Raza Ali SHAH Nandana RAJATHEVA Yusheng JI
Subcarrier mapping (SCM) is considered to be crucial for capacity-maximization in orthogonal frequency division multiplexing (OFDM) relaying networks and has been investigated extensively. However, no study has examined its exact or approximate close-form analysis under Nakagami-m fading. This paper considers the ordered subcarrier pairing schemes, i.e., worst-to-best (WTB) SCM and best-to-best (BTB) SCM, for the analysis of bit error rate (BER) and capacity of a dual-hop OFDM amplify-and-forward (AF) relay system. The system-analysis is presented for Nakagami-m fading with emphasis on two special cases: one-sided Gaussian fading ($(m=rac{1}{2})$) and Rayleigh fading (m=1). Close-form expressions for the probability density function (PDF) and moment generating function (MGF) of end-to-end SNR are derived while considering fixed gain AF relays. The classical MGF and PDF based approaches are used to compare the BER performance of the system with WTB SCM and BTB SCM schemes. Close-form expressions for the upper bound on ergodic capacity are derived by analyzing Jensen's inequality. Accurate analysis is presented for integer m while the non-integer m values allow the derivations of approximate expressions. The accuracy of the suggested approximation is verified analytically as well as numerically. The simulation results validate the analysis in Nakagami-m fading channel.
This letter presents a method to adaptively counter false data injection attacks (FDIAs) in wireless sensor networks, in which a fuzzy rule-based system detects FDIAs and chooses the most appropriate countermeasures. The method does not require en-route verification processes and manual parameter settings. The effectiveness of the method is shown with simulation results.
Nan ZHANG Jong-hyeon KIM Soo-jung RYU Wansoo NAH
An imbalance difference model has been developed to estimate the common-mode radiated emission of a PCB with an attached cable. This model, however, requires significant computation time for full-wave simulation, especially if the attached cable is long, even with a powerful computer configuration. To solve this problem, a method that approximates the imbalance difference model as an equivalent asymmetrical dipole antenna is proposed in this paper. The common-mode radiated emission can be predicted using a line integration of the common-mode current distribution which is directly estimated by the asymmetrical antenna model. Unlike existing methods, the proposed method avoids the circuit construction normally used to measure the common-mode current, and is still able to accurately predict the maximum common-mode radiation. The effectiveness of the proposed method is verified by comparing the predicted results with the 3D full-wave simulation and the measured data gathered in an anechoic chamber.
Kei SAKAGUCHI Gia Khanh TRAN Hidekazu SHIMODAIRA Shinobu NANBA Toshiaki SAKURAI Koji TAKINAMI Isabelle SIAUD Emilio Calvanese STRINATI Antonio CAPONE Ingolf KARLS Reza AREFI Thomas HAUSTEIN
Triggered by the explosion of mobile traffic, 5G (5th Generation) cellular network requires evolution to increase the system rate 1000 times higher than the current systems in 10 years. Motivated by this common problem, there are several studies to integrate mm-wave access into current cellular networks as multi-band heterogeneous networks to exploit the ultra-wideband aspect of the mm-wave band. The authors of this paper have proposed comprehensive architecture of cellular networks with mm-wave access, where mm-wave small cell basestations and a conventional macro basestation are connected to Centralized-RAN (C-RAN) to effectively operate the system by enabling power efficient seamless handover as well as centralized resource control including dynamic cell structuring to match the limited coverage of mm-wave access with high traffic user locations via user-plane/control-plane splitting. In this paper, to prove the effectiveness of the proposed 5G cellular networks with mm-wave access, system level simulation is conducted by introducing an expected future traffic model, a measurement based mm-wave propagation model, and a centralized cell association algorithm by exploiting the C-RAN architecture. The numerical results show the effectiveness of the proposed network to realize 1000 times higher system rate than the current network in 10 years which is not achieved by the small cells using commonly considered 3.5GHz band. Furthermore, the paper also gives latest status of mm-wave devices and regulations to show the feasibility of using mm-wave in the 5G systems.
Naoki HARADA Shintaro SATO Naoki YOKOYAMA
The short-channel effect (SCE) in a MOSFET with an atomically thin MoS$_{2}$ channel was studied using a TCAD simulator. We derived the surface potential roll-up, drain-induced barrier lowering (DIBL), threshold voltage, and subthreshold swing (SS) as indexes of the SCE and analyzed their dependency on the channel thickness (number of atomic layers) and channel length. The minimum scalable channel length for a one-atomic-layer-thick MoS$_{2}$ MOSFET was determined from the threshold voltage roll-off to be 7.6,nm. The one-layer-thick device showed a small DIBL of 87,mV/V at a 20 nm gate length. By using high-k gate insulator, an SS lower than 70,mV/dec is achievable in sub-10-nm-scale devices.
Go FUJII Masahiro UKIBE Shigetomo SHIKI Masataka OHKUBO
Superconducting tunnel junction (STJ) array detectors can exhibit excellent performance with respect to energy resolution, detection efficiency, and counting rate in the soft X-ray energy range, by which those excellent properties STJ array detectors are well suited for detecting X-rays at synchrotron radiation facilities. However, in order to achieve a high throughput analysis for trace impurity elements such as dopants in structural or functional materials, the sensitive area of STJ array detectors should be further enlarged up to more than 10 times larger by increasing the pixel number in array detectors. In this work, for a large STJ-pixel number of up to 1000 within a 10,mm- square compact chip, we have introduced three-dimensional (3D) structure by embedding a wiring layer in a SiO$_{2}$ isolation layer underneath a base electrode layer of STJs. The 3D structure is necessary for close-packed STJ arrangement, avoiding overlay of lead wiring, which is common in conventional two-dimensional layout. The fabricated STJ showed excellent current-voltage characteristics having low subgap currents less than 2,nA, which are the same as those of conventional STJs. An STJ pixel has an energy resolution of 31,eV (FWHM) for C-K$alpha $ (277,eV).
This paper studies the problem of power allocation for a two-way orthogonal frequency division multiplexing (OFDM) based cognitive radio (CR) network to maximize the ergodic capacities of the secondary users (SUs). Under the assumption that the SUs know the channel state information (CSI) of the interference links between the SUs and the primary user (PU) perfectly, the optimal power allocation algorithm under the interference and transmit power constraints is derived. In addition, we further assume that the SUs only know the channel distribution information (CDI) of the interference links and propose a heuristic algorithm under the interference outage and transmit power constraints based on Gaussian approximation. It is shown that the ergodic capacity with CDI is not degraded compared to that with perfect CSI under tight transmit power constraint. Moreover, it is shown that the interference outage constraint is satisfied even for very small number of subcarriers if an interference power margin is adopted for Gaussian approximation.
Ann-Chen CHANG Chih-Chang SHEN
This letter deals with the carrier frequency offsets (CFO) estimation problem for orthogonal frequency division multiple access (OFDMA) uplink systems. Combined with centro-symmetric (CS) trimmed autocorrelation matrix and weighting subspace projection, the proposed estimator has better estimate performance than MVDR, MUSIC, CS-MUSIC, and ESPRIT estimators, especially in relatively less of OFDMA blocks and low SNR situations. Simulation results are presented to verify the efficiency of the proposed estimator.
In this paper, we propose a framework for the real-time estimation of a multidimensional QoE of Multi-View Video and Audio (MVV-A) IP transmission. The framework utilizes linear multiple regression analysis with application-level and transport-level QoS parameters which can be measured in real time. In order to cope with a variety of MVV-A usage-situations, we introduce the concept of usage-situation type for grouping usage-situations with similar features to apply a representative regression line. We deal with two contents, two camera arrangements, and two user interfaces for viewpoint change as representative examples of the usage-situations. We assess multidimensional QoE of MVV-A with various types of average load, playout buffering time, and delay in the network. We then conduct the multiple regression analysis for the multidimensional QoE values represented by a psychological scale. From the comparison of measured values and estimated ones, we notice that real-time estimation of QoE is feasible in MVV-A IP transmission.
Keisuke MAEHATA Makoto MAEDA Naoko IYOMOTO Kenji ISHIBASHI Keisuke NAKAMURA Katsunori AOKI Koji TAKASAKI Kazuhisa MITSUDA Keiichi TANAKA
A four-pixel-array superconducting transition-edge sensor (TES) microcalorimeter with a mushroom-shaped absorber was fabricated for the energy dispersive spectroscopy performed on a transmission electron microscope. The TES consists of a bilayer of Au/Ti with either a 50-nm or 120-nm thickness. The absorber of 5.0,$mu$m thick is made from a Au layer and its stem is deposited in the center of the TES surface. A Ta$_{2}$O$_{5}$ insulating layer of 100-nm thickness is inserted between the overhang region of the absorber and the TES surface. A selected pixel of the TES microcalorimeter was operated for the detection of Np L X-rays emitted from an $^{241}$Am source. A response of the TES microcalorimeter to L X-rays was obtained by analyzing detection signal pulses with using the optimal filter method. An energy resolution was obtained to be 33,eV of the full width at half maximum value at 17.751,keV of Np L$_{eta 1}$ considering its natural width of 13.4,eV. Response to L X-rays emitted from a mixture source of $^{238}$Pu, $^{239}$Pu and $^{241}$Am was obtained by operating the selected pixel of the TES microcalorimeter. Major L X-ray peaks of progeny elements of $alpha$ decay of Pu and Am isotopes were clearly identified in the obtained energy spectrum. The experimental results demonstrated the separation of $^{241}$Am and plutonium isotopes by L X-ray spectroscopy.
Xinran LI Fang-Wei FU Xuan GUANG
FOX is a family of block ciphers published in 2004 and is famous for its provable security to cryptanalysis. In this paper, we present multiple 4-round impossible differentials and several new results of impossible differential attacks on 5,6,7-round FOX64 and 5-round FOX128 with the multiple differentials and the new early abort technique which shall reduce the data complexity and the time complexity respectively. In terms of the data complexity and the time complexity, our results are better than any of the previously known attacks.
Eugin HYUN Woojin OH Jong-Hun LEE
In automotive frequency modulated continuous wave (FMCW) radar based on multiple ramps with different slope, an effective pairing algorithm is required to simultaneously detect the target range and velocity. That is, as finding beat-frequencies intersecting at a single point of the range-Doppler map, we extract the range and velocity of a target. Unlike the ideal case, however, in a real radar system, even though multiple beat frequencies are originated from the same target, these beat frequencies have many different intersection values, resulting in mismatch pairing during the pairing step. Moreover, this problem also reduces the detection accuracy and the radar detection performance. In this study, we found that mismatch pairing is caused by the round-off errors of the range-beat frequency and Doppler frequency, as well as their various combinations in the discrete frequency domain. We also investigated the effect of mismatch pairing on detection performance, and proposed a new approach to minimize this problem. First, we propose integer and half-integer frequency position-based pairing method during extraction of the range and Doppler frequencies in each ramp to increase detection accuracy. Second, we propose a window-based pairing method to identify the same target from range-Doppler frequencies extracted in the first step. We also find the appropriate window size to overcome pairing mismatch. Finally, we propose the method to obtain a higher accuracy of range and velocity by weighting the values determined in one window. To verify the detection performance of the proposed method by comparison with the typical method, simulations were conducted. Then, in a real field test using the developed radar prototype, the detection probability of the proposed algorithm showed more than 60% improvement in comparison with the conventional method.
Manyi WANG Zhonglei WANG Enjie DING Yun YANG
Radio Frequency based Device-Free Localization (RFDFL) is an emerging localization technique without requirements of attaching any electronic device to a target. The target can be localized by means of measuring the shadowing of received signal strength caused by the target. However, the accuracy of RFDFL deteriorates seriously in environment with WiFi interference. State-of-the-art methods do not efficiently solve this problem. In this paper, we propose a dual-band method to improve the accuracy of RFDFL in environment without/with severe WiFi interference. We introduce an algorithm of fusing dual-band images in order to obtain an enhanced image inferring more precise location and propose a timestamp-based synchronization method to associate the dual-band images to ensure their one-one correspondence. With real-world experiments, we show that our method outperforms traditional single-band localization methods and improves the localization accuracy by up to 40.4% in real indoor environment with high WiFi interference.
Kemmei KAJINO Shigehito MIKI Taro YAMASHITA Hirotaka TERAI
We report the energy-efficient optical input interface using NbN superconducting nanowire-based optical-to-electrical (SN-OE) converters for a single-flux-quantum (SFQ) data processing system. The SN-OE converters with small active areas ranging from 1$, imes,$1 to 10$, imes,$10,$mu$m$^2$ were fabricated to improve the recovery time by reducing the kinetic inductance of the nanowire. The SN-OE with the smallest area of 1$, imes,$1 $mu$m$^2$ showed the recovery time of around 0.3 ns, while its detection efficiency for a single photon was reduced below 0.1% due to insufficient coupling efficiency with a single-mode optical fiber. However, the optical power dependence of the error rate of this device showed that the required optical power to achieve the error rate below $10^{-12}$ at 10 GHz operation is as large as 70 $mu$W, which is still one order of magnitude lower than semiconductor photo diodes. We also demonstrated the operation of the SN-OE converters combined with the SFQ readout circuit and confirmed the operating speed up to 77~MHz.
Golf is a solitaire game, where the object is to move all cards from a 5×8 rectangular layout of cards to the foundation. A top card in each column may be moved to the foundation if it is either one rank higher or lower than the top card of the foundation. If no cards may be moved, then the top card of the stock may be moved to the foundation. We prove that the generalized version of Golf Solitaire is NP-complete.
Dijian CHEN Zhiwei HAO Kenji FUJIMOTO Tatsuya SUZUKI
This paper develops the double generating function method for the discrete-time linear quadratic optimal control problem. This method can give generators for optimal solutions only in terms of pre-computed coefficients and boundary conditions, which is useful for the on-line repetitive computation for different boundary conditions. Moreover, since each generator contains inverse terms, the invertibility analysis is also performed to conclude that the terms in the generators constructed by double generating functions with opposite time directions are invertible under some mild conditions, while the terms with the same time directions will become singular when the time goes infinity which may cause instability in numerical computations. Examples demonstrate the effectiveness of the developed method.
Since the birth of astrophysics, astronomers have been using free-space optics to analyze light falling on Earth. In the future however, thanks to the advances in photonics and nanoscience/nanotechnology, much of the manipulation of light might be carried out using not optics but confined waveguides, or circuits, on a chip. This new generation of instruments will be not only extremely compact, but also powerful in performance because the integration enables a greater degree of multiplexing. The benefit is especially profound for space- or air-borne observatories, where size, weight, and mechanical reliability are of top priority. Recently, several groups around the world are trying to integrate ultra-wideband (UWB), low-resolution spectrometers for millimeter-submillimeter waves onto microchips, using superconducting microelectronics. The scope of this Paper is to provide a general introduction and a review of the state-of-the-art of this rapidly advancing field.
Eiichiro FUJISAKI Akinori KAWACHI Ryo NISHIMAKI Keisuke TANAKA Kenji YASUNAGA
Leakage resilient cryptography is often considered in the presence of a very strong leakage oracle: An adversary may submit arbitrary efficiently computable function f to the leakage oracle to receive f(x), where x denotes the entire secret that a party possesses. This model is somewhat too strong in the setting of public-key encryption (PKE). It is known that no secret-key leakage resilient PKE scheme exists if the adversary may have access to the secret-key leakage oracle to receive only one bit after it was given the challenge ciphertext. Similarly, there exists no sender-randomness leakage resilient PKE scheme if one-bit leakage occurs after the target public key was given to the adversary. At TCC 2011, Halevi and Lin have broken the barrier of after-the-fact leakage, by proposing the so-called split state model, where a secret key of a party is explicitly divided into at least two pieces, and the adversary may have not access to the entire secret at once, but each divided pieces, one by one. In the split-state model, they have constructed post-challenge secret-key leakage resilient CPA secure PKEs from hash proof systems, but the construction of CCA secure post-challenge secret-key leakage PKE has remained open. They have also remained open to construct sender-randomness leakage PKE in the split state model. This paper provides a solution to the open issues. We also note that the proposal of Halevi and Lin is post-challenge secret-key leakage CPA secure against a single challenge ciphertext; not against multiple challenges. We present an efficient generic construction that converts any CCA secure PKE scheme into a multiple-challenge CCA secure PKE that simultaneously tolerates post-challenge secret-key and sender-randomness leakage in the split state model, without any additional assumption. In addition, our leakage amount of the resulting schemes is the same as that of Halevi and Lin CPA PKE, i.e., (1/2+γ)l/2 where l denotes the length of the entire secret (key or randomness) and γ denotes a universal (possitive) constant less than 1/2. Our conversion is generic and available for many other public-key primitives. For instance, it can convert any identity-based encryption (IBE) scheme to a post-challenge master-key leakage and sender-randomness leakage secure IBE.
A new trigger circuit based on up/down counter is proposed. This trigger circuit consists of a up/down counter and a pulse conversion circuit. Compared with a trigger circuit based on 32-bit counter, the proposed trigger circuit occupies less circuit area and consumes less power consumption, while the trigger process can be inversed, increasing the controllability of the Trojan.
Deokmin HAAM Hyeon-Gyu KIM Myoung-Ho KIM
This paper presents a filtering method for efficient face image retrieval over large volume of face databases. The proposed method employs a new face image descriptor, called a cell-orientation vector (COV). It has a simple form: a 72-dimensional vector of integers from 0 to 8. Despite of its simplicity, it achieves high accuracy and efficiency. Our experimental results show that the proposed method based on COVs provides better performance than a recent approach based on identity-based quantization in terms of both accuracy and efficiency.