xxxx/xx Vol. Jxx A No. xx DCF DCF [9], [10] [5] DSR [2] [5], [6] DCF DCF DCF [5] [7] DCF [9] [11] DCF IEEE DCF DCF [5] DSR DCF DCF 2. IEEE 802.

Size: px
Start display at page:

Download "xxxx/xx Vol. Jxx A No. xx DCF DCF [9], [10] [5] DSR [2] [5], [6] DCF DCF DCF [5] [7] DCF [9] [11] DCF IEEE DCF DCF [5] DSR DCF DCF 2. IEEE 802."

Transcription

1 LAN An Analysis on Influence of Control Messages of Ad Hoc Routing Protocols upon Link Trougput in Wireless LAN Ryoji ONO, Tatsuji MUNAKA, and Takasi WATANABE DSR MAC IEEE DCF DCF LAN DCF DCF DSR [1/m 2 ] DSR DCF DSR IEEE DCF 1. Information Tecnology R & D Center, Mitsubisi Electric Corporation, Ofuna, Kamakura, Kanagawa, Japan Faculty of Informatics, Sizuoka University, Jooku, Hamamatsu, Sizuoka, Japan [4] IEEE LAN [1] [5], [6], [8] MAC DCF Distributed Coordination Function PCF Point Coordination Function 2 PCF DCF DCF CSMA/CA Carrier Sense Multiple Access wit Collision Avoidance A Vol. Jxx A No. xx pp xxxx xx 1

2 xxxx/xx Vol. Jxx A No. xx DCF DCF [9], [10] [5] DSR [2] [5], [6] DCF DCF DCF [5] [7] DCF [9] [11] DCF IEEE DCF DCF [5] DSR DCF DCF 2. IEEE DCF DSR DSR IEEE DCF IEEE [1] MAC 2 DCF PCF DCF DCF CSMA/CA RTS/CTS request-to-send/clear-to-send 2 RTS/CTS DIFS DCF inter-frame space RTS/CTS SIFS sort inter-frame space ACK RTS/CTS DIFS RTS RTS SIFS CTS RTS SIFS RTS/CTS [9] 2. 2 IEEE DCF IEEE DCF Cen [10] g M T p 2

3 LAN normalized trougput S single op multi op packet arrival rate g [pkt/slot] 1 DCF M = 10, T p = 32 Fig. 1 Trougput of DCF (M = 10, T p = 32) M 1 Cen [10] M = 10 T p = 32 [bytes] 1 g S M DSR DSR [2] DSR RREQ RREQ RREQ 1 [11] RREQ RREP RREQ RREQ RREQ RREP Caced RREP RERR RERR RREQ Broc [5] DSR 4 [6], [7] DSR 3. Cen [10] DSR Li [14] µ DSR p d [8] DSR g r p d µ v p d N ρ g r v ρ g a g Cen 3

4 xxxx/xx Vol. Jxx A No. xx [10] g DCF S v ρ DSR g r S 3. 1 [12], [13] 2 Li [14] 2 [15] µ r ū µ = 2ū πr (1) v 2 u θ v u = v 2 2v cos θ = 2v sin θ 2 (2) ū u θ ū = π 0 {2v sin(θ/2) 2π sin θ} dθ π 0 2π sin θ dθ = 4 3 v (3) µ = 8v 3πr 3. 2 (4) p d DSR 2 [15] 1 n l p d µ p d = n l µ (5) 2 p d N/2 N p d = N 2 p d = N 2 n lµ = 4N n lv 3πr 3. 3 (6) g r DSR RREQ RREP RERR g r DCF RREQ RREP RERR 3 p req p rep p err G r [8] G r = p req Nδ req + p rep n rep + p err n (7) N n n rep RREP δ req Caced RREP RREQ n r RERR 1 n r p err p d n r RREQ RERR p req p err RREQ 1 RREP δ rep p rep δ rep p req 2 DSR 3 4

5 LAN G r = (Nδ req + δ rep n rep + n ) n r p d (8) G r g r αg r = Ng r (9) [10] ρ A N = ρa g r g r = α N G r = α N (Nδ req + δ rep n rep + n ) n r p d 4α(ρAδreq + δrep nrep + n ) n l n rv = (10) 3πr Caced RREP δ req 1 δ rep 1 ρa = N n > n rep ρaδ req + n ) g r (δ rep n rep g r 4αA n l n r ρv (11) 3πr g r ρ v g g g a g r g = g a + g r (12) g a g Cen [10] DCF S DSR DCF LAN 10 g r v ρ 2 S 4. 1 [8], [10], [11] 1 A 25 [m] T p Cen [10] T p [6] RREP RTS/CTS RTS/CTS [10] RTS/CTS DSR RREQ RTS/CTS Cen [10] RTS/CTS 4. 2 Caced RREP Caced RREP 1 Table 1 Parameters r 25 m A ( ) m 2 n 3 n l 3 n r 2 1 Mbps α 20 µsec γ 2 µsec T p ( n ) bytes PHY 24 bytes MAC 28 bytes RTS 44 bytes CTS 38 bytes ACK 38 bytes SIFS 10 µsec DIFS 50 µsec CW min 31 CW max 1023 m 5 5

6 xxxx/xx Vol. Jxx A No. xx trougput against offered load S/G g a = g a = g a = g a = trougput against offered load S/G g a = g a = g a = g a = node speed v [m/sec] node density ρ [1/m 2 ] 2 Fig. 2 Trougput against node speed 3 Fig. 3 Trougput against node density (1) Caced RREP Caced RREP δ req 1 δ rep 1 11 a ) v 2 S S G S/G G 9 g M = ρπr 2 α G = M α g = ρπr2 α g (13) 2 ρ [1/m 2 ] 4 g a g a > = v S/G 1 g > m [pkt/sec] [kbps] g a < = v < = 1 S/G 1 v > 1 S/G v > 4 g a g r b ) ρ S/G 3 v = 1 [m/sec] g a ρ g a g a ρ S/G g a =

7 LAN trougput against application trougput g a = g a = g a = g a = node density ρ [1/m 2 ] 4 Fig. 4 Trougput against node density (2) ρ 4 ρ = ρ = c ) ρ v S/G 5 g a g a g r ρ < = v < = 10 v = 10 36km ρ v ρ > = v < = 1 v = 1 3.6km ρ v ρ = v trougput against offered load S/G node speed v [m/sec] ρ = ρ = ρ = ρ = ρ = ρ = ρ = Fig. 5 Trougput against node speed and density ρ > = v ρ = v Caced RREP Caced RREP δ req 1 δ rep 1 10 δ req δ rep n rep 2 DSR Caced RREP [17] ρ v S/G 6 ρ < = v < = 10 ρ > = v < = Table 2 Parameters (2) δ req δ rep 10.4 n rep

8 xxxx/xx Vol. Jxx A No. xx trougput against offered load S/G node speed v [m/sec] ρ = ρ = ρ = ρ = ρ = ρ = ρ = Fig. 6 Trougput against node speed and density ρ = v Caced RREP ρ > = v ρ = v 4. 3 A r ρ > = [1/m 2 ] ρ = [1/m 2 ] v = 1 10 [m/sec] DSR DCF MAC DSR ρ < = m m a ) [5], [6] b ) RTS/CTS [6] RTS/CTS c ) DSR AODV [3] DSR [5], [6] d ) e ) DSR 6. IEEE DCF DSR [14] [8] DSR DCF [10] [1/m 2 ] 8

9 LAN DSR DCF DSR [1] IEEE standard for wireless LAN medium access control (MAC) and pysical layer (PHY) specification, ISO/IEC :1999, Aug [2] D. Jonson, D. Maltz, and Y. Hu, Te dynamic source routing protocol for mobile ad oc networks, draft-ietf-manet-dsr-10.txt, Jul [3] C. Perkins, E. Belding-Royer, and S. Das, Ad oc on-demand distance vector (AODV) routing, RFC 3561, Jul [4] IEEE standard for wireless LAN medium access control (MAC) and pysical layer (PHY) specification: ESS mes, ttp://grouper.ieee.org/groups/802/11 /Reports/tgs update.tm. [5] J. Broc, D. Maltz, D. Jonson, Y. Hu, and J. Jetceva, A performance comparison of multi-hop wireless ad oc network routing protocols, Proc. ACM/IEEE MobiCom 98, pp.85 97, Dallas, USA, Oct [6] C. Perkins, E. Royer, S. Das, and M. Marina, Performance comparison of two on-demand routing protocols for ad oc networks, IEEE Personal Communications, vol.8, no.1, pp.16 28, Feb [7] T. Kullberg, Performance of te ad-oc on-demand distance vector routing protocol, Helsinki University of Tecnology Seminar on Internetworking, HUT T , Espoo, Finland, Apr [8] vol.45 no.12 pp Dec [9] S. Kurana, A. Kaol, S. Gupta, and A. Jayasumana, Performance evaluation of distributed co-ordination function for IEEE wireless LAN protocol in presence of mobile and idden terminals, Proc. IEEE MASCOTS 99, pp.40 47, College Park, USA, Oct [10] Y. Cen, Q. Zeng, and D. Agrawal, Performance of MAC protocol in ad oc networks, Proc. CNDS 03, pp.55 61, Orlando, USA, Jan [11] J. Yin, Q. Zeng, and D. Agrawal, Performance evaluation of distributed coordination function in ideal and error-prone cannel, Proc. CNDS 04, pp.55 61, San Diego, USA, Jan [12] J. Tsumoci, K. Masayama, H. Ueara, and M. Yokoyama, Impact of mobility metric on routing protocols for mobile ad oc networks, Proc. IEEE PACRIM 03, pp , Victoria, Canada, Aug [13] X. Perz-Costa, C. Bettstetter, and H. Hartenstein, Toward a mobility metric for comparable and reproducible results in ad oc networks researc, ACM Mobile Computing and Communications Review, vol.7, no.4, pp.58 60, Oct [14] X. Li, and Q-A. Zeng, Modeling and analysis of multi-op wireless and mobile ad oc networks using te IEEE DCF protocols, Proc. ICWN 04, pp , Las Vegas, USA, Jun [15] Q-A. Zeng, and D. Agrawal, Modeling and efficient andling of andoffs in integrated wireless mobile networks, IEEE Trans. Veicular Tecnology, vol.51, no.6, pp , Nov [16] LAN MBL vol.2005 no.28 pp Mar [17] D. Maltz, J. Broc, J. Jetceva and D. Jonson, Te Effects of On-Demand Beavior in Routing Protocols for Multi-Hop Wireless Ad Hoc Networks, IEEE J. Selected Areas on Communications, vol.17, no.8, pp , Aug req rep n rep δ req δ rep n rep [17] [17] VII VIII Caced RREP RREQ RREP Caced RREP RREQ OgReq N F wreq N RREP OgRep N F wrep N Caced RREP OgReq C F wreq C OgRep C F wrep C 1 RREQ RREQ RREQ Caced RREP RtReq N RtReq C RtReq N RtReq C = OgReqN +F wreq N OgReq N = OgReqC +F wreq C OgReq C (A 1) (A 2) δ req Caced RREP Caced RREP RREQ 9

10 xxxx/xx Vol. Jxx A No. xx δ req = RtReqC RtReq N = (OgReqC +F wreq C ) OgReq N (OgReq N +F wreq N ) OgReq C (A 3) [17] VII VIII δ req = ( ) (A 4) ( ) 776 δ rep RREQ RREP IEEE δ rep = OgRepC OgReq C (A 5) [17] VIII δ req = 8077/ (A 6) Caced RREP RREP n rep n rep = OgRepC +wrep C OgRep C (A 7) [17] VIII n rep = ( )/ (A 8) xx xx xx OS/ IEEE 10

11 Abstract In on-demand ad oc routing protocols suc as DSR, control messages tend to increase as te mobility and te number of nodes increase. On te oter and, it is reported tat te trougput of IEEE DCF, wic is often used as te MAC layer in ad oc networks, is remarkably deteriorated wen idden nodes exist. We investigate ow muc control messages of routing protocol exert on te trougput wen idden nodes exist, in order to clarify quantitatively conditions were te ad oc networks using DCF are practical. In tis paper, we analyze te influence on trougput by te control messages of DSR numerically. As a result, we found tat te DSR control messages does not affect trougput if te node density is very low. Key words DSR, control messages, IEEE DCF, trougput, idden terminals

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN

More information

外国語学部_紀要34号(横書)/11_若山

外国語学部_紀要34号(横書)/11_若山 IETF Internet Engineering Task Force MANET Mobile Ad Hoc Network ITS Intelligent Transport Systems ITS ITS VICS Vehicle Information and Communication System ETC Electronic Toll Collection System VICS IETF

More information

WMN Wi-Fi MBCR i

WMN Wi-Fi MBCR i 27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI

More information

18 LAN AP (AP, Access Point) LAN (STA, Station) (RSSI, Received Signal Strength Indicator) AP AP STA AP LAN AP STA LAN AP LAN LAN STA AP LAN (Local Ar

18 LAN AP (AP, Access Point) LAN (STA, Station) (RSSI, Received Signal Strength Indicator) AP AP STA AP LAN AP STA LAN AP LAN LAN STA AP LAN (Local Ar LAN AP 19 2 16 18 LAN AP (AP, Access Point) LAN (STA, Station) (RSSI, Received Signal Strength Indicator) AP AP STA AP LAN AP STA LAN AP LAN LAN STA AP LAN (Local Area Network) AP (Access Point) 1 1 2

More information

A Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)

More information

修士論文

修士論文 27 Mobile Ad Hoc Networks An Ant-based Routing Algorithm with Multi-phase Pheromone and Power-saving in Mobile Ad Hoc Networks 14T0013 Shohei Miyashita E-mail: shohei.miyashita.4j@stu.hosei.ac.jp : Abstract

More information

WMN Contiguity situation considering route establishment method in WMN assumed real environment performance evaluation 1165057 26 3 20 1 1 2 3 2.1........................................ 3 2.2.............................

More information

DTN DTN DTN DTN i

DTN DTN DTN DTN i 28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee

More information

出岡雅也 旭健作 鈴木秀和 渡邊晃 名城大学理工学部

出岡雅也 旭健作 鈴木秀和 渡邊晃 名城大学理工学部 ( ) Study of Access Control Method in Ad-hoc Networks that Prevents Hidden Terminal Problems using Strong Busy Tone Masaya Izuoka, Kensaku Asahi, Hidekazu Suzuki, Akira Watanabe(Meijo University) 1 2 IEEE802.11

More information

IEEE e

IEEE e 2007 IEEE 802.11e LAN VoIP 2008 2 4 3606U075-2 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 IEEE 802.11e LAN

More information

Vol.58 No (Mar. 2017) LAN MAC 1,a) , IoT LAN LAN AP MAC 1 Null Function Data Frame NFDF NFDF LAN NFDF LAN LAN MAC Null

Vol.58 No (Mar. 2017) LAN MAC 1,a) , IoT LAN LAN AP MAC 1 Null Function Data Frame NFDF NFDF LAN NFDF LAN LAN MAC Null LAN MAC 1,a) 1 2016 6 27, 2016 12 1 IoT LAN LAN AP MAC 1 Null Function Data Frame NFDF NFDF LAN NFDF LAN LAN MAC Null Function Data Frame Effectiveness of MAC Layer Information in Communication Quality

More information

Vol.53 No (July 2012) EV ITS 1,a) , EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Commu

Vol.53 No (July 2012) EV ITS 1,a) , EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Commu EVITS 1,a) 2 2 2011 10 21, 2012 4 2 EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Communication System for Electric Vehicle Yuriko Hattori 1,a) Tomokazu Shimoda 2 Masayoshi

More information

58 10

58 10 57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation

More information

求人面接資料PPT

求人面接資料PPT Hair Salon TV etc. 250" 250" 200" 200" 150" 150" 100" 100" 50" 50" 0" 0" Nov)13" Dec)13" Jan)14" Feb)14" Mar)14" Apr)14" May)14" Jun)14" Jul)14" Dec)12" Jan)13" Feb)13" Mar)13" Apr)13"

More information

wide97.dvi

wide97.dvi 12 357 1 WIDE MOBSEC (Mobile Security) Working Group Mobile-IP IP (IPSEC) IPA( ) (NECM) NECM 11 MOBSEC IP IETF Mobile-IP VIP PC 40 LAN IP IP MANET (Mobile Ad Hoc Networking) IETF Working Group 359 2 2.1

More information

1

1 3-1-2 156 Mbps Ultrahigh-Speed Wireless LAN Prototype in the 38GHz Band Gang Wu, Masugi INOUE, Homare MURAKAMI, and Yoshihiro HASE This paper describes a 156 Mbps ultrahigh-speed wireless LAN operating

More information

main.dvi

main.dvi }}}}}} }}}}}} Wireless LAN 1 1 LAN 1997 LAN 802.11 2 Mb/s 1999 802.11b 11 Mb/s 2003 802.11g 54 Mb/s LAN LAN LAN LAN LAN AP (Access Point) 150m 50m AP AP AP STA (Station, ) STA STA1 1 AP STA20 LAN 100 LAN

More information

デジタル通信を支える無線技術

デジタル通信を支える無線技術 Aug. 02, 2008 Copyright 2008 Niigata Internet SOCiety & I.Suzuki All Rights Reserved. 2 1. LAN 2. 3. LAN 4. 802.11 3 4 1. LAN 2. 3. LAN 4. 802.11 5 WMAN 50Km WiMax WLAN 100m 802.11 WPAN 10m ZigBee Bluetooth

More information

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL PAL On the Precision of 3D Measurement by Stereo PAL Images Hiroyuki HASE,HirofumiKAWAI,FrankEKPAR, Masaaki YONEDA,andJien KATO PAL 3 PAL Panoramic Annular Lens 1985 Greguss PAL 1 PAL PAL 2 3 2 PAL DP

More information

第 55 回自動制御連合講演会 2012 年 11 月 17 日,18 日京都大学 1K403 ( ) Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. T

第 55 回自動制御連合講演会 2012 年 11 月 17 日,18 日京都大学 1K403 ( ) Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. T 第 55 回自動制御連合講演会 212 年 11 月 日, 日京都大学 1K43 () Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. Tokumoto, T. Namerikawa (Keio Univ. ) Abstract The purpose of

More information

1 I/F I/F 1 6) MobileIP 7) 8) MN: Monile Node MN AR Mobility Anchor Point(MAP) MobileIP HMIP HMIP HA-MAP MN MAP MN MAP HMIP MAP MN 2 MobileIP Mo

1 I/F I/F 1 6) MobileIP 7) 8) MN: Monile Node MN AR Mobility Anchor Point(MAP) MobileIP HMIP HMIP HA-MAP MN MAP MN MAP HMIP MAP MN 2 MobileIP Mo 1 2 2 I/F Mobility Anchor Point MAP Composite Wireless Access Networks on Mobile Communications and Its Evaluation Abstract: In emerging wireless communication environments, mobile terminals that have

More information

電子マネーと通信産業の戦略

電子マネーと通信産業の戦略 No.7, 55-65 (2006) Vision of Electronic Money Card Distribution Plans in Japan - Discussion of the and Credit Card Distribution Plans - OSHIMA Kazuchika Nihon University, Graduate School of Social and

More information

_2009MAR.ren

_2009MAR.ren ISSN 0389-5254 2009 No.2 MAR JAPAN AIRCRAFT PILOT ASSOCIATION C O N T E N T S No.313 2009 No.2 MAR é 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR

More information

AV 1000 BASE-T LAN 90 IEEE ac USB (3 ) LAN (IEEE 802.1X ) LAN AWS (Amazon Web Services) AP 3 USB wget iperf3 wget 40 MBytes 2 wget 40 MByt

AV 1000 BASE-T LAN 90 IEEE ac USB (3 ) LAN (IEEE 802.1X ) LAN AWS (Amazon Web Services) AP 3 USB wget iperf3 wget 40 MBytes 2 wget 40 MByt 1 BYOD LAN 1 2 3 4 1 BYOD 1 Gb/s LAN BYOD LAN LAN Access Point (AP) IEEE 802.11n BYOD LAN AP wget iperf3 1 AP [2] 2 IEEE 802.11ac [3] AP 4 AV (207 m 2 ) ( 1 2 )[4, 5] AP Wave2 Aruba AP-335 Aruba LAN 7210

More information

problem. In this paper, we pay attention to the directivity control, implement DMAC which is a typical MAC protocol, and evaluate it under the

problem. In this paper, we pay attention to the directivity control, implement DMAC which is a typical MAC protocol, and evaluate it under the 1 2 3 4 problem. In this paper, we pay attention to the directivity control, implement DMC which is a typical MC protocol, and evaluate it under the moving environment for the beam forming. ased on this

More information

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us 1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo

More information

1489 TESLA 9) ARIANDE 10) DoS SEAD 11) CONFIDANT 12) TRUST-BASED ROUTING 13) AODV-REX 14) Watchdog Parther 15) CONFIDANT ALARM CONFIDANT ALARM TRUST-B

1489 TESLA 9) ARIANDE 10) DoS SEAD 11) CONFIDANT 12) TRUST-BASED ROUTING 13) AODV-REX 14) Watchdog Parther 15) CONFIDANT ALARM CONFIDANT ALARM TRUST-B Vol. 51 No. 9 1488 1498 (Sep. 2010) 1 1 1 1 1 Trust Level Evaluation for Communication Paths in MANETs Using Attribute Certificate Shinichiro Inoue, 1 Masakuni Ishii, 1 Naofumi Sugaya, 1 Takeshi Yatagai

More information

1 RTS/CTS 1 Fig. 1 One example of the issue in RTS/CTS LAN CSMA/CA IEEE [11] [12] [13] [14] (SBT: Strong Busy Tone) [9] [10] SBT RTS/CTS

1 RTS/CTS 1 Fig. 1 One example of the issue in RTS/CTS LAN CSMA/CA IEEE [11] [12] [13] [14] (SBT: Strong Busy Tone) [9] [10] SBT RTS/CTS THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 468-8502 1-501 E-mail: tomohiro.ito@wata-lab.meijo-u.ac.jp, {asahi,hsuzuki,wtnbakr}@meijo-u.ac.jp IEEE802.11,

More information

3_39.dvi

3_39.dvi Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar

More information

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came 3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is

More information

初めに:

初めに: 2 Copyrightc2008 JETRO. All rights reserved. FAX 03-5572-7044 ...5...6 (1)...7... 11... 11...12...14...15...15...16...17...18 (4)...21 (5)...21 (6)...23 4 Copyrightc2008 JETRO. All rights reserved. 5 Copyrightc2008

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

極地研 no174.indd

極地研 no174.indd C O N T E N T S 02 10 13 no.174 June.2005 TOPICS06 1 45 46 3 12 4546 47 14 10 15 15 16 NEWS no.174 june.2005 0 100 200 300 400 500 600 700 100 100 Diameter,nm 10 10 45 20042 Feb Mar Apr May Jun Jul Aug

More information

17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki

More information

Microsoft Word - AN.doc

Microsoft Word - AN.doc 社団法人電子情報通信学会社団法人電子情報通信学会 THE INSTITUTE OF ELECTRONICS, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS INFORMATION AND COMMUNICATION ENGINEERS 信学技報信学技報 IEICE Technical Report TECHNICAL

More information

公益社団法人日本都市計画学会都市計画論文集 Vol.53 No 年 10 月 Journal of the City Planning Institute of Japan, Vol.53 No.3, October, 2018 A queueing model for goods d

公益社団法人日本都市計画学会都市計画論文集 Vol.53 No 年 10 月 Journal of the City Planning Institute of Japan, Vol.53 No.3, October, 2018 A queueing model for goods d A queueing model for goods delivery service by drones In many depopulated rural districts in Japan, it as been ard to run regional retail stores and many of tem ave closed down. As te result, tere as been

More information

28 Horizontal angle correction using straight line detection in an equirectangular image

28 Horizontal angle correction using straight line detection in an equirectangular image 28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image

More information

Technology Trends and Applications of IoT System Susumu MATSUI 1991 M. Weiser Ubiquitous Computing 25 Pervasive Computing Ambient Intelligence IoT (In

Technology Trends and Applications of IoT System Susumu MATSUI 1991 M. Weiser Ubiquitous Computing 25 Pervasive Computing Ambient Intelligence IoT (In VOL. J100-C NO. 4 APRIL 2017 本 PDF の扱いは 電子情報通信学会著作権規定に従うこと なお 本 PDF は研究教育目的 ( 非営利 ) に限り 著者が第三者に直接配布することができる 著者以外からの配布は禁じられている Technology Trends and Applications of IoT System Susumu MATSUI 1991 M. Weiser

More information

untitled

untitled 4 1 4.1................................................. 1 4.1.1........................................ 1-1 4 17 11 30 4.1 2001 49% 2,400 47% 6,000 2001 390 8% 2005 3000 1000 IT 1 ADSL(Asymmetric Digital

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

6 2. AUTOSAR 2.1 AUTOSAR AUTOSAR ECU OSEK/VDX 3) OSEK/VDX OS AUTOSAR AUTOSAR ECU AUTOSAR 1 AUTOSAR BSW (Basic Software) (Runtime Environment) Applicat

6 2. AUTOSAR 2.1 AUTOSAR AUTOSAR ECU OSEK/VDX 3) OSEK/VDX OS AUTOSAR AUTOSAR ECU AUTOSAR 1 AUTOSAR BSW (Basic Software) (Runtime Environment) Applicat AUTOSAR 1 1, 2 2 2 AUTOSAR AUTOSAR 3 2 2 41% 29% An Extension of AUTOSAR Communication Layers for Multicore Systems Toshiyuki Ichiba, 1 Hiroaki Takada, 1, 2 Shinya Honda 2 and Ryo Kurachi 2 AUTOSAR, a

More information

TCP T ransmission Control Protocol TCP TCP TCP TCP TCP TCP TCP TCP c /(18)

TCP T ransmission Control Protocol TCP TCP TCP TCP TCP TCP TCP TCP c /(18) 3 -- 4 1 TCP T ransmission Control Protocol 2013 12 TCP TCP TCP TCP TCP TCP TCP TCP c 2013 1/(18) 3 -- 4 -- 1 1--1 TCP 2013 12 TCP Transmission Control Protocol TCP TCP TCP 1981 RFC 793 Request for Comments

More information

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for 1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

075730G: 2008/7/4, /07/ A: J: E:

075730G: 2008/7/4, /07/ A: J: E: 075730G: 2008/7/4,11 2008/07/18 075711A: 075726J: 075759E: 1 (Mesh) () LAN () LAN LAN ( LAN ) 2 RMR Rokko Mesh Router LAN 3 RMR IP RMR mesh007 https://192.168.71.1 RMR Username:rootPassword:root Network

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

橡MPLS-Japan-shared-fastreroute.PDF

橡MPLS-Japan-shared-fastreroute.PDF MPLS - Fast Reroute NEC E-mail: a-iwata@ah.jp.nec.com TEL: 044-856-2123, FAX: 044-856-2230 1 (1) (2) (3) Fast Reroute Cisco Juniper Axiowave (4) Shared Fast Reroute NEC (5) Interoperability OAM (6) 2 #1

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation

More information

contents

contents 3 3 4 5 6 7 7 8 8 9 9 10 10 10 11 11 12 13 13 14 14 14 14 14 14 contents 3 3 4 5 6 7 7 8 8 9 9 10 10 10 11 11 12 13 13 14 14 14 14 14 14 01 1 22 3 3 44 studies 1 2 Hiroshima Univ. ACTIVITIES campus

More information

A Study of Effective Application of CG Multimedia Contents for Help of Understandings of the Working Principles of the Internal Combustion Engine (The

A Study of Effective Application of CG Multimedia Contents for Help of Understandings of the Working Principles of the Internal Combustion Engine (The A Study of Effective Application of CG Multimedia Contents for Help of Understandings of the Working Principles of the Internal Combustion Engine (The Learning Effects of the Animation and the e-learning

More information

鉄鋼協会プレゼン

鉄鋼協会プレゼン NN :~:, 8 Nov., Adaptive H Control for Linear Slider with Friction Compensation positioning mechanism moving table stand manipulator Point to Point Control [G] Continuous Path Control ground Fig. Positoining

More information

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting

More information

7,, i

7,, i 23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two

More information

Fig. 4. Configuration of fatigue test specimen. Table I. Mechanical property of test materials. Table II. Full scale fatigue test conditions and test

Fig. 4. Configuration of fatigue test specimen. Table I. Mechanical property of test materials. Table II. Full scale fatigue test conditions and test (J. Soc. Mat. Sci., Japan), Vol. 52, No. 11, pp. 1351-1356, Nov. 2003 Fatigue Life Prediction of Coiled Tubing by Takanori KATO*, Miyuki YAMAMOTO*, Isao SAWAGUCHI** and Tetsuo YONEZAWA*** Coiled tubings,

More information

Table 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig

Table 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig Mover Design and Performance Analysis of Linear Synchronous Reluctance Motor with Multi-flux Barrier Masayuki Sanada, Member, Mitsutoshi Asano, Student Member, Shigeo Morimoto, Member, Yoji Takeda, Member

More information

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing 1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November

More information

IPSJ SIG Technical Report GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1

IPSJ SIG Technical Report GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1 1 1 1 GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1 and Hiroshi Ishiguro 1 Self-location is very informative for wearable systems.

More information

IEEE802.11n LAN WiMAX(Mobile Worldwide Interoperability for Microwave Access) LTE(Long Term Evolution) IEEE LAN Bluetooth IEEE LAN

IEEE802.11n LAN WiMAX(Mobile Worldwide Interoperability for Microwave Access) LTE(Long Term Evolution) IEEE LAN Bluetooth IEEE LAN 23 IEEE802.11n LAN 43422519 ( ) 24 2 6 IEEE802.11n LAN WiMAX(Mobile Worldwide Interoperability for Microwave Access) LTE(Long Term Evolution) IEEE802.11 LAN Bluetooth 2009 9 IEEE802.11 LAN IEE E802.11n

More information

Computer Security Symposium October 2013 Android OS kub

Computer Security Symposium October 2013 Android OS kub Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android

More information

本文

本文 Apr 11, 213 (3-3497-3675) miwa-y @itochu.co.jp (3-3497-6284) maruyama-yo @itochu.co.jp 1. (1) (2) (3 (4) 2. (1)3 (2) (3)J (4) (5) (6) (7) (8) (9) (1) 46 3. Summary 2 2% 2 13 13 13 J 79 46 13 46 4 34 2%

More information

UWB a) Accuracy of Relative Distance Measurement with Ultra Wideband System Yuichiro SHIMIZU a) and Yukitoshi SANADA (Ultra Wideband; UWB) UWB GHz DLL

UWB a) Accuracy of Relative Distance Measurement with Ultra Wideband System Yuichiro SHIMIZU a) and Yukitoshi SANADA (Ultra Wideband; UWB) UWB GHz DLL UWB a) Accuracy of Relative Distance Measurement with Ultra Wideband System Yuichiro SHIMIZU a) and Yukitoshi SANADA (Ultra Wideband; UWB) UWB GHz DLL UWB (DLL) UWB DLL 1. UWB FCC (Federal Communications

More information

2007-Kanai-paper.dvi

2007-Kanai-paper.dvi 19 Estimation of Sound Source Zone using The Arrival Time Interval 1080351 2008 3 7 S/N 2 2 2 i Abstract Estimation of Sound Source Zone using The Arrival Time Interval Koichiro Kanai The microphone array

More information

1: A/B/C/D Fig. 1 Modeling Based on Difference in Agitation Method artisoc[7] A D 2017 Information Processing

1: A/B/C/D Fig. 1 Modeling Based on Difference in Agitation Method artisoc[7] A D 2017 Information Processing 1,a) 2,b) 3 Modeling of Agitation Method in Automatic Mahjong Table using Multi-Agent Simulation Hiroyasu Ide 1,a) Takashi Okuda 2,b) Abstract: Automatic mahjong table refers to mahjong table which automatically

More information

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,

More information

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo

More information

Isogai, T., Building a dynamic correlation network for fat-tailed financial asset returns, Applied Network Science (7):-24, 206,

Isogai, T., Building a dynamic correlation network for fat-tailed financial asset returns, Applied Network Science (7):-24, 206, H28. (TMU) 206 8 29 / 34 2 3 4 5 6 Isogai, T., Building a dynamic correlation network for fat-tailed financial asset returns, Applied Network Science (7):-24, 206, http://link.springer.com/article/0.007/s409-06-0008-x

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information

17 LAN Access Point (the Internet) LAN(Local Area Network) LAN LAN LAN LAN (AP Access Point) IEEE 82.11b/g ( ) AP AP IEEE 82.11a/b/g (STA Station) AP

17 LAN Access Point (the Internet) LAN(Local Area Network) LAN LAN LAN LAN (AP Access Point) IEEE 82.11b/g ( ) AP AP IEEE 82.11a/b/g (STA Station) AP LAN Access Point 18 2 14 17 LAN Access Point (the Internet) LAN(Local Area Network) LAN LAN LAN LAN (AP Access Point) IEEE 82.11b/g ( ) AP AP IEEE 82.11a/b/g (STA Station) AP STA AP STA LAN IEEE 82.11b

More information

1, 2, 2, 2, 2 Recovery Motion Learning for Single-Armed Mobile Robot in Drive System s Fault Tauku ITO 1, Hitoshi KONO 2, Yusuke TAMURA 2, Atsushi YAM

1, 2, 2, 2, 2 Recovery Motion Learning for Single-Armed Mobile Robot in Drive System s Fault Tauku ITO 1, Hitoshi KONO 2, Yusuke TAMURA 2, Atsushi YAM 1, 2, 2, 2, 2 Recovery Motion Learning for Single-Armed Mobile Robot in Drive System s Fault Tauku ITO 1, Hitoshi KONO 2, Yusuke TAMURA 2, Atsushi YAMASHITA 2 and Hajime ASAMA 2 1 Department of Precision

More information

WLAN WLAN AP WLAN WLAN WLAN AP- WLAN SINR WLAN WLAN CE WLAN WLAN WLAN CE 2 3 WLAN 4 WLAN 2. WLAN [10] AP CE [11] AP CE CE [12] CE AP AP AP WLAN WLAN A

WLAN WLAN AP WLAN WLAN WLAN AP- WLAN SINR WLAN WLAN CE WLAN WLAN WLAN CE 2 3 WLAN 4 WLAN 2. WLAN [10] AP CE [11] AP CE CE [12] CE AP AP AP WLAN WLAN A DEIM Forum2015 C2-4 LAN 112 8610 2-1-1 NEC 211 8666 1753 E-mail: mitomo@ogl.is.ocha.ac.jp, {miyoshi,t-murase}@ap.jp.nec.com, oguchi@computer.org LAN AP AP LAN LAN LAN WLAN AP- WLAN 3 LAN LANQoS Quality

More information

SICE東北支部研究集会資料(2012年)

SICE東北支部研究集会資料(2012年) 77 (..3) 77- A study on disturbance compensation control of a wheeled inverted pendulum robot during arm manipulation using Extended State Observer Luis Canete Takuma Sato, Kenta Nagano,Luis Canete,Takayuki

More information

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004 The Journal of the Japan Academy of Nursing Administration and Policies Vol 8, No 1, pp 43 _ 57, 2004 The Literature Review of the Japanese Nurses Job Satisfaction Research Which the Stamps-Ozaki Scale

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

スライド 1

スライド 1 JANOG 14 2004.07.23 NTT kamei.satoshi@lab.ntt.co.jp 1 Peer-to-Peer ISP P2P AS / Copyright 2004 NTT Corporation, All Rights Reserved 2 Peer-to-Peer ISP P2P AS Copyright 2004 NTT Corporation, All Rights

More information

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke

More information

完成卒論.PDF

完成卒論.PDF LAN 4 9920449 2 0 LAN Bluetooth LAN 1 LAN LAN LAN LAN 2 LAN Bluetooth LAN Bluetooth 3 Bluetooth 4 Bluetooth 5 Bluetooth Bluetooth 6 LAN Bluetooth LAN LocalAreaNetwork 1 LAN LAN LAN LAN Ethernet Ethernet

More information

2 1. LAN LAN Aug. 02, 2008 Copyright 2008 Niigata Internet SOCiety & I.Suzuki All Rights Reserved LAN LAN WLAN

2 1. LAN LAN Aug. 02, 2008 Copyright 2008 Niigata Internet SOCiety & I.Suzuki All Rights Reserved LAN LAN WLAN . LAN.. LAN 4. 80. Aug. 0, 008 Copyright 008 Niigata Internet SOCiety & I.Suzuki All Rights Reserved. 4. LAN.. LAN 4. 80. WLAN 00m WMAN 50Km WPAN 0m WiMax 80. 0Kbps 00K M 0M 00M G 5 LAN IEEE80.(997) 80.b(999,.4GHz/Mbps)

More information

,., ping - RTT,., [2],RTT TCP [3] [4] Android.Android,.,,. LAN ACK. [5].. 3., 1.,. 3 AI.,,Amazon, (NN),, 1..NN,, (RNN) RNN

,., ping - RTT,., [2],RTT TCP [3] [4] Android.Android,.,,. LAN ACK. [5].. 3., 1.,. 3 AI.,,Amazon, (NN),, 1..NN,, (RNN) RNN DEIM Forum 2018 F1-1 LAN LSTM 112 8610 2-1-1 163-8677 1-24-2 E-mail: aoi@ogl.is.ocha.ac.jp, oguchi@is.ocha.ac.jp, sane@cc.kogakuin.ac.jp,,.,,., LAN,. Android LAN,. LSTM LAN., LSTM, Analysis of Packet of

More information

4 i

4 i 22 Quantum error correction and its simulation 1135071 2011 3 1 4 i Abstract Quantum error correction and its simulation Hiroko Dehare Researches in quantum information theory and technology, that mix

More information

ITAOI2003第三屆離島資訊與應用研討會論文範例

ITAOI2003第三屆離島資訊與應用研討會論文範例 2003 6 kung@mail.npust.edu.tw, b8956018@mail.npust.edu.tw, m9056011@mail.npust.edu.tw (Internet) and build up cache proxy servers. In this paper, we (Multi-media) design and development four proxy servers

More information

Instability of Aerostatic Journal Bearings with Porous Floating Bush at High Speeds Masaaki MIYATAKE *4, Shigeka YOSHIMOTO, Tomoaki CHIBA and Akira CH

Instability of Aerostatic Journal Bearings with Porous Floating Bush at High Speeds Masaaki MIYATAKE *4, Shigeka YOSHIMOTO, Tomoaki CHIBA and Akira CH Instability of Aerostatic Journal Bearings with Porous Floating Bush at High Speeds Masaaki MIYATAKE *4, Shigeka YOSHIMOTO, Tomoaki CHIBA and Akira CHIBA Department of Mechanical Engineering, Tokyo University

More information

Vol. 41 No Fig. 1 SCS Data transmission network on SCS. HDTV H.261 RGB NTSC VSAT VSAT VSAT 1 HUB VSAT 8) 9) FECForward Error Correction HUB

Vol. 41 No Fig. 1 SCS Data transmission network on SCS. HDTV H.261 RGB NTSC VSAT VSAT VSAT 1 HUB VSAT 8) 9) FECForward Error Correction HUB Vol. 41 No. 10 Oct. 2000 SCS VSAT SCS VSAT VSAT 1.5 Mbps 1.3 Mbps Data-sharing on Inter-university Satellite Network Kikuo Asai, Noritaka Osawa, Kimio Kondo, Kiyohiro Yuki and Katsuaki Yoshida We developed

More information

64 3 g=9.85 m/s 2 g=9.791 m/s 2 36, km ( ) 1 () 2 () m/s : : a) b) kg/m kg/m k

64 3 g=9.85 m/s 2 g=9.791 m/s 2 36, km ( ) 1 () 2 () m/s : : a) b) kg/m kg/m k 63 3 Section 3.1 g 3.1 3.1: : 64 3 g=9.85 m/s 2 g=9.791 m/s 2 36, km ( ) 1 () 2 () 3 9.8 m/s 2 3.2 3.2: : a) b) 5 15 4 1 1. 1 3 14. 1 3 kg/m 3 2 3.3 1 3 5.8 1 3 kg/m 3 3 2.65 1 3 kg/m 3 4 6 m 3.1. 65 5

More information

paper.dvi

paper.dvi 28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret

More information

JFE.dvi

JFE.dvi ,, Department of Civil Engineering, Chuo University Kasuga 1-13-27, Bunkyo-ku, Tokyo 112 8551, JAPAN E-mail : atsu1005@kc.chuo-u.ac.jp E-mail : kawa@civil.chuo-u.ac.jp SATO KOGYO CO., LTD. 12-20, Nihonbashi-Honcho

More information

untitled

untitled JAIS 1 2 1 2 In this paper, we focus on the pauses that partly characterize the utterances of simultaneous interpreters, and attempt to analyze the results of experiments conducted using human subjects

More information

IPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara

IPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara 1 1,2 1 (: Head Mounted Display),,,, An Information Presentation Method for Wearable Displays Considering Surrounding Conditions in Wearable Computing Environments Masayuki Nakao 1 Tsutomu Terada 1,2 Masahiko

More information

24 Depth scaling of binocular stereopsis by observer s own movements

24 Depth scaling of binocular stereopsis by observer s own movements 24 Depth scaling of binocular stereopsis by observer s own movements 1130313 2013 3 1 3D 3D 3D 2 2 i Abstract Depth scaling of binocular stereopsis by observer s own movements It will become more usual

More information

橡 PDF

橡 PDF * * ** * * Transport Information Service Realized with the Fleet Management ASP Kiyotaka KISHINO*Yasushi ISHIDA*Takumi FUSHIKI** Naohiko GONMORI* Hiroyuki NAKAGAWA* Abstract: Fleet management system utilizing

More information

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h 23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),

More information

資料1-3

資料1-3 WPT (2017) ( ) *JST Center of Innovation ( 13- ) Last 5X * 16 8, 15 7, 14 6 METLAB 16 20, 15 18 WPT * IEEE MTTS Wireless Power Transfer Conference ( 11-, ) MTTS TC-26 (Wireless Energy Transfer and Conversion

More information

IHI Robust Path Planning against Position Error for UGVs in Rough Terrain Yuki DOI, Yonghoon JI, Yusuke TAMURA(University of Tokyo), Yuki IKEDA, Atsus

IHI Robust Path Planning against Position Error for UGVs in Rough Terrain Yuki DOI, Yonghoon JI, Yusuke TAMURA(University of Tokyo), Yuki IKEDA, Atsus IHI Robust Path Planning against Position Error for UGVs in Rough Terrain Yuki DOI, Yonghoon JI, Yusuke TAMURA(University of Tokyo), Yuki IKEDA, Atsushi UMEMURA, Yoshiharu KANESHIMA, Hiroki MURAKAMI(IHI

More information

3_23.dvi

3_23.dvi Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems

More information

IEEE ax:第 6 世代の Wi-Fi テクニカル ホワイト ペーパー

IEEE ax:第 6 世代の Wi-Fi テクニカル ホワイト ペーパー IEEE 802.11ax 6 Wi-Fi 1 6 Wi-Fi IEEE 802.11ax 802.11ac IEEE 802.11ax LTE IEEE 802.11ax LAN WLAN Wi-Fi IEEE 802.11ax LAN 4K Ultra HD Internet of Things IoT 802.11ac IoT IEEE 802.11ax 3 1024 QAM 35% OFDMA

More information

untitled

untitled 1 2 1.1................................. 4 2 1 2.1................................... 1 2.2 CSMA....................................... 1 2.3 CSMA/CD.................................... 3 2.4 CSMA/CA....................................

More information