The search functionality is under construction.

Keyword Search Result

[Keyword] IC(17573hit)

141-160hit(17573hit)

  • New Binary Sequences with Low Odd Correlation via Interleaving Technique

    Bing LIU  Rong LUO  Yong WANG  

     
    LETTER-Coding Theory

      Pubricized:
    2023/08/08
      Vol:
    E106-A No:12
      Page(s):
    1516-1520

    Even correlation and odd correlation of sequences are two kinds of measures for their similarities. Both kinds of correlation have important applications in communication and radar. Compared with vast knowledge on sequences with good even correlation, relatively little is known on sequences with preferable odd correlation. In this paper, a generic construction of sequences with low odd correlation is proposed via interleaving technique. Notably, it can generate new sets of binary sequences with optimal odd correlation asymptotically meeting the Sarwate bound.

  • A Note on the Confusion Coefficient of Boolean Functions

    Yu ZHOU  Jianyong HU  Xudong MIAO  Xiaoni DU  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2023/05/24
      Vol:
    E106-A No:12
      Page(s):
    1525-1530

    Low confusion coefficient values can make side-channel attacks harder for vector Boolean functions in Block cipher. In this paper, we give new results of confusion coefficient for f ⊞ g, f ⊡ g, f ⊕ g and fg for different Boolean functions f and g, respectively. And we deduce a relationship on the sum-of-squares of the confusion coefficient between one n-variable function and two (n - 1)-variable decomposition functions. Finally, we find that the confusion coefficient of vector Boolean functions is affine invariant.

  • A Strongly Unlinkable Group Signature Scheme with Matching-Based Verifier-Local Revocation for Privacy-Enhancing Crowdsensing

    Yuto NAKAZAWA  Toru NAKANISHI  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2023/06/29
      Vol:
    E106-A No:12
      Page(s):
    1531-1543

    A group signature scheme allows us to anonymously sign a message on behalf of a group. One of important issues in the group signatures is user revocation, and thus lots of revocable group signature (RGS) schemes have been proposed so far. One of the applications suitable to the group signature is privacy-enhancing crowdsensing, where the group signature allows mobile sensing users to be anonymously authenticated to hide the location. In the mobile environment, verifier-local revocation (VLR) type of RGS schemes are suitable, since revocation list (RL) is not needed in the user side. However, in the conventional VLR-RGS schemes, the revocation check in the verifier needs O(R) cryptographic operations for the number R of revoked users. On this background, VLR-RGS schemes with efficient revocation check have been recently proposed, where the revocation check is just (bit-string) matching. However, in the existing schemes, signatures are linkable in the same interval or in the same application-independent task with a public index. The linkability is useful in some scenarios, but users want the unlinkability for the stronger anonymity. In this paper, by introducing a property that at most K unlinkable signatures can be issued by a signer during each interval for a fixed integer K, we propose a VLR-RGS scheme with the revocation token matching. In our scheme, even the signatures during the same interval are unlinkable. Furthermore, since used indexes are hidden, the strong anonymity remains. The overheads are the computational costs of the revocation algorithm and the RL size. We show that the overheads are practical in use cases of crowdsensing.

  • Robust Recursive Identification of ARX Models Using Beta Divergence

    Shuichi FUKUNAGA  

     
    LETTER-Systems and Control

      Pubricized:
    2023/06/02
      Vol:
    E106-A No:12
      Page(s):
    1580-1584

    The robust recursive identification method of ARX models is proposed using the beta divergence. The proposed parameter update law suppresses the effect of outliers using a weight function that is automatically determined by minimizing the beta divergence. A numerical example illustrates the efficacy of the proposed method.

  • Upper Bound for the Coefficients of the Shortest Vector of Random Lattice

    Masahiro KAMINAGA  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2023/05/30
      Vol:
    E106-A No:12
      Page(s):
    1585-1588

    This paper shows that upper bounds on the coefficients of the shortest vector of a lattice can be represented using the smallest eigenvalue of the Gram matrix for the lattice, obtains its distribution for high-dimensional random Goldstein-Mayer lattice, and applies it to determine the percentage of zeros of coefficient vector.

  • Integration of Network and Artificial Intelligence toward the Beyond 5G/6G Networks Open Access

    Atsushi TAGAMI  Takuya MIYASAKA  Masaki SUZUKI  Chikara SASAKI  

     
    INVITED PAPER

      Pubricized:
    2023/07/14
      Vol:
    E106-B No:12
      Page(s):
    1267-1274

    Recently, there has been a surge of interest in Artificial Intelligence (AI) and its applications have been considered in various fields. Mobile networks are becoming an indispensable part of our society, and are considered as one of the promising applications of AI. In the Beyond 5G/6G era, AI will continue to penetrate networks and AI will become an integral part of mobile networks. This paper provides an overview of the collaborations between networks and AI from two categories, “AI for Network” and “Network for AI,” and predicts mobile networks in the B5G/6G era. It is expected that the future mobile network will be an integrated infrastructure, which will not only be a mere application of AI, but also provide as the process infrastructure for AI applications. This integration requires a driving application, and the network operation is one of the leading candidates. Furthermore, the paper describes the latest research and standardization trends in the autonomous networks, which aims to fully automate network operation, as a future network operation concept with AI, and discusses research issues in the future mobile networks.

  • Analysis and Identification of Root Cause of 5G Radio Quality Deterioration Using Machine Learning

    Yoshiaki NISHIKAWA  Shohei MARUYAMA  Takeo ONISHI  Eiji TAKAHASHI  

     
    PAPER

      Pubricized:
    2023/06/02
      Vol:
    E106-B No:12
      Page(s):
    1286-1292

    It has become increasingly important for industries to promote digital transformation by utilizing 5G and industrial internet of things (IIoT) to improve productivity. To protect IIoT application performance (work speed, productivity, etc.), it is often necessary to satisfy quality of service (QoS) requirements precisely. For this purpose, there is an increasing need to automatically identify the root causes of radio-quality deterioration in order to take prompt measures when the QoS deteriorates. In this paper, a method for identifying the root cause of 5G radio-quality deterioration is proposed that uses machine learning. This Random Forest based method detects the root cause, such as distance attenuation, shielding, fading, or their combination, by analyzing the coefficients of a quadratic polynomial approximation in addition to the mean values of time-series data of radio quality indicators. The detection accuracy of the proposed method was evaluated in a simulation using the MATLAB 5G Toolbox. The detection accuracy of the proposed method was found to be 98.30% when any of the root causes occurs independently, and 83.13% when the multiple root causes occur simultaneously. The proposed method was compared with deep-learning methods, including bidirectional long short-term memory (bidirectional-LSTM) or one-dimensional convolutional neural network (1D-CNN), that directly analyze the time-series data of the radio quality, and the proposed method was found to be more accurate than those methods.

  • Secure Enrollment Token Delivery Mechanism for Zero Trust Networks Using Blockchain Open Access

    Javier Jose DIAZ RIVERA  Waleed AKBAR  Talha AHMED KHAN  Afaq MUHAMMAD  Wang-Cheol SONG  

     
    PAPER

      Pubricized:
    2023/06/01
      Vol:
    E106-B No:12
      Page(s):
    1293-1301

    Zero Trust Networking (ZTN) is a security model where no default trust is given to entities in a network infrastructure. The first bastion of security for achieving ZTN is strong identity verification. Several standard methods for assuring a robust identity exist (E.g., OAuth2.0, OpenID Connect). These standards employ JSON Web Tokens (JWT) during the authentication process. However, the use of JWT for One Time Token (OTT) enrollment has a latent security issue. A third party can intercept a JWT, and the payload information can be exposed, revealing the details of the enrollment server. Furthermore, an intercepted JWT could be used for enrollment by an impersonator as long as the JWT remains active. Our proposed mechanism aims to secure the ownership of the OTT by including the JWT as encrypted metadata into a Non-Fungible Token (NFT). The mechanism uses the blockchain Public Key of the intended owner for encrypting the JWT. The blockchain assures the JWT ownership by mapping it to the intended owner's blockchain public address. Our proposed mechanism is applied to an emerging Zero Trust framework (OpenZiti) alongside a permissioned Ethereum blockchain using Hyperledger Besu. The Zero Trust Framework provides enrollment functionality. At the same time, our proposed mechanism based on blockchain and NFT assures the secure distribution of OTTs that is used for the enrollment of identities.

  • Architecture for Beyond 5G Services Enabling Cross-Industry Orchestration Open Access

    Kentaro ISHIZU  Mitsuhiro AZUMA  Hiroaki YAMAGUCHI  Akihito KATO  Iwao HOSAKO  

     
    INVITED PAPER

      Pubricized:
    2023/07/27
      Vol:
    E106-B No:12
      Page(s):
    1303-1312

    Beyond 5G is the next generation mobile communication system expected to be used from around 2030. Services in the 2030s will be composed of multiple systems provided by not only the conventional networking industry but also a wide range of industries. However, the current mobile communication system architecture is designed with a focus on networking performance and not oriented to accommodate and optimize potential systems including service management and applications, though total resource optimizations and service level performance enhancement among the systems are required. In this paper, a new concept of the Beyond 5G cross-industry service platform (B5G-XISP) is presented on which multiple systems from different industries are appropriately organized and optimized for service providers. Then, an architecture of the B5G-XISP is proposed based on requirements revealed from issues of current mobile communication systems. The proposed architecture is compared with other architectures along with use cases of an assumed future supply chain business.

  • Antennas Measurement for Millimeter Wave 5G Wireless Applications Using Radio Over Fiber Technologies Open Access

    Satoru KUROKAWA  Michitaka AMEYA  Yui OTAGAKI  Hiroshi MURATA  Masatoshi ONIZAWA  Masahiro SATO  Masanobu HIROSE  

     
    INVITED PAPER

      Pubricized:
    2023/09/19
      Vol:
    E106-B No:12
      Page(s):
    1313-1321

    We have developed an all-optical fiber link antenna measurement system for a millimeter wave 5th generation mobile communication frequency band around 28 GHz. Our developed system consists of an optical fiber link an electrical signal transmission system, an antenna-coupled-electrode electric-field (EO) sensor system for 28GHz-band as an electrical signal receiving system, and a 6-axis vertically articulated robot with an arm length of 1m. Our developed optical fiber link electrical signal transmission system can transmit the electrical signal of more than 40GHz with more than -30dBm output level. Our developed EO sensor can receive the electrical signal from 27GHz to 30GHz. In addition, we have estimated a far field antenna factor of the EO sensor system for the 28GHz-band using an amplitude center modified antenna factor estimation equation. The estimated far field antenna factor of the sensor system is 83.2dB/m at 28GHz.

  • Non-Contact PIM Measurement Method Using Balanced Transmission Lines for Impedance Matched PIM Measurement Systems

    Ryunosuke MUROFUSHI  Nobuhiro KUGA  Eiji HANAYAMA  

     
    PAPER

      Pubricized:
    2023/08/16
      Vol:
    E106-B No:12
      Page(s):
    1329-1336

    In this paper, a concept of non-contact PIM evaluation method using balanced transmission lines is proposed for impedance-matched PIM measurement systems. In order to evaluate the PIM characteristics of a MSL by using its image model, measurement system using balanced transmission line is introduced. In non-contact PIM measurement, to reduce undesirable PIM generation by metallic contact and the PIM-degradation in repeated measurements, a non-contact connector which is applicable without any design changes in DUT is introduce. The three-dimensional balun composed of U-balun and balanced transmission line is also proposed so that it can be applicable to conventional unbalanced PIM measurement systems. In order to validate the concept of the proposed system, a sample using nickel producing high PIM is introduced. In order to avoid the effect of the non-contact connection part on observed PIM, a sample-configuration that PIM-source exists outside of the non-contact connection part is introduced. It is also shown using a sample using copper that, nickel-sample can be clearly differentiated in PIM characteristics while it is equivalent to low-PIM sample in scattering-parameter characteristics. Finally, by introducing the TRL-calibration and by extracting inherent DUT-characteristics from whole-system characteristics, a method to estimate the PIM characteristics of DUT which cannot be taken directly in measurement is proposed.

  • Data Gathering Method with High Accuracy of Environment Recognition Using Mathematical Optimization in Packet-Level Index Modulation

    Ryuji MIYAMOTO  Osamu TAKYU  Hiroshi FUJIWARA  Koichi ADACHI  Mai OHTA  Takeo FUJII  

     
    PAPER

      Pubricized:
    2023/07/27
      Vol:
    E106-B No:12
      Page(s):
    1337-1349

    With the rapid developments in the Internet of Things (IoT), low power wide area networks (LPWAN) framework, which is a low-power, long-distance communication method, is attracting attention. However, in LPWAN, the access time is limited by Duty Cycle (DC) to avoid mutual interference. Packet-level index modulation (PLIM) is a modulation scheme that uses a combination of the transmission time and frequency channel of a packet as an index, enabling throughput expansion even under DC constraints. The indexes used in PLIM are transmitted according to the mapping. However, when many sensors access the same index, packet collisions occur owing to selecting the same index. Therefore, we propose a mapping design for PLIM using mathematical optimization. The mapping was designed and modeled as a quadratic integer programming problem. The results of the computer simulation evaluations were used to realize the design of PLIM, which achieved excellent sensor information aggregation in terms of environmental monitoring accuracy.

  • Sparse Reconstruction and Resolution Improvement of Synthetic Aperture Radar with Low Computational Complexity Using Deconvolution ISTA

    Masanori GOCHO  

     
    PAPER

      Pubricized:
    2023/07/27
      Vol:
    E106-B No:12
      Page(s):
    1363-1371

    Synthetic aperture radar (SAR) is a device for observing the ground surface and is one of the important technologies in the field of microwave remote sensing. In SAR observation, a platform equipped with a small-aperture antenna flies in a straight line and continuously radiates pulse waves to the ground during the flight. After that, by synthesizing the series of observation data obtained during the flight, one realize high-resolution ground surface observation. In SAR observation, there are two spatial resolutions defined in the range and azimuth directions and they are limited by the bandwidth of the SAR system. The purpose of this study is to improve the resolution of SAR by sparse reconstruction. In particular, we aim to improve the resolution of SAR without changing the frequency parameters. In this paper, we propose to improve the resolution of SAR using the deconvolution iterative shrinkage-thresholding algorithm (ISTA) and verify the proposed method by carrying out an experimental analysis using an actual SAR dataset. Experimental results show that the proposed method can improve the resolution of SAR with low computational complexity.

  • Heuristic-Based Service Chain Construction with Security-Level Management

    Daisuke AMAYA  Takuji TACHIBANA  

     
    PAPER

      Pubricized:
    2023/07/27
      Vol:
    E106-B No:12
      Page(s):
    1380-1391

    Network function virtualization (NFV) technology significantly changes the traditional communication network environments by providing network functions as virtual network functions (VNFs) on commercial off-the-shelf (COTS) servers. Moreover, for using VNFs in a pre-determined sequence to provide each network service, service chaining is essential. A VNF can provide multiple service chains with the corresponding network function, reducing the number of VNFs. However, VNFs might be the source or the target of a cyberattack. If the node where the VNF is installed is attacked, the VNF would also be easily attacked because of its security vulnerabilities. Contrarily, a malicious VNF may attack the node where it is installed, and other VNFs installed on the node may also be attacked. Few studies have been done on the security of VNFs and nodes for service chaining. This study proposes a service chain construction with security-level management. The security-level management concept is introduced to built many service chains. Moreover, the cost optimization problem for service chaining is formulated and the heuristic algorithm is proposed. We demonstrate the effectiveness of the proposed method under certain network topologies using numerical examples.

  • Analysis and Design of Class-Φ22 Wireless Power Transfer System

    Weisen LUO  Xiuqin WEI  Hiroo SEKIYA  

     
    PAPER-Energy in Electronics Communications

      Pubricized:
    2023/09/01
      Vol:
    E106-B No:12
      Page(s):
    1402-1410

    This paper presents an analysis-based design method for designing the class-Φ22 wireless power transfer (WPT) system, taking its subsystems as a whole into account. By using the proposed design method, it is possible to derive accurate design values which can make sure the class-E Zero-Voltage-Switching/Zero-Derivative-Switching (ZVS/ZDS) to obtain without applying any tuning processes. Additionally, it is possible to take the effects of the switch on resistance, diode forward voltage drop, and equivalent series resistances (ESRs) of all passive elements on the system operations into account. Furthermore, design curves for a wide range of parameters are developed and organized as basic data for various applications. The validities of the proposed design procedure and derived design curves are confirmed by LTspice simulation and circuit experiment. In the experimental measurements, the class-Φ22 WPT system achieves 78.8% power-transmission efficiency at 6.78MHz operating frequency and 7.96W output power. Additionally, the results obtained from the LTspice simulation and laboratory experiment show quantitative agreements with the analytical predictions, which indicates the accuracy and validity of the proposed analytical method and design curves given in this paper.

  • Power Allocation with QoS and Max-Min Fairness Constraints for Downlink MIMO-NOMA System Open Access

    Jia SHAO  Cong LI  Taotao YAN  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Pubricized:
    2023/09/06
      Vol:
    E106-B No:12
      Page(s):
    1411-1417

    Non-orthogonal multipe access based multiple-input multiple-output system (MIMO-NOMA) has been widely used in improving user's achievable rate of millimeter wave (mmWave) communication. To meet different requirements of each user in multi-user beams, this paper proposes a power allocation algorithm to satisfy the quality of service (QoS) of head user while maximizing the minimum rate of edge users from the perspective of max-min fairness. Suppose that the user who is closest to the base station (BS) is the head user and the other users are the edge users in each beam in this paper. Then, an optimization problem model of max-min fairness criterion is developed under the constraints of users' minimum rate requirements and the total transmitting power of the BS. The bisection method and Karush-Kuhn-Tucher (KKT) conditions are used to solve this complex non-convex problem, and simulation results show that both the minimum achievable rates of edge users and the average rate of all users are greatly improved significantly compared with the traditional MIMO-NOMA, which only consider max-min fairness of users.

  • Joint Virtual Network Function Deployment and Scheduling via Heuristics and Deep Reinforcement Learning

    Zixiao ZHANG  Eiji OKI  

     
    PAPER-Network

      Pubricized:
    2023/08/01
      Vol:
    E106-B No:12
      Page(s):
    1424-1440

    This paper introduces heuristic approaches and a deep reinforcement learning approach to solve a joint virtual network function deployment and scheduling problem in a dynamic scenario. We formulate the problem as an optimization problem. Based on the mathematical description of the optimization problem, we introduce three heuristic approaches and a deep reinforcement learning approach to solve the problem. We define an objective to maximize the ratio of delay-satisfied requests while minimizing the average resource cost for a dynamic scenario. Our introduced two greedy approaches are named finish time greedy and computational resource greedy, respectively. In the finish time greedy approach, we make each request be finished as soon as possible despite its resource cost; in the computational resource greedy approach, we make each request occupy as few resources as possible despite its finish time. Our introduced simulated annealing approach generates feasible solutions randomly and converges to an approximate solution. In our learning-based approach, neural networks are trained to make decisions. We use a simulated environment to evaluate the performances of our introduced approaches. Numerical results show that the introduced deep reinforcement learning approach has the best performance in terms of benefit in our examined cases.

  • Stackelberg Game for Wireless-Powered Relays Assisted Batteryless IoT Networks

    Yanming CHEN  Bin LYU  Zhen YANG  Fei LI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2023/08/10
      Vol:
    E106-B No:12
      Page(s):
    1479-1490

    In this paper, we investigate a wireless-powered relays assisted batteryless IoT network based on the non-linear energy harvesting model, where there exists an energy service provider constituted by the hybrid access point (HAP) and an IoT service provider constituted by multiple clusters. The HAP provides energy signals to the batteryless devices for information backscattering and the wireless-powered relays for energy harvesting. The relays are deployed to assist the batteryless devices with the information transmission to the HAP by using the harvested energy. To model the energy interactions between the energy service provider and IoT service provider, we propose a Stackelberg game based framework. We aim to maximize the respective utility values of the two providers. Since the utility maximization problem of the IoT service provider is non-convex, we employ the fractional programming theory and propose a block coordinate descent (BCD) based algorithm with successive convex approximation (SCA) and semi-definite relaxation (SDR) techniques to solve it. Numerical simulation results confirm that compared to the benchmark schemes, our proposed scheme can achieve larger utility values for both the energy service provider and IoT service provider.

  • Single UAV-Based Wave Source Localization in NLOS Environments Open Access

    Shinichi MURATA  Takahiro MATSUDA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2023/08/01
      Vol:
    E106-B No:12
      Page(s):
    1491-1500

    To localize an unknown wave source in non-line-of-sight environments, a wave source localization scheme using multiple unmanned-aerial-vehicles (UAVs) is proposed. In this scheme, each UAV estimates the direction-of-arrivals (DoAs) of received signals and the wave source is localized from the estimated DoAs by means of maximum likelihood estimation. In this study, by extending the concept of this scheme, we propose a novel wave source localization scheme using a single UAV. In the proposed scheme, the UAV moves on the path comprising multiple measurement points and the wave source is sequentially localized from DoA distributions estimated at these measurement points. At each measurement point, with a moving path planning algorithm, the UAV determines the next measurement point from the estimated DoA distributions and measurement points that the UAV has already visited. We consider two moving path planning algorithms, and validate the proposed scheme through simulation experiments.

  • Multi-Segment Verification FrFT Frame Synchronization Detection in Underwater Acoustic Communications

    Guojin LIAO  Yongpeng ZUO  Qiao LIAO  Xiaofeng TIAN  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2023/09/01
      Vol:
    E106-B No:12
      Page(s):
    1501-1509

    Frame synchronization detection before data transmission is an important module which directly affects the lifetime and coexistence of underwater acoustic communication (UAC) networks, where linear frequency modulation (LFM) is a frame preamble signal commonly used for synchronization. Unlike terrestrial wireless communications, strong bursty noise frequently appears in UAC. Due to the long transmission distance and the low signal-to-noise ratio, strong short-distance bursty noise will greatly reduce the accuracy of conventional fractional fourier transform (FrFT) detection. We propose a multi-segment verification fractional fourier transform (MFrFT) preamble detection algorithm to address this challenge. In the proposed algorithm, 4 times of adjacent FrFT operations are carried out. And the LFM signal identifies by observing the linear correlation between two lines connected in pair among three adjacent peak points, called ‘dual-line-correlation mechanism’. The accurate starting time of the LFM signal can be found according to the peak frequency of the adjacent FrFT. More importantly, MFrFT do not result in an increase in computational complexity. Compared with the conventional FrFT detection method, experimental results show that the proposed algorithm can effectively distinguish between signal starting points and bursty noise with much lower error detection rate, which in turn minimizes the cost of retransmission.

141-160hit(17573hit)