The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] tin(3578hit)

1541-1560hit(3578hit)

  • QSLS: Efficient Quorum Based Sink Location Service for Geographic Routing in Irregular Wireless Sensor Networks

    Fucai YU  Soochang PARK  Euisin LEE  Younghwan CHOI  Sang-Ha KIM  

     
    LETTER-Network

      Vol:
    E92-B No:12
      Page(s):
    3935-3938

    Geographic routing for wireless sensor networks requires a source that can encapsulate the location of a sink in each data packet. How a source can obtain the location of a sink with low overhead is a difficult issue. This letter proposes a Quorum Based Sink Location Service (QSLS) which can be exploited by most geographic routing protocols in arbitrary irregular wireless sensor networks.

  • RPP: Reference Pattern Based Kernel Prefetching Controller

    Hyo J. LEE  In Hwan DOH  Eunsam KIM  Sam H. NOH  

     
    LETTER-System Programs

      Vol:
    E92-D No:12
      Page(s):
    2512-2515

    Conventional kernel prefetching schemes have focused on taking advantage of sequential access patterns that are easy to detect. However, it is observed that, on random and even sequential references, they may cause performance degradation due to inaccurate pattern prediction and overshooting. To address these problems, we propose a novel approach to work with existing kernel prefetching schemes, called Reference Pattern based kernel Prefetching (RPP). The RPP can reduce negative effects of existing schemes by identifying one more reference pattern, i.e., looping, in addition to random and sequential patterns and delaying starting prefetching until patterns are confirmed to be sequential or looping.

  • Evaluation of Free-Riding Traffic Problem in Overlay Routing and Its Mitigation Method Open Access

    Go HASEGAWA  Yuichiro HIRAOKA  Masayuki MURATA  

     
    PAPER-Network

      Vol:
    E92-B No:12
      Page(s):
    3774-3783

    Recent research on overlay networks has revealed that user-perceived network performance could be improved by an overlay routing mechanism. The effectiveness of overlay routing is mainly a result of the policy mismatch between the overlay routing and the underlay IP routing operated by ISPs. However, this policy mismatch causes a "free-riding" traffic problem, which may become harmful to the cost structure of Internet Service Providers. In the present paper, we define the free-riding problem in the overlay routing and evaluate the degree of free-riding traffic to reveal the effect of the problem on ISPs. We introduce a numerical metric to evaluate the degree of the free-riding problem and confirm that most multihop overlay paths that have better performance than the direct path brings the free-riding problem. We also discuss the guidelines for selecting paths that are more effective than the direct path and that mitigate the free-riding problem.

  • Reducing Security Policy Size for Internet Servers in Secure Operating Systems

    Toshihiro YOKOYAMA  Miyuki HANAOKA  Makoto SHIMAMURA  Kenji KONO  Takahiro SHINAGAWA  

     
    PAPER-System Programs

      Vol:
    E92-D No:11
      Page(s):
    2196-2206

    Secure operating systems (secure OSes) are widely used to limit the damage caused by unauthorized access to Internet servers. However, writing a security policy based on the principle of least privilege for a secure OS is a challenge for an administrator. Considering that remote attackers can never attack a server before they establish connections to it, we propose a novel scheme that exploits phases to simplify security policy descriptions for Internet servers. In our scheme, the entire system has two execution phases: an initialization phase and a protocol processing phase. The initialization phase is defined as the phase before the server establishes connections to its clients, and the protocol processing phase is defined as the phase after it establishes connections. The key observation is that access control should be enforced by the secure OS only in the protocol processing phase to defend against remote attacks. Since remote attacks cannot be launched in the initialization phase, a secure OS is not required to enforce access control in this phase. Thus, we can omit the access-control policy in the initialization phase, which effectively reduces the number of policy rules. To prove the effectiveness of our scheme, we wrote security policies for three kinds of Internet servers (HTTP, SMTP, and POP servers). Our experimental results demonstrate that our scheme effectively reduces the number of descriptions; it eliminates 47.2%, 27.5%, and 24.0% of policy rules for HTTP, SMTP, and POP servers, respectively, compared with an existing SELinux policy that includes the initialization of the server.

  • Multicast Routing and Wavelength Assignment with Shared Protection in Multi-Fiber WDM Mesh Networks: Optimal and Heuristic Solutions

    Kampol WORADIT  Matthieu GUYOT  Pisit VANICHCHANUNT  Poompat SAENGUDOMLERT  Lunchakorn WUTTISITTIKULKIJ  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E92-B No:11
      Page(s):
    3401-3409

    While the problem of multicast routing and wavelength assignment (MC-RWA) in optical wavelength division multiplexing (WDM) networks has been investigated, relatively few researchers have considered network survivability for multicasting. This paper provides an optimization framework to solve the MC-RWA problem in a multi-fiber WDM network that can recover from a single-link failure with shared protection. Using the light-tree (LT) concept to support multicast sessions, we consider two protection strategies that try to reduce service disruptions after a link failure. The first strategy, called light-tree reconfiguration (LTR) protection, computes a new multicast LT for each session affected by the failure. The second strategy, called optical branch reconfiguration (OBR) protection, tries to restore a logical connection between two adjacent multicast members disconnected by the failure. To solve the MC-RWA problem optimally, we propose an integer linear programming (ILP) formulation that minimizes the total number of fibers required for both working and backup traffic. The ILP formulation takes into account joint routing of working and backup traffic, the wavelength continuity constraint, and the limited splitting degree of multicast-capable optical cross-connects (MC-OXCs). After showing some numerical results for optimal solutions, we propose heuristic algorithms that reduce the computational complexity and make the problem solvable for large networks. Numerical results suggest that the proposed heuristic yields efficient solutions compared to optimal solutions obtained from exact optimization.

  • Jitter-Induced Noise Spectrum at the Output of Continuous-Time ΔΣ Modulators with NRZ Feedback Waveform

    Hossein SHAMSI  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E92-C No:11
      Page(s):
    1406-1409

    This paper proposes a closed-form formula for the jitter-induced noise spectrum at the output of continuous-time ΔΣ modulators with NRZ feedback waveform. In this approach, the clock jitter effects are modeled as an additive noise in the feedback loop of the modulator. Making use of a conceptual model and following from the linear system theory, the output spectrum is explained versus the spectrum of the additive jitter noise.

  • Algorithm for Controlling Multi-Car Elevator Systems Based on Procedures Estimating Efficiency of Passenger Transport and Call Assignability

    Takeshi FUJIMURA  Shohei UENO  Ayaka KIYOTAKE  Hiroyoshi MIWA  

     
    LETTER

      Vol:
    E92-A No:11
      Page(s):
    2790-2793

    Recently multi-car elevator (MCE) consisting of several elevator cars in a single elevator shaft received great interest as transportation systems for high-rise buildings. Algorithms for efficiently controlling elevator cars are necessary to put MCEs to practical use. We propose an algorithm for controlling MCEs to reduce passenger-waiting time. A feature of our algorithm is the introduction of a simple function estimating efficiency of passenger transport and a procedure checking assignability of a car. We evaluate the performance of our algorithm using a simulation and show that it performs better compared with a previous algorithm.

  • Comparative Analysis of Automatic Exudate Detection between Machine Learning and Traditional Approaches

    Akara SOPHARAK  Bunyarit UYYANONVARA  Sarah BARMAN  Thomas WILLIAMSON  

     
    PAPER-Biological Engineering

      Vol:
    E92-D No:11
      Page(s):
    2264-2271

    To prevent blindness from diabetic retinopathy, periodic screening and early diagnosis are neccessary. Due to lack of expert ophthalmologists in rural area, automated early exudate (one of visible sign of diabetic retinopathy) detection could help to reduce the number of blindness in diabetic patients. Traditional automatic exudate detection methods are based on specific parameter configuration, while the machine learning approaches which seems more flexible may be computationally high cost. A comparative analysis of traditional and machine learning of exudates detection, namely, mathematical morphology, fuzzy c-means clustering, naive Bayesian classifier, Support Vector Machine and Nearest Neighbor classifier are presented. Detected exudates are validated with expert ophthalmologists' hand-drawn ground-truths. The sensitivity, specificity, precision, accuracy and time complexity of each method are also compared.

  • Recent Korean R&D in Satellite Communications Open Access

    Ho-Jin LEE  Jae Moung KIM  Byung-Seub LEE  Han LEE  Jang-Soo RYOO  

     
    INVITED PAPER

      Vol:
    E92-B No:11
      Page(s):
    3300-3308

    The R&D in satellite communications in Korea has been driven mainly by KCC (Korea Communications Commission) but in a small scale compared to Korea space development program organized by MEST (Ministry of Education, Science and Technology). Public and civilian satcom sector R&D has been led mainly by ETRI with small/medium companies contrary to rare investment in private sector while military sector R&D has been orchestrated by ADD with defense industry. By the COMS (Communication, Ocean and Meteorological Satellite) experimental Ka-band payload, Korea pursues a space qualification of own technology for national infrastructure evolution as well as industrialization of space R&D results. Once COMS launched and space qualified in 2009, subsequent application experiments and new technology R&D like UHDTV will entail service and industry promotion. The payload technology is expected for the next Korean commercial satellites or for new OBP satellites. The COMS ground control system and GNSS ground station technologies are under development for COMS operation and enhanced GNSS services along with advent of Galileo respectively. Satellite broadband mobile VSAT based on DVB-S2/RCS (+M) and low profile tracking antennas have been developed for trains, ships, and planes. While APSI is developing GMR-1 based Thuraya handset functions, ETRI is designing IMT-Advanced satellite radio interface for satellite and terrestrial dual-mode handheld communication system like Japanese STICS, with universities' satellite OFDM researches. A 21 GHz Ka-band higher-availability scalable HD broadcasting technology and SkyLife's hybrid satellite IPTV technology are being developed. In near term Korea will extend R&D programs to upgrade the space communication infrastructure for universal access to digital opportunity and safer daily life from disaster, and to promote space green IT industrialization, national security, and space resources sovereign. Japanese stakeholders are invited to establish a collaborative R&D with Korea for mutual benefit of the future.

  • Approaching Optimal Broadcast Efficiency in Multi-Hop Wireless Networks

    Jingyong LIU  Xiaorong JING  Lemin LI  Tianqi ZHANG  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E92-A No:11
      Page(s):
    2949-2954

    It is an almost classical problem to develop an efficient broadcast mechanism in multi-hop networks. However, the problem is far from solved though a lot of research till recently has been focused on it. In this letter, we analyze the optimal distribution of forwarding nodes that can doubly cover the network with the minimum transmission overlapped area in a multi-hop wireless network where nodes are ideally distributed. On this basis we propose a simple and effective broadcast method to significantly increase the transmission efficiency and deliverability. In this method, the total number of retransmissions is quite low since each node only needs to select three forwarding nodes, and high deliverability can be achieved for the set of forwarding nodes provide nearly double coverage to the whole network. In addition, the method has excellent scalability in large scale networks and highly dynamic environment.

  • Design of Gear-Form Cathode as a Removal Modusof Optical Materials of Indium-Tin-Oxide

    Pai-Shan PA  

     
    BRIEF PAPER

      Vol:
    E92-C No:11
      Page(s):
    1358-1361

    A precision in thickness recycling modus for a displays' color filter surface using a gear-form cathode in microelectrochemical removal is developed in the study. Through the precise removal processes of optical materials of nanostructure of Indium-Tin-Oxide crystallization, the optoelectronic semiconductor industry can effectively recycle defective products, and reducing production costs.

  • Modular Conformance Testing and Assume-Guarantee Verification for Evolving Component-Based Software

    Ngoc Hung PHAM  Toshiaki AOKI  Takuya KATAYAMA  

     
    PAPER

      Vol:
    E92-A No:11
      Page(s):
    2772-2780

    This paper proposes a framework for modular verification of evolving component-based software. This framework includes two stages: modular conformance testing for updating inaccurate models of the evolved components and modular verification for evolving component-based software. When a component is evolved after adapting some refinements, the proposed framework focuses on this component and its model in order to update the model and recheck the whole evolved system. The framework also reuses the previous verification results and the previous models of the evolved components to reduce the number of steps required in the model update and modular verification processes. An implementation and some experimental results are presented.

  • Cross-Layer Protocol Combining Tree Routing and TDMA Slotting in Wireless Sensor Networks

    Ronggang BAI  Yusheng JI  Zhiting LIN  Qinghua WANG  Xiaofang ZHOU  Yugui QU  Baohua ZHAO  

     
    PAPER-Network Architecture and Testbed

      Vol:
    E92-D No:10
      Page(s):
    1905-1914

    Being different from other networks, the load and direction of data traffic for wireless sensor networks are rather predictable. The relationships between nodes are cooperative rather than competitive. These features allow the design approach of a protocol stack to be able to use the cross-layer interactive way instead of a hierarchical structure. The proposed cross-layer protocol CLWSN optimizes the channel allocation in the MAC layer using the information from the routing tables, reduces the conflicting set, and improves the throughput. Simulations revealed that it outperforms SMAC and MINA in terms of delay and energy consumption.

  • Routing Scheme for Bandwidth Guaranteed Traffic in AMC-Enabled Wireless Mesh Networks

    Jun NISHIOKA  Satoru YAMANO  

     
    PAPER-QoS and Quality Management

      Vol:
    E92-D No:10
      Page(s):
    1934-1944

    Backbone network of the mobile networks, i.e. mobile backhaul networks, is an important part of mobile network system. With the decreasing size of mobile network system cells, it is considered next-generation mobile backhaul networks will form mesh topology. Most mobile backhaul networks are formed with microwave radios. To increase data rate, Adaptive Modulation and Coding (AMC) is used for wireless links. However, the data rate of each wireless link changes over time and leads to unexpected packet loss or traffic degradation. This paper proposes a routing scheme and methods for estimating the transmission parameters or modes of wireless links to route bandwidth guaranteed flows over mobile backhaul networks. Proposed routing scheme can reduce degradation of flows caused by unexpected changes of the data rate of wireless links. We evaluate our routing scheme when mode distribution of links follows normal, uniform and Poisson distributions. This paper shows mode estimation using mode history of link to estimate the link quality can route bandwidth guaranteed flows efficiently by choosing more stable links for the path.

  • A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks

    Sho FUJITA  Keiichi SHIMA  Yojiro UO  Hiroshi ESAKI  

     
    PAPER-Network Architecture and Testbed

      Vol:
    E92-D No:10
      Page(s):
    1897-1904

    We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.

  • A Pub/Sub Message Distribution Architecture for Disruption Tolerant Networks

    Sergio CARRILHO  Hiroshi ESAKI  

     
    PAPER-Network Architecture and Testbed

      Vol:
    E92-D No:10
      Page(s):
    1888-1896

    Access to information is taken for granted in urban areas covered by a robust communication infrastructure. Nevertheless most of the areas in the world, are not covered by such infrastructures. We propose a DTN publish and subscribe system called Hikari, which uses nodes' mobility in order to distribute messages without using a robust infrastructure. The area of Disruption/Delay Tolerant Networks (DTN) focuses on providing connectivity to locations separated by networks with disruptions and delays. The Hikari system does not use node identifiers for message forwarding thus eliminating the complexity of routing associated with many forwarding schemes in DTN. Hikari uses nodes paths' information, advertised by special nodes in the system or predicted by the system itself, for optimizing the message dissemination process. We have used the Paris subway system, due to it's complexity, to validate Hikari and to analyze it's performance. We have shown that Hikari achieves a superior deliver rate while keeping redundant messages in the system low, which is ideal when using devices with limited resources for message dissemination.

  • Optimal Routing by the Intermediate Model -- Joining the Pipe and Hose Models --

    Eiji OKI  Ayako IWAKI  

     
    LETTER-Switching for Communications

      Vol:
    E92-B No:10
      Page(s):
    3247-3251

    This letter presents the optimal routing by the intermediate model; a construction that lies between the pipe and hose models. We show that it is a practical way of realizing optimal routing. A formulation extended from the pipe model to the intermediate model can not be solved as a regular linear programming (LP) problem. Our solution, the introduction of a duality theorem, successfully turns our problem into an LP formulation that can be easily solved. Numerical results show that the intermediate model has better routing performance than the hose model.

  • Compiler Framework for Reconfigurable Computing Architecture

    Chongyong YIN  Shouyi YIN  Leibo LIU  Shaojun WEI  

     
    BRIEF PAPER

      Vol:
    E92-C No:10
      Page(s):
    1284-1290

    Compiler is the most important supporting tool to facilitate the use of reconfigurable computing architecture (RCA). In this paper, a template-based compiler framework is proposed. This compiler can synthesize the executables for RCA from native high-level programming language source code directly. It supports to generate run-time dynamic configuration context. And it is capable to generate both full configuration context and partial configuration context. Experimental results show that the executables generated by the proposed compiler can achieve better execution performance and smaller configuration context size than previous compilers. Moreover, this compiler does not require the programmer to have any extra knowledge about the hardware architecture of RCA.

  • An Active Multicasting Mechanism for Mobile Hosts in Wireless Networking Environments

    Ping WANG  Fuqiang LIU  

     
    PAPER-Wireless Network

      Vol:
    E92-D No:10
      Page(s):
    1826-1835

    To support mobile multicasting in wireless networks, we present a new active multicasting mechanism which makes use of the state characteristic of multicast agent. In this mechanism, a multicast agent just locates the position for roaming hosts when it does not forward multicast packets. Upon reception of multicast packets, the multicast agent adjusts the service range to achieve an appropriate balance between routing efficiency and the overhead of multicast tree reconstruction. Therefore, a lot of unnecessary tree reconstructions are eliminated during the time when none multicast packet is transferred and multicast delivery path is near optimal because of the limited service range of multicast agent in the active state. To justify the effectiveness of our proposed scheme, we develop an analytical model to evaluate the signaling overhead. Our performance analysis shows that the proposed scheme can significantly reduce the system overhead and multicast routing is near optimal. The other important contribution is the novel analytical approach in evaluating the performance of mobile multicast routing protocol.

  • Analysis and Design of a Reflection-Cancelling Transverse Slot-Pair Array with Grating-Lobe Suppressing Baffles

    Takehito SUZUKI  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Antennas and Propagation

      Vol:
    E92-B No:10
      Page(s):
    3236-3242

    This paper presents the analysis and design of a reflection-cancelling transverse slot-pair array antenna with baffles by using the Spectrum of Two-Dimensional Solutions (S2DS) method. For the transverse slot array, the slot spacings with more than one free-space wavelength cause the grating-lobes. The baffles suppress the grating-lobes effectively. A one-dimensional slot array is extracted from the 2D array with in-phase excitation by assuming periodicity in the transversal direction. The uniform excitation over the finite array is synthesized iteratively to demonstrate the fast and accurate results by S2DS. A unit design model with the baffles is introduced to determine the initial parameters of the slot-pairs, which greatly accelerate the iterations process. Experiments at 25.3 GHz demonstrate the suppression of the grating lobes to the level less than -20.0 dB and also the good uniformity of the aperture field distribution.

1541-1560hit(3578hit)