IEICE Transactions on Communications
Online ISSN : 1745-1345
Print ISSN : 0916-8516
Volume E99.B, Issue 9
Displaying 1-22 of 22 articles from this issue
Special Section on Integration Technologies of Ambient Intelligence and Sensor Networks
  • Hiroshi TOHJO
    2016 Volume E99.B Issue 9 Pages 1919
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL FREE ACCESS
    Download PDF (224K)
  • Kazunori AKABANE, Nobuaki MOCHIZUKI, Shigeru TERUHI, Mamoru KOBAYASHI, ...
    Article type: INVITED PAPER
    2016 Volume E99.B Issue 9 Pages 1920-1929
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL FREE ACCESS

    In the near future, many sensors and terminals will be connected to the public network to provide various convenient IoT/M2M services. In order to connect many sensors to the network efficiently, wireless communication systems in the 920MHz band are seen as attractive solutions. We are focusing on the 920MHz band to research and develop high-capacity protocols that can accommodate many terminals, and low power consumption technologies for battery-driven terminals. In this paper, we describe the following three concrete wireless systems that use our proposals. (1) A physical distribution pallet management system that can handle thousands of pallet-embedded sensors and a wireless module with a battery lifetime of about ten years. (2) Water leakage monitoring system for underground pipes by using sensors and a wireless module in each valve box. (3) A wide-area and high-capacity radio relay system for smart metering services like the reading of gas meters. The radio relay system can accommodate various sensors and terminals and has large potential for providing various IoT/M2M services in conjunction with smart metering services.

    Download PDF (5325K)
  • Takayuki SUYAMA
    Article type: INVITED PAPER
    2016 Volume E99.B Issue 9 Pages 1930-1937
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL FREE ACCESS

    To help elderly and physically disabled people to become self-reliant in daily life such as at home or a health clinic, we have developed a network-type brain machine interface (BMI) system called “network BMI” to control real-world actuators like wheelchairs based on human intention measured by a portable brain measurement system. In this paper, we introduce the technologies for achieving the network BMI system to support activities of daily living.

    Download PDF (4700K)
  • Kenichi MASE
    Article type: SURVEY PAPER
    2016 Volume E99.B Issue 9 Pages 1938-1948
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    An overview of the evolution of intelligent transport systems (ITS) supported by advances in information and communication technologies is presented. Focusing on a sensing platform as one of the ITS applications, this paper presents a survey on vehicular ad hoc network-based geographic routing. In addition to the minimum requirement of street-awareness based on street maps, traffic and packet-awareness are considered essential to achieve acceptable packet delivery performance. In particular, in addition to statistical information, real-time traffic and packet level information are indispensable for making routing protocols feasible and effective. Considering traffic conditions that are highly space- and time-dependent, static nodes can be used to assist with geographic routing, and a protocol workable under a partial deployment of static nodes is considered.

    Download PDF (2302K)
  • Puning ZHANG, Yuan-an LIU, Fan WU, Wenhao FAN, Bihua TANG
    Article type: PAPER
    2016 Volume E99.B Issue 9 Pages 1949-1957
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    The booming developments in embedded sensor technique, wireless communication technology, and information processing theory contribute to the emergence of Internet of Things (IoT), which aims at perceiving and connecting the physical world. In recent years, a growing number of Internet-connected sensors have published their real-time state about the real-world objects on the Internet, which makes the content-based sensor search a promising service in the Internet of Things (IoT). However, classical search engines focus on searching for static or slowly varying data, rather than object-attached sensors. Besides, the existing sensor search systems fail to support the search mode based on a given measurement range. Furthermore, accessing all available sensors to find sought targets would result in tremendous communication overhead. Thus an accurate matching estimation mechanism is proposed to support the search mode based on a given search range and improve the efficiency and applicability of existing sensor search systems. A time-dependent periodical prediction method is presented to periodically estimate the sensor output, which combines with the during the period feedback prediction method that can fully exploit the verification information for enhancing the prediction precision of sensor reading to efficiently serve the needs of sensor search service. Simulation results demonstrate that our prediction methods can achieve high accuracy and our matching estimation mechanism can dramatically reduce the communication overhead of sensor search system.

    Download PDF (2209K)
  • Takeshi HASHIMOTO, Junich AOKI, Tomoyuki OHTA, Yoshiaki KAKUDA
    Article type: PAPER
    2016 Volume E99.B Issue 9 Pages 1958-1966
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    A vehicular ad hoc network (VANET) consists of vehicles (mobile nodes) and road side units which are equipped with the wireless devices such as wireless LANs. Mobile nodes exchange information messages with each other so that VANETs are configured in a self-organized manner. As one of network service scenarios in VANETs, there is a network service to provide the parking spaces in the city central to vehicles (mobile nodes). In this scenario, the road side units (source nodes) which are deployed at the parking spaces periodically disseminate the number of available parking spaces to mobile nodes. Therefore, in this paper, we propose a mobile agent-based information dissemination scheme using location information of mobile nodes and source nodes in the VANET environment. In addition, we conduct simulation experiments in the VANET environment to evaluate the proposed mobile agent-based information dissemination scheme. We confirmed that it could disseminate information messages with lower overhead because mobile agents migrate among mobile nodes by using the location information.

    Download PDF (3157K)
  • Hiroshi SAITO
    Article type: PAPER
    2016 Volume E99.B Issue 9 Pages 1967-1979
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    This paper investigates target detection, barrier coverage, and path coverage with randomly deployed sensors and analyzes the performance of target detection, barrier coverage, and path coverage using integral geometry. Explicit formulas of their performance are derived. The optimal convex sensing area shape with a power consumption constraint is derived from the explicit formulas. Surprisingly, the optimal convex sensing area for target detection in a convex surveillance area can be different from that for barrier coverage. A slender sensing area is optimal for the former, but a disk-shaped sensing area can be optimal for the latter. Similar results are obtained with the Boolean and probabilistic detection models. A slender sensing area is optimal for the Boolean detection model and one of the probabilistic detection models, whereas the disk-shaped sensing area is optimal for another probabilistic detection model. This paper also derives the most difficult path and target to be detected.

    Download PDF (1648K)
  • Shotaro KAMIYA, Keita NAGASHIMA, Koji YAMAMOTO, Takayuki NISHIO, Masah ...
    Article type: PAPER
    2016 Volume E99.B Issue 9 Pages 1980-1988
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    In densely deployed wireless local area network (WLAN) environments, the arbitrary deployment of WLAN access points (APs) can cause serious cell overlaps among APs. In such situations, the ability to realize adaptable coverage using transmission power control (TPC) is effective for improving the area spectral efficiency. Meanwhile, it should be guaranteed that no coverage holes occur and that connectivity between APs and wireless stations (STAs) is maintained. In this paper, the self-organization of coverage domains of APs using TPC is proposed. The proposed technique reduces the incidence of coverage overlaps without generating area coverage holes. To detect coverage holes, STAs and/or APs are used as sensors that inform each AP of whether or not the points at which they exist are covered by the APs. However, there is a problem with this approach in that when the density of STAs is not sufficiently large, the occurrence of area coverage holes is inevitable because the points at which the sensors do not exist are not guaranteed to be covered by APs. This paper overcomes the problem by focusing APs that belong to network's outer boundary (boundary APs) and prohibiting the APs from operating at low transmission power levels, the idea being that the coverage domains of such APs always include the region covered by only those APs. The boundary APs are determined by performing Delaunay triangulation of the set of points at which all APs exist. Simulation results confirm the effectiveness of the proposed TPC scheme in terms of its ability to reduce the total overlap area while avoiding the occurrence of area coverage holes.

    Download PDF (1680K)
  • Taiki NAGASHIMA, Yudai TANAKA, Susumu ISHIHARA
    Article type: PAPER
    2016 Volume E99.B Issue 9 Pages 1989-1997
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    Deterioration of sewer pipes is one of very important problems in Japan. Sewer inspections have been carried out mainly by visual check or wired remote robots with a camera. However, such inspection schemes involve high labor and/or monetary cost. Sewer inspection with boat-type video cameras or unwired robots takes a long time to check the result of the inspection because video data are obtained after the equipment is retrieved from the pipe. To realize low cost, safe and quick inspection of sewer pipes, we have proposed a sewer inspection system using drifting wireless sensor nodes. Water, soil, and the narrow space in the pipe make the long-range and high throughput wireless radio communication difficult. Therefore, we have to identify suitable radio frequency and antenna configuration based on wireless communication characteristics in sewer pipes. If the frequency is higher, the Fresnel zone, the needed space for the line of sight is small, but the path loss in free space is large. On the other hand, if the frequency is lower, the size of the Fresnel zone is large, but the path loss in free space is small. We conducted wireless communication experiments using 920MHz, 2.4GHz, and 5GHz band off-the-shelf devices in an experimental underground pipe. The measurement results show that the wireless communication range of 5GHz (IEEE 802.11a) is over 8m in a 200mm-diameter pipe and is longer than 920MHz (ARIB STD-T108), 2.4GHz (IEEE 802.11g, IEEE 802.15.4) band at their maximum transmission power. In addition, we confirmed that devices that use IEEE 802.11a and 54Mbps bit rate can transmit about 43MB data while they are in the communication range of an AP and drift at 1m/s in a 200mm-diameter pipe, and it is bigger than one of devices that use other bit rate.

    Download PDF (3013K)
  • Hiroyuki YOMO, Takahiro KAWAMOTO, Kenichi ABE, Yuichiro EZURE, Tetsuya ...
    Article type: PAPER
    2016 Volume E99.B Issue 9 Pages 1998-2008
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL FREE ACCESS

    Wireless sensor and actuator networks (WSANs) are required to achieve both energy-efficiency and low-latency in order to prolong the network lifetime while being able to quickly respond to actuation commands transmitted based on the real-time sensing data. These two requirements are in general in a relationship of trade-off when each node operates with well-known duty-cycling modes: nodes need to make their radio interfaces (IFs) frequently active in order to promptly detect the communication requests from the other nodes. One approach to break this inherent trade-off, which has been actively studied in recent literature of wireless sensor networks (WSNs), is the introduction of wake-up receiver that is installed into each node and used only for detecting the communication requests. The main radio IF in each node is woken up only when needed, i.e., in an on-demand manner, through a wake-up message received by the wake-up receiver. In this paper, we introduce radio-on-demand sensor and actuator networks (ROD-SAN) where the concept of wake-up receiver is applied to realize on-demand WSANs. We first evaluate data collection rate, packet delivery latency, and energy-efficiency of ROD-SAN and duty-cycling modes defined in IEEE 802.15.4e by computer simulations. Then, we present our test-bed implementation of ROD-SAN including all protocols from the lowest layer of wake-up signaling to the application layer offering the functionalities of information monitoring and networked control. Finally, we show experimental results obtained through our field trial in which 20 nodes are deployed in an outdoor area with the scale of 450m × 200m. The numerical results obtained by computer simulations and experiments confirm the effectiveness of ROD-SAN to realize energy-efficient and high-response WSANs.

    Download PDF (3493K)
  • Hirotaka HAYASHI, Tomoaki OHTSUKI
    Article type: PAPER
    2016 Volume E99.B Issue 9 Pages 2009-2018
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    Recently, Doppler radars have been used in various applications from the detection and the classification of indoor human activities to the detection of airplanes. To improve both the degrees of freedom (DOF) and the estimation accuracy of the direction-of-arrival (DOA) of targets, multiple-input multiple-output (MIMO) radar has received much attention in recent years. The temporal spatial virtual array based on Doppler shift of a moving target has been one of methods to improve DOA estimation accuracy. However, the DOA estimation accuracy based on the method depends on the velocity and the direction of the target on which we focus. Also, the temporal spatial virtual array should be generated based on the information of the single target. Thus, it is difficult to implement the method if there are multiple targets. In this paper, we propose a new method that provides high accuracy of DOA estimation by using the temporal spatial virtual array without dependence on the velocity, the direction and the number of existing targets. We demonstrate the DOA estimation accuracy and the effectiveness of the proposed method via simulations.

    Download PDF (1064K)
  • Shota YAMASHITA, Koji YAMAMOTO, Takayuki NISHIO, Masahiro MORIKURA
    Article type: PAPER
    2016 Volume E99.B Issue 9 Pages 2019-2027
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    Technological developments in wireless communication have led to an increasing demand for radio frequencies. This has necessitated the practice of spectrum sharing to ensure optimal usage of the limited frequencies, provided this does not cause interference. This paper presents a framework for managing an unexpected situation in which a primary user experiences harmful interference with regard to database-driven secondary use of spectrum allocated to the primary user towards 5G mobile networks, where the primary user is assumed to be a radar system. In our proposed framework, the primary user informs a database that they are experiencing harmful interference. Receiving the information, the database updates a primary exclusive region in which secondary users are unable to operate in the licensed spectrum. Subsequent to the update, this primary exclusive region depends on the knowledge about the secondary users when the primary user experiences harmful interference, knowledge of which is stored in the database. We assume a circular primary exclusive region centered at a primary receiver and derive an optimal radius of the primary exclusive region by applying stochastic geometry. Then, for each type of knowledge stored in the database for the secondary user, we evaluate the optimal radius for a target probability that the primary user experiences harmful interference. The results show that the more detailed the knowledge of the secondary user's density and transmission power stored in the database, the smaller the radius that has to be determined for the primary exclusive region after the update and the more efficient the spatial reuse of the licensed spectrum that can be achieved.

    Download PDF (1620K)
Regular Section
  • Young-Sik KIM, Sang-Hyo KIM
    Article type: PAPER
    Subject area: Fundamental Theories for Communications
    2016 Volume E99.B Issue 9 Pages 2028-2035
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    In this paper, we propose an RFID distance bounding protocol that uses m-ary challenges. Recently, Kim and Avoine proposed two distance bounding protocols with mixed challenges that are pre-determined or random. We generalize the first scheme of Kim and Avoine's random scheme as a distance bounding protocol with m-ary challenges. The generalized formula for success probabilities for mafia fraud and distance fraud attacks is derived. Our scheme using m-ary challenges reduces the mafia fraud success probability from (3/4)n for m=2 to (7/16)n for m=4 and the distance fraud success probability from $(1-\frac 1 4 \cdot P_r)^n$ for m=2 to $(1 - \frac {189}{256} \cdot P_r)^n$ for m=4, where Pr is the probability that a challenge is random.

    Download PDF (1070K)
  • Masashi KUNIKAWA, Hiroyuki YOMO
    Article type: PAPER
    Subject area: Network
    2016 Volume E99.B Issue 9 Pages 2036-2046
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    Energy harvesting wireless sensor networks (EH-WSNs) are being actively studied in order to solve the problems faced by battery-operated WSNs, namely the cost for battery replacement and the negative impact on the environment. In EH-WSNs, each node harvests ambient energy, such as light, heat, vibration, and uses it for sensing, computations, and wireless communications, where the amount of harvested energy of each node varies depending on their environments. MAC protocols for EH-WSNs need to be designed to achieve high throughput and fairness, however, the conventional MAC protocols proposed for EH-WSNs do not adapt to the harvesting rate of each node, resulting in poor fairness. In this paper, we propose a fair MAC protocol based on polling scheme for EH-WSNs. The proposed scheme adjusts contention probability of each node according to its harvesting rate, thereby increasing the throughput of nodes with low harvesting rate. We evaluate throughput and fairness of the proposed fair polling scheme by theoretical analysis and computer simulations, and show that the proposed scheme can improve fairness with little degradation of the overall network throughput.

    Download PDF (1200K)
  • Katsunori ISHIMIYA, Chi-Yuk CHIU, Zhinong YING, Jun-ichi TAKADA
    Article type: PAPER
    Subject area: Antennas and Propagation
    2016 Volume E99.B Issue 9 Pages 2047-2054
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    Advance online publication: April 04, 2016
    JOURNAL RESTRICTED ACCESS

    A compact multiple-input multiple-output (MIMO) dielectric resonator antenna (DRA) was proposed and studied. The DRA consists of three antenna ports. The antennas operate at 2.4GHz, where one of the antenna ports was placed at the center and resonates in the monopole mode, and the two other ports were located at the sides and resonate in the TEy111 mode. Both simulation and measurements were carried out, and reasonably good agreement was obtained. In addition, a study for miniaturization with different permittivities for the DRA and a comparison of the throughput with the reference antennas of a commercial wireless LAN router were performed. Our proposed MIMO DRA gave similar performance as that of the reference antennas but was more compact in size.

    Download PDF (1563K)
  • Li-wen CHEN, Jian-sheng ZHENG
    Article type: PAPER
    Subject area: Antennas and Propagation
    2016 Volume E99.B Issue 9 Pages 2055-2061
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    Outside wireless signals often obstruct GNSS receivers from acquiring satellite signals. Traditional anti-jamming algorithms are used to suppress interference using a convex optimization method based on minimizing output power. These algorithms can reduce interference. However, these models suppress satellite signals as well as jamming interference. Under the high-dynamic condition, the output signal-to-interference-and-noise ratio (SINR) deteriorates seriously and the success rate in acquiring satellite signals falls accordingly. This paper introduces a novel, broadened model with a no-main-lobe-and-multi-virtual-null-constraints (NMLCB) method based on maximizing output power and constraining interference sources. With the new method, GNSS receivers can receive satellite signals more easily than using the power inversion (PI) and power minimization with derivative constraints null (NB) methods under the high-dynamic condition.

    Download PDF (770K)
  • Chang Kyung SUNG, Kyu-Sung HWANG
    Article type: PAPER
    Subject area: Wireless Communication Technologies
    2016 Volume E99.B Issue 9 Pages 2062-2071
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    Advance online publication: April 04, 2016
    JOURNAL RESTRICTED ACCESS

    In this paper, we consider a two-hop relay network with a decode-and-forward (DF) relaying protocol where a multi-input/multi-output (MIMO) relay station (RS) is deployed in a cell edge to extend cell coverage of a base station (BS). We propose two MIMO relaying schemes to improve the quality of the BS-RS link, which is a key to improve data rates in the DF relaying: 1) spatial multiplexed MIMO antenna relaying (SM-MAR) with a uniform channel decomposition (UCD) precoder, and 2) MIMO relaying with section diversity (SD-MAR). In the SM-MAR, we greatly simplify user allocation by the UCD precoder and propose a sophisticated rate maximization technique to resolve the non-convexity of rate maximization problems. Through simulations, we show that the proposed UCD based power allocation exhibits up to two times higher achievable throughput than other techniques. In addition, the proposed SD-MAR supports the BS with a single transmit antenna and increases the signal quality of the BS-RS link with the selection diversity at the RS, which is much simpler to be implemented. For the SD-MAR, we derive a closed form expression for the achievable throughput and show that the selection diversity plays more important role on the achievable throughput than the multiuser diversity.

    Download PDF (707K)
  • Satoshi NAGAI, Teruyuki MIYAJIMA
    Article type: PAPER
    Subject area: Wireless Communication Technologies
    2016 Volume E99.B Issue 9 Pages 2072-2080
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    In this paper, we consider filter-and-forward relay beamforming using orthogonal frequency-division multiplexing (OFDM) in the presence of inter-block interference (IBI). We propose a filter design method based on a constrained max-min problem, which aims to suppress IBI and also avoid deep nulls in the frequency domain. It is shown that IBI can be suppressed completely owing to the employment of beamforming with multiple relays or multiple receive antennas at each relay when perfect channel state information (CSI) is available. In addition, we modify the proposed method to cover the case where only the partial CSI for relay-receiver channels is available. Numerical simulation results show that the proposed method significantly improves the performance as the number of relays and antennas increases due to spatial diversity, and the modified method can make use of the channel correlation to improve the performance.

    Download PDF (689K)
  • Guangteng FAN, Xiaomei TANG, Junwei NIE, Yangbo HUANG, Guangfu SUN
    Article type: PAPER
    Subject area: Navigation, Guidance and Control Systems
    2016 Volume E99.B Issue 9 Pages 2081-2086
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    Advance online publication: April 04, 2016
    JOURNAL RESTRICTED ACCESS

    Global navigation satellite system (GNSS) receivers equipped with the frequency domain interference suppression (FDIS) filter can operate in environments with harsh interference. The FDIS will not cause tracking error bias for an ideal analog receiver channel as its magnitude response and phase response are constant. However, the analog receiver channel distortion is induced by RF cables, amplifiers, and mixers. The distortion of the channel caused asymmetry correlation function. The correlation function is further deformed by the FDIS filter. More seriously, since the FDIS filter is adaptive, the bias will vary with the jamming pattern, especially when the frequency of interference is varying. For precision navigation applications, this bias must be mitigated. Fortunately, to prevent power loss, the analog receiver channel filter is a real function or the imaginary part is negligible. Therefore, the magnitude response and the phase response are even functions. Based on these channel features, a new FDIS filter based on mirror frequency amplitude compensation (MFAC) method is proposed in this paper. The amplitude of the symmetry position of the notch frequency is doubled in the MFAC method in order to mitigate the tracking bias. Simulation results show that the MFAC-based FDIS method is capable of reducing the bias error to less than 0.1ns, which is significant smaller than that achieved by the traditional FDIS method.

    Download PDF (1739K)
  • Wenyun GAO, Xi CHEN, Dexiu HU, Haisheng XU
    Article type: PAPER
    Subject area: Navigation, Guidance and Control Systems
    2016 Volume E99.B Issue 9 Pages 2087-2098
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    Advance online publication: March 18, 2016
    JOURNAL RESTRICTED ACCESS

    This paper presents non-iterative cooperative/parallel Kalman filtering algorithms for decentralized network navigation, in which mobile nodes cooperate in both spatial and temporal domains to infer their positions. We begin by presenting an augmented minimum-mean-square error (MMSE) estimator for centralized navigation network, and then decouple it into a set of local sub-ones each corresponding to a mobile node; all these sub-estimators work in parallel and cooperatively — with the state estimates exchanging between neighbors — to provide results similar to those obtained by the augmented one. After that, we employ the approximation methods that adopted in the conventional nonlinear Kalman filters to calculate the second-order terms involved in these sub-estimators, and propose a decentralized cooperative/parallel Kalman filtering based network navigation framework. Finally, upon the framework, we present two cooperative/parallel Kalman filtering algorithms corresponding to the extended and unscented Kalman filters respectively, and compare them with conventional decentralized methods by simulations to show the superiority.

    Download PDF (2588K)
  • Yongqiang FEI, Yuping ZHAO
    Article type: PAPER
    Subject area: Multimedia Systems for Communications
    2016 Volume E99.B Issue 9 Pages 2099-2107
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    Due to the increasing demand for 3D video transmission over wireless networks, managing the quality of experience (QoE) of wireless 3D video clients is becoming increasingly important. However, the variability of compressed 3D video bit streams and the wireless channel condition as well as the complexity of 3D video viewing experience assessment make it difficult to properly allocate wireless transmission resources. In this paper, we discuss the characteristics of H.264 3D videos and QoE assessment of 3D video clients, and further propose a transmission scheme for 3D video transmission over a wireless communication system. The purpose of our scheme is to minimize the average ratio of stalls among all video streaming clients. By taking into account the playout lead and its change, we periodically evaluate the degree of urgency of each client as regards bitstream receipt based on fuzzy logic, and then allocate the transmission resource blocks to clients jointly considering their degrees of urgency and channel conditions. The adaptive modulation and coding scheme (MCS) is applied to ensure a low transmission error rate. Our proposed scheme is suitable for practical implementation since it has low complexity, and can be easily applied in 2D video transmission and in non-OFDM systems. Simulation results, based on three left-and-right-views 3D videos and the Long Term Evolution (LTE) system, demonstrate the validity of our proposed scheme.

    Download PDF (1445K)
  • Minkyu KIM, Je HONG PARK, Dongyoung ROH
    Article type: WRITTEN DISCUSSION
    Subject area: Fundamental Theories for Communications
    2016 Volume E99.B Issue 9 Pages 2108-2111
    Published: September 01, 2016
    Released on J-STAGE: September 01, 2016
    JOURNAL RESTRICTED ACCESS

    Since the first formal cryptographic study of order-preserving encryption (OPE) by Boldyreva et al., few OPE schemes with provable security have been published. In this paper, we analyze the security of Jho et al.'s OPE scheme, and show that it is not POPF-CCA secure in opposition to what they claim.

    Download PDF (77K)
feedback
Top