The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] access(874hit)

141-160hit(874hit)

  • Analysis of Density-Adaptive Spectrum Access for Cognitive Radio Sensor Networks

    Lei ZHANG  Tiecheng SONG  Jing HU  Xu BAO  

     
    PAPER-Network

      Vol:
    E99-B No:5
      Page(s):
    1101-1109

    Cognitive radio sensor networks (CRSNs) with their dynamic spectrum access capability appear to be a promising solution to address the increasing challenge of spectrum crowding faced by the traditional WSN. In this paper, through maximizing the utility index of the CRSN, a node density-adaptive spectrum access strategy for sensor nodes is proposed that takes account of the node density in a certain event-driven region. For this purpose, considering the burst real-time data traffic, we analyze the energy efficiency (EE) and the packet failure rate (PFR) combining network disconnected rate (NDR) and packet loss rate (PLR) during the channel switching interval (CSI) for both underlay and interweave spectrum access schemes. Numerical results confirm the validity of our theoretical analyses and indicate that the adaptive node density threshold (ANDT) exists for underlay and interweave spectrum access scheme switching.

  • Probabilistic Secret Sharing Schemes for Multipartite Access Structures

    Xianfang WANG  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E99-A No:4
      Page(s):
    856-862

    In this paper, we construct ideal and probabilistic secret sharing schemes for some multipartite access structures, including the General Hierarchical Access Structure and Compartmented Access Structures. We devise an ideal scheme which implements the general hierarchical access structure. For the compartmented access structures, we consider three special access structures. We propose ideal and probabilistic schemes for these three compartmented access structures by bivariate interpolation.

  • Autonomous Decentralized Authorization and Authentication Management for Hierarchical Multi-Tenancy Open Access

    Qiong ZUO  Meiyi XIE  Wei-Tek TSAI  

     
    INVITED PAPER

      Vol:
    E99-B No:4
      Page(s):
    786-793

    Hierarchical multi-tenancy, which enables tenants to be divided into subtenants, is a flexible and scalable architecture for representing subsets of users and application resources in the real world. However, the resource isolation and sharing relations for tenants with hierarchies are more complicated than those between tenants in the flat Multi-Tenancy Architecture. In this paper, a hierarchical tenant-based access control model based on Administrative Role-Based Access Control in Software-as-a-Service is proposed. Autonomous Areas and AA-tree are used to describe the autonomy and hierarchy of tenants, including their isolation and sharing relationships. AA is also used as an autonomous unit to create and deploy the access permissions for tenants. Autonomous decentralized authorization and authentication schemes for hierarchical multi-tenancy are given out to help different level tenants to customize efficient authority and authorization in large-scale SaaS systems.

  • Combining Human Action Sensing of Wheelchair Users and Machine Learning for Autonomous Accessibility Data Collection

    Yusuke IWASAWA  Ikuko EGUCHI YAIRI  Yutaka MATSUO  

     
    PAPER-Rehabilitation Engineering and Assistive Technology

      Pubricized:
    2016/01/22
      Vol:
    E99-D No:4
      Page(s):
    1153-1161

    The recent increase in the use of intelligent devices such as smartphones has enhanced the relationship between daily human behavior sensing and useful applications in ubiquitous computing. This paper proposes a novel method inspired by personal sensing technologies for collecting and visualizing road accessibility at lower cost than traditional data collection methods. To evaluate the methodology, we recorded outdoor activities of nine wheelchair users for approximately one hour each by using an accelerometer on an iPod touch and a camcorder, gathered the supervised data from the video by hand, and estimated the wheelchair actions as a measure of street level accessibility in Tokyo. The system detected curb climbing, moving on tactile indicators, moving on slopes, and stopping, with F-scores of 0.63, 0.65, 0.50, and 0.91, respectively. In addition, we conducted experiments with an artificially limited number of training data to investigate the number of samples required to estimate the target.

  • 6-Year of Broadband Performance in Korea: A View from the User's Experience

    Yeonhee LEE  Youngseok LEE  

     
    PAPER-Optical Fiber for Communications

      Vol:
    E99-B No:3
      Page(s):
    630-646

    The widespread use and increasing popularity of broadband service has prompted a focus on the measurement and analysis of its empirical performance in recent studies. The worldwide view of broadband performance has been examined over the short term with Speedtest.net, but research in this area has not yet provided a long-term evolutionary insight on how DSL, Cable, and Fiber access technologies have influenced on user experience. In this study, we present 6 years of measurement results, from 2006 to 2011, of broadband performance with fast developing broadband networks in Korea. With 57% Fiber penetration in 2011, our data consist of a total of 29M test records and 10M subscribers. Over the 6 years, we have observed a 2.9-fold improvement in download speed (57Mbps), 2.8-fold increase in upload speed (38Mbps), and 0.7-fold decrease in latency due to the high penetration rate of Fiber broadband service and the advanced Cable modem technology. In addition, we carried out longitudinal analysis of various aspects of services, providers, regions, and cost-performance. We believe that the evolutionary Korean broadband measurement results can shed light on how high-speed access technologies are substantially enhancing on end-to-end performance.

  • Simple Primary User Signal Area Estimation for Spectrum Measurement

    Kenta UMEBAYASHI  Kazuki MORIWAKI  Riki MIZUCHI  Hiroki IWATA  Samuli TIIRO  Janne J. LEHTOMÄKI  Miguel LÓPEZ-BENÍTEZ  Yasuo SUZUKI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:2
      Page(s):
    523-532

    This paper investigates a signal area (SA) estimation method for wideband and long time duration spectrum measurements for dynamic spectrum access. SA denotes the area (in time/frequency domain) occupied by the primary user's signal. The traditional approach, which utilizes only Fourier transform (FT) and energy detector (ED) for SA estimation, can achieve low complexity, but its estimation performance is not very high. Against this issue, we apply post-processing to improve the performance of the FT-based ED. Our proposed method, simple SA (S-SA) estimation, exploits the correlation of the spectrum states among the neighboring tiles and the fact that SA typically has a rectangular shape to estimate SA with high accuracy and relatively low complexity compared to a conventional method, contour tracing SA (CT-SA) estimation. Numerical results will show that the S-SA estimation method can achieve better detection performance. The SA estimation and processing can reduce the number of bits needed to store/transmit the observed information compared to the FT-based ED. Thus, in addition to improved detection performance it also compresses the data.

  • A RAT Detection Method Based on Network Behavior of the Communication's Early Stage

    Dan JIANG  Kazumasa OMOTE  

     
    PAPER

      Vol:
    E99-A No:1
      Page(s):
    145-153

    Remote Access Trojans (RAT) is a spyware which can steal the confidential information from a target organization. The detection of RATs becomes more and more difficult because of targeted attacks, since the victim usually cannot realize that he/she is being attacked. After RAT's intrusion, the attacker can monitor and control the victim's PC remotely, to wait for an opportunity to steal the confidential information. As this situation, the main issue we face now is how to prevent confidential information being leaked back to the attacker. Although there are many existing approaches about RAT detection, there still remain two challenges: to detect RAT sessions as early as possible, and to distinguish them from the normal applications with a high accuracy. In this paper, we propose a novel approach to detect RAT sessions by their network behavior during the early stage of communication. The early stage is defined as a short period of time at communication's beginning; it also can be seen as the preparation period of the communication. We extract network behavior features from this period, to differentiate RAT sessions and normal sessions. For the implementation and evaluation, we use machine learning techniques with 5 algorithms and K-Fold cross-validation. As the results, our approach could detect RAT sessions in the communication's early stage with the accuracy over 96% together with the FNR of 10% by Random Forest algorithm.

  • Smart Packet Transmission Scheduling Combined with Rate Adaptation for Enhancing Total Throughput against Channel Fading in Wireless LAN

    Shiori YOSHIOKA  Yosuke TANIGAWA  Hideki TODE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:12
      Page(s):
    2496-2507

    This paper deals with the inefficient channel utilization of wireless LANs that use rate adaptation. Recently, wireless LANs are being utilized in various environments. However, inefficient channel utilization is still a serious problem. The effective solutions include to decrease the frequency of packet loss and to transmit packets at a higher rate. While the backoff algorithm in IEEE 802.11 avoids only the packet loss caused by collision, other previous works tackle the packet loss caused by channel fading by means of transmission at a lower rate. This approach is called rate adaptation and a simple rate adaptation scheme is widely diffused in commercial 802.11 wireless LAN devices. However, utilizing lower transmission rate degrades transmission efficiency because the channel is occupied for a longer time. In this paper, decreasing transmission rate is avoided with novel transmission scheduling. Specifically, the proposed scheduling interrupts packet transmission to receiver stations under fading channel condition until the condition improves. Instead, other packets to other stations are transmitted in advance. To implement this proposed scheduling, only access points (APs) need to be modified. Hence, legacy wireless stations can benefit from higher communication bandwidth simply by introducing the modified APs. Moreover, although wireless stations must also be modified, an extended RTS/CTS handshake is also proposed to quickly detect the improvement of channel condition and to minimize the wasted time even if fading loss occurs. Here, wireless stations must also be modified to adopt the extended RTS/CTS handshake but further bandwidth increase is achievable. Evaluation results demonstrate that network throughput is improved without degrading the throughput fairness among receiver stations and packet transfer delay of interrupted stations.

  • A Fundamental Inequality for Lower-Bounding the Error Probability for Classical and Classical-Quantum Multiple Access Channels and Its Applications

    Takuya KUBO  Hiroshi NAGAOKA  

     
    PAPER-Shannon Theory

      Vol:
    E98-A No:12
      Page(s):
    2376-2383

    In the study of the capacity problem for multiple access channels (MACs), a lower bound on the error probability obtained by Han plays a crucial role in the converse parts of several kinds of channel coding theorems in the information-spectrum framework. Recently, Yagi and Oohama showed a tighter bound than the Han bound by means of Polyanskiy's converse. In this paper, we give a new bound which generalizes and strengthens the Yagi-Oohama bound, and demonstrate that the bound plays a fundamental role in deriving extensions of several known bounds. In particular, the Yagi-Oohama bound is generalized to two different directions; i.e, to general input distributions and to general encoders. In addition we extend these bounds to the quantum MACs and apply them to the converse problems for several information-spectrum settings.

  • Signaling Based Discard with Flags: Per-Flow Fairness in Ring Aggregation Networks

    Yu NAKAYAMA  Ken-Ichi SUZUKI  Jun TERADA  Akihiro OTAKA  

     
    PAPER-Network

      Vol:
    E98-B No:12
      Page(s):
    2431-2438

    Ring aggregation networks are widely employed for metro access networks. A layer-2 ring with Ethernet Ring Protection is a popular topology for carrier services. Since frames are forwarded along ring nodes, a fairness scheme is required to achieve throughput fairness. Although per-node fairness algorithms have been developed for the Resilient Packet Ring, the per-node fairness is insufficient if there is bias in a flow distribution. To achieve per-flow fairness, N Rate N+1 Color Marking (NRN+1CM) was proposed. However, NRN+1CM can achieve fairness in case there are sufficient numbers of available bits on a frame header. It cannot be employed if the frame header cannot be overwritten. Therefore, the application range of NRN+1CM is limited. This paper proposes a Signaling based Discard with Flags (SDF) scheme for per-flow fairness. The objective of SDF is to eliminate the drawback of NRN+1CM. The key idea is to attach a flag to frames according to the input rate and to discard them selectively based on the flags and a dropping threshold. The flag is removed before the frame is transmitted to another node. The dropping threshold is cyclically updated by signaling between ring nodes and a master node. The SDF performance was confirmed by employing a theoretical analysis and computer simulations. The performance of SDF was comparable to that of NRN+1CM. It was verified that SDF can achieve per-flow throughput fairness without using a frame header in ring aggregation networks.

  • SP-MAC: A Media Access Control Method Based on the Synchronization Phenomena of Coupled Oscillators over WLAN

    Hiroyasu OBATA  Ryo HAMAMOTO  Chisa TAKANO  Kenji ISHIDA  

     
    PAPER-Wireless System

      Pubricized:
    2015/09/15
      Vol:
    E98-D No:12
      Page(s):
    2060-2070

    Wireless local area networks (LANs) based on the IEEE802.11 standard usually use carrier sense multiple access with collision avoidance (CSMA/CA) for media access control. However, in CSMA/CA, if the number of wireless terminals increases, the back-off time derived by the initial contention window (CW) tends to conflict among wireless terminals. Consequently, a data frame collision often occurs, which sometimes causes the degradation of the total throughput in the transport layer protocols. In this study, to improve the total throughput, we propose a new media access control method, SP-MAC, which is based on the synchronization phenomena of coupled oscillators. Moreover, this study shows that SP-MAC drastically decreases the data frame collision probability and improves the total throughput when compared with the original CSMA/CA method.

  • Facilitating Incentive-Compatible Access Probability Selection in Wireless Random Access Networks

    Bo GU  Cheng ZHANG  Kyoko YAMORI  Zhenyu ZHOU  Song LIU  Yoshiaki TANAKA  

     
    PAPER-Network

      Vol:
    E98-B No:11
      Page(s):
    2280-2290

    This paper studies the impact of integrating pricing with connection admission control (CAC) on the congestion management practices in contention-based wireless random access networks. Notably, when the network is free of charge, each self-interested user tries to occupy the channel as much as possible, resulting in the inefficient utilization of network resources. Pricing is therefore adopted as incentive mechanism to encourage users to choose their access probabilities considering the real-time network congestion level. A Stackelberg leader-follower game is formulated to analyze the competitive interaction between the service provider and the users. In particular, each user chooses the access probability that optimizes its payoff, while the self-interested service provider decides whether to admit or to reject the user's connection request in order to optimize its revenue. The stability of the Stackelberg leader-follower game in terms of convergence to the Nash equilibrium is established. The proposed CAC scheme is completely distributed and can be implemented by individual access points using only local information. Compared to the existing schemes, the proposed scheme achieves higher revenue gain, higher user payoff, and higher QoS performance.

  • Power-Saving in Storage Systems for Cloud Data Sharing Services with Data Access Prediction

    Koji HASEBE  Jumpei OKOSHI  Kazuhiko KATO  

     
    PAPER-Software System

      Pubricized:
    2015/06/30
      Vol:
    E98-D No:10
      Page(s):
    1744-1754

    We present a power-saving method for large-scale storage systems of cloud data sharing services, particularly those providing media (video and photograph) sharing services. The idea behind our method is to periodically rearrange stored data in a disk array, so that the workload is skewed toward a small subset of disks, while other disks can be sent to standby mode. This idea is borrowed from the Popular Data Concentration (PDC) technique, but to avoid an increase in response time caused by the accesses to disks in standby mode, we introduce a function that predicts future access frequencies of the uploaded files. This function uses the correlation of potential future accesses with the combination of elapsed time after upload and the total number of accesses in the past. We obtain this function in statistical analysis of the real access patterns of 50,000 randomly selected publicly available photographs on Flickr over 7,000 hours (around 10 months). Moreover, to adapt to a constant massive influx of data, we propose a mechanism that effectively packs the continuously uploaded data into the disk array in a storage system based on the PDC. To evaluate the effectiveness of our method, we measured the performance in simulations and a prototype implementation. We observed that our method consumed 12.2% less energy than the static configuration (in which all disks are in active mode). At the same time, our method maintained a preferred response time, with 0.23% of the total accesses involving disks in standby mode.

  • Measurement-Based Spectrum Database for Flexible Spectrum Management

    Koya SATO  Masayuki KITAMURA  Kei INAGE  Takeo FUJII  

     
    PAPER

      Vol:
    E98-B No:10
      Page(s):
    2004-2013

    In this paper, we propose the novel concept of a spectrum database for improving the efficiency of spectrum utilization. In the current design of TV white space spectrum databases, a propagation model is utilized to determine the spectrum availability. However, this propagation model has poor accuracy for radio environment estimation because it requires a large interference margin for the PU coverage area to ensure protection of primary users (PUs); thus, it decreases the spectrum sharing efficiency. The proposed spectrum database consists of radio environment measurement results from sensors on mobile terminals such as vehicles and smart phones. In the proposed database, actual measurements of radio signals are used to estimate radio information regarding PUs. Because the sensors on mobile terminals can gather a large amount of data, accurate propagation information can be obtained, including information regarding propagation loss and shadowing. In this paper, we first introduce the architecture of the proposed spectrum database. Then, we present experimental results for the database construction using actual TV broadcast signals. Additionally, from the evaluation results, we discuss the extent to which the proposed database can mitigate the excess interference margin.

  • Decentralized Multilevel Power Allocation for Random Access

    Huifa LIN  Koji ISHIBASHI  Won-Yong SHIN  Takeo FUJII  

     
    PAPER

      Vol:
    E98-B No:10
      Page(s):
    1978-1987

    In this paper, we introduce a distributed power allocation strategy for random access, that has the capabilities of multipacket reception (MPR) and successive interference cancellation (SIC). The proposed random access scheme is suitable for machine-to-machine (M2M) communication application in fifth-generation (5G) cellular networks. A previous study optimized the probability distribution for discrete transmission power levels, with implicit limitations on the successful decoding of at most two packets from a single collision. We formulate the optimization problem for the general case, where a base station can decode multiple packets from a single collision, and this depends only on the signal-to-interference-plus-noise ratio (SINR). We also propose a feasible suboptimal iterative per-level optimization process; we do this by introducing relationships among the different discrete power levels. Compared with the conventional power allocation scheme with MPR and SIC, our method significantly improves the system throughput; this is confirmed by computer simulations.

  • Non-Orthogonal Multiple Access Using Intra-Beam Superposition Coding and Successive Interference Cancellation for Cellular MIMO Downlink

    Kenichi HIGUCHI  Yoshihisa KISHIYAMA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:9
      Page(s):
    1888-1895

    We investigate non-orthogonal multiple access (NOMA) with a successive interference canceller (SIC) in the cellular multiple-input multiple-output (MIMO) downlink for systems beyond LTE-Advanced. Taking into account the overhead for the downlink reference signaling for channel estimation at the user terminal in the case of non-orthogonal multiuser multiplexing and the applicability of the SIC receiver in the MIMO downlink, we propose intra-beam superposition coding of a multiuser signal at the transmitter and the spatial filtering of inter-beam interference followed by the intra-beam SIC at the user terminal receiver. The intra-beam SIC cancels out the inter-user interference within a beam. Regarding the transmitter beamforming (precoding), in general, any kind of beamforming matrix determination criteria can be applied to the proposed NOMA method. In the paper, we assume open loop-type random beamforming, which is very efficient in terms of the amount of feedback information from the user terminal. Furthermore, we employ a weighted proportional fair (PF)-based resource (beam of each frequency block and power) allocation for the proposed method. Simulation results show that the proposed NOMA method using the intra-beam superposition coding and SIC simultaneously achieves better sum and cell-edge user throughput compared to orthogonal multiple access (OMA), which is widely used in 3.9 and 4G mobile communication systems.

  • Comparative Analysis on Channel Allocation Schemes in Multiple Subcarrier Passive Communication System

    Nitish RAJORIA  Yuki IGARASHI  Jin MITSUGI  Yusuke KAWAKITA  Haruhisa ICHIKAWA  

     
    PAPER

      Vol:
    E98-B No:9
      Page(s):
    1777-1784

    Multiple subcarrier passive communication is a new research area which enables a type of frequency division multiple access with wireless and batteryless sensor RF tags just by implementing RF switches to produce dedicated subcarriers. Since the mutual interference among subcarriers is unevenly distributed over the frequency band, careless allocations of subcarrier frequencies may result in degraded network performance and inefficient use of the frequency resource. In this paper, we examine four subcarrier frequency allocation schemes using MATLAB numerical simulations. The four schemes are evaluated in terms of the communication capacity and access fairness among sensor RF tags. We found that the subcarrier allocation scheme plays an important role in multiple subcarrier communication and can improves the communication capacity by 35%.

  • 5G Wireless Access Open Access

    Erik DAHLMAN  Stefan PARKVALL  Janne PEISA  

     
    INVITED PAPER

      Vol:
    E98-B No:8
      Page(s):
    1407-1414

    5G is the next step in the evolution of mobile communication and a key component of the future networked society. It will include the evolution of LTE as well as new non-backwards-compatible technology. With capabilities such as massive system capacity, higher data rates, very low latency and ultra-high reliability, 5G will provide significantly enhanced mobile-broadband experience but also support a wide range of new wireless applications and use cases. Key technology components include operation at higher frequency bands and flexible spectrum usage, advanced multi-antenna/multi-site transmission, lean transmission, access/backhaul integration, and possibility for direct device-to-device communication.

  • Non-Orthogonal Multiple Access Using Intra-Beam Superposition Coding and SIC in Base Station Cooperative MIMO Cellular Downlink

    Nobuhide NONAKA  Yoshihisa KISHIYAMA  Kenichi HIGUCHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:8
      Page(s):
    1651-1659

    This paper extends our previously proposed non-orthogonal multiple access (NOMA) scheme to the base station (BS) cooperative multiple-input multiple-output (MIMO) cellular downlink for future radio access. The proposed NOMA scheme employs intra-beam superposition coding of a multiuser signal at the transmitter and the spatial filtering of inter-beam interference followed by the intra-beam successive interference canceller (SIC) at the user terminal receiver. The intra-beam SIC cancels out the inter-user interference within a beam. This configuration achieves reduced overhead for the downlink reference signaling for channel estimation at the user terminal in the case of non-orthogonal user multiplexing and enables the use of the SIC receiver in the MIMO downlink. The transmitter beamforming (precoding) matrix is controlled based on open loop-type random beamforming using a block-diagonalized beamforming matrix, which is very efficient in terms of the amount of feedback information from the user terminal. Simulation results show that the proposed NOMA scheme with block-diagonalized random beamforming in BS cooperative multiuser MIMO and the intra-beam SIC achieves better system-level throughput than orthogonal multiple access (OMA), which is assumed in LTE-Advanced. We also show that BS cooperative operation along with the proposed NOMA further enhances the cell-edge user throughput gain which implies better user fairness and universal connectivity.

  • Uplink Non-Orthogonal Multiple Access (NOMA) with Single-Carrier Frequency Division Multiple Access (SC-FDMA) for 5G Systems

    Anxin LI  Anass BENJEBBOUR  Xiaohang CHEN  Huiling JIANG  Hidetoshi KAYAMA  

     
    PAPER

      Vol:
    E98-B No:8
      Page(s):
    1426-1435

    Non-orthogonal multiple access (NOMA) utilizing the power domain and advanced receiver has been considered as one promising multiple access technology for further cellular enhancements toward the 5th generation (5G) mobile communications system. Most of the existing investigations into NOMA focus on the combination of NOMA with orthogonal frequency division multiple access (OFDMA) for either downlink or uplink. In this paper, we investigate NOMA for uplink with single carrier-frequency division multiple access (SC-FDMA) being used. Differently from OFDMA, SC-FDMA requires consecutive resource allocation to a user equipment (UE) in order to achieve low peak to average power ratio (PAPR) transmission by the UE. Therefore, sophisticated designs of scheduling algorithm for NOMA with SC-FDMA are needed. To this end, this paper investigates the key issues of uplink NOMA scheduling such as UE grouping method and resource widening strategy. Because the optimal schemes have high computational complexity, novel schemes with low computational complexity are proposed for practical usage for uplink resource allocation of NOMA with SC-FDMA. On the basis of the proposed scheduling schemes, the performance of NOMA is investigated by system-level simulations in order to provide insights into the suitability of using NOMA for uplink radio access. Key issues impacting NOMA performance are evaluated and analyzed, such as scheduling granularity, UE number and the combination with fractional frequency reuse (FFR). Simulation results verify the effectiveness of the proposed algorithms and show that NOMA is a promising radio access technology for 5G systems.

141-160hit(874hit)