The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CAN(742hit)

41-60hit(742hit)

  • Complexity-Reduced Adaptive PAPR Reduction Method Using Null Space in MIMO Channel for MIMO-OFDM Signals Open Access

    Taku SUZUKI  Mikihito SUZUKI  Yoshihisa KISHIYAMA  Kenichi HIGUCHI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/03/23
      Vol:
    E103-B No:9
      Page(s):
    1019-1029

    This paper proposes a computational complexity-reduced algorithm for an adaptive peak-to-average power ratio (PAPR) reduction method previously developed by members of our research group that uses the null space in a multiple-input multiple-output (MIMO) channel for MIMO-orthogonal frequency division multiplexing (OFDM) signals. The proposed algorithm is an extension of the peak cancellation (PC) signal-based method that has been mainly investigated for per-antenna PAPR reduction. This method adds the PC signal, which is designed so that the out-of-band radiation is removed/reduced, directly to the time-domain transmission signal at each antenna. The proposed method, referred to as PCCNC (PC with channel-null constraint), performs vector-level signal processing in the PC signal generation so that the PC signal is transmitted only to the null space in the MIMO channel. We investigate three methods to control the beamforming (BF) vector in the PC signal, which is a key factor in determining the achievable PAPR performance of the algorithm. Computer simulation results show that the proposed PCCNC achieves approximately the same throughput-vs.-PAPR performance as the previous method while dramatically reducing the required computational cost.

  • Wireless Recharging Sensor Networks Cross-Layer Optimization Based on Successive Interference Cancellation Open Access

    Juan XU  Xingxin XU  Xu DING  Lei SHI  Yang LU  

     
    PAPER-Network

      Pubricized:
    2020/03/11
      Vol:
    E103-B No:9
      Page(s):
    929-939

    In wireless sensor networks (WSN), communication interference and the energy limitation of sensor nodes seriously hamper the network performance such as throughput and network lifetime. In this paper, we focus on the Successive Interference Cancellation (SIC) and Wireless Energy Transmission (WET) technology aiming to design a heuristic power control algorithm and an efficient cross-layer strategy to realize concurrency communication and improve the network throughput, channel utilization ratio and network lifetime. We realize that the challenge of this problem is that joint consideration of communication interference and energy shortage makes the problem model more complicated. To solve the problem efficiently, we adopt link scheduling strategy, time-slice scheduling scheme and energy consumption optimization protocol to construct a cross-layer optimization problem, then use an approximate linearization method to transform it into a linear problem which yields identical optimal value and solve it to obtain the optimal work strategy of wireless charging equipment (WCE). Simulation results show that adopting SIC and WCE can greatly improve communication capability and channel utilization ratio, and increase throughput by 200% to 500% while prolonging the network lifetime.

  • Reduced Complexity Successive-Cancellation Decoding of Polar Codes Based on Linear Approximation

    Yongli YAN  Xuanxuan ZHANG  Bin WU  

     
    LETTER-Information Theory

      Vol:
    E103-A No:8
      Page(s):
    995-999

    In this letter, the principle of LLR-based successive-cancellation (SC) polar decoding algorithm is explored. In order to simplify the logarithm and exponential operations in the updating rules for polar codes, we further utilize a piece-wise linear algorithm to approximate the transcendental functions, where the piece-wise linear algorithm only consists of multiplication and addition operations. It is demonstrated that with one properly allowable maximum error δ chosen for success-failure algorithm, performances approach to that of the standard SC algorithm can be achieved. Besides, the complexity reduction is realized by calculating a linear function instead of nonlinear function. Simulation results show that our proposed piece-wise SC decoder greatly reduces the complexity of the SC-based decoders with no loss in error correcting performance.

  • Millimeter-Wave Radio Channel Characterization Using Multi-Dimensional Sub-Grid CLEAN Algorithm

    Minseok KIM  Tatsuki IWATA  Shigenobu SASAKI  Jun-ichi TAKADA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2020/01/10
      Vol:
    E103-B No:7
      Page(s):
    767-779

    In radio channel measurements and modeling, directional scanning via highly directive antennas is the most popular method to obtain angular channel characteristics to develop and evaluate advanced wireless systems for high frequency band use. However, it is often insufficient for ray-/cluster-level characterizations because the angular resolution of the measured data is limited by the angular sampling interval over a given scanning angle range and antenna half power beamwidth. This study proposes the sub-grid CLEAN algorithm, a novel technique for high-resolution multipath component (MPC) extraction from the multi-dimensional power image, so called double-directional angular delay power spectrum. This technique can successfully extract the MPCs by using the multi-dimensional power image. Simulation and measurements showed that the proposed technique could extract MPCs for ray-/cluster-level characterizations and channel modeling. Further, applying the proposed method to the data captured at 58.5GHz in an atrium entrance hall environment which is an indoor hotspot access scenario in the fifth generation mobile system, the multipath clusters and corresponding scattering processes were identified.

  • Detection of SQL Injection Vulnerability in Embedded SQL

    Young-Su JANG  

     
    LETTER-Software System

      Pubricized:
    2020/02/13
      Vol:
    E103-D No:5
      Page(s):
    1173-1176

    Embedded SQL inserts SQL statements into the host programming language and executes them at program run time. SQL injection is a known attack technique; however, detection techniques are not introduced in embedded SQL. This paper introduces a technique based on candidate code generation that can detect SQL injection vulnerability in the C/C++ host programming language.

  • Successive Interference Cancellation of ICA-Aided SDMA for GFSK Signaling in BLE Systems

    Masahiro TAKIGAWA  Shinsuke IBI  Seiichi SAMPEI  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2019/11/12
      Vol:
    E103-B No:5
      Page(s):
    495-503

    This paper proposes a successive interference cancellation (SIC) of independent component analysis (ICA) aided spatial division multiple access (SDMA) for Gaussian filtered frequency shift keying (GFSK) in Bluetooth low energy (BLE) systems. The typical SDMA scheme requires estimations of channel state information (CSI) using orthogonal pilot sequences. However, the orthogonal pilot is not embedded in the BLE packet. This fact motivates us to add ICA detector into BLE systems. In this paper, focusing on the covariance matrix of ICA outputs, SIC can be applied with Cholesky decomposition. Then, in order to address the phase ambiguity problems created by the ICA process, we propose a differential detection scheme based on the MAP algorithm. In practical scenarios, it is subject to carrier frequency offset (CFO) as well as symbol timing offset (STO) induced by the hardware impairments present in the BLE peripherals. The packet error rate (PER) performance is evaluated by computer simulations when BLE peripherals simultaneously communicate in the presence of CFO and STO.

  • Universal Testing for Linear Feed-Forward/Feedback Shift Registers

    Hideo FUJIWARA  Katsuya FUJIWARA  Toshinori HOSOKAWA  

     
    PAPER-Dependable Computing

      Pubricized:
    2020/02/25
      Vol:
    E103-D No:5
      Page(s):
    1023-1030

    Linear feed-forward/feedback shift registers are used as an effective tool of testing circuits in various fields including built-in self-test and secure scan design. In this paper, we consider the issue of testing linear feed-forward/feedback shift registers themselves. To test linear feed-forward/feedback shift registers, it is necessary to generate a test sequence for each register. We first present an experimental result such that a commercial ATPG (automatic test pattern generator) cannot always generate a test sequence with high fault coverage even for 64-stage linear feed-forward/feedback shift registers. We then show that there exists a universal test sequence with 100% of fault coverage for the class of linear feed-forward/feedback shift registers so that no test generation is required, i.e., the cost of test generation is zero. We prove the existence theorem of universal test sequences for the class of linear feed-forward/feedback shift registers.

  • Insertion/Deletion/Substitution Error Correction by a Modified Successive Cancellation Decoding of Polar Code Open Access

    Hikari KOREMURA  Haruhiko KANEKO  

     
    PAPER-Coding Theory

      Vol:
    E103-A No:4
      Page(s):
    695-703

    This paper presents a successive cancellation (SC) decoding of polar codes modified for insertion/deletion/substitution (IDS) error channels, in which insertions and deletions are described by drift values. The recursive calculation of the original SC decoding is modified to include the drift values as stochastic variables. The computational complexity of the modified SC decoding is O (D3) with respect to the maximum drift value D, and O (N log N) with respect to the code length N. The symmetric capacity of polar bit channel is estimated by computer simulations, and frozen bits are determined according to the estimated symmetric capacity. Simulation results show that the decoded error rate of polar code with the modified SC list decoding is lower than that of existing IDS error correction codes, such as marker-based code and spatially-coupled code.

  • Joint Angle, Velocity, and Range Estimation Using 2D MUSIC and Successive Interference Cancellation in FMCW MIMO Radar System

    Jonghyeok LEE  Sunghyun HWANG  Sungjin YOU  Woo-Jin BYUN  Jaehyun PARK  

     
    PAPER-Sensing

      Pubricized:
    2019/09/11
      Vol:
    E103-B No:3
      Page(s):
    283-290

    To estimate angle, velocity, and range information of multiple targets jointly in FMCW MIMO radar, two-dimensional (2D) MUSIC with matched filtering and FFT algorithm is proposed. By reformulating the received FMCW signal of the colocated MIMO radar, we exploit 2D MUSIC to estimate the angle and Doppler frequency of multiple targets. Then by using a matched filter together with the estimated angle and Doppler frequency and FFT operation, the range of the target is estimated. To effectively estimate the parameters of multiple targets with large distance differences, we also propose a successive interference cancellation method that uses the orthogonal projection. That is, rather than estimating the multiple target parameters simultaneously using 2D MUSIC, we estimate the target parameters sequentially, in which the parameters of the target having strongest reflected power are estimated first and then, their effect on the received signal is canceled out by using the orthogonal projection. Simulations verify the performance of the proposed algorithm.

  • An Adaptive Fusion Successive Cancellation List Decoder for Polar Codes with Cyclic Redundancy Check

    Yuhuan WANG  Hang YIN  Zhanxin YANG  Yansong LV  Lu SI  Xinle YU  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2019/07/08
      Vol:
    E103-B No:1
      Page(s):
    43-51

    In this paper, we propose an adaptive fusion successive cancellation list decoder (ADF-SCL) for polar codes with single cyclic redundancy check. The proposed ADF-SCL decoder reasonably avoids unnecessary calculations by selecting the successive cancellation (SC) decoder or the adaptive successive cancellation list (AD-SCL) decoder depending on a log-likelihood ratio (LLR) threshold in the decoding process. Simulation results show that compared to the AD-SCL decoder, the proposed decoder can achieve significant reduction of the average complexity in the low signal-to-noise ratio (SNR) region without degradation of the performance. When Lmax=32 and Eb/N0=0.5dB, the average complexity of the proposed decoder is 14.23% lower than that of the AD-SCL decoder.

  • Efficient Supergraph Search Using Graph Coding

    Shun IMAI  Akihiro INOKUCHI  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2019/09/26
      Vol:
    E103-D No:1
      Page(s):
    130-141

    This paper proposes a method for searching for graphs in the database which are contained as subgraphs by a given query. In the proposed method, the search index does not require any knowledge of the query set or the frequent subgraph patterns. In conventional techniques, enumerating and selecting frequent subgraph patterns is computationally expensive, and the distribution of the query set must be known in advance. Subsequent changes to the query set require the frequent patterns to be selected again and the index to be reconstructed. The proposed method overcomes these difficulties through graph coding, using a tree structured index that contains infrequent subgraph patterns in the shallow part of the tree. By traversing this code tree, we are able to rapidly determine whether multiple graphs in the database contain subgraphs that match the query, producing a powerful pruning or filtering effect. Furthermore, the filtering and verification steps of the graph search can be conducted concurrently, rather than requiring separate algorithms. As the proposed method does not require the frequent subgraph patterns and the query set, it is significantly faster than previous techniques; this independence from the query set also means that there is no need to reconstruct the search index when the query set changes. A series of experiments using a real-world dataset demonstrate the efficiency of the proposed method, achieving a search speed several orders of magnitude faster than the previous best.

  • Energy-Efficient Full-Duplex Enabled Cloud Radio Access Networks

    Tung Thanh VU  Duy Trong NGO  Minh N. DAO  Quang-Thang DUONG  Minoru OKADA  Hung NGUYEN-LE  Richard H. MIDDLETON  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/07/18
      Vol:
    E103-B No:1
      Page(s):
    71-78

    This paper studies the joint optimization of precoding, transmit power and data rate allocation for energy-efficient full-duplex (FD) cloud radio access networks (C-RANs). A new nonconvex problem is formulated, where the ratio of total sum rate to total power consumption is maximized, subject to the maximum transmit powers of remote radio heads and uplink users. An iterative algorithm based on successive convex programming is proposed with guaranteed convergence to the Karush-Kuhn-Tucker solutions of the formulated problem. Numerical examples confirm the effectiveness of the proposed algorithm and show that the FD C-RANs can achieve a large gain over half-duplex C-RANs in terms of energy efficiency at low self-interference power levels.

  • Shifted Coded Slotted ALOHA: A Graph-Based Random Access with Shift Operation

    Tomokazu EMOTO  Takayuki NOZAKI  

     
    PAPER-Erasure Correction

      Vol:
    E102-A No:12
      Page(s):
    1611-1621

    A random access scheme is a fundamental scenario in which the users transmit through a shared channel and cannot coordinate with each other. Recently, successive interference cancellation (SIC) is introduced into the random access scheme. The SIC decodes the transmitted packets using collided packets. The coded slotted ALOHA (CSA) is a random access scheme using the SIC. The CSA encodes each packet by a local code prior to transmission. It is known that the CSA achieves excellent throughput. On the other hand, it is reported that shift operation improves the decoding performance for packet-oriented erasure correcting coding systems. In this paper, we propose a protocol which applies the shift operation to the CSA. Numerical simulations show that the proposed protocol achieves better throughput and packet loss rate than the CSA. Moreover, we analyze the asymptotic behavior of the throughput and the decoding erasure rate for the proposed protocol by the density evolution.

  • Antenna Allocation of Full Duplex Receiver for Security Improvement of the MIMOME Wiretap Channel with Self-Interference Cancellation

    Tianwen GUO  Ping DENG  Qiang YU  Baoyun WANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E102-A No:11
      Page(s):
    1560-1565

    In this letter, we investigate a design of efficient antenna allocation at the full duplex receiver (FDR) in a multi-input multi-output multi-eavesdropper (MIMOME) wiretap channel for physical layer security improvement. Specifically, we propose the allocation which are feasible for the practical scenario with self-interference (SI) taken into account, because the jamming signals from FDR not only confuse the eavesdropper but also inevitably cause SI at the FDR. Due to the nolinear and coupling of the antenna allocation optimization problem, we transform the original problem into an integer programming problem. Then, we derive the optimal solution and the corresponding beamforming matrices in closed-form by means of combining spatial alignment and null-space projection method. Furthermore, we present the feasibility condition and full-protection condition, which offer insight into principles that enable more efficient and effective use of FDR in the wiretap channel for security improvement. From the simulation results, we validate the theoretical analysis and demonstrate the outstanding performance of the proposed antennas allocation at FDR.

  • The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC Open Access

    Yacheng WANG  Yasuhiko IKEMATSU  Dung Hoang DUONG  Tsuyoshi TAKAGI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E102-A No:9
      Page(s):
    1028-1036

    At PQCrypto 2016, Szepieniec et al. proposed a new type of trapdoor called Extension Field Cancellation (EFC) for constructing secure multivariate encryption cryptosystems. They also specifically suggested two schemes EFCp- and EFCpt2- that apply this trapdoor and some modifiers. Although both of them seem to avoid all attacks used for cryptanalysis on multivariate cryptography, their decryption efficiency has room for improvement. On the other hand, their security was analyzed mainly through an algebraic attack of computing the Gröbner basis of the public key, and there possibly exists more effective attacks. In this paper, we introduce a more efficient decryption approach for EFCp- and EFCpt2-, which manages to avoid all redundant computation involved in the original decryption algorithms without altering their public key. In addition, we estimate the secure parameters for EFCp- and EFCpt2- through a hybrid attack of algebraic attack and exhaustive search.

  • Performance of Iterative Digital Self-Interference Canceler with Alternating Estimate Subtraction for OFDM Using Full Duplex

    Takahiro OHTOMO  Hiroki YAMADA  Mamoru SAWAHASHI  Keisuke SAITO  

     
    PAPER

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1490-1502

    In full duplex (FD), which improves the system capacity (or cell throughput) and reduces the transmission delay (or latency) through simultaneous transmission and reception in the same frequency band, self-interference (SI) from the transmitter should be suppressed using antenna isolation, an analog SI canceler, and digital SI canceler (DSIC) to a level such that the data or control channel satisfies the required block error rate (BLER). This paper proposes a structure of iterative DSIC with alternating estimate subtraction (AES-IDSIC) for orthogonal frequency division multiplexing (OFDM) using FD. We first present the required SI suppression level considering SI, quantization noise of an analog-to-digital converter, and nonlinear distortion of a power amplifier and RF receiver circuit for a direct conversion transceiver using FD. Then, we propose an AES-IDSIC structure that iterates the generation of the SI estimate, the downlink symbol estimate, and then alternately removes one of the estimates from the received signal in the downlink including SI. We investigate the average BLER performance of the AES-IDSIC for OFDM using FD in a multipath fading channel based on link-level simulations under the constraint that the derived required signal-to-SI ratio must be satisfied.

  • New Model of Flaming Phenomena in On-Line Social Networks Caused by Degenerated Oscillation Modes

    Takahiro KUBO  Chisa TAKANO  Masaki AIDA  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2019/01/24
      Vol:
    E102-B No:8
      Page(s):
    1554-1564

    The explosive dynamics present in on-line social networks, typically represented by flaming phenomena, can have a serious impact on not only the sustainable operation of information networks but also on activities in the real world. In order to counter the flaming phenomenon, it is necessary to understand the mechanism underlying the generation of the flaming phenomena within an engineering framework. This paper discusses a new model of the generating mechanism of the flaming phenomena. Our previous study has shown that the cause of flaming phenomena can, by reference to an oscillation model on networks, be understood complex eigenvalues of the matrix formed to describe oscillating phenomena. In this paper, we show that the flaming phenomena can occur due to coupling between degenerated oscillation modes even if all the eigenvalues are real numbers. In addition, we investigate the generation process of flaming phenomena with respect to the initial phases of the degenerated oscillation modes.

  • Controller Area Network and Its Reduced Wiring Technology Open Access

    Daisuke UMEHARA  Takeyuki SHISHIDO  

     
    INVITED PAPER

      Pubricized:
    2019/01/22
      Vol:
    E102-B No:7
      Page(s):
    1248-1262

    Controller area network (CAN) has been widely adopted as an in-vehicle communications standard. CAN with flexible data-rate (CAN FD) is defined in the ISO standards to achieve higher data rates than the legacy CAN. A number of CAN nodes can be connected by a single transmission medium, i.e. CAN enables us to constitute cost-effective bus-topology networks. CAN puts carrier sense multiple access with collision resolution (CSMA/CR) into practice by using bit-wise arbitration based on wired logical AND in the physical layer. The most prioritized message is delivered without interruption if two or more CAN nodes transmit messages at the same time due to the bit-wise arbitration. However, the scalability of CAN networks suffers from ringing caused by the signaling mechanism establishing the wired logical AND. We need to reduce networking material in a car in order to reduce the car weight, save the fuel and the cost, and develop a sustainable society by establishing more scalable CAN networks. In this paper, we show a reduced wiring technology for CAN to enhance the network scalability and the cost efficiency.

  • Design of Integrated High Voltage Pulse Generator for Medical Ultrasound Transmitters

    Deng-Fong LU  Chin HSIA  Jian-Chiun LIOU  Yen-Chung HUANG  

     
    PAPER

      Pubricized:
    2018/12/28
      Vol:
    E102-B No:6
      Page(s):
    1121-1127

    Design of an equivalent slew-rate monolithic pulse generator using bipolar-CMOS-DMOS (BCD) technology for medical ultrasound transmitters is presented in this paper. The pulse generator employs a floating capacitive coupling level-shifter architecture to produce a high-voltage (Vpp=80V) output. The performance of equivalent slew-rate in the rising and falling edge is achieved by carefully choosing the value of coupling capacitors and the size of the final stage high-voltage MOSFETs of the pulse generator. The measured output pulses show the rising and falling time of 8.6nsec and 8.5nsec, respectively with second harmonic distortion down to -40dBc, indicating the designed pulse generator can be used for advanced ultrasonic harmonic imaging systems.

  • A Novel Low Complexity Lattice Reduction-Aided Iterative Receiver for Overloaded MIMO Open Access

    Satoshi DENNO  Yuta KAWAGUCHI  Tsubasa INOUE  Yafei HOU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/11/21
      Vol:
    E102-B No:5
      Page(s):
    1045-1054

    This paper proposes a novel low complexity lattice reduction-aided iterative receiver for overloaded MIMO. Novel noise cancellation is proposed that increases an equivalent channel gain with a scalar gain introduced in this paper, which results in the improvement of the signal to noise power ratio (SNR). We theoretically analyze the performance of the proposed receiver that the lattice reduction raises the SNR of the detector output signals as the scalar gain increases, when the Lenstra-Lenstra-Lova's (LLL) algorithm is applied to implement the lattice reduction. Because the SNR improvement causes the scalar gain to increase, the performance is improved by iterating the reception process. Computer simulations confirm the performance. The proposed receiver attains a gain of about 5dB at the BER of 10-4 in a 6×2 overloaded MIMO channel. Computational complexity of the proposed receiver is about 1/50 as much as that of the maximum likelihood detection (MLD).

41-60hit(742hit)