Kazutaka HARA Atsuko KAWAKITA Yasutaka KIMURA Yasuhiro SUZUKI Satoshi IKEDA Kohji TSUJI
A long-reach coexisting PON system (1G/10G-EPON, video, and TWDM-PON) that uses the Wavelength Selective-Asymmetrical optical SPlitter (WS-ASP) without any active devices like optical amplifiers is proposed. The proposal can take into account the subscriber distribution in an access network and provide specific services in specific areas by varying the splitting ratios and the branch structure in the optical splitter. Simulations confirm the key features of WS-ASP, its novel process for deriving the splitting-ratios and greater transmission distance than possible with symmetrical splitters. Experiments on a prototype system demonstrate how wavelengths can be assigned to specific areas and optical link budget enhancement. For 1G-EPON systems, the prototype system with splitting-ratio of 60% attains the optical link budget enhancement of 4.2dB compared with conventional symmetrical optical splitters. The same prototype offers the optical link budget enhancement of 4.0dB at the bit rate of 10G-EPON systems. The values measured in the experiment agree well with the simulation results with respect to the transmission distance.
Masato TOMIYASU Keita MORIMOTO Akito IGUCHI Yasuhide TSUJI
In this paper, we reformulate a sensitivity analysis method for function-expansion-based topology optimization method without using gray area. In the conventional approach based on function expansion method, permittivity distribution contains gray materials, which are intermediate materials between core and cladding ones, so as to let the permittivity differentiable with respect to design variables. Since this approach using gray area dose not express material boundary exactly, it is not desirable to apply this approach to design problems of strongly guiding waveguide devices, especially for plasmonic waveguides. In this study, we present function-expansion-method-based topology optimization without gray area. In this approach, use of gray area can be avoided by replacing the area integral of the derivative of the matrix with the line integral taking into acount the rate of boundary deviation with respect to design variables. We verify the validity of our approach through applying it to design problems of a T-branching power splitter and a mode order converter.
Yoshiki KAYANO Yoshio KAMI Fengchao XIAO
For actual multi-channel differential signaling system, the ideal balance or symmetrical topology cannot be established, and hence, an imbalance component is excited. However a theoretical analysis method of evaluating the voltage and current distribution on the differential-paired lines, which allows to anticipate EM radiation at the design stage and to study possible means for suppressing imbalance components, has not been implemented. To provide the basic considerations for electromagnetic (EM) radiation from practical asymmetrical differential-paired lines structure with equi-length routing used in high-speed board design, this paper newly proposes an analytical method for evaluating the voltage and current at any point on differential-paired lines by expressing the differential paired-lines with an equivalent source circuit and an equivalent load circuit. The proposed method can predict S-parameters, distributions of voltage and current and EM radiation with sufficient accuracy. In addition, the proposed method provides enough flexibility for different geometric parameters and can be used to develop physical insights and design guidelines. This study has successfully established a basic method to effectively predict signal integrity and EM interference issues on a differential-paired lines.
Satomu YASUDA Yukihisa SUZUKI Keiji WADA
An active gate driver IC generates arbitrary switching waveform is proposed to reduce the switching loss, the voltage overshoot, and the electromagnetic interference (EMI) by optimizing the switching pattern. However, it is hard to find optimal switching pattern because the switching pattern has huge possible combinations. In this paper, the method to estimate the switching loss and the voltage overshoot from the switching pattern with neural network (NN) is proposed. The implemented NN model obtains reasonable learning results for data-sets.
Yohei SOBU Shinsuke TANAKA Yu TANAKA
Silicon photonics technology is a promising candidate for small form factor transceivers that can be used in data-center applications. This technology has a small footprint, a low fabrication cost, and good temperature immunity. However, its main challenge is due to the high baud rate operation for optical modulators with a low power consumption. This paper investigates an all-Silicon Mach-Zehnder modulator based on the lumped-electrode optical phase shifters. These phase shifters are driven by a complementary metal oxide semiconductor (CMOS) inverter driver to achieve a low power optical transmitter. This architecture improves the power efficiency because an electrical digital-to-analog converter (DAC) and a linear driver are not required. In addition, the current only flows at the time of data transition. For this purpose, we use a PIN-diode phase shifter. These phase shifters have a large capacitance so the driving voltage can be reduced while maintaining an optical phase shift. On the other hand, this study integrates a passive resistance-capacitance (RC) equalizer with a PIN-phase shifter to expand the electro-optic (EO) bandwidth of a modulator. Therefore, the modulation efficiency and the EO bandwidth can be optimized by designing the capacitor of the RC equalizer. This paper reviews the recent progress for the high-speed operation of an all-Si PIN-RC modulator. This study introduces a metal-insulator-metal (MIM) structure for a capacitor with a passive RC equalizer to obtain a wider EO bandwidth. As a result, this investigation achieves an EO bandwidth of 35.7-37 GHz and a 70 Gbaud NRZ operation is confirmed.
The injection locking properties of rotary dissipative solitons developed in a closed traveling-wave field-effect transistor (TWFET) are examined. A TWFET can support the waveform-invariant propagation of solitary pulses called dissipative solitons (DS) by balancing dispersion, nonlinearity, dissipation, and field-effect transistor gain. Applying sinusoidal signals to the closed TWFET assumes the injection-locked behavior of the rotary DS; the solitons' velocity is autonomously tuned to match the rotation and external frequencies. This study clarifies the qualitative properties of injection-locked DS using numerical and experimental approaches.
Yuto SAGAE Takashi MATSUI Taiji SAKAMOTO Kazuhide NAKAJIMA
We propose an ultra-low inter-core crosstalk (XT) multi-core fiber (MCF) with standard 125-μm cladding. We show the fiber design and fabrication results of an MCF housing four cores with W-shaped index profile; it offers XT of less than -67dB/km over the whole C+L band. This enables us to realize 10,000-km transmission with negligible XT penalty. We also observe a low-loss of 0.17dB/km (average) at a wavelength of 1.55μm and other optical properties compatible with ITU-T G.654.B fiber. We also elucidate its good micro-bend resistance in terms of both the loss and XT to confirm its applicability to high-density optical fiber cables. Finally, we show that the fabricated MCF is feasible along with long-distance transmission by confirming that the XT noise performance corresponds to transmission distances of 10,000km or more.
We propose a nonphotorealistic rendering method for generating checkered pattern images from photographic images. The proposed method is executed by iterative calculation using a Prewitt filter with an expanded window size and can automatically generate checkered patterns according to changes in edges and shade of photographic images. To verify the effectiveness of the proposed method, an experiment was conducted using various photographic images. An additional experiment was conducted to visually confirm the checkered pattern images generated by changing the iteration number, window size, and parameter to emphasize the checkered patterns.
Ryo IGARASHI Masamichi FUJIWARA Takuya KANAI Hiro SUZUKI Jun-ichi KANI Jun TERADA
Effective user accommodation will be more and more important in passive optical networks (PONs) in the next decade since the number of subscribers has been leveling off as well and it is becoming more difficult for network operators to keep sufficient numbers of maintenance workers. Drastically reducing the number of small-scale communication buildings while keeping the number of accommodated users is one of the most attractive solutions to meet this situation. To achieve this, we propose two types of long-reach repeater-free upstream transmission configurations for PON systems; (i) one utilizes a semiconductor optical amplifier (SOA) as a pre-amplifier and (ii) the other utilizes distributed Raman amplification (DRA) in addition to the SOA. Our simulations assuming 10G-EPON specifications and transmission experiments on a 10G-EPON prototype confirm that configuration (i) can add a 17km trunk fiber to a normal PON system with 10km access reach and 1 : 64 split (total 27km reach), while configuration (ii) can further expand the trunk fiber distance to 37km (total 47km reach). Network operators can select these configurations depending on their service areas.
Haiyang LIU Hao ZHANG Lianrong MA Lingjun KONG
In this letter, the structural analysis of nonbinary cyclic and quasi-cyclic (QC) low-density parity-check (LDPC) codes with α-multiplied parity-check matrices (PCMs) is concerned. Using analytical methods, several structural parameters of nonbinary cyclic and QC LDPC codes with α-multiplied PCMs are determined. In particular, some classes of nonbinary LDPC codes constructed from finite fields and finite geometries are shown to have good minimum and stopping distances properties, which may explain to some extent their wonderful decoding performances.
Dongliang CHEN Peng SONG Wenjing ZHANG Weijian ZHANG Bingui XU Xuan ZHOU
In this letter, we propose a novel robust transferable subspace learning (RTSL) method for cross-corpus facial expression recognition. In this method, on one hand, we present a novel distance metric algorithm, which jointly considers the local and global distance distribution measure, to reduce the cross-corpus mismatch. On the other hand, we design a label guidance strategy to improve the discriminate ability of subspace. Thus, the RTSL is much more robust to the cross-corpus recognition problem than traditional transfer learning methods. We conduct extensive experiments on several facial expression corpora to evaluate the recognition performance of RTSL. The results demonstrate the superiority of the proposed method over some state-of-the-art methods.
This paper proposes a deterministic pilot pattern placement optimization scheme based on the quantum genetic algorithm (QGA) which aims to improve the performance of sparse channel estimation in orthogonal frequency division multiplexing (OFDM) systems. By minimizing the mutual incoherence property (MIP) of the sensing matrix, the pilot pattern placement optimization is modeled as the solution of a combinatorial optimization problem. QGA is used to solve the optimization problem and generate optimized pilot pattern that can effectively avoid local optima traps. The simulation results demonstrate that the proposed method can generate a sensing matrix with a smaller MIP than a random search or the genetic algorithm (GA), and the optimized pilot pattern performs well for sparse channel estimation in OFDM systems.
Ryo SHIBATA Gou HOSOYA Hiroyuki YASHIMA
Over the past two decades, irregular low-density parity-check (LDPC) codes have not been able to decode information corrupted by insertion and deletion (ID) errors without markers. In this paper, we bring to light the existence of irregular LDPC codes that approach the symmetric information rates (SIR) of the channel with ID errors, even without markers. These codes have peculiar shapes in their check-node degree distributions. Specifically, the check-node degrees are scattered and there are degree-2 check nodes. We propose a code construction method based on the progressive edge-growth algorithm tailored for the scattered check-node degree distributions, which enables the SIR-approaching codes to progress in the finite-length regime. Moreover, the SIR-approaching codes demonstrate asymptotic and finite-length performance that outperform the existing counterparts, namely, concatenated coding of irregular LDPC codes with markers and spatially coupled LDPC codes.
Secure multi-party computation (MPC) allows a set of parties to compute a function jointly while keeping their inputs private. MPC has been actively studied, and there are many research results both in the theoretical and practical research fields. In this paper, we introduce the basic matters on MPC and show recent practical advances. We first explain the settings, security notions, and cryptographic building blocks of MPC. Then, we show and discuss current situations on higher-level secure protocols, privacy-preserving data analysis, and frameworks/compilers for implementing MPC applications with low-cost.
Khilda AFIFAH Nicodimus RETDIAN
Hum noise such as power line interference is one of the critical problems in the biomedical signal acquisition. Various techniques have been proposed to suppress power line interference. However, some of the techniques require more components and power consumption. The notch depth in the conventional N-path notch filter circuits needs a higher number of paths and switches off-resistance. It makes the conventional N-path notch filter less of efficiency to suppress hum noise. This work proposed the new N-path notch filter to hum noise suppression in biomedical signal acquisition. The new N-path notch filter achieved notch depth above 40dB with sampling frequency 50Hz and 60Hz. Although the proposed circuits use less number of path and switches off-resistance. The proposed circuit has been verified using artificial ECG signal contaminated by hum noise at frequency 50Hz and 60Hz. The output of N-path notch filter achieved a noise-free signal even if the sampling frequency changes.
Junjun ZHENG Hiroyuki OKAMURA Tadashi DOHI
In this paper, we present non-Markovian availability models for capturing the dynamics of system behavior of an operational software system that undergoes aperiodic time-based software rejuvenation and checkpointing. Two availability models with rejuvenation are considered taking account of the procedure after the completion of rollback recovery operation. We further proceed to investigate whether there exists the optimal rejuvenation schedule that maximizes the steady-state system availability, which is derived by means of the phase expansion technique, since the resulting models are not the trivial stochastic models such as semi-Markov process and Markov regenerative process, so that it is hard to solve them by using the common approaches like Laplace-Stieltjes transform and embedded Markov chain techniques. The numerical experiments are conducted to determine the optimal rejuvenation trigger timing maximizing the steady-state system availability for each availability model, and to compare both two models.
Almost all existing password-based authenticated key exchange (PAKE) schemes achieve concurrent security in the standard model by relying on the common reference string (CRS) model. A drawback of the CRS model is to require a centralized trusted authority in the setup phase; thus, passwords of parties may be revealed if the authority ill-uses trapdoor information of the CRS. There are a few secure PAKE schemes in the plain model, but, these are not achievable in a constant round (i.e., containing a linear number of rounds). In this paper, we discuss how to relax the setup assumption for (constant round) PAKE schemes. We focus on the multi-string (MS) model that allows a number of authorities (including malicious one) to provide some reference strings independently. The MS model is a more relaxed setup assumption than the CRS model because we do not trust any single authority (i.e., just assuming that a majority of authorities honestly generate their reference strings). Though the MS model is slightly restrictive than the plain model, it is very reasonable assumption because it is very easy to implement. We construct a (concurrently secure) three-move PAKE scheme in the MS model (justly without random oracles) based on the Groce-Katz PAKE scheme. The main ingredient of our scheme is the multi-string simulation-extractable non-interactive zero-knowledge proof that provides both the simulation-extractability and the extraction zero-knowledge property even if minority authorities are malicious. This work can be seen as a milestone toward constant round PAKE schemes in the plain model.
Eiji MIYANO Toshiki SAITOH Ryuhei UEHARA Tsuyoshi YAGITA Tom C. van der ZANDEN
This paper introduces the maximization version of the k-path vertex cover problem, called the MAXIMUM K-PATH VERTEX COVER problem (MaxPkVC for short): A path consisting of k vertices, i.e., a path of length k-1 is called a k-path. If a k-path Pk includes a vertex v in a vertex set S, then we say that v or S covers Pk. Given a graph G=(V, E) and an integer s, the goal of MaxPkVC is to find a vertex subset S⊆V of at most s vertices such that the number of k-paths covered by S is maximized. The problem MaxPkVC is generally NP-hard. In this paper we consider the tractability/intractability of MaxPkVC on subclasses of graphs. We prove that MaxP3VC remains NP-hard even for split graphs. Furthermore, if the input graph is restricted to graphs with constant bounded treewidth, then MaxP3VC can be solved in polynomial time.
Tsunehiro YOSHINAGA Makoto SAKAMOTO
This paper investigates the closure properties of multi-inkdot nondeterministic Turing machines with sublogarithmic space. We show that the class of sets accepted by the Turing machines is not closed under concatenation with regular set, Kleene closure, length-preserving homomorphism, and intersection.
In this paper, we propose a secure computation of sparse coding and its application to Encryption-then-Compression (EtC) systems. The proposed scheme introduces secure sparse coding that allows computation of an Orthogonal Matching Pursuit (OMP) algorithm in an encrypted domain. We prove theoretically that the proposed method estimates exactly the same sparse representations that the OMP algorithm for non-encrypted computation does. This means that there is no degradation of the sparse representation performance. Furthermore, the proposed method can control the sparsity without decoding the encrypted signals. Next, we propose an EtC system based on the secure sparse coding. The proposed secure EtC system can protect the private information of the original image contents while performing image compression. It provides the same rate-distortion performance as that of sparse coding without encryption, as demonstrated on both synthetic data and natural images.