Zhengyu ZHU Zhongyong WANG Zheng CHU Di ZHANG
In this letter, we consider robust beamforming optimization for a multiuser multiple-input single-output system with simultaneous wireless information and power transmission (SWIPT) for the case of imperfect channel state information. Adopting the ellipsoidal uncertainty on channel vector, the robust beamforming design are reformulated as convex semi-definite programming (SDP) by rank-one relaxation. To reduce the complexity, an ellipsoidal uncertainty on channel covariance is studied to derive the equivalent form of original problem. Simulation results are provided to demonstrate the effectiveness of the proposed schemes.
Sung-Hwa LIM Yeo-Hoon YOON Young-Bae KO Huhnkuk LIM
Information-Centric Networking (ICN) technology has recently been attracting substantial interest in the research community as one of the most promising future Internet architectures. The Named Data Networking (NDN) approach, which is one of the most recent instantiations of the ICN approach, would be a good choice for multimedia services, because NDN utilizes in-network storage embedded in NDN routers by caching recently or frequently requested contents. It is important to determine which data to cache at which NDN routers in order to achieve high performance, by considering not only the popularity of contents but also the inter-chunk popularity of a content item. This paper presents a chunk-block-based incremental caching scheme that considers both content and inter-chunk popularity. Our proposed scheme employs an incremental cache populating mechanism, which utilizes not only core-side but also edge-side NDN routers according to the request rate of the content item. Through simulations, we show that the proposed scheme achieves less delay, reduced redundant network traffic, and a higher cache hit ratio than legacy schemes.
The privacy of users' data has become a big issue for cloud service. This research focuses on image cloud database and the function of similarity search. To enhance security for such database, we propose a framework of privacy-enhanced search scheme, while all the images in the database are encrypted, and similarity image search is still supported.
Naoya TATE Tadashi KAWAZOE Shunsuke NAKASHIMA Wataru NOMURA Motoichi OHTSU
In order to realize high-yield speckle modulation, we developed a novel spatial light modulator using zinc oxide single crystal doped with nitrogen ions. The distribution of dopants was optimized to induce characteristic optical functions by applying an annealing method developed by us. The device is driven by a current in the in-plane direction, which induces magnetic fields. These fields strongly interact with the doped material, and the spatial distribution of the refractive index is correspondingly modulated via external control. Using this device, we experimentally demonstrated speckle modulation, and we discuss the quantitative superiority of our approach.
Yiqiang SHENG Jinlin WANG Yi LIAO Zhenyu ZHAO
Network intelligence is a discipline that builds on the capabilities of network systems to act intelligently by the usage of network resources for delivering high-quality services in a changing environment. Wide area network intelligence is a class of network intelligence in wide area network which covers the core and the edge of Internet. In this paper, we propose a system based on machine learning for wide area network intelligence. The whole system consists of a core machine for pre-training and many terminal machines to accomplish faster responses. Each machine is one of dual-hemisphere models which are made of left and right hemispheres. The left hemisphere is used to improve latency by terminal response and the right hemisphere is used to improve communication by data generation. In an application on multimedia service, the proposed model is superior to the latest deep feed forward neural network in the data center with respect to the accuracy, latency and communication. Evaluation shows scalable improvement with regard to the number of terminal machines. Evaluation also shows the cost of improvement is longer learning time.
Jinwoo LEE Jae Woo SEO Kookrae CHO Pil Joong LEE Juneyeun KIM Seung Hoon CHOI Dae Hyun YUM
The Android pattern unlock is a popular graphical password scheme, where a user is presented a 3×3 grid and required to draw a pattern on the onscreen grid. Each pattern is a sequence of at least four contact points with some restrictions. Theoretically, the security level of unlock patterns is determined by the size of the pattern space. However, the number of possible patterns is only known for 3×3 and 4×4 grids, which was computed by brute-force enumeration. The only mathematical formula for the number of possible patterns is a permutation-based upper bound. In this article, we present an improved upper bound by counting the number of “visible” points that can be directly reached by a point.
Kenta SERIZAWA Sayaka KAMEI Syuhei HAYASHI Satoshi FUJITA
In this paper, a new scheme for personalized web page recommendation using multi-user search engine query information is proposed. Our contribution is a scheme that improves the accuracy of personalization for various types of contents (e.g., documents, images and music) without increasing user burden. The proposed scheme combines “preference footprints” for browsed pages with collaborative filtering. We acquire user interest using words that are relevant to queries submitted by users, attach all user interests to a page as a footprint when it is browsed, and evaluate the relevance of web pages in relation to words in footprints. The performance of the scheme is evaluated experimentally. The results indicate that the proposed scheme improves the precision and recall of previous schemes by 1%-24% and 80%-107%, respectively.
Michael Andri WIJAYA Kazuhiko FUKAWA Hiroshi SUZUKI
In a network with dense deployment of multiple-input multiple-output (MIMO) small cells, coverage overlap between the small cells produces intercell-interference, which degrades system capacity. This paper proposes an intercell-interference management (IIM) scheme that aims to maximize system capacity by using both power control for intercell-interference coordination (ICIC) on the transmitter side and interference cancellation (IC) on the receiver side. The power control determines transmit power levels at the base stations (BSs) by employing a neural network (NN) algorithm over the backhaul. To further improve the signal to interference plus noise ratio (SINR), every user terminal (UT) employs a multiuser detector (MUD) as IC. The MUD detects not only the desired signals, but also some interfering signals to be cancelled from received signals. The receiver structure consists of branch metric generators (BMGs) and MUD. BMGs suppress residual interference and noise in the received signals by whitening matched filters (WMFs), and then generate metrices by using the WMFs' outputs and symbol candidates that the MUD provides. On the basis of the metrices, the MUD detects both the selected interfering signals and the desired signals. In addition, the MUD determines which interfering signals are detected by an SINR based replica selection algorithm. Computer simulations demonstrate that the SINR based replica selection algorithm, which is combined with channel encoders and packet interleavers, can significantly improve the system bit error rate (BER) and that combining IC at the receiver with NN power control at the transmitter can considerably increase the system capacity. Furthermore, it is shown that choosing the detected interfering signals by the replica selection algorithm can obtain system capacity with comparable loss and less computational complexity compared to the conventional greedy algorithm.
Rui WANG Qiaoyan WEN Hua ZHANG Sujuan QIN Wenmin LI
Tor's hidden services provide both sender privacy and recipient privacy to users. A hot topic in security of Tor is how to deanonymize its hidden services. Existing works proved that the recipient privacy could be revealed, namely a hidden server's real IP address could be located. However, the hidden service's circuit is bi-directionally anonymous, and the sender privacy can also be revealed. In this letter, we propose a novel approach that can transparently discover the client of the hidden service. Based on extensive analysis on the hidden service protocol, we find a combination of cells which can be used to generate a special traffic feature with the cell-padding mechanism of Tor. A user can implement some onion routers in Tor networks and monitor traffic passing through them. Once the traffic feature is discovered, the user confirms one of the controlled routers is chosen as the entry router, and the adjacent node is the client. Compared with the existing works, our approach does not disturb the normal communication of the hidden service. Simulations have demonstrated the effectiveness of our method.
Kazuyoshi SHOGEN Masashi KAMEI Susumu NAKAZAWA Shoji TANAKA
The indexes of the degradation of C/N, ΔT/T and I/N, which can be converted from one to another, are used to evaluate the impact of interference on the satellite link. However, it is not suitable to intuitively understand how these parameters degrade the quality of services. In this paper, we propose to evaluate the impact of interference on the performance of BSS (Broadcasting Satellite Services) in terms of the increase rate of the outage time caused by the rain attenuation. Some calculation results are given for the 12GHz band BSS in Japan.
Yilun WU Xinye LIN Xicheng LU Jinshu SU Peixin CHEN
Public auditing is a new technique to protect the integrity of outsourced data in the remote cloud. Users delegate the ability of auditing to a third party auditor (TPA), and assume that each result from the TPA is correct. However, the TPA is not always trustworthy in reality. In this paper, we consider a scenario in which the TPA may lower the reputation of the cloud server by cheating users, and propose a novel public auditing scheme to address this security issue. The analyses and the evaluation prove that our scheme is both secure and efficient.
Kai HUANG Ming XU Shaojing FU Yuchuan LUO
In a previous work [1], Wang et al. proposed a privacy-preserving outsourcing scheme for biometric identification in cloud computing, namely CloudBI. The author claimed that it can resist against various known attacks. However, there exist serious security flaws in their scheme, and it can be completely broken through a small number of constructed identification requests. In this letter, we modify the encryption scheme and propose an improved version of the privacy-preserving biometric identification design which can resist such attack and can provide a much higher level of security.
Tsuyoshi YOSHIDA Yoichiro TAKAYAMA Ryo ISHIKAWA Kazuhiko HONJO
A broadband miniature GaAs p-HEMT MMIC Doherty power amplifier (DPA) with a series connected load operating at the C band has been developed. To minimize the circuit size, a lumped-element load modulation circuit without a quarter wavelength transmission line has been introduced to MMIC technology. For both an input and output power divider/combiner circuit, two baluns are used to reduce the length of the phase adjuster circuit without causing instability. An inherent DPA instability problem related with the degenerated sub-harmonic frequency has been analyzed with the S and T parameters of DPA circuit components, resulting in a novel stabilized circuit. The developed stabilized DPA delivered a maximum power added efficiency (PAE) of 49% and a maximum output power of 23.4dBm. Greater than 40% PAE below a 10-dB input back-off from a saturated output power is obtained for a frequency range of 6.1 to 6.8GHz.
Along with remarkable advancement of radiocommunication services including satellite services, the radio-frequency spectrum and geostationary-satellite orbit are getting congested. WRC-15 was held in November 2015 to study and implement efficient use of those natural resources. There were a number of satellite-related agenda items associated with frequency allocation, new usages of satellite communications and satellite regulatory issues. This paper overviews the outcome from these agenda items of WRC-15 as well as the agenda items for the next WRC (i.e. the WRC-19).
Saho YAGYU Akie SAKIYAMA Yuichi TANAKA
We propose an edge-preserving multiscale image decomposition method using filters for non-equispaced signals. It is inspired by the domain transform, which is a high-speed edge-preserving smoothing method, and it can be used in many image processing applications. One of the disadvantages of the domain transform is sensitivity to noise. Even though the proposed method is based on non-equispaced filters similar to the domain transform, it is robust to noise since it employs a multiscale decomposition. It uses the Laplacian pyramid scheme to decompose an input signal into the piecewise-smooth components and detail components. We design the filters by using an optimization based on edge-preserving smoothing with a conversion of signal distances and filters taking into account the distances between signal intervals. In addition, we also propose construction methods of filters for non-equispaced signals by using arbitrary continuous filters or graph spectral filters in order that various filters can be accommodated by the proposed method. As expected, we find that, similar to state-of-the-art edge-preserving smoothing techniques, including the domain transform, our approach can be used in many applications. We evaluated its effectiveness in edge-preserving smoothing of noise-free and noisy images, detail enhancement, pencil drawing, and stylization.
Michio TAKIKAWA Yoshio INASAWA Hiroaki MIYASHITA Izuru NAITO
We investigate a phased array-fed dual reflector antenna applying one-dimensional beam-scanning of the center-fed type, using an elliptical aperture to provide wide area observation. The distinguishing feature of this antenna is its elliptical aperture shape, in which the aperture diameter differs between the forward satellite direction and the cross-section orthogonal to it. The shape in the plane of the forward satellite direction, which does not have a beam-scanning function, is a ring-focus Cassegrain antenna, and the shape in the plane orthogonal to that, which does have a beam-scanning function, is an imaging reflector antenna. This paper describes issues which arose during design of the elliptical aperture shape and how they were solved, and presents design results using elliptical aperture dimensions of 1600 mm × 600 mm, in which the beam width differs by more than two times in the orthogonal cross-section. The effectiveness of the antenna was verified by fabricating a prototype antenna based on the design results. Measurement results confirmed that an aperture efficiency of 50% or more could be achieved, and that a different beam width was obtained in the orthogonal plane in accordance with design values.
Yi WANG Baofeng JI Yongming HUANG Chunguo LI Ying HU Yewang QIAN Luxi YANG
This paper considers a massive multiple-input-multiple-output (MIMO) relaying system with multi-pair single-antenna users. The relay node adopts maximum-ratio combining/maximum-ratio transmission (MRC/MRT) stratagem for reception/transmission. We analyze the spectral efficiency (SE) and power scaling laws with respect to the number of relay antennas and other system parameters. First, by using the law of large numbers, we derive the closed-form expression of the SE, based on which, it is shown that the SE per user increases with the number of relay antennas but decreases with the number of user pairs, both logarithmically. It is further discovered that the transmit power at the source users and the relay can be continuously reduced as the number of relay antennas becomes large while the SE can maintains a constant value, which also means that the energy efficiency gain can be obtained simultaneously. Moreover, it is proved that the number of served user pairs can grow proportionally over the number of relay antennas with arbitrary SE requirement and no extra power cost. All the analytical results are verified through the numerical simulations.
DDoS remains a major threat to Software Defined Networks. To keep SDN secure, effective detection techniques for DDoS are indispensable. Most of the newly proposed schemes for detecting such attacks on SDN make the SDN controller act as the IDS or the central server of a collaborative IDS. The controller consequently becomes a target of the attacks and a heavy loaded point of collecting traffic. A collaborative intrusion detection system is proposed in this paper without the need for the controller to play a central role. It is deployed as a modified artificial neural network distributed over the entire substrate of SDN. It disperses its computation power over the network that requires every participating switch to perform like a neuron. The system is robust without individual targets and has a global view on a large-scale distributed attack without aggregating traffic over the network. Emulation results demonstrate its effectiveness.
In this paper, the integration of dynamic plant-wide optimization and distributed generalized predictive control (DGPC) is presented for serially connected processes. On the top layer, chance-constrained programming (CCP) is employed in the plant-wide optimization with economic and model uncertainties, in which the constraints containing stochastic parameters are guaranteed to be satisfied at a high level of probability. The deterministic equivalents are derived for linear and nonlinear individual chance constraints, and an algorithm is developed to search for the solution to the joint probability constrained problem. On the lower layer, the distributed GPC method based on neighborhood optimization with one-step delay communication is developed for on-line control of the whole system. Simulation studies for furnace temperature set-points optimization problem of the walking-beam-type reheating furnace are illustrated to verify the effectiveness and practicality of the proposed scheme.
Kazunori AKABANE Nobuaki MOCHIZUKI Shigeru TERUHI Mamoru KOBAYASHI Shuichi YOSHINO Masashi SHIMIZU Kazuhiro UEHARA
In the near future, many sensors and terminals will be connected to the public network to provide various convenient IoT/M2M services. In order to connect many sensors to the network efficiently, wireless communication systems in the 920MHz band are seen as attractive solutions. We are focusing on the 920MHz band to research and develop high-capacity protocols that can accommodate many terminals, and low power consumption technologies for battery-driven terminals. In this paper, we describe the following three concrete wireless systems that use our proposals. (1) A physical distribution pallet management system that can handle thousands of pallet-embedded sensors and a wireless module with a battery lifetime of about ten years. (2) Water leakage monitoring system for underground pipes by using sensors and a wireless module in each valve box. (3) A wide-area and high-capacity radio relay system for smart metering services like the reading of gas meters. The radio relay system can accommodate various sensors and terminals and has large potential for providing various IoT/M2M services in conjunction with smart metering services.