers with Maximal Ratio Combining (MRC) techniques are considered. The performance of two uplink/downlink receivers in Nakagami wideband fading channel is studied. Our approach relies on the use of total instantaneous interference power calculations instead of the use of average power approximations. We analyzed and derived new exact formulae for bit error probabilities for the considered system, and presented a set of numerical results both for the exact formulae and Gaussian approximation. The performance comparisons suggest that the exact formulae provide superior performance to Gaussian approximation especially at low number of users and either high fading parameters of the desired user or low fading parameters of the MAIs.

  • Efficient Secret Sharing Schemes Based on Authorized Subsets

    Kouya TOCHIKUBO  Tomohiko UYEMATSU  Ryutaroh MATSUMOTO  

     
    LETTER

      Vol:
    E88-A No:1
      Page(s):
    322-326

    We propose efficient secret sharing schemes realizing general access structures. Our proposed schemes are perfect secret sharing schemes and include Shamir's (k, n)-threshold schemes as a special case. Furthermore, we show that a verifiable secret sharing scheme for general access structures is realized by one of the proposed schemes.

  • A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment

    Hyung-Chan KIM  R.S. RAMAKRISHNA  Kouichi SAKURAI  

     
    PAPER-Application

      Vol:
    E88-A No:1
      Page(s):
    270-279

    The research communitiy has shown considerable interest in studying access control in single Trusted Operating Systems (TOS). However, interactions among multiple TOSs have attracted relatively little attention. In this paper, we propose a Collaborative Role-Based Access Control (C-RBAC) model for distributed systems in which accesses across system domain boundaries are allowed. Access entities in a TOS vary in time. The changes in the organizational structure of the access entities in one system may influence other cooperating systems. In addition, policy-freeness, domain and rule conflicts are possible. These problems restrict the flexibility and scalability of coordination. We propose drafting a meta-component to play the role of a coordinator in multi-domain role-based access control. It is then possible to impart flexibility and scalability in a secure fashion. Experimental studies of the proposed model with the Network File System and SELinux system support our conclusion.

521-540hit(874hit)