IEICE Communications Express
Online ISSN : 2187-0136
ISSN-L : 2187-0136
Volume 4, Issue 1
Displaying 1-5 of 5 articles from this issue
  • Mohamed Rihan, Maha Elsabrouty, Osamu Muta, Hiroshi Furukawa
    Article type: LETTER
    2015 Volume 4 Issue 1 Pages 1-7
    Published: 2015
    Released on J-STAGE: January 13, 2015
    JOURNAL FREE ACCESS
    In this paper, we investigate iterative interference alignment (IA) approaches for multi-input multi-output (MIMO) multicell communication systems. We proposed an iterative reweighted least square (IRLS) approach for MIMO interference channel in single-cell scenario. The basic contribution of this paper is to extend the proposed IRLS algorithm to the more practical case of aligning co-channel interference signals in orthogonal frequency division multiple access (OFDMA) based cellular systems. The simulation results show that the proposed approach achieves a superior total system sum-rate than both the conventional Orthogonal-Minimum Leakage (OR-ML) and the Orthogonal-Maximum Signal to Interference Noise Ratio (OR-MSINR) approaches.
    Download PDF (774K)
  • Pham Vu Phong, Abu Hena Al Muktadir, Eiji Oki
    Article type: LETTER
    2015 Volume 4 Issue 1 Pages 8-13
    Published: 2015
    Released on J-STAGE: January 21, 2015
    JOURNAL FREE ACCESS
    This letter proposes a hybrid scheme for instantaneous recovery 1+1 protection route design for all possible source-destination pairs in a network. In the proposed scheme two different coding aware scenarios, namely the TS (traffic splitting) scenario and the 2SD (two sources and a common destination) scenario, are used intelligently according to the largest effective gain first policy. We compare the total costs of all the working and protection paths obtained by the proposed scheme, the TS scenario, and the 2SD scenario. Numerical results observe that the proposed scheme achieves more resource saving than the TS or 2SD scenario in our examined networks.
    Download PDF (1224K)
  • Ryohei Banno, Tomoyuki Fujino, Susumu Takeuchi, Michiharu Takemoto
    Article type: LETTER
    2015 Volume 4 Issue 1 Pages 14-19
    Published: 2015
    Released on J-STAGE: January 23, 2015
    JOURNAL FREE ACCESS
    Skip Graph is a promising candidate algorithm for large scale distributed systems. The principal feature is range query functionality, but Skip Graph does not have a definite method of multicasting inside ranges designated by query issuers. Even though several simple ways can be considered, they are inefficient regarding the latency or traffic volume. In this letter, we first introduce Multi-Range Forwarding (MRF) used in Multi-key Skip Graph. MRF can be used even in normal Skip Graph, and is efficient compared to the simple ways. Second, we propose a method named Split-Forward Broadcasting (SFB). We analytically evaluate SFB and explain that SFB can roughly halve the average number of hops of MRF.
    Download PDF (578K)
  • Ibrahim Al-Nahhal, Ahmed Emran, Hossam Kasem, Adel B. Abd El-Rahman, O ...
    Article type: LETTER
    2015 Volume 4 Issue 1 Pages 20-25
    Published: 2015
    Released on J-STAGE: January 26, 2015
    JOURNAL FREE ACCESS
    In K-best sphere decoding algorithm (KB), the number of survivor paths K, can be integer values in all tree levels. A certain complexity is provided for each value of K. In this letter, a variant of the K-best sphere decoding algorithm for uncoded MIMO channels is proposed, namely, flexible fractional K-best algorithm (FFKB). The FFKB provides a degree of freedom in complexity in-between the discreet complexities of the traditional KB. Through the offline calculations, the FFKB determines the best operation mode for KB relative to the hardware capability from the complexity point of view.
    Download PDF (819K)
  • Ryo Hattori, Kentaroh Toyoda, Iwao Sasase
    Article type: LETTER
    2015 Volume 4 Issue 1 Pages 26-30
    Published: 2015
    Released on J-STAGE: January 30, 2015
    JOURNAL FREE ACCESS
    We propose a deterministic blocker tag (BT) detection in UHF RFID-based inventory management system. A reader lets tags respond in the specified slots and compares the expected and observed status of each slot. The response slot is determined by using a random number, a frame length, and tag’s ID. Our scheme immediately detects a BT if the expected status is different from the observed status. We show the efficiency of our scheme by computer simulation.
    Download PDF (357K)
feedback
Top