IEICE Transactions on Communications
Online ISSN : 1745-1345
Print ISSN : 0916-8516
Volume E97.B, Issue 1
Displaying 1-29 of 29 articles from this issue
Special Section on Management for Flexible ICT Systems and Services
  • Toshio TONOUCHI
    2014 Volume E97.B Issue 1 Pages 1
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL FREE ACCESS
    Download PDF (95K)
  • Slawomir KUKLINSKI, Prosper CHEMOUIL
    Article type: INVITED PAPER
    2014 Volume E97.B Issue 1 Pages 2-9
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL FREE ACCESS
    Software-Defined Networking currently appears to be a major evolution towards network programmability. In this paper, we first analyze the network management capabilities of OpenFlow in order to identify the main challenges that are raised for SDN management. We address current deficiencies of SDN management and suggest solutions that incur research directions to be carried out for the management of enhanced SDN.
    Download PDF (1830K)
  • Md Golam RABBANI, Mohamed Faten ZHANI, Raouf BOUTABA
    Article type: INVITED PAPER
    2014 Volume E97.B Issue 1 Pages 10-18
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL FREE ACCESS
    As businesses are increasingly relying on the cloud to host their services, cloud providers are striving to offer guaranteed and highly-available resources. To achieve this goal, recent proposals have advocated to offer both computing and networking resources in the form of Virtual Data Centers (VDCs). Subsequently, several attempts have been made to improve the availability of VDCs through reliability-aware resource allocation schemes and redundancy provisioning techniques. However, the research to date has not considered the heterogeneity of the underlying physical components. Specifically, it does not consider recent findings showing that failure rates and availability of data center equipments can vary significantly depending on various parameters including their types and ages. To address this limitation, in this paper we propose a High-availability Virtual Infrastructure management framework (Hi-VI) that takes into account the heterogeneity of cloud data center equipments to dynamically provision backup resources in order to ensure required VDC availability. Specifically, we propose a technique to compute the availability of a VDC that considers both (1) the heterogeneity of data center networking and computing equipments in terms of failure rates and availability, and (2) the number of redundant virtual nodes and links provisioned as backups. We then leverage this technique to propose an allocation scheme that jointly provisions resources for VDCs and backups of virtual components with the goal of achieving the required VDC availability while minimizing energy costs. Through simulations, we demonstrate the effectiveness of our framework compared to heterogeneity-oblivious solutions.
    Download PDF (1945K)
Regular Section
  • Yan DING, Huaimin WANG, Peichang SHI, Hongyi FU, Xinhai XU
    Article type: PAPER
    2014 Volume E97.B Issue 1 Pages 19-28
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    Computation integrity is difficult to verify when mass data processing is outsourced. Current integrity protection mechanisms and policies verify results generated by participating nodes within a computing environment of service providers (SP), which cannot prevent the subjective cheating of SPs. This paper provides an analysis and modeling of computation integrity for mass data processing services. A third-party sampling-result verification method, named TS-TRV, is proposed to prevent lazy cheating by SPs. TS-TRV is a general solution of verification on the intermediate results of common MapReduce jobs, and it utilizes the powerful computing capability of SPs to support verification computing, thus lessening the computing and transmission burdens of the verifier. Theoretical analysis indicates that TS-TRV is effective on detecting the incorrect results with no false positivity and almost no false negativity, while ensuring the authenticity of sampling. Intensive experiments show that the cheating detection rate of TS-TRV achieves over 99% with only a few samples needed, the computation overhead is mainly on the SP, while the network transmission overhead of TS-TRV is only O(log N).
    Download PDF (2213K)
  • Hiep HOANG-VAN, Yuki SHINOZAKI, Takumi MIYOSHI, Olivier FOURMAUX
    Article type: PAPER
    2014 Volume E97.B Issue 1 Pages 29-39
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    Most peer-to-peer (P2P) systems build their own overlay networks for implementing peer selection strategies without taking into account the locality on the underlay network. As a result, a large quantity of traffic crossing internet service providers (ISPs) or autonomous systems (ASes) is generated on the Internet. Controlling the P2P traffic is therefore becoming a big challenge for the ISPs. To control the cost of the cross-ISP/AS traffic, ISPs often throttle and/or even block P2P applications in their networks. In this paper, we propose a router-aided approach for localizing the P2P traffic hierarchically; it features the insertion of additional delay into each P2P packet based on geographical location of its destination. Compared to the existing approaches that solve the problem on the application layer, our proposed method does not require dedicated servers, cooperation between ISPs and P2P users, or modification of existing P2P application software. Therefore, the proposal can be easily utilized by all types of P2P applications. Experiments on P2P streaming applications indicate that our hierarchical traffic localization method not only reduces significantly the inter-domain traffic but also maintains a good performance of P2P applications.
    Download PDF (2674K)
  • Takeshi SUGIMORI, Katsunori IMAMURA, Ryuichi SUGIZAKI
    Article type: PAPER
    Subject area: Fundamental Theories for Communications
    2014 Volume E97.B Issue 1 Pages 40-48
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    Prediction of cross-talk is an important facet of multicore fiber (MCF) design. Several approaches for estimating cross-talk in MCF have been proposed but none are faultless, especially when applied to MCF with heterogeneous cores. We propose a new calculation approach that attempts to solve this problem. In our approach, cross-talk in multicore fibers is estimated by coupled power theory. The coefficients in the coupled power equation are theoretically calculated by the central limit theorem and by quantum mechanical time-dependent perturbations. The results from our calculations agree with those of Monte Carlo simulations of heterogeneous MCFs.
    Download PDF (1007K)
  • Ling WANG, Qicong PENG, Qihang PENG
    Article type: PAPER
    Subject area: Network
    2014 Volume E97.B Issue 1 Pages 49-55
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    In this paper, we investigate how to achieve call admission control (CAC) for guaranteeing call dropping probability QoS which is caused by handoff timeout in cognitive radio (CR) networks. When primary user (PU) appears, spectrum handoff should be initiated to maintain secondary user (SU)'s link. We propose a novel virtual queuing (VQ) scheme to schedule spectrum handoff requests sent by multiple SUs. Unlike the conventional first-come-first-served (FCFS) scheduling, resuming transmission in the original channel has higher priority than switching to another channel. It costs less because it avoids the cost of signaling frequent spectrum switches. We characterize the handoff delay on the effect of PU's behavior and the number of SUs in CR networks. And user capacity under certain QoS requirement is derived as a guideline for CAC. The analytical results show that call dropping performance can be greatly improved by CAC when a large amount of SUs arrives fast as well as the VQ scheme is verified to reduce handoff cost compared to existing methods.
    Download PDF (1078K)
  • Dongyu WANG, Xiaoxiang WANG, Bo GU
    Article type: PAPER
    Subject area: Network
    2014 Volume E97.B Issue 1 Pages 56-65
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    In this paper, a multicast concept for Device-to-Device (D2D) communication underlaying a cellular infrastructure is investigated. To increase the overall capacity and improve resource utilization, a novel interference coordination scheme is proposed. The proposed scheme includes three steps. First, in order to mitigate the interference from D2D multicast transmission to cellular networks (CNs), a dynamic power control scheme is proposed that can determine the upper bound of D2D transmitter power based on the location of Base Station (BS) and areas of adjacent cells from the coverage area of D2D multicast group. Next, an interference limited area control scheme that reduces the interference from CNs to each D2D multicast receiver is proposed. The proposed scheme does not allow cellular equipment (CUE) located in the interference limited area to reuse the same resources as the D2D multicast group. Then two resource block (RB) allocation rules are proposed to select the appropriate RBs from a candidate RB set for D2D multicast group. From the simulation results, it is confirmed that the proposed schemes improve the performance of the hybrid system compared to the conventional ways.
    Download PDF (1815K)
  • Toshiko TOMINAGA, Masataka MASUDA, Jun OKAMOTO, Akira TAKAHASHI, Takan ...
    Article type: PAPER
    Subject area: Network
    2014 Volume E97.B Issue 1 Pages 66-75
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    Many subjective assessment methods for video quality are provided by ITU-T and ITU-R recommendations, but the differences among these methods have not been sufficiently studied. We compare five subjective assessment methods using four quantitative performance indices for both HD and QVGA resolution video. We compare the Double-Stimulus Continuous Quality-Scale (DSCQS), Double-Stimulus Impairment Scale (DSIS), Absolute Category Rating method (ACR), and ACR with Hidden Reference (ACR-HR) as common subjective assessment methods for HD and QVGA resolution videos. Furthermore, we added ACR with an 11-grade scale (ACR11) for the HD test and Subjective Assessment of Multimedia Video Quality (SAMVIQ) for the QVGA test for quality scale variations. The performance indices are correlation coefficients, rank correlation coefficients, statistical reliability, and assessment time. For statistical reliability, we propose a performance index for comparing different quality scale tests. The results of the performance comparison showed that the correlation coefficients and rank correlation coefficients of the mean opinion scores between pairs of methods were high for both HD and QVGA tests. As for statistical reliability provided by the proposed index, DSIS of HD and ACR of QVGA outperformed the other methods. Moreover, ACR, ACR-HR, and ACR11 were the most efficient subjective quality assessment methods from the viewpoint of assessment time.
    Download PDF (2163K)
  • Takeshi YAGI, Junichi MURAYAMA, Takeo HARIU, Sho TSUGAWA, Hiroyuki OHS ...
    Article type: PAPER
    Subject area: Internet
    2014 Volume E97.B Issue 1 Pages 76-86
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    We proposes a method for determining the frequency for monitoring the activities of a malware download site used for malware attacks on websites. In recent years, there has been an increase in attacks exploiting vulnerabilities in web applications for infecting websites with malware and maliciously using those websites as attack platforms. One scheme for countering such attacks is to blacklist malware download sites and filter out access to them from user websites. However, a malware download site is often constructed through the use of an ordinary website that has been maliciously manipulated by an attacker. Once the malware has been deleted from the malware download site, this scheme must be able to unblacklist that site to prevent normal user websites from being falsely detected as malware download sites. However, if a malware download site is frequently monitored for the presence of malware, the attacker may sense this monitoring and relocate that malware on a different site. This means that an attack will not be detected until the newly generated malware download site is discovered. In response to these problems, we clarify the change in attack-detection accuracy caused by attacker behavior. This is done by modeling attacker behavior, specifying a state-transition model with respect to the blacklisting of a malware download site, and analyzing these models with synthetically generated attack patterns and measured attack patterns in an operation network. From this analysis, we derive the optimal monitoring frequency that maximizes the true detection rate while minimizing the false detection rate.
    Download PDF (3295K)
  • Abu Hena Al MUKTADIR, Eiji OKI
    Article type: PAPER
    Subject area: Internet
    2014 Volume E97.B Issue 1 Pages 87-104
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    1+1 protection provides instantaneous proactive recovery from any single link failure by duplicating and sending the same source data onto two disjoint paths. Other resource efficient recovery techniques to deal with single link failure require switching operations at least at both ends, which restrict instantaneous recovery. However, the 1+1 protection technique demands at least double network resources. Our goal is to minimize the resources required for 1+1 protection while maintaining the advantage of instantaneous recovery. It was reported that the network coding (NC) technique reduces resource utilization in 1+1 protection, and in order to determine an optimum NC aware set of routes that minimizes the required network resources for 1+1 protection, an Integer Quadratic Programming (IQP) formulation has already been addressed. Solving an IQP problem requires large amount of memory (cannot be determined exactly) and special algorithms by the mathematical programming solver. In this paper our contributions consist of two parts. First, we formulate the optimization problem, corresponding to the IQP model, as an Integer Linear Programming (ILP) formulation, which is solvable by any linear programming solver, and so its memory and time requirements are smaller. However, the presented ILP model works well in small-scale and medium-scale networks, but fails to support large-scale networks due to excessive memory requirements and calculation time. Second, to deal with these issues, a heuristic algorithm is proposed to determine the best possible NC aware set of routes in large-scale networks. Numerical results show that our strategies achieve almost double the resource saving effect than the conventional minimal-cost routing policy in the examined medium-scale and large scale networks.
    Download PDF (1766K)
  • Yang MIAO, Jun-ichi TAKADA
    Article type: PAPER
    Subject area: Antennas and Propagation
    2014 Volume E97.B Issue 1 Pages 105-113
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    To characterize an antenna, the acquisition of its three-dimensional radiation pattern is the fundamental requirement. Spherical antenna measurement is a practical approach to measuring antenna patterns in spherical geometry. However, due to the limitations of measurement range and measurement time, the measured samples may either be incomplete on scanning sphere, or be inadequate in terms of the sampling interval. Therefore there is a need to extrapolate and interpolate the measured samples. Spherical wave expansion, whose band-limited property is derived from the sampling theorem, provides a good tool for reconstructing antenna patterns. This research identifies the limitation of the conventional algorithm when reconstructing the pattern of an antenna which is not located at the coordinate origin of the measurement set-up. A novel algorithm is proposed to overcome the limitation by resampling between the unprimed and primed (where the antenna is centred) coordinate systems. The resampling of measured samples from the unprimed coordinate to the primed coordinate can be conducted by translational phase shift, and the resampling of reconstructed pattern from the primed coordinate back to the unprimed coordinate can be accomplished by rotation and translation of spherical waves. The proposed algorithm enables the analytical and continuous pattern reconstruction, even under the severe sampling condition for deviated AUT. Numerical investigations are conducted to validate the proposed algorithm.
    Download PDF (1753K)
  • Tadashi MINOTANI, Mitsuru SHINAGAWA
    Article type: PAPER
    Subject area: Antennas and Propagation
    2014 Volume E97.B Issue 1 Pages 114-121
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    This paper describes a very accurate method of estimating the return-path-capacitance and validates the estimation based on low-error measurements for electric-field intrabody communication. The return-path capacitance, Cg, of a mobile transceiver is estimated in two ways. One uses the attenuation factor in transmission and capacitance, Cb, between a human body and the earth ground. The other uses the attenuation factor in reception. To avoid the influence of the lead wire in the estimation of Cb, Cb is estimated from the attenuation factor measured with an amplifier with a low input capacitance. The attenuation factor in reception is derived by using the applied-voltage dependence of the reception rate. This way avoids the influence of any additional instruments on the return-path capacitance and allows that capacitance to be estimated under the same condition as actual intrabody communication. The estimates obtained by the two methods agree well with each other, which means that the estimation of Cb is valid. The results demonstrate the usefulness of the methods.
    Download PDF (1367K)
  • Miao ZHANG, Jiro HIROKAWA, Makoto ANDO
    Article type: PAPER
    Subject area: Antennas and Propagation
    2014 Volume E97.B Issue 1 Pages 122-128
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    A point-to-point fixed wireless access (FWA) system with a maximum throughput of 1Gbps has been developed in the 39GHz band. A double-layer plate-laminated waveguide slot array antenna is successfully realized with specific considerations of practical application. The antenna is designed so as to hold the VSWR under 1.5. The antenna input as well as feeding network is configured to reduce the antenna profile as well as the antenna weight. In addition, integrating the antenna into a wireless terminal is taken into account. A shielding wall, whose effectiveness is experimentally demonstrated, is set in the middle of the wireless terminal to achieve the spatial isolation of more than 65dB between two antennas on the H-plane. 30 test antennas are fabricated by diffusion bonding of thin metal plates, to investigate the tolerance and mass-productivity of this process. An aluminum antenna, which has the advantages of light weight and anti-aging, is also fabricated and evaluated with an eye to the future.
    Download PDF (3099K)
  • HoYu LIN, Masaharu TAKAHASHI, Kazuyuki SAITO, Koichi ITO
    Article type: PAPER
    Subject area: Antennas and Propagation
    2014 Volume E97.B Issue 1 Pages 129-136
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    In recent years, there has been rapid developments in radio-frequency identification (RFID) systems, and their industrial applications include logistics management, automatic object identification, access and parking management, etc. Moreover, RFID systems have also been introduced for the management of medical instruments in medical applications to improve the quality of medical services. In recent years, the combination of such a system with a biological monitoring system through permanent implantation in the human body has been suggested to reduce malpractice events and ameliorate the patient suffering. This paper presents an implantable RFID tag antenna design that can match the conjugate impedance of most integrated circuit (IC) chips (9.3-j55.2Ω at 2.45GHz. The proposed antenna can be injected into the human body through a biological syringe, owing to its compact size of 9.3mm × 1.0mm × 1.0mm. The input impedance, transmission coefficient, and received power are simulated by a finite element method (FEM). A three-layered phantom is used to confirm antenna performance.
    Download PDF (2811K)
  • Chih-Chang SHEN, Ann-Chen CHANG
    Article type: PAPER
    Subject area: Wireless Communication Technologies
    2014 Volume E97.B Issue 1 Pages 137-145
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    This paper deals with carrier frequency offset (CFO) estimation based on the minimum variance distortionless response (MVDR) criterion without using specific training sequences for interleaved orthogonal frequency division multiple access (OFDMA) uplink systems. In the presence of large CFOs, the estimator is proposed to find a new CFO vector based on the first-order Taylor series expansion of the one initially given. The problem of finding the new CFO vector is formulated as the closed form of a generalized eigenvalue problem, which allows one to readily solve it. Since raising the accuracy of residual CFO estimation can provide more accurate residual CFO compensation, this paper also present a decision-directed MVDR approach to improve the CFO estimation performance. However, the proposed estimator can estimate CFOs with less computation load. Several computer simulation results are provided for illustrating the effectiveness of the proposed blind estimate approach.
    Download PDF (1222K)
  • Tetsuya YAMAMOTO, Fumiyuki ADACHI
    Article type: PAPER
    Subject area: Wireless Communication Technologies
    2014 Volume E97.B Issue 1 Pages 146-154
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    In this paper, we propose a spectrally efficient frequency-domain channel estimation scheme suitable for training sequence inserted single-carrier (TS-SC) block transmission using frequency-domain equalization (FDE). The proposed scheme performs the channel estimation in two steps and allows the use of shorter TS (but, longer than the channel length) than the conventional channel estimation schemes. In the first step, the received TS having cyclic property is constructed for performing frequency-domain channel estimation and the improved channel estimate is obtained by using simple averaging of noisy channel estimates. In the second step, the maximum likelihood channel estimation is carried out iteratively by using both the TS and the estimated symbol sequence obtained in the first step. It is shown by computer simulation that the proposed 2-step frequency-domain iterative channel estimation scheme achieves a bit error rate (BER) performance close to perfect channel estimation even in a relatively fast fading environment.
    Download PDF (1715K)
  • Yusuke OSHIMA, Anass BENJEBBOUR, Kenichi HIGUCHI
    Article type: PAPER
    Subject area: Wireless Communication Technologies
    2014 Volume E97.B Issue 1 Pages 155-163
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    This paper proposes a novel method for adaptively controlling the admission of interference to users in our previously proposed layered partially non-orthogonal block diagonalization (BD) precoding method for downlink multiuser multiple-input multiple-output (MIMO) transmission that employs cooperation among multiple base stations (BSs). The proposed method is applicable when some of the instantaneous channel state information (CSI) feedback between the user equipment and the respective BSs is missing if the path loss between the user equipment and BS is higher than a predetermined threshold. The proposed method suppresses the loss in the transmitter diversity (beam forming) gain caused by the perfect nulling of inter-user interference in BD. By allowing the inter-user interference from a link that has a high average path loss, the overall throughput performance of simple BD is enhanced. We show that the combination of layered transmission that restricts the set of BSs used for the signal transmission and adaptive control of interference admission significantly increases the throughput of BS cooperative multiuser MIMO with partial CSI feedback.
    Download PDF (2267K)
  • Eunchul YOON, Suhan CHOI, Unil YUN
    Article type: PAPER
    Subject area: Wireless Communication Technologies
    2014 Volume E97.B Issue 1 Pages 164-170
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    Two channel correlation estimation (CCE) schemes exploiting pilots are presented for an OFDM system with a comb-type pilot pattern under the assumption that there exist virtual subcarriers in the OFDM block. Whereas the first scheme is designed based on the conventional regularized-least square (LS) approach, the second scheme is designed by a newly devised technique based on LS. As the second scheme removes the necessity of computing the matrix inverse by making the minimum eigenvalue of the inversed matrix positive, it leads to reduced implementation complexity and improved performance. It is shown by simulation that the proposed CCE schemes substantially enhance the mean equare error and symbol error rate performances of the MMSE based channel estimation by providing more accurate channel correlation information.
    Download PDF (564K)
  • Jianxin DAI, Ming CHEN, Mei ZHAO, Ziyan JIA, Zhengquan LI
    Article type: PAPER
    Subject area: Wireless Communication Technologies
    2014 Volume E97.B Issue 1 Pages 171-181
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    In the Coordinated Multi-Point (CoMP) system under the condition of limited feedback, a reasonable coordinated set relies heavily on the splitting factor that is used to divide the total feedback bits into channel direction information (CDI) feedback bits and channel quality information (CQI) feedback bits. The relation of splitting factor and coordinated set is examined in this paper. After defining a penalty factor, we derive the net ergodic capacity optimization problem, whose variables to be optimized are the number of coordinated BSs, the divided area's radius and the splitting factor. According to an existing codebook and the quantized channel error model, the downlink received signal model is updated after adding the splitting factor. Through random matrix knowledge, the stochastic property of this model is obtained. A close approximate expression including the splitting factor to be optimized related to coordinated set is given. In addition, a revised adaptive feedback scheme is proposed to split the feedback bits. Simulation results show that the proposed scheme provides a significant performance gain, especially as the user velocity is high.
    Download PDF (1922K)
  • Sungho JEON, Jong-Seob BAEK, Junghyun KIM, Jong-Soo SEO
    Article type: PAPER
    Subject area: Terrestrial Wireless Communication/Broadcasting Technologies
    2014 Volume E97.B Issue 1 Pages 182-189
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    The second generation digital terrestrial broadcasting system (DVB-T2) is the first broadcasting system employing MISO (Multiple-Input Single-Output) algorithms. The potential MISO gain of this system has been roughly predicted through simulations and field tests. Of course, the potential MISO SFN gain (MISO-SFNG) differs according to the simulation conditions, test methods, and measurement environments. In this paper, network gains of SISO-SFN and MISO-SFN are theoretically derived. Such network gains are also analyzed with respect to the receive power imbalance and coverage distances of SISO and MISO SFN. From the analysis, it is proven that MISO-SFNG is always larger than SISO SFN gain (SISO-SFNG) in terms of the achievable SNR. Further, both MISO-SFNG and SISO-SFNG depend on the power imbalance, but the network gains are constant regardless of the modulation order. Once the field strength of the complete SFN is obtained by coverage planning tools or field measurements, the SFN service coverage can be precisely calibrated by applying the closed-form SFNG formula.
    Download PDF (2051K)
  • Tae-Won BAN
    Article type: PAPER
    Subject area: Terrestrial Wireless Communication/Broadcasting Technologies
    2014 Volume E97.B Issue 1 Pages 190-195
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    Recently, small cell systems such as femto cell are being considered as a good alternative that can support the increasing demand for mobile data traffic because they can significantly enhance network capacity by increasing spatial reuse. In this paper, we analyze the coverage and capacity of a femto cell when it is deployed in a hotspot to reduce the traffic loads of neighboring macro base stations (BSs). Our analysis results show that the coverage and capacity of femto cell are seriously affected by surrounding signal environment and they can be greatly enhanced by adapting power allocation for channels to the surrounding environment. Thus, we propose an adaptive power partitioning scheme where power allocation for channels can be dynamically adjusted to suit the environment surrounding the femto cell. In addition, we numerically derive the optimal power allocation ratio for channels to optimize the performance of the femto cell in the proposed scheme. It is shown that the proposed scheme with the optimal channel power allocation significantly outperforms the conventional scheme with fixed power allocation for channels.
    Download PDF (823K)
  • Errong PEI, Bin SHEN, Fang CHENG, Xiaorong JING
    Article type: PAPER
    Subject area: Terrestrial Wireless Communication/Broadcasting Technologies
    2014 Volume E97.B Issue 1 Pages 196-203
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    In cognitive radio networks, the dynamic traffic of the primary user can lead to not only the spectrum sensing performance degradation, but also co-channel interference between primary user and secondary user, and, furthermore, the secondary system throughput can be decreased. Taking into account the impact of the dynamic primary-user traffic on spectrum sensing performance and the secondary throughput, we study the optimization problem of maximizing the secondary throughput under the constraints of probability of detection, average interference and transmit power budget, and derive its optimal solution. The optimal power allocation scheme and the algorithm that can find the optimal sensing time are also proposed. The proposed algorithm is of great practical significance in the scenario where primary-user traffic varies very quickly, for example, in public safety spectrum band.
    Download PDF (1326K)
  • Eun Jeong JANG, Dong Seog HAN
    Article type: PAPER
    Subject area: Sensing
    2014 Volume E97.B Issue 1 Pages 204-209
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    In multi-static sonar systems, the least square (LS) and maximum likelihood (ML) are the typical estimation criteria for target location estimation. The LS localizaiton has the advantage of low computational complexity. On the other hand, the performance of LS can be degraded severely when the target lies on or around the straight line between the source and receiver. We examine mathematically the reason for the performance degradation of LS. Then, we propose a location adaptive — least square (LA-LS) localization that removes the weakness of the LS localizaiton. LA-LS decides the receivers that produce abnormally large measurement errors with a proposed probabilistic measure. LA-LS achieves improved performance of the LS localization by ignoring the information from the selected receivers.
    Download PDF (1197K)
  • Purushothaman SURENDRAN, Jong-Hun LEE, Seok-Jun KO
    Article type: PAPER
    Subject area: Sensing
    2014 Volume E97.B Issue 1 Pages 210-217
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    In this paper, we propose a time and memory efficient Ultra Wide Band Short Range Radar (UWB SRR) system for measuring relative target velocities of up to 150km/hr. First, for the proposed detector, we select the required design parameters for good performance. The parameters are the number of coherent integrations, non-coherent integrations, and FFT points. The conventional detector uses a Fast Fourier Transform (FFT) to extract the range and velocity of the target simultaneously. Therefore, it requires high computation effort, high FFT processing time, and a huge amount of memory. However, the proposed pulse radar detector first decides the target range and then computes the target velocity using FFT sequentially for the decided range index. According to our theoretical and simulation analyses, the FFT processing time and the memory requirement are reduced compared to those of the conventional method. Finally, we show that the detection performance of the proposed detector is superior to that of the conventional detector in a background of Additive White Gaussian Noise (AWGN).
    Download PDF (2295K)
  • Wenkao YANG, Jing GUO, Enquan LI
    Article type: PAPER
    Subject area: Multimedia Systems for Communications
    2014 Volume E97.B Issue 1 Pages 218-225
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    Combining the strong anti-interference advantages of OFDM technology and the time-frequency analysis features of fractional Fourier transform (FFT), we apply OFDM as the coding modulation technology for digital watermarking. Based on the Arnold scrambling and OFDM coding, an innovative DFRFT digital watermarking algorithm is proposed. First, the watermark information is subjected to the Arnold scrambling encryption and OFDM coding transform. Then it is embedded into the FFT domain amplitude. The three parameters of scrambling iterations number, t, FFT order, p, and the watermark information embedded position, L, are used as keys, so that the algorithm has high safety. A simulation shows that the algorithm is highly robust against noise, filtering, compression, and other general attacks. The algorithm not only has strong security, but also makes a good balance between invisibility and robustness. But the possibility of using OFDM technique in robust image watermarking has drawn a very little attention.
    Download PDF (2245K)
  • Kuen-Tsair LAY, Lee-Jyi WANG
    Article type: PAPER
    Subject area: Multimedia Systems for Communications
    2014 Volume E97.B Issue 1 Pages 226-237
    Published: January 01, 2014
    Released on J-STAGE: January 01, 2014
    JOURNAL RESTRICTED ACCESS
    Coupled with the discrete wavelet transform, SPIHT (set partitioning in hierarchical trees) is a highly efficient image compression technique that allows for progressive transmission. One problem, however, is that its decoding can be extremely sensitive to bit errors in the code sequence. In this paper, we address the issue of transmitting SPIHT-encoded images via noisy channels, wherein errors are inevitable. The communication scenario assumed in this paper is that the transmitter cannot get any acknowledgement from the receiver. In our scheme, the original SPIHT code sequence is first segmented into packets. Each packet is classified as either a CP (critical packet) or an RP (refinement packet). For error control, cyclic redundancy check (CRC) is incorporated into each packet. By checking the CRC check sum, the receiver is able to tell whether a packet is correctly received or not. In this way, the noisy channel can be effectively modeled as an erasure channel. For unequal error protection (UEP), each of those packets are repeatedly transmitted for a few times, as determined by a process called diversity allocation (DA). Two DA algorithms are proposed. The first algorithm produces a nearly optimal decoded image (as measured in the expected signal-to-noise ratio). However, its computation cost is extremely high. The second algorithm works in a progressive fashion and is naturally compatible with progressive transmission. Its computation complexity is extremely low. Nonetheless, its decoded image is nearly as good. Experimental results show that the proposed scheme significantly improves the decoded images. They also show that making distinction between CP and RP results in wiser diversity allocation to packets and thus produces higher quality in the decoded images.
    Download PDF (1569K)
Errata
feedback
Top