The search functionality is under construction.

Keyword Search Result

[Keyword] BER(1214hit)

161-180hit(1214hit)

  • Clutter Rank Estimation for Diving Platform Radar

    Fengde JIA  Zishu HE  

     
    LETTER-Analog Signal Processing

      Vol:
    E101-A No:3
      Page(s):
    600-603

    A convenient formula for the estimation of the clutter rank of the diving platform radar is derived. Brennan's rule provides a general formula to estimate the clutter rank for the side looking radar with a linear array, which is normally called one-dimensional (1D) estimation problem. With the help of the clutter wavenumber spectrum, the traditional estimation of the clutter rank is extended to the diving scenario and the estimation problem is two-dimensional (2D). The proposed rule is verified by the numerical simulations.

  • Cybersecurity Education and Training Support System: CyRIS

    Razvan BEURAN  Cuong PHAM  Dat TANG  Ken-ichi CHINEN  Yasuo TAN  Yoichi SHINODA  

     
    PAPER-Educational Technology

      Pubricized:
    2017/11/24
      Vol:
    E101-D No:3
      Page(s):
    740-749

    Given the worldwide proliferation of cyberattacks, it is imperative that cybersecurity education and training are addressed in a timely manner. These activities typically require trainees to do hands-on practice in order to consolidate and improve their skills, for which purpose training environments called cyber ranges are used. In this paper we present an open-source system named CyRIS (Cyber Range Instantiation System) that supports this endeavor by fully automating the training environment setup, thus making it possible for any organization to conduct more numerous and variate training activities. CyRIS uses a text-based representation in YAML format to describe the characteristics of the training environment, including both environment setup and security content generation. Based on this description, CyRIS automatically creates the corresponding cyber range instances on a computer and network infrastructure, for simultaneous use by multiple trainees. We have evaluated CyRIS in various realistic scenarios, and our results demonstrate its suitability for cybersecurity education and training, both in terms of features and performance, including for large-scale training sessions with hundreds of participants.

  • TCP Network Coding with Adapting Parameters for Bursty and Time-Varying Loss

    Nguyen VIET HA  Kazumi KUMAZOE  Masato TSURU  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2017/07/27
      Vol:
    E101-B No:2
      Page(s):
    476-488

    The Transmission Control Protocol (TCP) with Network Coding (TCP/NC) was proposed to introduce packet loss recovery ability at the sink without TCP retransmission, which is realized by proactively sending redundant combination packets encoded at the source. Although TCP/NC is expected to mitigate the goodput degradation of TCP over lossy networks, the original TCP/NC does not work well in burst loss and time-varying channels. No apparent scheme was provided to decide and change the network coding-related parameters (NC parameters) to suit the diverse and changeable loss conditions. In this paper, a solution to support TCP/NC in adapting to mentioned conditions is proposed, called TCP/NC with Loss Rate and Loss Burstiness Estimation (TCP/NCwLRLBE). Both the packet loss rate and burstiness are estimated by observing transmitted packets to adapt to burst loss channels. Appropriate NC parameters are calculated from the estimated probability of successful recoverable transmission based on a mathematical model of packet losses. Moreover, a new mechanism for coding window handling is developed to update NC parameters in the coding system promptly. The proposed scheme is implemented and validated in Network Simulator 3 with two different types of burst loss model. The results suggest the potential of TCP/NCwLRLBE to mitigate the TCP goodput degradation in both the random loss and burst loss channels with the time-varying conditions.

  • Nonlinear Shannon Limit in Optical Fiber Transmission System Open Access

    Akihiro MARUTA  

     
    INVITED SURVEY PAPER-Optical Fiber for Communications

      Pubricized:
    2017/05/30
      Vol:
    E101-B No:1
      Page(s):
    80-95

    The remaining issues in optical transmission technology are the degradation of optical signal to noise power ratio due to amplifier noise and the distortions due to optical nonlinear effects in a fiber. Therefore in addition to the Shannon limit, practical channel capacity is believed to be restricted by the nonlinear Shannon limit. The nonlinear Shannon limit has been derived under the assumption that the received signal points on the constellation map deviated by optical amplifier noise and nonlinear interference noise are symmetrically distributed around the ideal signal point and the sum of the noises are regarded as white Gaussian noise. The nonlinear Shannon limit is considered as a kind of theoretical limitation. However it is doubtful that its derivation process and applicable range have been understood well. In this paper, some fundamental papers on the nonlinear Shannon limit are reviewed to better understanding its meaning and applicable range.

  • Intercore Crosstalk Mitigation in Multicore Fiber Transmission with Optical Space Coding

    Makoto TSUBOKAWA  Yizhou WANG  

     
    PAPER-Optical Fiber for Communications

      Pubricized:
    2017/06/07
      Vol:
    E100-B No:12
      Page(s):
    2104-2109

    We have demonstrated crosstalk mitigation in single-mode MCFs using optical space coding. Four types of single-mode multicore fiber (MCF) models were evaluated by our scheme with the modified prime code and differential detection. Typically, intercore crosstalk was improved by 7-20 dB in 9-core fibers with an original crosstalk of 10-20 dB.

  • Interleaved Sequences of Geometric Sequences Binarized with Legendre Symbol of Two Types

    Kazuyoshi TSUCHIYA  Yasuyuki NOGAMI  Satoshi UEHARA  

     
    PAPER-Sequences

      Vol:
    E100-A No:12
      Page(s):
    2720-2727

    A pseudorandom number generator is widely used in cryptography. A cryptographic pseudorandom number generator is required to generate pseudorandom numbers which have good statistical properties as well as unpredictability. An m-sequence is a linear feedback shift register sequence with maximal period over a finite field. M-sequences have good statistical properties, however we must nonlinearize m-sequences for cryptographic purposes. A geometric sequence is a binary sequence given by applying a nonlinear feedforward function to an m-sequence. Nogami, Tada and Uehara proposed a geometric sequence whose nonlinear feedforward function is given by the Legendre symbol. They showed the geometric sequences have good properties for the period, periodic autocorrelation and linear complexity. However, the geometric sequences do not have the balance property. In this paper, we introduce geometric sequences of two types and show some properties of interleaved sequences of the geometric sequences of two types. These interleaved sequences have the balance property and double the period of the geometric sequences by the interleaved structure. Moreover, we show correlation properties and linear complexity of the interleaved sequences. A key of our observation is that the second type geometric sequence is the complement of the left shift of the first type geometric sequence by half-period positions.

  • Price-Based Power Allocation with Rate Proportional Fairness Constraint in Downlink Non-Orthogonal Multiple Access Systems

    Zi-fu FAN  Chen-chen WEN  Zheng-qiang WANG  Xiao-yu WAN  

     
    LETTER-Communication Theory and Signals

      Vol:
    E100-A No:11
      Page(s):
    2543-2546

    In this letter, we investigate the price-based power allocation with rate proportional fairness constraint in downlink non-orthogonal multiple access (NOMA) systems. The Stackelberg game is utilized to model the interaction between the base station (BS) and users. The revenue maximization problem of the BS is first converted to rate allocation problem, then the optimal rate allocation for each user is obtained by variable substitution. Finally, a price-based power allocation with rate proportional fairness (PAPF) algorithm is proposed based on the relationship between rate and transmit power. Simulation results show that the proposed PAPF algorithm is superior to the previous price-based power allocation algorithm in terms of fairness index and minimum normalized user (MNU) rate.

  • Lattice-Reduction Aided Signal Detection Method with Switching Detection Based on Channel Condition

    Seung-Jin CHOI  Jong-Kwang KIM  Hyoung-Kyu SONG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E100-A No:11
      Page(s):
    2539-2542

    In this letter, a switching detection scheme based on a channel condition number for the MIMO-OFDM system is proposed. The switching algorithm operates by selecting one of three detection schemes of QRD-M, LR-aided MMSE-DFE, and LR-aided MMSE. The switching detection uses the threshold based on the switching algorithm according to the channel condition number. From the simulation results, the proposed detection scheme shows error detection performance and computational complexity in accordance with the threshold for switching detection.

  • Data Extraction Method from Printed Images with Different Formats

    Mitsuji MUNEYASU  Nayuta JINDA  Yuuya MORITANI  Soh YOSHIDA  

     
    LETTER-Image Processing

      Vol:
    E100-A No:11
      Page(s):
    2355-2357

    In this paper, we propose a method of embedding and detecting data in printed images with several formats, such as different resolutions and numbers of blocks, using the camera of a tablet device. To specify the resolution of an image and the number of blocks, invisible markers that are embedded in the amplitude domain of the discrete Fourier transform of the target image are used. The proposed method can increase the variety of images suitable for data embedding.

  • 60GHz-Band Photonic-Integrated Array-Antenna and Module for Radio-over-Fiber-Based Beam Forming Open Access

    Kotoko FURUYA  Takayoshi HIRASAWA  Masayuki OISHI  Shigeyuki AKIBA  Jiro HIROKAWA  Makoto ANDO  

     
    INVITED PAPER

      Pubricized:
    2017/04/20
      Vol:
    E100-B No:10
      Page(s):
    1717-1725

    This paper presents a novel 60 GHz-band photonic-integrated array-antenna and module for radio-over-fiber (RoF)-based beam forming. An integrated photonic array-antennas (IPA), where eight photodiodes and 4×2 arrayed patch-antenna are integrated in a single board, is actually fabricated, and 3.5-Gbit/s QPSK digital signal transmission with beam forming of the IPA is experimentally demonstrated. In addition, a novel 60-GHz compact antenna module is proposed and fabricated for increasing the number of antenna elements and flexibility creating various beam patterns. The feasibility of beam forming operation for the proposed antenna module is confirmed by a 60-GHz RoF transmission experiment. The capability of detecting the mobile terminal direction, which is one of the indispensable functions for actual environment, is also studied. The obtained results in this paper will be useful for designing future radio access networks based on RoF transmission technology.

  • MFD Measurement of a Six-Mode Fiber with Low-Coherence Digital Holography Open Access

    Yuta WAKAYAMA  Hidenori TAGA  Takehiro TSURITANI  

     
    INVITED PAPER

      Pubricized:
    2017/04/20
      Vol:
    E100-B No:10
      Page(s):
    1734-1739

    This paper presents an application of low-coherence interferometry for measurement of mode field diameters (MFDs) of a few-mode fiber and shows its performance compared with another method using a mode multiplexer. We found that the presented method could measure MFDs in a few-mode fiber even without any special mode multiplexers.

  • Model Based Fallback Control for Networked Control System via Switched Lyapunov Function

    Tsubasa SASAKI  Kenji SAWADA  Seiichi SHIN  Shu HOSOKAWA  

     
    PAPER-Systems and Control

      Vol:
    E100-A No:10
      Page(s):
    2086-2094

    This paper aims to propose a Fallback Control System isolated from cyber-attacks against networked control systems. The fallback control system implements maintaining functionality after an incident. Since cyber-attacks tamper with the communication contents of the networked control systems, the fallback control system is installed in a control target side. The fallback control system detects the incident without the communication contents on field network. This system detects an incident based on a bilinear observer and a switched Lyapunov function. When an incident is detected, normal operation is switched to fallback operation automatically. In this paper, a practical experiment with Ball-Sorter simulating a simple defective discriminator as a part of Factory Automation systems is shown. Assumed cyber-attacks against Ball-Sorter are Man In The Middle attack and Denial of Service attack.

  • Optical Transmission Systems Toward Longer Reach and Larger Capacity Open Access

    Kazuo HAGIMOTO  

     
    INVITED PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2017/03/22
      Vol:
    E100-B No:9
      Page(s):
    1696-1706

    This paper reviews long optical reach and large capacity transmission which has become possible because of the application of wide-band and low-noise optical fiber amplifiers and digital coherent signal processing. The device structure and mechanism together with their significance are discussed.

  • Long Period Sequences Generated by the Logistic Map over Finite Fields with Control Parameter Four

    Kazuyoshi TSUCHIYA  Yasuyuki NOGAMI  

     
    PAPER

      Vol:
    E100-A No:9
      Page(s):
    1816-1824

    Pseudorandom number generators have been widely used in Monte Carlo methods, communication systems, cryptography and so on. For cryptographic applications, pseudorandom number generators are required to generate sequences which have good statistical properties, long period and unpredictability. A Dickson generator is a nonlinear congruential generator whose recurrence function is the Dickson polynomial. Aly and Winterhof obtained a lower bound on the linear complexity profile of a Dickson generator. Moreover Vasiga and Shallit studied the state diagram given by the Dickson polynomial of degree two. However, they do not specify sets of initial values which generate a long period sequence. In this paper, we show conditions for parameters and initial values to generate long period sequences, and asymptotic properties for periods by numerical experiments. We specify sets of initial values which generate a long period sequence. For suitable parameters, every element of this set occurs exactly once as a component of generating sequence in one period. In order to obtain sets of initial values, we consider a logistic generator proposed by Miyazaki, Araki, Uehara and Nogami, which is obtained from a Dickson generator of degree two with a linear transformation. Moreover, we remark on the linear complexity profile of the logistic generator. The sets of initial values are described by values of the Legendre symbol. The main idea is to introduce a structure of a hyperbola to the sets of initial values. Our results ensure that generating sequences of Dickson generator of degree two have long period. As a consequence, the Dickson generator of degree two has some good properties for cryptographic applications.

  • Development and Future of Optical Fiber Related Technologies Open Access

    Shigeru TOMITA  

     
    INVITED PAPER-Optical Fiber for Communications

      Pubricized:
    2017/03/22
      Vol:
    E100-B No:9
      Page(s):
    1688-1695

    The history of optical fiber and optical transmission technologies has been described in many publications. However, the history of other technologies designed to support the physical layer of optical transmission has not been described in much detail. I would like to highlight those technologies in addition to optical fibers. Therefore, this paper describes the history of the development of optical fiber related technologies such as fusion splicers, optical fiber connectors, ribbon fiber, and passive components based on changes in optical fibers and optical fiber cables. Moreover, I describe technologies designed to support multi-core fibers such as fan-in/fan-out devices.

  • Bit-Quad-Based Euler Number Computing

    Bin YAO  Lifeng HE  Shiying KANG  Xiao ZHAO  Yuyan CHAO  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2017/06/20
      Vol:
    E100-D No:9
      Page(s):
    2197-2204

    The Euler number of a binary image is an important topological property for pattern recognition, image analysis, and computer vision. A famous method for computing the Euler number of a binary image is by counting certain patterns of bit-quads in the image, which has been improved by scanning three rows once to process two bit-quads simultaneously. This paper studies the bit-quad-based Euler number computing problem. We show that for a bit-quad-based Euler number computing algorithm, with the increase of the number of bit-quads being processed simultaneously, on the one hand, the average number of pixels to be checked for processing a bit-quad will decrease in theory, and on the other hand, the length of the codes for implementing the algorithm will increase, which will make the algorithm less efficient in practice. Experimental results on various types of images demonstrated that scanning five rows once and processing four bit-quads simultaneously is the optimal tradeoff, and that the optimal bit-quad-based Euler number computing algorithm is more efficient than other Euler number computing algorithms.

  • Constructing Subspace Membership Encryption through Inner Product Encryption

    Shuichi KATSUMATA  Noboru KUNIHIRO  

     
    PAPER

      Vol:
    E100-A No:9
      Page(s):
    1804-1815

    Subspace membership encryption (SME), a generalization of inner product encryption (IPE), was recently formalized by Boneh, Raghunathan, and Segev in Asiacrypt 2013. The main motivation for SME was that traditional predicate encryptions did not yield function privacy, a security notion introduced by Boneh et al. in Crypto 2013 that captures the privacy of the predicate associated to the secret key. Although they gave a generic construction of SME based on any IPE, we show that their construction of SME for small attribute space was incorrect and provide an attack that breaks the attribute hiding security, a baseline security notion for predicate encryptions that captures the privacy of the attribute associated with the ciphertext. Then, we propose a generalized construction of SME and prove that the attribute hiding security can not be achieved even in the newly defined setting. Finally, we further extend our generalized construction of SME and propose a SME that achieves the attribute hiding property even when the attribute space is small. In exchange our proposed scheme does not yield function privacy and the construction is rather inefficient. Although we did not succeed in constructing a SME both yielding function privacy and attribute hiding security, ours is the first attribute hiding SME scheme whose attribute space is polynomial in the security parameter, and we formalized a richer framework for constructing SMEs and discovered a trade-off like relationship between the two security notions.

  • On the Key Parameters of the Oscillator-Based Random Source

    Chenyang GUO  Yujie ZHOU  

     
    PAPER-Nonlinear Problems

      Vol:
    E100-A No:9
      Page(s):
    1956-1964

    This paper presents a mathematical model for the oscillator-based true random number generator (TRNG) to study the influence of some key parameters to the randomness of the output sequence. The output of the model is so close to the output of the real design of the TRNG that the model can generate the random bits instead of the analog simulation for research. It will cost less time than the analog simulation and be more convenient for the researchers to change some key parameters in the design. The authors give a method to improve the existing design of the oscillator-based TRNG to deal with the possible bias of the key parameters. The design is fabricated with a 55-nm CMOS process.

  • Evolution and Future of Information Networks Open Access

    Tohru ASAMI  Katsunori YAMAOKA  Takuji KISHIDA  

     
    INVITED SURVEY PAPER-Network

      Pubricized:
    2017/03/22
      Vol:
    E100-B No:9
      Page(s):
    1595-1605

    This paper looks at the history of research in the Technical Committee on Information Networks from the time of its inception to the present and provides an overview of the latest research in this area based on the topics discussed in recent meetings of the committee. It also presents possible future developments in the field of information networks.

  • R&D of 3M Technologies towards the Realization of Exabit/s Optical Communications Open Access

    Toshio MORIOKA  Yoshinari AWAJI  Yuichi MATSUSHIMA  Takeshi KAMIYA  

     
    INVITED PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2017/03/22
      Vol:
    E100-B No:9
      Page(s):
    1707-1715

    Research efforts initiated by the EXAT Initiative are described to realize Exabit/s optical communications, utilizing the 3M technologies, i.e. multi-core fiber, multi-mode control and multi-level modulation.

161-180hit(1214hit)