The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

1281-1300hit(42807hit)

  • Reinforcement Learning for QoS-Constrained Autonomous Resource Allocation with H2H/M2M Co-Existence in Cellular Networks

    Xing WEI  Xuehua LI  Shuo CHEN  Na LI  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1332-1341

    Machine-to-Machine (M2M) communication plays a pivotal role in the evolution of Internet of Things (IoT). Cellular networks are considered to be a key enabler for M2M communications, which are originally designed mainly for Human-to-Human (H2H) communications. The introduction of M2M users will cause a series of problems to traditional H2H users, i.e., interference between various traffic. Resource allocation is an effective solution to these problems. In this paper, we consider a shared resource block (RB) and power allocation in an H2H/M2M coexistence scenario, where M2M users are subdivided into delay-tolerant and delay-sensitive types. We first model the RB-power allocation problem as maximization of capacity under Quality-of-Service (QoS) constraints of different types of traffic. Then, a learning framework is introduced, wherein a complex agent is built from simpler subagents, which provides the basis for distributed deployment scheme. Further, we proposed distributed Q-learning based autonomous RB-power allocation algorithm (DQ-ARPA), which enables the machine type network gateways (MTCG) as agents to learn the wireless environment and choose the RB-power autonomously to maximize M2M pairs' capacity while ensuring the QoS requirements of critical services. Simulation results indicates that with an appropriate reward design, our proposed scheme succeeds in reducing the impact of delay-tolerant machine type users on critical services in terms of SINR thresholds and outage ratios.

  • Process Variation Based Electrical Model of STT-Assisted VCMA-MTJ and Its Application in NV-FA

    Dongyue JIN  Luming CAO  You WANG  Xiaoxue JIA  Yongan PAN  Yuxin ZHOU  Xin LEI  Yuanyuan LIU  Yingqi YANG  Wanrong ZHANG  

     
    PAPER-Semiconductor Materials and Devices

      Pubricized:
    2022/04/18
      Vol:
    E105-C No:11
      Page(s):
    704-711

    Fast switching speed, low power consumption, and good stability are some of the important properties of spin transfer torque assisted voltage controlled magnetic anisotropy magnetic tunnel junction (STT-assisted VCMA-MTJ) which makes the non-volatile full adder (NV-FA) based on it attractive for Internet of Things. However, the effects of process variations on the performances of STT-assisted VCMA-MTJ and NV-FA will be more and more obvious with the downscaling of STT-assisted VCMA-MTJ and the improvement of chip integration. In this paper, a more accurate electrical model of STT-assisted VCMA-MTJ is established on the basis of the magnetization dynamics and the process variations in film growth process and etching process. In particular, the write voltage is reduced to 0.7 V as the film thickness is reduced to 0.9 nm. The effects of free layer thickness variation (γtf) and oxide layer thickness variation (γtox) on the state switching as well as the effect of tunnel magnetoresistance ratio variation (β) on the sensing margin (SM) are studied in detail. Considering that the above process variations follow Gaussian distribution, Monte Carlo simulation is used to study the effects of the process variations on the writing and output operations of NV-FA. The result shows that the state of STT-assisted VCMA-MTJ can be switched under -0.3%≤γtf≤6% or -23%≤γtox≤0.2%. SM is reduced by 16.0% with β increases from 0 to 30%. The error rates of writing ‘0’ in the NV-FA can be reduced by increasing Vb1 or increasing positive Vb2. The error rates of writing ‘1’ can be reduced by increasing Vb1 or decreasing negative Vb2. The reduction of the output error rates can be realized effectively by increasing the driving voltage (Vdd).

  • Formulation of Mindfulness States as a Network Optimization Problem and an Attempt to Identify Key Brain Pathways Using Digital Annealer

    Haruka NAKAMURA  Yoshimasa TAWATSUJI  Tatsunori MATSUI  Makoto NAKAMURA  Koichi KIMURA  Hisanori FUJISAWA  

     
    PAPER-Biocybernetics, Neurocomputing

      Pubricized:
    2022/08/08
      Vol:
    E105-D No:11
      Page(s):
    1969-1983

    Although intervention practices like mindfulness meditation have proven effective in treating psychosis, there is no clarity on the mechanism of information propagation in the brain. In this study, we formulated a network optimization problem and searched for the optimal solution using Digital Annealer developed by Fujitsu Ltd. This is inspired by quantum computing and is effective in solving large-scale combinatorial optimization problems to find the information propagation pathway in the brain that contributes to the realization of mindfulness. Specifically, we defined the optimal network state as the state of the brain network that is considered to be associated with the mindfulness state. We formulated the problem into two network optimization problems — the minimum vertex-cover problem and the maximum-flow problem — to search for the information propagation pathway that is important for realizing the state. In the minimum vertex-cover problem, we aimed to identify brain regions that are important for the realization of the mindfulness state, and identified eight regions, including four that were suggested to be consistent with previous studies. We formulated the problem as a maximum-flow problem to identify the information propagation pathways in the brain that contribute to the activation of these four identified regions. As a result, approximately 30% of the connections in the brain network structure of this study were identified, and the pathway with the highest flow rate was considered to characterize the bottom-up emotion regulation during mindfulness. The findings of this study could be useful for more direct interventions in the context of mindfulness, which are being investigated by neurofeedback and other methods. This is because existing studies have not clarified the information propagation pathways that contribute to the realization of the brain network states that characterize mindfulness states. In addition, this approach may be useful as a methodology to identify information propagation pathways in the brain that contribute to the realization of higher-order human cognitive activities, such as mindfulness, within large-scale brain networks.

  • Optimal Design of Optical Waveguide Devices Utilizing Beam Propagation Method with ADI Scheme Open Access

    Akito IGUCHI  Yasuhide TSUJI  

     
    INVITED PAPER

      Pubricized:
    2022/05/20
      Vol:
    E105-C No:11
      Page(s):
    644-651

    This paper shows structural optimal design of optical waveguide components utilizing an efficient 3D frequency-domain and 2D time-domain beam propagation method (BPM) with an alternating direction implicit (ADI) scheme. Usual optimal design procedure is based on iteration of numerical simulation, and total computational cost of the optimal design mainly depends on the efficiency of numerical analysis method. Since the system matrices are tridiagonal in the ADI-based BPM, efficient analysis and optimal design are available. Shape and topology optimal design shown in this paper is based on optimization of density distribution and sensitivity analysis to the density parameters. Computational methods of the sensitivity are shown in the case of using the 3D semi-vectorial and 2D time-domain BPM based on ADI scheme. The validity of this design approach is shown by design of optical waveguide components: mode converters, and a polarization beam splitter.

  • Adversarial Example Detection Based on Improved GhostBusters

    Hyunghoon KIM  Jiwoo SHIN  Hyo Jin JO  

     
    LETTER

      Pubricized:
    2022/04/19
      Vol:
    E105-D No:11
      Page(s):
    1921-1922

    In various studies of attacks on autonomous vehicles (AVs), a phantom attack in which advanced driver assistance system (ADAS) misclassifies a fake object created by an adversary as a real object has been proposed. In this paper, we propose F-GhostBusters, which is an improved version of GhostBusters that detects phantom attacks. The proposed model uses a new feature, i.e, frequency of images. Experimental results show that F-GhostBusters not only improves the detection performance of GhostBusters but also can complement the accuracy against adversarial examples.

  • Edge Computing-Enhanced Network Redundancy Elimination for Connected Cars

    Masahiro YOSHIDA  Koya MORI  Tomohiro INOUE  Hiroyuki TANAKA  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1372-1379

    Connected cars generate a huge amount of Internet of Things (IoT) sensor information called Controller Area Network (CAN) data. Recently, there is growing interest in collecting CAN data from connected cars in a cloud system to enable life-critical use cases such as safe driving support. Although each CAN data packet is very small, a connected car generates thousands of CAN data packets per second. Therefore, real-time CAN data collection from connected cars in a cloud system is one of the most challenging problems in the current IoT. In this paper, we propose an Edge computing-enhanced network Redundancy Elimination service (EdgeRE) for CAN data collection. In developing EdgeRE, we designed a CAN data compression architecture that combines in-vehicle computers, edge datacenters and a public cloud system. EdgeRE includes the idea of hierarchical data compression and dynamic data buffering at edge datacenters for real-time CAN data collection. Across a wide range of field tests with connected cars and an edge computing testbed, we show that the EdgeRE reduces bandwidth usage by 88% and the number of packets by 99%.

  • Multi-Targeted Poisoning Attack in Deep Neural Networks

    Hyun KWON  Sunghwan CHO  

     
    LETTER

      Pubricized:
    2022/08/09
      Vol:
    E105-D No:11
      Page(s):
    1916-1920

    Deep neural networks show good performance in image recognition, speech recognition, and pattern analysis. However, deep neural networks also have weaknesses, one of which is vulnerability to poisoning attacks. A poisoning attack reduces the accuracy of a model by training the model on malicious data. A number of studies have been conducted on such poisoning attacks. The existing type of poisoning attack causes misrecognition by one classifier. In certain situations, however, it is necessary for multiple models to misrecognize certain data as different specific classes. For example, if there are enemy autonomous vehicles A, B, and C, a poisoning attack could mislead A to turn to the left, B to stop, and C to turn to the right simply by using a traffic sign. In this paper, we propose a multi-targeted poisoning attack method that causes each of several models to misrecognize certain data as a different target class. This study used MNIST and CIFAR10 as datasets and Tensorflow as a machine learning library. The experimental results show that the proposed scheme has a 100% average attack success rate on MNIST and CIFAR10 when malicious data accounting for 5% of the training dataset have been used for training.

  • Topology Optimal Design of NRD Guide Devices Using Function Expansion Method and Evolutionary Approaches

    Naoya HIEDA  Keita MORIMOTO  Akito IGUCHI  Yasuhide TSUJI  Tatsuya KASHIWA  

     
    PAPER

      Pubricized:
    2022/03/24
      Vol:
    E105-C No:11
      Page(s):
    652-659

    In order to increase communication capacity, the use of millimeter-wave and terahertz-wave bands are being actively explored. Non-radiative dielectric waveguide known as NRD guide is one of promising platform of millimeter-wave integrated circuits thanks to its non-radiative and low loss nature. In order to develop millimeter wave circuits with various functions, various circuit components have to be efficiently designed to meet requirements from application side. In this paper, for efficient design of NRD guide devices, we develop a topology optimal design technique based on function-expansion-method which can express arbitrary structure with arbitrary geometric topology. In the present approach, recently developed two-dimensional full-vectorial finite element method (2D-FVFEM) for NRD guide devices is employed to improve computational efficiency and several evolutionary approaches, which do not require appropriate initial structure depending on a given design problem, are used to optimize design variables, thus, NRD guide devices having desired functions are efficiently obtained without requiring designer's special knowledge.

  • FOREWORD Open Access

    Ilsun YOU  

     
    FOREWORD

      Vol:
    E105-D No:11
      Page(s):
    1834-1835
  • FOREWORD Open Access

    Haruo OISHI  

     
    FOREWORD

      Vol:
    E105-B No:11
      Page(s):
    1290-1290
  • Distortion Analysis of RF Power Amplifier Using Probability Density of Input Signal and AM-AM Characteristics

    Satoshi TANAKA  

     
    PAPER

      Pubricized:
    2022/05/11
      Vol:
    E105-A No:11
      Page(s):
    1436-1442

    When confirming the ACLR (adjacent channel leakage power ratio), which are representative indicators of distortion in the design of PA (power amplifier), it is well known how to calculate the AM-AM/PM characteristics of PA, input time series data of modulated signals, and analyze the output by Fourier analysis. In 5G (5th generation) mobile phones, not only QPSK (quadrature phase shift keying) modulation but also 16QAM (quadrature modulation), 64QAM, and 256QAM are becoming more multivalued as modulation signals. In addition, the modulation band may exceed 100MHz, and the amount of time series data increases, and the increase in calculation time becomes a problem. In order to shorten the calculation time, calculating the total amount of distortion generated by PA from the probability density of the modulation signal and the AM (amplitude modulation)-AM/PM (phase modulation) characteristics of PA is considered. For the AM-AM characteristics of PA, in this paper, IMD3 (inter modulation distortion 3) obtained from probability density and IMD3 by Fourier analysis, which are often used so long, are compared. As a result, it was confirmed that the result of probability density analysis is similar to that of Fourier analysis, when the nonlinearity is somewhat small. In addition, the agreement between the proposed method and the conventional method was confirmed with an error of about 2.0dB of ACLR using the modulation waves with a bandwidth of 5MHz, RB (resource block) being 25, and QPSK modulation.

  • Orthogonal Deep Feature Decomposition Network for Cross-Resolution Person Re-Identification

    Rui SUN  Zi YANG  Lei ZHANG  Yiheng YU  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2022/08/23
      Vol:
    E105-D No:11
      Page(s):
    1994-1997

    Person images captured by surveillance cameras in real scenes often have low resolution (LR), which suffers from severe degradation in recognition performance when matched with pre-stocked high-resolution (HR) images. There are existing methods which typically employ super-resolution (SR) techniques to address the resolution discrepancy problem in person re-identification (re-ID). However, SR techniques are intended to enhance the human eye visual fidelity of images without caring about the recovery of pedestrian identity information. To cope with this challenge, we propose an orthogonal depth feature decomposition network. And we decompose pedestrian features into resolution-related features and identity-related features who are orthogonal to each other, from which we design the identity-preserving loss and resolution-invariant loss to ensure the recovery of pedestrian identity information. When compared with the SOTA method, experiments on the MLR-CUHK03 and MLR-VIPeR datasets demonstrate the superiority of our method.

  • Budget Allocation for Incentivizing Mobile Users for Crowdsensing Platform

    Cheng ZHANG  Noriaki KAMIYAMA  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1342-1352

    With the popularity of smart devices, mobile crowdsensing, in which the crowdsensing platform gathers useful data from users of smart devices, e.g., smartphones, has become a prevalent paradigm. Various incentive mechanisms have been extensively adopted for the crowdsensing platform to incentivize users of smart devices to offer sensing data. Existing works have concentrated on rewarding smart-device users for their short term effort to provide data without considering the long-term factors of smart-device users and the quality of data. Our previous work has considered the quality of data of smart-device users by incorporating the long-term reputation of smart-device users. However, our previous work only considered a quality maximization problem with budget constraints on one location. In this paper, multiple locations are considered. Stackelberg game is utilized to solve a two-stage optimization problem. In the first stage, the crowdsensing platform allocates the budget to different locations and sets price as incentives for users to maximize the total data quality. In the second stage, the users make efforts to provide data to maximize its utility. Extensive numerical simulations are conducted to evaluate proposed algorithm.

  • Incentive-Stable Matching Protocol for Service Chain Placement in Multi-Operator Edge System

    Jen-Yu WANG  Li-Hsing YEN  Juliana LIMAN  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1353-1360

    Network Function Virtualization (NFV) enables the embedding of Virtualized Network Function (VNF) into commodity servers. A sequence of VNFs can be chained in a particular order to form a service chain (SC). This paper considers placing multiple SCs in a geo-distributed edge system owned by multiple service providers (SPs). For a pair of SC and SP, minimizing the placement cost while meeting a latency constraint is formulated as an integer programming problem. As SC clients and SPs are self-interested, we study the matching between SCs and SPs that respects individual's interests yet maximizes social welfare. The proposed matching approach excludes any blocking individual and block pair which may jeopardize the stability of the result. Simulation results show that the proposed approach performs well in terms of social welfare but is suboptimal concerning the number of placed SCs.

  • Design of a Compact Triple-Mode Dielectric Resonator BPF with Wide Spurious-Free Performance Open Access

    Fan LIU  Zhewang MA  Weihao ZHANG  Masataka OHIRA  Dongchun QIAO  Guosheng PU  Masaru ICHIKAWA  

     
    PAPER

      Pubricized:
    2022/03/30
      Vol:
    E105-C No:11
      Page(s):
    660-666

    A novel compact 5-pole bandpass filter (BPF) using two different types of resonators, one is coaxial TEM-mode resonator and the other dielectric triple-mode resonator, is proposed in this paper. The coaxial resonator is a simple single-mode resonator, while the triple-mode dielectric resonator (DR) includes one TM01δ mode and two degenerate HE11 modes. An excellent spurious performance of the BPF is obtained due to the different resonant behaviors of these two types of resonators used in the BPF. The coupling scheme of the 5-pole BPF includes two cascade triplets (CTs) which produce two transmission zeros (TZs) and a sharp skirt of the passband. Behaviors of the resonances, the inter-resonance couplings, as well as their tuning methods are investigated in detail. A procedure of mapping the coupling matrix of the BPF to its physical dimensions is developed, and an optimization of these physical dimensions is implemented to achieve best performance of the filter. The designed BPF is operated at 1.84GHz with a bandwidth of 51MHz. The stopband rejection is better than 20dB up to 9.7GHz (about 5.39×f0) except 7.85GHz. Good agreement between the designed and theoretically synthesized responses of the BPF is reached, verifying well the proposed configuration of the BPF and its design method.

  • Study on Selection of Test Space for CW Illuminator

    Qi ZHOU  Zhongyuan ZHOU  Yixing GU  Mingjie SHENG  Peng HU  Yang XIAO  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2022/05/19
      Vol:
    E105-B No:11
      Page(s):
    1434-1443

    This paper introduces the working principle of continuous wave (CW) illuminator and selects the test space by developing the wave impedance selection algorithm for the CW illuminator. For the vertical polarization and the horizontal polarization of CW illuminator, the law of wave impedance distribution after loading is analyzed and the influence of loading distribution on test space selection is studied. The selection principle of wave impedance based on incident field or total field at the monitoring point is analyzed.

  • FOREWORD Open Access

    Takahide SATO  

     
    FOREWORD

      Vol:
    E105-A No:11
      Page(s):
    1434-1435
  • A Strengthened PAKE Protocol with Identity-Based Encryption

    SeongHan SHIN  

     
    PAPER

      Pubricized:
    2022/06/01
      Vol:
    E105-D No:11
      Page(s):
    1900-1910

    In [2], Choi et al. proposed an identity-based password-authenticated key exchange (iPAKE) protocol using the Boneh-Franklin IBE scheme, and its generic construction (UKAM-PiE) that was standardized in ISO/IEC 11770-4/AMD 1. In this paper, we show that the iPAKE and UKAM-PiE protocols are insecure against passive/active attacks by a malicious PKG (Private Key Generator) where the malicious PKG can find out all clients' passwords by just eavesdropping on the communications, and the PKG can share a session key with any client by impersonating the server. Then, we propose a strengthened PAKE (for short, SPAIBE) protocol with IBE, which prevents such a malicious PKG's passive/active attacks. Also, we formally prove the security of the SPAIBE protocol in the random oracle model and compare relevant PAKE protocols in terms of efficiency, number of passes, and security against a malicious PKG.

  • Operations Smart Contract to Realize Decentralized System Operations Workflow for Consortium Blockchain

    Tatsuya SATO  Taku SHIMOSAWA  Yosuke HIMURA  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1318-1331

    Enterprises have paid attention to consortium blockchains like Hyperledger Fabric, which is one of the most promising platforms, for efficient decentralized transactions without depending on any particular organization. A consortium blockchain-based system will be typically built across multiple organizations. In such blockchain-based systems, system operations across multiple organizations in a decentralized manner are essential to maintain the value of introducing consortium blockchains. Decentralized system operations have recently been becoming realistic with the evolution of consortium blockchains. For instance, the release of Hyperledger Fabric v2.x, in which individual operational tasks for a blockchain network, such as command execution of configuration change of channels (Fabric's sub-networks) and upgrade of chaincodes (Fabric's smart contracts), can be partially executed in a decentralized manner. However, the operations workflows also include the preceding procedure of pre-sharing, coordinating, and pre-agreeing the operational information (e.g., configuration parameters) among organizations, after which operation executions can be conducted, and this preceding procedure relies on costly manual tasks. To realize efficient decentralized operations workflows for consortium blockchain-based systems in general, we propose a decentralized inter-organizational operations method that we call Operations Smart Contract (OpsSC), which defines an operations workflow as a smart contract. Furthermore, we design and implement OpsSC for blockchain network operations with Hyperledger Fabric v2.x. This paper presents OpsSC for operating channels and chaincodes, which are essential for managing the blockchain networks, through clarifying detailed workflows of those operations. A cost evaluation based on an estimation model shows that the total operational cost for executing a typical operational scenario to add an organization to a blockchain network having ten organizations could be reduced by 54 percent compared with a conventional script-based method. The implementation of OpsSC has been open-sourced and registered as one of Hyperledger Labs projects, which hosts experimental projects approved by Hyperledger.

  • Non-Orthogonal Physical Layer (NOPHY) Design towards 5G Evolution and 6G

    Xiaolin HOU  Wenjia LIU  Juan LIU  Xin WANG  Lan CHEN  Yoshihisa KISHIYAMA  Takahiro ASAI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2022/04/26
      Vol:
    E105-B No:11
      Page(s):
    1444-1457

    5G has achieved large-scale commercialization across the world and the global 6G research and development is accelerating. To support more new use cases, 6G mobile communication systems should satisfy extreme performance requirements far beyond 5G. The physical layer key technologies are the basis of the evolution of mobile communication systems of each generation, among which three key technologies, i.e., duplex, waveform and multiple access, are the iconic characteristics of mobile communication systems of each generation. In this paper, we systematically review the development history and trend of the three key technologies and define the Non-Orthogonal Physical Layer (NOPHY) concept for 6G, including Non-Orthogonal Duplex (NOD), Non-Orthogonal Multiple Access (NOMA) and Non-Orthogonal Waveform (NOW). Firstly, we analyze the necessity and feasibility of NOPHY from the perspective of capacity gain and implementation complexity. Then we discuss the recent progress of NOD, NOMA and NOW, and highlight several candidate technologies and their potential performance gain. Finally, combined with the new trend of 6G, we put forward a unified physical layer design based on NOPHY that well balances performance against flexibility, and point out the possible direction for the research and development of 6G physical layer key technologies.

1281-1300hit(42807hit)