The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] access(874hit)

161-180hit(874hit)

  • 5G Wireless Access Open Access

    Erik DAHLMAN  Stefan PARKVALL  Janne PEISA  

     
    INVITED PAPER

      Vol:
    E98-B No:8
      Page(s):
    1407-1414

    5G is the next step in the evolution of mobile communication and a key component of the future networked society. It will include the evolution of LTE as well as new non-backwards-compatible technology. With capabilities such as massive system capacity, higher data rates, very low latency and ultra-high reliability, 5G will provide significantly enhanced mobile-broadband experience but also support a wide range of new wireless applications and use cases. Key technology components include operation at higher frequency bands and flexible spectrum usage, advanced multi-antenna/multi-site transmission, lean transmission, access/backhaul integration, and possibility for direct device-to-device communication.

  • Uplink Non-Orthogonal Multiple Access (NOMA) with Single-Carrier Frequency Division Multiple Access (SC-FDMA) for 5G Systems

    Anxin LI  Anass BENJEBBOUR  Xiaohang CHEN  Huiling JIANG  Hidetoshi KAYAMA  

     
    PAPER

      Vol:
    E98-B No:8
      Page(s):
    1426-1435

    Non-orthogonal multiple access (NOMA) utilizing the power domain and advanced receiver has been considered as one promising multiple access technology for further cellular enhancements toward the 5th generation (5G) mobile communications system. Most of the existing investigations into NOMA focus on the combination of NOMA with orthogonal frequency division multiple access (OFDMA) for either downlink or uplink. In this paper, we investigate NOMA for uplink with single carrier-frequency division multiple access (SC-FDMA) being used. Differently from OFDMA, SC-FDMA requires consecutive resource allocation to a user equipment (UE) in order to achieve low peak to average power ratio (PAPR) transmission by the UE. Therefore, sophisticated designs of scheduling algorithm for NOMA with SC-FDMA are needed. To this end, this paper investigates the key issues of uplink NOMA scheduling such as UE grouping method and resource widening strategy. Because the optimal schemes have high computational complexity, novel schemes with low computational complexity are proposed for practical usage for uplink resource allocation of NOMA with SC-FDMA. On the basis of the proposed scheduling schemes, the performance of NOMA is investigated by system-level simulations in order to provide insights into the suitability of using NOMA for uplink radio access. Key issues impacting NOMA performance are evaluated and analyzed, such as scheduling granularity, UE number and the combination with fractional frequency reuse (FFR). Simulation results verify the effectiveness of the proposed algorithms and show that NOMA is a promising radio access technology for 5G systems.

  • Survey of Transmission Methods and Efficiency Using MIMO Technologies for Wireless LAN Systems Open Access

    Takefumi HIRAGURI  Kentaro NISHIMORI  

     
    INVITED SURVEY PAPER

      Vol:
    E98-B No:7
      Page(s):
    1250-1267

    Multiple-input multiple-output (MIMO) transmission is attracting interest for increasing the transmission rates of wireless systems. This paper surveys MIMO transmission technology from the viewpoints of transmission methods, access control schemes, and total transmission efficiency. We consider wireless local area networks (WLAN) systems that use MIMO technology; moreover, we focus on multiuser MIMO (MU-MIMO) technology, which will be introduced in next-generation WLAN systems such as IEEE802.11ac. This paper explains the differences in the detailed access control procedures for MIMO and MU-MIMO transmission, including channel state information (CSI) acquisition. Furthermore, the issues related to CSI feedback and solutions are also discussed. Related works on the medium access control (MAC) protocol in MIMO/MU-MIMO transmission are introduced. In addition, the throughput performance using MIMO/MU-MIMO transmission is evaluated considering an IEEE802.11ac-based WLAN system. From the numerical evaluation, it is shown that the overhead due to CSI feedback from the user terminals to the base station causes a decrease in the throughput. We verified that implicit beamforming, which eliminates CSI feedback, is effective for solving this issue.

  • A Camera and LED-Based Medium Access Control Scheme for Wireless LANs

    Ryo NISHIOKA  Takayuki NISHIO  Masahiro MORIKURA  Koji YAMAMOTO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:5
      Page(s):
    917-926

    The IEEE 802.11 wireless LAN (WLAN) is based on carrier sense multiple access with collision avoidance (CSMA/CA) protocol. CSMA/CA uses a backoff mechanism to avoid collisions among stations (STAs). One disadvantage of backoff mechanisms is that STAs must wait for some period of time before transmission, which degrades spectral efficiency. Moreover, a backoff algorithm cannot completely avoid collisions. We have proposed a novel medium access control (MAC) scheme called the visual recognition-based medium access control (VRMAC) scheme, which uses an LED-camera communication technique. STAs send media-access request messages by blinking their LEDs in VRMAC scheme. An access point (AP) receives the messages via its camera, and then allocates transmission opportunities to the STAs by transmitting control frames. Since the transmission rate of the LED-camera communication is lower than WLAN transmission, the delay of access requesting causes and it could decrease the system throughput of the VRMAC system based WLAN. We reveal the effect of the delay for TCP flows and propose enhanced access procedures to eliminate the effect of the delay. Our simulation results demonstrate that VRMAC scheme increases the system throughput in UDP and TCP traffic. Moreover, the scenario-based evaluations reveal that VRMAC scheme also decreases the session delay which is a metric of quality of experience (QoE) for TCP applications.

  • Resistance-Switching Characteristics of Si-rich Oxide Evaluated by Using Ni Nanodots as Electrodes in Conductive AFM Measurements

    Akio OHTA  Chong LIU  Takashi ARAI  Daichi TAKEUCHI  Hai ZHANG  Katsunori MAKIHARA  Seiichi MIYAZAKI  

     
    PAPER

      Vol:
    E98-C No:5
      Page(s):
    406-410

    Ni nanodots (NDs) used as nano-scale top electrodes were formed on a 10-nm-thick Si-rich oxide (SiO$_{mathrm{x}}$)/Ni bottom electrode by exposing a 2-nm-thick Ni layer to remote H$_{2}$-plasma (H$_{2}$-RP) without external heating, and the resistance-switching behaviors of SiO$_{mathrm{x}}$ were investigated from current-voltage ( extit{I--V}) curves. Atomic force microscope (AFM) analyses confirmed the formation of electrically isolated Ni NDs as a result of surface migration and agglomeration of Ni atoms promoted by the surface recombination of H radicals. From local extit{I--V} measurements performed by contacting a single Ni ND as a top electrode with a Rh coated Si cantilever, a distinct uni-polar type resistance switching behavior was observed repeatedly despite an average contact area between the Ni ND and the SiO$_{mathrm{x}}$ as small as $sim$ 1.9 $ imes$ 10$^{-12}$cm$^{2}$. This local extit{I--V} measurement technique is quite a simple method to evaluate the size scalability of switching properties.

  • Authorization Conflict Problems in Combining RIF Rules with RDF Data

    Jaehoon KIM  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2014/09/05
      Vol:
    E98-D No:4
      Page(s):
    863-871

    Resource Description Framework (RDF) access control suffers from an authorization conflict problem caused by RDF inference. When an access authorization is specified, it can lie in conflict with other access authorizations that have the opposite security sign as a result of RDF inference. In our former study, we analyzed the authorization conflict problem caused by subsumption inference, which is the key inference in RDF. The Rule Interchange Format (RIF) is a Web standard rule language recommended by W3C, and can be combined with RDF data. Therefore, as in RDF inference, an authorization conflict can be caused by RIF inference. In addition, this authorization conflict can arise as a result of the interaction of RIF inference and RDF inference rather than of RIF inference alone. In this paper, we analyze the authorization conflict problem caused by RIF inference and suggest an efficient authorization conflict detection algorithm. The algorithm exploits the graph labeling-based algorithm proposed in our earlier paper. Through experiments, we show that the performance of the graph labeling-based algorithm is outstanding for large RDF data.

  • Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS

    Jing YU  Toshihiro YAMAUCHI  

     
    LETTER-Access Control

      Pubricized:
    2014/12/04
      Vol:
    E98-D No:4
      Page(s):
    807-811

    Android applications that using WebView can load and display web pages. Interaction with web pages allows JavaScript code within the web pages to access resources on the Android device by using the Java object, which is registered into WebView. If this WebView feature were exploited by an attacker, JavaScript code could be used to launch attacks, such as stealing from or tampering personal information in the device. To address these threats, we propose an access control on the security-sensitive APIs at the Java object level. The proposed access control uses static analysis to identify these security-sensitive APIs, detects threats at runtime, and notifies the user if threats are detected, thereby preventing attacks from web pages.

  • Non-orthogonal Multiple Access (NOMA) with Successive Interference Cancellation for Future Radio Access Open Access

    Kenichi HIGUCHI  Anass BENJEBBOUR  

     
    Invited Survey Paper-Wireless Communication Technologies

      Vol:
    E98-B No:3
      Page(s):
    403-414

    This paper presents our investigation of non-orthogonal multiple access (NOMA) as a novel and promising power-domain user multiplexing scheme for future radio access. Based on information theory, we can expect that NOMA with a successive interference canceller (SIC) applied to the receiver side will offer a better tradeoff between system efficiency and user fairness than orthogonal multiple access (OMA), which is widely used in 3.9 and 4G mobile communication systems. This improvement becomes especially significant when the channel conditions among the non-orthogonally multiplexed users are significantly different. Thus, NOMA can be expected to efficiently exploit the near-far effect experienced in cellular environments. In this paper, we describe the basic principle of NOMA in both the downlink and uplink and then present our proposed NOMA scheme for the scenario where the base station is equipped with multiple antennas. Simulation results show the potential system-level throughput gains of NOMA relative to OMA.

  • Indoor Fingerprinting Localization and Tracking System Using Particle Swarm Optimization and Kalman Filter

    Genming DING  Zhenhui TAN  Jinsong WU  Jinshan ZENG  Lingwen ZHANG  

     
    PAPER-Sensing

      Vol:
    E98-B No:3
      Page(s):
    502-514

    The indoor fingerprinting localization technology has received more attention in recent years due to the increasing demand of the indoor location based services (LBSs). However, a high quality of the LBS requires a positioning solution with high accuracy and low computational complexity. The particle swarm optimization (PSO) technique, which emulates the social behavior of a flock of birds to search for the optimal solution of a special problem, can provide attractive performance in terms of accuracy, computational efficiency and convergence rate. In this paper, we adopt the PSO algorithm to estimate the location information. First, our system establishes a Bayesian-rule based objective function. It then applies PSO to identify the optimal solution. We also propose a hybrid access point (AP) selection method to improve the accuracy, and analyze the effects of the number and the initial positions of particles on the localization performance. In order to mitigate the estimation error, we use the Kalman Filter to update the initial estimated location via the PSO algorithm to track the trail of the mobile user. Our analysis indicates that our method can reduce the computational complexity and improve the real-time performance. Numerous experiments also demonstrate that our proposed localization and tracking system achieve higher localization accuracy than existing systems.

  • Performance of Non-orthogonal Multiple Access with SIC in Cellular Downlink Using Proportional Fair-Based Resource Allocation

    Nagisa OTAO  Yoshihisa KISHIYAMA  Kenichi HIGUCHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:2
      Page(s):
    344-351

    This paper investigates the system-level throughput of non-orthogonal multiple access (NOMA) with a successive interference canceller (SIC) in the cellular downlink assuming proportional fair (PF)-based radio resource (bandwidth and transmission power) allocation. The purpose of this study is to examine the possibility of applying NOMA with a SIC to the systems beyond the 4G cellular system. Both the mean and cell-edge user throughput are important in a real system. PF-based scheduling is known to achieve a good tradeoff between them by maximizing the product of the user throughput among users within a cell. In NOMA with a SIC, the scheduler allocates the same frequency to multiple users simultaneously, which necessitates multiuser scheduling. To achieve a better tradeoff between the mean and cell-edge user throughput, we propose and compare three power allocation strategies among users, which are jointly implemented with multiuser scheduling. Extensive simulation results show that NOMA with a SIC with a moderate number of non-orthogonally multiplexed users significantly enhances the system-level throughput performance compared to orthogonal multiple access (OMA), which is widely used in 3.9 and 4G mobile communication systems.

  • Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient

    Junko TAKAHASHI  Toshinori FUKUNAGA  Kazumaro AOKI  Hitoshi FUJI  

     
    PAPER-Foundation

      Vol:
    E98-A No:1
      Page(s):
    192-202

    This paper proposes a new accurate evaluation method for examining the resistance of cryptographic implementations against access-driven cache attacks (CAs). We show that a mathematical correlation method between the sets of measured access time and the ideal data, which depend on the guessed key, can be utilized to evaluate quantitatively the correct key in access-driven CAs. We show the effectiveness of the proposed method using the access time measured in noisy environments. We also estimate the number of key candidates based on mathematical proof while considering memory allocation. Furthermore, based on the proposed method, we analyze quantitatively how the correlation values change with the number of plaintexts for a successful attack.

  • Cooperation between Channel Access Control and TCP Rate Adaptation in Multi-Hop Ad Hoc Networks

    Pham Thanh GIANG  Kenji NAKAGAWA  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    79-87

    In this paper, we propose a new cross-layer scheme Cooperation between channel Access control and TCP Rate Adaptation (CATRA) aiming to manage TCP flow contention in multi-hop ad hoc networks. CATRA scheme collects useful information from MAC and physical layers to estimate channel utilization of the station. Based on this information, we adjust Contention Window (CW) size to control the contention between stations. It can also achieve fair channel access for fair channel access of each station and the efficient spatial channel usage. Moreover, the fair value of bandwidth allocation for each flow is calculated and sent to the Transport layer. Then, we adjust the sending rate of TCP flow to solve the contention between flows and the throughput of each flow becomes fairer. The performance of CATRA is examined on various multi-hop network topologies by using Network Simulator (NS-2).

  • Minimization of the Fabrication Cost for a Bridged-Bus-Based TDMA System under Hard Real-Time Constraints

    Makoto SUGIHARA  

     
    PAPER-Network

      Vol:
    E97-D No:12
      Page(s):
    3041-3051

    Industrial applications such as automotive ones require a cheap communication mechanism to send out communication messages from node to node by their deadline time. This paper presents a design paradigm in which we optimize both assignment of a network node to a bus and slot multiplexing of a FlexRay network system under hard real-time constraints so that we can minimize the cost of wire harness for the FlexRay network system. We present a cost minimization problem as a non-linear model. We developed a network synthesis tool which was based on simulated annealing. Our experimental results show that our design paradigm achieved a 50.0% less cost than a previously proposed approach for a virtual cost model.

  • Multi-Access Selection Algorithm Based on Joint Utility Optimization for the Fusion of Heterogeneous Wireless Networks

    Lina ZHANG  Qi ZHU  Shasha ZHAO  

     
    PAPER

      Vol:
    E97-B No:11
      Page(s):
    2269-2277

    Network selection is one of the hot issues in the fusion of heterogeneous wireless networks (HWNs). However, most of previous works only consider selecting single-access network, which wastes other available network resources, rarely take account of multi-access. To make full utilization of available coexisted networks, this paper proposes a novel multi-access selection algorithm based on joint utility optimization for users with multi-mode terminals. At first, the algorithm adopts exponential smoothing method (ESM) to get smoothed values of received signal strength (RSS). Then we obtain network joint utility function under the constraints of bandwidth and number of networks, with the consideration of trade-off between network benefit and cost. At last, Lagrange multiplier and dual optimization methods are used to maximize joint utility. Users select multiple networks according to the optimal association matrix of user and network. The simulation results show that the proposed algorithm can optimize network joint utility, improve throughput, effectively reduce vertical handoff number, and ensure Quality of Service (QoS).

  • Automatic Inclusion of Semantics over Keyword-Based Linked Data Retrieval

    Md-Mizanur RAHOMAN  Ryutaro ICHISE  

     
    PAPER-Data Engineering, Web Information Systems

      Vol:
    E97-D No:11
      Page(s):
    2852-2862

    Keyword-based linked data information retrieval is an easy choice for general-purpose users, but the implementation of such an approach is a challenge because mere keywords do not hold semantic information. Some studies have incorporated templates in an effort to bridge this gap, but most such approaches have proven ineffective because of inefficient template management. Because linked data can be presented in a structured format, we can assume that the data's internal statistics can be used to effectively influence template management. In this work, we explore the use of this influence for template creation, ranking, and scaling. Then, we demonstrate how our proposal for automatic linked data information retrieval can be used alongside familiar keyword-based information retrieval methods, and can also be incorporated alongside other techniques, such as ontology inclusion and sophisticated matching, in order to achieve increased levels of performance.

  • Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation Open Access

    Yuto NAKANO  Shinsaku KIYOMOTO  Yutaka MIYAKE  Kouichi SAKURAI  

     
    INVITED PAPER

      Vol:
    E97-D No:10
      Page(s):
    2576-2585

    Oblivious RAM (ORAM) schemes, the concept introduced by Goldreich and Ostrovsky, are very useful technique for protecting users' privacy when storing data in remote untrusted servers and running software on untrusted systems. However they are usually considered impractical due to their huge overhead. In order to reduce overhead, many improvements have been presented. Thanks to these improvements, ORAM schemes can be considered practical on cloud environment where users can expect huge storage and high computational power. Especially for private information retrieval (PIR), some literatures demonstrated they are usable. Also dedicated PIRs have been proposed and shown that they are usable in practice. Yet, they are still impractical for protecting software running on untrusted systems. We first survey recent researches on ORAM and PIR. Then, we present a practical software-based memory protection scheme applicable to several environments. The main feature of our scheme is that it records the history of accesses and uses the history to hide the access pattern. We also address implementing issues of ORAM and propose practical solutions for these issues.

  • Coherent Combining-Based Initial Ranging Scheme for MIMO-OFDMA Systems

    Yujie XIA  Guangliang REN  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:10
      Page(s):
    2203-2211

    A coherent combining-based initial ranging scheme is proposed for multiple-input multiple-output and orthogonal frequency division multiple access systems. The proposed algorithm utilizes the correlation properties of the ranging codes to resolve the multipath components, coherently combines the initial ranging signal of resolved path on each receiving antenna to maximize the output signal-to-interference-and-noise ratio, and then collects the power of the multipath signals to detect the states of the ranging codes. Simulation results show that the proposed scheme has much better performance than the available noncoherent combining method, and can accommodate more active ranging users simultaneously in each cell.

  • Multi-Stage DCF-Based Channel Access Scheme for Throughput Enhancement of OFDMA WLAN Systems

    Shinichi MIYAMOTO  Naoya IKESHITA  Seiichi SAMPEI  Wenjie JIANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:10
      Page(s):
    2230-2242

    To enhance the throughput of wireless local area networks (WLANs) by efficiently utilizing the radio resource, a distributed coordination function-based (DCF-based) orthogonal frequency division multiple access (OFDMA) WLAN system has been proposed. In the system, since each OFDMA sub-channel is assigned to the associated station with the highest channel gain, the transmission rate of DATA frames can be enhanced thanks to multi-user diversity. However, the optimum allocation of OFDMA sub-channels requires the estimation of channel state information (CSI) of all associated stations, and this incurs excessive signaling overhead. As the number of associated stations increases, the signaling overhead severely degrades the throughput of DCF-based OFDMA WLAN. To reduce the signaling overhead while obtaining a sufficient diversity gain, this paper proposes a channel access scheme that performs multiple DCF-based channel access. The key idea of the proposed scheme is to introduce additional DCF-based prioritized access along with the traditional DCF-based random access. In the additional DCF-based prioritized access, by dynamically adjusting contention window size according to the CSI of each station, only the stations with better channel state inform their CSI to the access point (AP), and the signaling overhead can be reduced while maintaining high multi-user diversity gain. Numerical results confirm that the proposed channel access scheme enhances the throughput of OFDMA WLAN.

  • MSK Modulation for Physical-Layer Network Coding Systems

    Nan SHA  Yuanyuan GAO  Xiaoxin YI  Wei JIAN  Weiwei YANG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E97-A No:10
      Page(s):
    2086-2089

    In this letter, we combine minimum-shift keying (MSK) with physical-layer network coding (PNC) to form a new scheme, i.e., MSK-PNC, for two-way relay channels (TWRCs). The signal detection of the MSK-PNC scheme is investigated, and two detection methods are proposed. The first one is orthogonal demodulation and mapping (ODM), and the second one is two-state differential detection (TSDD). The error performance of the proposed MSK-PNC scheme is evaluated through simulations.

  • Scalable Connection-Based Time Division Multiple Access Architecture for Wireless Network-on-Chip

    Shijun LIN  Zhaoshan LIU  Jianghong SHI  Xiaofang WU  

     
    BRIEF PAPER-Integrated Electronics

      Vol:
    E97-C No:9
      Page(s):
    918-921

    In this paper, we propose a scalable connection-based time division multiple access architecture for wireless NoC. In this architecture, only one-hop transmission is needed when a packet is transmitted from one wired subnet to another wired subnet, which improves the communication performance and cuts down the energy consumption. Furthermore, by carefully designing the central arbiter, the bandwidth of the wireless channel can be fully used. Simulation results show that compared with the traditional WCube wireless NoC architecture, the proposed architecture can greatly improve the network throughput, and cut down the transmission latency and energy consumption with a reasonable area overhead.

161-180hit(874hit)