The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] IR(5768hit)

21-40hit(5768hit)

  • Geometric Refactoring of Quantum and Reversible Circuits Using Graph Algorithms Open Access

    Martin LUKAC  Saadat NURSULTAN  Georgiy KRYLOV  Oliver KESZOCZE  Abilmansur RAKHMETTULAYEV  Michitaka KAMEYAMA  

     
    PAPER

      Pubricized:
    2024/06/24
      Vol:
    E107-D No:8
      Page(s):
    930-939

    With the advent of gated quantum computers and the regular structures for qubit layout, methods for placement, routing, noise estimation, and logic to hardware mapping become imminently required. In this paper, we propose a method for quantum circuit layout that is intended to solve such problems when mapping a quantum circuit to a gated quantum computer. The proposed methodology starts by building a Circuit Interaction Graph (CIG) that represents the ideal hardware layout minimizing the distance and path length between the individual qubits. The CIG is also used to introduce a qubit noise model. Once constructed, the CIG is iteratively reduced to a given architecture (qubit coupling model) specifying the neighborhood, qubits, priority, and qubits noise. The introduced constraints allow us to additionally reduce the graph according to preferred weights of desired properties. We propose two different methods of reducing the CIG: iterative reduction or the iterative isomorphism search algorithm. The proposed method is verified and tested on a set of standard benchmarks with results showing improvement on certain functions while in average improving the cost of the implementation over the current state of the art methods.

  • 10-Gbit/s Data Transmission Using 120-GHz-Band Contactless Communication with SRR Integrated Glass Substrate Open Access

    Tomohiro KUMAKI  Akihiko HIRATA  Tubasa SAIJO  Yuma KAWAMOTO  Tadao NAGATSUMA  Osamu KAGAYA  

     
    PAPER-Microwaves, Millimeter-Waves

      Pubricized:
    2024/02/08
      Vol:
    E107-C No:8
      Page(s):
    223-230

    We achieved 10-Gbit/s data transmission using a cutting-edge 120-GHz-band high-speed contactless communication technology, which allows seamless connection to a local area network (LAN) by simply placing devices on a desk. We propose a glass substrate-integrated rectangular waveguide that can control the permeability of the top surface to 120-GHz signals by contacting a dielectric substrate with the substrate. The top surface of the rectangular waveguide was replaced with a glass substrate on which split-ring resonators (SRRs) were integrated. The transmission loss of the waveguide with a glass substrate was 2.5 dB at 125 GHz. When a dielectric sheet with a line pattern formed on the contact surface was in contact with a glass substrate, the transmission loss from the waveguide to the dielectric sheet was 19.2 dB at 125 GHz. We achieved 10-Gbit/s data transmission by contacting a dielectric sheet to the SRR-integrated glass substrate.

  • Method for Estimating Scatterer Information from the Response Waveform of a Backward Transient Scattering Field Using TD-SPT Open Access

    Keiji GOTO  Toru KAWANO  Munetoshi IWAKIRI  Tsubasa KAWAKAMI  Kazuki NAKAZAWA  

     
    PAPER-Electromagnetic Theory

      Pubricized:
    2024/01/23
      Vol:
    E107-C No:8
      Page(s):
    210-222

    This paper proposes a scatterer information estimation method using numerical data for the response waveform of a backward transient scattering field for both E- and H-polarizations when a two-dimensional (2-D) coated metal cylinder is selected as a scatterer. It is assumed that a line source and an observation point are placed at different locations. The four types of scatterer information covered in this paper are the relative permittivity of a surrounding medium, the relative permittivity of a coating medium layer and its thickness, and the radius of a coated metal cylinder. Specifically, a time-domain saddle-point technique (TD-SPT) is used to derive scatterer information estimation formulae from the amplitude intensity ratios (AIRs) of adjacent backward transient scattering field components. The estimates are obtained by substituting the numerical data of the response waveforms of the backward transient scattering field components into the estimation formulae and performing iterative calculations. Furthermore, a minimum thickness of a coating medium layer for which the estimation method is valid is derived, and two kinds of applicable conditions for the estimation method are proposed. The effectiveness of the scatterer information estimation method is verified by comparing the estimates with the set values. The noise tolerance and convergence characteristics of the estimation method and the method of controlling the estimation accuracy are also discussed.

  • Sum Rate Maximization for Multiuser Full-Duplex Wireless Powered Communication Networks Open Access

    Keigo HIRASHIMA  Teruyuki MIYAJIMA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E107-B No:8
      Page(s):
    564-572

    In this paper, we consider an orthogonal frequency division multiple access (OFDMA)-based multiuser full-duplex wireless powered communication network (FD WPCN) system with beamforming (BF) at an energy transmitter (ET). The ET performs BF to efficiently transmit energy to multiple users while suppressing interference to an information receiver (IR). Multiple users operating in full-duplex mode harvest energy from the signals sent by the ET while simultaneously transmitting information to the IR using the harvested energy. We analytically demonstrate that the FD WPCN is superior to its half-duplex (HD) WPCN counterpart in the high-SNR regime. We propose a transmitter design method that maximizes the sum rate by determining the BF at the ET, power allocation at both the ET and users, and sub-band allocation. Simulation results show the effectiveness of the proposed method.

  • Differential Active Self-Interference Cancellation for Asynchronous In-Band Full-Duplex GFSK Open Access

    Shinsuke IBI  Takumi TAKAHASHI  Hisato IWAI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E107-B No:8
      Page(s):
    552-563

    This paper proposes a novel differential active self-interference canceller (DASIC) algorithm for asynchronous in-band full-duplex (IBFD) Gaussian filtered frequency shift keying (GFSK), which is designed for wireless Internet of Things (IoT). In IBFD communications, where two terminals simultaneously transmit and receive signals in the same frequency band, there is an extremely strong self-interference (SI). The SI can be mitigated by an active SI canceller (ASIC), which subtracts an interference replica based on channel state information (CSI) from the received signal. The challenging problem is the realization of asynchronous IBFD for wireless IoT in indoor environments. In the asynchronous mode, pilot contamination is induced by the non-orthogonality between asynchronous pilot sequences. In addition, the transceiver suffers from analog front-end (AFE) impairments, such as phase noise. Due to these impairments, the SI cannot be canceled entirely at the receiver, resulting in residual interference. To address the above issue, the DASIC incorporates the principle of the differential codec, which enables to suppress SI without the CSI estimation of SI owing to the differential structure. Also, on the premise of using an error correction technique, iterative detection and decoding (IDD) is applied to improve the detection capability while exchanging the extrinsic log-likelihood ratio (LLR) between the maximum a-posteriori probability (MAP) detector and the channel decoder. Finally, the validity of using the DASIC algorithm is evaluated by computer simulations in terms of the packet error rate (PER). The results clearly demonstrate the possibility of realizing asynchronous IBFD.

  • Polling Schedule Algorithms for Data Aggregation with Sensor Phase Control in In-Vehicle UWB Networks Open Access

    Hajime MIGITA  Yuki NAKAGOSHI  Patrick FINNERTY  Chikara OHTA  Makoto OKUHARA  

     
    PAPER-Network

      Vol:
    E107-B No:8
      Page(s):
    529-540

    To enhance fuel efficiency and lower manufacturing and maintenance costs, in-vehicle wireless networks can facilitate the weight reduction of vehicle wire harnesses. In this paper, we utilize the Impulse Radio-Ultra Wideband (IR-UWB) of IEEE 802.15.4a/z for in-vehicle wireless networks because of its excellent signal penetration and robustness in multipath environments. Since clear channel assessment is optional in this standard, we employ polling control as a multiple access control to prevent interference within the system. Therein, the preamble overhead is large in IR-UWB of IEEE 802.15.4a/z. Hence, aggregating as much sensor data as possible within each frame is more efficient. In this paper, we assume that reading out data from sensors and sending data to actuators is periodical and that their respective phases can be adjusted. Therefore, this paper proposes an integer linear programming-based scheduling algorithm that minimizes the number of transmitted frames by adjusting the read and write phases. Furthermore, we provide a heuristic algorithm that computes a sub-optimal but acceptable solution in a shorter time. Experimental validation shows that the data aggregation of the proposed algorithms is robust against interference.

  • Triangle Projection Algorithm in ADMM-LP Decoding of LDPC Codes Open Access

    Yun JIANG  Huiyang LIU  Xiaopeng JIAO  Ji WANG  Qiaoqiao XIA  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2024/03/18
      Vol:
    E107-A No:8
      Page(s):
    1364-1368

    In this letter, a novel projection algorithm is proposed in which projection onto a triangle consisting of the three even-vertices closest to the vector to be projected replaces check polytope projection, achieving the same FER performance as exact projection algorithm in both high-iteration and low-iteration regime. Simulation results show that compared with the sparse affine projection algorithm (SAPA), it can improve the FER performance by 0.2 dB as well as save average number of iterations by 4.3%.

  • Improved Source Localization Method of the Small-Aperture Array Based on the Parasitic Fly’s Coupled Ears and MUSIC-Like Algorithm Open Access

    Hongbo LI  Aijun LIU  Qiang YANG  Zhe LYU  Di YAO  

     
    LETTER-Noise and Vibration

      Pubricized:
    2023/12/08
      Vol:
    E107-A No:8
      Page(s):
    1355-1359

    To improve the direction-of-arrival estimation performance of the small-aperture array, we propose a source localization method inspired by the Ormia fly’s coupled ears and MUSIC-like algorithm. The Ormia can local its host cricket’s sound precisely despite the tremendous incompatibility between the spacing of its ear and the sound wavelength. In this paper, we first implement a biologically inspired coupled system based on the coupled model of the Ormia’s ears and solve its responses by the modal decomposition method. Then, we analyze the effect of the system on the received signals of the array. Research shows that the system amplifies the amplitude ratio and phase difference between the signals, equivalent to creating a virtual array with a larger aperture. Finally, we apply the MUSIC-like algorithm for DOA estimation to suppress the colored noise caused by the system. Numerical results demonstrate that the proposed method can improve the localization precision and resolution of the array.

  • Optimization of Multi-Component Olfactory Display Using Inkjet Devices Open Access

    Hiroya HACHIYAMA  Takamichi NAKAMOTO  

     
    PAPER-Multimedia Environment Technology

      Pubricized:
    2023/12/28
      Vol:
    E107-A No:8
      Page(s):
    1338-1344

    Devices presenting audiovisual information are widespread, but few ones presenting olfactory information. We have developed a device called an olfactory display that presents odors to users by mixing multiple fragrances. Previously developed olfactory displays had the problem that the ejection volume of liquid perfume droplets was large and the dynamic range of the blending ratio was small. In this study, we used an inkjet device that ejects small droplets in order to expand the dynamic range of blending ratios to present a variety of scents. By finely controlling the back pressure using an electro-osmotic pump (EO pump) and adjusting the timing of EO pump and inkjet device, we succeeded in stabilizing the ejection of the inkjet device and we can have large dynamic range.

  • Accurate False-Positive Probability of Multiset-Based Demirci-Selçuk Meet-in-the-Middle Attacks Open Access

    Dongjae LEE  Deukjo HONG  Jaechul SUNG  Seokhie HONG  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2024/03/15
      Vol:
    E107-A No:8
      Page(s):
    1212-1228

    In this study, we focus on evaluating the false-positive probability of the Demirci-Selçuk meet-in-the-middle attack, particularly within the context of configuring precomputed tables with multisets. During the attack, the adversary effectively reduces the size of the key space by filtering out the wrong keys, subsequently recovering the master key from the reduced key space. The false-positive probability is defined as the probability that a wrong key will pass through the filtering process. Due to its direct impact on the post-filtering key space size, the false-positive probability is an important factor that influences the complexity and feasibility of the attack. However, despite its significance, the false-positive probability of the multiset-based Demirci-Selçuk meet-in-the-middle attack has not been thoroughly discussed, to the best of our knowledge. We generalize the Demirci-Selçuk meet-in-the-middle attack and present a sophisticated method for accurately calculating the false-positive probability. We validate our methodology through toy experiments, demonstrating its high precision. Additionally, we propose a method to optimize an attack by determining the optimal format of precomputed data, which requires the precise false-positive probability. Applying our approach to previous attacks on AES and ARIA, we have achieved modest improvements. Specifically, we enhance the memory complexity and time complexity of the offline phase of previous attacks on 7-round AES-128/192/256, 7-round ARIA-192/256, and 8-round ARIA-256 by factors ranging from 20.56 to 23. Additionally, we have improved the overall time complexity of attacks on 7-round ARIA-192/256 by factors of 20.13 and 20.42, respectively.

  • Joint CFO and DOA Estimation Based on MVDR Criterion in Interleaved OFDMA/SDMA Uplink Open Access

    Chih-Chang SHEN  Wei JHANG  

     
    LETTER-Spread Spectrum Technologies and Applications

      Pubricized:
    2023/10/26
      Vol:
    E107-A No:7
      Page(s):
    1066-1070

    This letter deals with joint carrier frequency offset (CFO) and direction of arrival (DOA) estimation based on the minimum variance distortionless response (MVDR) criterion for interleaved orthogonal frequency division multiple access (OFDMA)/space division multiple access (SDMA) uplink systems. In order to reduce the computational load of two-dimensional searching based methods, the proposed method includes only once polynomial CFO rooting and does not require DOA paring, hence it raises the searching efficiency. Several simulation results are provided to illustrate the effectiveness of the proposed method.

  • Novel Constructions of Complementary Sets of Sequences of Lengths Non-Power-of-Two Open Access

    Longye WANG  Houshan LIU  Xiaoli ZENG  Qingping YU  

     
    LETTER-Coding Theory

      Pubricized:
    2023/11/07
      Vol:
    E107-A No:7
      Page(s):
    1053-1057

    This letter presented several new constructions of complementary sets (CSs) with flexible sequence lengths using matrix transformations. The constructed CSs of size 4 have different lengths, namely N + L and 2N + L, where N and L are the lengths for which complementary pairs exist. Also, presented CSs of size 8 have lengths N + P, P + Q and 2P + Q, where N is length of complementary pairs, P and Q are lengths of CSs of size 4 exist. The achieved designs can be easily extended to a set size of 2n+2 by recursive method. The proposed constructions generalize some previously reported constructions along with generating CSs under fewer constraints.

  • Real-Time Monitoring Systems That Provide M2M Communication between Machines Open Access

    Ya ZHONG  

     
    PAPER-Language, Thought, Knowledge and Intelligence

      Pubricized:
    2023/10/17
      Vol:
    E107-A No:7
      Page(s):
    1019-1026

    Artificial intelligence and the introduction of Internet of Things technologies have benefited from technological advances and new automated computer system technologies. Eventually, it is now possible to integrate them into a single offline industrial system. This is accomplished through machine-to-machine communication, which eliminates the human factor. The purpose of this article is to examine security systems for machine-to-machine communication systems that rely on identification and authentication algorithms for real-time monitoring. The article investigates security methods for quickly resolving data processing issues by using the Security operations Center’s main machine to identify and authenticate devices from 19 different machines. The results indicate that when machines are running offline and performing various tasks, they can be exposed to data leaks and malware attacks by both the individual machine and the system as a whole. The study looks at the operation of 19 computers, 7 of which were subjected to data leakage and malware attacks. AnyLogic software is used to create visual representations of the results using wireless networks and algorithms based on previously processed methods. The W76S is used as a protective element within intelligent sensors due to its built-in memory protection. For 4 machines, the data leakage time with malware attacks was 70 s. For 10 machines, the duration was 150 s with 3 attacks. Machine 15 had the longest attack duration, lasting 190 s and involving 6 malware attacks, while machine 19 had the shortest attack duration, lasting 200 s and involving 7 malware attacks. The highest numbers indicated that attempting to hack a system increased the risk of damaging a device, potentially resulting in the entire system with connected devices failing. Thus, illegal attacks by attackers using malware may be identified over time, and data processing effects can be prevented by intelligent control. The results reveal that applying identification and authentication methods using a protocol increases cyber-physical system security while also allowing real-time monitoring of offline system security.

  • Novel Constructions of Cross Z-Complementary Pairs with New Lengths Open Access

    Longye WANG  Chunlin CHEN  Xiaoli ZENG  Houshan LIU  Lingguo KONG  Qingping YU  Qingsong WANG  

     
    PAPER-Information Theory

      Pubricized:
    2023/10/10
      Vol:
    E107-A No:7
      Page(s):
    989-996

    Spatial modulation (SM) is a type of multiple-input multiple-output (MIMO) technology that provides several benefits over traditional MIMO systems. SM-MIMO is characterized by its unique transmission principle, which results in lower costs, enhanced spectrum utilization, and reduced inter-channel interference. To optimize channel estimation performance over frequency-selective channels in the spatial modulation system, cross Z-complementary pairs (CZCPs) have been proposed as training sequences. The zero correlation zone (ZCZ) properties of CZCPs for auto-correlation sums and cross-correlation sums enable them to achieve optimal channel estimation performance. In this paper, we systematically construct CZCPs based on binary Golay complementary pairs and binary Golay complementary pairs via Turyn’s method. We employ a special matrix operation and concatenation method to obtain CZCPs with new lengths 2M + N and 2(M + L), where M and L are the lengths of binary GCP, and N is the length of binary GCP via Turyn’s method. Further, we obtain the perfect CZCP with new length 4N and extend the lengths of CZCPs.

  • Efficient Realization of an SC Circuit with Feedback and Its Applications Open Access

    Yuto ARIMURA  Shigeru YAMASHITA  

     
    PAPER-VLSI Design Technology and CAD

      Pubricized:
    2023/10/26
      Vol:
    E107-A No:7
      Page(s):
    958-965

    Stochastic Computing (SC) allows additions and multiplications to be realized with lower power than the conventional binary operations if we admit some errors. However, for many complex functions which cannot be realized by only additions and multiplications, we do not know a generic efficient method to calculate a function by using an SC circuit; it is necessary to realize an SC circuit by using a generic method such as polynomial approximation methods for such a function, which may lose the advantage of SC. Thus, there have been many researches to consider efficient SC realization for specific functions; an efficient SC square root circuit with a feedback circuit was proposed by D. Wu et al. recently. This paper generalizes the SC square root circuit with a feedback circuit; we identify a situation when we can implement a function efficiently by an SC circuit with a feedback circuit. As examples of our generalization, we propose SC circuits to calculate the n-th root calculation and division. We also show our analysis on the accuracy of our SC circuits and the hardware costs; our results show the effectiveness of our method compared to the conventional SC designs; our framework may be able to implement a SC circuit that is better than the existing methods in terms of the hardware cost or the calculation error.

  • Cloud-Edge-Device Collaborative High Concurrency Access Management for Massive IoT Devices in Distribution Grid Open Access

    Shuai LI  Xinhong YOU  Shidong ZHANG  Mu FANG  Pengping ZHANG  

     
    PAPER-Systems and Control

      Pubricized:
    2023/10/26
      Vol:
    E107-A No:7
      Page(s):
    946-957

    Emerging data-intensive services in distribution grid impose requirements of high-concurrency access for massive internet of things (IoT) devices. However, the lack of effective high-concurrency access management results in severe performance degradation. To address this challenge, we propose a cloud-edge-device collaborative high-concurrency access management algorithm based on multi-timescale joint optimization of channel pre-allocation and load balancing degree. We formulate an optimization problem to minimize the weighted sum of edge-cloud load balancing degree and queuing delay under the constraint of access success rate. The problem is decomposed into a large-timescale channel pre-allocation subproblem solved by the device-edge collaborative access priority scoring mechanism, and a small-timescale data access control subproblem solved by the discounted empirical matching mechanism (DEM) with the perception of high-concurrency number and queue backlog. Particularly, information uncertainty caused by externalities is tackled by exploiting discounted empirical performance which accurately captures the performance influence of historical time points on present preference value. Simulation results demonstrate the effectiveness of the proposed algorithm in reducing edge-cloud load balancing degree and queuing delay.

  • A 0.13 mJ/Prediction CIFAR-100 Fully Synthesizable Raster-Scan-Based Wired-Logic Processor in 16-nm FPGA Open Access

    Dongzhu LI  Zhijie ZHAN  Rei SUMIKAWA  Mototsugu HAMADA  Atsutake KOSUGE  Tadahiro KURODA  

     
    PAPER

      Pubricized:
    2023/11/24
      Vol:
    E107-C No:6
      Page(s):
    155-162

    A 0.13mJ/prediction with 68.6% accuracy wired-logic deep neural network (DNN) processor is developed in a single 16-nm field-programmable gate array (FPGA) chip. Compared with conventional von-Neumann architecture DNN processors, the energy efficiency is greatly improved by eliminating DRAM/BRAM access. A technical challenge for conventional wired-logic processors is the large amount of hardware resources required for implementing large-scale neural networks. To implement a large-scale convolutional neural network (CNN) into a single FPGA chip, two technologies are introduced: (1) a sparse neural network known as a non-linear neural network (NNN), and (2) a newly developed raster-scan wired-logic architecture. Furthermore, a novel high-level synthesis (HLS) technique for wired-logic processor is proposed. The proposed HLS technique enables the automatic generation of two key components: (1) Verilog-hardware description language (HDL) code for a raster-scan-based wired-logic processor and (2) test bench code for conducting equivalence checking. The automated process significantly mitigates the time and effort required for implementation and debugging. Compared with the state-of-the-art FPGA-based processor, 238 times better energy efficiency is achieved with only a slight decrease in accuracy on the CIFAR-100 task. In addition, 7 times better energy efficiency is achieved compared with the state-of-the-art network-optimized application-specific integrated circuit (ASIC).

  • Reservoir-Based 1D Convolution: Low-Training-Cost AI Open Access

    Yuichiro TANAKA  Hakaru TAMUKOH  

     
    LETTER-Neural Networks and Bioengineering

      Pubricized:
    2023/09/11
      Vol:
    E107-A No:6
      Page(s):
    941-944

    In this study, we introduce a reservoir-based one-dimensional (1D) convolutional neural network that processes time-series data at a low computational cost, and investigate its performance and training time. Experimental results show that the proposed network consumes lower training computational costs and that it outperforms the conventional reservoir computing in a sound-classification task.

  • Joint User Grouping and Resource Allocation for NOMA Enhanced D2D Communications Open Access

    Jin XIE  Fangmin XU  

     
    PAPER-Communication Theory and Signals

      Pubricized:
    2023/09/20
      Vol:
    E107-A No:6
      Page(s):
    864-872

    To mitigate the interference caused by frequency reuse between inter-layer and intra-layer users for Non-Orthogonal Multiple Access (NOMA) based device-to-device (D2D) communication underlaying cellular systems, this paper proposes a joint optimization strategy that combines user grouping and resource allocation. Specifically, the optimization problem is formulated to maximize the sum rate while ensuring the minimum rate of cellular users, considering three optimization parameters: user grouping, sub channel allocation and power allocation. However, this problem is a mixed integer nonlinear programming (MINLP) problem and is hard to solve directly. To address this issue, we divide the problem into two sub-problems: user grouping and resource allocation. First, we classify D2D users into D2D pairs or D2D NOMA groups based on the greedy algorithm. Then, in terms of resource allocation, we allocate the sub-channel to D2D users by swap matching algorithm to reduce the co-channel interference, and optimize the transmission power of D2D by the local search algorithm. Simulation results show that, compared to other schemes, the proposed algorithm significantly improves the system sum rate and spectral utilization.

  • Changes in Reading Voice to Convey Design Intention for Users with Visual Impairment Open Access

    Junko SHIROGANE  Daisuke SAYAMA  Hajime IWATA  Yoshiaki FUKAZAWA  

     
    PAPER

      Pubricized:
    2023/12/27
      Vol:
    E107-D No:5
      Page(s):
    589-601

    Webpage texts are often emphasized by decorations such as bold, italic, underline, and text color using HTML (HyperText Markup Language) tags and CSS (Cascading Style Sheets). However, users with visual impairment often struggle to recognize decorations appropriately because most screen readers do not read decorations appropriately. To overcome this limitation, we propose a method to read emphasized texts by changing the reading voice parameters of a screen reader and adding sound effects. First, the strong emphasis types and reading voices are investigated. Second, the intensity of the emphasis type is used to calculate a score. Then the score is used to assign the reading method for the emphasized text. Finally, the proposed method is evaluated by users with and without visual impairment. The proposed method can convey emphasized texts, but future improvements are necessary.

21-40hit(5768hit)