{"created":"2021-03-01T06:07:07.019231+00:00","id":3363,"links":{},"metadata":{"_buckets":{"deposit":"4211401f-9a58-4f85-9da9-23edebf3877a"},"_deposit":{"id":"3363","owners":[],"pid":{"revision_id":0,"type":"depid","value":"3363"},"status":"published"},"_oai":{"id":"oai:niigata-u.repo.nii.ac.jp:00003363","sets":["423:424:425","453:454"]},"item_5_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"Analysis of Communication Traffic Characteristics of a Cellular System with Ad-hoc Networking"}]},"item_5_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2002-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"12","bibliographicPageEnd":"2072","bibliographicPageStart":"2063","bibliographicVolumeNumber":"J85-B","bibliographic_titles":[{"bibliographic_title":"電子情報通信学会論文誌. B, 通信"},{"bibliographic_title":"電子情報通信学会論文誌. B, 通信","bibliographic_titleLang":"en"}]}]},"item_5_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"セルラ方式ではすべての通信が基地局を介して行われるが,端末が建物の陰のなどのデッドスポットに入った場合,基地局と通信することができなくなることがある.本論文では,このような場合に,別の端末がデッドスポットに入った端末と基地局との間の通信を中継するアドホックリレー方式を検討し,その通信トラヒック特性を表す理論式を導く.この理論式の計算例から,端末の通信能力が比較的小さな場合でも,アドホックな中継により呼損率が改善され,運ばれる呼量も改善できることを示す.また,シミュレーションにより中継が二段だけで十分な場合があることを示す.これは上記理論式により多段中継の場合の通信トラヒック特性を推定できることを意味すると考えられる.","subitem_description_type":"Abstract"}]},"item_5_full_name_3":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"42346","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Tanaka, Akio"}]},{"nameIdentifiers":[{"nameIdentifier":"5597","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Nakano, Keisuke"}]},{"nameIdentifiers":[{"nameIdentifier":"42348","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Sengoku, Masakazu"}]},{"nameIdentifiers":[{"nameIdentifier":"5445","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Shinoda, Shoji"}]}]},"item_5_publisher_7":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"電子情報通信学会"}]},"item_5_relation_31":{"attribute_name":"異版である","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"http://www.ieice.org/jpn/trans_online/","subitem_relation_type_select":"URI"}},{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"http://ci.nii.ac.jp/naid/110003170284","subitem_relation_type_select":"URI"}}]},"item_5_rights_15":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Copyright©2002 IEICE"},{"subitem_rights":"本文データは学協会の許諾に基づきCiNiiから複製したものである"}]},"item_5_select_19":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_select_item":"publisher"}]},"item_5_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11325909","subitem_source_identifier_type":"NCID"}]},"item_5_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"13444697","subitem_source_identifier_type":"ISSN"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"田中, 皙男"}],"nameIdentifiers":[{"nameIdentifier":"42342","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"中野, 敬介"}],"nameIdentifiers":[{"nameIdentifier":"5597","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"仙石, 正和"}],"nameIdentifiers":[{"nameIdentifier":"42344","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"篠田, 庄司"}],"nameIdentifiers":[{"nameIdentifier":"5445","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-07-30"}],"displaytype":"detail","filename":"110003170284.pdf","filesize":[{"value":"769.3 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"110003170284.pdf","url":"https://niigata-u.repo.nii.ac.jp/record/3363/files/110003170284.pdf"},"version_id":"55539b08-fd72-4488-8cc4-ec17c53182a6"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"アドホックネットワーク","subitem_subject_scheme":"Other"},{"subitem_subject":"セルラ方式","subitem_subject_scheme":"Other"},{"subitem_subject":"ネットワーク","subitem_subject_scheme":"Other"},{"subitem_subject":"通信トラヒック","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"アドホックネットワーキングを適用したセルラシステムのトラヒック特性の解析(無線アドホックネットワーク技術論文特集)","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"アドホックネットワーキングを適用したセルラシステムのトラヒック特性の解析(無線アドホックネットワーク技術論文特集)"},{"subitem_title":"アドホックネットワーキングを適用したセルラシステムのトラヒック特性の解析(無線アドホックネットワーク技術論文特集)","subitem_title_language":"en"}]},"item_type_id":"5","owner":"1","path":["454","425"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-06-08"},"publish_date":"2012-06-08","publish_status":"0","recid":"3363","relation_version_is_last":true,"title":["アドホックネットワーキングを適用したセルラシステムのトラヒック特性の解析(無線アドホックネットワーク技術論文特集)"],"weko_creator_id":"1","weko_shared_id":null},"updated":"2022-12-15T03:36:29.403600+00:00"}