The output feedback consensus problem of nonlinear multi-agent systems under a directed network with a time varying communication delay is studied. In order to deal with this problem, the dynamic output feedback controller with an additional low gain parameter that compensates for the effect of nonlinearity and a communication delay is proposed. Also, it is shown that under some assumptions, the proposed controller can always solve the output feedback consensus problem even in the presence of an arbitrarily large communication delay.
An equivalent circuit of Yee's cells is proposed for mixed electromagnetic and circuit simulations. Using the equivalent circuit, a mixed electromagnetic and circuit simulator can be developed, in which the electromagnetic field and circuit responses are simultaneously analyzed. Representing the electromagnetic system as a circuit, active and passive device models in a circuit simulator can be used for the mixed simulations without any modifications. Hence, the propose method is very useful for designing various electronic systems. To evaluate the mixed simulations with the equivalent circuit, two implementations with shared or distributed memory computer system are presented. In the numerical examples, we evaluate the performances of the prototype simulators to demonstrate the effectiveness.
Kazuyuki AMANO Masafumi YOSHIDA
We present an explicit construction of a MAJn-2 °MAJn-2 circuit computing MAJn for every odd n≥7. This gives a partial solution to an open problem by Kulikov and Podolskii (Proc. of STACS 2017, Article No.49).
Jaehwan LEE Youngrang KIM Ji Sun SHIN
We propose a new signature-based, on-demand anti-virus solution using in-storage processing (ISP) to inspect the inside of a storage device. In-storage anti-virus systems are able to isolate malicious effects from main computing platforms, and they reduce the system overhead for virus detection. We implement our in-storage anti-virus platform using cost-effective, open-source hardware, and we verify that is practically applicable to storage devices.
Ryosuke SUGA Tomohiko NAKAMURA Daisuke KITAHARA Kiyomichi ARAKI Osamu HASHIMOTO
An equivalent circuit of a circular patch array absorber has been proposed, however the method to identify a winding ratio of a transformer in its circuit have never been reported. In this paper, it is indicated that the ratio is proportionate to the area ratio between patch and unit cell of the absorber, and the design method of the winding ratio is proposed. The winding ratio derived by the proposed method is agreed well with that by using electromagnetic simulator within 3% error. Moreover, the operating frequency and 15 dB bandwidth of the fabricated absorber designed by proposed method are agreed with those derived by the circuit simulation within 0.4% and 0.1% errors. Thus the validity of the proposed method is verified.
Daisuke FUNAHASHI Takahiro ITO Akimasa HIRATA Takahiro IYAMA Teruo ONISHI
This study discusses an area-averaged incident power density to estimate surface temperature elevation from patch antenna arrays with 4 and 9 elements at the frequencies above 10 GHz. We computationally demonstrate that a smaller averaging area (1 cm2) of power density should be considered at the frequency of 30 GHz or higher compared with that at lower frequencies (4 cm2).
Lianfei LUO Wenping MA Feifei ZHAO
Let Fpm be the field of pm elements where p is an odd prime. In this letter, binary sequence pairs of period N=pm-1 are presented, where sequences are generated from the polynomial x2-c for any c Fpm{0}. The cross-correlation values of sequence pairs are completely determined, our results show that those binary sequence pairs have optimal three-level correlation.
Shinichi RYOKI Takashi KUNIFUJI Toshihiro ITOH
Along with the sophistication of society, the requirements for infrastructure systems are also becoming more sophisticated. Conventionally, infrastructure systems have been accepted if they were safe and stable, but nowadays they are required for serviceability as a matter of course. For this reason, not only the expansion of the scope of the control system but also the integration with the information service system has been frequently carried out. In this paper, we describe safety technology based on autonomous decentralized technology as one of the measures to secure safety in a control system integrating such information service functions. And we propose its future studies.
In this study, a theory for estimating the dielectric properties for unknown materials from three reference materials without using a short condition was developed. Specifically, the relationships linking the S parameter, electrostatic capacity, the measurement instrument and the jig were determined for four equivalent circuits with three reference materials and an unknown material inserted into the jig. An equation for estimation of complex permittivity from three reference materials without short termination was thus derived. The formula's accuracy was then numerically verified for cases in which values indicating the dielectric properties of the reference materials and the actual material differed significantly, thereby verifying the effectiveness of the proposed method. Next, it was also found that dielectric constant could be correctly determined even when the observation plane was moved to the SOL calibration plane on the generator side. The dielectric properties of various liquids in the 0.50, 1.0 and 2.5 GHz bands as measured using the proposed method were then compared with corresponding conventional-method values. Finally, the validity of the proposed method was also indicated by measurement values showing the frequency characteristics of dielectric properties at frequencies ranging from 0.50 to 3.0 GHz.
In this paper, dependency of transmission loss of shielded-flexible printed circuits (FPC) for differential-signaling on thickness of conductive shield is studied by numerical modeling based on an equivalent circuit model compared with the experimental results. Especially, the transmission loss due to the thin conductive shield is focused. The insufficient shielding performance for near magnetic field decreases the resistance due to the thin conductive shield. It is shown that the resistance due to the thin conductive shield at lower frequencies is smaller than that in the “thick conductive shield” case.
Yusuke FUKUSHIMA Ved P. KAFLE Hiroaki HARAI
Both placing responsibility of message sending on every IoT object and obfuscating the object's location from other objects are essential to realize a secure and privacy-preserved communication service. Two or more short-lived link identifiers (or pseudonyms) authorized by a trustable authority are often used in related studies, instead of a persistent or long-term use link identifier (i.e. vendor assigned MAC address). However, related studies have limitations in terms of frequently changing pseudonyms to enhance location privacy because the cryptographic algorithms used in them fixedly couple object's identifiers with its security keys. To overcome those limitations, we present a new pseudonym and key management scheme that enables dynamic coupling of pseudonym and key pairs without incurring any adverse impacts. Furthermore, we propose two lightweight pseudonym allocation protocols to effectively reduce the volume of message carrying the allocation parameters. Through qualitative analyses, we verify that the proposed scheme is more scalable than related approaches as it can efficiently allocate enough number of pseudonym/key pairs by reducing the control message overhead by more than 90%.
The combination of large-scale antenna arrays and simultaneous wireless information and power transfer (SWIPT), which can provide enormous increase of throughput and energy efficiency is a promising key in next generation wireless system (5G). This paper investigates efficient transceiver design to minimize transmit power, subject to users' required data rates and energy harvesting, in large-scale SWIPT system where the base station utilizes a very large number of antennas for transmitting both data and energy to multiple users equipped with time-switching (TS) or power-splitting (PS) receive structures. We first propose the well-known semidefinite relaxation (SDR) and Gaussian randomization techniques to solve the minimum transmit power problems. However, for these large-scale SWIPT problems, the proposed scheme, which is based on conventional SDR method, is not suitable due to its excessive computation costs, and a consensus alternating direction method of multipliers (ADMM) cannot be directly applied to the case that TS or PS ratios are involved in the optimization problem. Therefore, in the second solution, our first step is to optimize the variables of TS or PS ratios, and to achieve simplified problems. After then, we propose fast algorithms for solving these problems, where the outer loop of sequential parametric convex approximation (SPCA) is combined with the inner loop of ADMM. Numerical simulations show the fast convergence and superiority of the proposed solutions.
Yuma MATSUMOTO Takayuki OMORI Hiroya ITOGA Atsushi OHNISHI
In order to verify the correctness of functional requirements, we have been developing a verification method of the correctness of functional requirements specification using the Requirements Frame model. In this paper, we propose a verification method of non-functional requirements specification in terms of time-response requirements written with a natural language. We established a verification method by extending the Requirements Frame model. We have also developed a prototype system based on the method using Java. The extended Requirements Frame model and the verification method will be illustrated with examples.
Yuzo TAENAKA Kazuki MIZUYAMA Kazuya TSUKAMOTO
Applying Software Defined Network (SDN) technology to wireless networks are attracting much attention. Our previous study proposed a channel utilization method based on SDN/OpenFlow technology to improve the channel utilization efficiency of the multi-channel wireless backhaul network (WBN). However, since control messages are inherently transmitted with data traffic on a same channel in WBN, it inevitably degrades the network capacity. Specifically, the amount of control messages for collecting statistical information of each flow (FlowStats) linearly increases with the number of ongoing flows, thereby being the dominant overhead for backhaul networks. In this paper, we propose a new method that prevents the increase of control traffic while retaining the network performance of the previous method. Our proposed method uses statistical information of each interface (PortStats) instead of per-flow information (FlowStats), and handles multiple flows on the interface together if possible. Otherwise, to handle individual flow, we propose a way to estimate per-flow information without introducing extra control messages. Finally, we show that the proposed method offers the same performance with the previous method, while greatly reducing the amount of control traffic.
In order to enhance QoE of audio and video IP transmission, this paper proposes a method for mitigating the spatial quality impairment during burst loss periods over the wireless networks in the video output scheme SCS, which is a QoE-based video output scheme. SCS switches between two common video output schemes: frame skipping and error concealment. The proposed method pauses video output with an undamaged frame during the burst loss period in order not to pause video output on a degraded frame. We perform an experiment with constant thresholds, the table-lookup method, and the proposed method under various network conditions. The result shows that the effect of the proposed method on QoE can differ with the contents and GOP structures.
In this paper, we posit that, in future mobile network, network softwarization will be prevalent, and it becomes important to utilize deep machine learning within network to classify mobile traffic into fine grained slices, by identifying application types and devices so that we can apply Quality-of-Service (QoS) control, mobile edge/multi-access computing, and various network function per application and per device. This paper reports our initial attempt to apply deep machine learning for identifying application types from actual mobile network traffic captured from an MVNO, mobile virtual network operator and to design the system for classifying it to application specific slices.
Yewang QIAN Tingting ZHANG Haiyang ZHANG
In this letter, we consider a multiple-input multiple-output (MIMO) simultaneous wireless information and power transfer (SWIPT) system, in which the confidential message intended for the information receiver (IR) should be kept secret from the energy receiver (ER). Our goal is to design the optimal transmit covariance matrix so as to maximize the secrecy energy efficiency (SEE) of the system while guaranteeing the secrecy rate, energy harvesting and transmit power constraints. To deal with the original non-convex optimization problem, we propose an alternating optimization (AO)- based algorithm and also prove its convergence. Simulation results show that the proposed algorithm outperforms conventional design methods in terms of SEE.
Tianyi XIE Bin LYU Zhen YANG Feng TIAN
In this letter, we study a wireless powered communication network (WPCN) with non-orthogonal multiple access (NOMA), where the user clustering scheme that groups each two users in a cluster is adopted to guarantee the system performance. The two users in a cluster transmit data simultaneously via NOMA, while time division multiple access (TDMA) is used among clusters. We aim to maximize the system throughput by finding the optimal cluster permutation and the optimal time allocation, which can be obtained by solving the optimization problems corresponding to all cluster permutations. The closed-form solution of each optimization problem is obtained by exploiting its constraint structures. However, the complexity of this exhaustive method is quite high, we further propose a sub-optimal clustering scheme with low complexity. The simulation results demonstrate the superiority of the proposed scheme.
Cheng ZHANG Zhi LIU Bo GU Kyoko YAMORI Yoshiaki TANAKA
With the rapid increase in demand for mobile data, mobile network operators are trying to expand wireless network capacity by deploying wireless local area network (LAN) hotspots on to which they can offload their mobile traffic. However, these network-centric methods usually do not fulfill the interests of mobile users (MUs). Taking into consideration many issues such as different applications' deadlines, monetary cost and energy consumption, how the MU decides whether to offload their traffic to a complementary wireless LAN is an important issue. Previous studies assume the MU's mobility pattern is known in advance, which is not always true. In this paper, we study the MU's policy to minimize his monetary cost and energy consumption without known MU mobility pattern. We propose to use a kind of reinforcement learning technique called deep Q-network (DQN) for MU to learn the optimal offloading policy from past experiences. In the proposed DQN based offloading algorithm, MU's mobility pattern is no longer needed. Furthermore, MU's state of remaining data is directly fed into the convolution neural network in DQN without discretization. Therefore, not only does the discretization error present in previous work disappear, but also it makes the proposed algorithm has the ability to generalize the past experiences, which is especially effective when the number of states is large. Extensive simulations are conducted to validate our proposed offloading algorithms.
Shanming ZHANG Takehiro SATO Satoru OKAMOTO Naoaki YAMANAKA
The energy consumption of network virtualization environments (NVEs) has become a critical issue. In this paper, we focus on reducing the data switching energy consumption of NVE. We first analyze the data switching energy of NVE. Then, we propose a dynamic energy efficient virtual link resource reallocation (eEVLRR) approach for NVE. eEVLRR dynamically reallocates the energy efficient substrate resources (s-resources) for virtual links with dynamic changes of embeddable s-resources to save the data switching energy. In order to avoid traffic interruptions while reallocating, we design a cross layer application-session-based forwarding model for eEVLRR that can identify and forward each data transmission flow along the initial specified substrate data transport path until end without traffic interruptions. The results of performance evaluations show that eEVLRR not only guarantees the allocated s-resources of virtual links are continuously energy efficient to save data switching energy but also has positive impacts on virtual network acceptance rate, revenues and s-resources utilization.