In this paper, we investigate the resource and power allocation schemes of partial block multi-carrier code division multiple access (PB/MC-CDMA) systems. In our proposed scheme, we manage transmit power depending on each user's channel state information (CSI). The objective is to maximize the average bit error ratio (BER) performance with minimal influence from the received signal-to-interference ratio (SIR), both of which are closely related to transmit power. To obtain additional performance improvement, our frequency band rearrangement scheme follows the transmit power control (TPC) process. We evaluate the performance of the proposed scheme using simulations. The results show that the proposed system provides superior performance compared to those of conventional systems.
Ayaka YAMAMOTO Yoshio IWAI Hiroshi ISHIGURO
Background subtraction is widely used in detecting moving objects; however, changing illumination conditions, color similarity, and real-time performance remain important problems. In this paper, we introduce a sequential method for adaptively estimating background components using Kalman filters, and a novel method for detecting objects using margined sign correlation (MSC). By applying MSC to our adaptive background model, the proposed system can perform object detection robustly and accurately. The proposed method is suitable for implementation on a graphics processing unit (GPU) and as such, the system realizes real-time performance efficiently. Experimental results demonstrate the performance of the proposed system.
In group location management, when a transportation system (TS) with mobile stations (MSs) changes location area (LA), only a single group location update by the TS is needed, instead of multiple individual location updates by MSs riding on the TS. Therefore, group location management significantly reduces location update signaling of the current individual location management. In this paper, we further improve the conventional group location management, by paging cells containing the route of public TS within an LA only, if an incoming call arrives at an MS riding on the TS, based on the observation that public TS, such as bus, subway, and train, follows a fixed route; its movement is not random. The performance of the proposed scheme is analyzed in terms of total signaling cost based on the modeling of public TS route. Numerical results reveal that the proposed scheme significantly outperforms the conventional scheme from the aspect of total signaling cost, at the expense of small network overhead due to the additional queries needed to acquire public TS route information.
Lei WANG Yueming CAI Weiwei YANG
In this paper, we analyze the impact of channel estimation errors for both decode-and-forward (DF) and amplify-and-forward (AF) cooperative communication systems over Nakagami-m fading channels. Firstly, we derive the exact one-integral and the approximate expressions of the symbol error rate (SER) for DF and AF relay systems with different modulations. We also present expressions showing the limitations of SER under channel estimation errors. Secondly, in order to quantify the impact of channel estimation errors, the average signal-to-noise-ratio (SNR) gap ratio is investigated for the two types of cooperative communication systems. Numerical results confirm that our theoretical analysis for SER is very efficient and accurate. Comparison of the average SNR gap ratio shows that DF model is less susceptible to channel estimation errors than AF model.
Shi-Hui et al. proposed a new public key cryptosystem using ergodic binary matrices. The security of the system is derived from some assumed hard problem based on ergodic matrices over GF(2). In this note, we show that breaking this system, with a security parameter n (public key of length 4n2 bits, secret key of length 2n bits and block length of length n2 bits), is equivalent to solving a set of n4 linear equations over GF(2) which renders this system insecure for practical choices of n.
Shoichi KITAGAWA Yoshinobu KAJIKAWA
In this letter, the compensation ability of nonlinear distortions for loudspeaker systems is demonstrated using dynamic distortion measurement. Two linearization methods using a Volterra filter and a Mirror filter are compared. The conventional evaluation utilizes swept multi-sinusoidal waves. However, it is unsatisfactory because wideband signals such as those of music and voices are usually applied to loudspeaker systems. Hence, the authours use dynamic distortion measurement employing a white noise. Experimental results show that the two linearization methods can effectively reduce nonlinear distortions for wideband signals.
José CARRIJO Rafael TONICELLI Anderson C.A. NASCIMENTO
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family. Despite the rich literature regarding the cryptanalysis of these protocols, there are no published results about the impact of fault analysis over them. The purpose of this paper is to fill this gap by presenting fault analytic methods against a prominent member of the HB-family: HB+ protocol. We demonstrate that the fault analysis model can lead to a flexible and effective attack against HB-like protocols, posing a serious threat over them.
Titichaya THANAMITSOMBOON Kotaro HAMA Riyako SAKAMOTO Xiaodong LU Kinji MORI
The challenge in resource utilization under dynamic environment is how to utilize appropriate resources to the right users at the right time and the right location. In conventional system, centralized management system is applied but it tends to congest when user requests increase or resources rapidly move. Therefore, this paper proposes Autonomous Coordination Technology (ACT) through community organization for resource utilization. In ACT, a node which has surplus resources autonomously constructs community with a surplus-level based size and distributes resources to members which are deficient in resources. ACT consists of autonomous coordination within community and among communities. According to community organization, online property and flexibility can be satisfied. However, it is difficult to achieve service provision timeliness and resource allocation operatability in the mean time. Thus, ACT includes successive transportation method, and autonomous resource allocation which dynamic decision is made by a tradeoff between timeliness and operatability. As a result, the service assurance in terms of timeliness and operatability can be assured. The effectiveness of proposed technology is affirmed through the simulation of taxi dispatching application in terms of response time and standard deviation versus user rates.
Xiaodong LU Yefeng LIU Tatsuya TSUDA Kinji MORI
In Video-on-Demand (VoD) services, the playback continuity is one of the most crucial factors for end-user to judge service quality. It is even more significant than the actual video image quality since new generation VoD users commonly have heterogeneous requirements on service according to their context. Moreover, managing dynamic situations in VoD service is always a challenge, especially in the unpredictable user preferences and network conditions. In this paper, i) Autonomous Decentralized VoD System (ADVODS) has been proposed to satisfy different service quality demands of users and, ii) the Autonomous Node Allocation Technology (ANAT) is proposed for assuring service continuity. With the help of autonomous nodes and mobile agents, ANAT can applies different backup policies to users with different Service Level Agreements (SLA), and dynamically update the backup schema to adapt the changing situations such as various service time or congestion events. Drawing on the evaluation results this paper shows that proposed system architecture has a better performance on streaming service provision and continuity.
Yusuke NAITO Kazuki YONEYAMA Lei WANG Kazuo OHTA
Since the Merkle-Damgård hash function (denoted by MDFH) that uses a fixed input length random oracle as a compression function is not indifferentiable from a random oracle (denoted by RO) due to the extension attack, there is no guarantee for the security of cryptosystems, which are secure in the RO model, when RO is instantiated with MDHF. This fact motivates us to establish a criteria methodology for confirming cryptosystems security when RO is instantiated with MDHF. In this paper, we confirm cryptosystems security by using the following approach: 1.Find a weakened random oracle (denoted by WRO) which leaks values needed to realize the extension attack. 2.Prove that MDHF is indifferentiable from WRO. 3.Prove cryptosystems security in the WRO model. The indifferentiability framework of Maurer, Renner and Holenstein guarantees that we can securely use the cryptosystem when WRO is instantiated with MDHF. Thus we concentrate on such finding WRO. We propose Traceable Random Oracle (denoted by TRO) which leaks values enough to permit the extension attack. By using TRO, we can easily confirm the security of OAEP encryption scheme and variants of OAEP encryption scheme. However, there are several practical cryptosystems whose security cannot be confirmed by TRO (e.g. RSA-KEM). This is because TRO leaks values that are irrelevant to the extension attack. Therefore, we propose another WRO, Extension Attack Simulatable Random Oracle (denoted by ERO), which leaks just the value needed for the extension attack. Fortunately, ERO is necessary and sufficient to confirm the security of cryptosystems under MDHF. This means that the security of any cryptosystem under MDHF is equivalent to that under the ERO model. We prove that RSA-KEM is secure in the ERO model.
An asymptotic expansion of the amplitude of the scattered wave by an imperfection core in a waveguide system is derived and it is shown that the scattered wave is partially canceled by the direct wave at large distance and a shadow takes place. For z→ ∞ where z is the distance along the waveguide axis the amplitudes of the direct and scattered waves decrease in proportion to z- and in the shadow region the amplitude of the sum of both waves decreases in proportion to z-. To supplement the analytical results some numerical examples are shown.
Md. Emdadul HAQUE Shoichi MURAKAMI Xiaodong LU Kinji MORI
Wireless sensor networks represent a new data collection paradigm in which expandability plays an important role. In a practical monitoring environment, for example, food factory monitoring system, sensor relocations and reorganizations are necessary with reorganization of production lines and starting of new production lines. These relocations sometime make congestion in some area of the network. In this dynamic changing environment online expansion is a challenging problem for resource constraint network. This paper proposes a two-tier autonomous decentralized community architecture for wireless sensor network to solve the problem. The first layer consists of sensors and second layer consists of routers. In the architecture routers make community (a group of nodes mutually cooperate for a common goal is a community). The goal of this paper is to introduce the concept of sharing information among routers of the community to decrease sensor connection time for the network especially for the dynamic changing environment. Results show that our proposed technologies can reduce sensor connection time to achieve online expansion.
Lihong SHANG Mi ZHOU Yu HU Erfu YANG
Field programmable gate arrays (FPGAs) are widely used in reliability-critical systems due to their reconfiguration ability. However, with the shrinking device feature size and increasing die area, nowadays FPGAs can be deeply affected by the errors induced by electromigration and radiation. To improve the reliability of FPGA-based reconfigurable systems, a permanent fault recovery approach using a domain partition model is proposed in this paper. In the proposed approach, the fault-tolerant FPGA recovery from faults is realized by reloading a proper configuration from a pool of multiple alternative configurations with overlaps. The overlaps are presented as a set of vectors in the domain partition model. To enhance the reliability, a technical procedure is also presented in which the set of vectors are heuristically filtered so that the corresponding small overlaps can be merged into big ones. Experimental results are provided to demonstrate the effectiveness of the proposed approach through applying it to several benchmark circuits. Compared with previous approaches, the proposed approach increased MTTF by up to 18.87%.
Jongwook YANG Juhoon BACK Jin H. SEO
In this letter, we propose a new observer error linearization approach that is called reduced-order dynamic observer error linearization (RDOEL), which is a modified version of dynamic observer error linearization (DOEL). We introduce the concepts and properties of RDOEL, and provide a complete solution to RDOEL with one integrator. Moreover, we show that it is also a complete solution to a simple case of DOEL.
Fan WEI Xiaodong LU Kinji MORI
Wireless Sensor Network(WSN) is widely used in Emergency Management System(EMS) to assure high safety. Real-timely transmitting emergency information in dynamically changing environment should be assured in mission critical district. Conventional methods based on static situations and centralized approaches can not satisfy this requirement. In this paper, to assure real-time property, autonomous community construction technology is proposed to set special area called community which includes a special passage composed of several routers for emergency information's transmission and routers around this passage in one hop range. Emergency information's transmission is protected by routers around this passage from interference of other sensing information's transmission in and outside community. Moreover, autonomous community reconstruction technology is proposed to guarantee real-time property at failure conditions. In this technology, community members autonomously cooperate and coordinate with each other to setup a bypass in community for transmitting emergency information if fault happens. Evaluation results indicate effectiveness of proposed technology.
Alireza DIRAFZOON Mohammad Bagher MENHAJ Ahmad AFSHAR
In this paper, we study the decentralized coverage control problem for an environment using a group of autonomous mobile robots with nonholonomic kinematic and dynamic constraints. In comparison with standard coverage control procedures, we develop a combined controller for Voronoi-based coverage approach in which kinematic and dynamic constraints of the actual mobile sensing robots are incorporated into the controller design. Furthermore, a collision avoidance component is added in the kinematic controller in order to guarantee a collision free coverage of the area. The convergence of the network to the optimal sensing configuration is proven with a Lyapunov-type analysis. Numerical simulations are provided approving the effectiveness of the proposed method through several experimental scenarios.
Atsushi ITO Yoshiaki KAKUDA Tomoyuki OHTA Shinji INOUE
One of the most important duties of government is to maintain safety. In 2007, the Ministry of Internal Affairs and Communications of Japan tested 16 different models of a safety support system for children on school routes. One of the models was constructed and tested at a school in an area of the city of Hiroshima from September to December of 2007. A consortium was established by the city of Hiroshima; Hiroshima City University; Chugoku Electric Power Co., Inc.; and KDDI Corporation to conduct this project. For the model project, we developed a new safety support system for children on school routes by using a mobile ad hoc network constructed from mobile phones with the Bluetooth function. About 500 students and 50 volunteers used this system for four months. The support system provided good performance and accuracy in maintaining the safety of students on the way to school [7]. The basic idea of the safety support system is the grouping of children and volunteers using a mobile ad hoc network. In this paper, we present an outline of this system and evaluate the performance of grouping and the effectiveness of our approach.
Fumiaki INOUE Yongbing ZHANG Yusheng JI
We propose a distributed data management approach in this paper for a large-scale position-tracking system composed of multiple small systems based on wireless tag technologies such as RFID and Wi-Fi tags. Each of these small systems is called a domain, and a domain server manages the position data of the users belonging to its managing domain and also to the other domains but temporarily residing in its domain. The domain servers collaborate with each other to globally manage the position data, realizing the global position tracking. Several domains can be further grouped to form a larger domain, called a higher-domain, so that the whole system is constructed in a hierarchical structure. We implemented the proposed approach in an experimental environment, and conducted a performance evaluation on the proposed approach and compared it with an existing approach wherein a central server is used to manage the position data of all the users. The results showed that the position data processing load is distributed among the domain servers and the traffic for position data transmission over the backbone network can be significantly restrained.
Tomotaka WADA Shinji NAKAI Tetsuya MARUOKA Haokun WANG Hiromi OKADA
In this paper, we develop a VCASS substitution system (S-VCASS) using a personal mobile terminal in order to improve the effectiveness of VCASS in an environment comprising both VCASS and non-VCASS vehicles. We propose three new pedestrian state judgment algorithms that can be implemented on a personal mobile terminal for inter-vehicle communications. We evaluate the performances of the three proposed algorithms with real vehicles. Finally, we show that the proposed algorithms can recognize vehicles without VCASS.
The scattering of a plane wave from the end-face of a three-dimensional waveguide system composed of a large number of cores is treated by the volume integral equation for the electric field and the first order term of a perturbation solution for TE and TM wave incidence is analytically derived. The far scattered field does not almost depend on the polarization of an incident wave and the angle dependence is described as the Fourier transform of the incident field in the cross section of cores. To clarify the dependence of the scattering pattern on the arrangement of cores some numerical examples are shown.