The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

2541-2560hit(16314hit)

  • Indoor and Outdoor Experiments of Downlink Transmission at 15-GHz Band for 5G Radio Access

    Kiichi TATEISHI  Daisuke KURITA  Atsushi HARADA  Yoshihisa KISHIYAMA  Takehiro NAKAMURA  Stefan PARKVALL  Erik DAHLMAN  Johan FURUSKOG  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/02/08
      Vol:
    E100-B No:8
      Page(s):
    1238-1246

    This paper presents indoor and outdoor experiments that confirm 4-Gbps throughput based on 400-MHz bandwidth transmission when applying carrier aggregation (CA) with 4 component carriers (CCs) and 4-by-4 single-user multiple-in multiple-out multiplexing (MIMO) in the 15-GHz frequency band in the downlink of 5G cellular radio access. A new radio interface with time division duplexing (TDD) and radio access based on orthogonal frequency-division multiple access (OFDMA) is implemented in a 5G testbed to confirm ultra-high speed transmission with low latency. The indoor experiment in an entrance hall shows that the peak throughput is 4.3Gbps in front of the base station (BS) antenna where the reference signal received power (RSRP) is -40dBm although the channel correlation at user equipment (UE) antenna is 0.8. The outdoor experiment in an open-space parking area shows that the peak throughput is 2.8Gbps in front of a BS antenna with a high RSRP although rank 2 is selected due to the high channel correlation. The results also show that the average throughput of 2Gbps is achieved 120m from the BS antenna. In a courtyard enclosed by building walls, 3.6Gbps is achieved in an outdoor-to-outdoor environment with a high RSRP and in an outdoor-to-indoor environment where the RSRP is lower due to the penetration loss of glass windows, but the multipath rich environment contributes to realizing the low channel correlation.

  • Iterative Reduction of Out-of-Band Power and Peak-to-Average Power Ratio for Non-Contiguous OFDM Systems Based on POCS

    Yanqing LIU  Liang DONG  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2017/02/17
      Vol:
    E100-B No:8
      Page(s):
    1489-1497

    Non-contiguous orthogonal frequency-division multiplexing (OFDM) is a promising technique for cognitive radio systems. The secondary users transmit on the selected subcarriers to avoid the frequencies being used by the primary users. However, the out-of-band power (OBP) of the OFDM-modulated tones induces interference to the primary users. Another major drawback of OFDM-based system is their high peak-to-average power ratio (PAPR). In this paper, algorithms are proposed to jointly reduce the OBP and the PAPR for non-contiguous OFDM based on the method of alternating projections onto convex sets. Several OFDM subcarriers are selected to accommodate the adjusting weights for OBP and PAPR reduction. The frequency-domain OFDM symbol is projected onto two convex sets that are defined according to the OBP requirements and the PAPR limits. Each projection iteration solves a convex optimization problem. The projection onto the set constrained by the OBP requirement can be calculated using an iterative algorithm which has low computational complexity. Simulation results show good performance of joint reduction of the OBP and the PAPR. The proposed algorithms converge quickly in a few iterations.

  • Experimental Investigation of Space Division Multiplexing on Massive Antenna Systems for Wireless Entrance

    Kazuki MARUTA  Atsushi OHTA  Satoshi KUROSAKI  Takuto ARAI  Masataka IIZUKA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/01/20
      Vol:
    E100-B No:8
      Page(s):
    1436-1448

    This paper experimentally verifies the potential of higher order space division multiplexing in line-of-sight (LOS) channels for multiuser massive MIMO. We previously proposed an inter-user interference (IUI) cancellation scheme and a simplified user scheduling method for Massive Antenna Systems for Wireless Entrance (MAS-WE). In order to verify the effectiveness of the proposed techniques, channel state information (CSI) for a 1×32 SIMO channel is measured in a real propagation environment with simplified test equipment. Evaluations of the measured CSI data confirm the effectiveness of our proposals; they offer good equal gain transmission (EGT) performance, reduced spatial correlation with enlarged angular gap between users, and quite small channel state fluctuation. Link level simulations elucidate that the simple IUI cancellation method is stable in practical conditions. The degradation in symbol error rate with the measured CSI, relative to that yielded by the output of the theoretical LOS channel model, is insignificant.

  • Exact Intersymbol Interference Analysis for Upsampled OFDM Signals with Symbol Timing Errors

    Heon HUH  Feng LU  James V. KROGMEIER  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/01/20
      Vol:
    E100-B No:8
      Page(s):
    1472-1479

    In OFDM systems, link performance depends heavily on the estimation of symbol-timing and frequency offsets. Performance sensitivity to these estimates is a major drawback of OFDM systems. Timing errors destroy the orthogonality of OFDM signals and lead to inter-symbol interference (ISI) and inter-carrier interference (ICI). The interference due to timing errors can be exploited as a metric for symbol-timing synchronization. In this paper, we propose a novel method to extract interference components using a DFT of the upsampled OFDM signals. Mathematical analysis and formulation are given for the dependence of interference on timing errors. From a numerical analysis, the proposed interference estimation shows robustness against channel dispersion.

  • Subarray Based Low Computational Design of Multiuser MIMO System Adopting Massive Transmit Array Antenna

    Tetsuki TANIGUCHI  Yoshio KARASAWA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/02/08
      Vol:
    E100-B No:8
      Page(s):
    1205-1214

    Massive multiple input multiple output (MIMO) communication system offers high rate transmission and/or support of a large number of users by invoking the power of a large array antenna, but one of its problem is the heavy computational burden required for the design and signal processing. Assuming the utilization of a large array in the transmitter side and much fewer users than the maximum possible value, this paper first presents a subarray based design approach of MIMO system with a low computational load taking into account efficient subarray grouping for the realization of higher performance; a large transmit array is first divided into subarrays based on channel gain or channel correlation, then block diagonalization is applied to each of them, and finally a large array weight is reconstructed by maximal ratio combining (MRC). In addition, the extension of the proposed method to two-stage design is studied in order to support a larger number of users; in the process of reconstruction to a large array, subarrays are again divided into groups, and block diagonalization is applied to those subarray groups. Through computer simulations, it is shown that the both channel gain and correlation based grouping strategies are effective under certain conditions, and that the number of supported users can be increased by two-stage design if certain level of performance degradation is acceptable.

  • Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces

    Yuta TAKATA  Mitsuaki AKIYAMA  Takeshi YAGI  Takeshi YADA  Shigeki GOTO  

     
    PAPER-Internet Security

      Pubricized:
    2017/05/18
      Vol:
    E100-D No:8
      Page(s):
    1714-1728

    An incident response organization such as a CSIRT contributes to preventing the spread of malware infection by analyzing compromised websites and sending abuse reports with detected URLs to webmasters. However, these abuse reports with only URLs are not sufficient to clean up the websites. In addition, it is difficult to analyze malicious websites across different client environments because these websites change behavior depending on a client environment. To expedite compromised website clean-up, it is important to provide fine-grained information such as malicious URL relations, the precise position of compromised web content, and the target range of client environments. In this paper, we propose a new method of constructing a redirection graph with context, such as which web content redirects to malicious websites. The proposed method analyzes a website in a multi-client environment to identify which client environment is exposed to threats. We evaluated our system using crawling datasets of approximately 2,000 compromised websites. The result shows that our system successfully identified malicious URL relations and compromised web content, and the number of URLs and the amount of web content to be analyzed were sufficient for incident responders by 15.0% and 0.8%, respectively. Furthermore, it can also identify the target range of client environments in 30.4% of websites and a vulnerability that has been used in malicious websites by leveraging target information. This fine-grained analysis by our system would contribute to improving the daily work of incident responders.

  • Node-to-Node Disjoint Paths Problem in Möbius Cubes

    David KOCIK  Keiichi KANEKO  

     
    PAPER-Dependable Computing

      Pubricized:
    2017/04/25
      Vol:
    E100-D No:8
      Page(s):
    1837-1843

    The Möbius cube is a variant of the hypercube. Its advantage is that it can connect the same number of nodes as a hypercube but with almost half the diameter of the hypercube. We propose an algorithm to solve the node-to-node disjoint paths problem in n-Möbius cubes in polynomial-order time of n. We provide a proof of correctness of the algorithm and estimate that the time complexity is O(n2) and the maximum path length is 3n-5.

  • Rapid Generation of the State Codebook in Side Match Vector Quantization

    Hanhoon PARK  Jong-Il PARK  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2017/05/16
      Vol:
    E100-D No:8
      Page(s):
    1934-1937

    Side match vector quantization (SMVQ) has been originally developed for image compression and is also useful for steganography. SMVQ requires to create its own state codebook for each block in both encoding and decoding phases. Since the conventional method for the state codebook generation is extremely time-consuming, this letter proposes a fast generation method. The proposed method is tens times faster than the conventional one without loss of perceptual visual quality.

  • HFSTE: Hybrid Feature Selections and Tree-Based Classifiers Ensemble for Intrusion Detection System

    Bayu Adhi TAMA  Kyung-Hyune RHEE  

     
    PAPER-Internet Security

      Pubricized:
    2017/05/18
      Vol:
    E100-D No:8
      Page(s):
    1729-1737

    Anomaly detection is one approach in intrusion detection systems (IDSs) which aims at capturing any deviation from the profiles of normal network activities. However, it suffers from high false alarm rate since it has impediment to distinguish the boundaries between normal and attack profiles. In this paper, we propose an effective anomaly detection approach by hybridizing three techniques, i.e. particle swarm optimization (PSO), ant colony optimization (ACO), and genetic algorithm (GA) for feature selection and ensemble of four tree-based classifiers, i.e. random forest (RF), naive bayes tree (NBT), logistic model trees (LMT), and reduces error pruning tree (REPT) for classification. Proposed approach is implemented on NSL-KDD dataset and from the experimental result, it significantly outperforms the existing methods in terms of accuracy and false alarm rate.

  • Development of Wireless Access and Flexible Networking Technologies for 5G Cellular Systems Open Access

    Seiichi SAMPEI  

     
    INVITED PAPER-Wireless Communication Technologies

      Pubricized:
    2017/02/08
      Vol:
    E100-B No:8
      Page(s):
    1174-1180

    This paper discusses key technologies specific for fifth generation (5G) cellular systems which are expected to connect internet of things (IoT) based vertical sectors. Because services for 5G will be expanded drastically, from information transfer services to mission critical and massive connection IoT connection services for vertical sectors, and requirement for cellular systems becomes quite different compared to that of fourth generation (4G) systems, after explanation for the service and technical trends for 5G, key wireless access technologies will be discussed, especially, from the view point of what is new and how import. In addition to the introduction of new technologies for wireless access, flexibility of networking is also discussed because it can cope with QoS support services, especially to cope with end-to-end latency constraint conditions. Therefore, this paper also discuss flexible network configuration using mobile edge computing (MEC) based on software defined network (SDN) and network slicing.

  • High-Voltage Power Line Communication in a Hybrid Vehicle

    Masaki TAKANASHI  Atsuhiro TAKAHASHI  Hiroya TANAKA  Hiroaki HAYASHI  Yoshiyuki HATTORI  

     
    PAPER-Communication Theory and Signals

      Vol:
    E100-A No:8
      Page(s):
    1705-1713

    Hybrid vehicles (HVs) and electric vehicles (EVs) have become widespread. These vehicles incorporate a large number of electronic devices, which requires the use of a high-voltage (200 V) battery. Power electronics devices driven by the 200 V battery is expected to increase in the future. As such, we herein propose a power line communication (PLC) method that uses a high-voltage power line. In the present paper, we first clarify the transmission channel through modeling of an equivalent circuit and channel measurement. We then conduct noise measurements and determine the noise characteristics of the proposed PLC. Finally, we evaluate the bit error rate performance through computer simulations based on the measured transmission channel and noise.

  • Variable Tap-Length NLMS Algorithm with Adaptive Parameter

    Yufei HAN  Mingjiang WANG  Boya ZHAO  

     
    LETTER-Digital Signal Processing

      Vol:
    E100-A No:8
      Page(s):
    1720-1723

    Improved fractional variable tap-length adaptive algorithm that contains Sigmoid limited fluctuation function and adaptive variable step-size of tap-length based on fragment-full error is presented. The proposed algorithm can solve many deficiencies in previous algorithm, comprising small convergence rate and weak anti-interference ability. The parameters are able to modify reasonably on the basis of different situations. The Sigmoid constrained function can decrease the fluctuant amplitude of the instantaneous errors effectively and improves the ability of anti-noise interference. Simulations demonstrate that the proposed algorithm equips better performance.

  • Experimental Trial of 5G Super Wideband Wireless Systems Using Massive MIMO Beamforming and Beam Tracking Control in 28GHz Band

    Tatsunori OBARA  Tatsuki OKUYAMA  Yuki INOUE  Yuuichi AOKI  Satoshi SUYAMA  Jaekon LEE  Yukihiko OKUMURA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/02/08
      Vol:
    E100-B No:8
      Page(s):
    1256-1268

    This paper presents some results of an experimental trial for the 5th generation (5G) wireless communication systems using 28GHz band. In order to tackle rapidly increasing traffic for 2020 and beyond, new radio access networks for the 5G mobile communication systems will introduce the use of higher frequency bands such as spectra higher than 10GHz to achieve higher capacity and super high bit rate transmission of several tens of Gbps. The target of this experimental trial is to evaluate the feasibility of using the 28GHz band with super-wide bandwidth of 800MHz for 5G wireless communication systems. To compensate large path-loss in higher frequency, the beamforming (BF) based on Massive multiple-input multiple-output (MIMO) is one of promising techniques and can be combined with spatial multiplexing of multiple data streams to achieve much higher capacity. In addition, to support the mobility of mobile station (MS), beam tracking technique is important. In this trial, we first conduct a basic experiment of single-stream transmission by using prototype system with base station (BS) having 96-element antenna and MS having 8-element antenna to evaluate the effectiveness of joint transmitter/receiver BF in 28GHz band in terms of coverage, impact of path loss, shadowing loss and penetration loss under indoor, outdoor and outdoor-to-indoor (O-to-I) environments. We show that by using 28 GHz band with BF based on Massive MIMO, higher throughput near 1.2Gbps can be achieved at many points in the indoor environment. It is also shown that the throughput of over 1Gbps can be achieved at points around 200m distant from BS in outdoor line-of-site (LOS) environment. Secondly, to evaluate the effectiveness of spatial multiplexing and beam tracking under more realistic environment, we also conduct the outdoor experiment of BF combined with 2-stream spatial multiplexing in high mobility environment with MS speed of up to 60km/h by using smartphone-shape MS antenna. We also show that maximum throughput of 3.77Gbps can be achieved with MS speed of 60km/h by using BF with 2-stream multiplexing and beam tracking.

  • A Third-Order Multibit Switched-Current Delta-Sigma Modulator with Switched-Capacitor Flash ADC and IDWA

    Guo-Ming SUNG  Leenendra Chowdary GUNNAM  Wen-Sheng LIN  Ying-Tzu LAI  

     
    PAPER-Electronic Circuits

      Vol:
    E100-C No:8
      Page(s):
    684-693

    This work develops a third-order multibit switched-current (SI) delta-sigma modulator (DSM) with a four-bit switched-capacitor (SC) flash analog-to-digital converter (ADC) and an incremental data weighted averaging circuit (IDWA), which is fabricated using 0.18µm 1P6M CMOS technology. In the proposed DSM, a 4-bit SC flash ADC is used to improve its resolution, and an IDWA is used to reduce the nonlinearity of digital-to-analog converter (DAC) by moving the quantization noise out of the signal band by first-order noise shaping. Additionally, the proposed differential sample-and-hold circuit (SH) exhibits low input impedance with feedback and width-length adjustment in the SI feedback memory cell (FMC) to increase the conversion rate. A coupled differential replicate (CDR) common-mode feedforward circuit (CMFF) is used to compensate for the mirror error that is caused by the current mirror. Measurements indicate that the signal-to-noise ratio (SNR), dynamic range (DR), effective number of bits (ENOB), power consumption, and chip area are 64.1 dB, 64.4 dB, 10.36 bits, 18.82 mW, and 0.45 × 0.67 mm2 (without I/O pad), respectively, with a bandwidth of 20 kHz, an oversampling ratio (OSR) of 256, a sampling frequency of 10.24 MHz, and a supply voltage of 1.8 V.

  • A Fast Updatable Implementation of Index Generation Functions Using Multiple IGUs

    Tsutomu SASAO  

     
    PAPER-Logic Design

      Pubricized:
    2017/05/19
      Vol:
    E100-D No:8
      Page(s):
    1574-1582

    This paper presents a method to realize index generation functions using multiple Index Generation Units (IGUs). The architecture implements index generation functions more efficiently than a single IGU when the number of registered vectors is very large. This paper proves that independent linear transformations are necessary in IGUs for efficient realization. Experimental results confirm this statement. Finally, it shows a fast update method to IGUs.

  • An Approach for Chinese-Japanese Named Entity Equivalents Extraction Using Inductive Learning and Hanzi-Kanji Mapping Table

    JinAn XU  Yufeng CHEN  Kuang RU  Yujie ZHANG  Kenji ARAKI  

     
    PAPER-Natural Language Processing

      Pubricized:
    2017/05/02
      Vol:
    E100-D No:8
      Page(s):
    1882-1892

    Named Entity Translation Equivalents extraction plays a critical role in machine translation (MT) and cross language information retrieval (CLIR). Traditional methods are often based on large-scale parallel or comparable corpora. However, the applicability of these studies is constrained, mainly because of the scarcity of parallel corpora of the required scale, especially for language pairs of Chinese and Japanese. In this paper, we propose a method considering the characteristics of Chinese and Japanese to automatically extract the Chinese-Japanese Named Entity (NE) translation equivalents based on inductive learning (IL) from monolingual corpora. The method adopts the Chinese Hanzi and Japanese Kanji Mapping Table (HKMT) to calculate the similarity of the NE instances between Japanese and Chinese. Then, we use IL to obtain partial translation rules for NEs by extracting the different parts from high similarity NE instances in Chinese and Japanese. In the end, the feedback processing updates the Chinese and Japanese NE entity similarity and rule sets. Experimental results show that our simple, efficient method, which overcomes the insufficiency of the traditional methods, which are severely dependent on bilingual resource. Compared with other methods, our method combines the language features of Chinese and Japanese with IL for automatically extracting NE pairs. Our use of a weak correlation bilingual text sets and minimal additional knowledge to extract NE pairs effectively reduces the cost of building the corpus and the need for additional knowledge. Our method may help to build a large-scale Chinese-Japanese NE translation dictionary using monolingual corpora.

  • Leveraging Compressive Sensing for Multiple Target Localization and Power Estimation in Wireless Sensor Networks

    Peng QIAN  Yan GUO  Ning LI  Baoming SUN  

     
    PAPER-Network

      Pubricized:
    2017/02/09
      Vol:
    E100-B No:8
      Page(s):
    1428-1435

    The compressive sensing (CS) theory has been recognized as a promising technique to achieve the target localization in wireless sensor networks. However, most of the existing works require the prior knowledge of transmitting powers of targets, which is not conformed to the case that the information of targets is completely unknown. To address such a problem, in this paper, we propose a novel CS-based approach for multiple target localization and power estimation. It is achieved by formulating the locations and transmitting powers of targets as a sparse vector in the discrete spatial domain and the received signal strengths (RSSs) of targets are taken to recover the sparse vector. The key point of CS-based localization is the sensing matrix, which is constructed by collecting RSSs from RF emitters in our approach, avoiding the disadvantage of using the radio propagation model. Moreover, since the collection of RSSs to construct the sensing matrix is tedious and time-consuming, we propose a CS-based method for reconstructing the sensing matrix from only a small number of RSS measurements. It is achieved by exploiting the CS theory and designing an difference matrix to reveal the sparsity of the sensing matrix. Finally, simulation results demonstrate the effectiveness and robustness of our localization and power estimation approach.

  • Zigzag Decodable Fountain Codes

    Takayuki NOZAKI  

     
    PAPER-Coding Theory

      Vol:
    E100-A No:8
      Page(s):
    1693-1704

    This paper proposes a fountain coding system which has lower decoding erasure rate and lower space complexity of the decoding algorithm than the Raptor coding systems. A main idea of the proposed fountain code is employing shift and exclusive OR to generate the output packets. This technique is known as the zigzag decodable code, which is efficiently decoded by the zigzag decoder. In other words, we propose a fountain code based on the zigzag decodable code in this paper. Moreover, we analyze the overhead, decoding erasure rate, decoding complexity, and asymptotic overhead of the proposed fountain code. As a result, we show that the proposed fountain code outperforms the Raptor codes in terms of the overhead and decoding erasure rate. Simulation results show that the proposed fountain coding system outperforms Raptor coding system in terms of the overhead and the space complexity of decoding.

  • Hierarchical Formal Verification Combining Algebraic Transformation with PPRM Expansion and Its Application to Masked Cryptographic Processors

    Rei UENO  Naofumi HOMMA  Takafumi AOKI  Sumio MORIOKA  

     
    PAPER

      Vol:
    E100-A No:7
      Page(s):
    1396-1408

    This paper presents an automatic hierarchical formal verification method for arithmetic circuits over Galois fields (GFs) which are dedicated digital circuits for GF arithmetic operations used in cryptographic processors. The proposed verification method is based on a combination of a word-level computer algebra procedure with a bit-level PPRM (Positive Polarity Reed-Muller) expansion procedure. While the application of the proposed verification method is not limited to cryptographic processors, these processors are our important targets because complicated implementation techniques, such as field conversions, are frequently used for side-channel resistant, compact and low power design. In the proposed method, the correctness of entire datapath is verified over GF(2m) level, or word-level. A datapath implementation is represented hierarchically as a set of components' functional descriptions over GF(2m) and their wiring connections. We verify that the implementation satisfies a given total-functional specification over GF(2m), by using an automatic algebraic method based on the Gröbner basis and a polynomial reduction. Then, in order to verify whether each component circuit is correctly implemented by combination of GF(2) operations, i.e. logic gates in bit-level, we use our fast PPRM expansion procedure which is customized for handling large-scale Boolean expressions with many variables. We have applied the proposed method to a complicated AES (Advanced Encryption Standard) circuit with a masking countermeasure against side-channel attack. The results show that the proposed method can verify such practical circuit automatically within 4 minutes, while any single conventional verification methods fail within a day or even more.

  • Three-Dimensional Quaternionic Hopfield Neural Networks

    Masaki KOBAYASHI  

     
    LETTER-Nonlinear Problems

      Vol:
    E100-A No:7
      Page(s):
    1575-1577

    Quaternionic neural networks are extensions of neural networks using quaternion algebra. 3-D and 4-D quaternionic MLPs have been studied. 3-D quaternionic neural networks are useful for handling 3-D objects, such as Euclidean transformation. As for Hopfield neural networks, only 4-D quaternionic Hopfield neural networks (QHNNs) have been studied. In this work, we propose the 3-D QHNNs. Moreover, we define the energy, and prove that it converges.

2541-2560hit(16314hit)