The search functionality is under construction.

Keyword Search Result

[Keyword] BER(1214hit)

41-60hit(1214hit)

  • Communication Quality Estimation Observer: An Approach for Integrated Communication Quality Estimation and Control for Digital-Twin-Assisted Cyber-Physical Systems Open Access

    Ryogo KUBO  

     
    INVITED PAPER

      Pubricized:
    2022/04/14
      Vol:
    E105-B No:10
      Page(s):
    1139-1153

    Cyber-physical systems (CPSs) assisted by digital twins (DTs) integrate sensing-actuation loops over communication networks in various infrastructure services and applications. This study overviews the concept, methodology, and applications of the integrated communication quality estimation and control for the DT-assisted CPSs from both communications and control perspectives. The DT-assisted CPSs can be considered as networked control systems (NCSs) with virtual dynamic models of physical entities. A communication quality estimation observer (CQEO), which is an extended version of the communication disturbance observer (CDOB) utilized for time-delay compensation in NCSs, is proposed to estimate the integrated effects of the quality of services (QoS) and cyberattacks on the NCS applications. A path diversity technique with the CQEO is also proposed to achieve reliable NCSs. The proposed technique is applied to two kinds of NCSs: remote motor control and haptic communication systems. Moreover, results of the simulation on a haptic communication system show the effectiveness of the proposed approach. In the end, future research directions of the CQEO-based scheme are presented.

  • Strengthening Network-Based Moving Target Defense with Disposable Identifiers

    Taekeun PARK  Keewon KIM  

     
    LETTER-Information Network

      Pubricized:
    2022/07/08
      Vol:
    E105-D No:10
      Page(s):
    1799-1802

    In this paper, we propose a scheme to strengthen network-based moving target defense with disposable identifiers. The main idea is to change disposable identifiers for each packet to maximize unpredictability with large hopping space and substantially high hopping frequency. It allows network-based moving target defense to defeat active scanning, passive scanning, and passive host profiling attacks. Experimental results show that the proposed scheme changes disposable identifiers for each packet while requiring low overhead.

  • Experimental and Numerical Analysis of Ultrahigh-Speed Coherent Nyquist Pulse Transmission with Low-Nonlinearity Dispersion Compensator

    Kosuke KIMURA  Masato YOSHIDA  Keisuke KASAI  Toshihiko HIROOKA  Masataka NAKAZAWA  

     
    PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2022/03/22
      Vol:
    E105-B No:9
      Page(s):
    1014-1022

    In this paper, we report an experimental and numerical analysis of ultrahigh-speed coherent Nyquist pulse transmission. First, we describe a low-nonlinearity dispersion compensator for ultrahigh-speed coherent Nyquist pulse transmission; it is composed of a chirped fiber Bragg grating (CFBG) and a liquid crystal on silicon (LCoS) device. By adopting CFBG instead of inverse dispersion fiber, the nonlinearity in a 160km transmission line was more than halved. Furthermore, by eliminating the group delay fluctuation of the CFBG with an LCoS device, the residual group delay was reduced to as low as 1.42ps over an 11nm bandwidth. Then, by using the transmission line with the newly constructed low-nonlinearity dispersion compensator, we succeeded in improving the BER performance of single-channel 15.3Tbit/s-160km transmission by one-third compared with that of a conventional dispersion-managed transmission line and obtained a spectral efficiency of 8.7bit/s/Hz. Furthermore, we numerically analyzed the BER performance of its Nyquist pulse transmission. The numerical results showed that the nonlinear impairment in the transmission line is the main factor limiting the transmission performance in a coherent Nyquist pulse transmission, which becomes more significant at higher baud rates.

  • DRoF-Based Optical Video Re-Transmission System with Adaptive Combination Compression for Rain Attenuated Satellite Broadcast Signals Open Access

    Ryota SHIINA  Toshihito FUJIWARA  Tomohiro TANIGUCHI  Shunsuke SARUWATARI  Takashi WATANABE  

     
    PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2022/04/06
      Vol:
    E105-B No:9
      Page(s):
    1023-1032

    In order to further reduce the transmission rate of multi-channel satellite broadcast signals, whose carrier-to-noise ratio (CNR fluctuates due to rainfall attenuation, we propose a novel digitized radio-over-fiber (DRoF) -based optical re-transmission system based on adaptive combination compression for ultra-high definition (UHD) broadcasting satellite (BS)/communications satellite (CS) broadcast signals. The proposed system reduces the optical re-transmission rate of BS/CS signals as much as possible while handling input CNR fluctuations. Therefore, the transmission rate of communication signals in time-division multiplexing (TDM) transmission is ensured, and network sharing of communication signals and broadcast signals via passive optical network (PON) is realized. Based on the ITU-R P.618-13 prediction model, an experimental evaluation is performed using estimates of the long-term statistics of attenuation due to rainfall. The attenuation is evaluated as a percentage of the time that long-term re-transmission service is available. It is shown that the proposed system is able to accommodate a wide range of rainfall attenuation and achieve a 99.988% time percentage for the duration of service provision. In order to show the rate reduction effect of the proposed system, the quantization bit reduction effect as a function of the input CNR, which depends on rainfall attenuation, is experimentally confirmed. Experiments show that service operation time of 99.978% can be achieved by 3-bit transmission. This means a 62.5% reduction in transmission rate is realized compared to conventional fixed quantization. Furthermore, the average quantization bit number in our system for service operation times is 3.000, indicating that most service operation times are covered by just 3-bit transmission.

  • Design and Implementation of an Edge Computing Testbed to Simplify Experimental Environment Setup

    Hiroaki YAMANAKA  Yuuichi TERANISHI  Eiji KAWAI  Hidehisa NAGANO  Hiroaki HARAI  

     
    PAPER-Dependable Computing

      Pubricized:
    2022/05/27
      Vol:
    E105-D No:9
      Page(s):
    1516-1528

    Running IoT applications on edge computing infrastructures has the benefits of low response times and efficient bandwidth usage. System verification on a testbed is required to deploy IoT applications in production environments. In a testbed, Docker containers are preferable for a smooth transition of tested application programs to production environments. In addition, the round-trip times (RTT) of Docker containers to clients must be ensured, according to the target application's response time requirements. However, in existing testbed systems, the RTTs between Docker containers and clients are not ensured. Thus, we must undergo a large amount of configuration data including RTTs between all pairs of wireless base station nodes and servers to set up a testbed environment. In this paper, we present an edge computing testbed system with simple application programming interfaces (API) for testbed users that ensures RTTs between Docker containers and clients. The proposed system automatically determines which servers to place Docker containers on according to virtual regions and the RTTs specified by the testbed users through APIs. The virtual regions provide reduced size information about the RTTs in a network. In the proposed system, the configuration data size is reduced to one divided by the number of the servers and the command arguments length is reduced to approximately one-third or less, whereas the increased system running time is 4.3s.

  • Improved Optimal Configuration for Reducing Mutual Coupling in a Two-Level Nested Array with an Even Number of Sensors

    Weichuang YU  Peiyu HE  Fan PAN  Ao CUI  Zili XU  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2021/12/29
      Vol:
    E105-B No:7
      Page(s):
    856-865

    To reduce mutual coupling of a two-level nested array (TLNA) with an even number of sensors, we propose an improved array configuration that exhibits all the good properties of the prototype optimal configuration under the constraint of a fixed number of sensors N and achieves reduction of mutual coupling. Compared with the prototype optimal TLNA (POTLNA), which inner level and outer level both have N/2 sensors, those of the improved optimal TLNA (IOTLNA) are N/2-1 and N/2+1. It is proved that the physical aperture and uniform degrees of freedom (uDOFs) of IOTLNA are the same as those of POTLNA, and the number of sensor pairs with small separations of IOTLNA is reduced. We also construct an improved optimal second-order super nested array (SNA) by using the IOTLNA as the parent nested array, termed IOTLNA-SNA, which has the same physical aperture and the same uDOFs, as well as the IOTLNA. Numerical simulations demonstrate the better performance of the improved array configurations.

  • A Large-Scale SCMA Codebook Optimization and Codeword Allocation Method

    Shiqing QIAN  Wenping GE  Yongxing ZHANG  Pengju ZHANG  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2021/12/24
      Vol:
    E105-B No:7
      Page(s):
    788-796

    Sparse code division multiple access (SCMA) is a non-orthogonal multiple access (NOMA) technology that can improve frequency band utilization and allow many users to share quite a few resource elements (REs). This paper uses the modulation of lattice theory to develop a systematic construction procedure for the design of SCMA codebooks under Gaussian channel environments that can achieve near-optimal designs, especially for cases that consider large-scale SCMA parameters. However, under the condition of large-scale SCMA parameters, the mother constellation (MC) points will overlap, which can be solved by the method of the partial dimensions transformation (PDT). More importantly, we consider the upper bounded error probability of the signal transmission in the AWGN channels, and design a codeword allocation method to reduce the inter symbol interference (ISI) on the same RE. Simulation results show that under different codebook sizes and different overload rates, using two different message passing algorithms (MPA) to verify, the codebook proposed in this paper has a bit error rate (BER) significantly better than the reference codebooks, moreover the convergence time does not exceed that of the reference codebooks.

  • A Large-Scale Bitcoin Abuse Measurement and Clustering Analysis Utilizing Public Reports

    Jinho CHOI  Jaehan KIM  Minkyoo SONG  Hanna KIM  Nahyeon PARK  Minjae SEO  Youngjin JIN  Seungwon SHIN  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2022/04/07
      Vol:
    E105-D No:7
      Page(s):
    1296-1307

    Cryptocurrency abuse has become a critical problem. Due to the anonymous nature of cryptocurrency, criminals commonly adopt cryptocurrency for trading drugs and deceiving people without revealing their identities. Despite its significance and severity, only few works have studied how cryptocurrency has been abused in the real world, and they only provide some limited measurement results. Thus, to provide a more in-depth understanding on the cryptocurrency abuse cases, we present a large-scale analysis on various Bitcoin abuse types using 200,507 real-world reports collected by victims from 214 countries. We scrutinize observable abuse trends, which are closely related to real-world incidents, to understand the causality of the abuses. Furthermore, we investigate the semantics of various cryptocurrency abuse types to show that several abuse types overlap in meaning and to provide valuable insight into the public dataset. In addition, we delve into abuse channels to identify which widely-known platforms can be maliciously deployed by abusers following the COVID-19 pandemic outbreak. Consequently, we demonstrate the polarization property of Bitcoin addresses practically utilized on transactions, and confirm the possible usage of public report data for providing clues to track cyber threats. We expect that this research on Bitcoin abuse can empirically reach victims more effectively than cybercrime, which is subject to professional investigation.

  • Number of Failed Components in Consecutive-k-out-of-n:G Systems and Their Applications in Optimization Problems

    Lei ZHOU  Hisashi YAMAMOTO  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Pubricized:
    2021/12/16
      Vol:
    E105-A No:6
      Page(s):
    943-951

    In this paper, we study the number of failed components in a consecutive-k-out-of-n:G system. The distributions and expected values of the number of failed components when system is failed or working at a particular time t are evaluated. We also apply them to the optimization problems concerned with the optimal number of components and the optimal replacement time. Finally, we present the illustrative examples for the expected number of failed components and give the numerical results for the optimization problems.

  • Accurate Source-Number Estimation Using Denoising Preprocessing and Singular Value Decomposition

    Shohei HAMADA  Koichi ICHIGE  Katsuhisa KASHIWAGI  Nobuya ARAKAWA  Ryo SAITO  

     
    PAPER-DOA Estimation

      Pubricized:
    2021/12/03
      Vol:
    E105-B No:6
      Page(s):
    766-774

    This paper proposes two accurate source-number estimation methods for array antennas and multi-input multi-output radar. Direction of arrival (DOA) estimation is important in high-speed wireless communication and radar imaging. Most representative DOA estimation methods require the source-number information in advance and often fail to estimate DOAs in severe environments such as those having low signal-to-noise ratio or large transmission-power difference. Received signals are often bandlimited or narrowband signals, so the proposed methods first involves denoising preprocessing by removing undesired components then comparing the original and denoised signal information. The performances of the proposed methods were evaluated through computer simulations.

  • Evaluation of a True Random Number Generator Utilizing Timing Jitters in RSFQ Logic Circuits Open Access

    Kenta SATO  Naonori SEGA  Yuta SOMEI  Hiroshi SHIMADA  Takeshi ONOMI  Yoshinao MIZUGAKI  

     
    BRIEF PAPER

      Pubricized:
    2022/01/19
      Vol:
    E105-C No:6
      Page(s):
    296-299

    We experimentally evaluated random number sequences generated by a superconducting hardware random number generator composed of a Josephson-junction oscillator, a rapid-single-flux-quantum (RSFQ) toggle flip-flop (TFF), and an RSFQ AND gate. Test circuits were fabricated using a 10 kA/cm2 Nb/AlOx/Nb integration process. Measurements were conducted in a liquid helium bath. The random numbers were generated for a trigger frequency of 500 kHz under the oscillating Josephson-junction at 29 GHz. 26 random number sequences of 20 kb length were evaluated for bias voltages between 2.0 and 2.7 mV. The NIST FIPS PUBS 140-2 tests were used for the evaluation. 100% pass rates were confirmed at the bias voltages of 2.5 and 2.6 mV. We found that the Monobit test limited the pass rates. As numerical simulations suggested, a detailed evaluation for the probability of obtaining “1” demonstrated the monotonical dependence on the bias voltage.

  • Unfolding Hidden Structures in Cyber-Physical Systems for Thorough STPA Analysis

    Sejin JUNG  Eui-Sub KIM  Junbeom YOO  

     
    LETTER-Software Engineering

      Pubricized:
    2022/02/10
      Vol:
    E105-D No:5
      Page(s):
    1103-1106

    Traditional safety analysis techniques have shown difficulties in incorporating dynamically changing structures of CPSs (Cyber-Physical Systems). STPA (System-Theoretic Process Analysis), one of the widely used, needs to unfold and arrange all hidden structures before beginning a full-fledged analysis. This paper proposes an intermediate model “Information Unfolding Model (IUM)” and a process “Information Unfolding Process (IUP)” to unfold dynamic structures which are hidden in CPSs and so help analysts construct control structures in STPA thoroughly.

  • Balanced (Almost) Binary Sequence Pairs of Period Q ≡ 1(mod 4) with Optimal Autocorrelation and Cross-Correlation

    Xiuping PENG  Hongxiao LI  Hongbin LIN  

     
    LETTER-Coding Theory

      Pubricized:
    2021/11/22
      Vol:
    E105-A No:5
      Page(s):
    892-896

    In this letter, the almost binary sequence (sequence with a single zero element) is considered as a special class of binary sequence. Four new bounds on the cross-correlation of balanced (almost) binary sequences with period Q ≡ 1(mod 4) under the precondition of out-of-phase autocorrelation values {-1} or {1, -3} are firstly presented. Then, seven new pairs of balanced (almost) binary sequences of period Q with ideal or optimal autocorrelation values and meeting the lower cross-correlation bounds are proposed by using cyclotomic classes of order 4. These new bounds of (almost) binary sequences with period Q achieve smaller maximum out-of-phase autocorrelation values and cross-correlation values.

  • Simple Proof of the Lower Bound on the Average Distance from the Fermat-Weber Center of a Convex Body Open Access

    Xuehou TAN  

     
    PAPER-Numerical Analysis and Optimization

      Pubricized:
    2021/11/15
      Vol:
    E105-A No:5
      Page(s):
    853-857

    We show that for any convex body Q in the plane, the average distance from the Fermat-Weber center of Q to the points in Q is at least Δ(Q)/6, where Δ(Q) denotes the diameter of Q. Our proof is simple and straightforward, since it needs only elementary calculations. This simplifies a previously known proof that is based on Steiner symmetrizations.

  • LMI-Based Design of Output Feedback Controllers with Decentralized Event-Triggering

    Koichi KITAMURA  Koichi KOBAYASHI  Yuh YAMASHITA  

     
    PAPER

      Pubricized:
    2021/09/15
      Vol:
    E105-A No:5
      Page(s):
    816-822

    In this paper, event-triggered control over a sensor network is studied as one of the control methods of cyber-physical systems. Event-triggered control is a method that communications occur only when the measured value is widely changed. In the proposed method, by solving an LMI (Linear Matrix Inequality) feasibility problem, an event-triggered output feedback controller such that the closed-loop system is asymptotically stable is derived. First, the problem formulation is given. Next, the control problem is reduced to an LMI feasibility problem. Finally, the proposed method is demonstrated by a numerical example.

  • BOTDA-Based Technique for Measuring Maximum Loss and Crosstalk at Splice Point in Few-Mode Fibers Open Access

    Tomokazu ODA  Atsushi NAKAMURA  Daisuke IIDA  Hiroyuki OSHIDA  

     
    PAPER-Optical Fiber for Communications

      Pubricized:
    2021/11/05
      Vol:
    E105-B No:5
      Page(s):
    504-511

    We propose a technique based on Brillouin optical time domain analysis for measuring loss and crosstalk in few-mode fibers (FMFs). The proposed technique extracts the loss and crosstalk of a specific mode in FMFs from the Brillouin gains and Brillouin gain coefficients measured under two different conditions in terms of the frequency difference between the pump and probe lights. The technique yields the maximum loss and crosstalk at a splice point by changing the electrical field injected into an FMF as the pump light. Experiments demonstrate that the proposed technique can measure the maximum loss and crosstalk of the LP11 mode at a splice point in a two-mode fiber.

  • An Equivalent Expression for the Wyner-Ziv Source Coding Problem Open Access

    Tetsunao MATSUTA  Tomohiko UYEMATSU  

     
    PAPER-Information Theory

      Pubricized:
    2021/09/09
      Vol:
    E105-A No:3
      Page(s):
    353-362

    We consider the coding problem for lossy source coding with side information at the decoder, which is known as the Wyner-Ziv source coding problem. The goal of the coding problem is to find the minimum rate such that the probability of exceeding a given distortion threshold is less than the desired level. We give an equivalent expression of the minimum rate by using the chromatic number and notions of covering of a set. This allows us to analyze the coding problem in terms of graph coloring and covering.

  • Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing Open Access

    Kota SASAKI  Koji NUIDA  

     
    PAPER

      Pubricized:
    2021/09/09
      Vol:
    E105-A No:3
      Page(s):
    231-241

    In secure multiparty computation (MPC), floating-point numbers should be handled in many potential applications, but these are basically expensive. In particular, for MPC based on secret sharing (SS), the floating-point addition takes many communication rounds though the addition is the most fundamental operation. In this paper, we propose an SS-based two-party protocol for floating-point addition with 13 rounds (for single/double precision numbers), which is much fewer than the milestone work of Aliasgari et al. in NDSS 2013 (34 and 36 rounds, respectively) and also fewer than the state of the art in the literature. Moreover, in contrast to the existing SS-based protocols which are all based on “roundTowardZero” rounding mode in the IEEE 754 standard, we propose another protocol with 15 rounds which is the first result realizing more accurate “roundTiesToEven” rounding mode. We also discuss possible applications of the latter protocol to secure Validated Numerics (a.k.a. Rigorous Computation) by implementing a simple example.

  • Precise Measurements and their Analysis of GAWBS-Induced Depolarization Noise in Multi-Core Fiber for Digital Coherent Transmission

    Masato YOSHIDA  Kozo SATO  Toshihiko HIROOKA  Keisuke KASAI  Masataka NAKAZAWA  

     
    PAPER

      Pubricized:
    2021/08/02
      Vol:
    E105-B No:2
      Page(s):
    151-158

    We present detailed measurements and analysis of the guided acoustic wave Brillouin scattering (GAWBS)-induced depolarization noise in a multi-core fiber (MCF) used for a digital coherent optical transmission. We first describe the GAWBS-induced depolarization noise in an uncoupled four-core fiber (4CF) with a 125μm cladding and compare the depolarization noise spectrum with that of a standard single-mode fiber (SSMF). We found that off-center cores in the 4CF are dominantly affected by higher-order TRn,m modes rather than the TR2,m mode unlike in the center core, and the total power of the depolarization noise in the 4CF was almost the same as that in the SSMF. We also report measurement results for the GAWBS-induced depolarization noise in an uncoupled 19-core fiber with a 240μm cladding. The results indicate that the amounts of depolarization noise generated in the cores are almost identical. Finally, we evaluate the influence of GAWBS-induced polarization crosstalk (XT) on a coherent QAM transmission. We found that the XT limits the achievable multiplicity of the QAM signal to 64 in a transoceanic transmission with an MCF.

  • Accurate BER Approximation for SIM with BPSK and Multiple Transmit Apertures over Strong Atmospheric Turbulence

    Jinkyu KANG  Seongah JEONG  Hoojin LEE  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2021/07/30
      Vol:
    E105-A No:2
      Page(s):
    126-129

    In this letter, we derive a novel and accurate closed-form bit error rate (BER) approximation of the optical wireless communications (OWC) systems for the sub-carrier intensity modulation (SIM) employing binary phase-shift keying (BPSK) with multiple transmit and single receive apertures over strong atmospheric turbulence channels, which makes it possible to effectively investigate and predict the BER performance for various system configurations. Furthermore, we also derive a concise asymptotic BER formula to quantitatively evaluate the asymptotically achievable error performance (i.e., asymptotic diversity and combining gains) in the high signal-to-noise (SNR) regimes. Some numerical results are provided to corroborate the accuracy and effectiveness of our theoretical expressions.

41-60hit(1214hit)