Fucai YU Soochang PARK Euisin LEE Younghwan CHOI Sang-Ha KIM
Geographic routing for wireless sensor networks requires a source that can encapsulate the location of a sink in each data packet. How a source can obtain the location of a sink with low overhead is a difficult issue. This letter proposes a Quorum Based Sink Location Service (QSLS) which can be exploited by most geographic routing protocols in arbitrary irregular wireless sensor networks.
Hyo J. LEE In Hwan DOH Eunsam KIM Sam H. NOH
Conventional kernel prefetching schemes have focused on taking advantage of sequential access patterns that are easy to detect. However, it is observed that, on random and even sequential references, they may cause performance degradation due to inaccurate pattern prediction and overshooting. To address these problems, we propose a novel approach to work with existing kernel prefetching schemes, called Reference Pattern based kernel Prefetching (RPP). The RPP can reduce negative effects of existing schemes by identifying one more reference pattern, i.e., looping, in addition to random and sequential patterns and delaying starting prefetching until patterns are confirmed to be sequential or looping.
Go HASEGAWA Yuichiro HIRAOKA Masayuki MURATA
Recent research on overlay networks has revealed that user-perceived network performance could be improved by an overlay routing mechanism. The effectiveness of overlay routing is mainly a result of the policy mismatch between the overlay routing and the underlay IP routing operated by ISPs. However, this policy mismatch causes a "free-riding" traffic problem, which may become harmful to the cost structure of Internet Service Providers. In the present paper, we define the free-riding problem in the overlay routing and evaluate the degree of free-riding traffic to reveal the effect of the problem on ISPs. We introduce a numerical metric to evaluate the degree of the free-riding problem and confirm that most multihop overlay paths that have better performance than the direct path brings the free-riding problem. We also discuss the guidelines for selecting paths that are more effective than the direct path and that mitigate the free-riding problem.
Toshihiro YOKOYAMA Miyuki HANAOKA Makoto SHIMAMURA Kenji KONO Takahiro SHINAGAWA
Secure operating systems (secure OSes) are widely used to limit the damage caused by unauthorized access to Internet servers. However, writing a security policy based on the principle of least privilege for a secure OS is a challenge for an administrator. Considering that remote attackers can never attack a server before they establish connections to it, we propose a novel scheme that exploits phases to simplify security policy descriptions for Internet servers. In our scheme, the entire system has two execution phases: an initialization phase and a protocol processing phase. The initialization phase is defined as the phase before the server establishes connections to its clients, and the protocol processing phase is defined as the phase after it establishes connections. The key observation is that access control should be enforced by the secure OS only in the protocol processing phase to defend against remote attacks. Since remote attacks cannot be launched in the initialization phase, a secure OS is not required to enforce access control in this phase. Thus, we can omit the access-control policy in the initialization phase, which effectively reduces the number of policy rules. To prove the effectiveness of our scheme, we wrote security policies for three kinds of Internet servers (HTTP, SMTP, and POP servers). Our experimental results demonstrate that our scheme effectively reduces the number of descriptions; it eliminates 47.2%, 27.5%, and 24.0% of policy rules for HTTP, SMTP, and POP servers, respectively, compared with an existing SELinux policy that includes the initialization of the server.
Kampol WORADIT Matthieu GUYOT Pisit VANICHCHANUNT Poompat SAENGUDOMLERT Lunchakorn WUTTISITTIKULKIJ
While the problem of multicast routing and wavelength assignment (MC-RWA) in optical wavelength division multiplexing (WDM) networks has been investigated, relatively few researchers have considered network survivability for multicasting. This paper provides an optimization framework to solve the MC-RWA problem in a multi-fiber WDM network that can recover from a single-link failure with shared protection. Using the light-tree (LT) concept to support multicast sessions, we consider two protection strategies that try to reduce service disruptions after a link failure. The first strategy, called light-tree reconfiguration (LTR) protection, computes a new multicast LT for each session affected by the failure. The second strategy, called optical branch reconfiguration (OBR) protection, tries to restore a logical connection between two adjacent multicast members disconnected by the failure. To solve the MC-RWA problem optimally, we propose an integer linear programming (ILP) formulation that minimizes the total number of fibers required for both working and backup traffic. The ILP formulation takes into account joint routing of working and backup traffic, the wavelength continuity constraint, and the limited splitting degree of multicast-capable optical cross-connects (MC-OXCs). After showing some numerical results for optimal solutions, we propose heuristic algorithms that reduce the computational complexity and make the problem solvable for large networks. Numerical results suggest that the proposed heuristic yields efficient solutions compared to optimal solutions obtained from exact optimization.
This paper proposes a closed-form formula for the jitter-induced noise spectrum at the output of continuous-time ΔΣ modulators with NRZ feedback waveform. In this approach, the clock jitter effects are modeled as an additive noise in the feedback loop of the modulator. Making use of a conceptual model and following from the linear system theory, the output spectrum is explained versus the spectrum of the additive jitter noise.
Takeshi FUJIMURA Shohei UENO Ayaka KIYOTAKE Hiroyoshi MIWA
Recently multi-car elevator (MCE) consisting of several elevator cars in a single elevator shaft received great interest as transportation systems for high-rise buildings. Algorithms for efficiently controlling elevator cars are necessary to put MCEs to practical use. We propose an algorithm for controlling MCEs to reduce passenger-waiting time. A feature of our algorithm is the introduction of a simple function estimating efficiency of passenger transport and a procedure checking assignability of a car. We evaluate the performance of our algorithm using a simulation and show that it performs better compared with a previous algorithm.
Akara SOPHARAK Bunyarit UYYANONVARA Sarah BARMAN Thomas WILLIAMSON
To prevent blindness from diabetic retinopathy, periodic screening and early diagnosis are neccessary. Due to lack of expert ophthalmologists in rural area, automated early exudate (one of visible sign of diabetic retinopathy) detection could help to reduce the number of blindness in diabetic patients. Traditional automatic exudate detection methods are based on specific parameter configuration, while the machine learning approaches which seems more flexible may be computationally high cost. A comparative analysis of traditional and machine learning of exudates detection, namely, mathematical morphology, fuzzy c-means clustering, naive Bayesian classifier, Support Vector Machine and Nearest Neighbor classifier are presented. Detected exudates are validated with expert ophthalmologists' hand-drawn ground-truths. The sensitivity, specificity, precision, accuracy and time complexity of each method are also compared.
Ho-Jin LEE Jae Moung KIM Byung-Seub LEE Han LEE Jang-Soo RYOO
The R&D in satellite communications in Korea has been driven mainly by KCC (Korea Communications Commission) but in a small scale compared to Korea space development program organized by MEST (Ministry of Education, Science and Technology). Public and civilian satcom sector R&D has been led mainly by ETRI with small/medium companies contrary to rare investment in private sector while military sector R&D has been orchestrated by ADD with defense industry. By the COMS (Communication, Ocean and Meteorological Satellite) experimental Ka-band payload, Korea pursues a space qualification of own technology for national infrastructure evolution as well as industrialization of space R&D results. Once COMS launched and space qualified in 2009, subsequent application experiments and new technology R&D like UHDTV will entail service and industry promotion. The payload technology is expected for the next Korean commercial satellites or for new OBP satellites. The COMS ground control system and GNSS ground station technologies are under development for COMS operation and enhanced GNSS services along with advent of Galileo respectively. Satellite broadband mobile VSAT based on DVB-S2/RCS (+M) and low profile tracking antennas have been developed for trains, ships, and planes. While APSI is developing GMR-1 based Thuraya handset functions, ETRI is designing IMT-Advanced satellite radio interface for satellite and terrestrial dual-mode handheld communication system like Japanese STICS, with universities' satellite OFDM researches. A 21 GHz Ka-band higher-availability scalable HD broadcasting technology and SkyLife's hybrid satellite IPTV technology are being developed. In near term Korea will extend R&D programs to upgrade the space communication infrastructure for universal access to digital opportunity and safer daily life from disaster, and to promote space green IT industrialization, national security, and space resources sovereign. Japanese stakeholders are invited to establish a collaborative R&D with Korea for mutual benefit of the future.
Jingyong LIU Xiaorong JING Lemin LI Tianqi ZHANG
It is an almost classical problem to develop an efficient broadcast mechanism in multi-hop networks. However, the problem is far from solved though a lot of research till recently has been focused on it. In this letter, we analyze the optimal distribution of forwarding nodes that can doubly cover the network with the minimum transmission overlapped area in a multi-hop wireless network where nodes are ideally distributed. On this basis we propose a simple and effective broadcast method to significantly increase the transmission efficiency and deliverability. In this method, the total number of retransmissions is quite low since each node only needs to select three forwarding nodes, and high deliverability can be achieved for the set of forwarding nodes provide nearly double coverage to the whole network. In addition, the method has excellent scalability in large scale networks and highly dynamic environment.
A precision in thickness recycling modus for a displays' color filter surface using a gear-form cathode in microelectrochemical removal is developed in the study. Through the precise removal processes of optical materials of nanostructure of Indium-Tin-Oxide crystallization, the optoelectronic semiconductor industry can effectively recycle defective products, and reducing production costs.
Ngoc Hung PHAM Toshiaki AOKI Takuya KATAYAMA
This paper proposes a framework for modular verification of evolving component-based software. This framework includes two stages: modular conformance testing for updating inaccurate models of the evolved components and modular verification for evolving component-based software. When a component is evolved after adapting some refinements, the proposed framework focuses on this component and its model in order to update the model and recheck the whole evolved system. The framework also reuses the previous verification results and the previous models of the evolved components to reduce the number of steps required in the model update and modular verification processes. An implementation and some experimental results are presented.
Ronggang BAI Yusheng JI Zhiting LIN Qinghua WANG Xiaofang ZHOU Yugui QU Baohua ZHAO
Being different from other networks, the load and direction of data traffic for wireless sensor networks are rather predictable. The relationships between nodes are cooperative rather than competitive. These features allow the design approach of a protocol stack to be able to use the cross-layer interactive way instead of a hierarchical structure. The proposed cross-layer protocol CLWSN optimizes the channel allocation in the MAC layer using the information from the routing tables, reduces the conflicting set, and improves the throughput. Simulations revealed that it outperforms SMAC and MINA in terms of delay and energy consumption.
Backbone network of the mobile networks, i.e. mobile backhaul networks, is an important part of mobile network system. With the decreasing size of mobile network system cells, it is considered next-generation mobile backhaul networks will form mesh topology. Most mobile backhaul networks are formed with microwave radios. To increase data rate, Adaptive Modulation and Coding (AMC) is used for wireless links. However, the data rate of each wireless link changes over time and leads to unexpected packet loss or traffic degradation. This paper proposes a routing scheme and methods for estimating the transmission parameters or modes of wireless links to route bandwidth guaranteed flows over mobile backhaul networks. Proposed routing scheme can reduce degradation of flows caused by unexpected changes of the data rate of wireless links. We evaluate our routing scheme when mode distribution of links follows normal, uniform and Poisson distributions. This paper shows mode estimation using mode history of link to estimate the link quality can route bandwidth guaranteed flows efficiently by choosing more stable links for the path.
Sho FUJITA Keiichi SHIMA Yojiro UO Hiroshi ESAKI
We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of operations. Then, we design and implement a decentralized VPN service on the proposed architecture. Through the development and operation of a prototype system we implemented, we found that the proposed architecture makes the VPN service applicable to each instance of Generalized MANETs, and that the VPN service makes it possible for unmodified applications to operate on the networks.
Access to information is taken for granted in urban areas covered by a robust communication infrastructure. Nevertheless most of the areas in the world, are not covered by such infrastructures. We propose a DTN publish and subscribe system called Hikari, which uses nodes' mobility in order to distribute messages without using a robust infrastructure. The area of Disruption/Delay Tolerant Networks (DTN) focuses on providing connectivity to locations separated by networks with disruptions and delays. The Hikari system does not use node identifiers for message forwarding thus eliminating the complexity of routing associated with many forwarding schemes in DTN. Hikari uses nodes paths' information, advertised by special nodes in the system or predicted by the system itself, for optimizing the message dissemination process. We have used the Paris subway system, due to it's complexity, to validate Hikari and to analyze it's performance. We have shown that Hikari achieves a superior deliver rate while keeping redundant messages in the system low, which is ideal when using devices with limited resources for message dissemination.
This letter presents the optimal routing by the intermediate model; a construction that lies between the pipe and hose models. We show that it is a practical way of realizing optimal routing. A formulation extended from the pipe model to the intermediate model can not be solved as a regular linear programming (LP) problem. Our solution, the introduction of a duality theorem, successfully turns our problem into an LP formulation that can be easily solved. Numerical results show that the intermediate model has better routing performance than the hose model.
Chongyong YIN Shouyi YIN Leibo LIU Shaojun WEI
Compiler is the most important supporting tool to facilitate the use of reconfigurable computing architecture (RCA). In this paper, a template-based compiler framework is proposed. This compiler can synthesize the executables for RCA from native high-level programming language source code directly. It supports to generate run-time dynamic configuration context. And it is capable to generate both full configuration context and partial configuration context. Experimental results show that the executables generated by the proposed compiler can achieve better execution performance and smaller configuration context size than previous compilers. Moreover, this compiler does not require the programmer to have any extra knowledge about the hardware architecture of RCA.
To support mobile multicasting in wireless networks, we present a new active multicasting mechanism which makes use of the state characteristic of multicast agent. In this mechanism, a multicast agent just locates the position for roaming hosts when it does not forward multicast packets. Upon reception of multicast packets, the multicast agent adjusts the service range to achieve an appropriate balance between routing efficiency and the overhead of multicast tree reconstruction. Therefore, a lot of unnecessary tree reconstructions are eliminated during the time when none multicast packet is transferred and multicast delivery path is near optimal because of the limited service range of multicast agent in the active state. To justify the effectiveness of our proposed scheme, we develop an analytical model to evaluate the signaling overhead. Our performance analysis shows that the proposed scheme can significantly reduce the system overhead and multicast routing is near optimal. The other important contribution is the novel analytical approach in evaluating the performance of mobile multicast routing protocol.
Takehito SUZUKI Jiro HIROKAWA Makoto ANDO
This paper presents the analysis and design of a reflection-cancelling transverse slot-pair array antenna with baffles by using the Spectrum of Two-Dimensional Solutions (S2DS) method. For the transverse slot array, the slot spacings with more than one free-space wavelength cause the grating-lobes. The baffles suppress the grating-lobes effectively. A one-dimensional slot array is extracted from the 2D array with in-phase excitation by assuming periodicity in the transversal direction. The uniform excitation over the finite array is synthesized iteratively to demonstrate the fast and accurate results by S2DS. A unit design model with the baffles is introduced to determine the initial parameters of the slot-pairs, which greatly accelerate the iterations process. Experiments at 25.3 GHz demonstrate the suppression of the grating lobes to the level less than -20.0 dB and also the good uniformity of the aperture field distribution.