The search functionality is under construction.
The search functionality is under construction.

IEICE TRANSACTIONS on Communications

  • Impact Factor

    0.73

  • Eigenfactor

    0.002

  • article influence

    0.1

  • Cite Score

    1.6

Advance publication (published online immediately after acceptance)

Volume E97-B No.1  (Publication Date:2014/01/01)

    Special Section on Management for Flexible ICT Systems and Services
  • FOREWORD Open Access

    Toshio TONOUCHI  

     
    FOREWORD

      Page(s):
    1-1
  • Network Management Challenges in Software-Defined Networks Open Access

    Slawomir KUKLINSKI  Prosper CHEMOUIL  

     
    INVITED PAPER

      Page(s):
    2-9

    Software-Defined Networking currently appears to be a major evolution towards network programmability. In this paper, we first analyze the network management capabilities of OpenFlow in order to identify the main challenges that are raised for SDN management. We address current deficiencies of SDN management and suggest solutions that incur research directions to be carried out for the management of enhanced SDN.

  • On Achieving High Survivability in Virtualized Data Centers Open Access

    Md Golam RABBANI  Mohamed Faten ZHANI  Raouf BOUTABA  

     
    INVITED PAPER

      Page(s):
    10-18

    As businesses are increasingly relying on the cloud to host their services, cloud providers are striving to offer guaranteed and highly-available resources. To achieve this goal, recent proposals have advocated to offer both computing and networking resources in the form of Virtual Data Centers (VDCs). Subsequently, several attempts have been made to improve the availability of VDCs through reliability-aware resource allocation schemes and redundancy provisioning techniques. However, the research to date has not considered the heterogeneity of the underlying physical components. Specifically, it does not consider recent findings showing that failure rates and availability of data center equipments can vary significantly depending on various parameters including their types and ages. To address this limitation, in this paper we propose a High-availability Virtual Infrastructure management framework (Hi-VI) that takes into account the heterogeneity of cloud data center equipments to dynamically provision backup resources in order to ensure required VDC availability. Specifically, we propose a technique to compute the availability of a VDC that considers both (1) the heterogeneity of data center networking and computing equipments in terms of failure rates and availability, and (2) the number of redundant virtual nodes and links provisioned as backups. We then leverage this technique to propose an allocation scheme that jointly provisions resources for VDCs and backups of virtual components with the goal of achieving the required VDC availability while minimizing energy costs. Through simulations, we demonstrate the effectiveness of our framework compared to heterogeneity-oblivious solutions.

  • Towards Trusted Result Verification in Mass Data Processing Service

    Yan DING  Huaimin WANG  Peichang SHI  Hongyi FU  Xinhai XU  

     
    PAPER

      Page(s):
    19-28

    Computation integrity is difficult to verify when mass data processing is outsourced. Current integrity protection mechanisms and policies verify results generated by participating nodes within a computing environment of service providers (SP), which cannot prevent the subjective cheating of SPs. This paper provides an analysis and modeling of computation integrity for mass data processing services. A third-party sampling-result verification method, named TS-TRV, is proposed to prevent lazy cheating by SPs. TS-TRV is a general solution of verification on the intermediate results of common MapReduce jobs, and it utilizes the powerful computing capability of SPs to support verification computing, thus lessening the computing and transmission burdens of the verifier. Theoretical analysis indicates that TS-TRV is effective on detecting the incorrect results with no false positivity and almost no false negativity, while ensuring the authenticity of sampling. Intensive experiments show that the cheating detection rate of TS-TRV achieves over 99% with only a few samples needed, the computation overhead is mainly on the SP, while the network transmission overhead of TS-TRV is only O(log N).

  • A Router-Aided Hierarchical P2P Traffic Localization Based on Variable Additional Delay Insertion

    Hiep HOANG-VAN  Yuki SHINOZAKI  Takumi MIYOSHI  Olivier FOURMAUX  

     
    PAPER

      Page(s):
    29-39

    Most peer-to-peer (P2P) systems build their own overlay networks for implementing peer selection strategies without taking into account the locality on the underlay network. As a result, a large quantity of traffic crossing internet service providers (ISPs) or autonomous systems (ASes) is generated on the Internet. Controlling the P2P traffic is therefore becoming a big challenge for the ISPs. To control the cost of the cross-ISP/AS traffic, ISPs often throttle and/or even block P2P applications in their networks. In this paper, we propose a router-aided approach for localizing the P2P traffic hierarchically; it features the insertion of additional delay into each P2P packet based on geographical location of its destination. Compared to the existing approaches that solve the problem on the application layer, our proposed method does not require dedicated servers, cooperation between ISPs and P2P users, or modification of existing P2P application software. Therefore, the proposal can be easily utilized by all types of P2P applications. Experiments on P2P streaming applications indicate that our hierarchical traffic localization method not only reduces significantly the inter-domain traffic but also maintains a good performance of P2P applications.

  • Regular Section
  • Cross-Talk with Fluctuation in Heterogeneous Multicore Fibers

    Takeshi SUGIMORI  Katsunori IMAMURA  Ryuichi SUGIZAKI  

     
    PAPER-Fundamental Theories for Communications

      Page(s):
    40-48

    Prediction of cross-talk is an important facet of multicore fiber (MCF) design. Several approaches for estimating cross-talk in MCF have been proposed but none are faultless, especially when applied to MCF with heterogeneous cores. We propose a new calculation approach that attempts to solve this problem. In our approach, cross-talk in multicore fibers is estimated by coupled power theory. The coefficients in the coupled power equation are theoretically calculated by the central limit theorem and by quantum mechanical time-dependent perturbations. The results from our calculations agree with those of Monte Carlo simulations of heterogeneous MCFs.

  • Handoff Delay-Based Call Admission Control in Cognitive Radio Networks

    Ling WANG  Qicong PENG  Qihang PENG  

     
    PAPER-Network

      Page(s):
    49-55

    In this paper, we investigate how to achieve call admission control (CAC) for guaranteeing call dropping probability QoS which is caused by handoff timeout in cognitive radio (CR) networks. When primary user (PU) appears, spectrum handoff should be initiated to maintain secondary user (SU)'s link. We propose a novel virtual queuing (VQ) scheme to schedule spectrum handoff requests sent by multiple SUs. Unlike the conventional first-come-first-served (FCFS) scheduling, resuming transmission in the original channel has higher priority than switching to another channel. It costs less because it avoids the cost of signaling frequent spectrum switches. We characterize the handoff delay on the effect of PU's behavior and the number of SUs in CR networks. And user capacity under certain QoS requirement is derived as a guideline for CAC. The analytical results show that call dropping performance can be greatly improved by CAC when a large amount of SUs arrives fast as well as the VQ scheme is verified to reduce handoff cost compared to existing methods.

  • Interference Coordination Mechanisms for Device-to-Device Multicast Uplink Underlaying Cellular Networks

    Dongyu WANG  Xiaoxiang WANG  Bo GU  

     
    PAPER-Network

      Page(s):
    56-65

    In this paper, a multicast concept for Device-to-Device (D2D) communication underlaying a cellular infrastructure is investigated. To increase the overall capacity and improve resource utilization, a novel interference coordination scheme is proposed. The proposed scheme includes three steps. First, in order to mitigate the interference from D2D multicast transmission to cellular networks (CNs), a dynamic power control scheme is proposed that can determine the upper bound of D2D transmitter power based on the location of Base Station (BS) and areas of adjacent cells from the coverage area of D2D multicast group. Next, an interference limited area control scheme that reduces the interference from CNs to each D2D multicast receiver is proposed. The proposed scheme does not allow cellular equipment (CUE) located in the interference limited area to reuse the same resources as the D2D multicast group. Then two resource block (RB) allocation rules are proposed to select the appropriate RBs from a candidate RB set for D2D multicast group. From the simulation results, it is confirmed that the proposed schemes improve the performance of the hybrid system compared to the conventional ways.

  • Performance Comparisons of Subjective Quality Assessment Methods for Video

    Toshiko TOMINAGA  Masataka MASUDA  Jun OKAMOTO  Akira TAKAHASHI  Takanori HAYASHI  

     
    PAPER-Network

      Page(s):
    66-75

    Many subjective assessment methods for video quality are provided by ITU-T and ITU-R recommendations, but the differences among these methods have not been sufficiently studied. We compare five subjective assessment methods using four quantitative performance indices for both HD and QVGA resolution video. We compare the Double-Stimulus Continuous Quality-Scale (DSCQS), Double-Stimulus Impairment Scale (DSIS), Absolute Category Rating method (ACR), and ACR with Hidden Reference (ACR-HR) as common subjective assessment methods for HD and QVGA resolution videos. Furthermore, we added ACR with an 11-grade scale (ACR11) for the HD test and Subjective Assessment of Multimedia Video Quality (SAMVIQ) for the QVGA test for quality scale variations. The performance indices are correlation coefficients, rank correlation coefficients, statistical reliability, and assessment time. For statistical reliability, we propose a performance index for comparing different quality scale tests. The results of the performance comparison showed that the correlation coefficients and rank correlation coefficients of the mean opinion scores between pairs of methods were high for both HD and QVGA tests. As for statistical reliability provided by the proposed index, DSIS of HD and ACR of QVGA outperformed the other methods. Moreover, ACR, ACR-HR, and ACR11 were the most efficient subjective quality assessment methods from the viewpoint of assessment time.

  • Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites

    Takeshi YAGI  Junichi MURAYAMA  Takeo HARIU  Sho TSUGAWA  Hiroyuki OHSAKI  Masayuki MURATA  

     
    PAPER-Internet

      Page(s):
    76-86

    We proposes a method for determining the frequency for monitoring the activities of a malware download site used for malware attacks on websites. In recent years, there has been an increase in attacks exploiting vulnerabilities in web applications for infecting websites with malware and maliciously using those websites as attack platforms. One scheme for countering such attacks is to blacklist malware download sites and filter out access to them from user websites. However, a malware download site is often constructed through the use of an ordinary website that has been maliciously manipulated by an attacker. Once the malware has been deleted from the malware download site, this scheme must be able to unblacklist that site to prevent normal user websites from being falsely detected as malware download sites. However, if a malware download site is frequently monitored for the presence of malware, the attacker may sense this monitoring and relocate that malware on a different site. This means that an attack will not be detected until the newly generated malware download site is discovered. In response to these problems, we clarify the change in attack-detection accuracy caused by attacker behavior. This is done by modeling attacker behavior, specifying a state-transition model with respect to the blacklisting of a malware download site, and analyzing these models with synthetically generated attack patterns and measured attack patterns in an operation network. From this analysis, we derive the optimal monitoring frequency that maximizes the true detection rate while minimizing the false detection rate.

  • Optimum Route Design in 1+1 Protection with Network Coding for Instantaneous Recovery

    Abu Hena Al MUKTADIR  Eiji OKI  

     
    PAPER-Internet

      Page(s):
    87-104

    1+1 protection provides instantaneous proactive recovery from any single link failure by duplicating and sending the same source data onto two disjoint paths. Other resource efficient recovery techniques to deal with single link failure require switching operations at least at both ends, which restrict instantaneous recovery. However, the 1+1 protection technique demands at least double network resources. Our goal is to minimize the resources required for 1+1 protection while maintaining the advantage of instantaneous recovery. It was reported that the network coding (NC) technique reduces resource utilization in 1+1 protection, and in order to determine an optimum NC aware set of routes that minimizes the required network resources for 1+1 protection, an Integer Quadratic Programming (IQP) formulation has already been addressed. Solving an IQP problem requires large amount of memory (cannot be determined exactly) and special algorithms by the mathematical programming solver. In this paper our contributions consist of two parts. First, we formulate the optimization problem, corresponding to the IQP model, as an Integer Linear Programming (ILP) formulation, which is solvable by any linear programming solver, and so its memory and time requirements are smaller. However, the presented ILP model works well in small-scale and medium-scale networks, but fails to support large-scale networks due to excessive memory requirements and calculation time. Second, to deal with these issues, a heuristic algorithm is proposed to determine the best possible NC aware set of routes in large-scale networks. Numerical results show that our strategies achieve almost double the resource saving effect than the conventional minimal-cost routing policy in the examined medium-scale and large scale networks.

  • Pattern Reconstruction for Deviated AUT in Spherical Measurement by Using Spherical Waves

    Yang MIAO  Jun-ichi TAKADA  

     
    PAPER-Antennas and Propagation

      Page(s):
    105-113

    To characterize an antenna, the acquisition of its three-dimensional radiation pattern is the fundamental requirement. Spherical antenna measurement is a practical approach to measuring antenna patterns in spherical geometry. However, due to the limitations of measurement range and measurement time, the measured samples may either be incomplete on scanning sphere, or be inadequate in terms of the sampling interval. Therefore there is a need to extrapolate and interpolate the measured samples. Spherical wave expansion, whose band-limited property is derived from the sampling theorem, provides a good tool for reconstructing antenna patterns. This research identifies the limitation of the conventional algorithm when reconstructing the pattern of an antenna which is not located at the coordinate origin of the measurement set-up. A novel algorithm is proposed to overcome the limitation by resampling between the unprimed and primed (where the antenna is centred) coordinate systems. The resampling of measured samples from the unprimed coordinate to the primed coordinate can be conducted by translational phase shift, and the resampling of reconstructed pattern from the primed coordinate back to the unprimed coordinate can be accomplished by rotation and translation of spherical waves. The proposed algorithm enables the analytical and continuous pattern reconstruction, even under the severe sampling condition for deviated AUT. Numerical investigations are conducted to validate the proposed algorithm.

  • Methods of Estimating Return-Path Capacitance in Electric-Field Intrabody Communication

    Tadashi MINOTANI  Mitsuru SHINAGAWA  

     
    PAPER-Antennas and Propagation

      Page(s):
    114-121

    This paper describes a very accurate method of estimating the return-path-capacitance and validates the estimation based on low-error measurements for electric-field intrabody communication. The return-path capacitance, Cg, of a mobile transceiver is estimated in two ways. One uses the attenuation factor in transmission and capacitance, Cb, between a human body and the earth ground. The other uses the attenuation factor in reception. To avoid the influence of the lead wire in the estimation of Cb, Cb is estimated from the attenuation factor measured with an amplifier with a low input capacitance. The attenuation factor in reception is derived by using the applied-voltage dependence of the reception rate. This way avoids the influence of any additional instruments on the return-path capacitance and allows that capacitance to be estimated under the same condition as actual intrabody communication. The estimates obtained by the two methods agree well with each other, which means that the estimation of Cb is valid. The results demonstrate the usefulness of the methods.

  • Double-Layer Plate-Laminated Waveguide Slot Array Antennas for a 39GHz Band Fixed Wireless Access System

    Miao ZHANG  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Antennas and Propagation

      Page(s):
    122-128

    A point-to-point fixed wireless access (FWA) system with a maximum throughput of 1Gbps has been developed in the 39GHz band. A double-layer plate-laminated waveguide slot array antenna is successfully realized with specific considerations of practical application. The antenna is designed so as to hold the VSWR under 1.5. The antenna input as well as feeding network is configured to reduce the antenna profile as well as the antenna weight. In addition, integrating the antenna into a wireless terminal is taken into account. A shielding wall, whose effectiveness is experimentally demonstrated, is set in the middle of the wireless terminal to achieve the spatial isolation of more than 65dB between two antennas on the H-plane. 30 test antennas are fabricated by diffusion bonding of thin metal plates, to investigate the tolerance and mass-productivity of this process. An aluminum antenna, which has the advantages of light weight and anti-aging, is also fabricated and evaluated with an eye to the future.

  • Design of Miniature Implantable Tag Antenna for Radio-Frequency Identification System at 2.45GHz and Received Power Analysis

    HoYu LIN  Masaharu TAKAHASHI  Kazuyuki SAITO  Koichi ITO  

     
    PAPER-Antennas and Propagation

      Page(s):
    129-136

    In recent years, there has been rapid developments in radio-frequency identification (RFID) systems, and their industrial applications include logistics management, automatic object identification, access and parking management, etc. Moreover, RFID systems have also been introduced for the management of medical instruments in medical applications to improve the quality of medical services. In recent years, the combination of such a system with a biological monitoring system through permanent implantation in the human body has been suggested to reduce malpractice events and ameliorate the patient suffering. This paper presents an implantable RFID tag antenna design that can match the conjugate impedance of most integrated circuit (IC) chips (9.3-j55.2Ω at 2.45GHz. The proposed antenna can be injected into the human body through a biological syringe, owing to its compact size of 9.3mm × 1.0mm × 1.0mm. The input impedance, transmission coefficient, and received power are simulated by a finite element method (FEM). A three-layered phantom is used to confirm antenna performance.

  • Blind CFO Estimation Based on Decision Directed MVDR Approach for Interleaved OFDMA Uplink Systems

    Chih-Chang SHEN  Ann-Chen CHANG  

     
    PAPER-Wireless Communication Technologies

      Page(s):
    137-145

    This paper deals with carrier frequency offset (CFO) estimation based on the minimum variance distortionless response (MVDR) criterion without using specific training sequences for interleaved orthogonal frequency division multiple access (OFDMA) uplink systems. In the presence of large CFOs, the estimator is proposed to find a new CFO vector based on the first-order Taylor series expansion of the one initially given. The problem of finding the new CFO vector is formulated as the closed form of a generalized eigenvalue problem, which allows one to readily solve it. Since raising the accuracy of residual CFO estimation can provide more accurate residual CFO compensation, this paper also present a decision-directed MVDR approach to improve the CFO estimation performance. However, the proposed estimator can estimate CFOs with less computation load. Several computer simulation results are provided for illustrating the effectiveness of the proposed blind estimate approach.

  • 2-Step Frequency-Domain Iterative Channel Estimation for Training Sequence Inserted Single-Carrier Block Transmission

    Tetsuya YAMAMOTO  Fumiyuki ADACHI  

     
    PAPER-Wireless Communication Technologies

      Page(s):
    146-154

    In this paper, we propose a spectrally efficient frequency-domain channel estimation scheme suitable for training sequence inserted single-carrier (TS-SC) block transmission using frequency-domain equalization (FDE). The proposed scheme performs the channel estimation in two steps and allows the use of shorter TS (but, longer than the channel length) than the conventional channel estimation schemes. In the first step, the received TS having cyclic property is constructed for performing frequency-domain channel estimation and the improved channel estimate is obtained by using simple averaging of noisy channel estimates. In the second step, the maximum likelihood channel estimation is carried out iteratively by using both the TS and the estimated symbol sequence obtained in the first step. It is shown by computer simulation that the proposed 2-step frequency-domain iterative channel estimation scheme achieves a bit error rate (BER) performance close to perfect channel estimation even in a relatively fast fading environment.

  • A Novel Adaptive Interference Admission Control Method for Layered Partially Non-orthogonal Block Diagonalization for Base Station Cooperative MIMO

    Yusuke OSHIMA  Anass BENJEBBOUR  Kenichi HIGUCHI  

     
    PAPER-Wireless Communication Technologies

      Page(s):
    155-163

    This paper proposes a novel method for adaptively controlling the admission of interference to users in our previously proposed layered partially non-orthogonal block diagonalization (BD) precoding method for downlink multiuser multiple-input multiple-output (MIMO) transmission that employs cooperation among multiple base stations (BSs). The proposed method is applicable when some of the instantaneous channel state information (CSI) feedback between the user equipment and the respective BSs is missing if the path loss between the user equipment and BS is higher than a predetermined threshold. The proposed method suppresses the loss in the transmitter diversity (beam forming) gain caused by the perfect nulling of inter-user interference in BD. By allowing the inter-user interference from a link that has a high average path loss, the overall throughput performance of simple BD is enhanced. We show that the combination of layered transmission that restricts the set of BSs used for the signal transmission and adaptive control of interference admission significantly increases the throughput of BS cooperative multiuser MIMO with partial CSI feedback.

  • Channel Correlation Estimation Exploiting Pilots for an OFDM System with a Comb-Type Pilot Pattern

    Eunchul YOON  Suhan CHOI  Unil YUN  

     
    PAPER-Wireless Communication Technologies

      Page(s):
    164-170

    Two channel correlation estimation (CCE) schemes exploiting pilots are presented for an OFDM system with a comb-type pilot pattern under the assumption that there exist virtual subcarriers in the OFDM block. Whereas the first scheme is designed based on the conventional regularized-least square (LS) approach, the second scheme is designed by a newly devised technique based on LS. As the second scheme removes the necessity of computing the matrix inverse by making the minimum eigenvalue of the inversed matrix positive, it leads to reduced implementation complexity and improved performance. It is shown by simulation that the proposed CCE schemes substantially enhance the mean equare error and symbol error rate performances of the MMSE based channel estimation by providing more accurate channel correlation information.

  • Study of Coordinated Set of Coordinated Multi-Point Transmission with Limited Feedback

    Jianxin DAI  Ming CHEN  Mei ZHAO  Ziyan JIA  Zhengquan LI  

     
    PAPER-Wireless Communication Technologies

      Page(s):
    171-181

    In the Coordinated Multi-Point (CoMP) system under the condition of limited feedback, a reasonable coordinated set relies heavily on the splitting factor that is used to divide the total feedback bits into channel direction information (CDI) feedback bits and channel quality information (CQI) feedback bits. The relation of splitting factor and coordinated set is examined in this paper. After defining a penalty factor, we derive the net ergodic capacity optimization problem, whose variables to be optimized are the number of coordinated BSs, the divided area's radius and the splitting factor. According to an existing codebook and the quantized channel error model, the downlink received signal model is updated after adding the splitting factor. Through random matrix knowledge, the stochastic property of this model is obtained. A close approximate expression including the splitting factor to be optimized related to coordinated set is given. In addition, a revised adaptive feedback scheme is proposed to split the feedback bits. Simulation results show that the proposed scheme provides a significant performance gain, especially as the user velocity is high.

  • Analysis of the Network Gains of SISO and MISO Single Frequency Network Broadcast Systems

    Sungho JEON  Jong-Seob BAEK  Junghyun KIM  Jong-Soo SEO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Page(s):
    182-189

    The second generation digital terrestrial broadcasting system (DVB-T2) is the first broadcasting system employing MISO (Multiple-Input Single-Output) algorithms. The potential MISO gain of this system has been roughly predicted through simulations and field tests. Of course, the potential MISO SFN gain (MISO-SFNG) differs according to the simulation conditions, test methods, and measurement environments. In this paper, network gains of SISO-SFN and MISO-SFN are theoretically derived. Such network gains are also analyzed with respect to the receive power imbalance and coverage distances of SISO and MISO SFN. From the analysis, it is proven that MISO-SFNG is always larger than SISO SFN gain (SISO-SFNG) in terms of the achievable SNR. Further, both MISO-SFNG and SISO-SFNG depend on the power imbalance, but the network gains are constant regardless of the modulation order. Once the field strength of the complete SFN is obtained by coverage planning tools or field measurements, the SFN service coverage can be precisely calibrated by applying the closed-form SFNG formula.

  • Adaptive Channel Power Partitioning Scheme in WCDMA Femto Cell

    Tae-Won BAN  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Page(s):
    190-195

    Recently, small cell systems such as femto cell are being considered as a good alternative that can support the increasing demand for mobile data traffic because they can significantly enhance network capacity by increasing spatial reuse. In this paper, we analyze the coverage and capacity of a femto cell when it is deployed in a hotspot to reduce the traffic loads of neighboring macro base stations (BSs). Our analysis results show that the coverage and capacity of femto cell are seriously affected by surrounding signal environment and they can be greatly enhanced by adapting power allocation for channels to the surrounding environment. Thus, we propose an adaptive power partitioning scheme where power allocation for channels can be dynamically adjusted to suit the environment surrounding the femto cell. In addition, we numerically derive the optimal power allocation ratio for channels to optimize the performance of the femto cell in the proposed scheme. It is shown that the proposed scheme with the optimal channel power allocation significantly outperforms the conventional scheme with fixed power allocation for channels.

  • Optimal Sensing Time and Power Allocation in Dynamic Primary-User Traffic Model Based Cognitive Radio Networks

    Errong PEI  Bin SHEN  Fang CHENG  Xiaorong JING  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Page(s):
    196-203

    In cognitive radio networks, the dynamic traffic of the primary user can lead to not only the spectrum sensing performance degradation, but also co-channel interference between primary user and secondary user, and, furthermore, the secondary system throughput can be decreased. Taking into account the impact of the dynamic primary-user traffic on spectrum sensing performance and the secondary throughput, we study the optimization problem of maximizing the secondary throughput under the constraints of probability of detection, average interference and transmit power budget, and derive its optimal solution. The optimal power allocation scheme and the algorithm that can find the optimal sensing time are also proposed. The proposed algorithm is of great practical significance in the scenario where primary-user traffic varies very quickly, for example, in public safety spectrum band.

  • Location Adaptive Least Square Algorithm for Target Localization in Multi-Static Active Sonar

    Eun Jeong JANG  Dong Seog HAN  

     
    PAPER-Sensing

      Page(s):
    204-209

    In multi-static sonar systems, the least square (LS) and maximum likelihood (ML) are the typical estimation criteria for target location estimation. The LS localizaiton has the advantage of low computational complexity. On the other hand, the performance of LS can be degraded severely when the target lies on or around the straight line between the source and receiver. We examine mathematically the reason for the performance degradation of LS. Then, we propose a location adaptive — least square (LA-LS) localization that removes the weakness of the LS localizaiton. LA-LS decides the receivers that produce abnormally large measurement errors with a proposed probabilistic measure. LA-LS achieves improved performance of the LS localization by ignoring the information from the selected receivers.

  • A Novel UWB SRR for Target Velocity Measurement in Gaussian Noise Environment for Automobile Applications

    Purushothaman SURENDRAN  Jong-Hun LEE  Seok-Jun KO  

     
    PAPER-Sensing

      Page(s):
    210-217

    In this paper, we propose a time and memory efficient Ultra Wide Band Short Range Radar (UWB SRR) system for measuring relative target velocities of up to 150km/hr. First, for the proposed detector, we select the required design parameters for good performance. The parameters are the number of coherent integrations, non-coherent integrations, and FFT points. The conventional detector uses a Fast Fourier Transform (FFT) to extract the range and velocity of the target simultaneously. Therefore, it requires high computation effort, high FFT processing time, and a huge amount of memory. However, the proposed pulse radar detector first decides the target range and then computes the target velocity using FFT sequentially for the decided range index. According to our theoretical and simulation analyses, the FFT processing time and the memory requirement are reduced compared to those of the conventional method. Finally, we show that the detection performance of the proposed detector is superior to that of the conventional detector in a background of Additive White Gaussian Noise (AWGN).

  • Fast DFRFT Robust Watermarking Algorithm Based on the Arnold Scrambling and OFDM Coding

    Wenkao YANG  Jing GUO  Enquan LI  

     
    PAPER-Multimedia Systems for Communications

      Page(s):
    218-225

    Combining the strong anti-interference advantages of OFDM technology and the time-frequency analysis features of fractional Fourier transform (FFT), we apply OFDM as the coding modulation technology for digital watermarking. Based on the Arnold scrambling and OFDM coding, an innovative DFRFT digital watermarking algorithm is proposed. First, the watermark information is subjected to the Arnold scrambling encryption and OFDM coding transform. Then it is embedded into the FFT domain amplitude. The three parameters of scrambling iterations number, t, FFT order, p, and the watermark information embedded position, L, are used as keys, so that the algorithm has high safety. A simulation shows that the algorithm is highly robust against noise, filtering, compression, and other general attacks. The algorithm not only has strong security, but also makes a good balance between invisibility and robustness. But the possibility of using OFDM technique in robust image watermarking has drawn a very little attention.

  • Packetization and Unequal Erasure Protection for Transmission of SPIHT-Encoded Images

    Kuen-Tsair LAY  Lee-Jyi WANG  

     
    PAPER-Multimedia Systems for Communications

      Page(s):
    226-237

    Coupled with the discrete wavelet transform, SPIHT (set partitioning in hierarchical trees) is a highly efficient image compression technique that allows for progressive transmission. One problem, however, is that its decoding can be extremely sensitive to bit errors in the code sequence. In this paper, we address the issue of transmitting SPIHT-encoded images via noisy channels, wherein errors are inevitable. The communication scenario assumed in this paper is that the transmitter cannot get any acknowledgement from the receiver. In our scheme, the original SPIHT code sequence is first segmented into packets. Each packet is classified as either a CP (critical packet) or an RP (refinement packet). For error control, cyclic redundancy check (CRC) is incorporated into each packet. By checking the CRC check sum, the receiver is able to tell whether a packet is correctly received or not. In this way, the noisy channel can be effectively modeled as an erasure channel. For unequal error protection (UEP), each of those packets are repeatedly transmitted for a few times, as determined by a process called diversity allocation (DA). Two DA algorithms are proposed. The first algorithm produces a nearly optimal decoded image (as measured in the expected signal-to-noise ratio). However, its computation cost is extremely high. The second algorithm works in a progressive fashion and is naturally compatible with progressive transmission. Its computation complexity is extremely low. Nonetheless, its decoded image is nearly as good. Experimental results show that the proposed scheme significantly improves the decoded images. They also show that making distinction between CP and RP results in wiser diversity allocation to packets and thus produces higher quality in the decoded images.