The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] form(3161hit)

821-840hit(3161hit)

  • Mutual Information Evaluation and Optimization of Intermittent Transmission Methods in Energy Harvesting Wireless Sensor Networks

    Xiaohui FAN  Hiraku OKADA  Kentaro KOBAYASHI  Masaaki KATAYAMA  

     
    PAPER

      Vol:
    E97-B No:9
      Page(s):
    1826-1834

    Energy harvesting technology was introduced into wireless sensor networks (WSNs) to solve the problem of the short lifetimes of sensor nodes. The technology gives sensor nodes the ability to convert environmental energy into electricity. Sufficient electrical energy can lengthen the lifetime and improve the quality of service of a WSN. This paper proposes a novel use of mutual information to evaluate data transmission behavior in the energy harvesting WSNs. Data at a sink for a node deteriorates over time until the next periodic transmission from the node is received. In this paper, we suggest an optimized intermittent transmission method for WSNs that harvest energy. Our method overcomes the problem of information deterioration without increasing energy cost. We show that by using spatial correlation between different sensor nodes, our proposed method can mitigate information deterioration significantly at the sink.

  • Performance Analysis of Multiuser Relay Networks with Feedback Delay

    Jie YANG  Xiaofei ZHANG  Kai YANG  

     
    PAPER-Communication Theory and Signals

      Vol:
    E97-A No:8
      Page(s):
    1770-1779

    In this paper, we analyze the performance of a dual-hop multiuser amplify-and-forward (AF) relay network with the effect of the feedback delay, where the source and each of the K destinations are equipped with Nt and Nr antennas respectively, and the relay is equipped with a single antenna. In the relay network, multi-antenna and multiuser diversities are guaranteed via beamforming and opportunistic scheduling, respectively. To examine the impact of delayed feedback, the new exact analytical expressions for the outage probability (OP) and symbol error rate (SER) are derived in closed-form over Rayleigh fading channel, which are useful for a large number of modulation schemes. In addition, we present the asymptotic expressions for OP and SER in the high signal-to-noise ratio (SNR) regime, from which we gain an insight into the system performance with deriving the diversity order and array gain. Moreover, based on the asymptotic expressions, we determine power allocation among the network nodes such that the OP is minimized. The analytical expressions are validated by Monte-Carlo simulations.

  • Convex Approximated Weighted Sum-Rate Maximization for Multicell Multiuser OFDM

    Mirza Golam KIBRIA  Hidekazu MURATA  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E97-A No:8
      Page(s):
    1800-1805

    This letter considers the weighted sum-rate maximization (WSRMax) problem in downlink multicell multiuser orthogonal frequency-division multiplexing system. The WSRMax problem under per base station transmit power constraint is known to be NP-hard, and the optimal solution is computationally very expensive. We propose two less-complex suboptimal convex approximated solutions which are based on sequential parametric convex approximation approach. We derive provably faster convergent iterative convex approximation techniques that locally optimize the weighted sum-rate function. Both the iterative solutions are found to converge to the local optimal solution within a few iterations compared to other well-known techniques. The numerical results demonstrate the effectiveness and superiority of the proposed approaches.

  • Fast Transform Unit Decision for HEVC

    Jangbyung KANG  Jin-Soo KIM  Jae-Gon KIM  Haechul CHOI  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E97-D No:8
      Page(s):
    2205-2208

    For the High Efficiency Video Coding (HEVC) standard, a fast transform unit (TU) decision method is proposed. HEVC defines the TU representing a region sharing the same transformation, and it supports various transform sizes from 4×4 to 32×32 by using a quadtree of TUs. The various sizes of TUs can provide good coding efficiency, whereas it may dramatically increase encoding complexity. Assuming that a TU with highly compacted energy is unlikely to be split, the proposed method determines an appropriate TU size according to the position of the last non-zero transform coefficient. Experimental results show that this reduces encoding run time by 17.2% with a negligible coding loss of 0.78% BD-rate for the random-access scenario.

  • Joint Lifetime-Utility Cross-Layer Optimization for Network Coding-Based Wireless Multi-Hop Networks with Matrix Game and Multiple Payoffs

    Jain-Shing LIU  

     
    PAPER-Network

      Vol:
    E97-B No:8
      Page(s):
    1638-1646

    Maximizing network lifetime and optimizing aggregate system utility are important but usually conflict goals in wireless multi-hop networks. For the trade-off, we present a matrix game-theoretic cross-layer optimization formulation to jointly maximize the diverse objectives in such networks with network coding. To this end, we introduce a cross-layer formulation of general network utility maximization (NUM) that accommodates routing, scheduling, and stream control from different layers in the coded networks. Specifically, for the scheduling problem and then the objective function involved, we develop a matrix game with the strategy sets of the players corresponding to hyperlink and transmission mode, and design multiple payoffs specific to lifetime and system utility, respectively. In particular, with the inherit merit that matrix game can be solved with mathematical programming, our cross-layer programming formulation actually benefits from both game-based and NUM-based approaches at the same time by cooperating the programming model for the matrix game with that for the other layers in a consistent framework. Finally, our numerical experiments quantitatively exemplify the possible performance trad-offs with respect to the two variants developed on the multiple objectives in question while qualitatively exhibiting the differences between the framework and the other related works.

  • Limited Feedback for Cooperative Multicell MIMO Systems with Multiple Receive Antennas

    Yating WU  Tao WANG  Yanzan SUN  Yidong CUI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:8
      Page(s):
    1701-1708

    Multicell cooperation is a promising technique to mitigate the inter-cell interference and improve the sum rate in cellular systems. Limited feedback design is of great importance to base station cooperation as it provides the quantized channel state information (CSI) of both the desired and interfering channels to the transmitters. Most studies on multicell limited feedback deal with scenarios of a single receive antenna at the mobile user. This paper, however, applies limited feedback to cooperative multicell multiple-input multiple-output (MIMO) systems where both base stations and users are equipped with multiple antennas. An optimized feedback strategy with random vector quantization (RVQ) codebook is proposed for interference aware coordinated beamforming that approximately maximizes the lower bound of the sum rate. By minimizing the upper-bound on the mean sum-rate loss induced by the quantization errors, we present a feedback-bit allocation algorithm to divide the available feedback bits between the desired and interfering channels for arbitrary number of transmit and receive antennas under different interfering signal strengths. Simulation results demonstrate that the proposed scheme utilizes the feedback resource effectively and achieves sum-rate performance reasonably close to the full CSI case.

  • Weak-Form Discretization, Waveguide Boundary Conditions and Extraction of Quasi-Localized Waves Causing Fano Resonance

    Hatsuhiro KATO  Hatsuyoshi KATO  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E97-A No:8
      Page(s):
    1720-1727

    Recently, we proposed a weak-form discretization scheme to derive second-order difference equations from the governing equation of the scattering problem. In this paper, under the scope of the proposed scheme, numerical expressions for the waveguide boundary conditions are derived as perfectly absorbing conditions for input and output ports. The waveguide boundary conditions play an important role in extracting the quasi-localized wave as an eigenstate with a complex eigenvalue. The wave-number dependence of the resonance curve in Fano resonance is reproduced by using a semi-analytic model that is developed on the basis of the phase change relevant to the S-matrix. The reproduction confirms that the eigenstate with a complex eigenvalue does cause the observed Fano resonance.

  • EDISON Science Gateway: A Cyber-Environment for Domain-Neutral Scientific Computing

    Hoon RYU  Jung-Lok YU  Duseok JIN  Jun-Hyung LEE  Dukyun NAM  Jongsuk LEE  Kumwon CHO  Hee-Jung BYUN  Okhwan BYEON  

     
    PAPER-Scientific Application

      Vol:
    E97-D No:8
      Page(s):
    1953-1964

    We discuss a new high performance computing service (HPCS) platform that has been developed to provide domain-neutral computing service under the governmental support from “EDucation-research Integration through Simulation On the Net” (EDISON) project. With a first focus on technical features, we not only present in-depth explanations of the implementation details, but also describe the strengths of the EDISON platform against the successful nanoHUB.org gateway. To validate the performance and utility of the platform, we provide benchmarking results for the resource virtualization framework, and prove the stability and promptness of the EDISON platform in processing simulation requests by analyzing several statistical datasets obtained from a three-month trial service in the initiative area of computational nanoelectronics. We firmly believe that this work provides a good opportunity for understanding the science gateway project ongoing for the first time in Republic of Korea, and that the technical details presented here can be served as an useful guideline for any potential designs of HPCS platforms.

  • Resolution Scaling for Mass Spring Model Simulations

    Maciej KOT  Hiroshi NAGAHASHI  Krzysztof GRACKI  

     
    PAPER-Computer Graphics

      Vol:
    E97-D No:8
      Page(s):
    2138-2146

    The volumetric representations of deformable objects suffer from high memory and computational costs. In this work we analyze an approach of constructing low-resolution mass spring models (MSMs) on the basis of a high-resolution reference MSM. Preserving the physical properties of the modeled objects is emphasized such that their motion is consistent and independent of the spring network resolution. We varied the node merging algorithm and analyzed how various aspects of the simplification process affected the properties of the model and how these properties translated into visual behavior in a simulation.

  • Joint Source Power Allocation and Distributed Relay Beamforming Design in Cognitive Two-Way Relay Networks

    Binyue LIU  Guiguo FENG  Wangmei GUO  

     
    PAPER

      Vol:
    E97-B No:8
      Page(s):
    1556-1566

    This paper studies an underlay-based cognitive two-way relay network which consists of a primary network (PN) and a secondary network (SN). Two secondary users (SUs) exchange information with the aid of multiple single-antenna amplify-and-forward relays while a primary transmitter communicates with a primary receiver in the same spectrum. Unlike the existing contributions, the transmit powers of the SUs and the distributed beamforming weights of the relays are jointly optimized to minimize the sum interference power from the SN to the PN under the quality-of-service (QoS) constraints of the SUs determined by their output signal-to-interference-plus-noise ratio (SINR) and the transmit power constraints of the SUs and relays. This approach leads to a non-convex optimization problem which is computationally intractable in general. We first investigate two necessary conditions that optimal solutions should satisfy. Then, the non-convex minimization problem is solved analytically based on the obtained conditions for single-relay scenarios. For multi-relay scenarios, an iterative numerical algorithm is proposed to find suboptimal solutions with low computational complexity. It is shown that starting with an arbitrarily initial feasible point, the limit point of the solution sequence derived from the iterative algorithm satisfies the two necessary conditions. To apply this algorithm, two approaches are developed to find an initial feasible point. Finally, simulation results show that on average, the proposed low-complexity solution considerably outperforms the scheme without source power control and performs close to the optimal solution obtained by a grid search technique which has prohibitively high computational complexity.

  • All-Optical Wavelength-Shift-Free NRZ-DPSK to RZ-DPSK Format Conversion with Pulsewidth Tunability by an SOA-Based Switch

    Gazi Mohammad SHARIF  Quang NGUYEN-THE  Motoharu MATSUURA  Naoto KISHI  

     
    PAPER

      Vol:
    E97-C No:7
      Page(s):
    755-761

    We demonstrate an all-optical non-return-to-zero differential phase shift keying (NRZ-DPSK) to return-to-zero differential phase shift keying (RZ-DPSK) format conversion with wavelength-shift-free and pulsewidth tunable operations by using a semiconductor optical amplifier (SOA)-based switch. An NRZ-DPSK signal is injected into the SOA-based switch with an RZ clock, and is converted to RZ-DPSK signal owing to the nonlinear effects inside the SOA. In this scheme, the wavelength of the converted RZ-DPSK signal is maintained as the original wavelength of the input NRZ-DPSK signal during the format conversion. Moreover, the pulsewidth of the converted signal is tunable in a wider operating range from 30 to 60 ps. The format conversion with pulsewidth tunability is based on cross-phase modulation (XPM) and cross-gain modulation (XGM) effects in the SOA. The clear eye diagrams, optical spectra and the bit-error-rate (BER) characteristics show high conversion performance with the wide pulsewidth tuning range. For all cases of the converted RZ-DPSK signal with different pulsewidths, the receiver sensitivities at a BER of 10$^{-9}$ for the converted RZ-DPSK signal were 0.7 to 1.5 dB higher than the receiver sensitivity of the input NRZ-DPSK signal.

  • Analysis of Side-Channel Attack Based on Information Theory

    Hiroaki MIZUNO  Keisuke IWAI  Hidema TANAKA  Takakazu KUROKAWA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E97-A No:7
      Page(s):
    1523-1532

    This paper presents a new information-theoretical evaluation method, for the resistance of cryptographic implementation against side-channel attacks. In conventional methods, the results of actual attacks have been often used empirically. However, these experimental methods have some problems. In the proposed method, a side-channel attack is regarded as a communication channel model. Then, a new evaluation index “the amount of leakage information” can be defined. The upper-bound of this index is estimated as the channel capacity. The proposed evaluation using this index can avoid the problems of conventional methods. Consequently, the proposed method provides some benefits: (1) It provides rationale for evaluation; (2) It enables execution of numerical evaluation and mutual evaluation among several kinds of countermeasures. This research achieves a unification of evaluation indexes for resistance against side-channel attack. This paper applies the proposed method to correlation power analysis against implementations of stream cipher Enocoro-128 v2. As a result, we confirmed its effectiveness.

  • Analysis of Energy-Delay Trade-Off for Power-Saving Mechanism Specific to Request-and-Response-Based Applications

    Hyun-Ho CHOI  Jung-Ryun LEE  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:7
      Page(s):
    1422-1428

    We propose a power-saving mechanism (PSM) specific to request-and-response-based applications, which simply changes the order of the operating procedure of the legacy PSM by considering the attributes of the request-and-response delay. We numerically analyze the PSM with respect to the energy consumption and buffering delay and characterize this performance by employing a simple energy-delay trade-off (EDT) curve that is determined by the operating parameters. The resulting EDT curve clearly shows that the proposed PSM outperforms the legacy PSM.

  • Comparative Study of Network Cost and Power Consumption between a 100-Gb/s-Based Single-Line-Rate Network and a 100-G&400-Gb/s-Based Flexible-Bitrate Network in Three Different Network Topologies

    Noboru YOSHIKANE  Takehiro TSURITANI  

     
    PAPER

      Vol:
    E97-B No:7
      Page(s):
    1295-1302

    This paper presents a comparative study of the number of pieces of optical transport equipment, network cost and power consumption depending on the transmission reach of the 400-Gb/s-based signal between flexible-bitrate networks using 100-Gb/s and 400-Gb/s signals and 100-Gb/s-based single-line-rate networks. In this study, we use three types of network topologies: a North American network topology, a European network topology and a Japan photonic network topology. As for the transmission reach of the 400-Gb/s-based signal, considering performance margins, different transmission reaches of the 400-Gb/s signal are assumed varying from 300km to 600km with 100-km increments. We show that the 100-Gb/s and 400-Gb/s-based flexible-bitrate networks are effective for cutting the total number of pieces of equipment and could be effective for reducing network cost and power consumption depending on the transmission reach of the 400-Gb/s signal in the case of a relatively small-scale network.

  • NBTI Mitigation Method by Inputting Random Scan-In Vectors in Standby Time

    Hiroaki KONOURA  Toshihiro KAMEDA  Yukio MITSUYAMA  Masanori HASHIMOTO  Takao ONOYE  

     
    PAPER

      Vol:
    E97-A No:7
      Page(s):
    1483-1491

    Negative Bias Temperature Instability (NBTI) is one of the serious concerns for long-term circuit performance degradation. NBTI degrades PMOS transistors under negative bias, whereas they recover once negative bias is removed. In this paper, we propose a mitigation method for NBTI-induced performance degradation that exploits the recovery property by shifting random input sequence through scan paths. With this method, we prevent consecutive stress that causes large degradation. Experimental results reveal that random scan-in vectors successfully mitigate NBTI and the path delay degradation is reduced by 71% in a test case when standby mode occupies 10% of total time. We also confirmed that 8-bit LFSR is capable of random number generation for this purpose with low area and power overhead.

  • An Information Security Management Database System (ISMDS) for Engineering Environment Supporting Organizations with ISMSs

    Ahmad Iqbal Hakim SUHAIMI  Yuichi GOTO  Jingde CHENG  

     
    PAPER-Software Engineering

      Vol:
    E97-D No:6
      Page(s):
    1516-1527

    Information Security Management Systems (ISMSs) play important roles in helping organizations to manage their information securely. However, establishing, managing, and maintaining ISMSs is not an easy task for most organizations because an ISMS has many participants and tasks, and requires many kinds of documents. Therefore, organizations with ISMSs demand tools that can support them to perform all tasks in ISMS lifecycle processes consistently and continuously. To realize such support tools, a database system that manages ISO/IEC 27000 series, which are international standards for ISMSs, and ISMS documents, which are the products of tasks in ISMS lifecycle processes, is indispensable. The database system should manage data of the standards and documents for all available versions and translations, relationship among the standards and documents, authorization to access the standards and documents, and metadata of the standards and documents. No such database system has existed until now. This paper presents an information security management database system (ISMDS) that manages ISO/IEC 27000 series and ISMS documents. ISMDS is a meta-database system that manages several databases of standards and documents. ISMDS is used by participants in ISMS as well as tools supporting the participants to perform tasks in ISMS lifecycle processes. The users or tools can retrieve data from all versions and translations of the standards and documents. The paper also presents some use cases to show the effectiveness of ISMDS.

  • Enriching Contextual Information for Fault Localization

    Zhuo ZHANG  Xiaoguang MAO  Yan LEI  Peng ZHANG  

     
    LETTER-Software Engineering

      Vol:
    E97-D No:6
      Page(s):
    1652-1655

    Existing fault localization approaches usually do not provide a context for developers to understand the problem. Thus, this paper proposes a novel approach using the dynamic backward slicing technique to enrich contexts for existing approaches. Our empirical results show that our approach significantly outperforms five state-of-the-art fault localization techniques.

  • A Distributed Mechanism for Probing Overlay Path Bandwidth Using Local Information Exchange

    Tien Hoang DINH  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E97-B No:5
      Page(s):
    981-995

    Available bandwidth, along with latency and packet loss rate, is an essential metric for the efficient operation of overlay network applications. However, the measurement of available bandwidth creates a larger traffic overhead than other metrics. Measurement conflicts on route-overlapping paths can also seriously degrade measurement accuracy and cause a non-negligible increase in the network load. In this paper, we propose a distributed method for measuring the available bandwidth in overlay networks that can reduce measurement conflicts while maintaining high measurement accuracy at low cost. Our main idea is that neighboring overlay nodes exchange route information to detect overlapping paths and share the measurement results of overlapping paths to configure parameter settings for available bandwidth measurements. Our simulation results show that the relative errors in the measurement results of our method are approximately only 65% of those of the existing method. The measurement accuracy of our method remains better than that of the existing method when the total measurement traffic loads of both methods are equal.

  • Developing an HMM-Based Speech Synthesis System for Malay: A Comparison of Iterative and Isolated Unit Training

    Mumtaz Begum MUSTAFA  Zuraidah Mohd DON  Raja Noor AINON  Roziati ZAINUDDIN  Gerry KNOWLES  

     
    PAPER-Speech and Hearing

      Vol:
    E97-D No:5
      Page(s):
    1273-1282

    The development of an HMM-based speech synthesis system for a new language requires resources like speech database and segment-phonetic labels. As an under-resourced language, Malay lacks the necessary resources for the development of such a system, especially segment-phonetic labels. This research aims at developing an HMM-based speech synthesis system for Malay. We are proposing the use of two types of training HMMs, which are the benchmark iterative training incorporating the DAEM algorithm and isolated unit training applying segment-phonetic labels of Malay. The preferred method for preparing segment-phonetic labels is the automatic segmentation. The automatic segmentation of Malay speech database is performed using two approaches which are uniform segmentation that applies fixed phone duration, and a cross-lingual approach that adopts the acoustic model of English. We have measured the segmentation error of the two segmentation approaches to ascertain their relative effectiveness. A listening test was used to evaluate the intelligibility and naturalness of the synthetic speech produced from the iterative and isolated unit training. We also compare the performance of the HMM-based speech synthesis system with existing Malay speech synthesis systems.

  • Cross-Correlation Distribution between a p-Ary m-Sequence and Its Decimated Sequence with Decimation Factor $d= rac{(p^{m}+1)^2}{2(p^e+1)}$

    Yongbo XIA  Shaoping CHEN  

     
    PAPER-Communication Theory and Signals

      Vol:
    E97-A No:5
      Page(s):
    1103-1112

    Let p be an odd prime and m be any positive integer. Assume that n=2m and e is a positive divisor of m with m/e being odd. For the decimation factor $d= rac{(p^{m}+1)^2}{2(p^e+1)}$, the cross-correlation between the p-ary m-sequence ${tr_1^n(alpha^i)}$ and its decimated sequence ${tr_1^n(alpha^{di})}$ is investigated. The value distribution of the correlation function is completely determined. The results in this paper generalize the previous results given by Choi, Luo and Sun et al., where they considered some special cases of the decimation factor d with a restriction that m is odd. Note that the integer m in this paper can be even or odd. Thus, the decimation factor d here is more flexible than the previous ones. Moreover, our method for determining the value distribution of the correlation function is different from those adopted by Luo and Sun et al. in that we do not need to calculate the third power sum of the correlation function, which is usually difficult to handle.

821-840hit(3161hit)