IEICE Communications Express
Online ISSN : 2187-0136
ISSN-L : 2187-0136
Volume 2, Issue 10
Displaying 1-13 of 13 articles from this issue
  • Kai Liu, Yupeng Zhang, Feng Liu, Zhen Xu
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 389-395
    Published: October 02, 2013
    Released on J-STAGE: October 02, 2013
    JOURNAL FREE ACCESS
    A novel slotted dual channel medium access control (SDC-MAC) protocol is proposed for multihop wireless networks to maximize concurrent packet transmissions. By leveraging a slot-optimized scheme, the channel reservation and data packet transmissions can be simultaneously carried out on the control channel (CCH) and data channel (DCH) reducing packet collisions. Multichannel hidden and exposed terminal problems are also alleviated to greatly improve the channel access efficiency. Numerical results show that compared to the IEEE 802.11 DCF protocol, the SDC-MAC protocol has obvious performance improvement under the same total bandwidth.
    Download PDF (336K)
  • Yu Nakayama, Noriyuki Oota
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 396-401
    Published: October 08, 2013
    Released on J-STAGE: October 08, 2013
    JOURNAL FREE ACCESS
    With shortest path bridging MAC (SPBM) in an access network, the paths of high rate flows can overlap on specific links and this results in congestion. It is important to avoid congestion by selecting the optimal path for each flow. This paper proposes a path selection algorithm for access networks with SPBM. The proposed algorithm avoids selecting a congested path. When a new flow arrives at an edge SW, the SW selects the path with the highest average input rate of assigned flows. We confirmed with computer simulations that the proposed algorithm could efficiently utilize links and improve throughput fairness.
    Download PDF (284K)
  • Takahiro Kubo, Ken-Ichi Suzuki, Naoto Yoshimoto, Takeshi Umeki, Masaki ...
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 402-408
    Published: October 08, 2013
    Released on J-STAGE: October 08, 2013
    JOURNAL FREE ACCESS
    This paper outlines an experimental investigation of an over-gigabit indoor visible light transmission system employing a quasi-phase-matching (QPM) device. To evaluate the effect of collecting lenses with different diameters, we measured the relationship between received optical power and bit error rate by using collecting lenses with diameters of 5, 8, 10, and 15mm. The experimental results confirmed that the relationship between the received optical power and the receiving area of the collecting lens was consistent with the analytical solution. We confirmed that a larger collecting lens is effective against the degradation caused by increased transmission distance, even if the optical output power of the wavelength converter is constant.
    Download PDF (787K)
  • Hao Niu, Li Sun, Masayuki Iwai, Kaoru Sezaki
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 409-414
    Published: October 08, 2013
    Released on J-STAGE: October 08, 2013
    JOURNAL FREE ACCESS
    From the secrecy perspective, conventional cooperation communication is not always positive since it improves the link qualities of both the legitimate receiver and the eavesdropper node. To overcome this drawback, we propose an adaptive cooperation scheme, which activates the relay only when it has better secrecy capability than the source. This adaptive scheme is combined with secure user scheduling strategy to harvest the multiuser diversity (MUD) gain in the relay networks serving multiple sources. The results show that our scheme achieves a much higher secrecy capacity than alternatives. Meanwhile, the relay becomes less beneficial for a large number of sources.
    Download PDF (379K)
  • Sorami Nakamura, Hiroshi Yamamoto, Hirotada Honda, Akira Takahashi
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 415-420
    Published: October 10, 2013
    Released on J-STAGE: October 10, 2013
    JOURNAL FREE ACCESS
    While using applications on mobile terminals, user quality of experience (QoE) often degrades. There are two methods for QoE improvement, carrier actions and user actions. We focus on the latter, which requires less time and money for improving QoE than the former. Efficient actions for improving QoE differ by user because each user may be in a different environment. We propose a methodology for specifying QoE degradation factors in order to suggest appropriate user actions. With our methodology, we collect the logs of many users and specify QoE degradation factors by referring to high QoE users.
    Download PDF (303K)
  • Songqing Wang, Weiwei Yang, Yun Zhu
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 421-427
    Published: October 16, 2013
    Released on J-STAGE: October 16, 2013
    JOURNAL FREE ACCESS
    In this letter, we analyze the impacts of outdated channel state information (CSI) on the secrecy performance for multiple-input single-output multiple-eavesdropper (MISOME) systems using transmit antenna selection (TAS) scheme and derive the exact closed-form expressions for the secrecy outage probability and the probability of non-zero secrecy capacity. Then, we present the asymptotic secrecy outage probability which reveals the secrecy diversity order and the secrecy array gain. The analysis and simulation results show that the security performance of TAS scheme is quite sensitive to outdated CSI and the achievable secrecy diversity order is only one under the effect of outdated CSI.
    Download PDF (235K)
  • Takeshi Kusakabe, Takuya Kurakake, Kimiyuki Oyamada, Yoshihiro Fujita
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 428-434
    Published: October 16, 2013
    Released on J-STAGE: October 16, 2013
    JOURNAL FREE ACCESS
    We propose a novel time-division multiplexing method with a dedicated frame structure for transmitting digital broadcasts to homes over FTTH. By using experimental equipment, it was revealed that the proposed method can be expected to serve more subscribers than does the conventional frequency-division multiplexing method, and it achieves a low transmission latency and short period of program selection time. In this paper, we introduce and investigate the advantages and challenges for the future of the proposed method from the aspect of the requirements for broadcasting.
    Download PDF (394K)
  • Akira Mizutori, Masafumi Koga
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 435-441
    Published: October 21, 2013
    Released on J-STAGE: October 21, 2013
    JOURNAL FREE ACCESS
    This paper introduces a technique to suppress FWM-induced crosstalk and demonstrates its performance as applied to phase locked 10Gbit/s OOK-signal 6-carrier transmission. The initial carrier phases are set to cancel out 56% of the generated crosstalk. Successful transmission over DSF is achieved with a power penalty of 1dB even though the crosstalk level was -15dB.
    Download PDF (788K)
  • Jun Kurihara, Yutaka Miyake
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 442-446
    Published: October 22, 2013
    Released on J-STAGE: October 22, 2013
    JOURNAL FREE ACCESS
    This paper proposes a coding scheme to securely store a secret file in a distributed storage system that uses an arbitrary regenerating code. Our scheme encodes the secret file to the input of a certain regenerating code by using the coset coding scheme with a maximum rank distance (MRD) code. We show that our scheme can protect the secret file from being leaked to an eavesdropper in the distributed storage system. Existing security schemes for distributed storage systems are based on specific regenerating codes, and they cannot be used with other regenerating codes. In contrast, our scheme can guarantee the security against the eavesdropper independently of the construction of the underlying regenerating code.
    Download PDF (141K)
  • Wei Hou, Tadashi Fujino, Toshiharu Kojima
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 447-452
    Published: October 23, 2013
    Released on J-STAGE: October 23, 2013
    JOURNAL FREE ACCESS
    This paper proposes a low complexity MIMO detection using ordering SIC (OSIC) with conditional list generation. Combined with lattice-reduction (LR) technique, OSIC further gains the BER performance compared to SIC, since the more reliable signal is prior to being detected. However OSIC based on LR (LR-OSIC) has inferior performance to the maximum likelihood (ML) detection in large size MIMO systems. In this paper, we investigate the mean square error in LR domain to evaluate the condition of the channel. The proposed detection applies the conditional list detection to update the estimate of the LR-OSIC. The simulation results exhibited that the proposed detection achieved near-ML performance in the 8×8 MIMO and required almost same complexity of the LR-OSIC in the high Eb/N0 region.
    Download PDF (278K)
  • Tran Dang Hoa, Dong-Seong Kim
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 453-458
    Published: October 29, 2013
    Released on J-STAGE: October 29, 2013
    JOURNAL FREE ACCESS
    This paper proposes a new forwarding algorithm over lossy wireless link that increases network performance in terms of received traffic at the sink (R0 packets/s) and network lifetime in wireless sensor networks (WSNs). Due to lossy wireless links, each sensor node forms around itself three different communication regions, each characterized by different packet reception rates (PRRs). The results of simulations indicate that, the proposed FOLLA (Data forwarding with lossy link awareness) algorithm outperforms the conventional algorithms with respect to R0 and network lifetime.
    Download PDF (206K)
  • Le Chen, Sheng Jiang, Shuowen Zhang, Pengcheng Zhu, Xiaohu You
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 459-465
    Published: October 29, 2013
    Released on J-STAGE: October 29, 2013
    JOURNAL FREE ACCESS
    This letter proposed a user selection with swap (USS) algorithm based on zero-forcing beamforming (ZFBF). USS starts with an initial user group with the largest channel 2-norms, iteratively swap the “worst” user (has the minimal achieved rate) among the scheduled users with the “best” user (has the maximum channel 2-norm) among the remaining users. Based on the simulation results, we can confirm that the proposed USS algorithm can provide a comparable performance with previous algorithms with greatly reduced complexity of O(KN2).
    Download PDF (317K)
  • Naobumi Michishita, Woo-Jin Kim, Yoshihide Yamada
    Article type: LETTER
    2013 Volume 2 Issue 10 Pages 466-469
    Published: October 29, 2013
    Released on J-STAGE: October 29, 2013
    JOURNAL FREE ACCESS
    To develop the effective feeding structure for the leaky wave antenna using the composite right/left-handed transmission line with monopolar radiation, a broadband center-feed structure composed of a triangular element is proposed in this paper. The dispersion characteristics and flat Bloch impedance are obtained by complex S-parameters of 2 ports on the structure. The CRLH leaky wave antenna is fabricated, and bandwidth of 60% is achieved while its radiation characteristics are similar to monopolar radiation.
    Download PDF (363K)
feedback
Top