The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] IN(26286hit)

101-120hit(26286hit)

  • Deep Learning-Based CSI Feedback for Terahertz Ultra-Massive MIMO Systems Open Access

    Yuling LI  Aihuang GUO  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2023/12/01
      Vol:
    E107-A No:8
      Page(s):
    1413-1416

    Terahertz (THz) ultra-massive multiple-input multiple-output (UM-MIMO) is envisioned as a key enabling technology of 6G wireless communication. In UM-MIMO systems, downlink channel state information (CSI) has to be fed to the base station for beamforming. However, the feedback overhead becomes unacceptable because of the large antenna array. In this letter, the characteristic of CSI is explored from the perspective of data distribution. Based on this characteristic, a novel network named Attention-GRU Net (AGNet) is proposed for CSI feedback. Simulation results show that the proposed AGNet outperforms other advanced methods in the quality of CSI feedback in UM-MIMO systems.

  • Delay Improvement in Hierarchical Multi-Access Edge Computing Networks Open Access

    Ngoc-Tan NGUYEN  Trung-Duc NGUYEN  Nam-Hoang NGUYEN  Trong-Minh HOANG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E107-A No:8
      Page(s):
    1404-1407

    Multi-access edge computing (MEC) is an emerging technology of 5G and beyond mobile networks which deploys computation services at edge servers for reducing service delay. However, edge servers may have not enough computation capabilities to satisfy the delay requirement of services. Thus, heavy computation tasks need to be offloaded to other MEC servers. In this paper, we propose an offloading solution, called optimal delay offloading (ODO) solution, that can guarantee service delay requirements. Specificially, this method exploits an estimation of queuing delay among MEC servers to find a proper offloading server with the lowest service delay to offload the computation task. Simulation results have proved that the proposed ODO method outperforms the conventional methods, i.e., the non-offloading and the energy-efficient offloading [10] methods (up to 1.6 times) in terms of guaranteeing the service delay under a threshold.

  • An Investigation on LP Decoding of Short Binary Linear Codes With the Subgradient Method Open Access

    Haiyang LIU  Xiaopeng JIAO  Lianrong MA  

     
    LETTER-Coding Theory

      Pubricized:
    2023/11/21
      Vol:
    E107-A No:8
      Page(s):
    1395-1399

    In this letter, we investigate the application of the subgradient method to design efficient algorithm for linear programming (LP) decoding of binary linear codes. A major drawback of the original formulation of LP decoding is that the description complexity of the feasible region is exponential in the check node degrees of the code. In order to tackle the problem, we propose a processing technique for LP decoding with the subgradient method, whose complexity is linear in the check node degrees. Consequently, a message-passing type decoding algorithm can be obtained, whose per-iteration complexity is extremely low. Moreover, if the algorithm converges to a valid codeword, it is guaranteed to be a maximum likelihood codeword. Simulation results on several binary linear codes with short lengths suggest that the performances of LP decoding based on the subgradient method and the state-of-art LP decoding implementation approach are comparable.

  • New Constructions of Approximately Mutually Unbiased Bases by Character Sums over Galois Rings Open Access

    You GAO  Ming-Yue XIE  Gang WANG  Lin-Zhi SHEN  

     
    LETTER-Information Theory

      Pubricized:
    2024/02/07
      Vol:
    E107-A No:8
      Page(s):
    1386-1390

    Mutually unbiased bases (MUBs) are widely used in quantum information processing and play an important role in quantum cryptography, quantum state tomography and communications. It’s difficult to construct MUBs and remains unknown whether complete MUBs exist for any non prime power. Therefore, researchers have proposed the solution to construct approximately mutually unbiased bases (AMUBs) by weakening the inner product conditions. This paper constructs q AMUBs of ℂq, (q + 1) AMUBs of ℂq-1 and q AMUBs of ℂq-1 by using character sums over Galois rings and finite fields, where q is a power of a prime. The first construction of q AMUBs of ℂq is new which illustrates K AMUBs of ℂK can be achieved. The second and third constructions in this paper include the partial results about AMUBs constructed by W. Wang et al. in [9].

  • Search for 9-Variable Boolean Functions with the Optimal Algebraic Immunity-Resiliency Trade-Off and High Nonlinearity Open Access

    Yueying LOU  Qichun WANG  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2024/03/28
      Vol:
    E107-A No:8
      Page(s):
    1382-1385

    Boolean functions play an important role in symmetric ciphers. One of important open problems on Boolean functions is determining the maximum possible resiliency order of n-variable Boolean functions with optimal algebraic immunity. In this letter, we search Boolean functions in the rotation symmetric class, and determine the maximum possible resiliency order of 9-variable Boolean functions with optimal algebraic immunity. Moreover, the maximum possible nonlinearity of 9-variable rotation symmetric Boolean functions with optimal algebraic immunity-resiliency trade-off is determined to be 224.

  • Permanent Magnet Synchronous Motor Speed Control System Based on Fractional Order Integral Sliding Mode Control Open Access

    Jun-Feng LIU  Yuan FENG  Zeng-Hui LI  Jing-Wei TANG  

     
    LETTER-Systems and Control

      Pubricized:
    2024/03/04
      Vol:
    E107-A No:8
      Page(s):
    1378-1381

    To improve the control performance of the permanent magnet synchronous motor speed control system, the fractional order calculus theory is combined with the sliding mode control to design the fractional order integral sliding mode sliding mode surface (FOISM) to improve the robustness of the system. Secondly, considering the existence of chattering phenomenon in sliding mode control, a new second-order sliding mode reaching law (NSOSMRL) is designed to improve the control accuracy of the system. Finally, the effectiveness of the proposed strategy is demonstrated by simulation.

  • Zero-Order-Hold Triggered Control of a Chain of Integrators with an Arbitrary Sampling Period Open Access

    Ho-Lim CHOI  

     
    LETTER-Systems and Control

      Pubricized:
    2023/12/25
      Vol:
    E107-A No:8
      Page(s):
    1374-1377

    We propose a zero-order-hold triggered control for a chain of integrators with an arbitrary sampling period. We analytically show that our control scheme globally asymptotically stabilizes the considered system. The key feature is that the pre-specified sampling period can be enlarged as desired by adjusting a gain-scaling factor. An example with various simulation results is given for clear illustration.

  • Triangle Projection Algorithm in ADMM-LP Decoding of LDPC Codes Open Access

    Yun JIANG  Huiyang LIU  Xiaopeng JIAO  Ji WANG  Qiaoqiao XIA  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2024/03/18
      Vol:
    E107-A No:8
      Page(s):
    1364-1368

    In this letter, a novel projection algorithm is proposed in which projection onto a triangle consisting of the three even-vertices closest to the vector to be projected replaces check polytope projection, achieving the same FER performance as exact projection algorithm in both high-iteration and low-iteration regime. Simulation results show that compared with the sparse affine projection algorithm (SAPA), it can improve the FER performance by 0.2 dB as well as save average number of iterations by 4.3%.

  • Extraction of Weak Harmonic Target Signal from Ionospheric Noise of High Frequency Surface Wave Radar Open Access

    Xiaolong ZHENG  Bangjie LI  Daqiao ZHANG  Di YAO  Xuguang YANG  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2024/01/23
      Vol:
    E107-A No:8
      Page(s):
    1360-1363

    High Frequency Surface Wave Radar holds significant potential in sea detection. However, the target signals are often surpassed by substantial sea clutter and ionospheric clutter, making it crucial to address clutter suppression and extract weak target signals amidst the strong noise background.This study proposes a novel method for separating weak harmonic target signals based on local tangent space, leveraging the chaotic feature of ionospheric clutter.The effectiveness of this approach is demonstrated through the analysis of measured data, thereby validating its practicality and potential for real-world applications.

  • Improved Source Localization Method of the Small-Aperture Array Based on the Parasitic Fly’s Coupled Ears and MUSIC-Like Algorithm Open Access

    Hongbo LI  Aijun LIU  Qiang YANG  Zhe LYU  Di YAO  

     
    LETTER-Noise and Vibration

      Pubricized:
    2023/12/08
      Vol:
    E107-A No:8
      Page(s):
    1355-1359

    To improve the direction-of-arrival estimation performance of the small-aperture array, we propose a source localization method inspired by the Ormia fly’s coupled ears and MUSIC-like algorithm. The Ormia can local its host cricket’s sound precisely despite the tremendous incompatibility between the spacing of its ear and the sound wavelength. In this paper, we first implement a biologically inspired coupled system based on the coupled model of the Ormia’s ears and solve its responses by the modal decomposition method. Then, we analyze the effect of the system on the received signals of the array. Research shows that the system amplifies the amplitude ratio and phase difference between the signals, equivalent to creating a virtual array with a larger aperture. Finally, we apply the MUSIC-like algorithm for DOA estimation to suppress the colored noise caused by the system. Numerical results demonstrate that the proposed method can improve the localization precision and resolution of the array.

  • A Combination Method for Impedance Extraction of SMD Electronic Components Based on Full-Wave Simulation and De-Embedding Technique Open Access

    Yang XIAO  Zhongyuan ZHOU  Mingjie SHENG  Qi ZHOU  

     
    PAPER-Measurement Technology

      Pubricized:
    2024/02/15
      Vol:
    E107-A No:8
      Page(s):
    1345-1354

    The method of extracting impedance parameters of surface mounted (SMD) electronic components by test is suitable for components with unknown model or material information, but requires consideration of errors caused by non-coaxial and measurement fixtures. In this paper, a fixture for impedance measurement is designed according to the characteristics of passive devices, and the fixture de-embedding method is used to eliminate errors and improve the test accuracy. The method of obtaining S parameters of fixture based on full wave simulation proposed in this paper can provide a thought for obtaining S parameters in de-embedding. Taking a certain patch capacitor as an example, the S parameters for de-embedding were obtained using methods based on full wave simulation, 2×Thru, and ADS simulation, and de-embedding tests were conducted. The results indicate that obtaining the S parameter of the testing fixture based on full wave simulation and conducting de-embedding testing compared to ADS simulation can accurately extract the impedance parameters of SMD electronic components, which provides a reference for the study of electromagnetic interference (EMI) coupling mechanism.

  • Optimization of Multi-Component Olfactory Display Using Inkjet Devices Open Access

    Hiroya HACHIYAMA  Takamichi NAKAMOTO  

     
    PAPER-Multimedia Environment Technology

      Pubricized:
    2023/12/28
      Vol:
    E107-A No:8
      Page(s):
    1338-1344

    Devices presenting audiovisual information are widespread, but few ones presenting olfactory information. We have developed a device called an olfactory display that presents odors to users by mixing multiple fragrances. Previously developed olfactory displays had the problem that the ejection volume of liquid perfume droplets was large and the dynamic range of the blending ratio was small. In this study, we used an inkjet device that ejects small droplets in order to expand the dynamic range of blending ratios to present a variety of scents. By finely controlling the back pressure using an electro-osmotic pump (EO pump) and adjusting the timing of EO pump and inkjet device, we succeeded in stabilizing the ejection of the inkjet device and we can have large dynamic range.

  • Convolutional Neural Network Based on Regional Features and Dimension Matching for Skin Cancer Classification Open Access

    Zhichao SHA  Ziji MA  Kunlai XIONG  Liangcheng QIN  Xueying WANG  

     
    PAPER-Image

      Vol:
    E107-A No:8
      Page(s):
    1319-1327

    Diagnosis at an early stage is clinically important for the cure of skin cancer. However, since some skin cancers have similar intuitive characteristics, and dermatologists rely on subjective experience to distinguish skin cancer types, the accuracy is often suboptimal. Recently, the introduction of computer methods in the medical field has better assisted physicians to improve the recognition rate but some challenges still exist. In the face of massive dermoscopic image data, residual network (ResNet) is more suitable for learning feature relationships inside big data because of its deeper network depth. Aiming at the deficiency of ResNet, this paper proposes a multi-region feature extraction and raising dimension matching method, which further improves the utilization rate of medical image features. This method firstly extracted rich and diverse features from multiple regions of the feature map, avoiding the deficiency of traditional residual modules repeatedly extracting features in a few fixed regions. Then, the fused features are strengthened by up-dimensioning the branch path information and stacking it with the main path, which solves the problem that the information of two paths is not ideal after fusion due to different dimensionality. The proposed method is experimented on the International Skin Imaging Collaboration (ISIC) Archive dataset, which contains more than 40,000 images. The results of this work on this dataset and other datasets are evaluated to be improved over networks containing traditional residual modules and some popular networks.

  • CPNet: Covariance-Improved Prototype Network for Limited Samples Masked Face Recognition Using Few-Shot Learning Open Access

    Sendren Sheng-Dong XU  Albertus Andrie CHRISTIAN  Chien-Peng HO  Shun-Long WENG  

     
    PAPER-Image

      Pubricized:
    2023/12/11
      Vol:
    E107-A No:8
      Page(s):
    1296-1308

    During the COVID-19 pandemic, a robust system for masked face recognition has been required. Most existing solutions used many samples per identity for the model to recognize, but the processes involved are very laborious in a real-life scenario. Therefore, we propose “CPNet” as a suitable and reliable way of recognizing masked faces from only a few samples per identity. The prototype classifier uses a few-shot learning paradigm to perform the recognition process. To handle complex and occluded facial features, we incorporated the covariance structure of the classes to refine the class distance calculation. We also used sharpness-aware minimization (SAM) to improve the classifier. Extensive in-depth experiments on a variety of datasets show that our method achieves remarkable results with accuracy as high as 95.3%, which is 3.4% higher than that of the baseline prototype network used for comparison.

  • Edge Device Verification Techniques for Updated Object Detection AI via Target Object Existence Open Access

    Akira KITAYAMA  Goichi ONO  Hiroaki ITO  

     
    PAPER-Intelligent Transport System

      Pubricized:
    2023/12/20
      Vol:
    E107-A No:8
      Page(s):
    1286-1295

    Edge devices with strict safety and reliability requirements, such as autonomous driving cars, industrial robots, and drones, necessitate software verification on such devices before operation. The human cost and time required for this analysis constitute a barrier in the cycle of software development and updating. In particular, the final verification at the edge device should at least strictly confirm that the updated software is not degraded from the current it. Since the edge device does not have the correct data, it is necessary for a human to judge whether the difference between the updated software and the operating it is due to degradation or improvement. Therefore, this verification is very costly. This paper proposes a novel automated method for efficient verification on edge devices of an object detection AI, which has found practical use in various applications. In the proposed method, a target object existence detector (TOED) (a simple binary classifier) judges whether an object in the recognition target class exists in the region of a prediction difference between the AI’s operating and updated versions. Using the results of this TOED judgement and the predicted difference, an automated verification system for the updated AI was constructed. TOED was designed as a simple binary classifier with four convolutional layers, and the accuracy of object existence judgment was evaluated for the difference between the predictions of the YOLOv5 L and X models using the Cityscapes dataset. The results showed judgement with more than 99.5% accuracy and 8.6% over detection, thus indicating that a verification system adopting this method would be more efficient than simple analysis of the prediction differences.

  • A Joint Coverage Constrained Task Offloading and Resource Allocation Method in MEC Open Access

    Daxiu ZHANG  Xianwei LI  Bo WEI  Yukun SHI  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E107-A No:8
      Page(s):
    1277-1285

    With the increase of the number of Mobile User Equipments (MUEs), numerous tasks that with high requirements of resources are generated. However, the MUEs have limited computational resources, computing power and storage space. In this paper, a joint coverage constrained task offloading and resource allocation method based on deep reinforcement learning is proposed. The aim is offloading the tasks that cannot be processed locally to the edge servers to alleviate the conflict between the resource constraints of MUEs and the high performance task processing. The studied problem considers the dynamic variability and complexity of the system model, coverage, offloading decisions, communication relationships and resource constraints. An entropy weight method is used to optimize the resource allocation process and balance the energy consumption and execution time. The results of the study show that the number of tasks and MUEs affects the execution time and energy consumption of the task offloading and resource allocation processes in the interest of the service provider, and enhances the user experience.

  • RIS-Assisted MIMO OFDM Dual-Function Radar-Communication Based on Mutual Information Optimization Open Access

    Nihad A. A. ELHAG  Liang LIU  Ping WEI  Hongshu LIAO  Lin GAO  

     
    PAPER-Communication Theory and Signals

      Pubricized:
    2024/03/15
      Vol:
    E107-A No:8
      Page(s):
    1265-1276

    The concept of dual function radar-communication (DFRC) provides solution to the problem of spectrum scarcity. This paper examines a multiple-input multiple-output (MIMO) DFRC system with the assistance of a reconfigurable intelligent surface (RIS). The system is capable of sensing multiple spatial directions while serving multiple users via orthogonal frequency division multiplexing (OFDM). The objective of this study is to design the radiated waveforms and receive filters utilized by both the radar and users. The mutual information (MI) is used as an objective function, on average transmit power, for multiple targets while adhering to constraints on power leakage in specific directions and maintaining each user’s error rate. To address this problem, we propose an optimal solution based on a computational genetic algorithm (GA) using bisection method. The performance of the solution is demonstrated by numerical examples and it is shown that, our proposed algorithm can achieve optimum MI and the use of RIS with the MIMO DFRC system improving the system performance.

  • Experimental Evaluations on Learning-Based Inter-Radar Wideband Interference Mitigation Method Open Access

    Ryoto KOIZUMI  Xiaoyan WANG  Masahiro UMEHIRA  Ran SUN  Shigeki TAKEDA  

     
    PAPER-Communication Theory and Signals

      Pubricized:
    2024/01/11
      Vol:
    E107-A No:8
      Page(s):
    1255-1264

    In recent years, high-resolution 77 GHz band automotive radar, which is indispensable for autonomous driving, has been extensively investigated. In the future, as vehicle-mounted CS (chirp sequence) radars become more and more popular, intensive inter-radar wideband interference will become a serious problem, which results in undesired miss detection of targets. To address this problem, learning-based wideband interference mitigation method has been proposed, and its feasibility has been validated by simulations. In this paper, firstly we evaluated the trade-off between interference mitigation performance and model training time of the learning-based interference mitigation method in a simulation environment. Secondly, we conducted extensive inter-radar interference experiments by using multiple 77 GHz MIMO (Multiple-Input and Multiple-output) CS radars and collected real-world interference data. Finally, we compared the performance of learning-based interference mitigation method with existing algorithm-based methods by real experimental data in terms of SINR (signal to interference plus noise ratio) and MAPE (mean absolute percentage error).

  • Advance Sharing of Quantum Shares for Quantum Secrets Open Access

    Mamoru SHIBATA  Ryutaroh MATSUMOTO  

     
    PAPER-Information Theory

      Pubricized:
    2023/11/24
      Vol:
    E107-A No:8
      Page(s):
    1247-1254

    Secret sharing is a cryptographic scheme to encode a secret to multiple shares being distributed to participants, so that only qualified sets of participants can restore the original secret from their shares. When we encode a secret by a secret sharing scheme and distribute shares, sometimes not all participants are accessible, and it is desirable to distribute shares to those participants before a secret information is determined. Secret sharing schemes for classical secrets have been known to be able to distribute some shares before a given secret. Lie et al. found a ((2, 3))-threshold secret sharing for quantum secrets can distribute some shares before a given secret. However, it is unknown whether distributing some shares before a given secret is possible with other access structures of secret sharing for quantum secrets. We propose a quantum secret sharing scheme for quantum secrets that can distribute some shares before a given secret with other access structures.

  • Accurate False-Positive Probability of Multiset-Based Demirci-Selçuk Meet-in-the-Middle Attacks Open Access

    Dongjae LEE  Deukjo HONG  Jaechul SUNG  Seokhie HONG  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2024/03/15
      Vol:
    E107-A No:8
      Page(s):
    1212-1228

    In this study, we focus on evaluating the false-positive probability of the Demirci-Selçuk meet-in-the-middle attack, particularly within the context of configuring precomputed tables with multisets. During the attack, the adversary effectively reduces the size of the key space by filtering out the wrong keys, subsequently recovering the master key from the reduced key space. The false-positive probability is defined as the probability that a wrong key will pass through the filtering process. Due to its direct impact on the post-filtering key space size, the false-positive probability is an important factor that influences the complexity and feasibility of the attack. However, despite its significance, the false-positive probability of the multiset-based Demirci-Selçuk meet-in-the-middle attack has not been thoroughly discussed, to the best of our knowledge. We generalize the Demirci-Selçuk meet-in-the-middle attack and present a sophisticated method for accurately calculating the false-positive probability. We validate our methodology through toy experiments, demonstrating its high precision. Additionally, we propose a method to optimize an attack by determining the optimal format of precomputed data, which requires the precise false-positive probability. Applying our approach to previous attacks on AES and ARIA, we have achieved modest improvements. Specifically, we enhance the memory complexity and time complexity of the offline phase of previous attacks on 7-round AES-128/192/256, 7-round ARIA-192/256, and 8-round ARIA-256 by factors ranging from 20.56 to 23. Additionally, we have improved the overall time complexity of attacks on 7-round ARIA-192/256 by factors of 20.13 and 20.42, respectively.

101-120hit(26286hit)