The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

2161-2180hit(42807hit)

  • Optical CDMA Scheme Using Generalized Modified Prime Sequence Codes and Extended Bi-Orthogonal Codes Open Access

    Kyohei ONO  Shoichiro YAMASAKI  Shinichiro MIYAZAKI  Tomoko K. MATSUSHIMA  

     
    PAPER-Spread Spectrum Technologies and Applications

      Pubricized:
    2021/03/08
      Vol:
    E104-A No:9
      Page(s):
    1329-1338

    Optical code-division multiple-access (CDMA) techniques provide multi-user data transmission services in optical wireless and fiber communication systems. Several signature codes, such as modified prime sequence codes (MPSCs), generalized MPSCs (GMPSCs) and modified pseudo-orthogonal M-sequence sets, have been proposed for synchronous optical CDMA systems. In this paper, a new scheme is proposed for synchronous optical CDMA to increase the number of users and, consequently, to increase the total data rate without increasing the chip rate. The proposed scheme employs a GMPSC and an extended bi-orthogonal code which is a unipolar code generated from a bipolar Walsh code. Comprehensive comparisons between the proposed scheme and several conventional schemes are shown. Moreover, bit error rate performance and energy efficiency of the proposed scheme are evaluated comparing with those of the conventional optical CDMA schemes under atmospheric propagation environment.

  • The Explicit Dual of Leander's Monomial Bent Function

    Yanjun LI  Haibin KAN  Jie PENG  Chik How TAN  Baixiang LIU  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2021/03/08
      Vol:
    E104-A No:9
      Page(s):
    1357-1360

    Permutation polynomials and their compositional inverses are crucial for construction of Maiorana-McFarland bent functions and their dual functions, which have the optimal nonlinearity for resisting against the linear attack on block ciphers and on stream ciphers. In this letter, we give the explicit compositional inverse of the permutation binomial $f(z)=z^{2^{r}+2}+alpha zinmathbb{F}_{2^{2r}}[z]$. Based on that, we obtain the dual of monomial bent function $f(x)={ m Tr}_1^{4r}(x^{2^{2r}+2^{r+1}+1})$. Our result suggests that the dual of f is not a monomial any more, and it is not always EA-equivalent to f.

  • Conditional Wasserstein Generative Adversarial Networks for Rebalancing Iris Image Datasets

    Yung-Hui LI  Muhammad Saqlain ASLAM  Latifa Nabila HARFIYA  Ching-Chun CHANG  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/06/01
      Vol:
    E104-D No:9
      Page(s):
    1450-1458

    The recent development of deep learning-based generative models has sharply intensified the interest in data synthesis and its applications. Data synthesis takes on an added importance especially for some pattern recognition tasks in which some classes of data are rare and difficult to collect. In an iris dataset, for instance, the minority class samples include images of eyes with glasses, oversized or undersized pupils, misaligned iris locations, and iris occluded or contaminated by eyelids, eyelashes, or lighting reflections. Such class-imbalanced datasets often result in biased classification performance. Generative adversarial networks (GANs) are one of the most promising frameworks that learn to generate synthetic data through a two-player minimax game between a generator and a discriminator. In this paper, we utilized the state-of-the-art conditional Wasserstein generative adversarial network with gradient penalty (CWGAN-GP) for generating the minority class of iris images which saves huge amount of cost of human labors for rare data collection. With our model, the researcher can generate as many iris images of rare cases as they want and it helps to develop any deep learning algorithm whenever large size of dataset is needed.

  • A Compact Digital Signature Scheme Based on the Module-LWR Problem Open Access

    Hiroki OKADA  Atsushi TAKAYASU  Kazuhide FUKUSHIMA  Shinsaku KIYOMOTO  Tsuyoshi TAKAGI  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/03/19
      Vol:
    E104-A No:9
      Page(s):
    1219-1234

    We propose a new lattice-based digital signature scheme MLWRSign by modifying Dilithium, which is one of the second-round candidates of NIST's call for post-quantum cryptographic standards. To the best of our knowledge, our scheme MLWRSign is the first signature scheme whose security is based on the (module) learning with rounding (LWR) problem. Due to the simplicity of the LWR, the secret key size is reduced by approximately 30% in our scheme compared to Dilithium, while achieving the same level of security. Moreover, we implemented MLWRSign and observed that the running time of our scheme is comparable to that of Dilithium.

  • Redactable Signature with Compactness from Set-Commitment

    Masayuki TEZUKA  Keisuke TANAKA  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/03/16
      Vol:
    E104-A No:9
      Page(s):
    1175-1187

    Redactable signature allows anyone to remove parts of a signed message without invalidating the signature. The need to prove the validity of digital documents issued by governments is increasing. When governments disclose documents, they must remove private information concerning individuals. Redactable signature is useful for such a situation. However, in most redactable signature schemes, to remove parts of the signed message, we need pieces of information for each part we want to remove. If a signed message consists of ℓ elements, the number of elements in an original signature is at least linear in ℓ. As far as we know, in some redactable signature schemes, the number of elements in an original signature is constant, regardless of the number of elements in a message to be signed. However, these constructions have drawbacks in that the use of the random oracle model or generic group model. In this paper, we construct an efficient redactable signature to overcome these drawbacks. Our redactable signature is obtained by combining set-commitment proposed in the recent work by Fuchsbauer et al. (JoC 2019) and digital signatures.

  • Optimal Basis Matrices of a Visual Cryptography Scheme with Meaningful Shares and Analysis of Its Security

    Kyohei SEKINE  Hiroki KOGA  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/03/16
      Vol:
    E104-A No:9
      Page(s):
    1235-1244

    The extended visual cryptography scheme (EVCS) proposed by Ateniese et al. is one of variations of the visual cryptography scheme such that a secret image is recovered by superimposition of certain qualified collections of shares, where cover images are visible on respective shares. In this paper, we give a new definition of the EVCS for improving visibility of the recovered secret image as well as the cover images. We formulate the problem to construct the basis matrices of the EVCS with the minimum pixel expansion as an integer programming problem. We solve the integer programming problem for general access structures with less than or equal to five participants and show that basis matrices with a smaller pixel expansion can be obtained for certain cases. We also analyze security of the EVCS meeting the new definition from an information-theoretic viewpoint. We give a condition under which any forbidden collection of shares does not reveal any additional information on not only a secret image but also the cover images that are not visible on the other shares.

  • Indoor Crowd Estimation Scheme Using the Number of Wi-Fi Probe Requests under MAC Address Randomization

    Yuki FURUYA  Hiromu ASAHINA  Masashi YOSHIDA  Iwao SASASE  

     
    PAPER-Information Network

      Pubricized:
    2021/06/18
      Vol:
    E104-D No:9
      Page(s):
    1420-1426

    As smartphones have become widespread in the past decade, Wi-Fi signal-based crowd estimation schemes are receiving increased attention. These estimation schemes count the number of unique MAC addresses in Wi-Fi signals, hereafter called probe requests (PRs), instead of counting the number of people. However, these estimation schemes have low accuracy of crowd estimation under MAC address randomization that replaces a unique MAC address with various dummy MAC addresses. To solve this problem, in this paper, we propose an indoor crowd estimation scheme using the number of PRs under MAC address randomization. The main idea of the proposed scheme is to leverage the fact that the number of PRs per a unit of time changes in proportion to the number of smartphones. Since a smartphone tends to send a constant number of PRs per a unit of time, the proposed scheme can estimate the accurate number of smartphones. Various experiment results show that the proposed scheme reduces estimation error by at most 75% compared to the conventional Wi-Fi signal-based crowd estimation scheme in an indoor environment.

  • Dynamic Terminal Connection Control Using Multi-Radio Unlicensed Access for 5G Evolution and Beyond

    Toshiro NAKAHIRA  Tomoki MURAKAMI  Hirantha ABEYSEKERA  Koichi ISHIHARA  Motoharu SASAKI  Takatsune MORIYAMA  Yasushi TAKATORI  

     
    PAPER

      Pubricized:
    2021/03/23
      Vol:
    E104-B No:9
      Page(s):
    1138-1146

    In this paper, we examine techniques for improving the throughput of unlicensed radio systems such as wireless LANs (WLANs) to take advantage of multi-radio access to mobile broadband, which will be important in 5G evolution and beyond. In WLANs, throughput is reduced due to mixed standards and the degraded quality of certain frequency channels, and thus control techniques and an architecture that provide efficient control over WLANs are needed to solve the problem. We have proposed a technique to control the terminal connection dynamically by using the multi-radio of the AP. Furthermore, we have proposed a new control architecture called WiSMA for efficient control of WLANs. Experiments show that the proposed method can solve those problems and improve the WLAN throughput.

  • Review of Superconducting Nanostrip Photon Detectors using Various Superconductors Open Access

    Hiroyuki SHIBATA  

     
    INVITED PAPER

      Pubricized:
    2021/02/24
      Vol:
    E104-C No:9
      Page(s):
    429-434

    One of the highest performing single-photon detectors in the visible and near-infrared regions is the superconducting nanostrip photon detector (SNSPD or SSPD), which usually uses NbN or NbTiN as the superconductor. Using other superconductors may significantly improve, for example, the operating temperature and count rate characteristics. This paper briefly reviews the current state of the potential, characteristics, thin film growth, and nanofabrication process of SNSPD using various superconductors.

  • New Almost Periodic Complementary Pairs

    Jiali WU  Rong LUO  Honglei WEI  Yanfeng QI  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2021/03/05
      Vol:
    E104-A No:9
      Page(s):
    1361-1364

    In this letter, we give a recursive construction of q-ary almost periodic complementary pairs (APCPs) based on an interleaving technique of sequences and Kronercker product. Based on this construction, we obtain new quaternary APCPs with new lengths.

  • Field Evaluation of 5G Low Latency and High Reliability Vehicle-to-Vehicle Direct Communication for Application to Truck Platooning

    Manabu MIKAMI  Koichi SERIZAWA  Kohei MOTO  Hitoshi YOSHINO  

     
    PAPER

      Pubricized:
    2021/03/17
      Vol:
    E104-B No:9
      Page(s):
    1026-1034

    Fifth generation mobile communication system (5G) mobile operators need to explore new use cases and/or applications together with vertical industries, the industries which are potential users of 5G, in order to fully exploit the new 5G capabilities in terms of its application. Vehicular communications for platooning are considered to be one of new use cases of 5G whose low-latency and ultra-reliability are required. This paper presents our field evaluations on latency and reliability performance of 5G V2V Direct communication towards application to truck platooning. The authors build a field experimental environment, for V2X communications of truck platooning, with actual large-size trucks and a prototype system employing 5G New Radio (NR) technologies, and performed some field experiments in rural areas. In this paper, we introduce the 5G NR-V2X prototype system. Its most distinctive feature is that the prototype system is equipped with V2V Direct communication radio interface (i.e., sidelink), in addition to the traditional radio interfaces between BS and UE (i.e., downlink and uplink). Then, we present the field evaluation results of radio propagation environment results and over-the-air transmission performance of latency and reliability characteristics on the V2V Direct communication of the prototype in real public express highway environment including tunnel area as well as tunnel outside area, in order to assess 5G NR-V2X system applying to truck platooning. The radio propagation and the latency performance evaluation results clarify that the latency performance is degraded due to Hybrid Automatic Repeat reQuest (HARQ) retransmission at the outside of tunnel more possibly than the inside of tunnel, since larger path loss values can be observed at the outside of tunnel than the inside of tunnel, in V2V Direct communications of truck platooning. The over-the-air latency and reliability evaluation results confirm that it is important to set an appropriate maximum number of HARQ retransmissions since there is a trade-off problem in order to realize low latency and high reliability simultaneously.

  • Anomaly Prediction for Wind Turbines Using an Autoencoder Based on Power-Curve Filtering

    Masaki TAKANASHI  Shu-ichi SATO  Kentaro INDO  Nozomu NISHIHARA  Hiroto ICHIKAWA  Hirohisa WATANABE  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/06/07
      Vol:
    E104-D No:9
      Page(s):
    1506-1509

    Predicting the malfunction timing of wind turbines is essential for maintaining the high profitability of the wind power generation business. Machine learning methods have been studied using condition monitoring system data, such as vibration data, and supervisory control and data acquisition (SCADA) data, to detect and predict anomalies in wind turbines automatically. Autoencoder-based techniques have attracted significant interest in the detection or prediction of anomalies through unsupervised learning, in which the anomaly pattern is unknown. Although autoencoder-based techniques have been proven to detect anomalies effectively using relatively stable SCADA data, they perform poorly in the case of deteriorated SCADA data. In this letter, we propose a power-curve filtering method, which is a preprocessing technique used before the application of an autoencoder-based technique, to mitigate the dirtiness of SCADA data and improve the prediction performance of wind turbine degradation. We have evaluated its performance using SCADA data obtained from a real wind-farm.

  • Automatic Drawing of Complex Metro Maps

    Masahiro ONDA  Masaki MORIGUCHI  Keiko IMAI  

     
    PAPER-Graphs and Networks

      Pubricized:
    2021/03/08
      Vol:
    E104-A No:9
      Page(s):
    1150-1155

    The Tokyo subway is one of the most complex subway networks in the world and it is difficult to compute a visually readable metro map using existing layout methods. In this paper, we present a new method that can generate complex metro maps such as the Tokyo subway network. Our method consists of two phases. The first phase generates rough metro maps. It decomposes the metro networks into smaller subgraphs and partially generates rough metro maps. In the second phase, we use a local search technique to improve the aesthetic quality of the rough metro maps. The experimental results including the Tokyo metro map are shown.

  • Frequency-Domain Iterative Block DFE Using Erasure Zones and Improved Parameter Estimation

    Jian-Yu PAN  Kuei-Chiang LAI  Yi-Ting LI  Szu-Lin SU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2021/03/22
      Vol:
    E104-B No:9
      Page(s):
    1159-1171

    Iterative block decision feedback equalization with hard-decision feedback (HD-IBDFE) was proposed for single-carrier transmission with frequency-domain equalization (SC-FDE). The detection performance hinges upon not only error propagation, but also the accuracy of estimating the parameters used to re-compute the equalizer coefficients at each iteration. In this paper, we use the erasure zone (EZ) to de-emphasize the feedback values when the hard decisions are not reliable. EZ use also enables a more accurate, and yet computationally more efficient, parameter estimation method than HD-IBDFE. We show that the resulting equalizer coefficients share the same mathematical form as that of the HD-IBDFE, thereby preserving the merit of not requiring matrix inverse operations in calculating the equalizer coefficients. Simulations show that, by using the EZ and the proposed parameter estimation method, a significant performance improvement over the conventional HD-IBDFE can be achieved, but with lower complexity.

  • A Virtual Pre-Connection Scheme Enabling Fast Connection to Local Spot Cell in Private Cellular Network

    Kazuo IBUKA  Hikaru KAWASAKI  Takeshi MATSUMURA  Fumihide KOJIMA  

     
    PAPER

      Pubricized:
    2021/03/08
      Vol:
    E104-B No:9
      Page(s):
    1129-1137

    In the 5th generation mobile communication system (5G), super high frequency (SHF) bands such as 28GHz will be used in many scenarios. In Japan, a local 5G working group has been established to apply advanced 5G technologies to private networks and is working to encourage local companies and municipalities to introduce new services for local needs. Meanwhile, the smaller size of the 28GHz band cells creates the difficulties when establishing deployment areas for homogeneous networks. In general, heterogeneous network approach with the combination of macro-cell and micro-cell have been considered practical and applied by the giant telecommunication operators. However, private network operators have difficulty in deploying both micro- and macro-cells due to the cost issue. Without the assistance of macro-cells, local spot cells with a small service area may not be able to start services while high-speed mobile users are staying in the service area. In this paper, we propose a virtual pre-connection scheme allowing fast connection to local spot cells without the assistance of macro-cells. In addition, we confirm that the proposed scheme can reduce the cell search time required when entering a local spot cell from 100 seconds or more to less than 1 second, and can reduce the loss of connection opportunities to local spot cells for high-speed mobile users.

  • Effects of Input Data Uncertainties on an Air Traffic Control Difficulty Index

    Sakae NAGAOKA  Mark BROWN  Daniel DELAHAYE  

     
    PAPER-Navigation, Guidance and Control Systems

      Pubricized:
    2021/03/22
      Vol:
    E104-B No:9
      Page(s):
    1188-1196

    Air traffic management (ATM) systems around the world are being modernized to accommodate shifts towards performance- and trajectory-based operations. These shifts will require new indices for safety, efficiency and complexity. The authors have been developing an index for evaluating air traffic control (ATC) difficulty that utilizes the relative positions and velocity vectors of aircraft pairs as input data. Prior to practical application of the index, it is necessary to understand the effects of input data error, i.e. errors in the positions and velocities of a pair of aircraft, on the estimated difficulty value. Two sensitivity analyses were therefore performed for a pair of aircraft cruising at constant speeds on intersecting linear tracks at the same altitude. Sensitivity analysis examines how uncertainty in inputs relates to uncertainty in outputs. Firstly, an analysis of propagation error was carried out. The formula of the propagation error at a certain point was derived based on the assumed input error, and the distribution of propagation error was investigated for all possible situations and compared with the distribution of difficulty values to clarify its characteristics. Secondly, a sensitivity analysis based on variance was carried out that evaluated the effect of each input parameter using a conditional variance value called the Sobol indices. Using a Monte Carlo method, we investigated the effect of each input parameter on the calculated difficulty value for all possible situations of aircraft pairs on intersecting trajectories. As a result, it was found that the parameter that most affects the difficulty value is the intersection angle of the trajectories.

  • Development of Superconducting Devices Supporting Radio Astronomy Open Access

    Yoshinori UZAWA  Matthias KROUG  Takafumi KOJIMA  Masanori TAKEDA  Kazumasa MAKISE  Shohei EZAKI  Wenlei SHAN  Akihira MIYACHI  Yasunori FUJII  Hirotaka TERAI  

     
    INVITED PAPER

      Pubricized:
    2021/03/24
      Vol:
    E104-C No:9
      Page(s):
    411-421

    This paper describes the development of superconductor-insulator-superconductor (SIS) mixers for the Atacama Large Millimeter/submillimeter Array (ALMA) from the device point of view. During the construction phase of ALMA, the National Astronomical Observatory of Japan (NAOJ) successfully fabricated SIS mixers to meet the stringent ALMA noise temperature requirements of less than 230 K (5 times the quantum noise) for Band 10 (787-950 GHz) in collaboration with the National Institute of Information and Communications Technology. Band 10 covers the highest frequency band of ALMA and is recognized as the most difficult band in terms of superconducting technology. After the construction, the NAOJ began development studies for ALMA enhancement such as wideband and multibeam SIS mixers according to top-level science requirements, which are also presented.

  • Magnetic Josephson Junctions: New Phenomena and Physics with Diluted Alloy, Conventional Ferromagnet, and Multilayer Barriers Open Access

    Taro YAMASHITA  

     
    INVITED PAPER

      Pubricized:
    2021/03/17
      Vol:
    E104-C No:9
      Page(s):
    422-428

    We review a new superconducting element, called “magnetic Josephson junctions” with a magnetic barrier instead of the insulating barrier of conventional Josephson junctions. We classify the three types of magnetic barrier, i.e., diluted alloy, conventional ferromagnet, and magnetic multilayer barriers, and introduce various new physics such as the π-state arising in magnetic Josephson junctions due to the interaction between superconductivity and magnetism.

  • Physical Cell ID Detection Using Joint Estimation of Frequency Offset and SSS Sequence for NR Initial Access

    Daisuke INOUE  Kyogo OTA  Mamoru SAWAHASHI  Satoshi NAGATA  

     
    PAPER

      Pubricized:
    2021/03/17
      Vol:
    E104-B No:9
      Page(s):
    1120-1128

    This paper proposes a physical-layer cell identity (PCID) detection method that uses joint estimation of the frequency offset and secondary synchronization signal (SSS) sequence for the 5G new radio (NR) initial access with beamforming transmission at a base station. Computer simulation results show that using the PCID detection method with the proposed joint estimation yields an almost identical PCID detection probability as the primary synchronization signal (PSS) detection probability at an average received signal-to-noise ratio (SNR) of higher than approximately -5dB suggesting that the residual frequency offset is compensated to a sufficiently low level for the SSS sequence estimation. It is also shown that the PCID detection method achieves a high PCID detection probability of greater than 90% and 50% at the carrier frequency of 30 and 50GHz, respectively, at the average received SNR of 0dB for the frequency stability of a user equipment oscillator of 3ppm.

  • Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries Open Access

    Jun KURIHARA  Toru NAKAMURA  Ryu WATANABE  

     
    PAPER-Coding Theory

      Pubricized:
    2021/03/23
      Vol:
    E104-A No:9
      Page(s):
    1271-1283

    This paper investigates an adversarial model in the scenario of private information retrieval (PIR) from n coded storage servers, called Byzantine adversary. The Byzantine adversary is defined as the one altering b server responses and erasing u server responses to a user's query. In this paper, two types of Byzantine adversaries are considered; 1) the classic omniscient type that has the full knowledge on n servers as considered in existing literature, and 2) the reasonable limited-knowledge type that has information on only b+u servers, i.e., servers under the adversary's control. For these two types, this paper reveals that the resistance of a PIR scheme, i.e., the condition of b and u to correctly obtain the desired message, can be expressed in terms of a code parameter called the coset distance of linear codes employed in the scheme. For the omniscient type, the derived condition expressed by the coset distance is tighter and more precise than the estimation of the resistance by the minimum Hamming weight of the codes considered in existing researches. Furthermore, this paper also clarifies that if the adversary is limited-knowledge, the resistance of a PIR scheme could exceed that for the case of the omniscient type. Namely, PIR schemes can increase their resistance to Byzantine adversaries by allowing the limitation on adversary's knowledge.

2161-2180hit(42807hit)