IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E93.A, Issue 10
Displaying 1-26 of 26 articles from this issue
Special Section on Multi-dimensional Mobile Information Networks
  • Shigeaki OGOSE
    2010 Volume E93.A Issue 10 Pages 1715
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    Download PDF (96K)
  • Chin-Sean SUM, Shigenobu SASAKI, Hiroshi HARADA
    Article type: PAPER
    Subject area: UWB System
    2010 Volume E93.A Issue 10 Pages 1716-1723
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    In this paper, the impact of chip duty factor (DF) on direct sequence (DS), time hopping (TH) and hybrid DS-TH ultra wideband (UWB) systems is investigated in realistic environments. Rake receivers are designed to perform energy capture (EC) on received UWB signals over multipath and multi-user environment in the presence of narrowband interference. It is found that by applying lower DF in the signal design, multipath resolvability can be increased and system performance can be improved. However, in contrary to the common belief, lower DF does not always contribute to performance improvement. On the other hand, it is observed that at extremely low DF, EC capability may be compromised, causing performance degradation. The optimum DF values for respective systems are determined and discussed in this paper. Additionally, the strength and tradeoff for DS, TH and DS-TH UWB systems employing varying DF are investigated and compared over multipath and multi-user environment. In a multipath environment, a selective Rake receiver with less than 10 fingers is found to be sufficient for energy capture. In a single user environment, DS-UWB system has the most superior performance, followed by DS-TH-UWB and TH-UWB systems. And in a multi-user environment, DS-TH-UWB is found to outperform the rest, followed by DS-UWB and TH-UWB systems.
    Download PDF (495K)
  • Edwin M. UMALI, Koji KAWAZOE, Yasushi YAMAO
    Article type: PAPER
    Subject area: Transmitter Design
    2010 Volume E93.A Issue 10 Pages 1724-1734
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    The envelope pulse-width modulation (EPWM) transmitter has been proposed to address the power efficiency issue in the linear amplification of multicarrier signals. However, the delta-sigma (Δ-Σ) modulator in the EPWM transmitter generates quantization noise that degrades the output signal quality. In this paper, noise and distortion characteristics of the EPWM transmitter in the amplification of the OFDM signal are presented. First, quantization noise and distortion due to amplitude clipping are analyzed. Theoretical noise power spectral density (PSD) and error vector magnitude (EVM) are obtained as functions of the Δ-Σ modulator and input signal parameters. Then, simulations to validate the noise and distortion characteristics are done using the IEEE 802.11a OFDM signal and first- and second-order Δ-Σ modulators. The effects of bandpass filtering on EVM and adjacent channel leakage power ratio (ACLR) are also obtained by simulation. Results showed good agreement with the analytical results despite the use of the linear-approximation gain plus noise model. The EPWM transmitter that employed the first-order Δ-Σ modulator with a 0.1% clipping probability, an oversampling ratio of 32 and a three-pole Butterworth bandpass filter yielded an EVM of 1.8% and an ACLR of −37.9dB, which are sufficiently lower than the OFDM transmitter specification.
    Download PDF (1713K)
  • Hiroaki NOSE, Miao BAO, Kazumasa MIZUTA, Yasushi YOSHIKAWA, Hisayoshi ...
    Article type: PAPER
    Subject area: Terminal Design for Sensor Network
    2010 Volume E93.A Issue 10 Pages 1735-1743
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    Sensor network terminals are installed in large numbers in field, and they transmit data periodically by radio. Such terminals must be miniaturized, and power must be saved so that each device can be operated by battery for several years. As one way to satisfy these two conditions, in this research we propose a terminal design that eliminates the receiver circuit. Because there is no receiver circuit, circuitry can be miniaturized, and power can be saved because there is no need to consume power to receive signals. However, the terminals cannot perform carrier detection and reception acknowledgement because there is no receiver circuit. We propose following two new protocols to solve this problem.

    1. Terminal transmission times are randomized to prevent frequent collisions between specific terminals due to the lack of carrier detection.
    2. Since all packet losses due to collision cannot be prevented with (1), data from a number of past transmissions is included in each packet so that a later packet can provide transmission data even if a packet is lost.

    In this report, we describe the proposed protocol, and evaluate its performance by simulation. Furthermore, we actually prototype the system and evaluate the prototype's performance.
    Download PDF (803K)
  • Saeyoung AHN, Sunshin AN
    Article type: LETTER
    Subject area: Topology Control
    2010 Volume E93.A Issue 10 Pages 1744-1747
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    In a ZigBee network, a finite address space is allocated to every potential parent device and a device may disallow a join request once this address space is exhausted. When a new node (child) requests to a coordinator (parent) to join a ZigBee network, the coordinator checks its address space. If it has sufficient address space, the coordinator accepts the new node as its child in the ZigBee network. If the new node has router capability (JoinAsRouter), it becomes a router in the ZigBee network. However, this association procedure makes ZigBee networks inefficient for routing, because the coordinator checks only the maximum and current numbers of child nodes. In the worst case, the network will be arranged so that the router nodes are crowded in the network. Therefore, we propose the KMCD-IME (Keeping the Maximum Communication Distance and Initial Mutual Exclusion among router nodes) algorithm with two additional conditions when a new node joins the ZigBee network. The first condition maintains the maximum communication distance between the new node and the would-be parent node. The second condition is the Initial Mutual Exclusion among router nodes. The router nodes are evenly spread across the network by KMCD-IME and an effective routing topology is formed. Therefore, the KMCD-IME algorithm extends the lifetime of the ZigBee network.
    Download PDF (413K)
Regular Section
  • Zhen LI, Atushi UEMURA, Hitoshi KIYA
    Article type: PAPER
    Subject area: Digital Signal Processing
    2010 Volume E93.A Issue 10 Pages 1748-1754
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    An FFT-based full-search block matching algorithm (BMA) is described that uses the sum of squared differences (SSD) criterion. The proposed method does not have to extend a real signal into complex one. This reduces the computational load of FFT approaches. In addition, if two macroblocks share the same search window, they can be matched at the same time. In a simulation of motion estimation, the proposed method achieved the same performance as a direct SSD full search and its processing speed is faster than other FFT-based BMAs.
    Download PDF (445K)
  • Apisak WORAPISHET, Tanee DEMEECHAI
    Article type: PAPER
    Subject area: Analog Signal Processing
    2010 Volume E93.A Issue 10 Pages 1755-1764
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    The noise performances under AWGN channel of the IF-derivative and the quadrature differential FM discriminators, which are widely utilized in modern low power wireless radios, are analyzed and compared. The analysis relies upon the time-domain multi-sinusoidal representation of the noise that facilitates accurate and closed-form analytical SNR characteristics. Derivation of the SNR equations is detailed and discussion based on the analysis results is given to provide insights into the discriminators' performance limitation where it is demonstrated that the differential scheme is considerably more advantageous. Simulated SNR characteristics of practical continuous-phase frequency shift keying (CPFSK) systems using both the FM discriminators are presented as analysis verification.
    Download PDF (622K)
  • Hideki SATOH
    Article type: PAPER
    Subject area: Nonlinear Problems
    2010 Volume E93.A Issue 10 Pages 1765-1774
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    A method was developed for analyzing a system comprised of identical and indistinguishable elements with nonlinear dynamics. First, a moment vector equation (MVE) for the system was derived so as to avoid the curse of dimensionality by using the property that the elements are identical and indistinguishable.Next, an algorithm was developed to solve the MVE for deriving the moment vector in a steady state. It effectively uses eigen analysis on the basis of the property of the MVE. It can thus be used to clarify the structure of the solutions in the moment vector space and to derive multiple solutions by setting the initial value to the moment vector orthogonal to the solutions already obtained.Finally, the probability density function (pdf) for the state of the system was derived using the moment vectors in a steady state. Comparison of the pdfs thereby derived with those derived using numerical simulation showed that the method provided good approximations of the pdfs. Moreover, multiple solutions that are difficult to do using numerical simulation were derived.
    Download PDF (1831K)
  • Chun ZHANG, Yu HU, Lingli WANG, Lei HE, Jiarong TONG
    Article type: PAPER
    Subject area: VLSI Design Technology and CAD
    2010 Volume E93.A Issue 10 Pages 1775-1781
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    Boolean matching is a fundamental problem in FPGA synthesis, but existing Boolean matchers are not scalable to complex PLBs (programmable logic blocks) and large circuits. This paper proposes a filter-based Boolean matching method, F-BM, which accelerates Boolean matching using lookup tables implemented by Bloom filters storing pre-calculated matching results. To show the effectiveness of the proposed F-BM, a post-mapping re-synthesis minimizing area which employs Boolean matching as the kernel has been implemented. Tested on a broad selection of benchmarks, the re-synthesizer using F-BM is 80X faster with 0.5% more area, compared with the one using a SAT-based Boolean matcher.
    Download PDF (493K)
  • Junqi ZHANG, Ying TAN, Lina NI, Chen XIE, Zheng TANG
    Article type: PAPER
    Subject area: VLSI Design Technology and CAD
    2010 Volume E93.A Issue 10 Pages 1782-1791
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    Particle swarm optimizer (PSO) is a stochastic global optimization technique based on a social interaction metaphor. Because of the complexity, dynamics and randomness involved in PSO, it is hard to theoretically analyze the mechanism on which PSO depends. Statistical results have shown that the probability distribution of PSO is a truncated triangle, with uniform probability across the middle that decreases on the sides. The “truncated triangle” is also called the “Maya pyramid” by Kennedy. However, very little is known regarding the sampling distribution of PSO in itself. In this paper, we theoretically analyze the “Maya pyramid” without any assumption and derive its computational formula, which is actually a hybrid uniform distribution that looks like a trapezoid and conforms with the statistical results. Based on the derived density function of the hybrid uniform distribution, the search strategy of PSO is defined and quantified to characterize the mechanism of the search strategy in PSO. In order to show the significance of these definitions based on the derived hybrid uniform distribution, the comparison between the defined search strategies of the classical linear decreasing weight based PSO and the canonical constricted PSO suggested by Clerc is illustrated and elaborated.
    Download PDF (1125K)
  • Benhui CHEN, Jinglu HU
    Article type: PAPER
    Subject area: VLSI Design Technology and CAD
    2010 Volume E93.A Issue 10 Pages 1792-1799
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    For optimization problems with irregular and complex multimodal landscapes, Estimation of Distribution Algorithms (EDAs) suffer from the drawback of premature convergence similar to other evolutionary algorithms. In this paper, we propose an adaptive niching EDA based on Affinity Propagation (AP) clustering analysis. The AP clustering is used to adaptively partition the niches and mine the searching information from the evolution process. The obtained information is successfully utilized to improve the EDA performance by using a balance niching searching strategy. Two different categories of optimization problems are used to evaluate the proposed adaptive niching EDA. The first one is solving three benchmark functional multimodal optimization problems by a continuous EDA based on single Gaussian probabilistic model; the other one is solving a real complicated discrete EDA optimization problem, the HP model protein folding based on k-order Markov probabilistic model. Simulation results show that the proposed adaptive niching EDA is an efficient method.
    Download PDF (680K)
  • Takahiro TSUNO, Yukio SHIBATA
    Article type: PAPER
    Subject area: Graphs and Networks
    2010 Volume E93.A Issue 10 Pages 1800-1805
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    Multi-source broadcasting is one of the information dissemination problems on interconnection networks such that some (but not all) units disseminate distinct information to all other units. In this paper, we discuss multi-source broadcasting on the Kautz digraph which is one of the models of interconnection networks. We decompose the Kautz digraph K(d, n) into isomorphic cycle-rooted trees whose root-cycle has length 2, then we present an algorithm for multi-source broadcasting using these cycle-rooted trees. This algorithm is able to treat d(d+1) messages simultaneously and takes the same order for required times as lower bound.
    Download PDF (312K)
  • Chien-Ning CHEN, Sung-Ming YEN, SangJae MOON
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2010 Volume E93.A Issue 10 Pages 1806-1812
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    Simple power analysis (SPA) can be employed in examining the power consumption trace of elliptic curve scalar multiplication to retrieve the computational sequence. However, SPA cannot distinguish point addition from point subtraction. The attacker still requires an exhaustive search to recover the private key when it is recoded in NAF or recoded by the 2-bit sliding window method. The average Hamming weight of an n-bit NAF recoded scalar is n/3, and an exhaustive search among the 2n/3 candidates is required. This paper shows that in a left-to-right NAF recoded or a left-to-right 2-bit sliding window manipulated scalar the relative position of nonzero bits will reveal their values. Our analysis skill reduces the number of candidates of the scalar from the naive search of 2n/3 to 22n/9 and 20.19n respectively for the cases of NAF and sliding window method.
    Download PDF (491K)
  • Weize SUN, Hing Cheung SO
    Article type: LETTER
    Subject area: Digital Signal Processing
    2010 Volume E93.A Issue 10 Pages 1813-1815
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    In this Letter, the maximum likelihood (ML) estimator for the parameters of a real sinusoid in additive white Gaussian noise using irregularly-spaced samples is derived. The ML frequency estimate is first determined by a one-dimensional search, from which optimum amplitude and phase estimates are then computed. It is shown that the estimation performance of the ML method can attain Cramér-Rao lower bound when the signal-to-noise ratio is sufficiently large.
    Download PDF (122K)
  • Norbert HERENCSAR, Jaroslav KOTON, Kamil VRBA
    Article type: LETTER
    Subject area: Analog Signal Processing
    2010 Volume E93.A Issue 10 Pages 1816-1819
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    In this letter a new active element the Current Follower Transconductance Amplifier (CFTA) for the realization of the current-mode analog blocks is presented. The element is a combination of the Current Follower (CF) and the Balanced Output Transconductance Amplifier (BOTA). Possible internal structure of the CFTA is presented. The usage of the new active element is shown on the design of the Kerwin-Huelsman-Newcomb (KHN) structure working in the current mode. The frequency filter using the CFTA elements has been designed using the signal-flow graphs. The circuit structure employs three CFTA elements and two grounded passive elements. The filter enables realizing not only the basic functions as the low- (LP), band- (BP) and high-pass (HP) but also the notch and all-pass (AP) filter. The advantage of the structure presented is that the outputs of the filter are at high impedance and hence it is not necessary to use other auxiliary active elements. The properties of the filter proposed were verified by sensitivity and AC analyses in the PSPICE program.
    Download PDF (311K)
  • Wooram LEE, Dongkyun KIM, Kwanho YOU
    Article type: LETTER
    Subject area: Systems and Control
    2010 Volume E93.A Issue 10 Pages 1820-1823
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    In this paper a nonlinearity compensation algorithm based on the extended Kalman filter is proposed to improve the measurement accuracy of a heterodyne laser interferometer. The heterodyne laser interferometer is used for ultra-precision measurements such as those used in semiconductor manufacturing. However the periodical nonlinearity property caused by frequency-mixing restricts the accuracy of the nanometric measurements. In order to minimize the effect of the nonlinearity, the measurement process of the laser interferometer is modeled as a state equation and the extended Kalman filtering approach is applied to the process. The effectiveness of our proposed algorithm is demonstrated by comparing the results of the algorithm with experimental results for the laser system.
    Download PDF (221K)
  • Younseok CHOO
    Article type: LETTER
    Subject area: Systems and Control
    2010 Volume E93.A Issue 10 Pages 1824-1826
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    Recently a simple proof of Jury test for complex polynomials was given by the author. In this letter further extended results are presented. Another elementary proof of the Schur stability condition is provided. More importantly it is shown that the stability table can also be used to determine the root distribution of complex polynomials with respect to the unit circle in the complex plane.
    Download PDF (74K)
  • Shengqiang LI, Zhixiong CHEN, Liang ZHOU
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2010 Volume E93.A Issue 10 Pages 1827-1832
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    An upper bound is established for certain exponential sums on the rational points of an elliptic curve over a residue class ring $\mathbb{Z}_N$, N=pq for two distinct odd primes p and q. The result is a generalization of an estimate of exponential sums on rational point groups of elliptic curves over finite fields. The bound is applied to showing the pseudorandomness of a large family of binary sequences constructed by using elliptic curves over $\mathbb{Z}_N$.
    Download PDF (116K)
  • Nasour BAGHERI, Praveen GAURAVARAM, Majid NADERI, Babak SADEGHIYAN
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2010 Volume E93.A Issue 10 Pages 1833-1836
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    The security of permutation-based hash functions in the ideal permutation model has been studied when the input-length of compression function is larger than the input-length of the permutation function. In this paper, we consider permutation based compression functions that have input lengths shorter than that of the permutation. Under this assumption, we propose a permutation based compression function and prove its security with respect to collision and (second) preimage attacks in the ideal permutation model. The proposed compression function can be seen as a generalization of the compression function of MD6 hash function.
    Download PDF (168K)
  • YuanYuan YANG, WenPing MA, WeiBo LIU, Qi JIANG
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2010 Volume E93.A Issue 10 Pages 1837-1839
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    We show a tracking attack against the newest ID-transfer scheme for low-cost RFID tags. In this attack, a wide attacker, i.e. an attacker that can access the verification result of a server, is able to forge a set of specific messages, and to track a tag. The attack is unique as it involves three sessions of the protocol. Finally, a simple feasibility analysis of the attack is given.
    Download PDF (197K)
  • Fanxin ZENG, Zhenyu ZHANG
    Article type: LETTER
    Subject area: Information Theory
    2010 Volume E93.A Issue 10 Pages 1840-1844
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    In a direct-sequence spread spectrum communication system, its multiple access interference, security and user number are mainly decided by correlation, linear span and family size of spreading sequences employed by such a system, respectively. In this letter, based on several families of the known sequences, a method for improving their linear span and family sizes is presented. It is worthy of mentioning that although the number of the proposed sequences with linear span not less than that of the known sequences is enormously increased, the former's correlation distribution is the same as the latter's one. In addition, the proposed sequences include No sequences and the known sequences mentioned above as special cases.
    Download PDF (97K)
  • Shang-Chih MA
    Article type: LETTER
    Subject area: Coding Theory
    2010 Volume E93.A Issue 10 Pages 1845-1847
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    An alternative design for constructing multilevel space-time codes is proposed. For a given space-time block code, we combine several component codes in conjunction with set partitioning of the expanded signal constellation according to the coding gain distance criterion. The error performance of an example code is compared with a traditional multilevel space-time code in computer simulation.
    Download PDF (201K)
  • Kyung Seung AHN
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2010 Volume E93.A Issue 10 Pages 1848-1852
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    In this letter, we analyze the average symbol error rate (SER) performance for multiple-input multiple-output (MIMO) wireless communication links with transmit beamforming and maximum ratio combining (MRC), known as MIMO-MRC, in the presence of multiple interferers in Rayleigh fading channels. An upper bound and an approximation of the average SER for M-ary signaling and an exact average SER for some modulation formats are evaluated. Moreover, an exact closed-form expression of the average SER in an interference-limited environment is derived. The analytical results are confirmed by numerical simulations.
    Download PDF (228K)
  • Kiho LEE, Sanhae KIM, Anjana PUNCHIHEWA, Oh-Soon SHIN, Yoan SHIN
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2010 Volume E93.A Issue 10 Pages 1853-1856
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    We propose the Combined Symbol-based Closed-Loop Orthogonal Space-Time Block Code (CS-CL-OSTBC) for four transmit antennas. In the multiple antenna systems, the CS-CL-OSTBC not only achieves full rate and full diversity with linear maximum-likelihood detection but also obtains higher feedback gain than existing CL-OSTBCs due to more efficient utilization of channel feedback information. In the proposed scheme, all the complex-valued channel coefficients are rotated to positive real values with exact channel phase feedback information. As a result, the channel gain can be expressed as the square of the sum of all positive real values and can obtain the maximum value without any loss. Simulation results on bit error rate performance show that the CS-CL-OSTBC outperforms existing CL-OSTBCs for various modulation schemes.
    Download PDF (200K)
  • Linglong DAI, Zhaocheng WANG, Jian SONG, Zhixing YANG
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2010 Volume E93.A Issue 10 Pages 1857-1860
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    This letter presents a novel multi-carrier code division multiple access (MC-CDMA) system called time domain synchronous MC-CDMA (TDS-MC-CDMA). Aided by the new training sequence (TS) with perfect autocorrelation in the time domain and flat frequency response in the frequency domain, the proposed TDS-MC-CDMA system outperform the traditional MC-CDMA system in terms of spectrum efficiency by about 10%. Simulations are carried out to demonstrate the good performance of the proposed scheme.
    Download PDF (307K)
  • Jeong-Jun SUH, Young Yong KIM
    Article type: LETTER
    Subject area: Mobile Information Network and Personal Communications
    2010 Volume E93.A Issue 10 Pages 1861-1864
    Published: October 01, 2010
    Released on J-STAGE: October 01, 2010
    JOURNAL RESTRICTED ACCESS
    In this letter, we discuss a forwarding method for maximizing network lifetime, which combines multi-hop forwarding and direct forwarding with a direct/multi-hop forwarding ratio of each sensor node. The direct forwarding ratio refers to the forwarding amount ratio of sensor nodes' own data directly towards a sink node in one packet/instance data generation rate. We tackle an optimization problem to determine the direct forwarding ratio of each sensor node, maximizing network lifetime, as well as nearly guaranteeing energy consumption balancing characteristics. The optimization problem is tackled through the Lagrange multiplier approach. We found that the direct forwarding ratio is overall inversely proportional to the increase of node index in h < iN case. Finally, we compare energy consumption and network lifetime of the proposed forwarding method with other existing forwarding methods. The numerical results show that the proposed forwarding method balances energy consumption in most of the sensor nodes, comparing with other existing forwarding methods, such as multi-hop forwarding and direct forwarding. The proposed forwarding method also maximizes network lifetime.
    Download PDF (566K)
feedback
Top