The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

2101-2120hit(20498hit)

  • Secure Multiuser Communications with Multiple Untrusted Relays over Nakagami-m Fading Channels

    Dechuan CHEN  Yunpeng CHENG  Weiwei YANG  Jianwei HU  Yueming CAI  Junquan HU  Meng WANG  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E102-A No:8
      Page(s):
    978-981

    In this letter, we investigate the physical layer security in multi-user multi-relay networks, where each relay is not merely a traditional helper, but at the same time, can become a potential eavesdropper. We first propose an efficient low-complexity user and relay selection scheme to significantly reduce the amount of channel estimation as well as the amount of potential links for comparison. For the proposed scheme, we derive the closed-form expression for the lower bound of ergodic secrecy rate (ESR) to evaluate the system secrecy performance. Simulation results are provided to verify the validity of our expressions and demonstrate how the ESR scales with the number of users and relays.

  • Recent Activities of 5G Experimental Trials on Massive MIMO Technologies and 5G System Trials Toward New Services Creation Open Access

    Yukihiko OKUMURA  Satoshi SUYAMA  Jun MASHINO  Kazushi MURAOKA  

     
    INVITED PAPER

      Pubricized:
    2019/02/22
      Vol:
    E102-B No:8
      Page(s):
    1352-1362

    In order to cope with recent growth of mobile data traffic and emerging various services, world-wide system trials for the fifth-generation (5G) mobile communication system that dramatically extends capability of the fourth-generation mobile communication system are being performed to launch its commercial service in 2020. In addition, research and development of new radio access technologies for 5G evolution and beyond 5G systems are beginning to be made all over the world. This paper introduces our recent activities on 5G transmission experiments that aim to validate Massive MIMO technologies using higher frequency bands such as SHF/EHF bands, that is, 5G experimental trials. Recent results of 5G system trials to create new services and applications in 5G era in cooperation with partners in vertical industries are also introduced.

  • Field Trial on 5G Low Latency Radio Communication System Towards Application to Truck Platooning Open Access

    Manabu MIKAMI  Hitoshi YOSHINO  

     
    PAPER

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1447-1457

    The fifth generation mobile communication system (5G) is designed to have new radio capabilities to support not only conventional enhanced Mobile Broadband (eMBB) communications but also new machine type communications such as Ultra-Reliable Low-Latency communications (URLLC) and massive Machine Type communications (m-MTC). In such new areas of URLLC and m-MTC, mobile operators need to explore new use cases and/or applications together with vertical industries, the industries which are potential users of 5G, in order to fully exploit the new 5G capabilities. Intelligent Transport System (ITS), including automated driving, is one of the most promising application areas of 5G since it requires both ultra-reliable and low-latency communications. We are actively working on the research and development of truck platooning as a new 5G application. We have developed a field trial system for vehicular-to-network (V2N) communications using 5G prototype equipment and actual large-size trucks in order to assess 5G capabilities, including ultra-low-latency, in automotive test courses in the field. This paper discusses the fundamental performance evaluation required for vehicular communications between platooning trucks, such as low-latency message communication for vehicle control and low-latency video monitoring of following platooning truck vehicles. The paper also addresses the field evaluation results of 5G V2N communications in a rural area. It clarifies the fundamental radio propagation issues at the leading and the following vehicles in truck platooning for V2N communications, and discusses the impact of the radio propagation over a road to the over-the-air transmission performance of 5G V2N communications.

  • Digital Beamforming Algorithm for 5G Low-SHF Band Massive MIMO

    Shohei YOSHIOKA  Satoshi SUYAMA  Tatsuki OKUYAMA  Jun MASHINO  Yukihiko OKUMURA  

     
    PAPER

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1371-1381

    Towards furthering the industrial revolution, the concept of a new cellular network began to be drawn up around 2010 as the fifth generation (5G) mobile wireless communication system. One of the main differences between the fourth generation (4G) mobile communication system Long Term Evolution (LTE) and 5G new radio (NR) is the frequency bands utilized. 5G NR assumes higher frequency bands. Effective utilization of the higher frequency bands needs to resolve the technical issue of the larger path-loss. Massive multiple-input multiple-output (Massive MIMO) beamforming (BF) technology contributes to overcome this problem, hence further study of Massive MIMO BF for each frequency band is necessary toward high-performance and easy implementation. In this paper, then, we propose a Massive MIMO method with fully-digital BF based on two-tap precoding for low super high frequency (SHF) band downlink (DL) transmissions (called as Digital FBCP). Additionally, three intersite coordination algorithms for Digital FBCP are presented for multi-site environments and one of the three algorithms is enhanced. It is shown that Digital FBCP achieves better throughput performance than a conventional algorithm with one-tap precoding. Considering performance of intersite coordination as well, it is concluded that Digital FBCP can achieve around 5 Gbps in various practical environments.

  • Performance Comparison of Multi-User Shared Multiple Access Scheme in Uplink Channels Open Access

    Eiji OKAMOTO  Manabu MIKAMI  Hitoshi YOSHINO  

     
    PAPER

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1458-1466

    In fifth-generation mobile communications systems (5G), grant-free non-orthogonal multiple access (NOMA) schemes have been considered as a way to accommodate the many wireless connections required for Internet of Things (IoT) devices. In NOMA schemes, both system capacity enhancement and transmission protocol simplification are achieved, and an overload test of more than one hundred percent of the transmission samples over conducted. Multi-user shared multiple access (MUSA) has been proposed as a representative scheme for NOMA. However, the performance of MUSA has not been fully analyzed nor compared to other NOMA or orthogonal multiple access schemes. Therefore, in this study, we theoretically and numerically analyze the performance of MUSA in uplink fading environments and compare it with orthogonal frequency division multiple access (OFDMA), space division multiple access-based OFDMA, low-density signature, and sparse code multiple access. The characteristics and superiority of MUSA are then clarified.

  • Physical Cell ID Detection Probabilities Using Frequency Domain PVS Transmit Diversity for NB-IoT Radio Interface

    Aya SHIMURA  Mamoru SAWAHASHI  Satoshi NAGATA  Yoshihisa KISHIYAMA  

     
    PAPER

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1477-1489

    This paper proposes frequency domain precoding vector switching (PVS) transmit diversity for synchronization signals to achieve fast physical cell identity (PCID) detection for the narrowband (NB)-Internet-of-Things (IoT) radio interface. More specifically, we propose localized and distributed frequency domain PVS transmit diversity schemes for the narrowband primary synchronization signal (NPSS) and narrowband secondary synchronization signal (NSSS), and NPSS and NSSS detection methods including a frequency offset estimation method suitable for frequency domain PVS transmit diversity at the receiver in a set of user equipment (UE). We conduct link-level simulations to compare the detection probabilities of NPSS and NSSS, i.e., PCID using the proposed frequency domain PVS transmit diversity schemes, to those using the conventional time domain PVS transmit diversity scheme. The results show that both the distributed and localized frequency domain PVS transmit diversity schemes achieve a PCID detection probability almost identical to that of the time domain PVS transmit diversity scheme when the effect of the frequency offset due to the frequency error of the UE temperature compensated crystal oscillator (TCXO) is not considered. We also show that for a maximum frequency offset of less than approximately 8 kHz, localized PVS transmit diversity achieves almost the same PCID detection probability. It also achieves a higher PCID detection probability than one-antenna transmission although it is degraded compared to the time domain PVS transmit diversity when the maximum frequency offset is greater than approximately 10 kHz.

  • Reduction of Crosstalk Influence in a 7-Core Multicore Fiber by Frequency Interleave

    Shun ORII  Kyo INOUE  Koji IGARASHI  

     
    PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2019/02/06
      Vol:
    E102-B No:8
      Page(s):
    1590-1594

    Wavelength-division multiplexing multicore fibers can transmit a large amount of information over one fiber, and high-density core allocations enable a large number of fiber lines to be deployed in limited spaces. However, inter-core crosstalk degrades the signal in these systems. This paper describes the design of a frequency interleaving scheme for a 7-core hexagonal multicore fiber. Interleaving schemes shift signal spectra between neighboring cores to reduce the signal degradation caused by inter-core crosstalk. The channel frequency allocation that most efficiently lowers the bit error rate is numerically determined in this study. The results indicate that the optimum frequency interleaving improves the allowable crosstalk ratio by 6.3 dB for QPSK signals, demonstrating its potential for improving wavelength-division multiplexing multicore fiber transmission systems.

  • Parameter Identification and State-of-Charge Estimation for Li-Ion Batteries Using an Improved Tree Seed Algorithm

    Weijie CHEN  Ming CAI  Xiaojun TAN  Bo WEI  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2019/05/17
      Vol:
    E102-D No:8
      Page(s):
    1489-1497

    Accurate estimation of the state-of-charge is a crucial need for the battery, which is the most important power source in electric vehicles. To achieve better estimation result, an accurate battery model with optimum parameters is required. In this paper, a gradient-free optimization technique, namely tree seed algorithm (TSA), is utilized to identify specific parameters of the battery model. In order to strengthen the search ability of TSA and obtain more quality results, the original algorithm is improved. On one hand, the DE/rand/2/bin mechanism is employed to maintain the colony diversity, by generating mutant individuals in each time step. On the other hand, the control parameter in the algorithm is adaptively updated during the searching process, to achieve a better balance between the exploitation and exploration capabilities. The battery state-of-charge can be estimated simultaneously by regarding it as one of the parameters. Experiments under different dynamic profiles show that the proposed method can provide reliable and accurate estimation results. The performance of conventional algorithms, such as genetic algorithm and extended Kalman filter, are also compared to demonstrate the superiority of the proposed method in terms of accuracy and robustness.

  • Graph Similarity Metric Using Graph Convolutional Network: Application to Malware Similarity Match

    Bing-lin ZHAO  Fu-dong LIU  Zheng SHAN  Yi-hang CHEN  Jian LIU  

     
    LETTER-Information Network

      Pubricized:
    2019/05/20
      Vol:
    E102-D No:8
      Page(s):
    1581-1585

    Nowadays, malware is a serious threat to the Internet. Traditional signature-based malware detection method can be easily evaded by code obfuscation. Therefore, many researchers use the high-level structure of malware like function call graph, which is impacted less from the obfuscation, to find the malware variants. However, existing graph match methods rely on approximate calculation, which are inefficient and the accuracy cannot be effectively guaranteed. Inspired by the successful application of graph convolutional network in node classification and graph classification, we propose a novel malware similarity metric method based on graph convolutional network. We use graph convolutional network to compute the graph embedding vectors, and then we calculate the similarity metric of two graph based on the distance between two graph embedding vectors. Experimental results on the Kaggle dataset show that our method can applied to the graph based malware similarity metric method, and the accuracy of clustering application with our method reaches to 97% with high time efficiency.

  • Dual Polarized Cylindrical Loop Slot Antenna for Omni Cell Application

    Bakar ROHANI  Ryosuke KANEDA  Hiroyuki ARAI  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2019/02/12
      Vol:
    E102-B No:8
      Page(s):
    1668-1675

    Urban area suffers severe multipath effects due to its complex infrastructure environment and sector antenna is a popular choice as a base station antenna in those areas. Within sector antennas, omni cell antenna is utilized as supporting antenna to cover low reception areas between them. This paper proposes a slant 45° dual polarized omnidirectional antenna to operate as the omni cell antenna in those environments. The frequency band covers the IMT band, ranging from 1920MHz to 2170MHz with directivity focusing in horizontal plane. The antenna structure consists of a loop slot antenna array as excitation element which is placed inside a cylindrical slot antenna as parasitic element. Good performance is achieved in both S-parameter and directivity results, with a gain of more than 4 dBi and a gain difference of less than 1.5dB. The measurement results also agree well with the simulation results and the final design confirms that the proposed antenna works effectively as a slant ±45 ° dual polarized omnidirectional antenna.

  • On Locally Minimum and Strongest Assumption Generation Method for Component-Based Software Verification

    Hoang-Viet TRAN  Ngoc Hung PHAM  Viet Ha NGUYEN  

     
    PAPER

      Pubricized:
    2019/05/16
      Vol:
    E102-D No:8
      Page(s):
    1449-1461

    Since software becomes more complex during its life cycle, the verification cost becomes higher, especially for such methods which are using model checking in general and assume-guarantee reasoning in specific. To address the problem of reducing the assume-guarantee verification cost, this paper presents a method to generate locally minimum and strongest assumptions for verification of component-based software. For this purpose, we integrate a variant of membership queries answering technique to an algorithm which considers candidate assumptions that are smaller and stronger first, larger and weaker later. Because the algorithm stops as soon as it reaches a conclusive result, the generated assumptions are the locally minimum and strongest ones. The correctness proof of the proposed algorithm is also included in the paper. An implemented tool, test data, and experimental results are presented and discussed.

  • Change Impact Analysis for Refinement-Based Formal Specification

    Shinnosuke SARUWATARI  Fuyuki ISHIKAWA  Tsutomu KOBAYASHI  Shinichi HONIDEN  

     
    PAPER

      Pubricized:
    2019/05/22
      Vol:
    E102-D No:8
      Page(s):
    1462-1477

    Refinement-based formal specification is a promising approach to the increasing complexity of software systems, as demonstrated in the formal method Event-B. It allows stepwise modeling and verifying of complex systems with multiple steps at different abstraction levels. However, making changes is more difficult, as caution is necessary to avoid breaking the consistency between the steps. Judging whether a change is valid or not is a non-trivial task, as the logical dependency relationships between the modeling elements (predicates) are implicit and complex. In this paper, we propose a method for analyzing the impact of the changes of Event-B. By attaching labels to modeling elements (predicates), the method helps engineers understand how a model is structured and what needs to be modified to accomplish a change.

  • TDCTFIC: A Novel Recommendation Framework Fusing Temporal Dynamics, CNN-Based Text Features and Item Correlation

    Meng Ting XIONG  Yong FENG  Ting WU  Jia Xing SHANG  Bao Hua QIANG  Ya Nan WANG  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2019/05/14
      Vol:
    E102-D No:8
      Page(s):
    1517-1525

    The traditional recommendation system (RS) can learn the potential personal preferences of users and potential attribute characteristics of items through the rating records between users and items to make recommendations.However, for the new items with no historical rating records,the traditional RS usually suffers from the typical cold start problem. Additional auxiliary information has usually been used in the item cold start recommendation,we further bring temporal dynamics,text and relevance in our models to release item cold start.Two new cold start recommendation models TmTx(Time,Text) and TmTI(Time,Text,Item correlation) proposed to solve the item cold start problem for different cold start scenarios.While well-known methods like TimeSVD++ and CoFactor partially take temporal dynamics,comments,and item correlations into consideration to solve the cold start problem but none of them combines these information together.Two models proposed in this paper fused features such as time,text,and relevance can effectively improve the performance under item cold start.We select the convolutional neural network (CNN) to extract features from item description text which provides the model the ability to deal with cold start items.Both proposed models can effectively improve the performance with item cold start.Experimental results on three real-world data set show that our proposed models lead to significant improvement compared with the baseline methods.

  • Improving Semi-Blind Uplink Interference Suppression on Multicell Massive MIMO Systems: A Beamspace Approach

    Kazuki MARUTA  Chang-Jun AHN  

     
    PAPER

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1503-1511

    This paper improves our previously proposed semi-blind uplink interference suppression scheme for multicell multiuser massive MIMO systems by incorporating the beamspace approach. The constant modulus algorithm (CMA), a known blind adaptive array scheme, can fully exploit the degree of freedom (DoF) offered by massive antenna arrays to suppress inter-user interference (IUI) and inter-cell interference (ICI). Unfortunately, CMA wastes a lot of the benefit of DoF for null-steering even when the number of incoming signal is fewer than that of receiving antenna elements. Our new proposal introduces the beamspace method which degenerates the number of array input for CMA from element-space to beamspace. It can control DoF expended for subsequent interference suppression by CMA. Optimizing the array beamforming gain and null-steering ability, can further improve the output signal-to-interference and noise power ratio (SINR). Computer simulation confirmed that our new proposal reduced the required number of data symbols by 34.6%. In addition, the 5th percentile SINR was also improved by 14.3dB.

  • Consistency Checking between Java Equals and hashCode Methods Using Software Analysis Workbench

    Kozo OKANO  Satoshi HARAUCHI  Toshifusa SEKIZAWA  Shinpei OGATA  Shin NAKAJIMA  

     
    PAPER-Software System

      Pubricized:
    2019/05/14
      Vol:
    E102-D No:8
      Page(s):
    1498-1505

    Java is one of important program language today. In Java, in order to build sound software, we have to carefully implement two fundamental methods hashCode and equals. This requirement, however, is not easy to follow in real software development. Some existing studies for ensuring the correctness of these two methods rely on static analysis, which are limited to loop-free programs. This paper proposes a new solution to this important problem, using software analysis workbench (SAW), an open source tool. The efficiency is evaluated through experiments. We also provide a useful situation where cost of regression testing is reduced when program refactoring is conducted.

  • 7-Bit Multilayer True-Time Delay up to 1016ps for Wideband Phased Array Antenna Open Access

    Minyoung YOON  Sangwook NAM  

     
    BRIEF PAPER-Microwaves, Millimeter-Waves

      Vol:
    E102-C No:8
      Page(s):
    622-626

    We present a seven-bit multilayer true-time delay (TTD) circuit operating from 1 to 7GHz for wideband phased array antennas. By stacking advanced substrates with low dielectric loss, the TTD with PCB process is miniaturized and has low insertion loss. The signal vias with surrounding ground vias are designed to provide impedance matching throughout the band, allowing the overall group delay to be flat. The standard deviation of the TTD for all states is below 19ps, which is 1.87% of the maximum group delay. The maximum delay is 1016ps with resolution of 8ps. The implemented TTD is 36.6×19.4mm2 and consumes 0.65mW at 3.3V supply for all the delay states. The measured input/output return loss is better than 12.1dB for the band of 1-7GHz.

  • Iterative Adversarial Inference with Re-Inference Chain for Deep Graphical Models

    Zhihao LIU  Hui YIN  Hua HUANG  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2019/05/07
      Vol:
    E102-D No:8
      Page(s):
    1586-1589

    Deep Graphical Model (DGM) based on Generative Adversarial Nets (GANs) has shown promise in image generation and latent variable inference. One of the typical models is the Iterative Adversarial Inference model (GibbsNet), which learns the joint distribution between the data and its latent variable. We present RGNet (Re-inference GibbsNet) which introduces a re-inference chain in GibbsNet to improve the quality of generated samples and inferred latent variables. RGNet consists of the generative, inference, and discriminative networks. An adversarial game is cast between the generative and inference networks and the discriminative network. The discriminative network is trained to distinguish between (i) the joint inference-latent/data-space pairs and re-inference-latent/data-space pairs and (ii) the joint sampled-latent/generated-data-space pairs. We show empirically that RGNet surpasses GibbsNet in the quality of inferred latent variables and achieves comparable performance on image generation and inpainting tasks.

  • Speech Quality Enhancement for In-Ear Microphone Based on Neural Network

    Hochong PARK  Yong-Shik SHIN  Seong-Hyeon SHIN  

     
    LETTER-Speech and Hearing

      Pubricized:
    2019/05/15
      Vol:
    E102-D No:8
      Page(s):
    1594-1597

    Speech captured by an in-ear microphone placed inside an occluded ear has a high signal-to-noise ratio; however, it has different sound characteristics compared to normal speech captured through air conduction. In this study, a method for blind speech quality enhancement is proposed that can convert speech captured by an in-ear microphone to one that resembles normal speech. The proposed method estimates an input-dependent enhancement function by using a neural network in the feature domain and enhances the captured speech via time-domain filtering. Subjective and objective evaluations confirm that the speech enhanced using our proposed method sounds more similar to normal speech than that enhanced using conventional equalizer-based methods.

  • Saccade Information Based Directional Heat Map Generation for Gaze Data Visualization

    Yinwei ZHAN  Yaodong LI  Zhuo YANG  Yao ZHAO  Huaiyu WU  

     
    LETTER-Computer Graphics

      Pubricized:
    2019/05/15
      Vol:
    E102-D No:8
      Page(s):
    1602-1605

    Heat map is an important tool for eye tracking data analysis and visualization. It is very intuitive to express the area watched by observer, but ignores saccade information that expresses gaze shift. Based on conventional heat map generation method, this paper presents a novel heat map generation method for eye tracking data. The proposed method introduces a mixed data structure of fixation points and saccades, and considers heat map deformation for saccade type data. The proposed method has advantages on indicating gaze transition direction while visualizing gaze region.

  • Performance of Iterative Digital Self-Interference Canceler with Alternating Estimate Subtraction for OFDM Using Full Duplex

    Takahiro OHTOMO  Hiroki YAMADA  Mamoru SAWAHASHI  Keisuke SAITO  

     
    PAPER

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1490-1502

    In full duplex (FD), which improves the system capacity (or cell throughput) and reduces the transmission delay (or latency) through simultaneous transmission and reception in the same frequency band, self-interference (SI) from the transmitter should be suppressed using antenna isolation, an analog SI canceler, and digital SI canceler (DSIC) to a level such that the data or control channel satisfies the required block error rate (BLER). This paper proposes a structure of iterative DSIC with alternating estimate subtraction (AES-IDSIC) for orthogonal frequency division multiplexing (OFDM) using FD. We first present the required SI suppression level considering SI, quantization noise of an analog-to-digital converter, and nonlinear distortion of a power amplifier and RF receiver circuit for a direct conversion transceiver using FD. Then, we propose an AES-IDSIC structure that iterates the generation of the SI estimate, the downlink symbol estimate, and then alternately removes one of the estimates from the received signal in the downlink including SI. We investigate the average BLER performance of the AES-IDSIC for OFDM using FD in a multipath fading channel based on link-level simulations under the constraint that the derived required signal-to-SI ratio must be satisfied.

2101-2120hit(20498hit)