For many countries in the world, 5G is of strategic significance. In the 5G era, telecom operators are expected to enable and provide multiple services with different communication characteristics like enhanced broadband, ultra-reliable and extreme real-time communications at the same time. To meet the requirements, the 5G network essentially will be more complex compared with traditional 3G/4G networks. The unique characteristics of 5G resulted from new technologies bring a lot of opportunities as well as significant challenges. In this paper we first introduce 5G vision and check the global status. And then we illustrate the 5G technical essentials and point out the new opportunities that 5G will bring to us. We also highlight the coming challenges and share our 5G experience and solutions toward 5G vision in many aspects, including network, management and business.
Tetsuya IIZUKA Meikan CHIN Toru NAKURA Kunihiro ASADA
This paper proposes a reference-clock-less quick-start-up CDR that resumes from a stand-by state only with a 4-bit preamble utilizing a phase generator with an embedded Time-to-Digital Converter (TDC). The phase generator detects 1-UI time interval by using its internal TDC and works as a self-tunable digitally-controlled delay line. Once the phase generator coarsely tunes the recovered clock period, then the residual time difference is finely tuned by a fine Digital-to-Time Converter (DTC). Since the tuning resolution of the fine DTC is matched by design with the time resolution of the TDC that is used as a phase detector, the fine tuning completes instantaneously. After the initial coarse and fine delay tuning, the feedback loop for frequency tracking is activated in order to improve Consecutive Identical Digits (CID) tolerance of the CDR. By applying the frequency tracking architecture, the proposed CDR achieves more than 100bits of CID tolerance. A prototype implemented in a 65nm bulk CMOS process operates at a 0.9-2.15Gbps continuous rate. It consumes 5.1-8.4mA in its active state and 42μA leakage current in its stand-by state from a 1.0V supply.
Takashi TOMITA Shigeki HAGIHARA Masaya SHIMAKAWA Naoki YONEZAKI
This paper focuses on verification for reactive system specifications. A reactive system is an open system that continuously interacts with an uncontrollable external environment, and it must often be highly safe and reliable. However, realizability checking for a given specification is very costly, so we need effective methods to detect and analyze defects in unrealizable specifications to refine them efficiently. We introduce a systematic characterization on necessary conditions of realizability. This characterization is based on quantifications for inputs and outputs in early and late behaviors and reveals four essential aspects of realizability: exhaustivity, strategizability, preservability and stability. Additionally, the characterization derives new necessary conditions, which enable us to classify unrealizable specifications systematically and hierarchically.
In recent years, deep neural networks (DNNs) have made a significant impact on a variety of research fields and applications. One drawback of DNNs is that it requires a huge amount of dataset for training. Since it is very expensive to ask experts to label the data, many non-expert data collection methods such as web crawling have been proposed. However, dataset created by non-experts often contain corrupted labels, and DNNs trained on such dataset are unreliable. Since DNNs have an enormous number of parameters, it tends to overfit to noisy labels, resulting in poor generalization performance. This problem is called Learning with Noisy labels (LNL). Recent studies showed that DNNs are robust to the noisy labels in the early stage of learning before over-fitting to noisy labels because DNNs learn the simple patterns first. Therefore DNNs tend to output true labels for samples with noisy labels in the early stage of learning, and the number of false predictions for samples with noisy labels is higher than for samples with clean labels. Based on these observations, we propose a new sample selection approach for LNL using the number of false predictions. Our method periodically collects the records of false predictions during training, and select samples with a low number of false predictions from the recent records. Then our method iteratively performs sample selection and training a DNNs model using the updated dataset. Since the model is trained with more clean samples and records more accurate false predictions for sample selection, the generalization performance of the model gradually increases. We evaluated our method on two benchmark datasets, CIFAR-10 and CIFAR-100 with synthetically generated noisy labels, and the obtained results which are better than or comparative to the-state-of-the-art approaches.
Akira SAITOU Ryo ISHIKAWA Kazuhiko HONJO
Unique spatial eigenmodes for the spherical coordinate system are shown to be successfully synthesized by properly allocated combinations of current distributions along θ' and φ' on a spherical conformal array. The allocation ratios are analytically found in a closed form with a matrix that relates the expansion coefficients of the current to its radiated field. The coefficients are obtained by general Fourier expansion of the current and the mode expansion of the field, respectively. The validity of the obtained formulas is numerically confirmed, and important effects of the sphere radius and the degrees of the currents on the radiated fields are numerically explained. The formulas are used to design six current distributions that synthesize six unique eigenmodes. The accuracy of the synthesized fields is quantitatively investigated, and the accuracy is shown to be remarkably improved by more than 27dB with two additional kinds of current distributions.
Gang LI Shuren GUO Yi ZHOU Zaixiu YANG
Regional Short Message Communication (RSMC) service of BeiDou Navigation Satellite System (BDS) has been widely used in various fields. BDS-3 officially started to provide service in 2020, and the performance of RSMC service was greatly improved, which offers an opportunity for large-scale applications of RSMC in consumer electronic products. Due to the complex application scenarios, the low-cost and low-power of RSMC terminals, a better coding scheme is needed to improve performance. In this paper, we propose a new polar encoding scheme with low code rate and variable code length, which adopts Polarization Weight (PW) to generate the reliability sequence of Polar codes and use a Nested Rate Adaptation Sequence (NRAS) to realize rate adaption for the BDS-3 RSMC. The performance of encoding gain and decoding complexity is analyzed by simulation and experiments. The results validate the effective of this scheme. Compared with Turbo codes, the proposed polar codes scheme achieves about 0.5dB gain with about 50% decoding complexity when the information length including CRC is 128 and code rate is 1/2. The proposed polar codes scheme provides a good reference for further applications in BDS.
Cyber-physical systems (CPSs) assisted by digital twins (DTs) integrate sensing-actuation loops over communication networks in various infrastructure services and applications. This study overviews the concept, methodology, and applications of the integrated communication quality estimation and control for the DT-assisted CPSs from both communications and control perspectives. The DT-assisted CPSs can be considered as networked control systems (NCSs) with virtual dynamic models of physical entities. A communication quality estimation observer (CQEO), which is an extended version of the communication disturbance observer (CDOB) utilized for time-delay compensation in NCSs, is proposed to estimate the integrated effects of the quality of services (QoS) and cyberattacks on the NCS applications. A path diversity technique with the CQEO is also proposed to achieve reliable NCSs. The proposed technique is applied to two kinds of NCSs: remote motor control and haptic communication systems. Moreover, results of the simulation on a haptic communication system show the effectiveness of the proposed approach. In the end, future research directions of the CQEO-based scheme are presented.
Rui JIANG Xiao ZHOU You Yun XU Li ZHANG
Millimeter wave (mmWave) massive Multiple-Input Multiple-Output (MIMO) systems generally adopt hybrid precoding combining digital and analog precoder as an alternative to full digital precoding to reduce RF chains and energy consumption. In order to balance the relationship between spectral efficiency, energy efficiency and hardware complexity, the hybrid-connected system structure should be adopted, and then the solution process of hybrid precoding can be simplified by decomposing the total achievable rate into several sub-rates. However, the singular value decomposition (SVD) incurs high complexity in calculating the optimal unconstrained hybrid precoder for each sub-rate. Therefore, this paper proposes PAST, a low complexity hybrid precoding algorithm based on projection approximate subspace tracking. The optimal unconstrained hybrid precoder of each sub-rate is estimated with the PAST algorithm, which avoids the high complexity process of calculating the left and right singular vectors and singular value matrix by SVD. Simulations demonstrate that PAST matches the spectral efficiency of SVD-based hybrid precoding in full-connected (FC), hybrid-connected (HC) and sub-connected (SC) system structure. Moreover, the superiority of PAST over SVD-based hybrid precoding in terms of complexity and increases with the number of transmitting antennas.
Masakazu TANUMA Joong-Won SHIN Shun-ichiro OHMI
In this research, we investigated the effect of Hf inter layer and chemical oxide on Si(100) substrate on the ferroelectric undoped HfO2 deposition. In case with 1 nm-thick Hf inter layer, equivalent oxide thickness (EOT) was decreased from 6.0 to 4.8 nm for 10 nm-thick HfO2 with decreasing annealing temperature. In case with 0.5 nm-thick chemical oxide, EOT was decreased from 3.9 to 3.6 nm in MFS diodes for 5 nm-thick HfO2. The MFSFET was fabricated with 10 nm-thick HfO2 utilizing Hf inter layer. The subthreshold swing was improved from 240 mV/dec. to 120 mV/dec. and saturation mobility was increased from 70 cm2/(Vs) to 140 cm2/(Vs) by inserting Hf inter layer.
Ryosuke MISHIMA Kunihiko HIRAISHI
In 2015, the Ministry of Land, Infrastructure and Transportation started to provide information on aircraft flying over Japan, called CARATS Open Data, and to promote research on aviation systems actively. The airspace is divided into sectors, which are used for limiting air traffic to control safely and efficiently. Since the demand for air transportation is increasing, new optimization techniques and efficient control have been required to predict and resolve demand-capacity imbalances in the airspace. In this paper, we aim to construct mathematical models of the inter-sector air traffic flow from CARATS Open Data. In addition, we develop methods to predict future sector demand. Accuracy of the prediction is evaluated by comparison between predicted sector demand and the actual data.
Jie LI Sai LI Abdul Hayee SHAIKH
In this manuscript, we propose a joint channel and power assignment algorithm for an unmanned aerial vehicle (UAV) swarm communication system based on multi-agent deep reinforcement learning (DRL). Regarded as an agent, each UAV to UAV (U2U) link can choose the optimal channel and power according to the current situation after training is successfully completed. Further, a mixing network is introduced based on DRL, where Q values of every single agent are non-linearly mapped, and we call it the QMIX algorithm. As it accesses state information, QMIX can learn to enrich the joint action value function. The proposed method can be used for both unicast and multicast scenarios. Experiments show that each U2U link can be trained to meet the constraints of UAV communication and minimize the interference to the system. For unicast communication, the communication rate is increased up to 15.6% and 8.9% using the proposed DRL method compared with the well-known random and adaptive methods, respectively. For multicast communication, the communication rate is increased up to 6.7% using the proposed QMIX method compared with the DRL method and 13.6% using DRL method compared with adaptive method. Besides, the successful transmission probability can maintain a high level.
Yiyang JIA Jun MITANI Ryuhei UEHARA
Logical matrices are binary matrices often used to represent relations. In the map folding problem, each folded state corresponds to a unique partial order on the set of squares and thus could be described with a logical matrix. The logical matrix representation is powerful than graphs or other common representations considering its association with category theory and homology theory and its generalizability to solve other computational problems. On the application level, such representations allow us to recognize map folding intuitively. For example, we can give a precise mathematical description of a folding process using logical matrices so as to solve problems like how to represent the up-and-down relations between all the layers according to their adjacency in a flat-folded state, how to check self-penetration, and how to deduce a folding process from a given order of squares that is supposed to represent a folded state of the map in a mathematical and natural manner. In this paper, we give solutions to these problems and analyze their computational complexity.
Marimo MATSUMOTO Masaya TAMURA
Couplers in a film-type capacitive wireless power charging (CWC) system for an implantable medical device were designed and analyzed in this work. Due to the high conductivity of the human body, two paths contribute to the power transmission, namely a high-frequency current and an electric field. This was confirmed by an equivalent circuit of the system. During analysis of the system, we used pig skin with subcutaneous fat, which has a high affinity with the human body, to search for a highly efficient electrode shape. Subsequently, we fabricated the designed coupler and measured ηmax. An ηmax of 56.6% was obtained for a half-circular coupler with a radius of 20 mm and a distance of 10 mm between adjacent couplers. This study will contribute to the realization of implantable devices that can be recharged during breaks or while sleeping at home and is expected to significantly reduce the burden on patients.
Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical delegation of key generation functionality. All existing HID-AKE schemes are selective ID secure, and the only known standard model scheme relies on a non-standard assumption such as the q-type assumption. In this paper, we propose a generic construction of HID-AKE that is adaptive ID secure in the HID-eCK model (maximal-exposure-resilient security model) without random oracles. One of the concrete instantiations of our generic construction achieves the first adaptive ID secure HID-AKE scheme under the (standard) k-lin assumption in the standard model. Furthermore, it has the advantage that the computational complexity of pairing and exponentiation operations and the communication complexity do not depend on the depth of the hierarchy. Also, the other concrete instantiation achieves the first HID-AKE scheme based on lattices (i.e., post-quantum).
Yuanwei HOU Yu GU Weiping LI Zhi LIU
The fast evolving credential attacks have been a great security challenge to current password-based information systems. Recently, biometrics factors like facial, iris, or fingerprint that are difficult to forge rise as key elements for designing passwordless authentication. However, capturing and analyzing such factors usually require special devices, hindering their feasibility and practicality. To this end, we present WiASK, a device-free WiFi sensing enabled Authentication System exploring Keystroke dynamics. More specifically, WiASK captures keystrokes of a user typing a pre-defined easy-to-remember string leveraging the existing WiFi infrastructure. But instead of focusing on the string itself which are vulnerable to password attacks, WiASK interprets the way it is typed, i.e., keystroke dynamics, into user identity, based on the biologically validated correlation between them. We prototype WiASK on the low-cost off-the-shelf WiFi devices and verify its performance in three real environments. Empirical results show that WiASK achieves on average 93.7% authentication accuracy, 2.5% false accept rate, and 5.1% false reject rate.
The road space rationing (RSR) method regulates a period in which a user group can make telephone calls in order to decrease the call attempt rate and induce calling parties to shorten their calls during disaster congestion. This paper investigates what settings of this indirect control induce more self-restraint and how the settings change calling parties' behavior using experimental psychology. Our experiments revealed that the length of the regulated period differently affected calling parties' behavior (call duration and call attempt rate) and indicated that the 60-min RSR method (i.e., 10 six-min periods) is the most effective setting against disaster congestion.
Ryota SHIINA Toshihito FUJIWARA Tomohiro TANIGUCHI Shunsuke SARUWATARI Takashi WATANABE
In order to further reduce the transmission rate of multi-channel satellite broadcast signals, whose carrier-to-noise ratio (CNR fluctuates due to rainfall attenuation, we propose a novel digitized radio-over-fiber (DRoF) -based optical re-transmission system based on adaptive combination compression for ultra-high definition (UHD) broadcasting satellite (BS)/communications satellite (CS) broadcast signals. The proposed system reduces the optical re-transmission rate of BS/CS signals as much as possible while handling input CNR fluctuations. Therefore, the transmission rate of communication signals in time-division multiplexing (TDM) transmission is ensured, and network sharing of communication signals and broadcast signals via passive optical network (PON) is realized. Based on the ITU-R P.618-13 prediction model, an experimental evaluation is performed using estimates of the long-term statistics of attenuation due to rainfall. The attenuation is evaluated as a percentage of the time that long-term re-transmission service is available. It is shown that the proposed system is able to accommodate a wide range of rainfall attenuation and achieve a 99.988% time percentage for the duration of service provision. In order to show the rate reduction effect of the proposed system, the quantization bit reduction effect as a function of the input CNR, which depends on rainfall attenuation, is experimentally confirmed. Experiments show that service operation time of 99.978% can be achieved by 3-bit transmission. This means a 62.5% reduction in transmission rate is realized compared to conventional fixed quantization. Furthermore, the average quantization bit number in our system for service operation times is 3.000, indicating that most service operation times are covered by just 3-bit transmission.
To accommodate an increasing amount of traffic efficiently, elastic optical networks (EON) that can use optical spectrum resources flexibly have been studied. We implement multi-path routing in case we cannot allocate the spectrum with single-path routing. However, multi-path routing requires more guard bands to avoid interference between two adjacent optical paths when compared with single-path routing in EON. A multi-path routing algorithm with traffic grooming technology has been proposed. The researchers assumed that a uniform modulation level was adopted, and so they did not consider the impact of path length on the resources needed. In this paper, we propose a multi-path routing method with traffic grooming considering path lengths. Our proposed method establishes an optical multi-path considering path length, fiber utilization, and the use of traffic grooming. Simulations show we can decrease the call-blocking probability by approximately 24.8% in NSFNET. We also demonstrate the effectiveness of traffic grooming and the improvement in the utilization ratio of optical spectrum resources.
Liwei WANG Yanduo ZHANG Tao LU Wenhua FANG Yu WANG
Person re-identification (Re-ID) aims to match the same pedestrain identity images across different camera views. Because pedestrians will change clothes frequently for a relatively long time, while many current methods rely heavily on color appearance information or only focus on the person biometric features, these methods make the performance dropped apparently when it is applied to Clohting-Changing. To relieve this dilemma, we proposed a novel Multi Feature Fusion Attention Network (MFFAN), which learns the fine-grained local features. Then we introduced a Clothing Adaptive Attention (CAA) module, which can integrate multiple granularity features to guide model to learn pedestrain's biometric feature. Meanwhile, in order to fully verify the performance of our method on clothing-changing Re-ID problem, we designed a Clothing Generation Network (CGN), which can generate multiple pictures of the same identity wearing different clothes. Finally, experimental results show that our method exceeds the current best method by over 5% and 6% on the VCcloth and PRCC datasets respectively.
Anna HIRAI Yuichi MATSUMOTO Takanori SATO Tadashi KAWAI Akira ENOKIHARA Shinya NAKAJIMA Atsushi KANNO Naokatsu YAMAMOTO
A Mach-Zehnder optical modulator with the tunable multimode interference coupler was fabricated using Ti-diffused LiNbO3. The modulation extinction ratio could be voltage controlled to maximize up to 50 dB by tuning the coupler. Optical single-sideband modulation was also achieved with a sideband suppression ratio of more than 30 dB.