The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] access(874hit)

121-140hit(874hit)

  • A Novel Procedure for Implementing a Turbo Decoder on a GPU with Coalesced Memory Access

    Heungseop AHN  Seungwon CHOI  

     
    PAPER-Communication Theory and Signals

      Vol:
    E100-A No:5
      Page(s):
    1188-1196

    The sub-blocking algorithm has been known as a core component in implementing a turbo decoder using a Graphic Processing Unit (GPU) to use as many cores in the GPU as possible for parallel processing. However, even though the sub-blocking algorithm allows a large number of threads in a given GPU to be adopted for processing a large number of sub-blocks in parallel, each thread must access the global memory with strided addresses, which results in uncoalesced memory access. Because uncoalesced memory access causes a lot of unnecessary memory transactions, the memory bandwidth efficiency drops significantly, possibly as low as 1/8 in the case of an Long Term Evolution (LTE) turbo decoder, depending upon the compute capability of a GPU. In this paper, we present a novel method for converting uncoalesced memory access into coalesced access in a way that completely recovers the memory bandwidth efficiency to 100% without additional overhead. Our experimental tests, performed with NVIDIA's Geforce GTX 780 Ti GPU, show that the proposed method can enhance the throughput by nearly 30% compared with a conventional turbo decoder that suffers from uncoalesced memory access. Throughput provided by the proposed method has been observed to be 51.4Mbps when the number of iterations and that of sub-blocks are set to 6 and 32, respectively, in our experimental tests, which far exceeds the performance of previous works implemented the Max-Log-MAP algorithm.

  • Achieving Scalable and Optimized Attribute Revocation in Cloud Computing

    Somchart FUGKEAW  Hiroyuki SATO  

     
    PAPER

      Pubricized:
    2017/02/08
      Vol:
    E100-D No:5
      Page(s):
    973-983

    Revocation is one of the major problems for access control systems. Especially, the revocation cost for the data outsourced in the third party environment such as cloud storage systems. The revocation in the cloud-based access control typically deals with the cryptographic operations that introduce costly overheads for key re-generation, file re-encryption, and key re-distribution. Also, the communication for retrieving files for re-encryption and loading them back to the cloud is another non-trivial cost for data owners. In this paper, we propose a Very Lightweight Proxy Re-Encryption (VL-PRE) scheme to efficiently support attribute-based revocation and policy update in the collaborative data sharing in cloud computing environment. To this end, we propose three-phase VL-PRE protocol including re-encryption key generation, re-encryption key update, and re-encryption key renewal for supporting the optimized attribute revocation and policy update. Finally, we conduct the experiments to evaluate the performance of our VL-PRE and show that it exhibits less computation cost with higher scalability in comparison with existing PRE schemes.

  • Throughput Enhancement for SATCOM Systems Using Dynamic Spectrum Controlled Channel Allocation under Variable Propagation Conditions

    Katsuya NAKAHIRA  Jun MASHINO  Jun-ichi ABE  Daisuke MURAYAMA  Tadao NAKAGAWA  Takatoshi SUGIYAMA  

     
    PAPER-Satellite Communications

      Pubricized:
    2016/08/31
      Vol:
    E100-B No:2
      Page(s):
    390-399

    This paper proposes a dynamic spectrum controlled (DSTC) channel allocation algorithm to increase the total throughput of satellite communication (SATCOM) systems. To effectively use satellite resources such as the satellite's maximum transponder bandwidth and maximum transmission power and to handle the propagation gain variation at all earth stations, the DSTC algorithm uses two new transmission techniques: spectrum compression and spectrum division. The algorithm controls various transmission parameters, such as the spectrum compression ratio, number of spectrum divisions, combination of modulation method and FEC coding rate (MODCOD), transmission power, and spectrum bandwidth to ensure a constant transmission bit rate under variable propagation conditions. Simulation results show that the DSTC algorithm achieves up to 1.6 times higher throughput than a simple MODCOD-based algorithm.

  • Quantum Optimal Multiple Assignment Scheme for Realizing General Access Structure of Secret Sharing

    Ryutaroh MATSUMOTO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E100-A No:2
      Page(s):
    726-728

    The multiple assignment scheme is to assign one or more shares to single participant so that any kind of access structure can be realized by classical secret sharing schemes. We propose its quantum version including ramp secret sharing schemes. Then we propose an integer optimization approach to minimize the average share size.

  • Throughput Performance of Joint Detection in Non-Orthogonal Multiple Access Schemes

    Takahiro YAZAKI  Yukitoshi SANADA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/09/05
      Vol:
    E100-B No:2
      Page(s):
    344-353

    Non-orthogonal multiple access (NOMA) makes multiple mobile users share the same frequency band. In a conventional NOMA scheme, a user pair that can be assigned to the same frequency resource is limited, which reduces the amount of capacity improvement possible. This is because a far user demodulates a signal without canceling an underlaid signal for a near user. In addition, semi-orthogonal multiple access (SOMA) modulation has been proposed. This modulation scheme helps to reduce scheduling complexity and demodulation complexity. In this paper, a joint detection scheme is applied to a far user as well as a near user in a NOMA downlink. The joint detection in the far user leads to a more number of user pairs that can be assigned to the same frequency resource through proportional fair scheduling. The total system throughput performance with the joint detection is evaluated with multi-cell system level simulation. Numerical results show that the joint detection in the original NOMA system increases the system throughput more effectively than that with SOMA modulation.

  • Joint Maximum Likelihood Detection in Far User of Non-Orthogonal Multiple Access

    Kenji ANDO  Yukitoshi SANADA  Takahiko SABA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/07/29
      Vol:
    E100-B No:1
      Page(s):
    177-186

    Non-orthogonal multiple access (NOMA) enables multiple mobile devices to share the same frequency band. In a conventional NOMA scheme, the receiver of a far user detects its desired signal without canceling the signal for a near user. However, the signal for the near user acts as interference and degrades the accuracy of likelihood values for the far user. In this paper, a joint maximum likelihood detection scheme for the far user of the NOMA downlink is proposed. The proposed scheme takes the interference signal into account in calculating the likelihood values. Numerical results obtained through computer simulation show that the proposed scheme improves the performance by from 0.2dB to 3.1dB for power allocation coefficients of 0.2 to 0.4 at a bit error rate (BER) of 10-2 relative to the conventional scheme.

  • Applying Write-Once Memory Codes to Binary Symmetric Asymmetric Multiple Access Channels

    Ryota SEKIYA  Brian M. KURKOSKI  

     
    PAPER-Communication Theory and Systems

      Vol:
    E99-A No:12
      Page(s):
    2202-2210

    Write once memory (WOM) codes allow reuse of a write-once medium. This paper focuses on applying WOM codes to the binary symmetric asymmetric multiple access channel (BS-AMAC). At one specific rate pair, WOM codes can achieve the BS-AMAC maximum sum-rate. Further, any achievable rate pair for a two-write WOM code is also an achievable rate pair for the BS-AMAC. Compared to the uniform input distribution of linear codes, the non-uniform WOM input distribution is helpful for a BS-AMAC. In addition, WOM codes enable “symbol-wise estimation”, resulting in the decomposition to two distinct channels. This scheme does not achieve the BS-AMAC maximum sum-rate if the channel has errors, however leads to reduced-complexity decoding by enabling independent decoding of two codewords. Achievable rates for this decomposed system are also given. The AMAC has practical application to the relay channel and we briefly discuss the relay channel with block Markov encoding using WOM codes. This scheme may be effective for cooperative wireless communications despite the fact that WOM codes are designed for data storage.

  • Direct- or Fast-Access Decoding Schemes for VF Codes

    Hirosuke YAMAMOTO  Yuka KUWAORI  

     
    LETTER-Source Coding and Data Compression

      Vol:
    E99-A No:12
      Page(s):
    2291-2295

    In this paper, we propose two schemes, which enable any VF code to realize direct- or fast-access decoding for any long source sequence. Direct-access decoding means that any source symbol of any position can be directly decoded within constant time, not depending on the length of source sequence N, without decoding the whole codeword sequence. We also evaluate the memory size necessary to realize direct-access decoding or fast-access decoding with decoding delay O(log log N), O(log N), and so on, in the proposed schemes.

  • Improvement of Throughput Prediction Scheme Considering Terminal Distribution in Multi-Rate WLAN Considering Both CSMA/CA and Frame Collision

    Ryo HAMAMOTO  Chisa TAKANO  Hiroyasu OBATA  Kenji ISHIDA  

     
    PAPER-Wireless system

      Pubricized:
    2016/08/24
      Vol:
    E99-D No:12
      Page(s):
    2923-2933

    Wireless Local Area Networks (WLANs) based on the IEEE 802.11 standard have been increasingly used. Access Points (APs) are being established in various public places, such as railway stations and airports, as well as private residences. Moreover, the rate of public WLAN services continues to increase. Throughput prediction of an AP in a multi-rate environment, i.e., predicting the amount of receipt data (including retransmission packets at an AP), is an important issue for wireless network design. Moreover, it is important to solve AP placement and selection problems. To realize the throughput prediction, we have proposed an AP throughput prediction method that considers terminal distribution. We compared the predicted throughput of the proposed method with a method that uses linear order computation and confirmed the performance of the proposed method, not by a network simulator but by the numerical computation. However, it is necessary to consider the impact of CSMA/CA in the MAC layer, because throughput is greatly influenced by frame collision. In this paper, we derive an effective transmission rate considering CSMA/CA and frame collision. We then compare the throughput obtained using the network simulator NS2 with a prediction value calculated by the proposed method. Simulation results show that the maximum relative error of the proposed method is approximately 6% and 15% for UDP and TCP, respectively, while that is approximately 17% and 21% in existing method.

  • An Index Based on Irregular Identifier Space Partition for Quick Multiple Data Access in Wireless Data Broadcasting

    SeokJin IM  HeeJoung HWANG  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2016/07/20
      Vol:
    E99-D No:11
      Page(s):
    2809-2813

    This letter proposes an Index based on Irregular Partition of data identifiers (IIP), to enable clients to quickly access multiple data items on a wireless broadcast channel. IIP improves the access time by reducing the index waiting time when clients access multiple data items, through the use of irregular partitioning of the identifier space of data items. Our performance evaluation shows that with respect to access time, the proposed IIP outperforms the existing index schemes supporting multiple data access.

  • Application of Non-Orthogonal Multiple Access Scheme for Satellite Downlink in Satellite/Terrestrial Integrated Mobile Communication System with Dual Satellites

    Eiji OKAMOTO  Hiroyuki TSUJI  

     
    PAPER

      Vol:
    E99-B No:10
      Page(s):
    2146-2155

    In satellite/terrestrial integrated mobile communication systems (STICSs), a user terminal directly connects both terrestrial and satellite base stations. STICS enables expansion of service areas and provides a robust communication service for large disasters. However, the cell radius of the satellite system is large (approximately 100km), and thus a capacity enhancement of the satellite subsystem for accommodating many users is needed. Therefore, in this paper, we propose an application of two methods — multiple-input multiple-output (MIMO) transmission using multi-satellites and non-orthogonal multiple access (NOMA) for STICS — to realize the performance improvement in terms of system capacity and user fairness. Through numerical simulations, we show that system capacity and user fairness are increased by the proposed scheme that applies the two methods.

  • High-Capacity Wireless Access Networks Using 920MHz Band for Wide-Area IoT/M2M Services Open Access

    Kazunori AKABANE  Nobuaki MOCHIZUKI  Shigeru TERUHI  Mamoru KOBAYASHI  Shuichi YOSHINO  Masashi SHIMIZU  Kazuhiro UEHARA  

     
    INVITED PAPER

      Vol:
    E99-B No:9
      Page(s):
    1920-1929

    In the near future, many sensors and terminals will be connected to the public network to provide various convenient IoT/M2M services. In order to connect many sensors to the network efficiently, wireless communication systems in the 920MHz band are seen as attractive solutions. We are focusing on the 920MHz band to research and develop high-capacity protocols that can accommodate many terminals, and low power consumption technologies for battery-driven terminals. In this paper, we describe the following three concrete wireless systems that use our proposals. (1) A physical distribution pallet management system that can handle thousands of pallet-embedded sensors and a wireless module with a battery lifetime of about ten years. (2) Water leakage monitoring system for underground pipes by using sensors and a wireless module in each valve box. (3) A wide-area and high-capacity radio relay system for smart metering services like the reading of gas meters. The radio relay system can accommodate various sensors and terminals and has large potential for providing various IoT/M2M services in conjunction with smart metering services.

  • Improving Fairness with Harvesting-Rate Adapted Polling for Energy Harvesting Wireless Sensor Networks

    Masashi KUNIKAWA  Hiroyuki YOMO  

     
    PAPER-Network

      Vol:
    E99-B No:9
      Page(s):
    2036-2046

    Energy harvesting wireless sensor networks (EH-WSNs) are being actively studied in order to solve the problems faced by battery-operated WSNs, namely the cost for battery replacement and the negative impact on the environment. In EH-WSNs, each node harvests ambient energy, such as light, heat, vibration, and uses it for sensing, computations, and wireless communications, where the amount of harvested energy of each node varies depending on their environments. MAC protocols for EH-WSNs need to be designed to achieve high throughput and fairness, however, the conventional MAC protocols proposed for EH-WSNs do not adapt to the harvesting rate of each node, resulting in poor fairness. In this paper, we propose a fair MAC protocol based on polling scheme for EH-WSNs. The proposed scheme adjusts contention probability of each node according to its harvesting rate, thereby increasing the throughput of nodes with low harvesting rate. We evaluate throughput and fairness of the proposed fair polling scheme by theoretical analysis and computer simulations, and show that the proposed scheme can improve fairness with little degradation of the overall network throughput.

  • Development of Tactile Graph Generation Web Application Using R Statistics Software Environment

    Tetsuya WATANABE  Kosuke ARAKI  Toshimitsu YAMAGUCHI  Kazunori MINATANI  

     
    PAPER-Rehabilitation Engineering and Assistive Technology

      Pubricized:
    2016/05/06
      Vol:
    E99-D No:8
      Page(s):
    2151-2160

    We have developed software that uses the R statistics software environment to automatically generate tactile graphs — i.e. graphs that can be read by blind people using their sense of touch. We released this software as a Web application to make it available to anyone, from anywhere. This Web application can automatically generate images for tactile graphs from numerical data in a CSV file. It is currently able to generate four types of graph — scatter plots, line graphs, bar charts and pie charts. This paper describes the Web application's functions, operating procedures and the results of evaluation experiments.

  • A Matrix Based ORAM: Design, Implementation and Experimental Analysis

    Steven GORDON  Atsuko MIYAJI  Chunhua SU  Karin SUMONGKAYOTHIN  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2044-2055

    Oblivious RAM is a technique for hiding the access patterns between a client and an untrusted server. However, current ORAM algorithms incur large communication or storage overhead. We propose a novel ORAM construction using a matrix logical structure for server storage where a client downloads blocks from each row, choosing the column randomly to hide the access pattern. Both a normal construction and recursive construction, where a position map normally stored on the client is also stored on the server, are presented. We show our matrix ORAM achieves constant bandwidth cost for the normal construction, uses similar storage to the existing Path ORAM, and improves open the bandwidth cost compared to Path ORAM under certain conditions in the recursive construction.

  • Welch FFT Segment Size Selection Method for Spectrum Awareness System

    Hiroki IWATA  Kenta UMEBAYASHI  Samuli TIIRO  Janne J. LEHTOMÄKI  Miguel LÓPEZ-BENÍTEZ  Yasuo SUZUKI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:8
      Page(s):
    1813-1823

    We create a practical method to set the segment size of the Welch FFT for wideband and long-term spectrum usage measurements in the context of hierarchical dynamic spectrum access (DSA). An energy detector (ED) based on the Welch FFT can be used to detect the presence or absence of primary user (PU) signal and to estimate the duty cycle (DC). In signal detection with the Welch FFT, segment size is an important design parameter since it determines both the detection performance and the frequency resolution. Between these two metrics, there is a trade-off relationship which can be controlled by adjusting the segment size. To cope with this trade-off relationship, we define an optimum and, more easy to analyze sub-optimum segment size design criterion. An analysis of the sub-optimum segment size criterion reveals that the resulting segment size depends on the signal-to-noise ratio (SNR) and the DC. Since in practice both SNR and DC are unknown, proper segment setting is difficult. To overcome this problem, we propose an adaptive segment size selection (ASSS) method that uses noise floor estimation outputs. The proposed method does not require any prior knowledge on the SNR or the DC. Simulation results confirm that the proposed ASSS method matches the performance achieved with the optimum design criterion.

  • Constructions of Gaussian Integer Sequences with Zero Correlation Zone

    Xiaoyu CHEN  Deming KONG  Chengqian XU  Kai LIU  

     
    LETTER-Coding Theory

      Vol:
    E99-A No:6
      Page(s):
    1260-1263

    Based on a perfect Gaussian integer sequence, shift and combination operations are performed to construct Gaussian integer sequences with zero correlation zone (ZCZ). The resultant sequence sets are optimal or almost optimal with respect to the Tang-Fan-Matsufuji bound. Furthermore, the ZCZ Gaussian integer sequence sets can be provided for quasi-synchronous code-division multiple-access systems to increase transmission data rate and reduce interference.

  • Energy-Efficient Resource Allocation for Multi-Radio Access in Dynamic and Heterogeneous Wireless Networks

    Fan YANG  Qinghai YANG  Kyung Sup KWAK  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:6
      Page(s):
    1386-1394

    In this paper, by jointly considering power allocation and network selection, we address the energy efficiency maximization problem in dynamic and heterogeneous wireless networks, where user equipments are typically equipped with multi-homing capability. In order to effectively deal with the dynamics of heterogeneous wireless networks, a stochastic optimization problem is formulated that optimizes the long-term energy efficiency under the constraints of system stability, peak power consumption and average transmission rate. By adopting the parametric approach and Lyapunov optimization, we derive an equivalent optimization problem out of the original problem and then investigate its optimal resource allocation. Then, to reduce the computational complexity, a suboptimal resource allocation algorithm is proposed based on relaxed optimization, which adapts to time-varying channels and stochastic traffic without requiring relevant a priori knowledge. The simulation results demonstrate the theoretical analysis and validate the adaptiveness of our proposed algorithm.

  • A Distributed Capability Access Control Scheme in Information-Centric Networking

    Jung-Hwan CHA  Youn-Hee HAN  Sung-Gi MIN  

     
    PAPER-Network

      Vol:
    E99-B No:5
      Page(s):
    1121-1130

    Enforcing access control policies in Information-Centric Networking (ICN) is difficult due to there being multiple copies of contents in various network locations. Traditional Access Control List (ACL)-based schemes are ill-suited for ICN, because all potential content distribution servers should have an identical access control policy or they should contact a centralized ACL server whenever their contents are accessed by consumers. To address these problems, we propose a distributed capability access control scheme for ICN. The proposed scheme is composed of an internal capability and an external capability. The former is included in the content and the latter is added to a request message sent from the consumer. The content distribution servers can validate the access right of the consumer through the internal and external capabilities without contacting access control policies. The proposed model also enhances the privacy of consumers by keeping the content name and consumer identification anonymous. The performance analysis and implementation show that the proposed scheme is feasible and more efficient than other access control schemes.

  • Bias Polarity Dependent Resistive Switching Behaviors in Silicon Nitride-Based Memory Cell

    Sungjun KIM  Min-Hwi KIM  Seongjae CHO  Byung-Gook PARK  

     
    BRIEF PAPER

      Vol:
    E99-C No:5
      Page(s):
    547-550

    In this work, the bias polarity dependent resistive switching behaviors in Cu/Si3N4/p+ Si RRAM memory cell have been closely studied. Different switching characteristics in both unipolar and bipolar modes after the positive forming are investigated. The bipolar switching did not need a forming process and showed better characteristics including endurance cycling, uniformity of switching parameters, and on/off resistance ratio. Also, the resistive switching characteristics by both positive and negative forming switching are compared. It has been confirmed that both unipolar and bipolar modes after the negative forming exhibits inferior resistive switching performances due to high forming voltage and current.

121-140hit(874hit)