The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] system(3183hit)

961-980hit(3183hit)

  • The Joint Transmit Power Control and Frequency Band Rearrangement Scheme for PB/MC-CDMA Systems

    Kyujin LEE  Yan SUN  Kyesan LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:2
      Page(s):
    583-586

    In this paper, we investigate the resource and power allocation schemes of partial block multi-carrier code division multiple access (PB/MC-CDMA) systems. In our proposed scheme, we manage transmit power depending on each user's channel state information (CSI). The objective is to maximize the average bit error ratio (BER) performance with minimal influence from the received signal-to-interference ratio (SIR), both of which are closely related to transmit power. To obtain additional performance improvement, our frequency band rearrangement scheme follows the transmit power control (TPC) process. We evaluate the performance of the proposed scheme using simulations. The results show that the proposed system provides superior performance compared to those of conventional systems.

  • Real-Time Object Detection Using Adaptive Background Model and Margined Sign Correlation

    Ayaka YAMAMOTO  Yoshio IWAI  Hiroshi ISHIGURO  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E94-D No:2
      Page(s):
    325-335

    Background subtraction is widely used in detecting moving objects; however, changing illumination conditions, color similarity, and real-time performance remain important problems. In this paper, we introduce a sequential method for adaptively estimating background components using Kalman filters, and a novel method for detecting objects using margined sign correlation (MSC). By applying MSC to our adaptive background model, the proposed system can perform object detection robustly and accurately. The proposed method is suitable for implementation on a graphics processing unit (GPU) and as such, the system realizes real-time performance efficiently. Experimental results demonstrate the performance of the proposed system.

  • A Novel Group Location Management Scheme Based on Route Information of Public Transportation System

    Yun Won CHUNG  

     
    PAPER-Network Management/Operation

      Vol:
    E94-B No:2
      Page(s):
    477-483

    In group location management, when a transportation system (TS) with mobile stations (MSs) changes location area (LA), only a single group location update by the TS is needed, instead of multiple individual location updates by MSs riding on the TS. Therefore, group location management significantly reduces location update signaling of the current individual location management. In this paper, we further improve the conventional group location management, by paging cells containing the route of public TS within an LA only, if an incoming call arrives at an MS riding on the TS, based on the observation that public TS, such as bus, subway, and train, follows a fixed route; its movement is not random. The performance of the proposed scheme is analyzed in terms of total signaling cost based on the modeling of public TS route. Numerical results reveal that the proposed scheme significantly outperforms the conventional scheme from the aspect of total signaling cost, at the expense of small network overhead due to the additional queries needed to acquire public TS route information.

  • Impact of Channel Estimation Errors in Cooperative Transmission over Nakagami-m Fading Channels

    Lei WANG  Yueming CAI  Weiwei YANG  

     
    PAPER-Information Network

      Vol:
    E94-D No:2
      Page(s):
    298-307

    In this paper, we analyze the impact of channel estimation errors for both decode-and-forward (DF) and amplify-and-forward (AF) cooperative communication systems over Nakagami-m fading channels. Firstly, we derive the exact one-integral and the approximate expressions of the symbol error rate (SER) for DF and AF relay systems with different modulations. We also present expressions showing the limitations of SER under channel estimation errors. Secondly, in order to quantify the impact of channel estimation errors, the average signal-to-noise-ratio (SNR) gap ratio is investigated for the two types of cooperative communication systems. Numerical results confirm that our theoretical analysis for SER is very efficient and accurate. Comparison of the average SNR gap ratio shows that DF model is less susceptible to channel estimation errors than AF model.

  • Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices

    Mohamed RASSLAN  Amr YOUSSEF  

     
    LETTER-Cryptography and Information Security

      Vol:
    E94-A No:2
      Page(s):
    853-854

    Shi-Hui et al. proposed a new public key cryptosystem using ergodic binary matrices. The security of the system is derived from some assumed hard problem based on ergodic matrices over GF(2). In this note, we show that breaking this system, with a security parameter n (public key of length 4n2 bits, secret key of length 2n bits and block length of length n2 bits), is equivalent to solving a set of n4 linear equations over GF(2) which renders this system insecure for practical choices of n.

  • Linearization Ability Evaluation for Loudspeaker Systems Using Dynamic Distortion Measurement

    Shoichi KITAGAWA  Yoshinobu KAJIKAWA  

     
    LETTER-Engineering Acoustics

      Vol:
    E94-A No:2
      Page(s):
    813-816

    In this letter, the compensation ability of nonlinear distortions for loudspeaker systems is demonstrated using dynamic distortion measurement. Two linearization methods using a Volterra filter and a Mirror filter are compared. The conventional evaluation utilizes swept multi-sinusoidal waves. However, it is unsatisfactory because wideband signals such as those of music and voices are usually applied to loudspeaker systems. Hence, the authours use dynamic distortion measurement employing a white noise. Experimental results show that the two linearization methods can effectively reduce nonlinear distortions for wideband signals.

  • A Fault Analytic Method against HB+

    José CARRIJO  Rafael TONICELLI  Anderson C.A. NASCIMENTO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E94-A No:2
      Page(s):
    855-859

    The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family. Despite the rich literature regarding the cryptanalysis of these protocols, there are no published results about the impact of fault analysis over them. The purpose of this paper is to fill this gap by presenting fault analytic methods against a prominent member of the HB-family: HB+ protocol. We demonstrate that the fault analysis model can lead to a flexible and effective attack against HB-like protocols, posing a serious threat over them.

  • Autonomous Coordination Technology through Community Organization for Resource Utilization

    Titichaya THANAMITSOMBOON  Kotaro HAMA  Riyako SAKAMOTO  Xiaodong LU  Kinji MORI  

     
    PAPER-Community

      Vol:
    E94-D No:1
      Page(s):
    11-18

    The challenge in resource utilization under dynamic environment is how to utilize appropriate resources to the right users at the right time and the right location. In conventional system, centralized management system is applied but it tends to congest when user requests increase or resources rapidly move. Therefore, this paper proposes Autonomous Coordination Technology (ACT) through community organization for resource utilization. In ACT, a node which has surplus resources autonomously constructs community with a surplus-level based size and distributes resources to members which are deficient in resources. ACT consists of autonomous coordination within community and among communities. According to community organization, online property and flexibility can be satisfied. However, it is difficult to achieve service provision timeliness and resource allocation operatability in the mean time. Thus, ACT includes successive transportation method, and autonomous resource allocation which dynamic decision is made by a tradeoff between timeliness and operatability. As a result, the service assurance in terms of timeliness and operatability can be assured. The effectiveness of proposed technology is affirmed through the simulation of taxi dispatching application in terms of response time and standard deviation versus user rates.

  • Autonomous Node Allocation Technology for Assuring Heterogeneous Streaming Service under the Dynamic Environment

    Xiaodong LU  Yefeng LIU  Tatsuya TSUDA  Kinji MORI  

     
    PAPER-Assurance

      Vol:
    E94-B No:1
      Page(s):
    30-36

    In Video-on-Demand (VoD) services, the playback continuity is one of the most crucial factors for end-user to judge service quality. It is even more significant than the actual video image quality since new generation VoD users commonly have heterogeneous requirements on service according to their context. Moreover, managing dynamic situations in VoD service is always a challenge, especially in the unpredictable user preferences and network conditions. In this paper, i) Autonomous Decentralized VoD System (ADVODS) has been proposed to satisfy different service quality demands of users and, ii) the Autonomous Node Allocation Technology (ANAT) is proposed for assuring service continuity. With the help of autonomous nodes and mobile agents, ANAT can applies different backup policies to users with different Service Level Agreements (SLA), and dynamically update the backup schema to adapt the changing situations such as various service time or congestion events. Drawing on the evaluation results this paper shows that proposed system architecture has a better performance on streaming service provision and continuity.

  • Security of Cryptosystems Using Merkle-Damgård in the Random Oracle Model

    Yusuke NAITO  Kazuki YONEYAMA  Lei WANG  Kazuo OHTA  

     
    PAPER-Public Key Cryptography

      Vol:
    E94-A No:1
      Page(s):
    57-70

    Since the Merkle-Damgård hash function (denoted by MDFH) that uses a fixed input length random oracle as a compression function is not indifferentiable from a random oracle (denoted by RO) due to the extension attack, there is no guarantee for the security of cryptosystems, which are secure in the RO model, when RO is instantiated with MDHF. This fact motivates us to establish a criteria methodology for confirming cryptosystems security when RO is instantiated with MDHF. In this paper, we confirm cryptosystems security by using the following approach: 1.Find a weakened random oracle (denoted by WRO) which leaks values needed to realize the extension attack. 2.Prove that MDHF is indifferentiable from WRO. 3.Prove cryptosystems security in the WRO model. The indifferentiability framework of Maurer, Renner and Holenstein guarantees that we can securely use the cryptosystem when WRO is instantiated with MDHF. Thus we concentrate on such finding WRO. We propose Traceable Random Oracle (denoted by TRO) which leaks values enough to permit the extension attack. By using TRO, we can easily confirm the security of OAEP encryption scheme and variants of OAEP encryption scheme. However, there are several practical cryptosystems whose security cannot be confirmed by TRO (e.g. RSA-KEM). This is because TRO leaks values that are irrelevant to the extension attack. Therefore, we propose another WRO, Extension Attack Simulatable Random Oracle (denoted by ERO), which leaks just the value needed for the extension attack. Fortunately, ERO is necessary and sufficient to confirm the security of cryptosystems under MDHF. This means that the security of any cryptosystem under MDHF is equivalent to that under the ERO model. We prove that RSA-KEM is secure in the ERO model.

  • Scattering of Light by a Single Imperfection Core in a Waveguide System

    Akira KOMIYAMA  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E94-C No:1
      Page(s):
    59-62

    An asymptotic expansion of the amplitude of the scattered wave by an imperfection core in a waveguide system is derived and it is shown that the scattered wave is partially canceled by the direct wave at large distance and a shadow takes place. For z→ ∞ where z is the distance along the waveguide axis the amplitudes of the direct and scattered waves decrease in proportion to z- and in the shadow region the amplitude of the sum of both waves decreases in proportion to z-. To supplement the analytical results some numerical examples are shown.

  • Autonomous Decentralized Community Wireless Sensor Network Architecture to Achieve Timely Connection for Online Expansion

    Md. Emdadul HAQUE  Shoichi MURAKAMI  Xiaodong LU  Kinji MORI  

     
    PAPER-Community

      Vol:
    E94-B No:1
      Page(s):
    2-9

    Wireless sensor networks represent a new data collection paradigm in which expandability plays an important role. In a practical monitoring environment, for example, food factory monitoring system, sensor relocations and reorganizations are necessary with reorganization of production lines and starting of new production lines. These relocations sometime make congestion in some area of the network. In this dynamic changing environment online expansion is a challenging problem for resource constraint network. This paper proposes a two-tier autonomous decentralized community architecture for wireless sensor network to solve the problem. The first layer consists of sensors and second layer consists of routers. In the architecture routers make community (a group of nodes mutually cooperate for a common goal is a community). The goal of this paper is to introduce the concept of sharing information among routers of the community to decrease sensor connection time for the network especially for the dynamic changing environment. Results show that our proposed technologies can reduce sensor connection time to achieve online expansion.

  • A Domain Partition Model Approach to the Online Fault Recovery of FPGA-Based Reconfigurable Systems

    Lihong SHANG  Mi ZHOU  Yu HU  Erfu YANG  

     
    PAPER-Nonlinear Problems

      Vol:
    E94-A No:1
      Page(s):
    290-299

    Field programmable gate arrays (FPGAs) are widely used in reliability-critical systems due to their reconfiguration ability. However, with the shrinking device feature size and increasing die area, nowadays FPGAs can be deeply affected by the errors induced by electromigration and radiation. To improve the reliability of FPGA-based reconfigurable systems, a permanent fault recovery approach using a domain partition model is proposed in this paper. In the proposed approach, the fault-tolerant FPGA recovery from faults is realized by reloading a proper configuration from a pool of multiple alternative configurations with overlaps. The overlaps are presented as a set of vectors in the domain partition model. To enhance the reliability, a technical procedure is also presented in which the set of vectors are heuristically filtered so that the corresponding small overlaps can be merged into big ones. Experimental results are provided to demonstrate the effectiveness of the proposed approach through applying it to several benchmark circuits. Compared with previous approaches, the proposed approach increased MTTF by up to 18.87%.

  • A Complete Solution to a Simple Case of Dynamic Observer Error Linearization: New Approach to Observer Error Linearization

    Jongwook YANG  Juhoon BACK  Jin H. SEO  

     
    LETTER-Systems and Control

      Vol:
    E94-A No:1
      Page(s):
    424-429

    In this letter, we propose a new observer error linearization approach that is called reduced-order dynamic observer error linearization (RDOEL), which is a modified version of dynamic observer error linearization (DOEL). We introduce the concepts and properties of RDOEL, and provide a complete solution to RDOEL with one integrator. Moreover, we show that it is also a complete solution to a simple case of DOEL.

  • Autonomous Community Construction and Reconstruction Technology for Emergency Management

    Fan WEI  Xiaodong LU  Kinji MORI  

     
    PAPER-Community

      Vol:
    E94-B No:1
      Page(s):
    10-17

    Wireless Sensor Network(WSN) is widely used in Emergency Management System(EMS) to assure high safety. Real-timely transmitting emergency information in dynamically changing environment should be assured in mission critical district. Conventional methods based on static situations and centralized approaches can not satisfy this requirement. In this paper, to assure real-time property, autonomous community construction technology is proposed to set special area called community which includes a special passage composed of several routers for emergency information's transmission and routers around this passage in one hop range. Emergency information's transmission is protected by routers around this passage from interference of other sensing information's transmission in and outside community. Moreover, autonomous community reconstruction technology is proposed to guarantee real-time property at failure conditions. In this technology, community members autonomously cooperate and coordinate with each other to setup a bypass in community for transmitting emergency information if fault happens. Evaluation results indicate effectiveness of proposed technology.

  • Decentralized Coverage Control for Multi-Agent Systems with Nonlinear Dynamics

    Alireza DIRAFZOON  Mohammad Bagher MENHAJ  Ahmad AFSHAR  

     
    PAPER-Community

      Vol:
    E94-D No:1
      Page(s):
    3-10

    In this paper, we study the decentralized coverage control problem for an environment using a group of autonomous mobile robots with nonholonomic kinematic and dynamic constraints. In comparison with standard coverage control procedures, we develop a combined controller for Voronoi-based coverage approach in which kinematic and dynamic constraints of the actual mobile sensing robots are incorporated into the controller design. Furthermore, a collision avoidance component is added in the kinematic controller in order to guarantee a collision free coverage of the area. The convergence of the network to the optimal sensing configuration is proven with a Lyapunov-type analysis. Numerical simulations are provided approving the effectiveness of the proposed method through several experimental scenarios.

  • New Safety Support System for Children on School Routes Using Mobile Ad Hoc Networks

    Atsushi ITO  Yoshiaki KAKUDA  Tomoyuki OHTA  Shinji INOUE  

     
    PAPER-Assurance

      Vol:
    E94-B No:1
      Page(s):
    18-29

    One of the most important duties of government is to maintain safety. In 2007, the Ministry of Internal Affairs and Communications of Japan tested 16 different models of a safety support system for children on school routes. One of the models was constructed and tested at a school in an area of the city of Hiroshima from September to December of 2007. A consortium was established by the city of Hiroshima; Hiroshima City University; Chugoku Electric Power Co., Inc.; and KDDI Corporation to conduct this project. For the model project, we developed a new safety support system for children on school routes by using a mobile ad hoc network constructed from mobile phones with the Bluetooth function. About 500 students and 50 volunteers used this system for four months. The support system provided good performance and accuracy in maintaining the safety of students on the way to school [7]. The basic idea of the safety support system is the grouping of children and volunteers using a mobile ad hoc network. In this paper, we present an outline of this system and evaluate the performance of grouping and the effectiveness of our approach.

  • Data Management for Large-Scale Position-Tracking Systems

    Fumiaki INOUE  Yongbing ZHANG  Yusheng JI  

     
    PAPER-Scalability & Timeliness

      Vol:
    E94-B No:1
      Page(s):
    45-54

    We propose a distributed data management approach in this paper for a large-scale position-tracking system composed of multiple small systems based on wireless tag technologies such as RFID and Wi-Fi tags. Each of these small systems is called a domain, and a domain server manages the position data of the users belonging to its managing domain and also to the other domains but temporarily residing in its domain. The domain servers collaborate with each other to globally manage the position data, realizing the global position tracking. Several domains can be further grouped to form a larger domain, called a higher-domain, so that the whole system is constructed in a hierarchical structure. We implemented the proposed approach in an experimental environment, and conducted a performance evaluation on the proposed approach and compared it with an existing approach wherein a central server is used to manage the position data of all the users. The results showed that the position data processing load is distributed among the domain servers and the traffic for position data transmission over the backbone network can be significantly restrained.

  • Mobile Terminal Substitution of Vehicular Collision Avoidance Support System (VCASS) for Non-VCASS Vehicles: S-VCASS

    Tomotaka WADA  Shinji NAKAI  Tetsuya MARUOKA  Haokun WANG  Hiromi OKADA  

     
    PAPER-Intelligent Transport System

      Vol:
    E94-A No:1
      Page(s):
    410-419

    In this paper, we develop a VCASS substitution system (S-VCASS) using a personal mobile terminal in order to improve the effectiveness of VCASS in an environment comprising both VCASS and non-VCASS vehicles. We propose three new pedestrian state judgment algorithms that can be implemented on a personal mobile terminal for inter-vehicle communications. We evaluate the performances of the three proposed algorithms with real vehicles. Finally, we show that the proposed algorithms can recognize vehicles without VCASS.

  • Scattering of a Plane Wave from the End-Face of a Three-Dimensional Waveguide System

    Asami TAKI  Akira KOMIYAMA  

     
    BRIEF PAPER-Scattering and Diffraction

      Vol:
    E94-C No:1
      Page(s):
    63-67

    The scattering of a plane wave from the end-face of a three-dimensional waveguide system composed of a large number of cores is treated by the volume integral equation for the electric field and the first order term of a perturbation solution for TE and TM wave incidence is analytically derived. The far scattered field does not almost depend on the polarization of an incident wave and the angle dependence is described as the Fourier transform of the incident field in the cross section of cores. To clarify the dependence of the scattering pattern on the arrangement of cores some numerical examples are shown.

961-980hit(3183hit)