The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] source(799hit)

81-100hit(799hit)

  • Underdetermined Direction of Arrival Estimation Based on Signal Sparsity

    Peng LI  Zhongyuan ZHOU  Mingjie SHENG  Peng HU  Qi ZHOU  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2019/04/12
      Vol:
    E102-B No:10
      Page(s):
    2066-2072

    An underdetermined direction of arrival estimation method based on signal sparsity is proposed when independent and coherent signals coexist. Firstly, the estimate of the mixing matrix of the impinging signals is obtained by clustering the single source points which are detected by the ratio of time-frequency transforms of the received signals. Then, each column vector of the mixing matrix is processed by exploiting the forward and backward vectors in turn to obtain the directions of arrival of all signals. The number of independent signals and coherent signal groups that can be estimated by the proposed method can be greater than the number of sensors. The validity of the method is demonstrated by simulations.

  • Data-Driven Decision-Making in Cyber-Physical Integrated Society

    Noboru SONEHARA  Takahisa SUZUKI  Akihisa KODATE  Toshihiko WAKAHARA  Yoshinori SAKAI  Yu ICHIFUJI  Hideo FUJII  Hideki YOSHII  

     
    INVITED PAPER

      Pubricized:
    2019/07/04
      Vol:
    E102-D No:9
      Page(s):
    1607-1616

    The Cyber-Physical Integrated Society (CPIS) is being formed with the fusion of cyber-space and the real-world. In this paper, we will discuss Data-Driven Decision-Making (DDDM) support systems to solve social problems in the CPIS. First, we introduce a Web of Resources (WoR) that uses Web booking log data for destination data management. Next, we introduce an Internet of Persons (IoP) system to visualize individual and group flows of people by analyzing collected Wi-Fi usage log data. Specifically, we present examples of how WoR and IoP visualize flows of groups of people that can be shared across different industries, including telecommunications carriers and railway operators, and policy decision support for local, short-term events. Finally, the importance of data-driven training of human resources to support DDDM in the future CPIS is discussed.

  • Congestion Control for Multi-Source Content Retrieval in Content Centric Networks

    Junpei MIYOSHI  Satoshi KAWAUCHI  Masaki BANDAI  Miki YAMAMOTO  

     
    PAPER

      Pubricized:
    2019/03/22
      Vol:
    E102-B No:9
      Page(s):
    1832-1841

    CCN/NDN (Content-Centric Networking/Named-Data Networking) is one of the most promising content-oriented network architectures. In CCN/NDN, forwarding information base (FIB) might have multiple entries for a same content name prefix, which means CCN/NDN potentially supports multi-source download. When a content is obtained from multiple sources, the technical knowledge obtained for congestion control in the current Internet cannot be simply applied. This is because in the current Internet, FIB is restricted to have only one entry for each IP address prefix, which causes quite different path feature from CCN/NDN. This paper proposes a new congestion control for CCN/NDN with multi-source content retrieval. The proposed congestion control is composed of end-to-end window flow control and router assisted Interest forwarding control, and enables transmission rate regulation only on a congested branch.

  • Cefore: Software Platform Enabling Content-Centric Networking and Beyond Open Access

    Hitoshi ASAEDA  Atsushi OOKA  Kazuhisa MATSUZONO  Ruidong LI  

     
    INVITED PAPER

      Pubricized:
    2019/03/22
      Vol:
    E102-B No:9
      Page(s):
    1792-1803

    Information-Centric or Content-Centric Networking (ICN/CCN) is a promising novel network architecture that naturally integrates in-network caching, multicast, and multipath capabilities, without relying on centralized application-specific servers. Software platforms are vital for researching ICN/CCN; however, existing platforms lack a focus on extensibility and lightweight implementation. In this paper, we introduce a newly developed software platform enabling CCN, named Cefore. In brief, Cefore is lightweight, with the ability to run even on top of a resource-constrained device, but is also easily extensible with arbitrary plugin libraries or external software implementations. For large-scale experiments, a network emulator (Cefore-Emu) and network simulator (Cefore-Sim) have also been developed for this platform. Both Cefore-Emu and Cefore-Sim support hybrid experimental environments that incorporate physical networks into the emulated/simulated networks. In this paper, we describe the design, specification, and usage of Cefore as well as Cefore-Emu and Cefore-Sim. We show performance evaluations of in-network caching and streaming on Cefore-Emu and content fetching on Cefore-Sim, verifying the salient features of the Cefore software platform.

  • New Approach to Constructing Noise Source Based on Race Conditions

    Seong Gyeom KIM  Seung Joon LEE  Deukjo HONG  Jaechul SUNG  Seokhie HONG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E102-A No:9
      Page(s):
    1272-1284

    A noise source is an essential component of random bit generator, and is either an application or a device to provide entropy from analog noise. In 2008, Colesa et al. first proposed two software strategies for constructing noise source based on race conditions. However, Colesa et al.'s designs require a lot of threads and even suffer from a low bit rate. Moreover, setting a parameter for each system is complicated since the parameter is related to the entropy and the bit rate at the same time. In this paper, we propose new constructions of noise source based on race conditions. We call them NSRC-1 and NSRC-2. The bit rate of our designs is improved by up to 819 times higher on multi-core systems with high entropy. The parameter adjustment becomes straightforward by removing the relation between the parameter and the entropy. Additionally, since NSRC-1 and 2 require only two threads at once, they are more available software-based methods for harvesting entropy not only on general devices but also on mobile devices.

  • User Pre-Scheduling and Beamforming with Imperfect CSI for Future Cloud/Fog-Radio Access Networks Open Access

    Megumi KANEKO  Lila BOUKHATEM  Nicolas PONTOIS  Thi-Hà-Ly DINH  

     
    INVITED PAPER

      Pubricized:
    2019/01/22
      Vol:
    E102-B No:7
      Page(s):
    1230-1239

    By incorporating cloud computing capabilities to provide radio access functionalities, Cloud Radio Access Networks (CRANs) are considered to be a key enabling technology of future 5G and beyond communication systems. In CRANs, centralized radio resource allocation optimization is performed over a large number of small cells served by simple access points, the Remote Radio Heads (RRHs). However, the fronthaul links connecting each RRH to the cloud introduce delays and entail imperfect Channel State Information (CSI) knowledge at the cloud processors. In order to satisfy the stringent latency requirements envisioned for 5G applications, the concept of Fog Radio Access Networks (FogRANs) has recently emerged for providing cloud computing at the edge of the network. Although FogRAN may alleviate the latency and CSI quality issues of CRAN, its distributed nature degrades network interference mitigation and global system performance. Therefore, we investigate the design of tailored user pre-scheduling and beamforming for FogRANs. In particular, we propose a hybrid algorithm that exploits both the centralized feature of the cloud for globally-optimized pre-scheduling using imperfect global CSIs, and the distributed nature of FogRAN for accurate beamforming with high quality local CSIs. The centralized phase enables the interference patterns over the global network to be considered, while the distributed phase allows for latency reduction, in line with the requirements of FogRAN applications. Simulation results show that our proposed algorithm outperforms the baseline algorithm under imperfect CSIs, jointly in terms of throughput, energy efficiency, as well as delay.

  • An Improved Closed-Form Method for Moving Source Localization Using TDOA, FDOA, Differential Doppler Rate Measurements

    Zhixin LIU  Dexiu HU  Yongsheng ZHAO  Yongjun ZHAO  

     
    PAPER-Sensing

      Pubricized:
    2018/12/03
      Vol:
    E102-B No:6
      Page(s):
    1219-1228

    This paper proposes an improved closed-form method for moving source localization using time difference of arrival (TDOA), frequency difference of arrival (FDOA) and differential Doppler rate measurements. After linearizing the measurement equations by introducing three additional parameters, a rough estimate is obtained by using the weighted least-square (WLS) estimator. To further refine the estimate, the relationship between additional parameters and source location is utilized. The proposed method gives a final closed-form solution without iteration or the extra mathematics operations used in existing methods by employing the basic idea of WLS processing. Numerical examples show that the proposed method exhibits better robustness and performance compared with several existing methods.

  • A Mathematical Model and Dynamic Programming Based Scheme for Service Function Chain Placement in NFV

    Yansen XU  Ved P. KAFLE  

     
    PAPER

      Pubricized:
    2019/02/27
      Vol:
    E102-D No:5
      Page(s):
    942-951

    Service function chain (SFC) is a series of ordered virtual network functions (VNFs) for processing traffic flows in the virtualized networking environment of future networks. In this paper, we present a mathematical model and dynamic programing based scheme for solving the problem of SFC placement on substrate networks equipped with network function virtualization (NFV) capability. In this paper, we first formulate the overall cost of SFC placement as the combination of setup cost and operation cost. We then formulate the SFC placement problem as an integer linear programing (ILP) model with the objective of minimizing the overall cost of setup and operation, and propose a delay aware dynamic programming based SFC placement scheme for large networks. We conduct numeric simulations to evaluate the proposed scheme. We analyze the cost and performance of network under different optimization objectives, with and without keeping the order of VNFs in SFC. We measure the success rate, resources utilization, and end to end delay of SFC on different topologies. The results show that the proposed scheme outperforms other related schemes in various scenarios.

  • Multi-Target Classification Based Automatic Virtual Resource Allocation Scheme

    Abu Hena Al MUKTADIR  Takaya MIYAZAWA  Pedro MARTINEZ-JULIA  Hiroaki HARAI  Ved P. KAFLE  

     
    PAPER

      Pubricized:
    2019/02/19
      Vol:
    E102-D No:5
      Page(s):
    898-909

    In this paper, we propose a method for automatic virtual resource allocation by using a multi-target classification-based scheme (MTCAS). In our method, an Infrastructure Provider (InP) bundles its CPU, memory, storage, and bandwidth resources as Network Elements (NEs) and categorizes them into several types in accordance to their function, capabilities, location, energy consumption, price, etc. MTCAS is used by the InP to optimally allocate a set of NEs to a Virtual Network Operator (VNO). Such NEs will be subject to some constraints, such as the avoidance of resource over-allocation and the satisfaction of multiple Quality of Service (QoS) metrics. In order to achieve a comparable or higher prediction accuracy by using less training time than the available ensemble-based multi-target classification (MTC) algorithms, we propose a majority-voting based ensemble algorithm (MVEN) for MTCAS. We numerically evaluate the performance of MTCAS by using the MVEN and available MTC algorithms with synthetic training datasets. The results indicate that the MVEN algorithm requires 70% less training time but achieves the same accuracy as the related ensemble based MTC algorithms. The results also demonstrate that increasing the amount of training data increases the efficacy ofMTCAS, thus reducing CPU and memory allocation by about 33% and 51%, respectively.

  • Mode Selective Active Multimode Interferometer Laser Diode — Mode Selection Principle, and High Speed Modulation — Open Access

    Kiichi HAMAMOTO  Haisong JIANG  

     
    INVITED PAPER

      Vol:
    E102-C No:4
      Page(s):
    364-370

    We have proposed and demonstrated a mode selective active-MMI (multimode interferometer) laser diode as a mode selective light source so far. This laser diode features; 1) lasing at a selected space mode, and 2) high modulation bandwidth. Based on these, it is expected to enable high speed interconnection into future personal and mobile devices. In this paper, we explain the mode selection, and the high speed modulation principles. Then, we present our recent results concerning high speed frequency response of the fundamental and first order space modes.

  • Simple and Complete Resynchronization for Wireless Sensor Networks Open Access

    Hiromi YAGIRI  Takeshi OKADOME  

     
    PAPER

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    679-689

    The methods proposed in this paper enable resynchronization when a synchronization deviation occurs in a sensor node without a beacon or an ack in a wireless sensor network under ultra-limited but stable resources such as the energy generated from tiny solar cell batteries. The method for a single-hop network is straightforward; when a receiver does not receive data, it is simply placed in recovery mode, in which the receiver sets its cycle length TB to (b±γ)T, where b is non-negative integer, 0 < γ < 1, and T is its cycle length in normal mode, and in which the receiver sets its active interval WB to a value that satisfies WB ≥ W + γT, where W is its active interval in normal mode. In contrast, a sender stays in normal mode. Resynchronization methods for linear multi-hop and tree-based multi-hop sensor networks are constructed using the method for a single-hop network. All the methods proposed here are complete because they are always able to resynchronize networks. The results of simulations based on the resynchronization methods are given and those of an experiment using actual sensor nodes with wireless modules are also presented, which show that the methods are feasible.

  • A Novel Radio Resource Optimization Scheme in Closed Access Femtocell Networks Based on Bat Algorithm Open Access

    I Wayan MUSTIKA  Nifty FATH  Selo SULISTYO  Koji YAMAMOTO  Hidekazu MURATA  

     
    INVITED PAPER

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    660-669

    Femtocell has been considered as a key promising technology to improve the capacity of a cellular system. However, the femtocells deployed inside a macrocell coverage are potentially suffered from excessive interference. This paper proposes a novel radio resource optimization in closed access femtocell networks based on bat algorithm. Bat algorithm is inspired by the behavior of bats in their echolocation process. While the original bat algorithm is designed to solve the complex optimization problem in continuous search space, the proposed modified bat algorithm extends the search optimization in a discrete search space which is suitable for radio resource allocation problem. The simulation results verify the convergence of the proposed optimization scheme to the global optimal solution and reveal that the proposed scheme based on modified bat algorithm facilitates the improvement of the femtocell network capacity.

  • A Deadline-Aware Scheduling Scheme for Connected Car Services Using Mobile Networks with Quality Fluctuation Open Access

    Nobuhiko ITOH  Motoki MORITA  Takanori IWAI  Kozo SATODA  Ryogo KUBO  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    474-483

    Traffic collision is an extremely serious issue in the world today. The World Health Organization (WHO) reported the number of road traffic deaths globally has plateaued at 1.25 million a year. In an attempt to decrease the occurrence of such traffic collisions, various driving systems for detecting pedestrians and vehicles have been proposed, but they are inadequate as they cannot detect vehicles and pedestrians in blind places such as sharp bends and blind intersections. Therefore, mobile networks such as long term evolution (LTE), LTE-Advanced, and 5G networks are attracting a great deal of attention as platforms for connected car services. Such platforms enable individual devices such as vehicles, drones, and sensors to exchange real-time information (e.g., location information) with each other. To guarantee effective connected car services, it is important to deliver a data block within a certain maximum tolerable delay (called a deadline in this work). The Third Generation Partnership Project (3GPP) stipulates that this deadline be 100 ms and that the arrival ratio within the deadline be 0.95. We investigated an intersection at which vehicle collisions often occur to evaluate a realistic environment and found that schedulers such as proportional fairness (PF) and payload-size and deadline-aware (PayDA) cannot satisfy the deadline and arrival ratio within the deadline, especially as network loads increase. They fail because they do not consider three key elements — radio quality, chunk size, and the deadline — when radio resources are allocated. In this paper, we propose a deadline-aware scheduling scheme that considers chunk size and the deadline in addition to radio quality and uses them to prioritize users in order to meet the deadline. The results of a simulation on ns-3 showed that the proposed method can achieve approximately four times the number of vehicles satisfying network requirements compared to PayDA.

  • RAN Slicing to Realize Resource Isolation Utilizing Ordinary Radio Resource Management for Network Slicing

    Daisuke NOJIMA  Yuki KATSUMATA  Yoshifumi MORIHIRO  Takahiro ASAI  Akira YAMADA  Shigeru IWASHINA  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    484-495

    In the context of resource isolation for network slicing, this paper introduces two resource allocation methods especially for the radio access network (RAN) part. Both methods can be implemented by slight modification of the ordinary packet scheduling algorithm such as the proportional fairness algorithm, and guarantee resource isolation by limiting the maximum number of resource blocks (RBs) allocated to each slice. Moreover, since both methods flexibly allocate RBs to the entire system bandwidth, there are cases in which the throughput performance is improved compared to when the system bandwidth is divided in a static manner, especially in a frequency selective channel environment. Numerical results show the superiority of these methods to dividing simply the system bandwidth in a static manner, and show the difference between the features of the methods in terms of the throughput performance of each slice.

  • Shortcut Creation for MeNW in the Consideration of Topological Structure and Message Exchanged Open Access

    Masahiro JIBIKI  Suyong EUM  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    464-473

    This article proposes a method to improve the performance of Message Exchange Network (MeNW) which is modern data distribution network incorporating the search and obtain mechanism. We explore an idea of shortcut creation which can be widely adapted to a topological structure of various network applications. We first define a metric called Efficiency Coefficient (EC) that quantifies the performance enhancement by a shortcut creation. In the design of EC, we consider not only diameter of the topology but also the amount of messages exchanged in the network. Then, we theoretically analyze the creation of a single optimal shortcut in the system based on the performance metric. The simulation results show that the shortcut by the proposed method reduces the network resource to further 30% compared with conventional approaches.

  • A Universal Two-Dimensional Source Coding by Means of Subblock Enumeration Open Access

    Takahiro OTA  Hiroyoshi MORITA  Akiko MANADA  

     
    PAPER-Information Theory

      Vol:
    E102-A No:2
      Page(s):
    440-449

    The technique of lossless compression via substring enumeration (CSE) is a kind of enumerative code and uses a probabilistic model built from the circular string of an input source for encoding a one-dimensional (1D) source. CSE is applicable to two-dimensional (2D) sources, such as images, by dealing with a line of pixels of a 2D source as a symbol of an extended alphabet. At the initial step of CSE encoding process, we need to output the number of occurrences of all symbols of the extended alphabet, so that the time complexity increases exponentially when the size of source becomes large. To reduce computational time, we can rearrange pixels of a 2D source into a 1D source string along a space-filling curve like a Hilbert curve. However, information on adjacent cells in a 2D source may be lost in the conversion. To reduce the time complexity and compress a 2D source without converting to a 1D source, we propose a new CSE which can encode a 2D source in a block-by-block fashion instead of in a line-by-line fashion. The proposed algorithm uses the flat torus of an input 2D source as a probabilistic model instead of the circular string of the source. Moreover, we prove the asymptotic optimality of the proposed algorithm for 2D general sources.

  • Independent Low-Rank Matrix Analysis Based on Generalized Kullback-Leibler Divergence Open Access

    Shinichi MOGAMI  Yoshiki MITSUI  Norihiro TAKAMUNE  Daichi KITAMURA  Hiroshi SARUWATARI  Yu TAKAHASHI  Kazunobu KONDO  Hiroaki NAKAJIMA  Hirokazu KAMEOKA  

     
    LETTER-Engineering Acoustics

      Vol:
    E102-A No:2
      Page(s):
    458-463

    In this letter, we propose a new blind source separation method, independent low-rank matrix analysis based on generalized Kullback-Leibler divergence. This method assumes a time-frequency-varying complex Poisson distribution as the source generative model, which yields convex optimization in the spectrogram estimation. The experimental evaluation confirms the proposed method's efficacy.

  • Energy Efficient Resource Allocation Algorithm for Massive MIMO Systems Based on Wireless Power Transfer

    Xiao-yu WAN  Xiao-na YANG  Zheng-qiang WANG  Zi-fu FAN  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/08/13
      Vol:
    E102-B No:2
      Page(s):
    351-358

    This paper investigates energy-efficient resource allocation problem for the wireless power transfer (WPT) enabled multi-user massive multiple-input multiple-output (MIMO) systems. In the considered systems, the sensor nodes (SNs) are firstly powered by WPT from the power beacon (PB) with a large scale of antennas. Then, the SNs use the harvested energy to transmit the data to the base station (BS) with multiple antennas. The problem of optimizing the energy efficiency objective is formulated with the consideration of maximum transmission power of the PB and the quality of service (QoS) of the SNs. By adopting fractional programming, the energy-efficient optimization problem is firstly converted into a subtractive form. Then, a joint power and time allocation algorithm based on the block coordinate descent and Dinkelbach method is proposed to maximize energy efficiency. Finally, simulation results show the proposed algorithm achieves a good compromise between the spectrum efficiency and total power consumption.

  • A Semantic Management Method of Simulation Models in GNSS Distributed Simulation Environment

    Guo-chao FAN  Chun-sheng HU  Xue-en ZHENG  Cheng-dong XU  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2018/10/09
      Vol:
    E102-D No:1
      Page(s):
    85-92

    In GNSS (Global Navigation Satellite System) Distributed Simulation Environment (GDSE), the simulation task could be designed with the sharing models on the Internet. However, too much information and relation of model need to be managed in GDSE. Especially if there is a large quantity of sharing models, the model retrieval would be an extremely complex project. For meeting management demand of GDSE and improving the model retrieval efficiency, the characteristics of service simulation model are analysed firstly. A semantic management method of simulation model is proposed, and a model management architecture is designed. Compared with traditional retrieval way, it takes less retrieval time and has a higher accuracy result. The simulation results show that retrieval in the semantic management module has a good ability on understanding user needs, and helps user obtain appropriate model rapidly. It improves the efficiency of simulation tasks design.

  • A Robust Algorithm for Deadline Constrained Scheduling in IaaS Cloud Environment

    Bilkisu Larai MUHAMMAD-BELLO  Masayoshi ARITSUGI  

     
    PAPER-Cloud Computing

      Pubricized:
    2018/09/18
      Vol:
    E101-D No:12
      Page(s):
    2942-2957

    The Infrastructure as a Service (IaaS) Clouds are emerging as a promising platform for the execution of resource demanding and computation intensive workflow applications. Scheduling the execution of scientific applications expressed as workflows on IaaS Clouds involves many uncertainties due to the variable and unpredictable performance of Cloud resources. These uncertainties are modeled by probability distribution functions in past researches or totally ignored in some cases. In this paper, we propose a novel robust deadline constrained workflow scheduling algorithm which handles the uncertainties in scheduling workflows in the IaaS Cloud environment. Our proposal is a static scheduling algorithm aimed at addressing the uncertainties related to: the estimation of task execution times; and, the delay in provisioning computational Cloud resources. The workflow scheduling problem was considered as a cost-optimized, deadline-constrained optimization problem. Our uncertainty handling strategy was based on the consideration of knowledge of the interval of uncertainty, which we used to modeling the execution times rather than using a known probability distribution function or precise estimations which are known to be very sensitive to variations. Experimental evaluations using CloudSim with synthetic workflows of various sizes show that our proposal is robust to fluctuations in estimates of task runtimes and is able to produce high quality schedules that have deadline guarantees with minimal penalty cost trade-off depending on the length of the interval of uncertainty. Scheduling solutions for varying degrees of uncertainty resisted against deadline violations at runtime as against the static IC-PCP algorithm which could not guarantee deadline constraints in the face of uncertainty.

81-100hit(799hit)