The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] probability(432hit)

301-320hit(432hit)

  • Performance Analysis of MRC 2D-RAKE Receivers in Correlated Nakagami-m Fading

    Kaizhi HUANG  Jing WANG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E87-B No:12
      Page(s):
    3663-3672

    In this paper, the bit error rate (BER) and the outage probability are presented for a maximal ratio combining (MRC) two-dimensional (2D)-RAKE receiver operating in a correlated frequency-selective Nakagami-m fading environment with multiple access interference. A simple approximated probability distribution function of the signal-to-interference-plus-noise ratio (SINR) is derived for the receiver with multiple correlated antennas and RAKE branches in arbitrary fading environments. The combined effects of spatial and temporal diversity order, average received signal-to-noise ratio, the number of multiple access interference, angular spread, antennae spacing and multi-path Nakagami-m fading environment on the system performance are illustrated. Numerical results indicate that the performance of the 2D-RAKE receiver depends highly on the operating environment and antenna array configuration. The performance can be improved by increasing the spatio-temporal diversity gains and antenna spacing.

  • Maximum Likelihood Analysis of Masked Data in Competing Risks Models with an Environmental Stress

    Yoshimitsu NAGAI  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E87-A No:12
      Page(s):
    3389-3396

    It is an important problem to estimate component reliabilities. For a series system due to cost and time constraints associated with failure analysis, all components cannot be investigated and the cause of failure is narrowed to a subset of components in some cases. When such a case occurs, we say that the cause of failure is masked. It is also necessary in some cases to take account of the influence of an environmental stress on all components. In this paper, we consider 2 and 3-component series systems when the component lifelengths are exponentially distributed and an environmental stress follows either a gamma or an inverse Gaussian distribution. We show that the lifelength of the system and the cause of failure are independent of each other. By comparison between the hazard functions in both models, we see that quite short and long lifelengths are more likely to occur in a gamma model than in an inverse Gaussian one. Assuming that the masking probabilities do not depend on which component actually fails, we show that the likelihood function can be factorized into three parts by a reparametrization. For some special cases, some estimators are given in closed-form. We use the computer failure data to see that our model is useful to analyze the real masked data. As compared with the Kaplan-Meier estimator, our models fit this computer data better than no environmental stress model. Further, we determine a suitable model using AIC. We see that the gamma model is fitted to the data better than the inverse Gaussian one. From a limited simulation study for a 3-component series system, we see that the relative errors of some estimators are inversely proportional to the square root of the expected number of systems whose cause of failure is identified.

  • Proactive Load Control Scheme at Mobility Anchor Point in Hierarchical Mobile IPv6 Networks

    Sangheon PACK  Byoungwook LEE  Yanghee CHOI  

     
    PAPER-Protocols, Applications and Services

      Vol:
    E87-D No:12
      Page(s):
    2578-2585

    In IP-based mobile networks, a few of mobility agents (e.g., home agent, foreign agent, etc.) are used for mobility management. Recently, Hierarchical Mobile IPv6 (HMIPv6) was proposed to reduce signaling overhead and handoff latency occurred in Mobile IPv6. In HMIPv6, a new mobility agent, called mobility anchor point (MAP), is deployed in order to handle binding update procedures locally. However, the MAP can be a single point of performance bottleneck when there are a lot of mobile node (MNs) performing frequent local movements. This is because the MAP takes binding update procedures as well as data packet tunneling. Therefore, it is required to control the number of MNs serviced by a single MAP. In this paper, we propose a load control scheme at the MAP utilizing an admission control algorithm. We name the proposed load control scheme proactive load control scheme to distinct from the existing load control schemes in cellular networks. In terms of admission control, we use the cutoff priority scheme. We develop Markov chain models for the proactive load control scheme and evaluate the ongoing MN dropping and the new MN blocking probabilities. As a result, the proactive load control scheme can reduce the ongoing MN dropping probability while keeping the new MN blocking probability to a reasonable level.

  • Performance of Cellular CDMA Systems Using SBF and TBF Array Antennas under Multi-Cell Environment

    Hyunduk KANG  Insoo KOO  Vladimir KATKOVNIK  Kiseon KIM  

     
    LETTER-Spread Spectrum Technologies and Applications

      Vol:
    E87-A No:12
      Page(s):
    3447-3451

    In cellular systems, a code division multiple access (CDMA) technology with array antennas can significantly reduce interferences by taking advantage of the combination of spreading spectrum and spatial filtering. We investigate performance of cellular CDMA systems through adopting two types of array antennas, switched beam forming (SBF) and tracking beam forming (TBF) in the base station. Through Monte-Carlo simulations, we evaluate average bit-error-rate (BER) and outage probability of the systems under log-normal shadowing channels with multi-cell environment. When we consider 2 beams and 4 beams per sector for the SBF method, it is observed that the TBF method gives at least 10% and 30% capacity improvement over the SBF method in aspects of 10-3 BER and 1% outage probability, respectively.

  • An Alternative Approach to the Symbol Error Probability of Coherent M-PSK Systems Having a Phase Error in an AWGN Channel

    Seungkeun PARK  Sung Ho CHO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E87-B No:12
      Page(s):
    3784-3786

    This letter presents an alternative analytical expression for the symbol error probability (SEP) of the coherent M-ary phase shift keying (M-PSK) system when an arbitrary phase error exists in an additive white Gaussian noise (AWGN) channel. Unlike the previous work, it is shown that the SEP performance of the M-PSK system can be completely characterized by the one- and two-dimensional Gaussian Q-functions. The new expression is numerically more convenient to manipulate than the previous results by replacing the integral operations with the built-in functions commonly available in various mathematical software tool libraries.

  • Occlusion Reasoning by Occlusion Alarm Probability for Multiple Football Players Tracking

    Yongduek SEO  Ki-Sang HONG  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E87-D No:9
      Page(s):
    2272-2276

    This paper deals with the problem of multiple object tracking with the condensation algorithm, applied to tracking of soccer players. To solve the problem of failures in tracking multiple players under overlapping, we introduce occlusion alarm probability, which attracts or repels particles based on their posterior distribution of previous time step. Real experiments showed a robust performance.

  • Analysis of Blocking Probabilities for Prioritized Multi-Classes in Optical Burst Switching Networks

    Sungchang KIM  Jin Seek CHOI  Minho KANG  

     
    LETTER-Switching for Communications

      Vol:
    E87-B No:9
      Page(s):
    2791-2793

    In this letter, we analyze blocking probabilities for prioritized multi-classes in optical burst switching (OBS) networks. The blocking probability of each traffic class can be analytically evaluated by means of class aggregation and iteration method. The analytic results are validated with results garnered from simulation tests.

  • Fast Bandwidth Evaluation--An Improvement on Virtual Path Bandwidth Allocation in Large-Scale Networks

    Hui SONG  Wu YE  Sui Li FENG  Sheng Ye HUANG  

     
    LETTER-Network

      Vol:
    E87-B No:8
      Page(s):
    2438-2441

    In finding the optimal solution of virtual-path bandwidth allocation for large-scale networks, existing searching algorithms frequently call the process which calculate the bandwidth for given call blocking probability (CBP) and traffic loads. This is an inverse process of calculating CBP for given traffic loads and bandwidth. Because there is no analytic expression of calculating CBP, the process of calculating bandwidth with given CBP and traffic adopts an iteration algorithm. It leads to a tedious computation process. In this letter, a fast bandwidth evaluation algorithm is proposed and applied to the field of virtual path bandwidth allocation that aims at minimizing the worst call blocking probabilities in the network. The algorithm is proved to be accurate and fast. Finally, we provide comparison curves for the exact optimal CBPs obtained in the case of using OPBM against that of DCLPBM aided by the fast bandwidth evaluation algorithm.

  • A Study on Call Admission Control Scheme Based on Multiple Criterions in CDMA Systems

    Shiquan PIAO  Jaewon PARK  Yongwan PARK  

     
    PAPER-Switching

      Vol:
    E87-B No:8
      Page(s):
    2264-2272

    Call Admission Control (CAC) is a very important issue in CDMA systems to guarantee a required quality of service (QoS) and to increase system capacity. In this paper, we proposed and analyzed the CAC scheme using multiple criterions (MCAC), which can provide a quicker processing time and better performance. One is based on the number of active users with the minimum/maximum threshold by considering the spillover ratio, and the other is based on the signal to interference ratio (SIR). If active users are lower/higher than the minimum/maximum number of users threshold (N_min )/(N_max ), we accept/reject the new call without any other considerations based on the first criterion. And if the number of active users is between the N_min and N_max, we consider the current SIR to guarantee QoS based on the second criterion. Then the system accepts the new call when the SIR satisfies the system requirements, otherwise, the call is rejected. The multiple criterions scheme is investigated and its performance is compared with the number of user based CAC and power based CAC.

  • Capacity and Cell Coverage Based on Calculation of the Erlang Capacity in a WCDMA System with Multi-Rate Traffic

    Young-Soo KWON  Nam KIM  

     
    LETTER-Wireless Communication Technology

      Vol:
    E87-B No:8
      Page(s):
    2397-2400

    A scheme to evaluate the number of users and cell coverage of a WCDMA supporting multi-rate traffic is newly presented through calculation of the realizable Erlang capacity from a derived blocking probability and the path loss from the COST231 Walfisch-Ikegami (WI) model. Based on this analytical scheme, we evaluate the voice-data Erlang capacities at various data rates of 15 kbps to 480 kbps and the relationship between the cell coverage and the number of active users from them. When the value of Eb/Io is low from 4 dB to 3 dB under voice user capacity of 50 Erlang at 8 kbps, the result shows that the data user capacity is increased to 10 Erlang at low rate of 15 kbps and the cell coverage is enlarged to 100 m, and it is also shown that its capacity is increased to 0.2 Erlang at high rate of 480 kbps and its coverage to 50 m.

  • Loss Probability Evaluation of Reforwarding Call-Terminating Messages

    Yoshiaki SHIKATA  Yoshitaka TAKAHASHI  

     
    PAPER-Mobility Management

      Vol:
    E87-B No:5
      Page(s):
    1151-1157

    In a telecommunication network system, a scheme for reforwarding call-terminating setup messages (SETUP messages) is used to guard against their loss. We have developed a method for evaluating the loss probability of these reforwarding schemes. We started with a stochastic model in which the messages are reforwarded after a constant time span from the time that the first messages have been forwarded. This model corresponds to the finite-capacity BPP/M/1/m model. We showed a method for calculating the "timeout" probability. We then added an approximate method for calculating the loss probability. Finally, using the proposed methods, we clarified the existence of the best reforwarding timelag.

  • Discrete Simulation of Reactive Flow with Lattice Gas Automata

    Kazuhiro YAMAMOTO  

     
    PAPER

      Vol:
    E87-D No:3
      Page(s):
    740-744

    Normally, flow field is described with governing equations, such as the Navier-Stokes equations. However, for complex flow including multiphase and reactive flow such as combustion, this approach may not be suitable. As an alternative approach, Lattice Gas Automata (LGA) has been used to simulate fluid with mesoscopic particles by assuming that space and time are discrete, and the physical quantities take only a finite set of values. In this study, the model for combustion simulation is proposed, with the reaction probability depending on the local temperature to simplify the chemical reaction. Here, counter-flow twin flames are simulated. In order to validate this approach, some results of non-reactive flow are presented, compared with those by solving Navier-Stokes equations.

  • Symbol Error Probability of Orthogonal Space-Time Block Codes with QAM in Slow Rayleigh Fading Channel

    Sang-Hyo KIM  Ik-Seon KANG  Jong-Seon NO  

     
    PAPER-Wireless Communication Technology

      Vol:
    E87-B No:1
      Page(s):
    97-103

    In this paper, using the exact expression for the pairwise error probability derived in terms of the message symbol distance between two message vectors rather than the codeword symbol distance between two transmitted codeword matrices, the exact closed form expressions for the symbol error probability of any linear orthogonal space-time block codes in slow Rayleigh fading channel are derived for QPSK, 16-QAM, 64-QAM, and 2 56-QAM.

  • Combinatorial Effects of Timer Control and Backoff Algorithms on Bulk Data Transfer over Two-State Markovian Channels

    Katsumi SAKAKIBARA  Takashi GONDA  Jiro YAMAKITA  

     
    LETTER-Fundamental Theories

      Vol:
    E87-B No:1
      Page(s):
    165-170

    We analytically investigate combinatorial effects of timer control and backoff algorithms on performance of bulk data transfer over two-state Markovian packet error channels. Numerical results for throughput, energy efficiency, and the probabilities of packet loss and loss of bulk data indicate that linear backoff algorithms outperform binary exponential ones as a whole when they are employed at the logical link sublayer with timer control.

  • Local Poisson Property of Aggregated IP Traffic

    Hiroki FURUYA  Hajime NAKAMURA  Shinichi NOMOTO  Tetsuya TAKINE  

     
    PAPER-Fundamental Theories

      Vol:
    E86-B No:8
      Page(s):
    2368-2376

    This paper studies the local Poisson property of aggregated IP traffic. First, it describes the scenario where IP traffic presents a Poisson-like characteristic within some limited range of time scales when packets from independent traffic streams are aggregated. Each of the independent traffic streams corresponds to a series of correlated IP packets such as those of a transport connection. Since the Poisson-like characteristic is observed only within some limited range of time scales, we call this characteristic the local Poisson property. The limited range of time scales of the local Poisson property can be estimated from a network configuration and characteristics of transport connections. Second, based on these observations, we seek the possibility to apply an ordinary Poisson process to evaluation of the packet loss probability in IP networks. The analytical investigation, where IP traffic is modeled by a superposition of independent branching Poisson processes that presents the local Poisson property, suggests that the packet loss probability can be estimated by a finite-buffer queue with a Poisson process when the buffer size is within a certain range. The investigation is verified by simulations. These findings expand the applicability of conventional Poisson-based approaches to IP network design issues.

  • Fuzzy Relational Database Induced by Conditional Probability Relations

    Rolly INTAN  Masao MUKAIDONO  

     
    PAPER-Welfare Engineering

      Vol:
    E86-D No:8
      Page(s):
    1396-1405

    In 1982, Buckles and Petry proposed fuzzy relational database for incorporating non-ideal or fuzzy information in a relational database. The fuzzy relational database relies on the specification of similarity relation in order to distinguish each scalar domain in the fuzzy database. These relations are reflexive, symmetric, and max-min transitive. In 1989, Shenoi and Melton extended the fuzzy relational database model of Buckles and Petry to deal with proximity relation for scalar domain. Since reflexivity and symmetry are the only constraints placed on proximity relations, proximity relation is considered as a generalization of similarity relation. However, we realized that naturally relation between fuzzy information is not symmetric. Here, we consider using conditional probability relation to represent similarity between two fuzzy data. Related to the properties of conditional probability relation, we introduce an interesting mathematical relation, called weak similarity relation, as generalization of similarity relation as well as proximity relation in which conditional probability relation is regarded as a concrete example of the weak similarity relation. In this paper, we propose design of fuzzy relational database to deal with conditional probability relation for scalar domain. These relations are reflexive and not symmetric. In addition, we define a notion of asymmetric redundant tuple based on two interpretations generalizing the concept of redundancy in classical relational database. In the relation to data querying, we discuss partitioning of domains with the objective of developing similarity class. Finally, we propose a new definition of partial fuzzy functional dependency (PFFD). Fuzzy functional dependency (FFD) as an extension of functional dependency (FD), usually used in design of fuzzy relational database, can be generated by the PFFD. Inference rules that are similar to Armstrong's Axioms for the FFD are both sound and complete.

  • MMSE Mobile Station Positioning Method Using Signal Strength in Cellular Systems

    Hideyuki MATSUTANI  Ryoji YAMAMOTO  Hideo MATSUKI  Tomoyoshi OONO  Seizo ONOE  

     
    PAPER

      Vol:
    E86-A No:7
      Page(s):
    1593-1602

    A mobile station (MS) positioning method using signal strength is an algorithm to estimate the geographical position of a target MS based on measured strength of signals transmitted to/from the MS from/to multiple base stations (BSs) at known geographical positions. This paper proposes a novel MS positioning method using signal strength in cellular systems. The primary sources of position location error for positioning methods using signal strength are multipath fading and shadowing. Although signal strength averaging can help to reduce the effect of multipath fading, the effect of shadowing still remains. In order to eliminate the error caused by shadowing, the proposed method applies a statistical approach and a minimum mean squared error (MMSE) criterion to determine a position estimate. The performance of the proposed method is compared to that of a maximum likelihood (ML) positioning method and a cell-site positioning method. The performance is obtained by computer simulations and field experiments. A computer simulation result shows that the proposed method can determine position estimates in higher probability than the ML method. Also, it is shown that the proposed method provides higher accuracy than the ML method and the cell-site method.

  • Performance Analysis of a DS-CDMA Cellular System with Cell Splitting into Macrocell and Microcell Architecture

    Jie ZHOU  Shigenobu SASAKI  Shogo MURAMATSU  Hisakazu KIKUCHI  Yoshikuni ONOZATO  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E86-B No:6
      Page(s):
    1967-1977

    The demand for wireless mobile communications has grown at a very high rate, recently. In order to solve the non-uniform traffic rates, the use of cell splits is unavoidable for balancing the traffic rate and maximizing total system capacity. For cell planning, a DS-CDMA cellular system can be comprise of different cell sizes because of different demands and population density of the service area. In this paper, we develop a general model to study the forward link capacity and outage probability of a DS-CDMA cellular system with mixed cell sizes. The analysis of outage probability is carried out using the log-normal approximation. When a macrocell is split into the three microcells, as an example, we calculate the multi-cross interferences between macrocells and microcells, and the forward link capacities for the microcells and the neighboring macrocells. The maximum allowable capacity plane for macrocell and microcell is also investigated. The numerical results and discussions with previous published results of reverse link are summarized.

  • Second-Order Polynomial Estimators from Non-independent Uncertain Observations Using Covariance Information

    Seiichi NAKAMORI  Raquel CABALLERO-AGUILA  Aurora HERMOSO-CARAZO  Josefa LINARES-PEREZ  

     
    PAPER-Systems and Control

      Vol:
    E86-A No:5
      Page(s):
    1240-1248

    Least-squares second-order polynomial filter and fixed-point smoother are derived in systems with uncertain observations, when the variables describing the uncertainty are non-independent. The proposed estimators do not require the knowledge of the state-space model of the signal. The available information is only the moments, up to the fourth one, of the involved processes, the probability that the signal exists in the observations and the (2,2) element of the conditional probability matrices of the sequence describing the uncertainty.

  • Outage Probability of 2-D-RAKE Receivers with Power Control Error in Nakagami Fading Channels

    Kai-zhi HUANG  Jing WANG  You-zheng WANG  Guo-an CHEN  

     
    PAPER-Wireless Communication Technology

      Vol:
    E86-B No:1
      Page(s):
    406-412

    In this paper, the closed-form expressions of signal-to-interference-plus-noise ratio (SINR) and the outage probability are derived for a maximal ratio combining (MRC) two-dimensional (2-D)-RAKE receiver with imperfect power control in a frequency-selective Nakagami fading channel. The impact of power control error (PCE) on the performance of the receiver is analyzed for all kinds of fading environments. The results of numerical derivation and simulation indicate that the performance of 2-D-RAKE receivers degrades due to imperfect power control. But when PCE is not serious, increasing the number of antennae and temporal diversity order can compensate for the performance loss. The exact performance improvement due to space-time processing varies with the PCE and the fading environment.

301-320hit(432hit)