The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

921-940hit(22683hit)

  • Multicell Distributed Beamforming Based on the Altruistic and Egoistic Strategy with Local Channel State Information

    Zijia HUANG  Qinghai YANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2021/11/11
      Vol:
    E105-B No:5
      Page(s):
    617-628

    In this paper, the sum cell rate based on altruistic and egoistic multicell distributed beamforming (MDBF) is studied with local channel state Information (CSI). To start with, we provide two sufficient conditions for implementing altruistic and egoistic strategy based on the traditional method, and give the proof of those condition. Second, a MDBF method based on the altruistic and egoistic strategy is proposed, where the altruistic strategy is implemented with the internal penalty function. Finally, simulation results demonstrate that the effectiveness of the sufficient conditions and the proposed method has the different performance and advantages.

  • Dynamic Fault Tolerance for Multi-Node Query Processing

    Yutaro BESSHO  Yuto HAYAMIZU  Kazuo GODA  Masaru KITSUREGAWA  

     
    PAPER

      Pubricized:
    2022/02/03
      Vol:
    E105-D No:5
      Page(s):
    909-919

    Parallel processing is a typical approach to answer analytical queries on large database. As the size of the database increases, we often try to increase the parallelism by incorporating more processing nodes. However, this approach increases the possibility of node failure as well. According to the conventional practice, if a failure occurs during query processing, the database system restarts the query processing from the beginning. Such temporal cost may be unacceptable to the user. This paper proposes a fault-tolerant query processing mechanism, named PhoeniQ, for analytical parallel database systems. PhoeniQ continuously takes a checkpoint for every operator pipeline and replicates the output of each stateful operator among different processing nodes. If a single processing node fails during query processing, another can promptly take over the processing. Hence, PhoneniQ allows the database system to efficiently resume query processing after a partial failure event. This paper presents a key design of PhoeniQ and prototype-based experiments to demonstrate that PhoeniQ imposes negligible performance overhead and efficiently continues query processing in the face of node failure.

  • High Temporal Resolution-Based Temporal Iterative Tracking for High Framerate and Ultra-Low Delay Dynamic Tracking System

    Tingting HU  Ryuji FUCHIKAMI  Takeshi IKENAGA  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2022/02/22
      Vol:
    E105-D No:5
      Page(s):
    1064-1074

    High frame rate and ultra-low delay vision system, which can finish reading and processing of 1000fps sequence within 1ms/frame, draws increasing attention in the field of robotics that requires immediate feedback from image process core. Meanwhile, tracking task plays an important role in many computer vision applications. Among various tracking algorithms, Lucas Kanade (LK)-based template tracking, which tracks targets with high accuracy over the sub-pixel level, is one of the keys for robotic applications, such as factory automation (FA). However, the substantial spatial iterative processing and complex computation in the LK algorithm, make it difficult to achieve a high frame rate and ultra-low delay tracking with limited resources. Aiming at an LK-based template tracking system that reads and processes 1000fps sequences within 1ms/frame with small resource costs, this paper proposes: 1) High temporal resolution-based temporal iterative tracking, which maps the spatial iterations into the temporal domain, efficiently reduces resource cost and delay caused by spatial iterative processing. 2) Label scanner-based multi-stream spatial processing, which maps the local spatial processing into the labeled input pixel stream and aggregates them with a label scanner, makes the local spatial processing in the LK algorithm possible be implemented with a small resource cost. Algorithm evaluation shows that the proposed temporal iterative tracking performs dynamic tracking, which tracks object with coarse accuracy when it's moving fast and achieves higher accuracy when it slows down. Hardware evaluation shows that the proposed label scanner-based multi-stream architecture makes the system implemented on FPGA (zcu102) with resource cost less than 20%, and the designed tracking system supports to read and process 1000fps sequence within 1ms/frame.

  • Maximum Doppler Frequency Detection Based on Likelihood Estimation With Theoretical Thresholds Open Access

    Satoshi DENNO  Kazuma HOTTA  Yafei HOU  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2021/10/25
      Vol:
    E105-B No:5
      Page(s):
    657-664

    This paper proposes a novel maximum Doppler frequency detection technique for user moving velocity estimation. The maximum Doppler frequency is estimated in the proposed detection technique by making use of the fact that user moving velocity is not distributed continuously. The fluctuation of the channel state information during a packet is applied for the proposed detection, in which likelihood estimation is performed by comparing the fluctuation with the thresholds. The thresholds are theoretically derived on the assumption that the fluctuation is distributed with an exponential function. An approximated detection technique is proposed to simplify the theoretical threshold derivation. The performance of the proposed detection is evaluated by computer simulation. The proposed detection accomplishes better detection performance as the fluctuation values are summed over more packets. The proposed detection achieves about 90% correct detection performance in a fading channel with the Eb/N0 = 35dB, when the fluctuation values are summed over only three packets. Furthermore, the approximated detection also achieves the same detection performance.

  • Feature-Based Adversarial Training for Deep Learning Models Resistant to Transferable Adversarial Examples

    Gwonsang RYU  Daeseon CHOI  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2022/02/22
      Vol:
    E105-D No:5
      Page(s):
    1039-1049

    Although deep neural networks (DNNs) have achieved high performance across a variety of applications, they can often be deceived by adversarial examples that are generated by adding small perturbations to the original images. Adversaries may generate adversarial examples using the property of transferability, in which adversarial examples that deceive one model can also deceive other models because adversaries do not obtain any information on the DNNs deployed in real scenarios. Recent studies show that adversarial examples with feature space perturbations are more transferable than others. Adversarial training is an effective method to defend against adversarial attacks. However, it results in a decrease in the classification accuracy for natural images, and it is not sufficiently robust against transferable adversarial examples because it does not consider adversarial examples with feature space perturbations. We propose a novel adversarial training method to train DNNs to be robust against transferable adversarial examples and maximize their classification accuracy for natural images. The proposed method trains DNNs to correctly classify natural images and adversarial examples and also minimize the feature differences between them. The robustness of the proposed method was similar to those of the previous adversarial training methods for MNIST dataset and was up to average 6.13% and 9.24% more robust against transfer adversarial examples for CIFAR-10 and CIFAR-100 datasets, respectively. In addition, the proposed method yielded an average classification accuracy that was approximately 0.53%, 6.82%, and 10.60% greater than some state-of-the-art adversarial training methods for all datasets, respectively. The proposed method is robust against a variety of transferable adversarial examples, which enables its implementation in security applications that may benefit from high-performance classification but are at high risk of attack.

  • Speaker-Independent Audio-Visual Speech Separation Based on Transformer in Multi-Talker Environments

    Jing WANG  Yiyu LUO  Weiming YI  Xiang XIE  

     
    PAPER-Speech and Hearing

      Pubricized:
    2022/01/11
      Vol:
    E105-D No:4
      Page(s):
    766-777

    Speech separation is the task of extracting target speech while suppressing background interference components. In applications like video telephones, visual information about the target speaker is available, which can be leveraged for multi-speaker speech separation. Most previous multi-speaker separation methods are mainly based on convolutional or recurrent neural networks. Recently, Transformer-based Seq2Seq models have achieved state-of-the-art performance in various tasks, such as neural machine translation (NMT), automatic speech recognition (ASR), etc. Transformer has showed an advantage in modeling audio-visual temporal context by multi-head attention blocks through explicitly assigning attention weights. Besides, Transformer doesn't have any recurrent sub-networks, thus supporting parallelization of sequence computation. In this paper, we propose a novel speaker-independent audio-visual speech separation method based on Transformer, which can be flexibly applied to unknown number and identity of speakers. The model receives both audio-visual streams, including noisy spectrogram and speaker lip embeddings, and predicts a complex time-frequency mask for the corresponding target speaker. The model is made up by three main components: audio encoder, visual encoder and Transformer-based mask generator. Two different structures of encoders are investigated and compared, including ResNet-based and Transformer-based. The performance of the proposed method is evaluated in terms of source separation and speech quality metrics. The experimental results on the benchmark GRID dataset show the effectiveness of the method on speaker-independent separation task in multi-talker environments. The model generalizes well to unseen identities of speakers and noise types. Though only trained on 2-speaker mixtures, the model achieves reasonable performance when tested on 2-speaker and 3-speaker mixtures. Besides, the model still shows an advantage compared with previous audio-visual speech separation works.

  • Exploring Hypotactic Structure for Chinese-English Machine Translation with a Structure-Aware Encoder-Decoder Neural Model

    Guoyi MIAO  Yufeng CHEN  Mingtong LIU  Jinan XU  Yujie ZHANG  Wenhe FENG  

     
    PAPER-Natural Language Processing

      Pubricized:
    2022/01/11
      Vol:
    E105-D No:4
      Page(s):
    797-806

    Translation of long and complex sentence has always been a challenge for machine translation. In recent years, neural machine translation (NMT) has achieved substantial progress in modeling the semantic connection between words in a sentence, but it is still insufficient in capturing discourse structure information between clauses within complex sentences, which often leads to poor discourse coherence when translating long and complex sentences. On the other hand, the hypotactic structure, a main component of the discourse structure, plays an important role in the coherence of discourse translation, but it is not specifically studied. To tackle this problem, we propose a novel Chinese-English NMT approach that incorporates the hypotactic structure knowledge of complex sentences. Specifically, we first annotate and build a hypotactic structure aligned parallel corpus to provide explicit hypotactic structure knowledge of complex sentences for NMT. Then we propose three hypotactic structure-aware NMT models with three different fusion strategies, including source-side fusion, target-side fusion, and both-side fusion, to integrate the annotated structure knowledge into NMT. Experimental results on WMT17, WMT18 and WMT19 Chinese-English translation tasks demonstrate that the proposed method can significantly improve the translation performance and enhance the discourse coherence of machine translation.

  • Interleaved Sequences with Anti-Doppler Properties

    Xi CAO  Yang YANG  Rong LUO  

     
    LETTER-Coding Theory

      Pubricized:
    2021/10/05
      Vol:
    E105-A No:4
      Page(s):
    734-738

    In this letter, we discuss the ambiguity function of interleaved sequences. Furthermore, using the Guassian sum and choosing binary m-sequences as column sequences, we investigate the property of a binary sequence set given by Zhou, Tang, Gong (IEEE Trans. Inf. Theory, 54(9), 2008), which has low ambiguity property in a large region. Those sequences could be used in radar systems.

  • Deep Gaussian Denoising Network Based on Morphological Operators with Low-Precision Arithmetic

    Hikaru FUJISAKI  Makoto NAKASHIZUKA  

     
    PAPER-Image, Digital Signal Processing

      Pubricized:
    2021/11/08
      Vol:
    E105-A No:4
      Page(s):
    631-638

    This paper presents a deep network based on morphological filters for Gaussian denoising. The morphological filters can be applied with only addition, max, and min functions and require few computational resources. Therefore, the proposed network is suitable for implementation using a small microprocessor. Each layer of the proposed network consists of a top-hat transform, which extracts small peaks and valleys of noise components from the input image. Noise components are iteratively reduced in each layer by subtracting the noise components from the input image. In this paper, the extensions of opening and closing are introduced as linear combinations of the morphological filters for the top-hat transform of this deep network. Multiplications are only required for the linear combination of the morphological filters in the proposed network. Because almost all parameters of the network are structuring elements of the morphological filters, the feature maps and parameters can be represented in short bit-length integer form, which is suitable for implementation with single instructions, multiple data (SIMD) instructions. Denoising examples show that the proposed network obtains denoising results comparable to those of BM3D [1] without linear convolutions and with approximately one tenth the number of parameters of a full-scale deep convolutional neural network [2]. Moreover, the computational time of the proposed method using SIMD instructions of a microprocessor is also presented.

  • Image Quality Improvement for Capsule Endoscopy Based on Compressed Sensing with K-SVD Dictionary Learning

    Yuuki HARADA  Daisuke KANEMOTO  Takahiro INOUE  Osamu MAIDA  Tetsuya HIROSE  

     
    LETTER-Image

      Pubricized:
    2021/10/01
      Vol:
    E105-A No:4
      Page(s):
    743-747

    Reducing the power consumption of capsule endoscopy is essential for its further development. We introduce K-SVD dictionary learning to design a dictionary for sparse coding, and improve reconstruction accuracy of capsule endoscopic images captured using compressed sensing. At a compression ratio of 20%, the proposed method improves image quality by approximately 4.4 dB for the peak signal-to-noise ratio.

  • Cylindrical Massive MIMO System with Low-Complexity Angle-Based User Selection for High-Altitude Platform Stations

    Koji TASHIRO  Kenji HOSHINO  Atsushi NAGATE  

     
    PAPER-Adaptive Array Antennas/MIMO

      Pubricized:
    2021/10/15
      Vol:
    E105-B No:4
      Page(s):
    449-460

    High-altitude platform stations (HAPSs) are recognized as a promising technology for coverage extension in the sixth generation (6G) mobile communications and beyond. The purpose of this study is to develop a HAPS system with a coverage radius of 100km and high capacity by focusing on the following two aspects: array antenna structure and user selection. HAPS systems must jointly use massive multiple-input multiple-output (mMIMO) and multiuser MIMO techniques to increase their capacity. However, the coverage achieved by a conventional planar array antenna is limited to a circular area with a radius of only tens of kilometers. A conventional semi-orthogonal user selection (SUS) scheme based on the orthogonality of channel vectors achieves high capacity, but it has high complexity. First, this paper proposes a cylindrical mMIMO system to achieve an ultra-wide coverage radius of 100km and high capacity. Second, this paper presents a novel angle-based user selection (AUS) scheme, where a user selection problem is formulated as a maximization of the minimum angular difference between users over all user groups. Finally, a low-complexity suboptimal algorithm (SA) for AUS is also proposed. Assuming an area with a 100km radius, simulation results demonstrate that the proposed cylindrical mMIMO system improves the signal-to-interference-plus-noise ratio by approx. 12dB at the boundary of the area, and it achieves approx. 1.5 times higher capacity than the conventional mMIMO which uses a planar array antenna. In addition, the results show that the proposed AUS scheme improves the lower percentiles in the system capacity distribution compared with SUS and basic random user selection. Furthermore, the computational complexity of the proposed SA is in the order of only 1/4000 that of SUS.

  • SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning

    Yuma MASUBUCHI  Masaki HASHIMOTO  Akira OTSUKA  

     
    PAPER-Dependable Computing

      Pubricized:
    2021/12/28
      Vol:
    E105-D No:4
      Page(s):
    755-765

    Binary code similarity comparison methods are mainly used to find bugs in software, to detect software plagiarism, and to reduce the workload during malware analysis. In this paper, we propose a method to compare the binary code similarity of each function by using a combination of Control Flow Graphs (CFGs) and disassembled instruction sequences contained in each function, and to detect a function with high similarity to a specified function. One of the challenges in performing similarity comparisons is that different compile-time optimizations and different architectures produce different binary code. The main units for comparing code are instructions, basic blocks and functions. The challenge of functions is that they have a graph structure in which basic blocks are combined, making it relatively difficult to derive similarity. However, analysis tools such as IDA, display the disassembled instruction sequence in function units. Detecting similarity on a function basis has the advantage of facilitating simplified understanding by analysts. To solve the aforementioned challenges, we use machine learning methods in the field of natural language processing. In this field, there is a Transformer model, as of 2017, that updates each record for various language processing tasks, and as of 2021, Transformer is the basis for BERT, which updates each record for language processing tasks. There is also a method called node2vec, which uses machine learning techniques to capture the features of each node from the graph structure. In this paper, we propose SIBYL, a combination of Transformer and node2vec. In SIBYL, a method called Triplet-Loss is used during learning so that similar items are brought closer and dissimilar items are moved away. To evaluate SIBYL, we created a new dataset using open-source software widely used in the real world, and conducted training and evaluation experiments using the dataset. In the evaluation experiments, we evaluated the similarity of binary codes across different architectures using evaluation indices such as Rank1 and MRR. The experimental results showed that SIBYL outperforms existing research. We believe that this is due to the fact that machine learning has been able to capture the features of the graph structure and the order of instructions on a function-by-function basis. The results of these experiments are presented in detail, followed by a discussion and conclusion.

  • Experiment of Integrated Technologies in Robotics, Network, and Computing for Smart Agriculture Open Access

    Ryota ISHIBASHI  Takuma TSUBAKI  Shingo OKADA  Hiroshi YAMAMOTO  Takeshi KUWAHARA  Kenichi KAWAMURA  Keisuke WAKAO  Takatsune MORIYAMA  Ricardo OSPINA  Hiroshi OKAMOTO  Noboru NOGUCHI  

     
    INVITED PAPER

      Pubricized:
    2021/11/05
      Vol:
    E105-B No:4
      Page(s):
    364-378

    To sustain and expand the agricultural economy even as its workforce shrinks, the efficiency of farm operations must be improved. One key to efficiency improvement is completely unmanned driving of farm machines, which requires stable monitoring and control of machines from remote sites, a safety system to ensure safe autonomous driving even without manual operations, and precise positioning in not only small farm fields but also wider areas. As possible solutions for those issues, we have developed technologies of wireless network quality prediction, an end-to-end overlay network, machine vision for safety and positioning, network cooperated vehicle control and autonomous tractor control and conducted experiments in actual field environments. Experimental results show that: 1) remote monitoring and control can be seamlessly continued even when connection between the tractor and the remote site needs to be switched across different wireless networks during autonomous driving; 2) the safety of the autonomous driving can automatically be ensured by detecting both the existence of people in front of the unmanned tractor and disturbance of network quality affecting remote monitoring operation; and 3) the unmanned tractor can continue precise autonomous driving even when precise positioning by satellite systems cannot be performed.

  • Construction of Two Classes of Minimal Binary Linear Codes Based on Boolean Function

    Jiawei DU  Xiaoni DU  Wengang JIN  Yingzhong ZHANG  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/09/30
      Vol:
    E105-A No:4
      Page(s):
    689-693

    Linear codes with a few-weight have important applications in combinatorial design, strongly regular graphs and cryptography. In this paper, we first construct a class of Boolean functions with at most five-valued Walsh spectra, and determine their spectrum distribution. Then, we derive two classes of linear codes with at most six-weight from the new functions. Meanwhile, the length, dimension and weight distributions of the codes are obtained. Results show that both of the new codes are minimal and among them, one is wide minimal code and the other is a narrow minimal code and thus can be used to design secret sharing scheme with good access structures. Finally, some Magma programs are used to verify the correctness of our results.

  • Virtual Temporal Friendship Creation: Autonomous Decentralized Friendship Management for Improving Robustness in D2D-Based Social Networking Service

    Hanami YOKOI  Takuji TACHIBANA  

     
    PAPER-Overlay Network

      Pubricized:
    2021/10/12
      Vol:
    E105-B No:4
      Page(s):
    379-387

    In this paper, for improving the robustness of D2D-based SNS by avoiding the cascading failure, we propose an autonomous decentralized friendship management called virtual temporal friendship creation. In our proposed virtual temporal friendship creation, some virtual temporal friendships are created among users based on an optimization problem to improve the robustness although these friendships cannot be used to perform the message exchange in SNS. We investigate the impact of creating a new friendship on the node resilience for the optimization problem. Then we consider an autonomous decentralized algorithm based on the obtained results for the optimization problem of virtual temporal friendship creation. We evaluate the performance of the virtual temporal friendship creation with simulation and investigate the effectiveness of this method by comparing with the performance of a method with meta-heuristic algorithm. From numerical examples, we show that the virtual temporal friendship creation can improve the robustness quickly in an autonomous and decentralized way.

  • Artificial Bandwidth Extension for Lower Bandwidth Using Sinusoidal Synthesis based on First Formant Location

    Yuya HOSODA  Arata KAWAMURA  Youji IIGUNI  

     
    PAPER-Engineering Acoustics

      Pubricized:
    2021/10/12
      Vol:
    E105-A No:4
      Page(s):
    664-672

    The narrow bandwidth limitation of 300-3400Hz on the public switching telephone network results in speech quality deterioration. In this paper, we propose an artificial bandwidth extension approach that reconstructs the missing lower bandwidth of 50-300Hz using sinusoidal synthesis based on the first formant location. Sinusoidal synthesis generates sinusoidal waves with a harmonic structure. The proposed method detects the fundamental frequency using an autocorrelation method based on YIN algorithm, where a threshold processing avoids the false fundamental frequency detection on unvoiced sounds. The amplitude of the sinusoidal waves is calculated in the time domain from the weighted energy of 300-600Hz. In this case, since the first formant location corresponds to the first peak of the spectral envelope, we reconstruct the harmonic structure to avoid attenuating and overemphasizing by increasing the weight when the first formant location is lower, and vice versa. Consequently, the subjective and objective evaluations show that the proposed method reduces the speech quality difference between the original speech signal and the bandwidth extended speech signal.

  • An Algorithm for Single Snapshot 2D-DOA Estimation Based on a Three-Parallel Linear Array Model Open Access

    Shiwen LIN  Yawen ZHOU  Weiqin ZOU  Huaguo ZHANG  Lin GAO  Hongshu LIAO  Wanchun LI  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2021/10/05
      Vol:
    E105-A No:4
      Page(s):
    673-681

    Estimating the spatial parameters of the signals by using the effective data of a single snapshot is essential in the field of reconnaissance and confrontation. Major drawback of existing algorithms is that its constructed covariance matrix has a great degree of rank loss. The performance of existing algorithms gets degraded with low signal-to-noise ratio. In this paper, a three-parallel linear array based algorithm is proposed to achieve two-dimensional direction of arrival estimates in a single snapshot scenario. The key points of the proposed algorithm are: 1) construct three pseudo matrices with full rank and no rank loss by using the single snapshot data from the received signal model; 2) by using the rotation relation between pseudo matrices, the matched 2D-DOA is obtained with an efficient parameter matching method. Main objective of this work is on improving the angle estimation accuracy and reducing the loss of degree of freedom in single snapshot 2D-DOA estimation.

  • Accurate End-to-End Delay Bound Analysis for Large-Scale Network Via Experimental Comparison

    Xiao HONG  Yuehong GAO  Hongwen YANG  

     
    PAPER-Network

      Pubricized:
    2021/10/15
      Vol:
    E105-B No:4
      Page(s):
    472-484

    Computer networks tend to be subjected to the proliferation of mobile demands, therefore it poses a great challenge to guarantee the quality of network service. For real-time systems, the QoS performance bound analysis for the complex network topology and background traffic in modern networks is often difficult. Network calculus, nevertheless, converts a complex non-linear network system into an analyzable linear system to accomplish more accurate delay bound analysis. The existing network environment contains complex network resource allocation schemes, and delay bound analysis is generally pessimistic, hence it is essential to modify the analysis model to improve the bound accuracy. In this paper, the main research approach is to obtain the measurement results of an actual network by building a measurement environment and the corresponding theoretical results by network calculus. A comparison between measurement data and theoretical results is made for the purpose of clarifying the scheme of bandwidth scheduling. The measurement results and theoretical analysis results are verified and corrected, in order to propose an accurate per-flow end-to-end delay bound analytic model for a large-scale scheduling network. On this basis, the instructional significance of the analysis results for the engineering construction is discussed.

  • Resource Allocation Modeling for Fine-Granular Network Slicing in Beyond 5G Systems Open Access

    Zhaogang SHU  Tarik TALEB  Jaeseung SONG  

     
    INVITED PAPER

      Pubricized:
    2021/10/19
      Vol:
    E105-B No:4
      Page(s):
    349-363

    Through the concept of network slicing, a single physical network infrastructure can be split into multiple logically-independent Network Slices (NS), each of which is customized for the needs of its respective individual user or industrial vertical. In the beyond 5G (B5G) system, this customization can be done for many targeted services, including, but not limited to, 5G use cases and beyond 5G. The network slices should be optimized and customized to stitch a suitable environment for targeted industrial services and verticals. This paper proposes a novel Quality of Service (QoS) framework that optimizes and customizes the network slices to ensure the service level agreement (SLA) in terms of end-to-end reliability, delay, and bandwidth communication. The proposed framework makes use of network softwarization technologies, including software-defined networking (SDN) and network function virtualization (NFV), to preserve the SLA and ensure elasticity in managing the NS. This paper also mathematically models the end-to-end network by considering three parts: radio access network (RAN), transport network (TN), and core network (CN). The network is modeled in an abstract manner based on these three parts. Finally, we develop a prototype system to implement these algorithms using the open network operating system (ONOS) as a SDN controller. Simulations are conducted using the Mininet simulator. The results show that our QoS framework and the proposed resource allocation algorithms can effectively schedule network resources for various NS types and provide reliable E2E QoS services to end-users.

  • Autonomous Gateway Mobility Control for Heterogeneous Drone Swarms: Link Stabilizer and Path Optimizer

    Taichi MIYA  Kohta OHSHIMA  Yoshiaki KITAGUCHI  Katsunori YAMAOKA  

     
    PAPER-Ad Hoc Network

      Pubricized:
    2021/10/18
      Vol:
    E105-B No:4
      Page(s):
    432-448

    Heterogeneous drone swarms are large hybrid drone clusters in which multiple drones with different wireless protocols are interconnected by some translator drones called GWs. Nowadays, because inexpensive drones, such as toy drones, have become widely used in society, the technology for constructing huge drone swarms is attracting more and more attention. In this paper, we propose an autonomous GW mobility control algorithm for establishing stabilized and low-delay communication among heterogeneous clusters, assuming that only GWs are controllable and relocatable to ensure the flexible operationality of drone swarms. Our proposed algorithm is composed of two independent sub algorithms - the Link Stabilizer and the Path Optimizer. The Stabilizer maintains the neighbor links and consists of two schemes: the neighbor clustering based on relative velocities and the GW velocity calculation using a kinetic model. The Optimizer creates a shortcut to reduce the end-to-end delay for newly established communication by relocating the GW dynamically. We also propose a conceptual protocol design to implement this algorithm into real-world drone swarms in a distributed manner. Computer simulation reveals that the Stabilizer improved the connection stability for all three mobility models even under the high node mobility, and the Optimizer reduced the communication delay by the optimal shortcut formation under any conditions of the experiments and its performance is comparable to the performance upper limit obtained by the brute-force searching.

921-940hit(22683hit)