The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] EAM(900hit)

61-80hit(900hit)

  • Simple Weight Calculation Methods for Millimeter Wave Band Massive Antenna Array in Direct Wave Dominant Environment

    Mizuki SUGA  Yushi SHIRATO  Naoki KITA  Takeshi ONIZAWA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2021/01/14
      Vol:
    E104-B No:7
      Page(s):
    865-872

    We propose two simple weight calculation methods (primary method and enhanced method), that estimate approximated phase plane from a few antenna phase and calculate weights of all antenna elements, for wireless backhaul systems that utilize millimeter wave band massive antenna arrays. Such systems are expected to be used instead of optical fiber for connecting many small cell base stations (SCBSs) to the core network, and supporting the rapid deployment of SCBSs. However, beamforming with massive antenna arrays requires many analog-digital converters (ADCs) and incurs the issue of implementation complexity. The proposed methods overcome the problem by reducing the number of ADCs. Computer simulations clarify the appropriate layout and the number of ADCs connected to antenna elements; the effectiveness of the proposed methods is confirmed by evaluations with measured channel state information (CSI) in propagation experiments on a wireless backhaul system. Experimental verifications on the case of calculating the weight of 200 elements from the phases of just 9 elements show that the array gain degradation from ideal (the case in which the phases of all elements are used estimation) with both methods is less than 0.4 dB in the direct wave dominant environment. In addition, the enhanced method holds the array gain degradation to under 0.8dB in an environment existing reflected waves. These results show that the proposed methods can attain high accuracy beamforming while reducing ADC number.

  • Quality of Experience (QoE) Studies: Present State and Future Prospect Open Access

    Tatsuya YAMAZAKI  

     
    INVITED PAPER

      Pubricized:
    2021/02/04
      Vol:
    E104-B No:7
      Page(s):
    716-724

    With the spread of the broadband Internet and high-performance devices, various services have become available anytime, anywhere. As a result, attention is focused on the service quality and Quality of Experience (QoE) is emphasized as an evaluation index from the user's viewpoint. Since QoE is a subjective evaluation metric and deeply involved with user perception and expectation, quantitative and comparative research was difficult because the QoE study is still in its infancy. At present, after tremendous devoted efforts have contributed to this research area, a shape of the QoE management architecture has become clear. Moreover, not only for research but also for business, video streaming services are expected as a promising Internet service incorporating QoE. This paper reviews the present state of QoE studies with the above background and describes the future prospect of QoE. Firstly, the historical aspects of QoE is reviewed starting with QoS (Quality of Service). Secondly, a QoE management architecture is proposed in this paper, which consists of QoE measurement, QoE assessment, QoS-QoE mapping, QoE modeling, and QoE adaptation. Thirdly, QoE studies related with video streaming services are introduced, and finally individual QoE and physiology-based QoE measurement methodologies are explained as future prospect in the field of QoE studies.

  • Suppression in Quality Variation for 360-Degree Tile-Based Video Streaming

    Arisa SEKINE  Masaki BANDAI  

     
    PAPER-Network

      Pubricized:
    2020/12/17
      Vol:
    E104-B No:6
      Page(s):
    616-623

    For 360-degree video streaming, a 360-degree video is divided into segments temporally (i.e. some seconds). Each segment consists of multiple video tiles spatially. In this paper, we propose a tile quality selection method for tile-based video streaming. The proposed method suppresses the spatial quality variation within the viewport caused by a change of the viewport region due to user head movement. In the proposed method, the client checks whether the difference in quality level between the viewport and the region around the viewport is large, and if so, reduces it when assigning quality levels. Simulation results indicate that when the segment length is long, quality variation can be suppressed without significantly reducing the perceived video quality (in terms of bitrate). In particular, the quality variation within the viewport can be greatly suppressed. Furthermore, we verify that the proposed method is effective in reducing quality variation within the viewport and across segments without changing the total download size.

  • An Improved Online Multiclass Classification Algorithm Based on Confidence-Weighted

    Ji HU  Chenggang YAN  Jiyong ZHANG  Dongliang PENG  Chengwei REN  Shengying YANG  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/03/15
      Vol:
    E104-D No:6
      Page(s):
    840-849

    Online learning is a method which updates the model gradually and can modify and strengthen the previous model, so that the updated model can adapt to the new data without having to relearn all the data. However, the accuracy of the current online multiclass learning algorithm still has room for improvement, and the ability to produce sparse models is often not strong. In this paper, we propose a new Multiclass Truncated Gradient Confidence-Weighted online learning algorithm (MTGCW), which combine the Truncated Gradient algorithm and the Confidence-weighted algorithm to achieve higher learning performance. The experimental results demonstrate that the accuracy of MTGCW algorithm is always better than the original CW algorithm and other baseline methods. Based on these results, we applied our algorithm for phishing website recognition and image classification, and unexpectedly obtained encouraging experimental results. Thus, we have reasons to believe that our classification algorithm is clever at handling unstructured data which can promote the cognitive ability of computers to a certain extent.

  • Parallel Peak Cancellation Signal-Based PAPR Reduction Method Using Null Space in MIMO Channel for MIMO-OFDM Transmission Open Access

    Taku SUZUKI  Mikihito SUZUKI  Kenichi HIGUCHI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/11/20
      Vol:
    E104-B No:5
      Page(s):
    539-549

    This paper proposes a parallel peak cancellation (PC) process for the computational complexity-efficient algorithm called PC with a channel-null constraint (PCCNC) in the adaptive peak-to-average power ratio (PAPR) reduction method using the null space in a multiple-input multiple-output (MIMO) channel for MIMO-orthogonal frequency division multiplexing (OFDM) signals. By simultaneously adding multiple PC signals to the time-domain transmission signal vector, the required number of iterations of the iterative algorithm is effectively reduced along with the PAPR. We implement a constraint in which the PC signal is transmitted only to the null space in the MIMO channel by beamforming (BF). By doing so the data streams do not experience interference from the PC signal on the receiver side. Since the fast Fourier transform (FFT) and inverse FFT (IFFT) operations at each iteration are not required unlike the previous algorithm and thanks to the newly introduced parallel processing approach, the enhanced PCCNC algorithm reduces the required total computational complexity and number of iterations compared to the previous algorithms while achieving the same throughput-vs.-PAPR performance.

  • User Scheduling with Beam Selection for Full Digital Massive MIMO Base Station

    Masahito YATA  Go OTSURU  Yukitoshi SANADA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/10/15
      Vol:
    E104-B No:4
      Page(s):
    428-435

    In this paper, user scheduling with beam selection for full-digital massive multi-input multi-output (MIMO) is proposed. Inter-user interference (IUI) can be canceled by precoding such as zero-forcing at a massive MIMO base station if ideal hardware implementation is assumed. However, owing to the non-ideal characteristics of hardware components, IUI occurs among multiple user terminals allocated on the same resource. Thus, in the proposed scheme, the directions of beams for allocated user terminals are adjusted to maximize the total user throughput. User allocation based on the user throughput after the adjustment of beam directivity is then carried out. Numerical results obtained through computer simulation show that when the number of user terminals in the cell is two and the number of user terminals allocated to one resource block (RB) is two, the throughput per subcarrier per subframe improves by about 3.0 bits. On the other hand, the fairness index (FI) is reduced by 0.03. This is because only the probability in the high throughput region increases as shown in the cumulative distribution function (CDF) of throughput per user. Also, as the number of user terminals in the cell increases, the amount of improvement in throughput decreases. As the number of allocated user terminals increases, more user terminals are allocated to the cell-edge, which reduces the average throughput.

  • QoE-Aware Stable Adaptive Video Streaming Using Proportional-Derivative Controller for MPEG-DASH Open Access

    Ryuta SAKAMOTO  Takahiro SHOBUDANI  Ryosuke HOTCHI  Ryogo KUBO  

     
    PAPER-Network

      Pubricized:
    2020/09/24
      Vol:
    E104-B No:3
      Page(s):
    286-294

    In video distribution services such as video streaming, the providers must satisfy the various quality demands of the users. One of the human-centric indexes used to assess video quality is the quality of experience (QoE). In video streaming, the video bitrate, video freezing time, and video bitrate switching are significant determiners of QoE. To provide high-quality video streaming services, adaptive streaming using the Moving Picture Experts Group dynamic adaptive streaming over Hypertext Transfer Protocol (MPEG-DASH) is widely utilized. One of the conventional bitrate selection methods for MPEG-DASH selects the bitrate such that the amount of buffered data in the playback buffer, i.e., the playback buffer level, can be maintained at a constant value. This method can avoid buffer overflow and video freezing based on feedback control; however, this method induces high-frequency video bitrate switching, which can degrade QoE. To overcome this issue, this paper proposes a bitrate selection method in an adaptive video steaming for MPEG-DASH to improve the QoE by minimizing the bitrate fluctuation. To this end, the proposed method does not change the bitrate if the playback buffer level is not around its upper or lower limit, corresponding to the full or empty state of the playback buffer, respectively. In particular, to avoid buffer overflow and video freezing, the proposed method selects the bitrate based on proportional-derivative (PD) control to maintain the playback buffer level at a target level, which corresponds to an upper or lower threshold of the playback buffer level. Simulations confirm that, the proposed method offers better QoE than the conventional method for users with various preferences.

  • A Congestion-Aware Adaptive Streaming over ICN Combined with Explicit Congestion Notification for QoE Improvement

    Rei NAKAGAWA  Satoshi OHZAHATA  Ryo YAMAMOTO  Toshihiko KATO  

     
    PAPER-Information Network

      Pubricized:
    2020/11/02
      Vol:
    E104-D No:2
      Page(s):
    264-274

    Recently, adaptive streaming over information centric network (ICN) has attracted attention. In adaptive streaming over ICN, the bitrate adaptation of the client often overestimates a bitrate for available bandwidth due to congestion because the client implicitly estimates congestion status from the content download procedures of ICN. As a result, streaming overestimated bitrate results in QoE degradation of clients such as cause of a stall time and frequent variation of the bitrate. In this paper, we propose a congestion-aware adaptive streaming over ICN combined with the explicit congestion notification (CAAS with ECN) to avoid QoE degradation. CAAS with ECN encourages explicit feedback of congestion detected in the router on the communication path, and introduces the upper band of the selectable bitrate (bitrate-cap) based on explicit feedback from the router to the bitrate adaptation of the clients. We evaluate the effectiveness of CAAS with ECN for client's QoE degradation due to congestion and behavior on the QoS metrics based on throughput. The simulation experiments show that the bitrate adjustment for all the clients improves QoE degradation and QoE fairness due to effective congestion avoidance.

  • Multi Modulus Signal Adaptation for Semi-Blind Uplink Interference Suppression on Multicell Massive MIMO Systems

    Kazuki MARUTA  Chang-Jun AHN  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2020/08/18
      Vol:
    E104-B No:2
      Page(s):
    158-168

    This paper expands our previously proposed semi-blind uplink interference suppression scheme for multicell multiuser massive MIMO systems to support multi modulus signals. The original proposal applies the channel state information (CSI) aided blind adaptive array (BAA) interference suppression after the beamspace preprocessing and the decision feedback channel estimation (DFCE). BAA is based on the constant modulus algorithm (CMA) which can fully exploit the degree of freedom (DoF) of massive antenna arrays to suppress both inter-user interference (IUI) and inter-cell interference (ICI). Its effectiveness has been verified under the extensive pilot contamination constraint. Unfortunately, CMA basically works well only for constant envelope signals such as QPSK and thus the proposed scheme should be expanded to cover QAM signals for more general use. This paper proposes to apply the multi modulus algorithm (MMA) and the minimum mean square error weight derivation based on data-aided sample matrix inversion (MMSE-SMI). It can successfully realize interference suppression even with the use of multi-level envelope signals such as 16QAM with satisfactorily outage probability performance below the fifth percentile.

  • Filter Design for Full-Duplex Multiuser Systems Based on Single-Carrier Transmission in Frequency-Selective Channels

    Kyohei AMANO  Teruyuki MIYAJIMA  Yoshiki SUGITANI  

     
    PAPER

      Vol:
    E104-A No:1
      Page(s):
    235-242

    In this paper, we consider interference suppression for a full-duplex (FD) multiuser system based on single-carrier transmission in frequency-selective channels where a FD base-station (BS) simultaneously communicates with half-duplex (HD) uplink and downlink mobile users. We propose a design method for time-domain filtering where the filters in the BS transmitter suppress inter-symbol interference (ISI) and downlink inter-user interference (IUI); those in the BS receiver, self-interference, ISI, and uplink IUI; and those in the downlink mobile users, co-channel interference (CCI) without the channel state information of the CCI channels. Simulation results indicate that the FD system based on the proposed method outperforms the conventional HD system and FD system based on multicarrier transmission.

  • New Iterated RC4 Key Correlations and their Application to Plaintext Recovery on WPA-TKIP

    Ryoma ITO  Atsuko MIYAJI  

     
    PAPER

      Vol:
    E104-A No:1
      Page(s):
    190-202

    This paper presents new key correlations of the keystream bytes generated from RC4 and their application to plaintext recovery on WPA-TKIP. We first observe new key correlations between two bytes of the RC4 key pairs and a keystream byte in each round, and provide their proofs. We refer to these correlations as iterated RC4 key correlations since two bytes of the RC4 key pairs are iterated every 16 rounds. We then extend the existing attacks by Isobe et al. at FSE 2013 and AlFardan et al. at USENIX Security 2013, 0and finally propose an efficient attack on WPA-TKIP. We refer to the proposed attack as chosen plaintext recovery attack (CPRA) since it chooses the best approach for each byte from a variety of the existing attacks. In order to recover the first 257 bytes of a plaintext on WPA-TKIP with success probability of at least 90%, CPRA requires approximately 230 ciphertexts, which are approximately half the number of ciphertexts for the existing attack by Paterson et al. at FSE 2014.

  • Stochastic Geometry Analysis of Wireless Backhaul Networks with Beamforming in Roadside Environments

    Yuxiang FU  Koji YAMAMOTO  Yusuke KODA  Takayuki NISHIO  Masahiro MORIKURA  Chun-hsiang HUANG  Yushi SHIRATO  Naoki KITA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2020/07/14
      Vol:
    E104-B No:1
      Page(s):
    118-127

    Stochastic geometry analysis of wireless backhaul networks with beamforming in roadside environments is provided. In particular, a new model to analyze antenna gains, interference, and coverage in roadside environments of wireless networks with Poisson point process deployment of BSs is proposed. The received interference from the BSs with wired backhaul (referred to as anchored BS or A-BS) and the coverage probability of a typical BS are analyzed under different approximations of the location of the serving A-BS and combined antenna gains. Considering the beamforming, the coverage probability based on the aggregate interference consisting of the direct interference from the A-BSs and reflected interference from the BSs with wireless backhaul is also derived.

  • MILP-Aided Security Evaluation of Differential Attacks on KCipher-2

    Jin HOKI  Kosei SAKAMOTO  Fukang LIU  Kazuhiko MINEMATSU  Takanori ISOBE  

     
    PAPER

      Vol:
    E104-A No:1
      Page(s):
    203-212

    This paper investigates the security of KCipher-2 against differential attacks. We utilize an MILP-based method to evaluate the minimum number of active S-boxes in each round. We try to construct an accurate model to describe the 8-bit truncated difference propagation through the modular addition operation and the linear transformation of KCipher-2, respectively, which were omitted or simplified in the previous evaluation by Preneel et al. In our constructed model, the difference characteristics neglected in Preneel et al.'s evaluation can be taken into account and all valid differential characteristics can be covered. As a result, we reveal that the minimal number of active S-boxes is 25 over 15 rounds in the related IV setting and it is 17 over 24 rounds in the related IV-key setting. Therefore, this paper shows for the first time that KCipher-2 is secure against the related IV differential attack.

  • Research on Ultra-Lightweight RFID Mutual Authentication Protocol Based on Stream Cipher

    Lijun GAO  Feng LIN  Maode MA  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2020/06/29
      Vol:
    E104-B No:1
      Page(s):
    13-19

    In recent years, with the continuous development of the Internet of Things, radio frequency identification (RFID) technology has also been widely concerned. The computing power of low cost tags is limited because of their high hardware requirements. Symmetric encryption algorithms and asymmetric encryption algorithms, such as RSA, DES, AES, etc., cannot be suitable for low cost RFID protocols. Therefore, research on RFID security authentication protocols with low cost and high security has become a focus. Recently, an ultralightweight RFID authentication protocol LP2UF was proposed to provide security and prevent all possible attacks. However, it is discovered that a type of desynchronization attack can successfully break the proposed scheme. To overcome the vulnerability against desynchronization attacks, we propose here a new ultra-lightweight RFID two-way authentication protocol based on stream cipher technology that uses only XOR. The stream cipher is employed to ensure security between readers and tags. Analysis shows that our protocol can effectively resist position tracking attacks, desynchronization attacks, and replay attacks.

  • Robust Adaptive Beamforming Based on the Effective Steering Vector Estimation and Covariance Matrix Reconstruction against Sensor Gain-Phase Errors

    Di YAO  Xin ZHANG  Bin HU  Xiaochuan WU  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2020/06/04
      Vol:
    E103-A No:12
      Page(s):
    1655-1658

    A robust adaptive beamforming algorithm is proposed based on the precise interference-plus-noise covariance matrix reconstruction and steering vector estimation of the desired signal, even existing large gain-phase errors. Firstly, the model of array mismatches is proposed with the first-order Taylor series expansion. Then, an iterative method is designed to jointly estimate calibration coefficients and steering vectors of the desired signal and interferences. Next, the powers of interferences and noise are estimated by solving a quadratic optimization question with the derived closed-form solution. At last, the actual interference-plus-noise covariance matrix can be reconstructed as a weighted sum of the steering vectors and the corresponding powers. Simulation results demonstrate the effectiveness and advancement of the proposed method.

  • DOA-Based Weighted Spatial Filter Design for Sum and Difference Composite Co-Array

    Sho IWAZAKI  Shogo NAKAMURA  Koichi ICHIGE  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2020/04/21
      Vol:
    E103-B No:10
      Page(s):
    1147-1154

    This paper presents a weighted spatial filter (WSF) design method based on direction of arrival (DOA) estimates for a novel array configuration called a sum and difference composite co-array. A sum and difference composite co-array is basically a combination of sum and difference co-arrays. Our configuration can realize higher degrees of freedom (DOF) with the sum co-array part at a calculation cost lower than those of the other sparse arrays. To further enhance the robustness of our proposed sum and difference composite co-array we design an optimal beam pattern by WSF based on the information of estimated DOAs. Performance of the proposed system and the DOA estimation accuracy of close-impinging waves are evaluated through computer simulations.

  • Complexity-Reduced Adaptive PAPR Reduction Method Using Null Space in MIMO Channel for MIMO-OFDM Signals Open Access

    Taku SUZUKI  Mikihito SUZUKI  Yoshihisa KISHIYAMA  Kenichi HIGUCHI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/03/23
      Vol:
    E103-B No:9
      Page(s):
    1019-1029

    This paper proposes a computational complexity-reduced algorithm for an adaptive peak-to-average power ratio (PAPR) reduction method previously developed by members of our research group that uses the null space in a multiple-input multiple-output (MIMO) channel for MIMO-orthogonal frequency division multiplexing (OFDM) signals. The proposed algorithm is an extension of the peak cancellation (PC) signal-based method that has been mainly investigated for per-antenna PAPR reduction. This method adds the PC signal, which is designed so that the out-of-band radiation is removed/reduced, directly to the time-domain transmission signal at each antenna. The proposed method, referred to as PCCNC (PC with channel-null constraint), performs vector-level signal processing in the PC signal generation so that the PC signal is transmitted only to the null space in the MIMO channel. We investigate three methods to control the beamforming (BF) vector in the PC signal, which is a key factor in determining the achievable PAPR performance of the algorithm. Computer simulation results show that the proposed PCCNC achieves approximately the same throughput-vs.-PAPR performance as the previous method while dramatically reducing the required computational cost.

  • Interference Management Using Beamforming Techniques for Line-of-Sight Femtocell Networks

    Khalid Sheikhidris MOHAMED  Mohamad Yusoff ALIAS  Mardeni ROSLEE  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2020/01/24
      Vol:
    E103-B No:8
      Page(s):
    881-887

    Femtocell structures can offer better voice and data exchange in cellular networks. However, interference in such networks poses a major challenge in the practical development of cellular communication. To tackle this issue, an advanced interference mitigation scheme for Line-Of-Sight (LOS) femtocell networks in indoor environments is proposed in this paper. Using a femtocell management system (FMS) that controls all femtocells in a service area, the aggressor femtocells are identified and then the transmitted beam patterns are adjusted using the linear array antenna equipped in each femtocell to mitigate the interference contribution to the neighbouring femtocells. Prior to that, the affected users are switched to the femtocells that provide better throughput levels to avoid increasing the outage probability. This paper considers different femtocell deployment indexes to verify and justifies the feasibility of the findings in different density areas. Relative to fixed and adaptive power control schemes, the proposed scheme achieves approximately 5% spectral efficiency (SE) improvement, about 10% outage probability reduction, and about 7% Mbps average user throughput improvement.

  • Performance Evaluation of Beam Shapes in a Two-Step-Precoded Massive MIMO System Open Access

    Jumpei YAMAMOTO  Toshihiko NISHIMURA  Takeo OHGANE  Yasutaka OGAWA  Daiki TAKEDA  Yoshihisa KISHIYAMA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/12/09
      Vol:
    E103-B No:6
      Page(s):
    703-711

    Massive MIMO is known as a promising technology for multiuser multiplexing in the fifth generation mobile communication system to accommodate the rapidly-increasing traffic. It has a large number of antenna elements and thus provides very sharp beams. As seen in hybrid beamforming, there have already been many papers on the concatenation of two precoders (beamformers). The inner precoder, i.e., a multi-beam former, performs a linear transformation between the element space and the beam space. The outer precoder forms nulls in the limited beam space spanned by selected beams to suppress the inter-user interference. In this two-step precoder, the beam shape is expected to determine the system performance. In this paper, we evaluate the achievable throughput performance for different beam-shaping schemes: a discrete Fourier transform (DFT) beam, Chebyshev weighted beams, and Taylor weighted beam. Simulations show that the DFT beam provides the best performance except the case of imperfect precoding and cell edge SNR of 30dB.

  • Multiple Regular Expression Pattern Monitoring over Probabilistic Event Streams

    Kento SUGIURA  Yoshiharu ISHIKAWA  

     
    PAPER

      Pubricized:
    2020/02/03
      Vol:
    E103-D No:5
      Page(s):
    982-991

    As smartphones and IoT devices become widespread, probabilistic event streams, which are continuous analysis results of sensing data, have received a lot of attention. One of the applications of probabilistic event streams is monitoring of time series events based on regular expressions. That is, we describe a monitoring query such as “Has the tracked object moved from RoomA to RoomB in the past 30 minutes?” by using a regular expression, and then check whether corresponding events occur in a probabilistic event stream with a sliding window. Although we proposed the fundamental monitoring method of time series events in our previous work, three problems remain: 1) it is based on an unusual assumption about slide size of a sliding window, 2) the grammar of pattern queries did not include “negation”, and 3) it was not optimized for multiple monitoring queries. In this paper, we propose several techniques to solve the above problems. First, we remove the assumption about slide size, and propose adaptive slicing of sliding windows for efficient probability calculation. Second, we calculate the occurrence probability of a negation pattern by using an inverted DFA. Finally, we propose the merge of multiple DFAs based on disjunction to process multiple queries efficiently. Experimental results using real and synthetic datasets demonstrate effectiveness of our approach.

61-80hit(900hit)