- Natural Language Processing Techniques
- Syntax, Semantics, Linguistic Variation
- Advanced Optical Network Technologies
- RFID technology advancements
- Software-Defined Networks and 5G
- Energy Harvesting in Wireless Networks
- Indoor and Outdoor Localization Technologies
- Speech and dialogue systems
- IoT and Edge/Fog Computing
- Network Traffic and Congestion Control
- Topic Modeling
- Cooperative Communication and Network Coding
- Molecular Communication and Nanonetworks
- Reinforcement Learning in Robotics
- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Mobile Agent-Based Network Management
- Network Time Synchronization Technologies
- Distributed and Parallel Computing Systems
- Advanced Algorithms and Applications
- Wireless Communication Networks Research
- Literature, Language, and Rhetoric Studies
- Age of Information Optimization
- Digital Transformation in Law
- Power Line Inspection Robots
NTT (Japan)
2002-2024
Tottori University
2006-2014
Tohoku University
2008-2009
Edge computing is a new paradigm to provide capability at the edge servers close end devices. A significant research challenge in finding efficient task offloading and cloud considering various characteristics limited network server resources. Several reinforcement learning (RL)-based task-offloading methods have been developed, because RL can immediately output by pre-learning. However, these do not take into account clouds or focus only on single cloud. They also bandwidth topology of...
Application layer multicast (ALM) is highly expected to replace IP multicasting as the new technological choice for content delivery. Depending on streaming application, ALM nodes will construct a tree and deliver stream through this tree. However, if node resides in leaves, it cannot its descendant nodes. In case, quality of service (QoS) be compromised dramatically. To overcome problem, topology-aware hierarchical arrangement graph (THAG) was proposed. By employing multiple description...
Radio frequency identification (RFID) enables everyday objects to be identified, tracked, and recorded. Because of expense, size, lifetime requirements, some simple active RFID tags are designed with only a transmitter. The transmitter-only unaware each other simply blink ID packets periodically. question is how we can read the enough confidence. paper models access protocol as pure ALOHA develops mathematical analysis identify tag blinks within interrogation zone without prior knowledge...
During the last several years, Internet has evolved from a wired infrastructure to hybrid of and wireless domains by spreading worldwide interoperability for microwave access (WiMAX), Wi-Fi, cellular networks. Therefore, there is growing need facilitate reliable content delivery over such heterogeneous On other hand, application layer multicast (ALM) become promising approach streaming media server large number interested nodes. ALM nodes construct tree deliver stream through this tree....
Edge computing is a new paradigm to provide capability at the edges close end devices. A significant research challenge in edge finding an efficient task offloading and cloud servers, considering various characteristics limited network server resources. Several studies have proposed reinforcement learning (RL) based method, because RL can immediately output by pre-learning. However, due performance problem of RL, these previous do not consider clouds or focus only on single cloud. They also...
Network functions virtualization (NFV) enables telecommunications service providers to realize various network services by flexibly combining multiple virtual (VNFs). To provide such services, an NFV control method should optimally allocate VNFs into physical networks and servers taking account of the combination(s) objective constraints for each metric defined VNF type, e.g., placements routes between VNFs. The also be extendable adding new metrics or changing combination metrics. One...
Network functions virtualization (NFV) enables telecommunications service providers to provide various network services by flexibly combining multiple virtual (VNFs). To such with carrier-grade quality, an NFV controller must optimally allocate VNFs into physical networks and servers, taking account combination(s) of objective constraints for each metric defined VNF type. The should also be extendable, i.e., new metrics able added. One approach control optimize allocations is construct...
Owing to the critical role of domain name system (DNS), its query log data are utilized for various network monitoring purposes. With diversification services, these have become increasingly complex, making mining useful information challenging. DNS can be considered as superposition two types communication patterns: groups domains accessed simultaneously (e.g., ad servers and content delivery (CDN) servers) time-series access patterns based on user behavior characteristics trends during...
Network services provisioning with Service Function Chaining (SFC) consists of various controls such as Virtual (VNF) placement and traffic flow routing, executed dynamically. These take time to execute from start completion (reconfiguration delay), the reconfiguration delay varies depending on type control. When control is a long eliminate Quality (QoS) degradation, it will longer complete, resulting in continued degradation. To optimize network performance, method needs consider difference...
Radio frequency identification (RFID) enables everyday objects to be identified, tracked, and recorded. This paper presents a design of N-ary pulse position modulation transmission-only active RFID system for monitoring large number high density objects. A burst frame from tag consists multiple duplicated blink units the interval between them is randomly selected predefined steps avoid continuous collision. The reader segments composite streams performs cross-correlation recover overlapped...
There exist distributed processing environments composed of many heterogeneous computers. It is required to schedule parallel processes in an appropriate manner. For the scheduling, prediction execution load a process effective exploit resources environments. We propose long-term methods with references properties and runtime predictions. Since method different according situation, we module selection select state changing CPU using neural network. also discuss about implementation system,...
Changes to business modelsChanges models means shifting from a standardized supply service model where carriers provide services through individual networks such as NGN (Next Generation Network), B2B2X (business-to-business-to-X) middle B operators can build businesses and according their needs by freely incorporating original value-added functions the base supplied carriers.Accommodating these changes requires that respond flexibly various operator promptly offer services.The technology...
Radio frequency identification (RFID) enables everyday objects to be identified, tracked, and recorded. Because of expense, size, lifetime requirements, some simple active RFID tags are designe...
Radio frequency identification (RFID) enables everyday objects to be identified, tracked, and recorded. Because of expense, size, lifetime requirements, some simple active RFID tags are designed with only transmitters. Transmission-only unaware each other simply blink ID packets periodically over a common channel. The question is what really happens: false alarm due consecutive collisions or missed object event? authors model the access transmission-only as pure ALOHA develop mathematical...
係り受け関係のついた大量のコーパスを元にして作成されたデータを対象として, 動詞の結合価に関する検討を行った.これは, 係り受け関係まで付与された大量データからなるコーパスが存在してはじめて可能となった分析である.動詞の結合価に関する検討は, 各動詞の基本的な格パターンに着目して結合価を決定することを中心として検討されてきた.しかし, 省略を含め, 結合価が実際の言語データでどういう形で出現しているかについて, 全容を示すようなものは報告されていない.ここでは, 大量のコーパスデータから作成した結合価データを用い, 実際のデータで動詞にかかる格助詞がどういうパターンで出ているのかを調査し, 格助詞パターンの出現状況を把握するとともに, それらの格助詞パターンを用いて同音異表記がどの程度判定できるかを検討した.動詞約12, 400概念 (表記の異なりレベルで約9, 400単語) から作成した動詞の格助詞組み合わせパターンは, 延べパターン数で37, 237パターン, 異なりパターンで188パターンとなった.また, 同音異表記セットについて, これらのパターンを用い,...
Mobile networks require high availability to provide reliable connectivity for various mobile services. Therefore, when a service outage occurs due base station (BS) failures, network operators need immediately resolve the effects of outage. Cell Outage Compensation (COC) is critical technology that resolves The COC method composed two steps: antenna selection from antennas neighboring BSs and optimization tilts selected coverage in area. Although most existing works on methods focus tilt...