The search functionality is under construction.

Keyword Search Result

[Keyword] BER(1214hit)

61-80hit(1214hit)

  • Random Numbers Generated by the Oscillator Sampling Method as a Renewal Process

    Masahiro KAMINAGA  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2021/08/24
      Vol:
    E105-A No:2
      Page(s):
    118-121

    In this paper, the random numbers generated by a true random number generator, using the oscillator sampling method, are formulated using a renewal process, and this formulation is used to demonstrate the uniformity of the random numbers and the independence between different bits. Using our results, a lower bound for the speed of random number generation could easily be identified, according to the required statistical quality.

  • Estimation Method of the Number of Targets Using Cooperative Multi-Static MIMO Radar

    Nobuyuki SHIRAKI  Naoki HONMA  Kentaro MURATA  Takeshi NAKAYAMA  Shoichi IIZUKA  

     
    PAPER-Sensing

      Pubricized:
    2021/06/04
      Vol:
    E104-B No:12
      Page(s):
    1539-1546

    This paper proposes a method for cooperative multi-static Multiple Input Multiple Output (MIMO) radar that can estimate the number of targets. The purpose of this system is to monitor humans in an indoor environment. First, target positions within the estimation range are roughly detected by the Capon method and the mode vector corresponding to the detected positions is calculated. The mode vector is multiplied by the eigenvector to eliminate the virtual image. The spectrum of the evaluation function is calculated from the remaining positions, and the number of peaks in the spectrum is defined as the number of targets. Experiments carried out in an indoor environment confirm that the proposed method can estimate the number of targets with high accuracy.

  • Design of Ultra-Thin Wave Absorber with Square Patch Array Considering Electromagnetic Coupling between Patch Array and Back-Metal

    Sota MATSUMOTO  Ryosuke SUGA  Kiyomichi ARAKI  Osamu HASHIMOTO  

     
    BRIEF PAPER-Electromagnetic Theory

      Pubricized:
    2021/06/07
      Vol:
    E104-C No:12
      Page(s):
    681-684

    In this paper, an ultra-thin wave absorber using a resistive patch array closely-placed in front of a back-metal is designed. The positively large susceptance is required for the patch array to cancel out the negatively large input susceptance of the short-circuited ultra-thin spacer behind the array. It is found that the array needs the gap of 1mm, sheet resistance of less than 20Ω/sq. and patch width of more than 15mm to obtain the zero input susceptance of the absorber with the 1/30 wavelength spacer. Moreover, these parameters were designed considering the electromagnetic coupling between the array and back-metal, and the square patch array absorbers with the thickness from 1/30 to 1/150 wavelength were designed.

  • The Uncontrolled Web: Measuring Security Governance on the Web

    Yuta TAKATA  Hiroshi KUMAGAI  Masaki KAMIZONO  

     
    PAPER

      Pubricized:
    2021/07/08
      Vol:
    E104-D No:11
      Page(s):
    1828-1838

    While websites are becoming more and more complex daily, the difficulty of managing them is also increasing. It is important to conduct regular maintenance against these complex websites to strengthen their security and improve their cyber resilience. However, misconfigurations and vulnerabilities are still being discovered on some pages of websites and cyberattacks against them are never-ending. In this paper, we take the novel approach of applying the concept of security governance to websites; and, as part of this, measuring the consistency of software settings and versions used on these websites. More precisely, we analyze multiple web pages with the same domain name and identify differences in the security settings of HTTP headers and versions of software among them. After analyzing over 8,000 websites of popular global organizations, our measurement results show that over half of the tested websites exhibit differences. For example, we found websites running on a web server whose version changes depending on access and using a JavaScript library with different versions across over half of the tested pages. We identify the cause of such governance failures and propose improvement plans.

  • A Multi-Task Scheme for Supervised DNN-Based Single-Channel Speech Enhancement by Using Speech Presence Probability as the Secondary Training Target

    Lei WANG  Jie ZHU  Kangbo SUN  

    This paper has been cancelled due to violation of duplicate submission policy on IEICE Transactions on Information and Systems.
     
    PAPER-Speech and Hearing

      Pubricized:
    2021/08/05
      Vol:
    E104-D No:11
      Page(s):
    1963-1970

    To cope with complicated interference scenarios in realistic acoustic environment, supervised deep neural networks (DNNs) are investigated to estimate different user-defined targets. Such techniques can be broadly categorized into magnitude estimation and time-frequency mask estimation techniques. Further, the mask such as the Wiener gain can be estimated directly or derived by the estimated interference power spectral density (PSD) or the estimated signal-to-interference ratio (SIR). In this paper, we propose to incorporate the multi-task learning in DNN-based single-channel speech enhancement by using the speech presence probability (SPP) as a secondary target to assist the target estimation in the main task. The domain-specific information is shared between two tasks to learn a more generalizable representation. Since the performance of multi-task network is sensitive to the weight parameters of loss function, the homoscedastic uncertainty is introduced to adaptively learn the weights, which is proven to outperform the fixed weighting method. Simulation results show the proposed multi-task scheme improves the speech enhancement performance overall compared to the conventional single-task methods. And the joint direct mask and SPP estimation yields the best performance among all the considered techniques.

  • Quantum-Noise-Limited BPSK Transmission Using Gain-Saturated Phase-Sensitive Amplifiers

    Kyo INOUE  

     
    PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2021/04/14
      Vol:
    E104-B No:10
      Page(s):
    1268-1276

    Quantum noise ultimately restricts the transmission distance in fiber communication systems using optical amplifiers. This paper investigates the quantum-noise-limited performance of optical binary phase-shift keying transmission using gain-saturated phase-sensitive amplifiers (PSAs) as optical repeaters. It is shown that coherent state transmission, where ultimately clean light in the classical sense is transmitted, and endless transmission, where the transmission distance is not restricted, are theoretically achievable under certain system conditions owing to the noise suppression effects of the gain-saturated PSA.

  • Uplink Performance Analysis of MU-MIMO ZF Receiver Over Correlated Rayleigh Fading Channel with Imperfect CSI

    Supraja EDURU  Nakkeeran RANGASWAMY  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2021/04/21
      Vol:
    E104-B No:10
      Page(s):
    1328-1335

    In this paper, the uplink performance of Multi-User Multiple Input Multiple Output (MU-MIMO) Zero Forcing (ZF) receiver is investigated over correlated Rayleigh fading channels with channel estimation error. A mathematical expression for the sub-streams' output Signal to Noise Ratio (SNR) with transmit and receive-correlation is derived in the presence of erroneous channel estimates. Besides, an approximate and accurate expression for the Bit Error Rate (BER) of ZF receiver for 16-Quadrature Amplitude Modulation (QAM) with transmit-correlation is deduced in terms of the hypergeometric function. Subsequently, the developed analytical BER is verified by Monte-Carlo trails accounting various system parameters. The simulation results indicate that ZF receiver's BER relies solely on the transmit-correlation for the same number of transmit and receive-antennas at higher average SNR values per transmitted symbol (Es/N0). Also, a logarithmic and exponential growth in the BER is observed with an increase in the Mean Square estimation Error (MSE) and correlation coefficient, respectively.

  • Convex and Differentiable Formulation for Inverse Problems in Hilbert Spaces with Nonlinear Clipping Effects Open Access

    Natsuki UENO  Shoichi KOYAMA  Hiroshi SARUWATARI  

     
    PAPER-Nonlinear Problems

      Pubricized:
    2021/02/25
      Vol:
    E104-A No:9
      Page(s):
    1293-1303

    We propose a useful formulation for ill-posed inverse problems in Hilbert spaces with nonlinear clipping effects. Ill-posed inverse problems are often formulated as optimization problems, and nonlinear clipping effects may cause nonconvexity or nondifferentiability of the objective functions in the case of commonly used regularized least squares. To overcome these difficulties, we present a tractable formulation in which the objective function is convex and differentiable with respect to optimization variables, on the basis of the Bregman divergence associated with the primitive function of the clipping function. By using this formulation in combination with the representer theorem, we need only to deal with a finite-dimensional, convex, and differentiable optimization problem, which can be solved by well-established algorithms. We also show two practical examples of inverse problems where our theory can be applied, estimation of band-limited signals and time-harmonic acoustic fields, and evaluate the validity of our theory by numerical simulations.

  • Realization of Multi-Terminal Universal Interconnection Networks Using Contact Switches

    Tsutomu SASAO  Takashi MATSUBARA  Katsufumi TSUJI  Yoshiaki KOGA  

     
    PAPER-Logic Design

      Pubricized:
    2021/04/01
      Vol:
    E104-D No:8
      Page(s):
    1068-1075

    A universal interconnection network implements arbitrary interconnections among n terminals. This paper considers a problem to realize such a network using contact switches. When n=2, it can be implemented with a single switch. The number of different connections among n terminals is given by the Bell number B(n). The Bell number shows the total number of methods to partition n distinct elements. For n=2, 3, 4, 5 and 6, the corresponding Bell numbers are 2, 5, 15, 52, and 203, respectively. This paper shows a method to realize an n terminal universal interconnection network with $ rac {3}{8}(n^2-1)$ contact switches when n=2m+1≥5, and $ rac {n}{8}(3n+2)$ contact switches, when n=2m≥6. Also, it shows that a lower bound on the number of contact switches to realize an n-terminal universal interconnection network is ⌈log 2B(n)⌉, where B(n) is the Bell number.

  • Tight Upper Bound on the Bit Error Rate of Convolutional Codes over Correlated Nakagami-m Fading Channels

    Seongah JEONG  Jinkyu KANG  Hoojin LEE  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2021/02/08
      Vol:
    E104-A No:8
      Page(s):
    1080-1083

    In this letter, we investigate tight analytical and asymptotic upper bounds for bit error rate (BER) of constitutional codes over exponentially correlated Nakagami-m fading channels. Specifically, we derive the BER expression depending on an exact closed-form formula for pairwise error event probabilities (PEEP). Moreover, the corresponding asymptotic analysis in high signal-to-noise ratio (SNR) regime is also explored, which is verified via numerical results. This allows us to have explicit insights on the achievable coding gain and diversity order.

  • Transmission Loss of Optical Fibers; Achievements in Half a Century Open Access

    Hiroo KANAMORI  

     
    INVITED PAPER-Optical Fiber for Communications

      Pubricized:
    2021/02/15
      Vol:
    E104-B No:8
      Page(s):
    922-933

    This paper reviews the evolutionary process that reduced the transmission loss of silica optical fibers from the report of 20dB/km by Corning in 1970 to the current record-low loss. At an early stage, the main effort was to remove impurities especially hydroxy groups for fibers with GeO2-SiO2 core, resulting in the loss of 0.20dB/km in 1980. In order to suppress Rayleigh scattering due to composition fluctuation, pure-silica-core fibers were developed, and the loss of 0.154dB/km was achieved in 1986. As the residual main factor of the loss, Rayleigh scattering due to density fluctuation was actively investigated by utilizing IR and Raman spectroscopy in the 1990s and early 2000s. Now, ultra-low-loss fibers with the loss of 0.150dB/km are commercially available in trans-oceanic submarine cable systems.

  • Energy-Efficient Post-Processing Technique Having High Extraction Efficiency for True Random Number Generators Open Access

    Ruilin ZHANG  Xingyu WANG  Hirofumi SHINOHARA  

     
    PAPER

      Pubricized:
    2021/01/28
      Vol:
    E104-C No:7
      Page(s):
    300-308

    In this paper, we describe a post-processing technique having high extraction efficiency (ExE) for de-biasing and de-correlating a random bitstream generated by true random number generators (TRNGs). This research is based on the N-bit von Neumann (VN_N) post-processing method. It improves the ExE of the original von Neumann method close to the Shannon entropy bound by a large N value. However, as the N value increases, the mapping table complexity increases exponentially (2N), which makes VN_N unsuitable for low-power TRNGs. To overcome this problem, at the algorithm level, we propose a waiting strategy to achieve high ExE with a small N value. At the architectural level, a Hamming weight mapping-based hierarchical structure is used to reconstruct the large mapping table using smaller tables. The hierarchical structure also decreases the correlation factor in the raw bitstream. To develop a technique with high ExE and low cost, we designed and fabricated an 8-bit von Neumann with waiting strategy (VN_8W) in a 130-nm CMOS. The maximum ExE of VN_8W is 62.21%, which is 2.49 times larger than the ExE of the original von Neumann. NIST SP 800-22 randomness test results proved the de-biasing and de-correlation abilities of VN_8W. As compared with the state-of-the-art optimized 7-element iterated von Neumann, VN_8W achieved more than 20% energy reduction with higher ExE. At 0.45V and 1MHz, VN_8W achieved the minimum energy of 0.18pJ/bit, which was suitable for sub-pJ low energy TRNGs.

  • Distributed UAVs Placement Optimization for Cooperative Communication

    Zhaoyang HOU  Zheng XIANG  Peng REN  Qiang HE  Ling ZHENG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/12/08
      Vol:
    E104-B No:6
      Page(s):
    675-685

    In this paper, the distributed cooperative communication of unmanned aerial vehicles (UAVs) is studied, where the condition number (CN) and the inner product (InP) are used to measure the quality of communication links. By optimizing the relative position of UAVs, large channel capacity and stable communication links can be obtained. Using the spherical wave model under the line of sight (LOS) channel, CN expression of the channel matrix is derived when there are Nt transmitters and two receivers in the system. In order to maximize channel capacity, we derive the UAVs position constraint equation (UAVs-PCE), and the constraint between BS elements distance and carrier wavelength is analyzed. The result shows there is an area where no matter how the UAVs' positions are adjusted, the CN is still very large. Then a special scenario is considered where UAVs form a rectangular lattice array, and the optimal constraint between communication distance and UAVs distance is derived. After that, we derive the InP of channel matrix and the gradient expression of InP with respect to UAVs' position. The particle swarm optimization (PSO) algorithm is used to minimize the CN and the gradient descent (GD) algorithm is used to minimize the InP by optimizing UAVs' position iteratively. Both of the two algorithms present great potentials for optimizing the CN and InP respectively. Furthermore, a hybrid algorithm named PSO-GD combining the advantage of the two algorithms is proposed to maximize the communication capacity with lower complexity. Simulations show that PSO-GD is more efficient than PSO and GD. PSO helps GD to break away from local extremum and provides better positions for GD, and GD can converge to an optimal solution quickly by using the gradient information based on the better positions. Simulations also reveal that a better channel can be obtained when those parameters satisfy the UAVs position constraint equation (UAVs-PCE), meanwhile, theory analysis also explains the abnormal phenomena in simulations.

  • Biofuel Cell Using Cellulose Nanofiber as Fuel Supply

    Ryutaro TANAKA  Mitsuhiro OGAWA  Satomitsu IMAI  

     
    BRIEF PAPER

      Pubricized:
    2020/12/01
      Vol:
    E104-C No:6
      Page(s):
    194-197

    In this study, we devised a biofuel cell (BFC) by impregnating sheet-like cellulose nanofiber (CNF) with liquid fuel (fructose) and sandwiching it with the electrodes, making the structure simple and compact. CNF was considered as a suitable material for BFC because it is biocompatible, has a large specific surface area, and exhibits excellent properties as a catalyst and an adsorbent. In this BFC device, graphene-coated carbon fiber woven cloth (GCFC) was used as the material for preparing the electrodes, and the amount of enzyme modification on the surface of each electrode was enhanced. Further, as the distance between the electrodes was same as the thickness of the sheet-shaped CNF, it facilitated the exchange of protons between the electrodes. Moreover, the cathode, which requires an oxidation reaction, was exposed to the atmosphere to enhance the oxygen uptake. The maximum power density of the CNF-type BFC was recorded as 114.5 µW/cm2 at a voltage of 293 mV. This is more than 1.5 times higher than that of the liquid-fuel-type BFC. When measured after 24 h, the maximum power density was recorded as 44.9 µW/cm2 at 236 mV, and the output was maintained at 39% of that observed at the beginning of the measurement. However, it is not the case with general BFCs, where the power generation after 24 h is less than 5%. Therefore, the CNF-type BFCs have a longer lifespan and are fuel efficient.

  • Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time

    Ryusei NAGASAWA  Keisuke FURUMOTO  Makoto TAKITA  Yoshiaki SHIRAISHI  Takeshi TAKAHASHI  Masami MOHRI  Yasuhiro TAKANO  Masakatu MORII  

     
    LETTER

      Pubricized:
    2021/02/24
      Vol:
    E104-D No:5
      Page(s):
    556-561

    The Topics over Time (TOT) model allows users to be aware of changes in certain topics over time. The proposed method inputs the divided dataset of security blog posts based on a fixed period using an overlap period to the TOT. The results suggest the extraction of topics that include malware and attack campaign names that are appropriate for the multi-labeling of cyber threat intelligence reports.

  • A New Structure of 2-State Number-Conserving Cellular Automata

    Gil-Tak KONG  Katsunobu IMAI  Toru NAKANISHI  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2021/02/02
      Vol:
    E104-D No:5
      Page(s):
    673-678

    Two-state number-conserving cellular automaton (NCCA) is a cellular automaton of which cell states are 0 or 1, and the total sum of all the states of cells is kept for any time step. It is a kind of particle-based modeling of physical systems. We introduce a new structure of its value-1 patterns, which we call a “bundle pair” and a “bundle quad”. By employing this structure, we show a relation between the neighborhood size n and n - 2 NCCAs.

  • Game-Theory Modeling of Multicolor LED-Based VLC Systems under Smart Interference

    Yu Min HWANG  Isaac SIM  Young Ghyu SUN  Ju Phil CHO  Jin Young KIM  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2020/09/09
      Vol:
    E104-A No:3
      Page(s):
    656-660

    In this letter, we study an interference scenario under a smart interferer which observes color channels and interferes with a visible light communication (VLC) network. We formulate the smart interference problem based on a Stackelberg game and propose an optimal response algorithm to overcome the interference by optimizing transmit power and sub-color channel allocation. The proposed optimization algorithm is composed with Lagrangian dual decomposition and non-linear fractional programming to have stability to get optimum points. Numerical results show that the utility by the proposed algorithm is increased over that of the algorithm based on the Nash game and the baseline schemes.

  • Learning-Based WiFi Traffic Load Estimation in NR-U Systems

    Rui YIN  Zhiqun ZOU  Celimuge WU  Jiantao YUAN  Xianfu CHEN  Guanding YU  

     
    PAPER-Mobile Information Network and Personal Communications

      Pubricized:
    2020/08/20
      Vol:
    E104-A No:2
      Page(s):
    542-549

    The unlicensed spectrum has been utilized to make up the shortage on frequency spectrum in new radio (NR) systems. To fully exploit the advantages brought by the unlicensed bands, one of the key issues is to guarantee the fair coexistence with WiFi systems. To reach this goal, timely and accurate estimation on the WiFi traffic loads is an important prerequisite. In this paper, a machine learning (ML) based method is proposed to detect the number of WiFi users on the unlicensed bands. An unsupervised Neural Network (NN) structure is applied to filter the detected transmission collision probability on the unlicensed spectrum, which enables the NR users to precisely rectify the measurement error and estimate the number of active WiFi users. Moreover, NN is trained online and the related parameters and learning rate of NN are jointly optimized to estimate the number of WiFi users adaptively with high accuracy. Simulation results demonstrate that compared with the conventional Kalman Filter based detection mechanism, the proposed approach has lower complexity and can achieve a more stable and accurate estimation.

  • Uniformly Ultimate Boundedness Control with Decentralized Event-Triggering Open Access

    Koichi KOBAYASHI  Kyohei NAKAJIMA  Yuh YAMASHITA  

     
    PAPER

      Vol:
    E104-A No:2
      Page(s):
    455-461

    Event-triggered control is a method that the control input is updated only when a certain condition is satisfied (i.e., an event occurs). In this paper, event-triggered control over a sensor network is studied based on the notion of uniformly ultimate boundedness. Since sensors are located in a distributed way, we consider multiple event-triggering conditions. In uniformly ultimate boundedness, it is guaranteed that if the state reaches a certain set containing the origin, the state stays within this set. Using this notion, the occurrence of events in the neighborhood of the origin is inhibited. First, the simultaneous design problem of a controller and event-triggering conditions is formulated. Next, this problem is reduced to an LMI (linear matrix inequality) optimization problem. Finally, the proposed method is demonstrated by a numerical example.

  • Efficient Algorithms for Sign Detection in RNS Using Approximate Reciprocals Open Access

    Shinichi KAWAMURA  Yuichi KOMANO  Hideo SHIMIZU  Saki OSUKA  Daisuke FUJIMOTO  Yuichi HAYASHI  Kentaro IMAFUKU  

     
    PAPER

      Vol:
    E104-A No:1
      Page(s):
    121-134

    The residue number system (RNS) is a method for representing an integer x as an n-tuple of its residues with respect to a given set of moduli. In RNS, addition, subtraction, and multiplication can be carried out by independent operations with respect to each modulus. Therefore, an n-fold speedup can be achieved by parallel processing. The main disadvantage of RNS is that we cannot efficiently compare the magnitude of two integers or determine the sign of an integer. Two general methods of comparison are to transform a number in RNS to a mixed-radix system or to a radix representation using the Chinese remainder theorem (CRT). We used the CRT to derive an equation approximating a value of x relative to M, the product of moduli. Then, we propose two algorithms that efficiently evaluate the equation and output a sign bit. The expected number of steps of these algorithms is of order n. The algorithms use a lookup table that is (n+3) times as large as M, which is reasonably small for most applications including cryptography.

61-80hit(1214hit)