Youming ZHANG Kaiye BAO Xusheng TANG Fengyi HUANG Nan JIANG
This paper describes a broadband low phase noise VCO implemented in 0.13 µm CMOS process. A 1-bit switched varactor and a 4-bit capacitor array are adopted in cooperation with the automatic frequency calibration (AFC) circuit to lower the VCO tuning gain (KVCO), with a measured AFC time of 6 µs. Several noise reduction techniques are exploited to minimize the phase noise of the VCO. Measurement results show the VCO generates a high frequency range from 11.37 GHz to 14.8 GHz with a KVCO of less than 270 MHz/V. The prototype exhibits a phase noise of -114.6 dBc/Hz @ 1 MHz at 14.67 GHz carrier frequency and draws 10.5 mA current from a 1.2 V supply. The achieved figure-of-merits (FoM=-186.9dBc/Hz, FoMT=-195.3dBc/Hz) favorably compares with the state-of-the-art.
Gang WANG Min-Yao NIU Jian GAO Fang-Wei FU
Compressed sensing theory provides a new approach to acquire data as a sampling technique and makes sure that a sparse signal can be reconstructed from few measurements. The construction of compressed sensing matrices is a main problem in compressed sensing theory (CS). In this paper, the deterministic constructions of compressed sensing matrices based on affine singular linear space over finite fields are presented and a comparison is made with the compressed sensing matrices constructed by DeVore based on polynomials over finite fields. By choosing appropriate parameters, our sparse compressed sensing matrices are superior to the DeVore's matrices. Then we use a new formulation of support recovery to recover the support sets of signals with sparsity no more than k on account of binary compressed sensing matrices satisfying disjunct and inclusive properties.
Hideaki YOSHINO Kenko OTA Takefumi HIRAGURI
Data aggregation, which is the process of summarizing a large amount of data, is an effective method for saving limited communication resources, such as radio frequency and sensor-node energy. Packet aggregation in wireless LAN and sensed-data aggregation in wireless sensor networks are typical examples. We propose and analyze two queueing models of fundamental statistical data aggregation schemes: constant interval and constant aggregation number. We represent each aggregation scheme by a tandem queueing network model with a gate at the aggregation process and a single server queue at a transmission process. We analytically derive the stationary distribution and Laplace-Stieltjes transform of the system time for each aggregation and transmission process and of the total system time. We then numerically evaluate the stationary mean system time characteristics and clarify that each model has an optimal aggregation parameter (i.e., an optimal aggregation interval or optimal aggregation number), that minimizes the mean total system time. In addition, we derive the explicit optimal aggregation parameter for a D/M/1 transmission model with each aggregation scheme and clarify that it provides accurate approximation of that of each aggregation model. The optimal aggregation interval was determined by the transmission rate alone, while the optimal aggregation number was determined by the arrival and transmission rates alone with explicitly derived proportional constants. These results can provide a theoretical basis and a guideline for designing aggregation devices, such as IoT gateways.
Daisuke FUNAHASHI Takahiro ITO Akimasa HIRATA Takahiro IYAMA Teruo ONISHI
This study discusses an area-averaged incident power density to estimate surface temperature elevation from patch antenna arrays with 4 and 9 elements at the frequencies above 10 GHz. We computationally demonstrate that a smaller averaging area (1 cm2) of power density should be considered at the frequency of 30 GHz or higher compared with that at lower frequencies (4 cm2).
Shinichi RYOKI Takashi KUNIFUJI Toshihiro ITOH
Along with the sophistication of society, the requirements for infrastructure systems are also becoming more sophisticated. Conventionally, infrastructure systems have been accepted if they were safe and stable, but nowadays they are required for serviceability as a matter of course. For this reason, not only the expansion of the scope of the control system but also the integration with the information service system has been frequently carried out. In this paper, we describe safety technology based on autonomous decentralized technology as one of the measures to secure safety in a control system integrating such information service functions. And we propose its future studies.
Zhijian HUANG Yong Jun WANG Jing LIU
The rising systems programming language Rust is fast, efficient and memory safe. However, improperly dereferencing raw pointers in Rust causes new safety problems. In this paper, we present a detailed analysis into these problems and propose a practical hybrid approach to detecting unsafe raw pointer dereferencing behaviors. Our approach employs pattern matching to identify functions that can be used to generate illegal multiple mutable references (We define them as thief function) and instruments the dereferencing operation in order to perform dynamic checking at runtime. We implement a tool named UnsafeFencer and has successfully identified 52 thief functions in 28 real-world crates*, of which 13 public functions are verified to generate multiple mutable references.
Yuzo TAENAKA Kazuki MIZUYAMA Kazuya TSUKAMOTO
Applying Software Defined Network (SDN) technology to wireless networks are attracting much attention. Our previous study proposed a channel utilization method based on SDN/OpenFlow technology to improve the channel utilization efficiency of the multi-channel wireless backhaul network (WBN). However, since control messages are inherently transmitted with data traffic on a same channel in WBN, it inevitably degrades the network capacity. Specifically, the amount of control messages for collecting statistical information of each flow (FlowStats) linearly increases with the number of ongoing flows, thereby being the dominant overhead for backhaul networks. In this paper, we propose a new method that prevents the increase of control traffic while retaining the network performance of the previous method. Our proposed method uses statistical information of each interface (PortStats) instead of per-flow information (FlowStats), and handles multiple flows on the interface together if possible. Otherwise, to handle individual flow, we propose a way to estimate per-flow information without introducing extra control messages. Finally, we show that the proposed method offers the same performance with the previous method, while greatly reducing the amount of control traffic.
Tomoki MURAKAMI Shingo OKA Yasushi TAKATORI Masato MIZOGUCHI Fumiaki MAEHARA
This paper investigates an adaptive movable access point (AMAP) system and explores its feasibility in a static indoor classroom environment with an applied wireless local area network (WLAN) system. In the AMAP system, the positions of multiple access points (APs) are adaptively moved in accordance with clustered user groups, which ensures effective coverage for non-uniform user distributions over the target area. This enhances the signal to interference and noise power ratio (SINR) performance. In order to derive the appropriate AP positions, we utilize the k-means method in the AMAP system. To accurately estimate the position of each user within the target area for user clustering, we use the general methods of received signal strength indicator (RSSI) or time of arrival (ToA), measured by the WLAN systems. To clarify the basic effectiveness of the AMAP system, we first evaluate the SINR performance of the AMAP system and a conventional fixed-position AP system with equal intervals using computer simulations. Moreover, we demonstrate the quantitative improvement of the SINR performance by analyzing the ToA and RSSI data measured in an indoor classroom environment in order to clarify the feasibility of the AMAP system.
Sinh-Ngoc NGUYEN Van-Quyet NGUYEN Giang-Truong NGUYEN JeongNyeo KIM Kyungbaek KIM
Distributed Reflective Denial of Services (DRDoS) attacks have gained huge popularity and become a major factor in a number of massive cyber-attacks. Usually, the attackers launch this kind of attack with small volume of requests to generate a large volume of attack traffic aiming at the victim by using IP spoofing from legitimate hosts. There have been several approaches, such as static threshold based approach and confirmation-based approach, focusing on DRDoS attack detection at victim's side. However, these approaches have significant disadvantages: (1) they are only passive defences after the attack and (2) it is hard to trace back the attackers. To address this problem, considerable attention has been paid to the study of detecting DRDoS attack at source side. Because the existing proposals following this direction are supposed to be ineffective to deal with small volume of attack traffic, there is still a room for improvement. In this paper, we propose a novel method to detect DRDoS attack request traffic on SDN(Software Defined Network)-enabled gateways in the source side of attack traffic. Our method adjusts the sampling rate and provides a traffic-aware adaptive threshold along with the margin based on analysing observed traffic behind gateways. Experimental results show that the proposed method is a promising solution to detect DRDoS attack request in the source side.
Taichi OHTSUJI Kazushi MURAOKA Hiroaki AMINAKA Dai KANETOMO Yasuhiko MATSUNAGA
Public safety networks need to more effectively meet the increasing demands for images or videos to be shared among first responders and incident commanders. Long term evolution (LTE) networks are considered to be candidates to achieve such broadband services. Capital expenditures in deploying base stations need to be decreased to introduce LTE for public safety. However, out-of-coverage areas tend to occur in cell edge areas or inside buildings because the cell areas of base stations for public safety networks are larger than those for commercial networks. The 3rd Generation Partnership Program (3GPP) in Release 13 has investigated device-to-device (D2D) based relay communication as a means to fill out-of-coverage areas in public safety LTE (PS-LTE). This paper proposes a relay selection scheme based on effective path throughput from an out-of-coverage terminal to a base station via an in-coverage relay terminal, which enables the optimal relay terminal to be selected. System level simulation results assuming on radii of 20km or less revealed that the proposed scheme could provide better user ratios that satisfied the throughput requirements for video transmission than the scheme standardized in 3GPP. Additionally, an evaluation that replicates actual group of fire-fighters indicated that the proposed scheme enabled 90% of out-of-coverage users to achieve the required throughput, i.e., 1.0Mbps, to transmit video images.
In this Letter, a robust variable step-size affine-projection subband adaptive filter algorithm (RVSS-APSAF) is proposed, whereby a band-dependent variable step-size is introduced to improve convergence and misalignment performances in impulsive noise environments. Specifically, the weight vector is adaptively updated to achieve robustness against impulsive noises. Finally, the proposed RVSS-APSAF algorithm is tested for system identification in an impulsive noise environment.
Sho MIZUNO Mitsuhiro HATADA Tatsuya MORI Shigeki GOTO
Damage caused by malware has become a serious problem. The recent rise in the spread of evasive malware has made it difficult to detect it at the pre-infection timing. Malware detection at post-infection timing is a promising approach that fulfills this gap. Given this background, this work aims to identify likely malware-infected devices from the measurement of Internet traffic. The advantage of the traffic-measurement-based approach is that it enables us to monitor a large number of endhosts. If we find an endhost as a source of malicious traffic, the endhost is likely a malware-infected device. Since the majority of malware today makes use of the web as a means to communicate with the C&C servers that reside on the external network, we leverage information recorded in the HTTP headers to discriminate between malicious and benign traffic. To make our approach scalable and robust, we develop the automatic template generation scheme that drastically reduces the amount of information to be kept while achieving the high accuracy of classification; since it does not make use of any domain knowledge, the approach should be robust against changes of malware. We apply several classifiers, which include machine learning algorithms, to the extracted templates and classify traffic into two categories: malicious and benign. Our extensive experiments demonstrate that our approach discriminates between malicious and benign traffic with up to 97.1% precision while maintaining the false positive rate below 1.0%.
Juan YU Peizhong LU Jianmin HAN Jianfeng LU
Traffic signal phase and timing (TSPaT) information is valuable for various applications, such as velocity advisory systems, navigation systems, collision warning systems, and so forth. In this paper, we focus on learning baseline timing cycle lengths for fixed-time traffic signals. The cycle length is the most important parameter among all timing parameters, such as green lengths. We formulate the cycle length learning problem as a period estimation problem using a sparse set of noisy observations, and propose the most frequent approximate greatest common divisor (MFAGCD) algorithms to solve the problem. The accuracy performance of our proposed algorithms is experimentally evaluated on both simulation data and the real taxi GPS trajectory data collected in Shanghai, China. Experimental results show that the MFAGCD algorithms have better sparsity and outliers tolerant capabilities than existing cycle length estimation algorithms.
Ying-Yao TING Chi-Wei HSIAO Huan-Sheng WANG
To prevent constraints or defects of a single sensor from malfunctions, this paper proposes a fire detection system based on the Dempster-Shafer theory with multi-sensor technology. The proposed system operates in three stages: measurement, data reception and alarm activation, where an Arduino is tasked with measuring and interpreting the readings from three types of sensors. Sensors under consideration involve smoke, light and temperature detection. All the measured data are wirelessly transmitted to the backend Raspberry Pi for subsequent processing. Within the system, the Raspberry Pi is used to determine the probability of fire events using the Dempster-Shafer theory. We investigate moderate settings of the conflict coefficient and how it plays an essential role in ensuring the plausibility of the system's deduced results. Furthermore, a MySQL database with a web server is deployed on the Raspberry Pi for backlog and data analysis purposes. In addition, the system provides three notification services, including web browsing, smartphone APP, and short message service. For validation, we collected the statistics from field tests conducted in a controllable and safe environment by emulating fire events happening during both daytime and nighttime. Each experiment undergoes the No-fire, On-fire and Post-fire phases. Experimental results show an accuracy of up to 98% in both the No-fire and On-fire phases during the daytime and an accuracy of 97% during the nighttime under reasonable conditions. When we take the three phases into account, the accuracy in the daytime and nighttime increase to 97% and 89%, respectively. Field tests validate the efficiency and accuracy of the proposed system.
Chihiro TSUTAKE Toshiyuki YOSHIDA
Many of affine motion compensation techniques proposed thus far employ least-square-based techniques in estimating affine parameters, which requires a hardware structure different from conventional block-matching-based one. This paper proposes a new affine motion estimation/compensation framework friendly to block-matching-based parameter estimation, and applies it to an HEVC encoder to demonstrate its coding efficiency and computation cost. To avoid a nest of search loops, a new affine motion model is first introduced by decomposing the conventional 4-parameter affine model into two 3-parameter ones. Then, a block-matching-based fast parameter estimation technique is proposed for the models. The experimental results given in this paper show that our approach is advantageous over conventional techniques.
Erasure codes have been considered as one of the most promising techniques for data reliability enhancement and storage efficiency in modern distributed storage systems. However, erasure codes often suffer from a time-consuming coding process which makes them nearly impractical. The opportunity to solve this problem probably rely on the parallelization of erasure-code-based application on the modern multi-/many-core processors to fully take advantage of the adequate hardware resources on those platforms. However, the complicated data allocation and limited I/O throughput pose a great challenge on the parallelization. To address this challenge, we propose a general multi-threaded parallel coding approach in this work. The approach consists of a general multi-threaded parallel coding model named as MTPerasure, and two detailed parallel coding algorithms, named as sdaParallel and ddaParallel, respectively, adapting to different I/O circumstances. MTPerasure is a general parallel coding model focusing on the high level data allocation, and it is applicable for all erasure codes and can be implemented without any modifications of the low level coding algorithms. The sdaParallel divides the data into several parts and the data parts are allocated to different threads statically in order to eliminate synchronization latency among multiple threads, which improves the parallel coding performance under the dummy I/O mode. The ddaParallel employs two threads to execute the I/O reading and writing on the basis of small pieces independently, which increases the I/O throughput. Furthermore, the data pieces are assigned to the coding thread dynamically. A special thread scheduling algorithm is also proposed to reduce thread migration latency. To evaluate our proposal, we parallelize the popular open source library jerasure based on our approach. And a detailed performance comparison with the original sequential coding program indicates that the proposed parallel approach outperforms the original sequential program by an extraordinary speedups from 1.4x up to 7x, and achieves better utilization of the computation and I/O resources.
Yousuke TAKAHASHI Keisuke ISHIBASHI Masayuki TSUJINO Noriaki KAMIYAMA Kohei SHIOMOTO Tatsuya OTOSHI Yuichi OHSITA Masayuki MURATA
To efficiently use network resources, internet service providers need to conduct traffic engineering that dynamically controls traffic routes to accommodate traffic change with limited network resources. The performance of traffic engineering (TE) depends on the accuracy of traffic prediction. However, the size of traffic change has been drastically increasing in recent years due to the growth in various types of network services, which has made traffic prediction difficult. Our approach to tackle this issue is to separate traffic into predictable and unpredictable parts and to apply different control policies. However, there are two challenges to achieving this: dynamically separating traffic according to predictability and dynamically controlling routes for each separated traffic part. In this paper, we propose a macroflow-based TE scheme that uses different routing policies in accordance with traffic predictability. We also propose a traffic-separation algorithm based on real-time traffic analysis and a framework for controlling separated traffic with software-defined networking technology, particularly OpenFlow. An evaluation of actual traffic measured in an Internet2 network shows that compared with current TE schemes the proposed scheme can reduce the maximum link load by 34% (at the most congested time) and the average link load by an average of 11%.
Hideki KIRINO Kazuhiro HONDA Kun LI Koichi OGAWA
A new Waffle-iron Ridge Guide (WRG) structure that has the ability to control both wavelength and impedance is proposed. With the proposed structure, not only can the wavelength be controlled over a wide range for both fast- and slow-waves in free space but the impedance can also be controlled. These features can improve the performance of array antennas in terms of reducing grating lobes and side lobes. In this paper, we discuss and evaluate a design scheme using equivalent circuits and EM-simulation. This paper also discusses how the conductivity and dielectric loss in the WRG affect the total gain of the array antenna.
Tin Nilar WIN Htoo HTOO Yutaka OHSAWA
This paper proposes a fast safe-region generation method for several kinds of vicinity queries including set k nearest neighbor (NN) queries, ordered kNN queries, reverse kNN queries, and distance range queries. When a user is driving a car on a road network, he/she wants to know about objects located in the vicinity of the car. However, the result changes according to the movement of the car, and therefore, the user needs to request up-to-date result to the server. On the other hand, frequent requests for up-to-date results cause heavy loadings on the server. To cope with this problem efficiently, the idea of the safe-region has been proposed, however, it takes long processing time in existing works. This paper proposes a fast generation method of the safe-region applicable to several types of vicinity queries. Through experimental evaluations, we demonstrate that the proposed method outperforms the existing algorithms in the processing time by one or two orders of magnitude.
To aim to achieve a high-performance computation for microwave simulations with low cost, small size machine and low energy consumption, a method of the FDTD dedicated computer has been investigated. It was shown by VHDL logical circuit simulations that the FDTD dedicated computer with a dataflow architecture has much higher performance than that of high-end PC and GPU. Then the remaining task of this work is large scale computations by the dedicated computer, since microwave simulations for only 18×18×Z grid space (Z is the number of girds for z direction) can be executed in a single FPGA at most. To treat much larger numerical model size for practical applications, this paper considers an implementation of a domain decomposition method operation of the FDTD dedicated computer in a single FPGA.