Learn More
We propose a new ad-hoc routing protocol named “PD-OLSR”(Protocol Dependent-OLSR) which makes the best of UDP and TCP, based on separate routing tables for UDP and TCP. It also enables the route selection to avoid network congestion, considering traffic conditions of nodes. In this paper, we show summary of PD-OLSR and performance evaluation.(More)
In recent years, popularization of wireless sensor networks in various fields including smart houses and environment monitoring systems at factories has been expected. However, it is difficult to grasp the structure and connectivity of dynamically changing networks, because sensor networks are connected by radio waves with each other. For that reason, it(More)
Information and Communication Technology (ICT) has significantly changed lifestyle and educational environments more than we have ever envisioned. However, advancements in ICT have created gaps -- gaps between computer environments that students use at school and at home and gaps between computer usage of students and lecturers. We propose a cloud education(More)
We propose a robust scheme for detecting vehicles approaching from several directions to prevent crossing collisions. The scheme consists of three sequential operations. The first operation computes cross-power spectrum phase (CSP) coefficients of sound signals from a microphone array; the second operation classifies the information obtained by the CSP(More)
Information obtained through sensors and accumulated in wearable computers can be used as big data. To ensure the safety of this information, the security of wearable computers has become more important than ever before. However, the AES that has been widely used cannot be applied to wearable computers due to the size of the embedment area in those devices.(More)
Several measures against power analysis attacks have been proposed. A clock fluctuation LSI, which achieves tamper resistance against electromagnetic analysis attacks, is one of popular measures. The present study proposes an alignment method which can analyze the clock fluctuation LSI. The proposed method corrects a shift of power consumption waveforms in(More)
Power analysis attacks against lightweight ciphers are barely examined. Therefore, to verify the safety of lightweight ciphers in the future, it is important to investigate a method to verify tamper resistance against power analysis attacks. To verify the tamper resistance by performing a simulation, an extremely long processing time is required to obtain(More)
In this paper, we propose a symbol synchronizer applicable to multi-carrier spread-spectrum (MC-SS) packet communications. The performance of the synchronizer is evaluated in terms of false detection probability in the presence of additive white Gaussian noise (AWGN), and multi-path, and it is shown that the proposed synchronizer be robust against(More)