xxxx/xx Vol. Jxx A No. xx DCF DCF [9], [10] [5] DSR [2] [5], [6] DCF DCF DCF [5] [7] DCF [9] [11] DCF IEEE DCF DCF [5] DSR DCF DCF 2. IEEE 802.
|
|
- ひろみ あみおか
- 5 years ago
- Views:
Transcription
1 LAN An Analysis on Influence of Control Messages of Ad Hoc Routing Protocols upon Link Trougput in Wireless LAN Ryoji ONO, Tatsuji MUNAKA, and Takasi WATANABE DSR MAC IEEE DCF DCF LAN DCF DCF DSR [1/m 2 ] DSR DCF DSR IEEE DCF 1. Information Tecnology R & D Center, Mitsubisi Electric Corporation, Ofuna, Kamakura, Kanagawa, Japan Faculty of Informatics, Sizuoka University, Jooku, Hamamatsu, Sizuoka, Japan [4] IEEE LAN [1] [5], [6], [8] MAC DCF Distributed Coordination Function PCF Point Coordination Function 2 PCF DCF DCF CSMA/CA Carrier Sense Multiple Access wit Collision Avoidance A Vol. Jxx A No. xx pp xxxx xx 1
2 xxxx/xx Vol. Jxx A No. xx DCF DCF [9], [10] [5] DSR [2] [5], [6] DCF DCF DCF [5] [7] DCF [9] [11] DCF IEEE DCF DCF [5] DSR DCF DCF 2. IEEE DCF DSR DSR IEEE DCF IEEE [1] MAC 2 DCF PCF DCF DCF CSMA/CA RTS/CTS request-to-send/clear-to-send 2 RTS/CTS DIFS DCF inter-frame space RTS/CTS SIFS sort inter-frame space ACK RTS/CTS DIFS RTS RTS SIFS CTS RTS SIFS RTS/CTS [9] 2. 2 IEEE DCF IEEE DCF Cen [10] g M T p 2
3 LAN normalized trougput S single op multi op packet arrival rate g [pkt/slot] 1 DCF M = 10, T p = 32 Fig. 1 Trougput of DCF (M = 10, T p = 32) M 1 Cen [10] M = 10 T p = 32 [bytes] 1 g S M DSR DSR [2] DSR RREQ RREQ RREQ 1 [11] RREQ RREP RREQ RREQ RREQ RREP Caced RREP RERR RERR RREQ Broc [5] DSR 4 [6], [7] DSR 3. Cen [10] DSR Li [14] µ DSR p d [8] DSR g r p d µ v p d N ρ g r v ρ g a g Cen 3
4 xxxx/xx Vol. Jxx A No. xx [10] g DCF S v ρ DSR g r S 3. 1 [12], [13] 2 Li [14] 2 [15] µ r ū µ = 2ū πr (1) v 2 u θ v u = v 2 2v cos θ = 2v sin θ 2 (2) ū u θ ū = π 0 {2v sin(θ/2) 2π sin θ} dθ π 0 2π sin θ dθ = 4 3 v (3) µ = 8v 3πr 3. 2 (4) p d DSR 2 [15] 1 n l p d µ p d = n l µ (5) 2 p d N/2 N p d = N 2 p d = N 2 n lµ = 4N n lv 3πr 3. 3 (6) g r DSR RREQ RREP RERR g r DCF RREQ RREP RERR 3 p req p rep p err G r [8] G r = p req Nδ req + p rep n rep + p err n (7) N n n rep RREP δ req Caced RREP RREQ n r RERR 1 n r p err p d n r RREQ RERR p req p err RREQ 1 RREP δ rep p rep δ rep p req 2 DSR 3 4
5 LAN G r = (Nδ req + δ rep n rep + n ) n r p d (8) G r g r αg r = Ng r (9) [10] ρ A N = ρa g r g r = α N G r = α N (Nδ req + δ rep n rep + n ) n r p d 4α(ρAδreq + δrep nrep + n ) n l n rv = (10) 3πr Caced RREP δ req 1 δ rep 1 ρa = N n > n rep ρaδ req + n ) g r (δ rep n rep g r 4αA n l n r ρv (11) 3πr g r ρ v g g g a g r g = g a + g r (12) g a g Cen [10] DCF S DSR DCF LAN 10 g r v ρ 2 S 4. 1 [8], [10], [11] 1 A 25 [m] T p Cen [10] T p [6] RREP RTS/CTS RTS/CTS [10] RTS/CTS DSR RREQ RTS/CTS Cen [10] RTS/CTS 4. 2 Caced RREP Caced RREP 1 Table 1 Parameters r 25 m A ( ) m 2 n 3 n l 3 n r 2 1 Mbps α 20 µsec γ 2 µsec T p ( n ) bytes PHY 24 bytes MAC 28 bytes RTS 44 bytes CTS 38 bytes ACK 38 bytes SIFS 10 µsec DIFS 50 µsec CW min 31 CW max 1023 m 5 5
6 xxxx/xx Vol. Jxx A No. xx trougput against offered load S/G g a = g a = g a = g a = trougput against offered load S/G g a = g a = g a = g a = node speed v [m/sec] node density ρ [1/m 2 ] 2 Fig. 2 Trougput against node speed 3 Fig. 3 Trougput against node density (1) Caced RREP Caced RREP δ req 1 δ rep 1 11 a ) v 2 S S G S/G G 9 g M = ρπr 2 α G = M α g = ρπr2 α g (13) 2 ρ [1/m 2 ] 4 g a g a > = v S/G 1 g > m [pkt/sec] [kbps] g a < = v < = 1 S/G 1 v > 1 S/G v > 4 g a g r b ) ρ S/G 3 v = 1 [m/sec] g a ρ g a g a ρ S/G g a =
7 LAN trougput against application trougput g a = g a = g a = g a = node density ρ [1/m 2 ] 4 Fig. 4 Trougput against node density (2) ρ 4 ρ = ρ = c ) ρ v S/G 5 g a g a g r ρ < = v < = 10 v = 10 36km ρ v ρ > = v < = 1 v = 1 3.6km ρ v ρ = v trougput against offered load S/G node speed v [m/sec] ρ = ρ = ρ = ρ = ρ = ρ = ρ = Fig. 5 Trougput against node speed and density ρ > = v ρ = v Caced RREP Caced RREP δ req 1 δ rep 1 10 δ req δ rep n rep 2 DSR Caced RREP [17] ρ v S/G 6 ρ < = v < = 10 ρ > = v < = Table 2 Parameters (2) δ req δ rep 10.4 n rep
8 xxxx/xx Vol. Jxx A No. xx trougput against offered load S/G node speed v [m/sec] ρ = ρ = ρ = ρ = ρ = ρ = ρ = Fig. 6 Trougput against node speed and density ρ = v Caced RREP ρ > = v ρ = v 4. 3 A r ρ > = [1/m 2 ] ρ = [1/m 2 ] v = 1 10 [m/sec] DSR DCF MAC DSR ρ < = m m a ) [5], [6] b ) RTS/CTS [6] RTS/CTS c ) DSR AODV [3] DSR [5], [6] d ) e ) DSR 6. IEEE DCF DSR [14] [8] DSR DCF [10] [1/m 2 ] 8
9 LAN DSR DCF DSR [1] IEEE standard for wireless LAN medium access control (MAC) and pysical layer (PHY) specification, ISO/IEC :1999, Aug [2] D. Jonson, D. Maltz, and Y. Hu, Te dynamic source routing protocol for mobile ad oc networks, draft-ietf-manet-dsr-10.txt, Jul [3] C. Perkins, E. Belding-Royer, and S. Das, Ad oc on-demand distance vector (AODV) routing, RFC 3561, Jul [4] IEEE standard for wireless LAN medium access control (MAC) and pysical layer (PHY) specification: ESS mes, ttp://grouper.ieee.org/groups/802/11 /Reports/tgs update.tm. [5] J. Broc, D. Maltz, D. Jonson, Y. Hu, and J. Jetceva, A performance comparison of multi-hop wireless ad oc network routing protocols, Proc. ACM/IEEE MobiCom 98, pp.85 97, Dallas, USA, Oct [6] C. Perkins, E. Royer, S. Das, and M. Marina, Performance comparison of two on-demand routing protocols for ad oc networks, IEEE Personal Communications, vol.8, no.1, pp.16 28, Feb [7] T. Kullberg, Performance of te ad-oc on-demand distance vector routing protocol, Helsinki University of Tecnology Seminar on Internetworking, HUT T , Espoo, Finland, Apr [8] vol.45 no.12 pp Dec [9] S. Kurana, A. Kaol, S. Gupta, and A. Jayasumana, Performance evaluation of distributed co-ordination function for IEEE wireless LAN protocol in presence of mobile and idden terminals, Proc. IEEE MASCOTS 99, pp.40 47, College Park, USA, Oct [10] Y. Cen, Q. Zeng, and D. Agrawal, Performance of MAC protocol in ad oc networks, Proc. CNDS 03, pp.55 61, Orlando, USA, Jan [11] J. Yin, Q. Zeng, and D. Agrawal, Performance evaluation of distributed coordination function in ideal and error-prone cannel, Proc. CNDS 04, pp.55 61, San Diego, USA, Jan [12] J. Tsumoci, K. Masayama, H. Ueara, and M. Yokoyama, Impact of mobility metric on routing protocols for mobile ad oc networks, Proc. IEEE PACRIM 03, pp , Victoria, Canada, Aug [13] X. Perz-Costa, C. Bettstetter, and H. Hartenstein, Toward a mobility metric for comparable and reproducible results in ad oc networks researc, ACM Mobile Computing and Communications Review, vol.7, no.4, pp.58 60, Oct [14] X. Li, and Q-A. Zeng, Modeling and analysis of multi-op wireless and mobile ad oc networks using te IEEE DCF protocols, Proc. ICWN 04, pp , Las Vegas, USA, Jun [15] Q-A. Zeng, and D. Agrawal, Modeling and efficient andling of andoffs in integrated wireless mobile networks, IEEE Trans. Veicular Tecnology, vol.51, no.6, pp , Nov [16] LAN MBL vol.2005 no.28 pp Mar [17] D. Maltz, J. Broc, J. Jetceva and D. Jonson, Te Effects of On-Demand Beavior in Routing Protocols for Multi-Hop Wireless Ad Hoc Networks, IEEE J. Selected Areas on Communications, vol.17, no.8, pp , Aug req rep n rep δ req δ rep n rep [17] [17] VII VIII Caced RREP RREQ RREP Caced RREP RREQ OgReq N F wreq N RREP OgRep N F wrep N Caced RREP OgReq C F wreq C OgRep C F wrep C 1 RREQ RREQ RREQ Caced RREP RtReq N RtReq C RtReq N RtReq C = OgReqN +F wreq N OgReq N = OgReqC +F wreq C OgReq C (A 1) (A 2) δ req Caced RREP Caced RREP RREQ 9
10 xxxx/xx Vol. Jxx A No. xx δ req = RtReqC RtReq N = (OgReqC +F wreq C ) OgReq N (OgReq N +F wreq N ) OgReq C (A 3) [17] VII VIII δ req = ( ) (A 4) ( ) 776 δ rep RREQ RREP IEEE δ rep = OgRepC OgReq C (A 5) [17] VIII δ req = 8077/ (A 6) Caced RREP RREP n rep n rep = OgRepC +wrep C OgRep C (A 7) [17] VIII n rep = ( )/ (A 8) xx xx xx OS/ IEEE 10
11 Abstract In on-demand ad oc routing protocols suc as DSR, control messages tend to increase as te mobility and te number of nodes increase. On te oter and, it is reported tat te trougput of IEEE DCF, wic is often used as te MAC layer in ad oc networks, is remarkably deteriorated wen idden nodes exist. We investigate ow muc control messages of routing protocol exert on te trougput wen idden nodes exist, in order to clarify quantitatively conditions were te ad oc networks using DCF are practical. In tis paper, we analyze te influence on trougput by te control messages of DSR numerically. As a result, we found tat te DSR control messages does not affect trougput if te node density is very low. Key words DSR, control messages, IEEE DCF, trougput, idden terminals
TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of
IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN
More information外国語学部_紀要34号(横書)/11_若山
IETF Internet Engineering Task Force MANET Mobile Ad Hoc Network ITS Intelligent Transport Systems ITS ITS VICS Vehicle Information and Communication System ETC Electronic Toll Collection System VICS IETF
More informationWMN Wi-Fi MBCR i
27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI
More information18 LAN AP (AP, Access Point) LAN (STA, Station) (RSSI, Received Signal Strength Indicator) AP AP STA AP LAN AP STA LAN AP LAN LAN STA AP LAN (Local Ar
LAN AP 19 2 16 18 LAN AP (AP, Access Point) LAN (STA, Station) (RSSI, Received Signal Strength Indicator) AP AP STA AP LAN AP STA LAN AP LAN LAN STA AP LAN (Local Area Network) AP (Access Point) 1 1 2
More informationA Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)
More information修士論文
27 Mobile Ad Hoc Networks An Ant-based Routing Algorithm with Multi-phase Pheromone and Power-saving in Mobile Ad Hoc Networks 14T0013 Shohei Miyashita E-mail: shohei.miyashita.4j@stu.hosei.ac.jp : Abstract
More informationWMN Contiguity situation considering route establishment method in WMN assumed real environment performance evaluation 1165057 26 3 20 1 1 2 3 2.1........................................ 3 2.2.............................
More informationDTN DTN DTN DTN i
28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee
More information出岡雅也 旭健作 鈴木秀和 渡邊晃 名城大学理工学部
( ) Study of Access Control Method in Ad-hoc Networks that Prevents Hidden Terminal Problems using Strong Busy Tone Masaya Izuoka, Kensaku Asahi, Hidekazu Suzuki, Akira Watanabe(Meijo University) 1 2 IEEE802.11
More informationIEEE e
2007 IEEE 802.11e LAN VoIP 2008 2 4 3606U075-2 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 IEEE 802.11e LAN
More informationVol.58 No (Mar. 2017) LAN MAC 1,a) , IoT LAN LAN AP MAC 1 Null Function Data Frame NFDF NFDF LAN NFDF LAN LAN MAC Null
LAN MAC 1,a) 1 2016 6 27, 2016 12 1 IoT LAN LAN AP MAC 1 Null Function Data Frame NFDF NFDF LAN NFDF LAN LAN MAC Null Function Data Frame Effectiveness of MAC Layer Information in Communication Quality
More informationVol.53 No (July 2012) EV ITS 1,a) , EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Commu
EVITS 1,a) 2 2 2011 10 21, 2012 4 2 EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Communication System for Electric Vehicle Yuriko Hattori 1,a) Tomokazu Shimoda 2 Masayoshi
More information58 10
57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation
More information求人面接資料PPT
Hair Salon TV etc. 250" 250" 200" 200" 150" 150" 100" 100" 50" 50" 0" 0" Nov)13" Dec)13" Jan)14" Feb)14" Mar)14" Apr)14" May)14" Jun)14" Jul)14" Dec)12" Jan)13" Feb)13" Mar)13" Apr)13"
More informationwide97.dvi
12 357 1 WIDE MOBSEC (Mobile Security) Working Group Mobile-IP IP (IPSEC) IPA( ) (NECM) NECM 11 MOBSEC IP IETF Mobile-IP VIP PC 40 LAN IP IP MANET (Mobile Ad Hoc Networking) IETF Working Group 359 2 2.1
More information1
3-1-2 156 Mbps Ultrahigh-Speed Wireless LAN Prototype in the 38GHz Band Gang Wu, Masugi INOUE, Homare MURAKAMI, and Yoshihiro HASE This paper describes a 156 Mbps ultrahigh-speed wireless LAN operating
More informationmain.dvi
}}}}}} }}}}}} Wireless LAN 1 1 LAN 1997 LAN 802.11 2 Mb/s 1999 802.11b 11 Mb/s 2003 802.11g 54 Mb/s LAN LAN LAN LAN LAN AP (Access Point) 150m 50m AP AP AP STA (Station, ) STA STA1 1 AP STA20 LAN 100 LAN
More informationデジタル通信を支える無線技術
Aug. 02, 2008 Copyright 2008 Niigata Internet SOCiety & I.Suzuki All Rights Reserved. 2 1. LAN 2. 3. LAN 4. 802.11 3 4 1. LAN 2. 3. LAN 4. 802.11 5 WMAN 50Km WiMax WLAN 100m 802.11 WPAN 10m ZigBee Bluetooth
More informationxx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL
PAL On the Precision of 3D Measurement by Stereo PAL Images Hiroyuki HASE,HirofumiKAWAI,FrankEKPAR, Masaaki YONEDA,andJien KATO PAL 3 PAL Panoramic Annular Lens 1985 Greguss PAL 1 PAL PAL 2 3 2 PAL DP
More information第 55 回自動制御連合講演会 2012 年 11 月 17 日,18 日京都大学 1K403 ( ) Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. T
第 55 回自動制御連合講演会 212 年 11 月 日, 日京都大学 1K43 () Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. Tokumoto, T. Namerikawa (Keio Univ. ) Abstract The purpose of
More information1 I/F I/F 1 6) MobileIP 7) 8) MN: Monile Node MN AR Mobility Anchor Point(MAP) MobileIP HMIP HMIP HA-MAP MN MAP MN MAP HMIP MAP MN 2 MobileIP Mo
1 2 2 I/F Mobility Anchor Point MAP Composite Wireless Access Networks on Mobile Communications and Its Evaluation Abstract: In emerging wireless communication environments, mobile terminals that have
More information電子マネーと通信産業の戦略
No.7, 55-65 (2006) Vision of Electronic Money Card Distribution Plans in Japan - Discussion of the and Credit Card Distribution Plans - OSHIMA Kazuchika Nihon University, Graduate School of Social and
More information_2009MAR.ren
ISSN 0389-5254 2009 No.2 MAR JAPAN AIRCRAFT PILOT ASSOCIATION C O N T E N T S No.313 2009 No.2 MAR é 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR 2009 MAR
More informationAV 1000 BASE-T LAN 90 IEEE ac USB (3 ) LAN (IEEE 802.1X ) LAN AWS (Amazon Web Services) AP 3 USB wget iperf3 wget 40 MBytes 2 wget 40 MByt
1 BYOD LAN 1 2 3 4 1 BYOD 1 Gb/s LAN BYOD LAN LAN Access Point (AP) IEEE 802.11n BYOD LAN AP wget iperf3 1 AP [2] 2 IEEE 802.11ac [3] AP 4 AV (207 m 2 ) ( 1 2 )[4, 5] AP Wave2 Aruba AP-335 Aruba LAN 7210
More informationproblem. In this paper, we pay attention to the directivity control, implement DMAC which is a typical MAC protocol, and evaluate it under the
1 2 3 4 problem. In this paper, we pay attention to the directivity control, implement DMC which is a typical MC protocol, and evaluate it under the moving environment for the beam forming. ased on this
More information& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us
1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo
More information1489 TESLA 9) ARIANDE 10) DoS SEAD 11) CONFIDANT 12) TRUST-BASED ROUTING 13) AODV-REX 14) Watchdog Parther 15) CONFIDANT ALARM CONFIDANT ALARM TRUST-B
Vol. 51 No. 9 1488 1498 (Sep. 2010) 1 1 1 1 1 Trust Level Evaluation for Communication Paths in MANETs Using Attribute Certificate Shinichiro Inoue, 1 Masakuni Ishii, 1 Naofumi Sugaya, 1 Takeshi Yatagai
More information1 RTS/CTS 1 Fig. 1 One example of the issue in RTS/CTS LAN CSMA/CA IEEE [11] [12] [13] [14] (SBT: Strong Busy Tone) [9] [10] SBT RTS/CTS
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 468-8502 1-501 E-mail: tomohiro.ito@wata-lab.meijo-u.ac.jp, {asahi,hsuzuki,wtnbakr}@meijo-u.ac.jp IEEE802.11,
More information3_39.dvi
Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar
More informationIPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came
3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is
More information初めに:
2 Copyrightc2008 JETRO. All rights reserved. FAX 03-5572-7044 ...5...6 (1)...7... 11... 11...12...14...15...15...16...17...18 (4)...21 (5)...21 (6)...23 4 Copyrightc2008 JETRO. All rights reserved. 5 Copyrightc2008
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More information極地研 no174.indd
C O N T E N T S 02 10 13 no.174 June.2005 TOPICS06 1 45 46 3 12 4546 47 14 10 15 15 16 NEWS no.174 june.2005 0 100 200 300 400 500 600 700 100 100 Diameter,nm 10 10 45 20042 Feb Mar Apr May Jun Jul Aug
More information17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki
More informationMicrosoft Word - AN.doc
社団法人電子情報通信学会社団法人電子情報通信学会 THE INSTITUTE OF ELECTRONICS, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS INFORMATION AND COMMUNICATION ENGINEERS 信学技報信学技報 IEICE Technical Report TECHNICAL
More information公益社団法人日本都市計画学会都市計画論文集 Vol.53 No 年 10 月 Journal of the City Planning Institute of Japan, Vol.53 No.3, October, 2018 A queueing model for goods d
A queueing model for goods delivery service by drones In many depopulated rural districts in Japan, it as been ard to run regional retail stores and many of tem ave closed down. As te result, tere as been
More information28 Horizontal angle correction using straight line detection in an equirectangular image
28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image
More informationTechnology Trends and Applications of IoT System Susumu MATSUI 1991 M. Weiser Ubiquitous Computing 25 Pervasive Computing Ambient Intelligence IoT (In
VOL. J100-C NO. 4 APRIL 2017 本 PDF の扱いは 電子情報通信学会著作権規定に従うこと なお 本 PDF は研究教育目的 ( 非営利 ) に限り 著者が第三者に直接配布することができる 著者以外からの配布は禁じられている Technology Trends and Applications of IoT System Susumu MATSUI 1991 M. Weiser
More informationuntitled
4 1 4.1................................................. 1 4.1.1........................................ 1-1 4 17 11 30 4.1 2001 49% 2,400 47% 6,000 2001 390 8% 2005 3000 1000 IT 1 ADSL(Asymmetric Digital
More informationIPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple
1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa
More information6 2. AUTOSAR 2.1 AUTOSAR AUTOSAR ECU OSEK/VDX 3) OSEK/VDX OS AUTOSAR AUTOSAR ECU AUTOSAR 1 AUTOSAR BSW (Basic Software) (Runtime Environment) Applicat
AUTOSAR 1 1, 2 2 2 AUTOSAR AUTOSAR 3 2 2 41% 29% An Extension of AUTOSAR Communication Layers for Multicore Systems Toshiyuki Ichiba, 1 Hiroaki Takada, 1, 2 Shinya Honda 2 and Ryo Kurachi 2 AUTOSAR, a
More informationTCP T ransmission Control Protocol TCP TCP TCP TCP TCP TCP TCP TCP c /(18)
3 -- 4 1 TCP T ransmission Control Protocol 2013 12 TCP TCP TCP TCP TCP TCP TCP TCP c 2013 1/(18) 3 -- 4 -- 1 1--1 TCP 2013 12 TCP Transmission Control Protocol TCP TCP TCP 1981 RFC 793 Request for Comments
More informationIPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for
1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu
More information1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D
P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:
More information075730G: 2008/7/4, /07/ A: J: E:
075730G: 2008/7/4,11 2008/07/18 075711A: 075726J: 075759E: 1 (Mesh) () LAN () LAN LAN ( LAN ) 2 RMR Rokko Mesh Router LAN 3 RMR IP RMR mesh007 https://192.168.71.1 RMR Username:rootPassword:root Network
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More information橡MPLS-Japan-shared-fastreroute.PDF
MPLS - Fast Reroute NEC E-mail: a-iwata@ah.jp.nec.com TEL: 044-856-2123, FAX: 044-856-2230 1 (1) (2) (3) Fast Reroute Cisco Juniper Axiowave (4) Shared Fast Reroute NEC (5) Interoperability OAM (6) 2 #1
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More informationFig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).
Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation
More informationcontents
3 3 4 5 6 7 7 8 8 9 9 10 10 10 11 11 12 13 13 14 14 14 14 14 14 contents 3 3 4 5 6 7 7 8 8 9 9 10 10 10 11 11 12 13 13 14 14 14 14 14 14 01 1 22 3 3 44 studies 1 2 Hiroshima Univ. ACTIVITIES campus
More informationA Study of Effective Application of CG Multimedia Contents for Help of Understandings of the Working Principles of the Internal Combustion Engine (The
A Study of Effective Application of CG Multimedia Contents for Help of Understandings of the Working Principles of the Internal Combustion Engine (The Learning Effects of the Animation and the e-learning
More information鉄鋼協会プレゼン
NN :~:, 8 Nov., Adaptive H Control for Linear Slider with Friction Compensation positioning mechanism moving table stand manipulator Point to Point Control [G] Continuous Path Control ground Fig. Positoining
More information第62巻 第1号 平成24年4月/石こうを用いた木材ペレット
Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More informationFig. 4. Configuration of fatigue test specimen. Table I. Mechanical property of test materials. Table II. Full scale fatigue test conditions and test
(J. Soc. Mat. Sci., Japan), Vol. 52, No. 11, pp. 1351-1356, Nov. 2003 Fatigue Life Prediction of Coiled Tubing by Takanori KATO*, Miyuki YAMAMOTO*, Isao SAWAGUCHI** and Tetsuo YONEZAWA*** Coiled tubings,
More informationTable 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig
Mover Design and Performance Analysis of Linear Synchronous Reluctance Motor with Multi-flux Barrier Masayuki Sanada, Member, Mitsutoshi Asano, Student Member, Shigeo Morimoto, Member, Yoji Takeda, Member
More information[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing
1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November
More informationIPSJ SIG Technical Report GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1
1 1 1 GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1 and Hiroshi Ishiguro 1 Self-location is very informative for wearable systems.
More informationIEEE802.11n LAN WiMAX(Mobile Worldwide Interoperability for Microwave Access) LTE(Long Term Evolution) IEEE LAN Bluetooth IEEE LAN
23 IEEE802.11n LAN 43422519 ( ) 24 2 6 IEEE802.11n LAN WiMAX(Mobile Worldwide Interoperability for Microwave Access) LTE(Long Term Evolution) IEEE802.11 LAN Bluetooth 2009 9 IEEE802.11 LAN IEE E802.11n
More informationComputer Security Symposium October 2013 Android OS kub
Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android
More information本文
Apr 11, 213 (3-3497-3675) miwa-y @itochu.co.jp (3-3497-6284) maruyama-yo @itochu.co.jp 1. (1) (2) (3 (4) 2. (1)3 (2) (3)J (4) (5) (6) (7) (8) (9) (1) 46 3. Summary 2 2% 2 13 13 13 J 79 46 13 46 4 34 2%
More informationUWB a) Accuracy of Relative Distance Measurement with Ultra Wideband System Yuichiro SHIMIZU a) and Yukitoshi SANADA (Ultra Wideband; UWB) UWB GHz DLL
UWB a) Accuracy of Relative Distance Measurement with Ultra Wideband System Yuichiro SHIMIZU a) and Yukitoshi SANADA (Ultra Wideband; UWB) UWB GHz DLL UWB (DLL) UWB DLL 1. UWB FCC (Federal Communications
More information2007-Kanai-paper.dvi
19 Estimation of Sound Source Zone using The Arrival Time Interval 1080351 2008 3 7 S/N 2 2 2 i Abstract Estimation of Sound Source Zone using The Arrival Time Interval Koichiro Kanai The microphone array
More information1: A/B/C/D Fig. 1 Modeling Based on Difference in Agitation Method artisoc[7] A D 2017 Information Processing
1,a) 2,b) 3 Modeling of Agitation Method in Automatic Mahjong Table using Multi-Agent Simulation Hiroyasu Ide 1,a) Takashi Okuda 2,b) Abstract: Automatic mahjong table refers to mahjong table which automatically
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More informationEQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju
EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo
More informationIsogai, T., Building a dynamic correlation network for fat-tailed financial asset returns, Applied Network Science (7):-24, 206,
H28. (TMU) 206 8 29 / 34 2 3 4 5 6 Isogai, T., Building a dynamic correlation network for fat-tailed financial asset returns, Applied Network Science (7):-24, 206, http://link.springer.com/article/0.007/s409-06-0008-x
More informationRun-Based Trieから構成される 決定木の枝刈り法
Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network
More information17 LAN Access Point (the Internet) LAN(Local Area Network) LAN LAN LAN LAN (AP Access Point) IEEE 82.11b/g ( ) AP AP IEEE 82.11a/b/g (STA Station) AP
LAN Access Point 18 2 14 17 LAN Access Point (the Internet) LAN(Local Area Network) LAN LAN LAN LAN (AP Access Point) IEEE 82.11b/g ( ) AP AP IEEE 82.11a/b/g (STA Station) AP STA AP STA LAN IEEE 82.11b
More information1, 2, 2, 2, 2 Recovery Motion Learning for Single-Armed Mobile Robot in Drive System s Fault Tauku ITO 1, Hitoshi KONO 2, Yusuke TAMURA 2, Atsushi YAM
1, 2, 2, 2, 2 Recovery Motion Learning for Single-Armed Mobile Robot in Drive System s Fault Tauku ITO 1, Hitoshi KONO 2, Yusuke TAMURA 2, Atsushi YAMASHITA 2 and Hajime ASAMA 2 1 Department of Precision
More informationWLAN WLAN AP WLAN WLAN WLAN AP- WLAN SINR WLAN WLAN CE WLAN WLAN WLAN CE 2 3 WLAN 4 WLAN 2. WLAN [10] AP CE [11] AP CE CE [12] CE AP AP AP WLAN WLAN A
DEIM Forum2015 C2-4 LAN 112 8610 2-1-1 NEC 211 8666 1753 E-mail: mitomo@ogl.is.ocha.ac.jp, {miyoshi,t-murase}@ap.jp.nec.com, oguchi@computer.org LAN AP AP LAN LAN LAN WLAN AP- WLAN 3 LAN LANQoS Quality
More informationSICE東北支部研究集会資料(2012年)
77 (..3) 77- A study on disturbance compensation control of a wheeled inverted pendulum robot during arm manipulation using Extended State Observer Luis Canete Takuma Sato, Kenta Nagano,Luis Canete,Takayuki
More informationWeb Stamps 96 KJ Stamps Web Vol 8, No 1, 2004
The Journal of the Japan Academy of Nursing Administration and Policies Vol 8, No 1, pp 43 _ 57, 2004 The Literature Review of the Japanese Nurses Job Satisfaction Research Which the Stamps-Ozaki Scale
More information258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System
Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.
More informationスライド 1
JANOG 14 2004.07.23 NTT kamei.satoshi@lab.ntt.co.jp 1 Peer-to-Peer ISP P2P AS / Copyright 2004 NTT Corporation, All Rights Reserved 2 Peer-to-Peer ISP P2P AS Copyright 2004 NTT Corporation, All Rights
More information4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q
x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke
More information完成卒論.PDF
LAN 4 9920449 2 0 LAN Bluetooth LAN 1 LAN LAN LAN LAN 2 LAN Bluetooth LAN Bluetooth 3 Bluetooth 4 Bluetooth 5 Bluetooth Bluetooth 6 LAN Bluetooth LAN LocalAreaNetwork 1 LAN LAN LAN LAN Ethernet Ethernet
More information2 1. LAN LAN Aug. 02, 2008 Copyright 2008 Niigata Internet SOCiety & I.Suzuki All Rights Reserved LAN LAN WLAN
. LAN.. LAN 4. 80. Aug. 0, 008 Copyright 008 Niigata Internet SOCiety & I.Suzuki All Rights Reserved. 4. LAN.. LAN 4. 80. WLAN 00m WMAN 50Km WPAN 0m WiMax 80. 0Kbps 00K M 0M 00M G 5 LAN IEEE80.(997) 80.b(999,.4GHz/Mbps)
More information,., ping - RTT,., [2],RTT TCP [3] [4] Android.Android,.,,. LAN ACK. [5].. 3., 1.,. 3 AI.,,Amazon, (NN),, 1..NN,, (RNN) RNN
DEIM Forum 2018 F1-1 LAN LSTM 112 8610 2-1-1 163-8677 1-24-2 E-mail: aoi@ogl.is.ocha.ac.jp, oguchi@is.ocha.ac.jp, sane@cc.kogakuin.ac.jp,,.,,., LAN,. Android LAN,. LSTM LAN., LSTM, Analysis of Packet of
More information4 i
22 Quantum error correction and its simulation 1135071 2011 3 1 4 i Abstract Quantum error correction and its simulation Hiroko Dehare Researches in quantum information theory and technology, that mix
More informationITAOI2003第三屆離島資訊與應用研討會論文範例
2003 6 kung@mail.npust.edu.tw, b8956018@mail.npust.edu.tw, m9056011@mail.npust.edu.tw (Internet) and build up cache proxy servers. In this paper, we (Multi-media) design and development four proxy servers
More informationInstability of Aerostatic Journal Bearings with Porous Floating Bush at High Speeds Masaaki MIYATAKE *4, Shigeka YOSHIMOTO, Tomoaki CHIBA and Akira CH
Instability of Aerostatic Journal Bearings with Porous Floating Bush at High Speeds Masaaki MIYATAKE *4, Shigeka YOSHIMOTO, Tomoaki CHIBA and Akira CHIBA Department of Mechanical Engineering, Tokyo University
More informationVol. 41 No Fig. 1 SCS Data transmission network on SCS. HDTV H.261 RGB NTSC VSAT VSAT VSAT 1 HUB VSAT 8) 9) FECForward Error Correction HUB
Vol. 41 No. 10 Oct. 2000 SCS VSAT SCS VSAT VSAT 1.5 Mbps 1.3 Mbps Data-sharing on Inter-university Satellite Network Kikuo Asai, Noritaka Osawa, Kimio Kondo, Kiyohiro Yuki and Katsuaki Yoshida We developed
More information64 3 g=9.85 m/s 2 g=9.791 m/s 2 36, km ( ) 1 () 2 () m/s : : a) b) kg/m kg/m k
63 3 Section 3.1 g 3.1 3.1: : 64 3 g=9.85 m/s 2 g=9.791 m/s 2 36, km ( ) 1 () 2 () 3 9.8 m/s 2 3.2 3.2: : a) b) 5 15 4 1 1. 1 3 14. 1 3 kg/m 3 2 3.3 1 3 5.8 1 3 kg/m 3 3 2.65 1 3 kg/m 3 4 6 m 3.1. 65 5
More informationpaper.dvi
28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret
More informationJFE.dvi
,, Department of Civil Engineering, Chuo University Kasuga 1-13-27, Bunkyo-ku, Tokyo 112 8551, JAPAN E-mail : atsu1005@kc.chuo-u.ac.jp E-mail : kawa@civil.chuo-u.ac.jp SATO KOGYO CO., LTD. 12-20, Nihonbashi-Honcho
More informationuntitled
JAIS 1 2 1 2 In this paper, we focus on the pauses that partly characterize the utterances of simultaneous interpreters, and attempt to analyze the results of experiments conducted using human subjects
More informationIPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara
1 1,2 1 (: Head Mounted Display),,,, An Information Presentation Method for Wearable Displays Considering Surrounding Conditions in Wearable Computing Environments Masayuki Nakao 1 Tsutomu Terada 1,2 Masahiko
More information24 Depth scaling of binocular stereopsis by observer s own movements
24 Depth scaling of binocular stereopsis by observer s own movements 1130313 2013 3 1 3D 3D 3D 2 2 i Abstract Depth scaling of binocular stereopsis by observer s own movements It will become more usual
More information橡 PDF
* * ** * * Transport Information Service Realized with the Fleet Management ASP Kiyotaka KISHINO*Yasushi ISHIDA*Takumi FUSHIKI** Naohiko GONMORI* Hiroyuki NAKAGAWA* Abstract: Fleet management system utilizing
More information23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h
23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),
More information資料1-3
WPT (2017) ( ) *JST Center of Innovation ( 13- ) Last 5X * 16 8, 15 7, 14 6 METLAB 16 20, 15 18 WPT * IEEE MTTS Wireless Power Transfer Conference ( 11-, ) MTTS TC-26 (Wireless Energy Transfer and Conversion
More informationIHI Robust Path Planning against Position Error for UGVs in Rough Terrain Yuki DOI, Yonghoon JI, Yusuke TAMURA(University of Tokyo), Yuki IKEDA, Atsus
IHI Robust Path Planning against Position Error for UGVs in Rough Terrain Yuki DOI, Yonghoon JI, Yusuke TAMURA(University of Tokyo), Yuki IKEDA, Atsushi UMEMURA, Yoshiharu KANESHIMA, Hiroki MURAKAMI(IHI
More information3_23.dvi
Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems
More informationIEEE ax:第 6 世代の Wi-Fi テクニカル ホワイト ペーパー
IEEE 802.11ax 6 Wi-Fi 1 6 Wi-Fi IEEE 802.11ax 802.11ac IEEE 802.11ax LTE IEEE 802.11ax LAN WLAN Wi-Fi IEEE 802.11ax LAN 4K Ultra HD Internet of Things IoT 802.11ac IoT IEEE 802.11ax 3 1024 QAM 35% OFDMA
More informationuntitled
1 2 1.1................................. 4 2 1 2.1................................... 1 2.2 CSMA....................................... 1 2.3 CSMA/CD.................................... 3 2.4 CSMA/CA....................................
More information