28 results on '"Hiromi Okada"'
Search Results
2. Mobile Terminal Substitution of Vehicular Collision Avoidance Support System (VCASS) for Non-VCASS Vehicles: S-VCASS
- Author
-
Tetsuya Maruoka, Hiromi Okada, Tomotaka Wada, Haokun Wang, and Shinji Nakai
- Subjects
business.industry ,Computer science ,Applied Mathematics ,Substitution (logic) ,Real-time computing ,Computer Graphics and Computer-Aided Design ,Terminal (electronics) ,Embedded system ,Signal Processing ,Wireless lan ,Global Positioning System ,Support system ,Electrical and Electronic Engineering ,business ,Collision avoidance - Abstract
In this paper, we develop a VCASS substitution system (S-VCASS) using a personal mobile terminal in order to improve the effectiveness of VCASS in an environment comprising both VCASS and non-VCASS vehicles. We propose three new pedestrian state judgment algorithms that can be implemented on a personal mobile terminal for inter-vehicle communications. We evaluate the performances of the three proposed algorithms with real vehicles. Finally, we show that the proposed algorithms can recognize vehicles without VCASS.
- Published
- 2011
- Full Text
- View/download PDF
3. A Novel Communication Range Recognition (CRR) Scheme for Spatial Localization of Passive RFID Tags
- Author
-
Hiromi Okada, Norie Uchitomi, Toshihiro Hori, Tomotaka Wada, Yuuki Ota, and Kouichi Mutsuura
- Subjects
Scheme (programming language) ,Computer science ,business.industry ,Applied Mathematics ,Real-time computing ,Mobile robot ,Computer Graphics and Computer-Aided Design ,Range (mathematics) ,Hardware_GENERAL ,Embedded system ,Signal Processing ,Robot ,Radio-frequency identification ,Spatial localization ,Electrical and Electronic Engineering ,business ,computer ,computer.programming_language - Abstract
RFID (Radio Frequency Identification) technology is expected to be used as a localization tool. By the localization of RFID tags, a mobile robot equipped with an RFID reader can recognize the surrounding environment. In this paper, we propose a novel effective scheme called the communication range recognition (CRR) scheme for localizing RFID tags. In this scheme, an RFID reader determines the boundaries of the communication range when it is appropriately positioned by the robot. We evaluate the estimated position accuracy through numerous experiments. We show that the moving distance of the RFID reader in the proposed scheme is lower than that in conventional schemes.
- Published
- 2010
- Full Text
- View/download PDF
4. Pedestrian Oriented Vehicular Collision Avoidance Support System: P-VCASS
- Author
-
Hiromi Okada, Kazushi Fujimoto, Yuki Nakanishi, Ryohta Yamaguchi, and Tomotaka Wada
- Subjects
Injury control ,business.industry ,Computer science ,Applied Mathematics ,Real-time computing ,Poison control ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Pedestrian ,Collision ,Computer Graphics and Computer-Aided Design ,Power consumption ,Signal Processing ,Global Positioning System ,Support system ,Electrical and Electronic Engineering ,business ,Simulation ,Collision avoidance ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
In recent years, researchers have studied extensively about vehicle collision avoidance. The authors have developed Vehicular Collision Avoidance Support System (VCASS) based on IVC in order to prevent a vehicular collision beforehand. The system grasps the relative locations of vehicles by exchanging the GPS information in each vehicle. Then the system warns drivers if it detects some danger of collision. VCASS can drastically reduce the potential accidents of vehicular collisions. However, VCASS can not avoid collisions between vehicles and pedestrians, but avoid collisions just between vehicles. About 30% of fatal accidents by vehicles are happened with pedestrians in Japan. So it is necessary to develop a new system for pedestrians. This paper deals with collision avoidance between pedestrians and vehicles. There are two problems to develop such system. First it is necessary to reduce the power consumption of the pedestrian terminal, because pedestrian terminals have small-sized battery compared with vehicles. Second it is necessary to consider the movement characteristic of the pedestrian. In this paper, we propose a new Pedestrian-Vehicular Collision Avoidance Support System (P-VCASS) which extends VCASS. P-VCASS solves above two problems. We show the validity of the proposed system by experiments using some vehicles.
- Published
- 2010
- Full Text
- View/download PDF
5. A Multi-Sensing-Range Method for Efficient Position Estimation by Passive RFID Technology
- Author
-
Hiromi Okada, Norie Uchitomi, Toshihiro Hori, Kouichi Mutsuura, and Tomotaka Wada
- Subjects
business.industry ,Computer science ,Applied Mathematics ,Real-time computing ,Probabilistic logic ,Object (computer science) ,Computer Graphics and Computer-Aided Design ,Range (mathematics) ,Identification (information) ,Hardware_GENERAL ,Position (vector) ,Embedded system ,Signal Processing ,Robot ,Electrical and Electronic Engineering ,business ,Tag system - Abstract
The RFID tag system has received attention as an identification source. Each RFID tag is attached to some object. With the unique ID of the RFID tag, a user identifies the object provided with the RFID tag, and derives appropriate information about the object. One of important applications of the RFID technology is the position estimation of RFID tags. It can be very useful to acquire the location information concerning the RFID tags. It can be applied to navigation systems and positional detection systems for robots etc. In this paper, we propose a new position estimation method of RFID tags by using a probabilistic approach. In this method, mobile objects (person and robot, etc.) with RFID readers estimate the positions of RFID tags with multiple communication ranges. We show the effectiveness of the proposed method by computer simulations.
- Published
- 2009
- Full Text
- View/download PDF
6. An Adaptive Likelihood Distribution Algorithm for the Localization of Passive RFID Tags
- Author
-
Hiromi Okada, Toshihiro Hori, Tomotaka Wada, Yuuki Ota, Kouichi Mutsuura, and Taiki Onishi
- Subjects
Scheme (programming language) ,business.industry ,Computer science ,Applied Mathematics ,Real-time computing ,Navigation system ,Mobile robot ,Computer Graphics and Computer-Aided Design ,Estimation of distribution algorithm ,Hardware_GENERAL ,Signal Processing ,Radio-frequency identification ,Position error ,Electrical and Electronic Engineering ,Signal intensity ,business ,computer ,computer.programming_language - Abstract
The RFID (Radio Frequency IDentification) tag technology is expected as a tool of localization. By the localization of RFID tags, a mobile robot which installs in RFID readers can recognize surrounding environments. In addition, RFID tags can be applied to a navigation system for walkers. In this paper, we propose an adaptive likelihood distribution scheme for the localization of RFID tags. This method adjusts the likelihood distribution depending on the signal intensity from RFID tags. We carry out the performance evaluation of estimated position error by both computer simulations and implemental experiments. We show that the proposed system is more effective than the conventional system.
- Published
- 2008
- Full Text
- View/download PDF
7. A Cost-Effective Dynamic Content Migration Method in CDNs
- Author
-
Hiroyuki Ebara, Hiromi Okada, Kazuya Sakai, Tomoya Tsutsui, Daisuke Ikeda, Yasutomo Abe, and Akiko Nakaniwa
- Subjects
dynamic content allocation ,shortest path ,Internet ,Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,Real-time computing ,Control reconfiguration ,Dynamic web page ,Load balancing (computing) ,content migration ,Shortest path problem ,Scalability ,content distribution network (CDN) ,The Internet ,Electrical and Electronic Engineering ,business ,Software - Abstract
Content Distribution Networks (CDNs) are highly advanced architectures for networks on the Internet, providing low latency, scalability, fault tolerance, and load balancing. One of the most important issues to realize these advantages of CDNs is dynamic content allocation to deal with temporal load fluctuation, which provides mirroring of content files in order to distribute user accesses. Since user accesses for content files change over time, the content files need to be reallocated appropriately. In this paper, we propose a cost-effective content migration method called the Step-by-Step (SxS) Migration Algorithm for CDNs, which can dynamically relocate content files while reducing transmission cost. We show that our method maintains sufficient performance while reducing cost in comparison to the conventional shortest-path migration method. Furthermore, we present six life cycle models of content to consider realistic traffic patterns in our simulation experiments. Finally, we evaluate the effectiveness of our SxS Migration Algorithm for dynamic content reconfiguration across time.
- Published
- 2005
8. Vehicular-Collision Avoidance Support System (VCASS) by Inter-Vehicle Communications for Advanced ITS
- Author
-
Jumpei Ueki, Hiromi Okada, Sentarou Tasaka, and Yuji Hatta
- Subjects
business.industry ,Wireless ad hoc network ,Computer science ,Applied Mathematics ,Real-time computing ,Automotive industry ,Intelligent decision support system ,Mobile ad hoc network ,Collision ,Computer Graphics and Computer-Aided Design ,Signal Processing ,Global Positioning System ,Support system ,Electrical and Electronic Engineering ,business ,Collision avoidance ,Simulation - Abstract
In advanced ITS, on-board intelligent systems by the Inter-Vehicle Communications (IVC) is essential technology to achieve a safe automotive society. We aim to avoid the vehicular collisions under almost all situations such as intersections, highways, and blind corners by using IVC technology through wireless ad hoc networks. The objectives of this paper are to develop Vehicular Collision Avoidance Support System (VCASS), and to show its performance by various experiments with two real vehicles. We have installed personal computers, telecommunication equipments, and GPS in two vehicles. In this system, the vehicles exchange the location information and the velocity vectors by the UDP broadcast with each other, and calculate the relative position/speed. The vehicles make the warning for drivers with the possibility of the collision. We verify the validity and the effectiveness of VCASS by the experiments.
- Published
- 2005
- Full Text
- View/download PDF
9. Novel vehicle information acquisition method using vehicle code for automotive infrared laser radar
- Author
-
Kentaro Tsudaka, Tomotaka Wada, Yusuke Shikiji, Hiromi Okada, and Keita Watari
- Subjects
business.industry ,Computer science ,Reading (computer) ,Real-time computing ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Automotive industry ,Image processing ,Radar lock-on ,Signal ,law.invention ,Man-portable radar ,law ,Code (cryptography) ,Radar ,business ,Simulation - Abstract
In recent years, transportation convenience is improved significantly by the spread of the automobile. However, traffic violation vehicles passing on the signal, hit-and-run, etc. are increasing with the increase of vehicles. To track a violation vehicle, recognition systems of the license plate using the image processing technology and cameras have been developed. However this system becomes expensive and complicated. To solve these problems, we have proposed a recognition method of the vehicle code using infrared laser radar. We set up a one-dimensional code created by reflectors on the vehicle, and acquire the vehicle information by reading the vehicle code by infrared laser radar. It can be constructed inexpensive system by using infrared laser radar. However, there is a problem that the number of code patterns is small, so the system cannot accommodate too many vehicles. In this paper, we propose a new code recognition method using time-sequence processing for infrared laser radar. We create a two-dimensional code by setting different type reflectors on vertical positions. Thereby we increase the number of code patterns. Through experiments, we demonstrate the effectiveness of the proposed method.
- Published
- 2014
- Full Text
- View/download PDF
10. Vehicular information acquisition scheme using subdivided reflector code for infrared radar
- Author
-
Tomotaka Wada, Yusuke Shikiji, Takashi Kunihiro, Hiroki Yasuhara, and Hiromi Okada
- Subjects
business.industry ,Infrared ,Computer science ,Pulse-Doppler radar ,Real-time computing ,Reflector (antenna) ,Fire-control radar ,Radar lock-on ,Air traffic control radar beacon system ,law.invention ,Continuous-wave radar ,Bistatic radar ,Man-portable radar ,Radar engineering details ,law ,Radar imaging ,3D radar ,Radar ,Telecommunications ,business - Abstract
We have proposed a simple vehicular information acquisition scheme using infrared radar and reflector code in order to recognize vehicle information with low cost. However, since the size of the reflector code is so large and the number of code patterns is not so large, it is necessary to reduce the size and increase the patterns in order to be attached with vehicles. So we propose a new scheme using subdivided reflector code.
- Published
- 2014
- Full Text
- View/download PDF
11. A quantitative evaluation for the introduction of quasi-synchronous transfer mode method on the asynchronous transfer mode network
- Author
-
Miki Yamamoto, Hiromi Okada, Noriaki Kamiyama, and Hideki Tode
- Subjects
Subframe ,Transmission (telecommunications) ,Computer Networks and Communications ,Computer science ,Quality of service ,Asynchronous Transfer Mode ,Real-time computing ,Electronic engineering ,Transfer mode ,Call setup ,Software_PROGRAMMINGTECHNIQUES ,Electrical and Electronic Engineering - Abstract
The quasi-synchronous transfer mode (Q-STM) method realizes cell-loss free and intranetwork delay jitter-free transmission on asynchronous transfer mode network, by allocating transmitted cell positions. In this paper, some design issues of the Q-STM method are considered and the applicability of the Q-STM method is investigated. First, the algorithms of the call setup procedure for Q-STM are compared. The effect of the number of subframes (NS) is investigated, and the most efficient NS in an assumed environment is obtained. Moreover, the QOS of ATM service class and processing time of a call setup are evaluated. Through these evaluations, we show guidelines for implementing the Q-STM and the applicability of the Q-STM.
- Published
- 1996
- Full Text
- View/download PDF
12. A new indoor position estimation method of RFID tags for continuous moving navigation systems
- Author
-
Yuki Oda, Tomotaka Wada, Daiki Tsukuda, Emi Nakamori, Hiromi Okada, Manato Fujimoto, and Kouichi Mutsuura
- Subjects
Computer science ,business.industry ,Estimation theory ,Real-time computing ,Mobile robot ,Hardware_GENERAL ,Position (vector) ,Embedded system ,Global Positioning System ,Radio-frequency identification ,Robot ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,business ,Human society ,Position control - Abstract
The RFID (Radio Frequency Identification) is considered as one of the most preferable ways for the position estimation in indoor environments, since GPS does not work in such situations. In RFID system, an RFID reader enables to estimate the position of RFID tags easily and inexpensively. In applications with the position estimation of RFID tags, indoor robot navigations are very important for human society. The problem is how to obtain the position estimations of RFID tags as accurately as possible.
- Published
- 2012
- Full Text
- View/download PDF
13. Dual Type Communication Range Recognition Method (D-CRR) for Indoor Position Estimation of Passive RFID Tags
- Author
-
Emi Nakamori, Kouichi Mutsuura, Atsuki Inada, Manato Fujimoto, Hiromi Okada, Yuki Oda, and Tomotaka Wada
- Subjects
Engineering ,business.industry ,Real-time computing ,Navigation system ,Mobile robot ,Directivity ,Dual (category theory) ,Identification (information) ,Hardware_GENERAL ,Position (vector) ,Electronic engineering ,Radio-frequency identification ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Antenna (radio) ,business - Abstract
Recently, the radio frequency identification (RFID) system is paid attention as an identification source that can realize a ubiquitous environment. One of the important technologies that apply the RFID system is the indoor position estimation of RFID tags. For example, it can be applied to an indoor navigation system for handicapped person and recognition of ambient environment by a mobile robot, etc. In this paper, we propose a new positional estimation method to estimate the RFID tag position by using the tune of the antenna directivity of the RFID reader (D-CRR). This method controls the directivity of the antenna by dynamically changing the distance between the antenna elements of the RFID reader. We show the effectiveness of the proposed method by computer simulations.
- Published
- 2012
- Full Text
- View/download PDF
14. Sliding-Typed Communication Range Recognition Method for Indoor Position Estimation in Passive RFID Systems
- Author
-
Yuki Oda, Hiromi Okada, Emi Nakamori, Tomotaka Wada, Atsuki Inada, Kouichi Mutsuura, and Manato Fujimoto
- Subjects
Hardware_GENERAL ,business.industry ,Computer science ,Embedded system ,Real-time computing ,Navigation system ,Radio-frequency identification ,Radio navigation ,business - Abstract
RFID (Radio Frequency Identification) systems have become meaningful as a new identification source that is applicable in ubiquitous environments. Each RFID tag has a unique ID, and is attached to an object. A user reads the unique ID of an RFID tag with RFID readers and obtains the information of the object. One of the most important technologies that use the RFID system is the position estimation of RFID tags. The position estimation means to estimates the location of the object with the RFID tag. It is very useful to acquire the location information of RFID tag. If a user understands the position of the RFID tag, a new navigation system for persons in complex buildings. In this paper, we propose a new method for accurate indoor position estimation of passive RFID systems named as the Sliding-Typed CRR method. In this method, the position of an RFID tag is estimated by using S-CRR (Swift Communication Range Recognition) method. The proposed method is capable of accurate position estimation in any directions of RFID tags.
- Published
- 2011
- Full Text
- View/download PDF
15. A Novel Method for Position Estimation of Passive RFID Tags; Swift Communication Range Recognition (S-CRR) Method
- Author
-
Hiromi Okada, Tomotaka Wada, Manato Fujimoto, Atsuki Inada, Kouichi Mutsuura, and Norie Uchitomi
- Subjects
Swift ,business.industry ,Computer science ,Real-time computing ,Navigation system ,Object (computer science) ,Identification (information) ,Hardware_GENERAL ,Position (vector) ,Embedded system ,Range (statistics) ,Radio-frequency identification ,business ,computer ,computer.programming_language - Abstract
The RFID (Radio Frequency IDentification) system is paid attention to as a new identification source that achieves a ubiquitous environment. Each RFID tag has the unique ID, and is attached to some object. A user reads the unique ID of a RFID tag with RFID readers and obtains the information on the object. One of the most important technologies that use the RFID system is the position estimation of RFID tags. The position estimation means to estimates the location of the object with the RFID tag. It can be very useful to acquire the location information of RFID tag. If a user can understand the position of the RFID tag, the position estimation can be applied to a navigation system for walkers. In this paper, we propose a new method named as Swift Communication Range Recognition (S-CRR) method as an extended improvement of the previous CRR method on the estimation delay. In this method, the position of RFID tag is estimated by selecting the communication area model which corresponds to those boundary angles. We carry out the performance evaluation by the experiments of RFID system and show the effectiveness of S-CRR for position estimation.
- Published
- 2010
- Full Text
- View/download PDF
16. Accurate indoor position estimation by Swift-Communication Range Recognition (S-CRR) method in passive RFID systems
- Author
-
Manato Fujimoto, Hiromi Okada, Atsuki Inada, Tomotaka Wada, Kouichi Mutsuura, and Norie Uchitomi
- Subjects
Swift ,business.industry ,Computer science ,Real-time computing ,Mobile robot ,Object (computer science) ,Identification (information) ,Hardware_GENERAL ,Position (vector) ,Embedded system ,Radio-frequency identification ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,business ,computer ,Range (computer programming) ,computer.programming_language - Abstract
RFID (Radio Frequency IDentification) systems have become meaningful as a new identification source that is applicable in ubiquitous environments. Each RFID tag has a unique ID, and is attached to some object. A user reads the unique ID of a RFID tag with RFID readers and obtains the information on the object.
- Published
- 2010
- Full Text
- View/download PDF
17. Prioritized resolvable-contention-ring access control scheme
- Author
-
Sadao Maekawa, Hiromi Okada, Yoshikazu Tezuka, and Suvepon Sittichivapak
- Subjects
Priority inheritance ,Transmission (telecommunications) ,Computer Networks and Communications ,Computer science ,Frame (networking) ,Real-time computing ,Fiber Distributed Data Interface ,Electrical and Electronic Engineering ,Security token ,Priority ceiling protocol ,Deadline-monotonic scheduling ,Buffer overflow - Abstract
This paper proposes a prioritized resolvable-contention-ring scheme for high-speed optical communication networks and investigates its performance. The priority mechanism is based on the time-token control scheme. This mechanism attempts to guarantee the frame delay of time-critical traffic by controlling the frame transmission of noncritical traffic. The noncritical frame can be transmitted only if token rotation time is faster than target rotation time. This paper examines the priority mechanism in the case of two priority levels and also in the case of four priority levels. System performance is studied using a computer simulation method with a time-continuous simulator. The validity of the priority mechanism is demonstrated in a comparison with a fiber distributed data interface (FDDI) and the nonprioritized resolvable-contention ring. Efficient operation of the priority mechanism is investigated by considering the buffer overflow rate of each priority class. The proposed scheme performs effectively. Moreover, the performance of FDDI is comparatively degraded because of long token waiting time and large token capture time.
- Published
- 1992
- Full Text
- View/download PDF
18. Slotted aloha with PCT (power control during transmission) scheme using capture effect
- Author
-
Kazuhiro Ohtsuki, Hiromi Okada, Kouichi Mutsuura, and Yoshikazu Tezuka
- Subjects
Transmission delay ,Transmission (telecommunications) ,Computer Networks and Communications ,Aloha ,Computer science ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,Throughput ,Electrical and Electronic Engineering ,Transmission time ,Capture effect ,Synchronization - Abstract
This paper proposes two new access protocols, wherein the power control during transmission (PCX) scheme attempts improvement of the throughput by capture effect; this scheme is applied to s-ALOHA. Either method solves the problem of contradiction between the packet transmission time difference required in PCT scheme and the synchronized transmission as the basic requirement in PCT scheme and the synchronized transmission as the basic requirement in s-ALOHA. The first protocol is the s-ALOHA with capture interval (s-ALOHA/CI), which is concerned with the fixed-length packet format. A capture interval is provided in the first part of the slot, wherein the transmission time is selected at random to provide the transmission time difference. The second protocol is s-ALOHA with tail synchronization (s-ALOHA/TS), which is concerned with the variable-length packet format. Utilizing the variable-length property, the tail of the packet is synchronized to the tail of the slot and the packet is transmitted. Then the packet length difference produces the transmission time difference. It is verified through evaluation by analysis and simulation that the throughput performance of traditional s-ALOHA is greatly improved in either protocol by the capture effect. Especially, in contrast to the deterioration of the effective throughput of the traditional s-ALOHA due to the slot loss, it is verified that the performance of s-ALOHA/TS is better than that of the fixed-length packet scheme. These high-performance protocols will serve as a powerful means of realizing the effective operation of VSAT network, etc., with the synchronization function.
- Published
- 1992
- Full Text
- View/download PDF
19. A Novel Scheme for Spatial Localization of Passive RFID Tags; Communication Range Recognition (CRR) Scheme
- Author
-
Tomotaka Wada, Kouichi Mutsuura, Toshihiro Hori, Hiromi Okada, Norie Uchitomi, and Yuuki Ota
- Subjects
Scheme (programming language) ,business.industry ,Position (vector) ,Computer science ,Embedded system ,Real-time computing ,Robot ,Navigation system ,Radio-frequency identification ,Mobile robot ,business ,computer ,computer.programming_language - Abstract
The RFID (Radio Frequency IDentification) tag is expected to be used as a tool of localization. With the localization of RFID tags, a mobile robot with an installed RFID reader can recognize the surrounding environment. In addition, it can be applied to a navigation system for walkers. In this paper, we propose a new scheme named Communication Range Recognition (CRR) in order to localize RFID tags effectively. In this scheme, the RFID reader finds the edges of the communication range when its position is moved appropriately by the robot. We evaluate the performance of the estimated position error through numerous experiments. We show that our proposed scheme can reduce the moving distance of the RFID reader without degrading the accuracy of localization in comparison with the conventional schemes.
- Published
- 2009
- Full Text
- View/download PDF
20. A Novel localization scheme for passive RFID tags; Communication Range Recognition (CRR)
- Author
-
Toshihiro Hori, Hiromi Okada, Norie Uchitomi, Kouichi Mutsuura, Yuuki Ota, and Tomotaka Wada
- Subjects
Scheme (programming language) ,Engineering ,business.industry ,Real-time computing ,Azimuth ,Range (mathematics) ,Position (vector) ,Electronic engineering ,Robot ,Radio-frequency identification ,Detection theory ,Antenna (radio) ,business ,computer ,computer.programming_language - Abstract
This paper focuses on the localization technology of passive RFID (Radio Frequency IDentification) tags. By this technology, we will be able to detect some target, to get information on it, and to find the position and the distance of it. This paper proposes a novel scheme named Communication Range Recognition (CRR) in order to localize RFID tags effectively. This scheme finds the edges of the communication range of the RFID reader antenna when its position is moving by the robot appropriately. We evaluate the performance of the estimated position error through numerous experiments. We show that our proposed scheme can reduce the moving distance of the RFID reader without degrading the accuracy of localization in comparison with the conventional schemes.
- Published
- 2009
- Full Text
- View/download PDF
21. Novel Closed-Loop Flow Controls Based on Virtual Path Concept in OBS Networks
- Author
-
Hiromi Okada, Young-Bok Choi, Yugo Ikeda, Yoshihiro Nishino, and Ryosuke Takahashi
- Subjects
Flow control (data) ,Optical fiber ,business.industry ,Computer science ,Real-time computing ,Optical burst switching ,Optical switch ,law.invention ,Burst switching ,law ,Wavelength-division multiplexing ,The Internet ,business ,Closed loop ,Computer network - Abstract
Optical Burst Switching (OBS) has been proposed to realize the next generation Internet on the Wavelength Division Multiplexing (WDM) network technology. Optical Burst Switching is an ultra high speed switching technology for optical fiber networks but has the data burst contention problem. In this paper, we introduce Virtual Path (VP) concept addressing burst contention resolutions in OBS networks. We propose two novel flow control schemes, named Static Inter Arrival Time Flow Control (S-IAT) and Dynamic Inter Arrival Time Flow Control (D-IAT). S-IAT keeps the data burst contention rat e in an acceptable level on OBS networks. Based on S-IAT, D-IAT achieves almost the same data burst contention rate and higher throughput than S-IAT by using the data burst loss rate threshold. We will show the availability of proposed schemes by computer simulations.
- Published
- 2009
- Full Text
- View/download PDF
22. A Multi-Sensing-Range Method for Position Estimation of Passive RFID Tags
- Author
-
T. Wda, Yuuki Ota, Hiromi Okada, K. Mutsuura, Norie Uchitomi, and Toshihiro Hori
- Subjects
Robot kinematics ,business.industry ,Computer science ,Real-time computing ,Probabilistic logic ,Mobile robot ,Object (computer science) ,Identification (information) ,Hardware_GENERAL ,Position (vector) ,Embedded system ,Robot ,business ,Tag system - Abstract
Recently, the RFID tag system is paid attention to as an identification source. Each RFID tag is attached to some object. With the unique ID of RFID tag, a user identifies the object provided with the RFID tag, and derives appropriate information about the object. One of the important applications of RFID technology is the position estimation of RFID tags. It can be very useful to acquire the location information concerning the RFID tags. It can be applied to navigation systems and positional detection systems for robots etc. In this paper, we propose a new position estimation method of RFID tags by using a probabilistic approach. In this method, mobile objects (person and robot, etc) with RFID readers estimate the positions of RFID tags with plural communication ranges. We show the effectiveness of the proposed method by computer simulations.
- Published
- 2008
- Full Text
- View/download PDF
23. A new access scheme for pure aloha using capture effect by time-varying power control
- Author
-
Hiromi Okada, Yoshikazu Tezuka, Kouichi Mutsuura, and Kazuhiro Ohtuki
- Subjects
Computer Networks and Communications ,Computer science ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,Throughput ,Capture effect ,Power (physics) ,Packet switching ,Aloha ,Electronic engineering ,Electrical and Electronic Engineering ,Very-small-aperture terminal ,Power control - Abstract
The advent of VSAT (very small aperture terminal) has made it possible to consider a new utilization of satellite communication. This paper proposes a new access protocol v-ALOHA, which is matched to the characteristics of the packet switching network based on VSAT. p-ALOHA is used as a means to cope with the requirement for simplification. To complement its disadvantage of low through-put, a new control scheme is combined based on the new utilization. The performance is improved by the capture effect. The basic idea of the control scheme is to vary the power with time while transmitting packets. The difference in the transmission-start time is converted into the power difference and produces the capture effect, thereby improving the performance. Thus, an access protocol is realized which improves the low throughput of p-ALOHA while preserving its simplicity. This paper describes the basic idea of this v-ALOHA and the protocol structure, indicating qualitatively its features. Then the throughput performance is formulated through a quantitative analysis. It is shown from the numerical results for the fixed-length packet that the performance of the proposed scheme is better than other capture schemes, approaching sufficiently the performance of s-ALOHA. For the case of the variable-length packet, there is no slot loss as in s-ALOHA, and the proposed scheme is shown, using an example, to be better sometimes than s-ALOHA.
- Published
- 1990
- Full Text
- View/download PDF
24. Localization of passive RFID tags with robot using adaptive likelihood distribution algorithm
- Author
-
T. Onishi, Kouichi Mutsuura, Tomotaka Wada, Toshihiro Hori, Hiromi Okada, and Yuuki Ota
- Subjects
Scheme (programming language) ,Reflection (computer programming) ,Computer science ,business.industry ,Real-time computing ,Navigation system ,Mobile robot ,Radio navigation ,Estimation of distribution algorithm ,Hardware_GENERAL ,Embedded system ,Robot ,Radio-frequency identification ,business ,computer ,computer.programming_language - Abstract
The RFID (radio frequency identification) tag is expected as a tool of localization. By the localization of RFID tags, a mobile robot which installs in RFID readers can recognize surrounding environments. In addition, it can be applied to a navigation system for walkers. In this paper, we propose an adaptive likelihood distribution scheme for the localization of RFID tags. This method adjusts the likelihood distribution depending on the signal intensity from RFID tags. We carry out the performance evaluation of estimated position error by both computer simulations and implemental experiments.
- Published
- 2007
- Full Text
- View/download PDF
25. QoS Guaranteed Multi-Poll Access Scheme with Transmission Control over High Throughput Wireless LANs
- Author
-
T. Maekawa, Tomotaka Wada, Kouichi Mutsuura, H. Murata, and Hiromi Okada
- Subjects
business.industry ,Computer science ,Polling system ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,Wireless lan ,Bit rate ,The Internet ,Throughput ,Access control ,business ,Computer network - Abstract
Recently, we need high bit rate transmissions of the wireless LAN to access the internet at offices and houses. Multi-Poll access scheme has been proposed as an efficient access control scheme for these necessities. The scheme is a central control scheme using Polling system. In order to establish a high speed multimedia transmission, we need to integrate the required quality of services effectively. In this paper, we propose QoS (Quality of Service) guaranteed Multi-Poll access scheme for multimedia services in wireless LAN. We evaluate the transmission performances of the proposed scheme for effectiveness by computer simulations. We have clarified that the proposed scheme has the outstanding performances on the throughput, delay time, and frame drop rate comparing to the conventional scheme.
- Published
- 2007
- Full Text
- View/download PDF
26. Peak rate regulation scheme for ATM networks and its performance
- Author
-
Hiromi Okada, Chikara Ohta, Yoshikazu Tezuka, H. Toda, and Miki Yamamoto
- Subjects
Queueing theory ,Search engine ,Computer science ,Control theory ,Asynchronous Transfer Mode ,Real-time computing ,Network performance ,Interval (mathematics) ,Transmission time ,Queue - Abstract
Using the rate control to restrict the peak cell rate of traffic is addressed. The asynchronous transfer mode (ATM) environment is considered as a discrete-time environment in which one slot is equal to one cell transmission time. A rate control that can restrict the number of cells during any fixed-length time interval in a discrete-time environment is studied. The scheme is realized by means of simple counter accumulation per slot, and it is easy to synchronize with slots. The simplicity of this scheme may make possible the flexible restriction of the peak cell rate according to network conditions. The scheme is analyzed, using matrix analytic techniques, in order to investigate the smoothing effect of bursty traffic and the queue length required to satisfy a certain quality of cell loss probability. Numerical results show the effect of restricting the peak cell rate of bursty traffic and the tradeoff between the smoothing effect and the required queue length. >
- Published
- 2002
- Full Text
- View/download PDF
27. Slotted ALOHA with power assigning and immediate transmission controls
- Author
-
Hiromi Okada, Miki Yamamoto, Akira Ishida, T. Lorlertratna, and Kouichi Mutsuura
- Subjects
Computer science ,Network packet ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,Throughput ,Capture effect ,Power (physics) ,Transmission (telecommunications) ,Aloha ,Wireless ,business ,Communication channel ,Computer network - Abstract
Presents a new access control scheme for the wireless communication packet networks of variable packet length environment, s-ALOHA/PAIT (slotted ALOHA with power assigning and immediate transmission controls). The scheme improves channel throughput in two aspects, capture effect and reuse of vacant period of a slot. For reuse of vacant period of a slot, a packet can be transmitted immediately unless it overrides the slot boundary even though the timing is not at the beginning of the slot. It enables more than one packet to be transmitted successfully in a slot. Transmission power is varied to lead capture effect among packets transmitted at the beginning of a slot and also between a packet at the beginning of a slot and one transmitted in the middle of the same slot. The authors evaluate the performance of s-ALOHA/PAIT compared with the conventional s-ALOHA and show that s-ALOHA/PAIT obtains considerable improvement of the throughput performance. >
- Published
- 2002
- Full Text
- View/download PDF
28. Analysis on Memory Contentions in a Homogeneous Multiprocessor System
- Author
-
Yongjian Zhao, Sadao Maekawa, and Hiromi Okada
- Subjects
Computer science ,Real-time computing ,Markov process ,Symmetric multiprocessor system ,Multiprocessing ,Parallel computing ,Markov model ,Measure (mathematics) ,Theoretical Computer Science ,Power (physics) ,symbols.namesake ,Computational Theory and Mathematics ,Hardware and Architecture ,Homogeneous ,Simple (abstract algebra) ,symbols ,Computer Science::Operating Systems ,Information Systems - Abstract
The performance of a homogeneous multiprocessor system with common memory contentions is evaluated in this paper. A symmetric continuous-time Markovian queueing network model is developed and analyzed. The main result is that the average number of active processors, as an important performance measure, is derived and given by a very simple recursive formula. Using the result, several properties of the multiprocessor system are proved analytically. It is found that a profound performance measure defined as processing power saturation ratio is significant in the evaluation of multiprocessor systems. Some numerical examples are also available to verify the obtained results.
- Published
- 1988
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.