-
Kai Liu, Yupeng Zhang, Feng Liu, Zhen Xu
Article type: LETTER
2013 Volume 2 Issue 10 Pages
389-395
Published: October 02, 2013
Released on J-STAGE: October 02, 2013
JOURNAL
FREE ACCESS
A novel slotted dual channel medium access control (SDC-MAC) protocol is proposed for multihop wireless networks to maximize concurrent packet transmissions. By leveraging a slot-optimized scheme, the channel reservation and data packet transmissions can be simultaneously carried out on the control channel (CCH) and data channel (DCH) reducing packet collisions. Multichannel hidden and exposed terminal problems are also alleviated to greatly improve the channel access efficiency. Numerical results show that compared to the IEEE 802.11 DCF protocol, the SDC-MAC protocol has obvious performance improvement under the same total bandwidth.
View full abstract
-
Yu Nakayama, Noriyuki Oota
Article type: LETTER
2013 Volume 2 Issue 10 Pages
396-401
Published: October 08, 2013
Released on J-STAGE: October 08, 2013
JOURNAL
FREE ACCESS
With shortest path bridging MAC (SPBM) in an access network, the paths of high rate flows can overlap on specific links and this results in congestion. It is important to avoid congestion by selecting the optimal path for each flow. This paper proposes a path selection algorithm for access networks with SPBM. The proposed algorithm avoids selecting a congested path. When a new flow arrives at an edge SW, the SW selects the path with the highest average input rate of assigned flows. We confirmed with computer simulations that the proposed algorithm could efficiently utilize links and improve throughput fairness.
View full abstract
-
Takahiro Kubo, Ken-Ichi Suzuki, Naoto Yoshimoto, Takeshi Umeki, Masaki ...
Article type: LETTER
2013 Volume 2 Issue 10 Pages
402-408
Published: October 08, 2013
Released on J-STAGE: October 08, 2013
JOURNAL
FREE ACCESS
This paper outlines an experimental investigation of an over-gigabit indoor visible light transmission system employing a quasi-phase-matching (QPM) device. To evaluate the effect of collecting lenses with different diameters, we measured the relationship between received optical power and bit error rate by using collecting lenses with diameters of 5, 8, 10, and 15mm. The experimental results confirmed that the relationship between the received optical power and the receiving area of the collecting lens was consistent with the analytical solution. We confirmed that a larger collecting lens is effective against the degradation caused by increased transmission distance, even if the optical output power of the wavelength converter is constant.
View full abstract
-
Hao Niu, Li Sun, Masayuki Iwai, Kaoru Sezaki
Article type: LETTER
2013 Volume 2 Issue 10 Pages
409-414
Published: October 08, 2013
Released on J-STAGE: October 08, 2013
JOURNAL
FREE ACCESS
From the secrecy perspective, conventional cooperation communication is not always positive since it improves the link qualities of both the legitimate receiver and the eavesdropper node. To overcome this drawback, we propose an adaptive cooperation scheme, which activates the relay only when it has better secrecy capability than the source. This adaptive scheme is combined with secure user scheduling strategy to harvest the multiuser diversity (MUD) gain in the relay networks serving multiple sources. The results show that our scheme achieves a much higher secrecy capacity than alternatives. Meanwhile, the relay becomes less beneficial for a large number of sources.
View full abstract
-
Sorami Nakamura, Hiroshi Yamamoto, Hirotada Honda, Akira Takahashi
Article type: LETTER
2013 Volume 2 Issue 10 Pages
415-420
Published: October 10, 2013
Released on J-STAGE: October 10, 2013
JOURNAL
FREE ACCESS
While using applications on mobile terminals, user quality of experience (QoE) often degrades. There are two methods for QoE improvement, carrier actions and user actions. We focus on the latter, which requires less time and money for improving QoE than the former. Efficient actions for improving QoE differ by user because each user may be in a different environment. We propose a methodology for specifying QoE degradation factors in order to suggest appropriate user actions. With our methodology, we collect the logs of many users and specify QoE degradation factors by referring to high QoE users.
View full abstract
-
Songqing Wang, Weiwei Yang, Yun Zhu
Article type: LETTER
2013 Volume 2 Issue 10 Pages
421-427
Published: October 16, 2013
Released on J-STAGE: October 16, 2013
JOURNAL
FREE ACCESS
In this letter, we analyze the impacts of outdated channel state information (CSI) on the secrecy performance for multiple-input single-output multiple-eavesdropper (MISOME) systems using transmit antenna selection (TAS) scheme and derive the exact closed-form expressions for the secrecy outage probability and the probability of non-zero secrecy capacity. Then, we present the asymptotic secrecy outage probability which reveals the secrecy diversity order and the secrecy array gain. The analysis and simulation results show that the security performance of TAS scheme is quite sensitive to outdated CSI and the achievable secrecy diversity order is only one under the effect of outdated CSI.
View full abstract
-
Takeshi Kusakabe, Takuya Kurakake, Kimiyuki Oyamada, Yoshihiro Fujita
Article type: LETTER
2013 Volume 2 Issue 10 Pages
428-434
Published: October 16, 2013
Released on J-STAGE: October 16, 2013
JOURNAL
FREE ACCESS
We propose a novel time-division multiplexing method with a dedicated frame structure for transmitting digital broadcasts to homes over FTTH. By using experimental equipment, it was revealed that the proposed method can be expected to serve more subscribers than does the conventional frequency-division multiplexing method, and it achieves a low transmission latency and short period of program selection time. In this paper, we introduce and investigate the advantages and challenges for the future of the proposed method from the aspect of the requirements for broadcasting.
View full abstract
-
Akira Mizutori, Masafumi Koga
Article type: LETTER
2013 Volume 2 Issue 10 Pages
435-441
Published: October 21, 2013
Released on J-STAGE: October 21, 2013
JOURNAL
FREE ACCESS
This paper introduces a technique to suppress FWM-induced crosstalk and demonstrates its performance as applied to phase locked 10Gbit/s OOK-signal 6-carrier transmission. The initial carrier phases are set to cancel out 56% of the generated crosstalk. Successful transmission over DSF is achieved with a power penalty of 1dB even though the crosstalk level was -15dB.
View full abstract
-
Jun Kurihara, Yutaka Miyake
Article type: LETTER
2013 Volume 2 Issue 10 Pages
442-446
Published: October 22, 2013
Released on J-STAGE: October 22, 2013
JOURNAL
FREE ACCESS
This paper proposes a coding scheme to securely store a secret file in a distributed storage system that uses an arbitrary regenerating code. Our scheme encodes the secret file to the input of a certain regenerating code by using the coset coding scheme with a
maximum rank distance (MRD) code. We show that our scheme can protect the secret file from being leaked to an eavesdropper in the distributed storage system. Existing security schemes for distributed storage systems are based on specific regenerating codes, and they cannot be used with other regenerating codes. In contrast, our scheme can guarantee the security against the eavesdropper independently of the construction of the underlying regenerating code.
View full abstract
-
Wei Hou, Tadashi Fujino, Toshiharu Kojima
Article type: LETTER
2013 Volume 2 Issue 10 Pages
447-452
Published: October 23, 2013
Released on J-STAGE: October 23, 2013
JOURNAL
FREE ACCESS
This paper proposes a low complexity MIMO detection using ordering SIC (OSIC) with conditional list generation. Combined with lattice-reduction (LR) technique, OSIC further gains the BER performance compared to SIC, since the more reliable signal is prior to being detected. However OSIC based on LR (LR-OSIC) has inferior performance to the maximum likelihood (ML) detection in large size MIMO systems. In this paper, we investigate the mean square error in LR domain to evaluate the condition of the channel. The proposed detection applies the conditional list detection to update the estimate of the LR-OSIC. The simulation results exhibited that the proposed detection achieved near-ML performance in the 8×8 MIMO and required almost same complexity of the LR-OSIC in the high
Eb/N0 region.
View full abstract
-
Tran Dang Hoa, Dong-Seong Kim
Article type: LETTER
2013 Volume 2 Issue 10 Pages
453-458
Published: October 29, 2013
Released on J-STAGE: October 29, 2013
JOURNAL
FREE ACCESS
This paper proposes a new forwarding algorithm over lossy wireless link that increases network performance in terms of received traffic at the sink (
R0 packets/s) and network lifetime in wireless sensor networks (WSNs). Due to lossy wireless links, each sensor node forms around itself three different communication regions, each characterized by different packet reception rates (PRRs). The results of simulations indicate that, the proposed FOLLA (Data forwarding with lossy link awareness) algorithm outperforms the conventional algorithms with respect to
R0 and network lifetime.
View full abstract
-
Le Chen, Sheng Jiang, Shuowen Zhang, Pengcheng Zhu, Xiaohu You
Article type: LETTER
2013 Volume 2 Issue 10 Pages
459-465
Published: October 29, 2013
Released on J-STAGE: October 29, 2013
JOURNAL
FREE ACCESS
This letter proposed a user selection with swap (USS) algorithm based on zero-forcing beamforming (ZFBF). USS starts with an initial user group with the largest channel 2-norms, iteratively swap the “worst” user (has the minimal achieved rate) among the scheduled users with the “best” user (has the maximum channel 2-norm) among the remaining users. Based on the simulation results, we can confirm that the proposed USS algorithm can provide a comparable performance with previous algorithms with greatly reduced complexity of
O(
KN2).
View full abstract
-
Naobumi Michishita, Woo-Jin Kim, Yoshihide Yamada
Article type: LETTER
2013 Volume 2 Issue 10 Pages
466-469
Published: October 29, 2013
Released on J-STAGE: October 29, 2013
JOURNAL
FREE ACCESS
To develop the effective feeding structure for the leaky wave antenna using the composite right/left-handed transmission line with monopolar radiation, a broadband center-feed structure composed of a triangular element is proposed in this paper. The dispersion characteristics and flat Bloch impedance are obtained by complex S-parameters of 2 ports on the structure. The CRLH leaky wave antenna is fabricated, and bandwidth of 60% is achieved while its radiation characteristics are similar to monopolar radiation.
View full abstract