The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] tin(3578hit)

781-800hit(3578hit)

  • Contact Duration-Aware Epidemic Broadcasting in Delay/Disruption-Tolerant Networks Open Access

    Kohei WATABE  Hiroyuki OHSAKI  

     
    PAPER-Network

      Vol:
    E98-B No:12
      Page(s):
    2389-2399

    DTNs (Delay/Disruption-Tolerant Networks) composed of mobile nodes in low node-density environments have attracted considerable attention in recent years. In this paper, we propose a CD-BCAST (Contact Duration BroadCAST) mechanism that can reduce the number of message forwardings while maintaining short message delivery delays in DTNs composed of mobile nodes. The key idea behind CD-BCAST is to increase the probability of simultaneous forwarding by intentionally delaying message forwarding based on the contact duration distribution measured by each node. Through simulations, we show that CD-BCAST needs substantially less message forwardings than conventional mechanisms and it does not require parameter tuning under varieties of communication ranges and node densities.

  • Inter-FPGA Routing for Partially Time-Multiplexing Inter-FPGA Signals on Multi-FPGA Systems with Various Topologies

    Masato INAGI  Yuichi NAKAMURA  Yasuhiro TAKASHIMA  Shin'ichi WAKABAYASHI  

     
    PAPER-Physical Level Design

      Vol:
    E98-A No:12
      Page(s):
    2572-2583

    Multi-FPGA systems, which consist of multiple FPGAs and a printed circuit board connecting them, are useful and important tools for prototyping large scale circuits, including SoCs. In this paper, we propose a method for optimizing inter-FPGA signal transmission to accelerate the system frequency of multi-FPGA prototyping systems and shorten prototyping time. Compared with the number of I/O pins of an FPGA, the number of I/O signals between FPGAs usually becomes very large. Thus, time-multiplexed I/Os are used to resolve the problem. On the other hand, they introduce large delays to inter-FPGA I/O signals, and much lower the system frequency. To reduce the degradation of the system frequency, we have proposed a method for optimally selecting signals to be time-multiplexed and signals not to be time-multiplexed. However, this method assumes that there exist physical connections (i.e., wires on the printed circuit board) between every pair of FPGAs, and cannot handle I/O signals between a pair of FPGAs that have no physical connections between them. Thus, in this paper, we propose a method for obtaining indirect inter-FPGA routes for such I/O signals, and then combine the indirect routing method and the time-multiplexed signal selection method to realize effective time-multiplexing of inter-FPGA I/O signals on systems with various topologies.

  • Fast Control Method of Software-Managed TLB for Reducing Zero-Copy Communication Overhead

    Toshihiro YAMAUCHI  Masahiro TSURUYA  Hideo TANIGUCHI  

     
    LETTER-Operating System

      Pubricized:
    2015/09/15
      Vol:
    E98-D No:12
      Page(s):
    2187-2191

    Microkernel operating systems (OSes) use zero-copy communication to reduce the overhead of copying transfer data, because the communication between OS servers occurs frequently in the case of microkernel OSes. However, when a memory management unit manages the translation lookaside buffer (TLB) using software, TLB misses tend to increase the overhead of interprocess communication (IPC) between OS servers running on a microkernel OS. Thus, improving the control method of a software-managed TLB is important for microkernel OSes. This paper proposes a fast control method of software-managed TLB that manages page attachment in the area used for IPC by using TLB entries, instead of page tables. Consequently, TLB misses can be avoided in the area, and the performance of IPC improves. Thus, taking the SH-4 processor as an example of a processor having a software-managed TLB, this paper describes the design and the implementation of the proposed method for AnT operating system, and reports the evaluation results of the proposed method.

  • The Error Exponent of Zero-Rate Multiterminal Hypothesis Testing for Sources with Common Information

    Makoto UEDA  Shigeaki KUZUOKA  

     
    PAPER-Shannon Theory

      Vol:
    E98-A No:12
      Page(s):
    2384-2392

    The multiterminal hypothesis testing problem with zero-rate constraint is considered. For this problem, an upper bound on the optimal error exponent is given by Shalaby and Papamarcou, provided that the positivity condition holds. Our contribution is to prove that Shalaby and Papamarcou's upper bound is valid under a weaker condition: (i) two remote observations have a common random variable in the sense of Gácks and Körner, and (ii) when the value of the common random variable is fixed, the conditional distribution of remaining random variables satisfies the positivity condition. Moreover, a generalization of the main result is also given.

  • A Routing-Based Mobility Management Scheme for IoT Devices in Wireless Mobile Networks Open Access

    Masanori ISHINO  Yuki KOIZUMI  Toru HASEGAWA  

     
    PAPER

      Vol:
    E98-B No:12
      Page(s):
    2376-2381

    Internet of Things (IoT) devices, which have different characteristics in mobility and communication patterns from traditional mobile devices such as cellular phones, have come into existence as a new type of mobile devices. A strict mobility management scheme for providing highly mobile devices with seamless access is over-engineered for IoT devices' mobility management. We revisit current mobility management schemes for wireless mobile networks based on identifier/locator separation. In this paper, we focus on IoT communication patterns, and propose a new routing-based mobility scheme for them. Our scheme adopts routing information aggregation scheme using the Bloom Filter as a data structure to store routing information. We clarify the effectiveness of our scheme in IoT environments with a large number of IoT devices, and discuss its deployment issues.

  • Dielectric Constant and Boundary Extraction Method for Double-Layered Dielectric Object for UWB Radars

    Takuya NIIMI  Shouhei KIDERA  Tetsuo KIRIMOTO  

     
    PAPER-Electromagnetic Theory

      Vol:
    E98-C No:12
      Page(s):
    1134-1142

    Microwave ultra-wideband (UWB) radar systems are advantageous for their high-range resolution and ability to penetrate dielectric objects. Internal imaging of dielectric objects by UWB radar is a promising nondestructive method of testing aging roads and bridges and a noninvasive technique for human body examination. For these applications, we have already developed an accurate internal imaging approach based on the range points migration (RPM) method, combined with a method that efficiently estimates the dielectric constant. Although this approach accurately extracts the internal boundary, it is applicable only to highly conductive targets immersed in homogeneous dielectric media. It is not suitable for multi-layered dielectric structures such as human tissues or concrete objects. To remedy this limitation, we here propose a novel dielectric constant and boundary extraction method for double-layered materials. This new approach, which simply extends the Envelope method to boundary extraction of the inner layer, is evaluated in finite difference time domain (FDTD)-based simulations and laboratory experiments, assuming a double-layered concrete cylinder. These tests demonstrate that our proposed method accurately and simultaneously estimates the dielectric constants of both media and the layer boundaries.

  • Energy-Harvesting Relay Selection Schemes for Decode-and-Forward Dual-Hop Networks

    Pham Ngoc SON  Hyung Yun KONG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:12
      Page(s):
    2485-2495

    In this paper, we analyze a cooperative communication network with multi energy-harvesting and decode-and-forward relays in which the best relay is selected based on criteria such as Maximizing First-Hop Signal to Noise Ratios (SNRs) (MFHS protocol), Maximizing Second-Hop SNRs (MSHS protocol), and Maximizing End-to-End SNRs (MEES protocol). In these protocols, the relays apply power-splitting receivers to harvest energy from radio frequency signals emitted from a source. Thus, each received SNR in the second hop is a function of a direct relay-destination gain and an indirect source-relay gain. The system performance of the proposed protocols is evaluated via exact outage probability analyses and Monte Carlo simulations. For further comparisons, an energy-harvesting decode-and-forward scheme with randomly relay selection (RRS protocol) and an energy-harvesting amplify-and-forward scheme (BAF protocol) are investigated and discussed. The simulation results show that 1) the MEES protocol outperforms the MFHS and MSHS protocols, and the MFHS protocol is more efficient than the MSHS protocol in the low SNR regions; 2) the proposed protocols achieve the best performance at the specific optimal power splitting ratios for which the MEES protocol has a balanced ratio for energy harvesting and decoding capacity; and 3) the theoretical analyses agree well with the simulation results.

  • Code Generation Limiting Maximum and Minimum Hamming Distances for Non-Volatile Memories

    Tatsuro KOJO  Masashi TAWADA  Masao YANAGISAWA  Nozomu TOGAWA  

     
    PAPER-High-Level Synthesis and System-Level Design

      Vol:
    E98-A No:12
      Page(s):
    2484-2493

    Data stored in non-volatile memories may be destructed due to crosstalk and radiation but we can restore their data by using error-correcting codes. However, non-volatile memories consume a large amount of energy in writing. How to reduce maximum writing bits even using error-correcting codes is one of the challenges in non-volatile memory design. In this paper, we first propose Doughnut code which is based on state encoding limiting maximum and minimum Hamming distances. After that, we propose a code expansion method, which improves maximum and minimum Hamming distances. When we apply our code expansion method to Doughnut code, we can obtain a code which reduces maximum-flipped bits and has error-correcting ability equal to Hamming code. Experimental results show that the proposed code efficiently reduces the number of maximum-writing bits.

  • A Cloud-Friendly Communication-Optimal Implementation for Strassen's Matrix Multiplication Algorithm

    Jie ZHOU  Feng YU  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2015/07/27
      Vol:
    E98-D No:11
      Page(s):
    1896-1905

    Due to its on-demand and pay-as-you-go properties, cloud computing has become an attractive alternative for HPC applications. However, communication-intensive applications with complex communication patterns still cannot be performed efficiently on cloud platforms, which are equipped with MapReduce technologies, such as Hadoop and Spark. In particular, one major obstacle is that MapReduce's simple programming model cannot explicitly manipulate data transfers between compute nodes. Another obstacle is cloud's relatively poor network performance compared with traditional HPC platforms. The traditional Strassen's algorithm of square matrix multiplication has a recursive and complex pattern on the HPC platform. Therefore, it cannot be directly applied to the cloud platform. In this paper, we demonstrate how to make Strassen's algorithm with complex communication patterns “cloud-friendly”. By reorganizing Strassen's algorithm in an iterative pattern, we completely separate its computations and communications, making it fit to MapReduce programming model. By adopting a novel data/task parallel strategy, we solve Strassen's data dependency problems, making it well balanced. This is the first instance of Strassen's algorithm in MapReduce-style systems, which also matches Strassen's communication lower bound. Further experimental results show that it achieves a speedup ranging from 1.03× to 2.50× over the classical Θ(n3) algorithm. We believe the principle can be applied to many other complex scientific applications.

  • On Makespan, Migrations, and QoS Workloads' Execution Times in High Speed Data Centers Open Access

    Daniel LAGO  Edmundo MADEIRA  Deep MEDHI  

     
    INVITED PAPER

      Vol:
    E98-B No:11
      Page(s):
    2099-2110

    With the growth of cloud-based services, cloud data centers are experiencing large growth. A key component in a cloud data center is the network technology deployed. In particular, Ethernet technology, commonly deployed in cloud data centers, is already envisioned for 10 Tbps Ethernet. In this paper, we study and analyze the makespan, workload execution times, and virtual machine migrations as the network speed increases. In particular, we consider homogeneous and heterogeneous data centers, virtual machine scheduling algorithms, and workload scheduling algorithms. Results obtained from our study indicate that the increase in a network's speed reduces makespan and workloads execution times, while aiding in the increase of the number of virtual machine migrations. We further observed that the number of migrations' behaviors in relation to the speed of the networks also depends on the employed virtual machines scheduling algorithm.

  • Transparent Organic Light-Emitting Diodes with Top Electrode Using Ion-Plating Method

    Hironao SANO  Ryota ISHIDA  Tatsuya KURA  Shunsuke FUJITA  Shigeki NAKA  Hiroyuki OKADA  Takeshi TAKAI  

     
    BRIEF PAPER

      Vol:
    E98-C No:11
      Page(s):
    1035-1038

    Transparent organic light-emitting diodes (TOLEDs) were investigated with top electrode of indium-tin-oxide (ITO) by ion-plating method. High deposition rate of 4.4 nm/s was realized without plasma damage of under organic layer. In the TOLEDs with inverted structure, high transmittance of over 75% at 550 nm and bright emission of 1,850 and 1,410 cd/m2, from bottom and top side at 163 mA/cm2, respectively, were obtained.

  • An Effective Time-Step Control Method in Damped Pseudo-Transient Analysis for Solving Nonlinear DC Circuit Equations

    Xiao WU  Zhou JIN  Dan NIU  Yasuaki INOUE  

    This Paper was withdrawn by the authors. The withdrawal procedure has been completed on July 19, 2016.
     
    PAPER-Nonlinear Problems

      Vol:
    E98-A No:11
      Page(s):
    2274-2282

    An effective time-step control method is proposed for the damped pseudo-transient analysis (DPTA). This method is based on the idea of the switched evolution/relaxation method which can automatically adapt the step size for different circuit states. Considering the number of iterations needed for the convergence of the Newton-Raphson method, the new method adapts the suitable time-step size with the status of previous steps. By numerical examples, it is proved that this method can improve the simulation efficiency and convergence for the DPTA method to solve nonlinear DC circuits.

  • Hop-Limited Adaptive Routing in Packet-Switched Non-Geostationary Satellite Networks

    Zhaofeng WU  Guyu HU  Fenglin JIN  Yinjin FU  Jianxin LUO  Tingting ZHANG  

     
    PAPER-Satellite Communications

      Vol:
    E98-B No:11
      Page(s):
    2359-2368

    The hop-limited adaptive routing (HLAR) mechanism and its enhancement (EHLAR), both tailored for the packet-switched non-geostationary (NGEO) satellite networks, are proposed and evaluated. The proposed routing mechanisms exploit both the predictable topology and inherent multi-path property of the NGEO satellite networks to adaptively distribute the traffic via all feasible neighboring satellites. Specifically, both mechanisms assume that a satellite can send the packets to their destinations via any feasible neighboring satellites, thus the link via the neighboring satellite to the destination satellite is assigned a probability that is proportional to the effective transmission to the destination satellites of the link. The satellite adjusts the link probability based on the packet sending information observed locally for the HLAR mechanism or exchanged between neighboring satellites for the EHLAR mechanism. Besides, the path of the packets are bounded by the maximum hop number, thus avoiding the unnecessary over-detoured packets in the satellite networks. The simulation results corroborate the improved performance of the proposed mechanisms compared with the existing in the literature.

  • Energy-Efficient and Throughput Maximization Scheme for Sensor-Aided Cognitive Radio Networks

    Hiep VU-VAN  Insoo KOO  

     
    PAPER

      Vol:
    E98-B No:10
      Page(s):
    1996-2003

    A cognitive radio user (CU) can get assistance from sensor nodes (SN) to perform spectrum sensing. However, the SNs are often powered by a finite-capacity battery, which can maintain operations of the SNs over a short time. Therefore, energy-efficiency of the SNs becomes a crucial problem. In this paper, an SN is considered to be a device with an energy harvester that can harvest energy from a non-radio frequency (non-RF) energy resource while performing other actions concurrently. In any one time slot, in order to maintain the required sensing accuracy of the CR network and to conserve energy in the SNs, only a small number of SNs are required to sense the primary user (PU) signal, and other SNs are kept silent to save energy. For this, an algorithm to divide all SNs into groups that can satisfy the required sensing accuracy of the network, is proposed. In a time slot, each SN group can be assigned one of two actions: stay silent, or be active to perform sensing. The problem of determining the optimal action for all SN groups to maximize throughput of the CR network is formulated as a framework of a partially observable Markov decision process (POMDP), in which the effect of the current time slot's action on the throughput of future time slots is considered. The solution to the problem, that is the decision mode of the SN groups (i.e., active or silent), depends on the residual energy and belief of absence probability of the PU signal. The simulation results show that the proposed scheme can improve energy efficiency of CR networks compared with other conventional schemes.

  • LTE/WiGig RAN-Level Interworking Architecture for 5G Millimeter-Wave Heterogeneous Networks

    Hailan PENG  Toshiaki YAMAMOTO  Yasuhiro SUEGARA  

     
    PAPER

      Vol:
    E98-B No:10
      Page(s):
    1957-1968

    Heterogeneous networks (HetNet) with different radio access technologies have been deployed to support a range of communication services. To manage these HetNets efficiently, some interworking solutions such as MIH (media independent handover), ANQP (access network query protocol) or ANDSF (access network discovery and selection function) have been studied. Recently, the millimeter-wave (mm-wave) based HetNet has been explored to provide multi-gigabits-per-second data rates over short distances in the 60GHz frequency band for 5G wireless networks. WiGig (Wireless Gigabit Alliance) is one of the available radio access technologies using mm-wave. However, the conventional interworking solutions are not sufficient for the implementation of LTE (Long Term Evolution)/WiGig HetNets. Since the coverage area of WiGig is very small due to the high propagation loss of the mm-wave band signal, it is difficult for UEs to perform cell discovery and handover if using conventional LTE/WLAN (wireless local area networks) interworking solutions, which cannot support specific techniques of WiGig well, such as beamforming and new media access methods. To solve these problems and find solutions for LTE/WiGig interworking, RAN (radio access network)-level tightly coupled interworking architecture will be a promising solution. As a RAN-level tightly coupled interworking solution, this paper proposes to design a LTE/WiGig protocol adaptor above the protocol stacks of WiGig to process and transfer control signaling and user data traffic. The proposed extended control plane can assist UEs to discover and access mm-wave BSs successfully and support LTE macro cells to jointly control the radio resources of both LTE and WiGig, so as to improve spectrum efficiency. The effectiveness of the proposal is evaluated. Simulation results show that LTE/WiGig HetNets with the proposed interworking solution can decrease inter-cell handover and improve user throughput significantly. Moreover, the downlink backhaul throughput and energy efficiency of mm-wave HetNets are evaluated and compared with that of 3.5GHz LTE HetNets. Results indicate that 60GHz mm-wave HetNets have better energy efficiency but with much heavier backhaul overhead.

  • Efficient Algorithms for Sorting k-Sets in Bins

    Atsuki NAGAO  Kazuhisa SETO  Junichi TERUYAMA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E98-D No:10
      Page(s):
    1736-1743

    We propose efficient algorithms for Sorting k-Sets in Bins. The Sorting k-Sets in Bins problem can be described as follows. We are given numbered n bins with k balls in each bin. Balls in the i-th bin are numbered n-i+1. We can only swap balls between adjacent bins. Our task is to move all of the balls to the same numbered bins. For this problem, we give an efficient greedy algorithm with $ rac{k+1}{4}n^2+O(k+n)$ swaps and provide a detailed analysis for k=3. In addition, we give a more efficient recursive algorithm using $ rac{15}{16}n^2+O(n)$ swaps for k=3.

  • Software Reliability Assessment with Multiple Changes of Testing-Environment

    Shinji INOUE  Shigeru YAMADA  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2031-2041

    We discuss software reliability assessment considering multiple changes of software fault-detection phenomenon. The testing-time when the characteristic of the software failure-occurrence or fault-detection phenomenon changes notably in the testing-phase of a software development process is called change-point. It is known that the occurrence of the change-point influences the accuracy for the software reliability assessment based on a software reliability growth models, which are mainly divided into software failure-occurrence time and fault counting models. This paper discusses software reliability growth modeling frameworks considering with the effect of the multiple change-point occurrence on the software reliability growth process in software failure-occurrence time and fault counting modeling. And we show numerical illustrations for the software reliability analyses based on our models by using actual data.

  • A Modified AdaBoost Algorithm with New Discrimination Features for High-Resolution SAR Targets Recognition

    Kun CHEN  Yuehua LI  Xingjian XU  Yuanjiang LI  

     
    LETTER-Pattern Recognition

      Pubricized:
    2015/07/21
      Vol:
    E98-D No:10
      Page(s):
    1871-1874

    In this paper, we first propose ten new discrimination features of SAR images in the moving and stationary target acquisition and recognition (MSTAR) database. The Ada_MCBoost algorithm is then proposed to classify multiclass SAR targets. In the new algorithm, we introduce a novel large-margin loss function to design a multiclass classifier directly instead of decomposing the multiclass problem into a set of binary ones through the error-correcting output codes (ECOC) method. Finally, experiments show that the new features are helpful for SAR targets discrimination; the new algorithm had better recognition performance than three other contrast methods.

  • Scaling Concolic Testing for the Environment-Intensive Program

    Xue LEI  Wei HUANG  Wenqing FAN  Yixian YANG  

     
    PAPER-Software System

      Pubricized:
    2015/06/30
      Vol:
    E98-D No:10
      Page(s):
    1755-1764

    Dynamic analysis is frail and insufficient to find hidden paths in environment-intensive program. By analyzing a broad spectrum of different concolic testing systems, we conclude that a number of them cannot handle programs that interact with the environment or require a complete working model. This paper addresses this problem by automatically identifying and modifying outputs of the data input interface function(DIIF). The approach is based on fine-grained taint analysis for detecting and updating the data that interacts with the environment to generate a new set of inputs to execute hidden paths. Moreover, we developed a prototype and conducted extensive experiments using a set of complex and environmentally intensive programs. Finally, the result demonstrates that our approach could identify the DIIF precisely and discover hidden path obviously.

  • Exploiting Social Relationship for Opportunistic Routing in Mobile Social Networks

    Zhenxiang GAO  Yan SHI  Shanzhi CHEN  Qihan LI  

     
    PAPER-Network

      Vol:
    E98-B No:10
      Page(s):
    2040-2048

    Routing is a challenging issue in mobile social networks (MSNs) because of time-varying links and intermittent connectivity. In order to enable nodes to make right decisions while forwarding messages, exploiting social relationship has become an important method for designing efficient routing protocols in MSNs. In this paper, we first use the temporal evolution graph model to accurately capture the dynamic topology of the MSN. Based on the model, we introduce the social relationship metric for detecting the quality of human social relationship from contact history records. Utilizing this metric, we propose social relationship based betweenness centrality metric to identify influential nodes to ensure messages forwarded by the nodes with stronger social relationship and higher likelihood of contacting other nodes. Then, we present SRBet, a novel social-based forwarding algorithm, which utilizes the aforementioned metric to enhance routing performance. Simulations have been conducted on two real world data sets and results demonstrate that the proposed forwarding algorithm achieves better performances than the existing algorithms.

781-800hit(3578hit)