The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Ti(30728hit)

1001-1020hit(30728hit)

  • Opportunities, Challenges, and Solutions in the 5G Era Open Access

    Chien-Chi KAO  Hey-Chyi YOUNG  

     
    INVITED PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1291-1298

    For many countries in the world, 5G is of strategic significance. In the 5G era, telecom operators are expected to enable and provide multiple services with different communication characteristics like enhanced broadband, ultra-reliable and extreme real-time communications at the same time. To meet the requirements, the 5G network essentially will be more complex compared with traditional 3G/4G networks. The unique characteristics of 5G resulted from new technologies bring a lot of opportunities as well as significant challenges. In this paper we first introduce 5G vision and check the global status. And then we illustrate the 5G technical essentials and point out the new opportunities that 5G will bring to us. We also highlight the coming challenges and share our 5G experience and solutions toward 5G vision in many aspects, including network, management and business.

  • Convergence of the Hybrid Implicit-Explicit Single-Field FDTD Method Based on the Wave Equation of Electric Field

    Kazuhiro FUJITA  

     
    BRIEF PAPER

      Pubricized:
    2022/03/24
      Vol:
    E105-C No:11
      Page(s):
    696-699

    The hybrid implicit-explicit single-field finite-difference time-domain (HIE-SF-FDTD) method based on the wave equation of electric field is reformulated in a concise matrix-vector form. The global approximation error of the scheme is discussed theoretically. The second-order convergence of the HIE-SF-FDTD is numerically verified.

  • Multi-Target Position and Velocity Estimation Algorithm Based on Time Delay and Doppler Shift in Passive MIMO Radar

    Yao ZHOU  Hairui YU  Wenjie XU  Siyi YAO  Li WANG  Hongshu LIAO  Wanchun LI  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2022/05/18
      Vol:
    E105-A No:11
      Page(s):
    1466-1477

    In this paper, a passive multiple-input multiple-output (MIMO) radar system with widely separated antennas that estimates the positions and velocities of multiple moving targets by utilizing time delay (TD) and doppler shift (DS) measurements is proposed. Passive radar systems can detect targets by using multiple uncoordinated and un-synchronized illuminators and we assume that all the measurements including TD and DS have been known by a preprocessing method. In this study, the algorithm can be divided into three stages. First, based on location information within a certain range and utilizing the DBSCAN cluster algorithm we can obtain the initial position of each target. In the second stage according to the correlation between the TD measurements of each target in a specific receiver and the DSs, we can find the set of DS measurements for each target. Therefore, the initial speed estimated values can be obtained employing the least squares (LS) method. Finally, maximum likelihood (ML) estimation of a first-order Taylor expansion joint TD and DS is applied for a better solution. Extensive simulations show that the proposed algorithm has a good estimation performance and can achieve the Cramér-Rao lower bound (CRLB) under the condition of moderate measurement errors.

  • Order Statistics Based Low-Power Flash ADC with On-Chip Comparator Selection

    Takehiro KITAMURA  Mahfuzul ISLAM  Takashi HISAKADO  Osami WADA  

     
    PAPER

      Pubricized:
    2022/05/13
      Vol:
    E105-A No:11
      Page(s):
    1450-1457

    High-speed flash ADCs are useful in high-speed applications such as communication receivers. Due to offset voltage variation in the sub-micron processes, the power consumption and the area increase significantly to suppress variation. As an alternative to suppressing the variation, we have developed a flash ADC architecture that selects the comparators based on offset voltage ranking for reference generation. Specifically, with the order statistics as a basis, our method selects the minimum number of comparators to obtain equally spaced reference values. Because the proposed ADC utilizes offset voltages as references, no resistor ladder is required. We also developed a time-domain sorting mechanism for the offset voltages to achieve on-chip comparator selection. We first perform a detailed analysis of the order statistics based selection method and then design a 4-bit ADC in a commercial 65-nm process and perform transistor-level simulation. When using 127 comparators, INLs of 20 virtual chips are in the range of -0.34LSB/+0.29LSB to -0.83LSB/+0.74LSB, and DNLs are in the range of -0.33LSB/+0.24LSB to -0.77LSB/+1.18LSB at 1-GS/s operation. Our ADC achieves the SNDR of 20.9dB at Nyquist-frequency input and the power consumption of 0.84mW.

  • An Adaptive Multilook Approach of Multitemporal Interferometry Based on Complex Covariance Matrix for SAR Small Datasets

    Jingke ZHANG  Huina SONG  Mengyuan WANG  Zhaoyang QIU  Xuyang TENG  Qi ZHANG  

     
    LETTER-Image

      Pubricized:
    2022/05/13
      Vol:
    E105-A No:11
      Page(s):
    1517-1521

    Adaptive multilooking is a critical processing step in multi-temporal interferometric synthetic aperture radar (InSAR) measurement, especially in small temporal baseline subsets. Various amplitude-based adaptive multilook approaches have been proposed for the improvement of interferometric processing. However, the phase signal, which is fundamental in interferometric systems, is typically ignored in these methods. To fully exploit the information in complex SAR images, a nonlocal adaptive multilooking is proposed based on complex covariance matrix in this work. The complex signal is here exploited for the similiarity measurement between two pixels. Given the complexity of objects in SAR images, structure feature detection is introduced to adaptively estimate covariance matrix. The effectiveness and reliability of the proposed approach are demonstrated with experiments both on simulated and real data.

  • Practical Order-Revealing Encryption with Short Ciphertext

    Taek Young YOUN  Bo Sun KWAK  Seungkwang LEE  Hyun Sook RHEE  

     
    LETTER

      Pubricized:
    2022/07/19
      Vol:
    E105-D No:11
      Page(s):
    1934-1937

    To support secure database management, a number of value-added encryption schemes have been studied including order-revealing encryption (ORE) schemes. One of outstanding features of ORE schemes is the efficiency of range queries in an encrypted form. Compared to existing encryption methods, ORE leads to an increase in the length of ciphertexts. To improve the efficiency of ORE schemes in terms of the length of ciphertext, a new ORE scheme with shorter ciphertext has been proposed by Kim. In this paper, we revisit Kim's ORE scheme and show that the length of ciphertexts is not as short as analyzed in their paper. We also introduce a simple modification reducing the memory requirement than existing ORE schemes.

  • Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things

    Gyeongjin RA  Su-hyun KIM  Imyeong LEE  

     
    PAPER

      Pubricized:
    2022/07/28
      Vol:
    E105-D No:11
      Page(s):
    1857-1871

    Recently, the adoption of the industrial Internet of things (IIoT) has optimized many industrial sectors and promoted industry “smartization.” Smart factories and smart industries connect the real and virtual worlds through cyber-physical systems (CPS). However, these linkages will increase the cyber security danger surface to new levels, putting millions of dollars' worth of assets at risk if communications in big network systems like IIoT settings are left unsecured. To solve these problems, the fundamental method is security, such as authentication and confidentiality, and it should require the encryption key. However, it is challenging the security performance with the limited performance of the sensor. Blockchain-based identity management is emerging for lightweight, integrity and persistence. However, the key generation and management issues of blockchain face the same security performance issues. First, through blockchain smart contracts and hierarchical deterministic (HD) wallets, hierarchical key derivation efficiently distributes and manages keys by line and group in the IIoT environment. Second, the pairing verification value based on an elliptic curve single point called Root Signature performs efficient public key certificate registration and verification and improves the key storage space. Third, the identity log recorded through the blockchain is the global transparency of the key lifecycle, providing system reliability from various security attacks. Keyless Signature Infrastructure (KSI) is adopted to perform efficiently via hash-based scheme (hash calendar, hash tree etc.). We analyze our framework compared to hash-based state commitment methods. Accordingly, our method achieves a calculation efficiency of O(nlog N) and a storage space saving of 60% compared to the existing schemes.

  • Finite-Horizon Optimal Spatio-Temporal Pattern Control under Spatio-Temporal Logic Specifications

    Takuma KINUGAWA  Toshimitsu USHIO  

     
    PAPER

      Pubricized:
    2022/04/08
      Vol:
    E105-D No:10
      Page(s):
    1658-1664

    In spatially distributed systems such as smart buildings and intelligent transportation systems, control of spatio-temporal patterns is an important issue. In this paper, we consider a finite-horizon optimal spatio-temporal pattern control problem where the pattern is specified by a signal spatio-temporal logic formula over finite traces, which will be called an SSTLf formula. We give the syntax and Boolean semantics of SSTLf. Then, we show linear encodings of the temporal and spatial operators used in SSTLf and we convert the problem into a mixed integer programming problem. We illustrate the effectiveness of this proposed approach through an example of a heat system in a room.

  • Penalized and Decentralized Contextual Bandit Learning for WLAN Channel Allocation with Contention-Driven Feature Extraction

    Kota YAMASHITA  Shotaro KAMIYA  Koji YAMAMOTO  Yusuke KODA  Takayuki NISHIO  Masahiro MORIKURA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2022/04/11
      Vol:
    E105-B No:10
      Page(s):
    1268-1279

    In this study, a contextual multi-armed bandit (CMAB)-based decentralized channel exploration framework disentangling a channel utility function (i.e., reward) with respect to contending neighboring access points (APs) is proposed. The proposed framework enables APs to evaluate observed rewards compositionally for contending APs, allowing both robustness against reward fluctuation due to neighboring APs' varying channels and assessment of even unexplored channels. To realize this framework, we propose contention-driven feature extraction (CDFE), which extracts the adjacency relation among APs under contention and forms the basis for expressing reward functions in disentangled form, that is, a linear combination of parameters associated with neighboring APs under contention). This allows the CMAB to be leveraged with a joint linear upper confidence bound (JLinUCB) exploration and to delve into the effectiveness of the proposed framework. Moreover, we address the problem of non-convergence — the channel exploration cycle — by proposing a penalized JLinUCB (P-JLinUCB) based on the key idea of introducing a discount parameter to the reward for exploiting a different channel before and after the learning round. Numerical evaluations confirm that the proposed method allows APs to assess the channel quality robustly against reward fluctuations by CDFE and achieves better convergence properties by P-JLinUCB.

  • User-Centric Design of Millimeter Wave Communications for Beyond 5G and 6G Open Access

    Koji ISHIBASHI  Takanori HARA  Sota UCHIMURA  Tetsuya IYE  Yoshimi FUJII  Takahide MURAKAMI  Hiroyuki SHINBO  

     
    INVITED PAPER

      Pubricized:
    2022/07/13
      Vol:
    E105-B No:10
      Page(s):
    1117-1129

    In this paper, we propose new radio access network (RAN) architecture for reliable millimeter-wave (mmWave) communications, which has the flexibility to meet users' diverse and fluctuating requirements in terms of communication quality. This architecture is composed of multiple radio units (RUs) connected to a common distributed unit (DU) via fronthaul links to virtually enlarge its coverage. We further present grant-free non-orthogonal multiple access (GF-NOMA) for low-latency uplink communications with a massive number of users and robust coordinated multi-point (CoMP) transmission using blockage prediction for uplink/downlink communications with a high data rate and a guaranteed minimum data rate as the technical pillars of the proposed RAN. The numerical results indicate that our proposed architecture can meet completely different user requirements and realize a user-centric design of the RAN for beyond 5G/6G.

  • Multi-Stage Contour Primitive of Interest Extraction Network with Dense Direction Classification

    Jinyan LU  Quanzhen HUANG  Shoubing LIU  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2022/07/06
      Vol:
    E105-D No:10
      Page(s):
    1743-1750

    For intelligent vision measurement, the geometric image feature extraction is an essential issue. Contour primitive of interest (CPI) means a regular-shaped contour feature lying on a target object, which is widely used for geometric calculation in vision measurement and servoing. To realize that the CPI extraction model can be flexibly applied to different novel objects, the one-shot learning based CPI extraction can be implemented with deep convolutional neural network, by using only one annotated support image to guide the CPI extraction process. In this paper, we propose a multi-stage contour primitives of interest extraction network (MS-CPieNet), which uses the multi-stage strategy to improve the discrimination ability of CPI and complex background. Second, the spatial non-local attention module is utilized to enhance the deep features, by globally fusing the image features with both short and long ranges. Moreover, the dense 4-direction classification is designed to obtain the normal direction of the contour, and the directions can be further used for the contour thinning post-process. The effectiveness of the proposed methods is validated by the experiments with the OCP and ROCM datasets. A 2-D measurement experiments are conducted to demonstrate the convenient application of the proposed MS-CPieNet.

  • A Multi-Modal Fusion Network Guided by Feature Co-Occurrence for Urban Region Function Recognition

    Nenghuan ZHANG  Yongbin WANG  Xiaoguang WANG  Peng YU  

     
    PAPER-Multimedia Pattern Processing

      Pubricized:
    2022/07/25
      Vol:
    E105-D No:10
      Page(s):
    1769-1779

    Recently, multi-modal fusion methods based on remote sensing data and social sensing data have been widely used in the field of urban region function recognition. However, due to the high complexity of noise problem, most of the existing methods are not robust enough when applied in real-world scenes, which seriously affect their application value in urban planning and management. In addition, how to extract valuable periodic feature from social sensing data still needs to be further study. To this end, we propose a multi-modal fusion network guided by feature co-occurrence for urban region function recognition, which leverages the co-occurrence relationship between multi-modal features to identify abnormal noise feature, so as to guide the fusion network to suppress noise feature and focus on clean feature. Furthermore, we employ a graph convolutional network that incorporates node weighting layer and interactive update layer to effectively extract valuable periodic feature from social sensing data. Lastly, experimental results on public available datasets indicate that our proposed method yeilds promising improvements of both accuracy and robustness over several state-of-the-art methods.

  • 4-Cycle-Start-Up Reference-Clock-Less Digital CDR Utilizing TDC-Based Initial Frequency Error Detection with Frequency Tracking Loop Open Access

    Tetsuya IIZUKA  Meikan CHIN  Toru NAKURA  Kunihiro ASADA  

     
    PAPER

      Pubricized:
    2022/04/11
      Vol:
    E105-C No:10
      Page(s):
    544-551

    This paper proposes a reference-clock-less quick-start-up CDR that resumes from a stand-by state only with a 4-bit preamble utilizing a phase generator with an embedded Time-to-Digital Converter (TDC). The phase generator detects 1-UI time interval by using its internal TDC and works as a self-tunable digitally-controlled delay line. Once the phase generator coarsely tunes the recovered clock period, then the residual time difference is finely tuned by a fine Digital-to-Time Converter (DTC). Since the tuning resolution of the fine DTC is matched by design with the time resolution of the TDC that is used as a phase detector, the fine tuning completes instantaneously. After the initial coarse and fine delay tuning, the feedback loop for frequency tracking is activated in order to improve Consecutive Identical Digits (CID) tolerance of the CDR. By applying the frequency tracking architecture, the proposed CDR achieves more than 100bits of CID tolerance. A prototype implemented in a 65nm bulk CMOS process operates at a 0.9-2.15Gbps continuous rate. It consumes 5.1-8.4mA in its active state and 42μA leakage current in its stand-by state from a 1.0V supply.

  • A New Construction of Asymmetric ZCZ Sequence Sets

    Li CUI  Xiaoyu CHEN  Yubo LI  

     
    PAPER-Communication Theory and Signals

      Pubricized:
    2022/03/29
      Vol:
    E105-A No:10
      Page(s):
    1392-1400

    An asymmetric zero correlation zone (A-ZCZ) sequence set can be regarded as a special type of ZCZ sequence set, which consists of multiple sequence subsets. Each subset is a ZCZ sequence set, and have a common zero cross-correlation zone (ZCCZ) between sequences from different subsets. This paper supplements an existing construction of A-ZCZ sequence sets and further improves the research results. Besides, a new construction of A-ZCZ sequence sets is proposed by matrices transformation. The obtained sequence sets are optimal with respect to theoretical bound, and the parameters can be chosen more flexibly, such as the number of subsets and the lengths of ZCCZ between sequences from different subsets. Moreover, as the diversity of the orthogonal matrices and the flexibility of initial matrix, more A-ZCZ sequence sets can be obtained. The resultant sequence sets presented in this paper can be applied to multi-cell quasi-synchronous code-division multiple-access (QS-CDMA) systems, to eliminate the interference not only from the same cell but also from adjacent cells.

  • Output Power Characterization of Flexible Thermoelectric Power Generators

    Daiki KANSAKU  Nobuhiro KAWASE  Naoki FUJIWARA  Faizan KHAN  Arockiyasamy Periyanayaga KRISTY  Kuruvankatil Dharmajan NISHA  Toshitaka YAMAKAWA  Kazushi IKEDA  Yasuhiro HAYAKAWA  Kenji MURAKAMI  Masaru SHIMOMURA  Hiroya IKEDA  

     
    BRIEF PAPER

      Pubricized:
    2022/04/21
      Vol:
    E105-C No:10
      Page(s):
    639-642

    To facilitate the reuse of environmental waste heat in our society, we have developed high-efficiency flexible thermoelectric power generators (TEPGs). In this study, we investigated the thermoelectromotive force (TEMF) and output power of a prototype device with 50 pairs of Π-type structures using a homemade measurement system for flexible TEPGs in order to evaluate their characteristics along the thickness direction. The prototype device consisted of C fabrics (CAFs) used as p-type materials, NiCu fabrics (NCFs) used as n-type materials, and Ag fabrics (AGFs) used as metal electrodes. Applying a temperature difference of 5K, we obtained a TEMF of 150μV and maximum output power of 6.4pW. The obtained TEMF was smaller than that expected from the Seebeck coefficients of each fabric, which is considered to be mainly because of the influence of contact thermal resistance at the semiconductor-fabric/AGF interfaces.

  • A Spectral-Based Model for Describing Social Polarization in Online Communities Open Access

    Tomoya KINOSHITA  Masaki AIDA  

     
    PAPER

      Pubricized:
    2022/07/13
      Vol:
    E105-B No:10
      Page(s):
    1181-1191

    The phenomenon known as social polarization, in which a social group splits into two or more groups, can cause division of the society by causing the radicalization of opinions and the spread of misinformation, is particularly significant in online communities. To develop technologies to mitigate the effects of polarization in online social networks, it is necessary to understand the mechanism driving its occurrence. There are some models of social polarization in which network structure and users' opinions change, based on the quantified opinions held by the users of online social networks. However, they are based on the interaction between users connected by online social networks. Current recommendation systems offer information from unknown users who are deemed to have similar interests. We can interpret this situation as being yielded non-local effects brought on by the network system, it is not based on local interactions between users. In this paper, based on the spectral graph theory, which can describe non-local effects in online social networks mathematically, we propose a model of polarization that user behavior and network structure change while influencing each other including non-local effects. We investigate the characteristics of the proposed model. Simultaneously, we propose an index to evaluate the degree of network polarization quantitatively, which is needed for our investigations.

  • Highly Efficient High-Power Rectenna with the Diode on Antenna (DoA) Topology Open Access

    Kenji ITOH  Naoki SAKAI  Keisuke NOGUCHI  

     
    INVITED PAPER

      Pubricized:
    2022/03/25
      Vol:
    E105-C No:10
      Page(s):
    483-491

    In this paper, a high-efficiency high-power rectenna with a bridge diode and the diode on antenna (DoA) topology is discussed. First, the topologies of rectifiers and rectennas are discussed to indicate the direction for obtaining highly efficient rectification. Rectifiers with well-matched diode pairs, as double voltage and bridge rectifiers, can reactively terminate even order harmonics, and is suitable for highly efficient operation. A rectenna with the DoA topology is suitable for a direct connection between the highly functional antenna and the rectifier diodes to remove lossy circuit portions. Next, the formulas for the rectification efficiency of the bridge rectifier are demonstrated with the behavioral model. The indicated formulas clarify the fundamental limitation on the rectification efficiency, which is the design goal in case of the DoA topology. Finally, we demonstrate a 5.8 GHz band 1 W rectenna with the bridge diode and the DoA topology. The bridge rectifier that is directly connected to the inductive high-impedance antenna achieved a rectification efficiency of 92.8% at an input power of 1 W. This is close to the fundamental limitation due to the diode performance.

  • A Characterization on Necessary Conditions of Realizability for Reactive System Specifications

    Takashi TOMITA  Shigeki HAGIHARA  Masaya SHIMAKAWA  Naoki YONEZAKI  

     
    PAPER

      Pubricized:
    2022/04/08
      Vol:
    E105-D No:10
      Page(s):
    1665-1677

    This paper focuses on verification for reactive system specifications. A reactive system is an open system that continuously interacts with an uncontrollable external environment, and it must often be highly safe and reliable. However, realizability checking for a given specification is very costly, so we need effective methods to detect and analyze defects in unrealizable specifications to refine them efficiently. We introduce a systematic characterization on necessary conditions of realizability. This characterization is based on quantifications for inputs and outputs in early and late behaviors and reveals four essential aspects of realizability: exhaustivity, strategizability, preservability and stability. Additionally, the characterization derives new necessary conditions, which enable us to classify unrealizable specifications systematically and hierarchically.

  • Spy in Your Eye: Spycam Attack via Open-Sided Mobile VR Device

    Jiyeon LEE  Kilho LEE  

     
    LETTER-Human-computer Interaction

      Pubricized:
    2022/07/22
      Vol:
    E105-D No:10
      Page(s):
    1817-1820

    Privacy violations via spy cameras are becoming increasingly serious. With the recent advent of various smart home IoT devices, such as smart TVs and robot vacuum cleaners, spycam attacks that steal users' information are being carried out in more unpredictable ways. In this paper, we introduce a new spycam attack on a mobile WebVR environment. It is performed by a web attacker who maliciously accesses the back-facing cameras of victims' mobile devices while they are browsing the attacker's WebVR site. This has the power to allow the attacker to capture victims' surroundings even at the desired field of view through sophisticated content placement in VR scenes, resulting in serious privacy breaches for mobile VR users. In this letter, we introduce a new threat facing mobile VR and show that it practically works with major browsers in a stealthy manner.

  • Antenna Array Self-Calibration Algorithm with Location Errors for MUSIC

    Jian BAI  Lin LIU  Xiaoyang ZHANG  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2022/04/20
      Vol:
    E105-A No:10
      Page(s):
    1421-1424

    The characteristics of antenna array, like sensor location, gain and phase response are rarely perfectly known in realistic situations. Location errors usually have a serious impact on the DOA (direction of arrival) estimation. In this paper, a novel array location calibration method of MUSIC (multiple signal classification) algorithm based on the virtual interpolated array is proposed. First, the paper introduces the antenna array positioning scheme. Then, the self-calibration algorithm of FIR-Winner filter based on virtual interpolation array is derived, and its application restriction are also analyzed. Finally, by simulating the different location errors of antenna array, the effectiveness of the proposed method is validated.

1001-1020hit(30728hit)