The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] system(3183hit)

1261-1280hit(3183hit)

  • All Pairings Are in a Group

    Chang-An ZHAO  Fangguo ZHANG  Jiwu HUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:10
      Page(s):
    3084-3087

    In this paper, we suggest that all pairings are in a group from an abstract angle. Based on the results, some new pairings with the short Miller loop are constructed for great efficiency. It is possible that our observation can be applied into other aspects of pairing-based cryptosystems.

  • Balancing Uplink and Downlink under Asymmetric Traffic Environments Using Distributed Receive Antennas

    Illsoo SOHN  Byong Ok LEE  Kwang Bok LEE  

     
    PAPER

      Vol:
    E91-B No:10
      Page(s):
    3141-3148

    Recently, multimedia services are increasing with the widespread use of various wireless applications such as web browsers, real-time video, and interactive games, which results in traffic asymmetry between the uplink and downlink. Hence, time division duplex (TDD) systems which provide advantages in efficient bandwidth utilization under asymmetric traffic environments have become one of the most important issues in future mobile cellular systems. It is known that two types of intercell interference, referred to as crossed-slot interference, additionally arise in TDD systems; the performances of the uplink and downlink transmissions are degraded by BS-to-BS crossed-slot interference and MS-to-MS crossed-slot interference, respectively. The resulting performance unbalance between the uplink and downlink makes network deployment severely inefficient. Previous works have proposed intelligent time slot allocation algorithms to mitigate the crossed-slot interference problem. However, they require centralized control, which causes large signaling overhead in the network. In this paper, we propose to change the shape of the cellular structure itself. The conventional cellular structure is easily transformed into the proposed cellular structure with distributed receive antennas (DRAs). We set up statistical Markov chain traffic model and analyze the bit error performances of the conventional cellular structure and proposed cellular structure under asymmetric traffic environments. Numerical results show that the uplink and downlink performances of the proposed cellular structure become balanced with the proper number of DRAs and thus the proposed cellular structure is notably cost-effective in network deployment compared to the conventional cellular structure. As a result, extending the conventional cellular structure into the proposed cellular structure with DRAs is a remarkably cost-effective solution to support asymmetric traffic environments in future mobile cellular systems.

  • Analysis and Improvement of an Anonymity Scheme for P2P Reputation Systems

    Li-ming HAO  Song-nian LU  Shu-tang YANG  Ning LIU  Qi-shan HUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:10
      Page(s):
    2893-2895

    In 2006, Miranda et al. proposed an anonymity scheme to achieve peers' anonymity in Peer-to-Peer (P2P) reputation systems. In this paper, we show that this scheme can not achieve peers' anonymity in two cases. We also propose an improvement which solves the problem and improves the degree of anonymity.

  • BER Performance Evaluation in 22 MIMO Spatial Multiplexing Systems under Rician Fading Channels

    Yutaka MURAKAMI  Takashi MATSUOKA  Masayuki ORIHASHI  

     
    PAPER-Communication Theory

      Vol:
    E91-A No:10
      Page(s):
    2798-2807

    In this paper, BER (Bit Error Rate) performance in 22 MIMO (Multiple-Input Multiple-Output) spatial multiplexing systems under Rician fading channels is evaluated. We examine BER performances employing inverse channel detection (ICD) under Rician fading channels, adding the phase of the direct path and Rician factor as a parameter. The results clearly indicate that the phase of the direct path and Rician factor have a great influence on BER performances employing ICD under Rician fading channels.

  • Downlink Multihop Transmission Technique for Asymmetric Traffic Accommodation in DS-CDMA/FDD Cellular Communications

    Kazuo MORI  Katsuhiro NAITO  Hideo KOBAYASHI  

     
    PAPER

      Vol:
    E91-B No:10
      Page(s):
    3122-3131

    This paper proposes an asymmetric traffic accommodation scheme using a multihop transmission technique for CDMA/FDD cellular communication systems. The proposed scheme exploits the multihop transmission to downlink packet transmissions, which require the large transmission power at their single-hop transmissions, in order to increase the downlink capacity. In these multihop transmissions, vacant uplink band is used for the transmissions from relay stations to destination mobile stations, and this leads more capacity enhancement in the downlink communications. The relay route selection method and power control method for the multihop transmissions are also investigated in the proposed scheme. The proposed scheme is evaluated by computer simulation and the results show that the proposed scheme can achieve better system performance.

  • Robust Adaptive Control of Nonlinear Systems with Time-Varying Parameters and Its Application to Chua's Circuit

    Hamid R. KOOFIGAR  Saeed HOSSEINNIA  Farid SHEIKHOLESLAM  

     
    PAPER-Control and Optimization

      Vol:
    E91-A No:9
      Page(s):
    2507-2513

    The problem of designing a robust adaptive control for nonlinear systems with uncertain time-varying parameters is addressed. The upper bound of uncertain parameters, considered even in control coefficients, are not required to be known. An adaptive tracking controller is presented and, using the Lyapunov theory, the closed-loop stability and tracking error convergence is shown. In order to improve the performance of the method, a robust mechanism is incorporated into the adaptive controller yielding a robust adaptive algorithm. The proposed controller guarantees the boundedness of all closed-loop signals and robust convergence of tracking error in spite of time-varying parameter uncertainties with unknown bounds. The parametric uncertain systems under consideration describes a wide class of nonlinear circuits and systems. As an application, a novel parametric model is derived for nonlinear Chua's circuit and then, the proposed method is used for its control. The effectiveness of the method is demonstrated by some simulation results.

  • Performance Consensus Problem of Multi-Agent Systems with Multiple State Variables

    Naoki HAYASHI  Toshimitsu USHIO  

     
    PAPER-Nonlinear System Theory

      Vol:
    E91-A No:9
      Page(s):
    2403-2410

    A consensus problem has been studied in many fundamental and application fields to analyze coordinated behavior in multi-agent systems. In a consensus problem, it is usually assumed that a state of each agent is scalar and all agents have an identical linear consensus protocol. We present a consensus problem of multi-agent systems where each agent has multiple state variables and a performance value evaluated by a nonlinear performance function according to its current state. We derive sufficient conditions for agents to achieve consensus on the performance value using an algebraic graph theory and the mean value theorem. We also consider an application of a performance consensus problem to resource allocation in soft real-time systems so as to achieve a fair QoS (Quality of Service) level.

  • Proactive Retransmission and Buffer Management for Layered Video Transmission over Wireless Channel

    Yusuke UCHIDA  Sei SUNAHARA  Eisaburo ITAKURA  Hiroyuki MASUYAMA  Shoji KASAHARA  Yutaka TAKAHASHI  

     
    PAPER-Network

      Vol:
    E91-B No:9
      Page(s):
    2897-2906

    Hybrid FEC/ARQ, which is a mixture of forward error correction (FEC) and automatic repeat request (ARQ), is a well-known technique aiming for packet-loss recovery to guarantee quality of service (QoS) for real-time communications. In this paper, focusing on layered video transmission over wireless network environment, we propose a proactive retransmission scheme for hybrid FEC/ARQ. In the proposed scheme, a receiver host periodically sends probe packets to a sender host in order to check wireless channel state. If the sender host does not receive any probe packet during a pre-specified interval, it regards the wireless channel as being in burst loss state, and it proactively retransmits packets expected to be lost during the burst loss period. The buffer management associated with layered video coding is also taken into consideration. The performance of the proposed scheme is investigated by simulation. Numerical examples show that the proposed scheme transmits packets of the base layer more successfully than the conventional FEC/ARQ.

  • Codebook Based Space Division Multiple Access with Partial Side Information

    Myoung-Won LEE  Cheol MUN  Dong-Hee KIM  Jong-Gwan YOOK  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:9
      Page(s):
    3017-3020

    In this letter, a codebook based multiuser MIMO precoding scheme is proposed for a space-division multiple access (SDMA) system with limited feedback. Focusing on the case of SDMA systems with two transmit antennas, a precoder codebook design is proposed based on the idea that a precoder inducing larger fluctuations in the signal to interference and noise ratio (SINR) at each link can lead to a larger gain in terms of multiuser diversity. It is shown that the proposed multiuser MIMO precoding outperforms existing multiuser MIMO techniques in terms of the average system throughput.

  • Autonomous Community Construction Technology to Achieve Service Assurance in ADCS

    Khalid MAHMOOD  Xiaodong LU  Kinji MORI  

     
    PAPER

      Vol:
    E91-D No:9
      Page(s):
    2259-2266

    Autonomous Decentralized Community System (ADCS) makes its basis on offering customized and dynamic services to group of end-users having common preferences at specified time and location. Owing to extreme dynamism in the system caused by rapidly varying user's demands, and severe mobility of users, it is quite difficult to assure timely service provision to all community members. This paper presents autonomous decentralized community system construction by autonomous division and integration technologies to procure service assurance under dynamic situations, without involving significant communication overhead. By adopting the concept of size threshold, the proposed technique continuously maintains the appropriate size of community in constantly and rapidly changing operating environment, to deliver optimal quality of service in terms of response time. The effectiveness of proposed technology has been shown through simulation, which reveals remarkable improvement (up to 29%) in response time.

  • New Graph Calculi for Planar Non-3-Colorable Graphs

    Yoichi HANATANI  Takashi HORIYAMA  Kazuo IWAMA  Suguru TAMAKI  

     
    PAPER

      Vol:
    E91-A No:9
      Page(s):
    2301-2307

    The Hajos calculus is a nondeterministic procedure which generates the class of non-3-colorable graphs. If all non-3-colorable graphs can be constructed in polynomial steps by the calculus, then NP = co-NP holds. Up to date, however, it remains open whether there exists a family of graphs that cannot be generated in polynomial steps. To attack this problem, we propose two graph calculi PHC and PHC* that generate non-3-colorable planar graphs, where intermediate graphs in the calculi are also restricted to be planar. Then we prove that PHC and PHC* are sound and complete. We also show that PHC* can polynomially simulate PHC.

  • A Fuzzy Estimation Theory for Available Operation of Extremely Complicated Large-Scale Network Systems

    Kazuo HORIUCHI  

     
    PAPER-Nonlinear System Theory

      Vol:
    E91-A No:9
      Page(s):
    2396-2402

    In this paper, we shall describe about a fuzzy estimation theory based on the concept of set-valued operators, suitable for available operation of extremely complicated large-scale network systems. Fundamental conditions for availability of system behaviors of such network systems are clarified in a form of β-level fixed point theorem for system of fuzzy-set-valued operators. Here, the proof of this theorem is accomplished in a weak topology introduced into the Banach space.

  • A QoS Management Technique of Urgent Information Provision in ITS Services Using DSRC for Autonomous Base Stations

    Akitoshi SHIMURA  Takeiki AIZONO  Masashi HIRAIWA  Shigeki SUGANO  

     
    PAPER

      Vol:
    E91-D No:9
      Page(s):
    2276-2284

    A QoS management technique based on an autonomous decentralized mobility system, which is an autonomous decentralized system enhanced to provide mobile stations with information about urgent roadway situations, is proposed in this paper. This technique enables urgent messages to be flexibly and quickly transmitted to mobile stations by multiple decentralized base stations using dedicated short range communication. It also supports the easy addition of additional base stations. Each station autonomously creates information-delivery communities based on the urgency of the messages it receives through the roadside network and the distances between the senders and receivers. Each station dynamically determines the urgency of messages according to the message content and the speed of the mobile stations. Evaluation of this technique applied to the Smart Gateway system, which provides driving-assistance services to mobile stations through dedicated short-range communication, demonstrated its effectiveness and that it is suitable for actual systems.

  • A Performance Comparison of the Parallel Preconditioners for Iterative Methods for Large Sparse Linear Systems Arising from Partial Differential Equations on Structured Grids

    Sangback MA  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E91-A No:9
      Page(s):
    2578-2587

    In this paper we compare various parallel preconditioners such as Point-SSOR (Symmetric Successive OverRelaxation), ILU(0) (Incomplete LU) in the Wavefront ordering, ILU(0) in the Multi-color ordering, Multi-Color Block SOR (Successive OverRelaxation), SPAI (SParse Approximate Inverse) and pARMS (Parallel Algebraic Recursive Multilevel Solver) for solving large sparse linear systems arising from two-dimensional PDE (Partial Differential Equation)s on structured grids. Point-SSOR is well-known, and ILU(0) is one of the most popular preconditioner, but it is inherently serial. ILU(0) in the Wavefront ordering maximizes the parallelism in the natural order, but the lengths of the wavefronts are often nonuniform. ILU(0) in the Multi-color ordering is a simple way of achieving a parallelism of the order N, where N is the order of the matrix, but its convergence rate often deteriorates as compared to that of natural ordering. We have chosen the Multi-Color Block SOR preconditioner combined with direct sparse matrix solver, since for the Laplacian matrix the SOR method is known to have a nondeteriorating rate of convergence when used with the Multi-Color ordering. By using block version we expect to minimize the interprocessor communications. SPAI computes the sparse approximate inverse directly by least squares method. Finally, ARMS is a preconditioner recursively exploiting the concept of independent sets and pARMS is the parallel version of ARMS. Experiments were conducted for the Finite Difference and Finite Element discretizations of five two-dimensional PDEs with large meshsizes up to a million on an IBM p595 machine with distributed memory. Our matrices are real positive, i.e., their real parts of the eigenvalues are positive. We have used GMRES(m) as our outer iterative method, so that the convergence of GMRES(m) for our test matrices are mathematically guaranteed. Interprocessor communications were done using MPI (Message Passing Interface) primitives. The results show that in general ILU(0) in the Multi-Color ordering and ILU(0) in the Wavefront ordering outperform the other methods but for symmetric and nearly symmetric 5-point matrices Multi-Color Block SOR gives the best performance, except for a few cases with a small number of processors.

  • Autonomous Decentralized System and Its Strategic Approach for Research and Development

    Kinji MORI  

     
    INVITED PAPER

      Vol:
    E91-D No:9
      Page(s):
    2227-2232

    Autonomous Decentralized System (ADS) has been making progress in these 31 years since it was proposed in 1977. During these long years in the rapidly advancing computer and communication technologies, the ADS concept has not been changed but its technologies have been growing in accordance with the change and diversity of the social, economical and personal requirements and through the globalization of the market and the restructuring organizations. The ADS technologies are systematized to cover all processes of system design, operation, maintenance and modification. This paper reviews the work done in fields of ADS in past 31 years from not only technological perspectives, but it also encompasses users requirements and value, system design, industrial activity, academic activity and standardization [1]-[26]. Moreover the new directions of the ADS are suggested.

  • Global Asymptotic Stabilization of Nonlinear Systems with Unknown Growth Rate by Adaptive Controller

    Ho-Lim CHOI  

     
    LETTER-Systems and Control

      Vol:
    E91-A No:9
      Page(s):
    2678-2681

    We consider a problem of global asymptotic stabilization of a class of nonlinear systems that have the unknown linear growth rate. While the existing results only deal with one specified form of nonlinear systems, our proposed method includes both forms of triangular and feedforward nonlinear systems in a unified framework. The proposed controller has a dynamic gain mechanism which is selectively engaged based on the given nonlinear form. Then, the dynamic gain is adaptively tuned depending on the unknown linear growth rate.

  • Rapidly Building Visual Management Systems for Context-Aware Services

    Ichiro SATOH  

     
    PAPER

      Vol:
    E91-D No:9
      Page(s):
    2251-2258

    A component framework for building and operating visual interfaces for context-aware services in ubiquitous computing environments is presented. By using a compound-document technology, it provides physical entities, places, stationary or mobile computing devices, and services with visual components as multimedia representations to enable them to be annotated and controlled them. It can automatically assemble visual components into a visual interface for monitoring and managing context-aware services according to the spatial-containment relationships between their targets in the physical world by using underlying location-sensing systems. End-users can manually deploy and customize context-aware services through user-friendly GUI-based manipulations for editing documents. This paper presents the design for this framework and describes its implementation and practical applications in user/location-aware assistant systems in two museums.

  • A Transmitting and Receiving System Using a Basic One-Chip Microcomputer for Extremely Low Power Radio Communication

    Shuhei SONODA  Hiroyuki ARAI  

     
    PAPER-Devices/Circuits for Communications

      Vol:
    E91-B No:9
      Page(s):
    2883-2888

    Often, the major requisites of short-range communication systems are low power consumption and low cost, rather than high data-transmission speeds. This paper proposes low-cost and extremely low-power radio communication devices that use a basic one-chip microcomputer for short-range transmission and reception. In the proposed transmitter, a rectangular wave is generated at external I/O ports as carrier by the basic one-chip microcomputer and is then filtered and radiated by an antenna circuit. In the proposed receiver, the received signal is detected by a radio IC and is subsequently digitally processed by a microcomputer with a built-in A/D converter. The proposed transmitter and receiver are demonstrated, and the system performance is experimentally evaluated.

  • An Efficient Agent Control Method for Time-Constrained Applications

    Tran Nguyen TRUNG  Hideo KAMADA  Kazuhiko KINOSHITA  Nariyoshi YAMAI  Tetsuya TAKINE  Koso MURAKAMI  

     
    PAPER-Multimedia Systems for Communications

      Vol:
    E91-B No:9
      Page(s):
    2972-2979

    As one of the technologies for the retrieval of desired contents over large-scale networks, multi-agent systems are receiving much attention. Since there are too many contents on the network to search them all exhaustively, some applications on multi-agent systems have time constraints, that is, they must obtain a result by a given deadline. To find better results for such applications, it is important for the agents to complete their tasks on as many nodes as possible by the deadline. However, most existing agent systems using round robin scheduling disciplines do not take time constraints into account. Therefore, agents are likely to miss their deadlines on many nodes. In this paper, we propose an efficient agent-dispatching method for time-constrained applications. This method decides creation and migration of a clone agent according to the estimated value of the number of agents that would have completed their tasks by the deadline. The results of our performance evaluation show that the proposed method increases the number of agents that complete their tasks.

  • On Increasing the Number of Users in (t, n) Threshold Secret Sharing Schemes

    Todorka ALEXANDROVA  Hiroyoshi MORITA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2138-2150

    Constructing ideal (t,n) threshold secret sharing schemes leads to some limitations on the maximum number of users, that are able to join the secret sharing scheme. We aim to remove these limitations by reducing the information rate of the constructed threshold secret sharing schemes. In this paper we propose recursive construction algorithms of (t,n) threshold secret sharing schemes, based on the generalized vector space construction. Using these algorithms we are able to construct a (t,n) threshold secret sharing scheme for any arbitrary n.

1261-1280hit(3183hit)