The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ICA(6943hit)

201-220hit(6943hit)

  • Boosting the Performance of Interconnection Networks by Selective Data Compression

    Naoya NIWA  Hideharu AMANO  Michihiro KOIBUCHI  

     
    PAPER

      Pubricized:
    2022/07/12
      Vol:
    E105-D No:12
      Page(s):
    2057-2065

    This study presents a selective data-compression interconnection network to boost its performance. Data compression virtually increases the effective network bandwidth. One drawback of data compression is a long latency to perform (de-)compression operation at a compute node. In terms of the communication latency, we explore the trade-off between the compression latency overhead and the reduced injection latency by shortening the packet length by compression algorithms. As a result, we present to selectively apply a compression technique to a packet. We perform a compression operation to long packets and it is also taken when network congestion is detected at a source compute node. Through a cycle-accurate network simulation, the selective compression method using the above compression algorithms improves by up to 39% the network throughput with a moderate increase in the communication latency of short packets.

  • SDNRCFII: An SDN-Based Reliable Communication Framework for Industrial Internet

    Hequn LI  Die LIU  Jiaxi LU  Hai ZHAO  Jiuqiang XU  

     
    PAPER-Network

      Pubricized:
    2022/05/26
      Vol:
    E105-B No:12
      Page(s):
    1508-1518

    Industrial networks need to provide reliable communication services, usually in a redundant transmission (RT) manner. In the past few years, several device-redundancy-based, layer 2 solutions have been proposed. However, with the evolution of industrial networks to the Industrial Internet, these methods can no longer work properly in the non-redundancy, layer 3 environments. In this paper, an SDN-based reliable communication framework is proposed for the Industrial Internet. It can provide reliable communication guarantees for mission-critical applications while servicing non-critical applications in a best-effort transmission manner. Specifically, it first implements an RT-based reliable communication method using the Industrial Internet's link-redundancy feature. Next, it presents a redundant synchronization mechanism to prevent end systems from receiving duplicate data. Finally, to maximize the number of critical flows in it (an NP-hard problem), two ILP-based routing & scheduling algorithms are also put forward. These two algorithms are optimal (Scheduling with Unconstrained Routing, SUR) and suboptimal (Scheduling with Minimum length Routing, SMR). Numerous simulations are conducted to evaluate its effectiveness. The results show that it can provide reliable, duplicate-free services to end systems. Its reliable communication method performs better than the conventional best-effort transmission method in terms of packet delivery success ratio in layer 3 networks. In addition, its scheduling algorithm, SMR, performs well on the experimental topologies (with average quality of 93% when compared to SUR), and the time overhead is acceptable.

  • A Scalable Bitwise Multicast Technology in Named Data Networking

    Yuli ZHA  Pengshuai CUI  Yuxiang HU  Julong LAN  Yu WANG  

     
    PAPER-Information Network

      Pubricized:
    2022/09/20
      Vol:
    E105-D No:12
      Page(s):
    2104-2111

    Named Data Networking (NDN) uses name to indicate content mechanism to divide content, and uses content names for routing and addressing. However, the traditional network devices that support the TCP/IP protocol stack and location-centric communication mechanisms cannot support functions such as in-network storage and multicast distribution of NDN effectively. The performance of NDN routers designed for specific functional platforms is limited, and it is difficult to deploy on a large scale, so the NDN network can only be implemented by software. With the development of data plane languages such as Programmable Protocol-Independent Packet Processors (P4), the practical deployment of NDN becomes achievable. To ensure efficient data distribution in the network, this paper proposes a protocol-independent multicast method according to each binary bit. The P4 language is used to define a bit vector in the data packet intrinsic metadata field, which is used to mark the requested port. When the requested content is returned, the routing node will check which port has requested the content according to the bit vector recorded in the register, and multicast the Data packet. The experimental results show that bitwise multicast technology can eliminate the number of flow tables distributed compared with the dynamic multicast group technology, and reduce the content response delay by 57% compared to unicast transmission technology.

  • Novel Configuration for Phased-Array Antenna System Employing Frequency-Controlled Beam Steering Method

    Atsushi FUKUDA  Hiroshi OKAZAKI  Shoichi NARAHASHI  

     
    PAPER-Microwaves, Millimeter-Waves

      Pubricized:
    2022/06/10
      Vol:
    E105-C No:12
      Page(s):
    740-749

    This paper presents a novel frequency-controlled beam steering scheme for a phased-array antenna system (PAS). The proposed scheme employs phase-controlled carrier signals to form the PAS beam. Two local oscillators (LOs) and delay lines are used to generate the carrier signals. The carrier of one LO is divided into branches, and then the divided carriers passing through the corresponding delay lines have the desired phase relationship, which depends on the oscillation frequency of the LO. To confirm the feasibility of the scheme, four-branch PAS transmitters are configured and tested in a 10-GHz frequency band. The results verify that the formed beam is successfully steered in a wide range, i.e., the 3-dB beamwidth of approximately 100 degrees, using LO frequency control.

  • Optimal Design of Optical Waveguide Devices Utilizing Beam Propagation Method with ADI Scheme Open Access

    Akito IGUCHI  Yasuhide TSUJI  

     
    INVITED PAPER

      Pubricized:
    2022/05/20
      Vol:
    E105-C No:11
      Page(s):
    644-651

    This paper shows structural optimal design of optical waveguide components utilizing an efficient 3D frequency-domain and 2D time-domain beam propagation method (BPM) with an alternating direction implicit (ADI) scheme. Usual optimal design procedure is based on iteration of numerical simulation, and total computational cost of the optimal design mainly depends on the efficiency of numerical analysis method. Since the system matrices are tridiagonal in the ADI-based BPM, efficient analysis and optimal design are available. Shape and topology optimal design shown in this paper is based on optimization of density distribution and sensitivity analysis to the density parameters. Computational methods of the sensitivity are shown in the case of using the 3D semi-vectorial and 2D time-domain BPM based on ADI scheme. The validity of this design approach is shown by design of optical waveguide components: mode converters, and a polarization beam splitter.

  • Adversarial Example Detection Based on Improved GhostBusters

    Hyunghoon KIM  Jiwoo SHIN  Hyo Jin JO  

     
    LETTER

      Pubricized:
    2022/04/19
      Vol:
    E105-D No:11
      Page(s):
    1921-1922

    In various studies of attacks on autonomous vehicles (AVs), a phantom attack in which advanced driver assistance system (ADAS) misclassifies a fake object created by an adversary as a real object has been proposed. In this paper, we propose F-GhostBusters, which is an improved version of GhostBusters that detects phantom attacks. The proposed model uses a new feature, i.e, frequency of images. Experimental results show that F-GhostBusters not only improves the detection performance of GhostBusters but also can complement the accuracy against adversarial examples.

  • Orthogonal Deep Feature Decomposition Network for Cross-Resolution Person Re-Identification

    Rui SUN  Zi YANG  Lei ZHANG  Yiheng YU  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2022/08/23
      Vol:
    E105-D No:11
      Page(s):
    1994-1997

    Person images captured by surveillance cameras in real scenes often have low resolution (LR), which suffers from severe degradation in recognition performance when matched with pre-stocked high-resolution (HR) images. There are existing methods which typically employ super-resolution (SR) techniques to address the resolution discrepancy problem in person re-identification (re-ID). However, SR techniques are intended to enhance the human eye visual fidelity of images without caring about the recovery of pedestrian identity information. To cope with this challenge, we propose an orthogonal depth feature decomposition network. And we decompose pedestrian features into resolution-related features and identity-related features who are orthogonal to each other, from which we design the identity-preserving loss and resolution-invariant loss to ensure the recovery of pedestrian identity information. When compared with the SOTA method, experiments on the MLR-CUHK03 and MLR-VIPeR datasets demonstrate the superiority of our method.

  • Non-Orthogonal Physical Layer (NOPHY) Design towards 5G Evolution and 6G

    Xiaolin HOU  Wenjia LIU  Juan LIU  Xin WANG  Lan CHEN  Yoshihisa KISHIYAMA  Takahiro ASAI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2022/04/26
      Vol:
    E105-B No:11
      Page(s):
    1444-1457

    5G has achieved large-scale commercialization across the world and the global 6G research and development is accelerating. To support more new use cases, 6G mobile communication systems should satisfy extreme performance requirements far beyond 5G. The physical layer key technologies are the basis of the evolution of mobile communication systems of each generation, among which three key technologies, i.e., duplex, waveform and multiple access, are the iconic characteristics of mobile communication systems of each generation. In this paper, we systematically review the development history and trend of the three key technologies and define the Non-Orthogonal Physical Layer (NOPHY) concept for 6G, including Non-Orthogonal Duplex (NOD), Non-Orthogonal Multiple Access (NOMA) and Non-Orthogonal Waveform (NOW). Firstly, we analyze the necessity and feasibility of NOPHY from the perspective of capacity gain and implementation complexity. Then we discuss the recent progress of NOD, NOMA and NOW, and highlight several candidate technologies and their potential performance gain. Finally, combined with the new trend of 6G, we put forward a unified physical layer design based on NOPHY that well balances performance against flexibility, and point out the possible direction for the research and development of 6G physical layer key technologies.

  • Experimental Study on Synchronization of Van der Pol Oscillator Circuit by Noise Sounds

    Taiki HAYASHI  Kazuyoshi ISHIMURA  Isao T. TOKUDA  

     
    PAPER-Nonlinear Problems

      Pubricized:
    2022/05/16
      Vol:
    E105-A No:11
      Page(s):
    1486-1492

    Towards realization of a noise-induced synchronization in a natural environment, an experimental study is carried out using the Van der Pol oscillator circuit. We focus on acoustic sounds as a potential source of noise that may exist in nature. To mimic such a natural environment, white noise sounds were generated from a loud speaker and recorded into microphone signals. These signals were then injected into the oscillator circuits. We show that the oscillator circuits spontaneously give rise to synchronized dynamics when the microphone signals are highly correlated with each other. As the correlation among the input microphone signals is decreased, the level of synchrony is lowered monotonously, implying that the input correlation is the key determinant for the noise-induced synchronization. Our study provides an experimental basis for synchronizing clocks in distributed sensor networks as well as other engineering devices in natural environment.

  • Proposals and Evaluations of Robotic Attendance at On-Site Network Maintenance Works Open Access

    Takayuki WARABINO  Yusuke SUZUKI  Tomohiro OTANI  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1299-1308

    While the introduction of softwarelization technologies such as software-defined networking and network function virtualization transfers the main focus of network management from hardware to software, network operators still have to deal with various and numerous network and computing equipment located in network centers. Toward fully automated network management, we believe that a robotic approach will be essential, meaning that physical robots will handle network-facility management works on behalf of humans. This paper focuses on robotic assistance for on-site network maintenance works. Currently, for many network operators, some network maintenance works (e.g., hardware check, hardware installation/replacement, high-impact update of software, etc.) are outsourced to computing and network vendors. Attendance (witness work) at the on-site vendor's works is one of the major tasks of network operators. Network operators confirm the work progress for human error prevention and safety improvement. In order to reduce the burden of this, we propose three essential works of robots, namely delegated attendance at on-site meetings, progress check by periodical patrol, and remote monitoring, which support the various forms of attendance. The paper presents our implementation of enabling these forms of support, and reports the results of experiments conducted in a commercial network center.

  • A KPI Anomaly Detection Method Based on Fast Clustering

    Yun WU  Yu SHI  Jieming YANG  Lishan BAO  Chunzhe LI  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1309-1317

    In the Artificial Intelligence for IT Operations scenarios, KPI (Key Performance Indicator) is a very important operation and maintenance monitoring indicator, and research on KPI anomaly detection has also become a hot spot in recent years. Aiming at the problems of low detection efficiency and insufficient representation learning of existing methods, this paper proposes a fast clustering-based KPI anomaly detection method HCE-DWL. This paper firstly adopts the combination of hierarchical agglomerative clustering (HAC) and deep assignment based on CNN-Embedding (CE) to perform cluster analysis (that is HCE) on KPI data, so as to improve the clustering efficiency of KPI data, and then separately the centroid of each KPI cluster and its Transformed Outlier Scores (TOS) are given weights, and finally they are put into the LightGBM model for detection (the Double Weight LightGBM model, referred to as DWL). Through comparative experimental analysis, it is proved that the algorithm can effectively improve the efficiency and accuracy of KPI anomaly detection.

  • SDOF-Tracker: Fast and Accurate Multiple Human Tracking by Skipped-Detection and Optical-Flow

    Hitoshi NISHIMURA  Satoshi KOMORITA  Yasutomo KAWANISHI  Hiroshi MURASE  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2022/08/01
      Vol:
    E105-D No:11
      Page(s):
    1938-1946

    Multiple human tracking is a fundamental problem in understanding the context of a visual scene. Although both accuracy and speed are required in real-world applications, recent tracking methods based on deep learning focus on accuracy and require a substantial amount of running time. We aim to improve tracking running speeds by performing human detections at certain frame intervals because it accounts for most of the running time. The question is how to maintain accuracy while skipping human detection. In this paper, we propose a method that interpolates the detection results by using an optical flow, which is based on the fact that someone's appearance does not change much between adjacent frames. To maintain the tracking accuracy, we introduce robust interest point detection within the human regions and a tracking termination metric defined by the distribution of the interest points. On the MOT17 and MOT20 datasets in the MOTChallenge, the proposed SDOF-Tracker achieved the best performance in terms of total running time while maintaining the MOTA metric. Our code is available at https://github.com/hitottiez/sdof-tracker.

  • Hiding Data in the Padding Area of Android Applications without Re-Packaging

    Geochang JEON  Jeong Hyun YI  Haehyun CHO  

     
    LETTER

      Pubricized:
    2022/06/13
      Vol:
    E105-D No:11
      Page(s):
    1928-1929

    Anonymous attackers have been targeting the Android ecosystem for performing severe malicious activities. Despite the complement of various vulnerabilities by security researchers, new vulnerabilities are continuously emerging. In this paper, we introduce a new type of vulnerability that can be exploited to hide data in an application file, bypassing the Android's signing policy. Specifically, we exploit padding areas that can be created by using the alignment option when applications are packaged. We present a proof-of-concept implementation for exploiting the vulnerability. Finally, we demonstrate the effectiveness of VeileDroid by using a synthetic application that hides data in the padding area and updates the data without re-signing and updating the application on an Android device.

  • Opportunities, Challenges, and Solutions in the 5G Era Open Access

    Chien-Chi KAO  Hey-Chyi YOUNG  

     
    INVITED PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1291-1298

    For many countries in the world, 5G is of strategic significance. In the 5G era, telecom operators are expected to enable and provide multiple services with different communication characteristics like enhanced broadband, ultra-reliable and extreme real-time communications at the same time. To meet the requirements, the 5G network essentially will be more complex compared with traditional 3G/4G networks. The unique characteristics of 5G resulted from new technologies bring a lot of opportunities as well as significant challenges. In this paper we first introduce 5G vision and check the global status. And then we illustrate the 5G technical essentials and point out the new opportunities that 5G will bring to us. We also highlight the coming challenges and share our 5G experience and solutions toward 5G vision in many aspects, including network, management and business.

  • 4-Cycle-Start-Up Reference-Clock-Less Digital CDR Utilizing TDC-Based Initial Frequency Error Detection with Frequency Tracking Loop Open Access

    Tetsuya IIZUKA  Meikan CHIN  Toru NAKURA  Kunihiro ASADA  

     
    PAPER

      Pubricized:
    2022/04/11
      Vol:
    E105-C No:10
      Page(s):
    544-551

    This paper proposes a reference-clock-less quick-start-up CDR that resumes from a stand-by state only with a 4-bit preamble utilizing a phase generator with an embedded Time-to-Digital Converter (TDC). The phase generator detects 1-UI time interval by using its internal TDC and works as a self-tunable digitally-controlled delay line. Once the phase generator coarsely tunes the recovered clock period, then the residual time difference is finely tuned by a fine Digital-to-Time Converter (DTC). Since the tuning resolution of the fine DTC is matched by design with the time resolution of the TDC that is used as a phase detector, the fine tuning completes instantaneously. After the initial coarse and fine delay tuning, the feedback loop for frequency tracking is activated in order to improve Consecutive Identical Digits (CID) tolerance of the CDR. By applying the frequency tracking architecture, the proposed CDR achieves more than 100bits of CID tolerance. A prototype implemented in a 65nm bulk CMOS process operates at a 0.9-2.15Gbps continuous rate. It consumes 5.1-8.4mA in its active state and 42μA leakage current in its stand-by state from a 1.0V supply.

  • A Characterization on Necessary Conditions of Realizability for Reactive System Specifications

    Takashi TOMITA  Shigeki HAGIHARA  Masaya SHIMAKAWA  Naoki YONEZAKI  

     
    PAPER

      Pubricized:
    2022/04/08
      Vol:
    E105-D No:10
      Page(s):
    1665-1677

    This paper focuses on verification for reactive system specifications. A reactive system is an open system that continuously interacts with an uncontrollable external environment, and it must often be highly safe and reliable. However, realizability checking for a given specification is very costly, so we need effective methods to detect and analyze defects in unrealizable specifications to refine them efficiently. We introduce a systematic characterization on necessary conditions of realizability. This characterization is based on quantifications for inputs and outputs in early and late behaviors and reveals four essential aspects of realizability: exhaustivity, strategizability, preservability and stability. Additionally, the characterization derives new necessary conditions, which enable us to classify unrealizable specifications systematically and hierarchically.

  • Sample Selection Approach with Number of False Predictions for Learning with Noisy Labels

    Yuichiro NOMURA  Takio KURITA  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2022/07/21
      Vol:
    E105-D No:10
      Page(s):
    1759-1768

    In recent years, deep neural networks (DNNs) have made a significant impact on a variety of research fields and applications. One drawback of DNNs is that it requires a huge amount of dataset for training. Since it is very expensive to ask experts to label the data, many non-expert data collection methods such as web crawling have been proposed. However, dataset created by non-experts often contain corrupted labels, and DNNs trained on such dataset are unreliable. Since DNNs have an enormous number of parameters, it tends to overfit to noisy labels, resulting in poor generalization performance. This problem is called Learning with Noisy labels (LNL). Recent studies showed that DNNs are robust to the noisy labels in the early stage of learning before over-fitting to noisy labels because DNNs learn the simple patterns first. Therefore DNNs tend to output true labels for samples with noisy labels in the early stage of learning, and the number of false predictions for samples with noisy labels is higher than for samples with clean labels. Based on these observations, we propose a new sample selection approach for LNL using the number of false predictions. Our method periodically collects the records of false predictions during training, and select samples with a low number of false predictions from the recent records. Then our method iteratively performs sample selection and training a DNNs model using the updated dataset. Since the model is trained with more clean samples and records more accurate false predictions for sample selection, the generalization performance of the model gradually increases. We evaluated our method on two benchmark datasets, CIFAR-10 and CIFAR-100 with synthetically generated noisy labels, and the obtained results which are better than or comparative to the-state-of-the-art approaches.

  • Pattern Synthesis of Spatial Eigenmodes Exploiting Spherical Conformal Array Open Access

    Akira SAITOU  Ryo ISHIKAWA  Kazuhiko HONJO  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2022/04/06
      Vol:
    E105-B No:10
      Page(s):
    1231-1239

    Unique spatial eigenmodes for the spherical coordinate system are shown to be successfully synthesized by properly allocated combinations of current distributions along θ' and φ' on a spherical conformal array. The allocation ratios are analytically found in a closed form with a matrix that relates the expansion coefficients of the current to its radiated field. The coefficients are obtained by general Fourier expansion of the current and the mode expansion of the field, respectively. The validity of the obtained formulas is numerically confirmed, and important effects of the sphere radius and the degrees of the currents on the radiated fields are numerically explained. The formulas are used to design six current distributions that synthesize six unique eigenmodes. The accuracy of the synthesized fields is quantitatively investigated, and the accuracy is shown to be remarkably improved by more than 27dB with two additional kinds of current distributions.

  • Polar Code Based on Nested Rate Adaptation Sequence for BDS-3 Regional Short Message Communication

    Gang LI  Shuren GUO  Yi ZHOU  Zaixiu YANG  

     
    PAPER-Satellite Communications

      Pubricized:
    2022/04/20
      Vol:
    E105-B No:10
      Page(s):
    1280-1289

    Regional Short Message Communication (RSMC) service of BeiDou Navigation Satellite System (BDS) has been widely used in various fields. BDS-3 officially started to provide service in 2020, and the performance of RSMC service was greatly improved, which offers an opportunity for large-scale applications of RSMC in consumer electronic products. Due to the complex application scenarios, the low-cost and low-power of RSMC terminals, a better coding scheme is needed to improve performance. In this paper, we propose a new polar encoding scheme with low code rate and variable code length, which adopts Polarization Weight (PW) to generate the reliability sequence of Polar codes and use a Nested Rate Adaptation Sequence (NRAS) to realize rate adaption for the BDS-3 RSMC. The performance of encoding gain and decoding complexity is analyzed by simulation and experiments. The results validate the effective of this scheme. Compared with Turbo codes, the proposed polar codes scheme achieves about 0.5dB gain with about 50% decoding complexity when the information length including CRC is 128 and code rate is 1/2. The proposed polar codes scheme provides a good reference for further applications in BDS.

  • Communication Quality Estimation Observer: An Approach for Integrated Communication Quality Estimation and Control for Digital-Twin-Assisted Cyber-Physical Systems Open Access

    Ryogo KUBO  

     
    INVITED PAPER

      Pubricized:
    2022/04/14
      Vol:
    E105-B No:10
      Page(s):
    1139-1153

    Cyber-physical systems (CPSs) assisted by digital twins (DTs) integrate sensing-actuation loops over communication networks in various infrastructure services and applications. This study overviews the concept, methodology, and applications of the integrated communication quality estimation and control for the DT-assisted CPSs from both communications and control perspectives. The DT-assisted CPSs can be considered as networked control systems (NCSs) with virtual dynamic models of physical entities. A communication quality estimation observer (CQEO), which is an extended version of the communication disturbance observer (CDOB) utilized for time-delay compensation in NCSs, is proposed to estimate the integrated effects of the quality of services (QoS) and cyberattacks on the NCS applications. A path diversity technique with the CQEO is also proposed to achieve reliable NCSs. The proposed technique is applied to two kinds of NCSs: remote motor control and haptic communication systems. Moreover, results of the simulation on a haptic communication system show the effectiveness of the proposed approach. In the end, future research directions of the CQEO-based scheme are presented.

201-220hit(6943hit)