The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] access(874hit)

61-80hit(874hit)

  • Channel-Alignment Based Non-Orthogonal Multiple Access Techniques

    Changyong SHIN  Se-Hyoung CHO  

     
    LETTER-Communication Theory and Signals

      Vol:
    E102-A No:10
      Page(s):
    1431-1437

    This letter presents a non-orthogonal multiple access (NOMA) technique for a two-cell multiple-input multiple-output (MIMO) system that exploits the alignments of inter-cell interference channels and signal channels within a cluster in a cell. The proposed technique finds combiner vectors for users that align the inter-cell interference channels and the signal channels simultaneously. This technique utilizes the aligned interference and signal channels to obtain precoder matrices for base stations through which each data stream modulated by NOMA can be transmitted to the intended cluster without interference. In addition, we derive the sufficient condition for transmit and receive antenna configurations in the MIMO NOMA systems to eliminate inter-cell interference and inter-cluster interference simultaneously. Because the proposed technique effectively suppresses the inter-cell interference, it achieves a higher degree of freedom than the existing techniques relying on an avoidance of inter-cell interference, thereby obtaining a better sum rate performance in high SNR regions. Furthermore, we present the hybrid MIMO NOMA technique, which combines the MIMO NOMA technique exploiting channel alignment with the existing techniques boosting the received signal powers. Using the benefits from these techniques, the proposed hybrid technique achieves a good performance within all SNR regions. The simulation results successfully demonstrate the effectiveness of the proposed techniques on the sum rate performance.

  • General Secret Sharing Schemes Using Hierarchical Threshold Scheme

    Kouya TOCHIKUBO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E102-A No:9
      Page(s):
    1037-1047

    We propose two secret sharing schemes realizing general access structures, which are based on unauthorized subsets. In the proposed schemes, shares are generated by Tassa's (k,n)-hierarchical threshold scheme instead of Shamir's (k,n)-threshold scheme. Consequently, the proposed schemes can reduce the number of shares distributed to each participant.

  • Performance Comparison of Multi-User Shared Multiple Access Scheme in Uplink Channels Open Access

    Eiji OKAMOTO  Manabu MIKAMI  Hitoshi YOSHINO  

     
    PAPER

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1458-1466

    In fifth-generation mobile communications systems (5G), grant-free non-orthogonal multiple access (NOMA) schemes have been considered as a way to accommodate the many wireless connections required for Internet of Things (IoT) devices. In NOMA schemes, both system capacity enhancement and transmission protocol simplification are achieved, and an overload test of more than one hundred percent of the transmission samples over conducted. Multi-user shared multiple access (MUSA) has been proposed as a representative scheme for NOMA. However, the performance of MUSA has not been fully analyzed nor compared to other NOMA or orthogonal multiple access schemes. Therefore, in this study, we theoretically and numerically analyze the performance of MUSA in uplink fading environments and compare it with orthogonal frequency division multiple access (OFDMA), space division multiple access-based OFDMA, low-density signature, and sparse code multiple access. The characteristics and superiority of MUSA are then clarified.

  • Recent Activities of 5G Experimental Trials on Massive MIMO Technologies and 5G System Trials Toward New Services Creation Open Access

    Yukihiko OKUMURA  Satoshi SUYAMA  Jun MASHINO  Kazushi MURAOKA  

     
    INVITED PAPER

      Pubricized:
    2019/02/22
      Vol:
    E102-B No:8
      Page(s):
    1352-1362

    In order to cope with recent growth of mobile data traffic and emerging various services, world-wide system trials for the fifth-generation (5G) mobile communication system that dramatically extends capability of the fourth-generation mobile communication system are being performed to launch its commercial service in 2020. In addition, research and development of new radio access technologies for 5G evolution and beyond 5G systems are beginning to be made all over the world. This paper introduces our recent activities on 5G transmission experiments that aim to validate Massive MIMO technologies using higher frequency bands such as SHF/EHF bands, that is, 5G experimental trials. Recent results of 5G system trials to create new services and applications in 5G era in cooperation with partners in vertical industries are also introduced.

  • Standardization and Technology Trends in Optical, Wireless and Virtualized Access Systems Open Access

    Tomoya HATANO  Jun-ichi KANI  Yoichi MAEDA  

     
    INVITED PAPER

      Pubricized:
    2019/01/22
      Vol:
    E102-B No:7
      Page(s):
    1263-1269

    This paper reviews access system standardization activities and related technologies from the viewpoints of optical-based PON access, mobile access systems including LPWAN, and access network virtualization. Future study issues for the next access systems are also presented.

  • A ReRAM-Based Row-Column-Oriented Memory Architecture for Convolutional Neural Networks

    Yan CHEN  Jing ZHANG  Yuebing XU  Yingjie ZHANG  Renyuan ZHANG  Yasuhiko NAKASHIMA  

     
    BRIEF PAPER

      Vol:
    E102-C No:7
      Page(s):
    580-584

    An efficient resistive random access memory (ReRAM) structure is developed for accelerating convolutional neural network (CNN) powered by the in-memory computation. A novel ReRAM cell circuit is designed with two-directional (2-D) accessibility. The entire memory system is organized as a 2-D array, in which specific memory cells can be identically accessed by both of column- and row-locality. For the in-memory computations of CNNs, only relevant cells in an identical sub-array are accessed by 2-D read-out operations, which is hardly implemented by conventional ReRAM cells. In this manner, the redundant access (column or row) of the conventional ReRAM structures is prevented to eliminated the unnecessary data movement when CNNs are processed in-memory. From the simulation results, the energy and bandwidth efficiency of the proposed memory structure are 1.4x and 5x of a state-of-the-art ReRAM architecture, respectively.

  • Improvement of General Secret Sharing Scheme Reducing Shares Distributed to Specified Participants

    Kouya TOCHIKUBO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E102-A No:6
      Page(s):
    808-817

    In secret sharing schemes for general access structures, an important issue is the number of shares distributed to each participant. However, in general, the existing schemes are impractical in this respect when the size of the access structure is very large. In 2015, a secret sharing scheme that can reduce the number of shares distributed to specified participants was proposed (the scheme A of T15). In this scheme, we can select a subset of participants and reduce the number of shares distributed to any participant who belongs to the selected subset though this scheme cannot reduce the number of shares distributed to every participant. In other words, this scheme cannot reduce the number of shares distributed to each participant who does not belong to the selected subset. In this paper, we modify the scheme A of T15 and propose a new secret sharing scheme realizing general access structures. The proposed scheme can reduce the number of shares distributed to each participant who does not belong to the selected subset as well. That is, the proposed scheme is more efficient than the scheme A of T15.

  • Dynamic Strain Measurement with Bandwidth Allocation by Using Random Accessibility of BOCDR

    Osamu FURUKAWA  Hideo SHIDA  Shin-ichiro TEZUKA  Satoshi MATSUURA  Shoji ADACHI  

     
    PAPER-Sensing

      Pubricized:
    2018/11/13
      Vol:
    E102-B No:5
      Page(s):
    1069-1076

    A Brillouin optical correlation domain reflectometry (BOCDR) system, which can set measuring point to arbitrary distance that is aligned in a random order along an optical fiber (i.e., random accessibility), is proposed to measure dynamic strain and experimentally evaluated. This random-access system can allocate measurement bandwidth to measuring point by assigning the measurement times at each measuring point of the total number of strain measurements. This assigned number is not always equally but as necessary for plural objects with different natural frequencies. To verify the system, strain of two vibrating objects with different natural frequencies was measured by one optical fiber which is attached to those objects. The system allocated appropriate measurement bandwidth to each object and simultaneously measured dynamic strain corresponding to the vibrating objects.

  • An Optimized Low-Power Optical Memory Access Network for Kilocore Systems

    Tao LIU  Huaxi GU  Yue WANG  Wei ZOU  

     
    LETTER-Computer System

      Pubricized:
    2019/02/04
      Vol:
    E102-D No:5
      Page(s):
    1085-1088

    An optimized low-power optical memory access network is proposed to alleviate the cost of microring resonators (MRs) in kilocore systems, such as the pass-by loss and integration difficulty. Compared with traditional electronic bus interconnect, the proposed network reduces power consumption and latency by 80% to 89% and 21% to 24%. Moreover, the new network decreases the number of MRs by 90.6% without an increase in power consumption and latency when making a comparison with Optical Ring Network-on-Chip (ORNoC).

  • Post-Quantum Security of IGE Mode Encryption in Telegram

    Jeeun LEE  Sungsook KIM  Seunghyun LEE  Kwangjo KIM  

     
    LETTER

      Vol:
    E102-A No:1
      Page(s):
    148-151

    IGE mode used in Telegram's customized protocol has not been fully investigated in terms of post-quantum security. In this letter, we show that IGE mode is IND-qCPA insecure by Simon's algorithm, assuming that the underlying block cipher is a standard-secure pseudorandom function (sPRF). Under a stronger assumption that the block cipher is a quantum-secure pseudorandom function (qPRF), IND-qCPA security of IGE mode is proved using one-way to hiding lemma.

  • Random Access Control Scheme with Reservation Channel for Capacity Expansion of QZSS Safety Confirmation System Open Access

    Suguru KAMEDA  Kei OHYA  Tomohide TAKAHASHI  Hiroshi OGUMA  Noriharu SUEMATSU  

     
    PAPER

      Vol:
    E102-A No:1
      Page(s):
    186-194

    For capacity expansion of the Quasi-Zenith Satellite System (QZSS) safety confirmation system, frame slotted ALOHA with flag method has previously been proposed as an access control scheme. While it is always able to communicate in an optimum state, its maximum channel efficiency is only 36.8%. In this paper, we propose adding a reservation channel (R-Ch) to the frame slotted ALOHA with flag method to increase the upper limit of the channel efficiency. With an R-Ch, collision due to random channel selection is decreased by selecting channels in multiple steps, and the channel efficiency is improved up to 84.0%. The time required for accommodating 3 million mobile terminals, each sending one message, when using the flag method only and the flag method with an R-Ch are compared. It is shown that the accommodating time can be reduced to less than half by adding an R-Ch to the flag method.

  • Low-Hit-Zone Frequency-Hopping Sequence Sets with Optimal Periodic Partial Hamming Correlation Properties

    Limengnan ZHOU  Hongyu HAN  Xing LIU  

     
    LETTER-Spread Spectrum Technologies and Applications

      Vol:
    E102-A No:1
      Page(s):
    316-319

    Frequency-hopping sequence (FHS) sets with low-hit-zone (LHZ) have Hamming correlations maintained at a low level as long as the relative time delay between different sequences are limited in a zone around the origin, and thus can be well applied in quasi-synchronous (QS) frequency-hopping multiple-access (FHMA) systems to reduce the mutual interference between different users. Moreover, the periodic partial Hamming correlation (PPHC) properties of employed LHZ-FHS sets usually act as evaluation criterions for the performances of QS-FHMA systems in practice. In this letter, a new class of LHZ-FHS sets is constructed via interleaving techniques. Furthermore, these new LHZ-FHS sets also possess optimal PPHC properties and parameters not included in the related literature.

  • A Generic Construction of Mutually Orthogonal Optimal Binary ZCZ Sequence Sets

    Yubo LI  Shuonan LI  Hongqian XUAN  Xiuping PENG  

     
    LETTER-Sequence

      Vol:
    E101-A No:12
      Page(s):
    2217-2220

    In this letter, a generic method to construct mutually orthogonal binary zero correlation zone (ZCZ) sequence sets from mutually orthogonal complementary sequence sets (MOCSSs) with certain properties is presented at first. Then MOCSSs satisfying conditions are generated from binary orthogonal matrices with order N×N, where N=p-1, p is a prime. As a result, mutually orthogonal binary ZCZ sequence sets with parameters (2N2,N,N+1)-ZCZ can be obtained, the number of ZCZ sets is N. Note that each single ZCZ sequence set is optimal with respect to the theoretical bound.

  • ATSMF: Automated Tiered Storage with Fast Memory and Slow Flash Storage to Improve Response Time with Concentrated Input-Output (IO) Workloads

    Kazuichi OE  Mitsuru SATO  Takeshi NANRI  

     
    PAPER-Memory Devices

      Pubricized:
    2018/09/18
      Vol:
    E101-D No:12
      Page(s):
    2889-2901

    The response times of solid state drives (SSDs) have decreased dramatically due to the growing use of non-volatile memory express (NVMe) devices. Such devices have response times of less than 100 micro seconds on average. The response times of all-flash-array systems have also decreased dramatically through the use of NVMe SSDs. However, there are applications, particularly virtual desktop infrastructure and in-memory database systems, that require storage systems with even shorter response times. Their workloads tend to contain many input-output (IO) concentrations, which are aggregations of IO accesses. They target narrow regions of the storage volume and can continue for up to an hour. These narrow regions occupy a few percent of the logical unit number capacity, are the target of most IO accesses, and appear at unpredictable logical block addresses. To drastically reduce the response times for such workloads, we developed an automated tiered storage system called “automated tiered storage with fast memory and slow flash storage” (ATSMF) in which the data in targeted regions are migrated between storage devices depending on the predicted remaining duration of the concentration. The assumed environment is a server with non-volatile memory and directly attached SSDs, with the user applications executed on the server as this reduces the average response time. Our system predicts the effect of migration by using the previously monitored values of the increase in response time during migration and the change in response time after migration. These values are consistent for each type of workload if the system is built using both non-volatile memory and SSDs. In particular, the system predicts the remaining duration of an IO concentration, calculates the expected response-time increase during migration and the expected response-time decrease after migration, and migrates the data in the targeted regions if the sum of response-time decrease after migration exceeds the sum of response-time increase during migration. Experimental results indicate that ATSMF is at least 20% faster than flash storage only and that its memory access ratio is more than 50%.

  • Modified Mutually ZCZ Set of Optical Orthogonal Sequences

    Takahiro MATSUMOTO  Hideyuki TORII  Yuta IDA  Shinya MATSUFUJI  

     
    LETTER-Spread Spectrum Technologies and Applications

      Vol:
    E101-A No:12
      Page(s):
    2415-2418

    In this paper, we propose a generation method of new mutually zero-correlation zone set of optical orthogonal sequences (MZCZ-OOS) consisting of binary and bi-phase sequence pairs based on the optical zero-correlation zone (ZCZ) sequence set. The MZCZ-OOS is composed of several small orthogonal sequence sets. The sequences that belong to same subsets are orthogonal, and there is a ZCZ between the sequence that belong to different subsets. The set is suitable for the M-ary quasi-synchronous optical code-division multiple access (M-ary/QS-OCDMA) system. The product of set size S and family size M of proposed MMZCZ-OOS is more than the upper bound of optical ZCZ sequence set, and is fewer than the that of optical orthogonal sequence set.

  • A Low-Complexity and Fast Convergence Message Passing Receiver Based on Partial Codeword Transmission for SCMA Systems

    Xuewan ZHANG  Wenping GE  Xiong WU  Wenli DAI  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Pubricized:
    2018/05/16
      Vol:
    E101-B No:11
      Page(s):
    2259-2266

    Sparse code multiple access (SCMA) based on the message passing algorithm (MPA) for multiuser detection is a competitive non-orthogonal multiple access technique for fifth-generation wireless communication networks Among the existing multiuser detection schemes for uplink (UP) SCMA systems, the serial MPA (S-MPA) scheme, where messages are updated sequentially, generally converges faster than the conventional MPA (C-MPA) scheme, where all messages are updated in a parallel manner. In this paper, the optimization of message scheduling in the S-MPA scheme is proposed. Firstly, some statistical results for the probability density function (PDF) of the received signal are obtained at various signal-to-noise ratios (SNR) by using the Monte Carlo method. Then, based on the non-orthogonal property of SCMA, the data mapping relationship between resource nodes and user nodes is comprehensively analyzed. A partial codeword transmission of S-MPA (PCTS-MPA) with threshold decision scheme of PDF is proposed and verified. Simulations show that the proposed PCTS-MPA not only reduces the complexity of MPA without changing the bit error ratio (BER), but also has a faster convergence than S-MPA, especially at high SNR values.

  • Underground Infrastructure Management System using Internet of Things Wireless Transmission Technology Open Access

    Yo YAMAGUCHI  Yosuke FUJINO  Hajime KATSUDA  Marina NAKANO  Hiroyuki FUKUMOTO  Shigeru TERUHI  Kazunori AKABANE  Shuichi YOSHINO  

     
    INVITED PAPER

      Vol:
    E101-C No:10
      Page(s):
    727-733

    This paper presents a water leakage monitoring system that gathers acoustic data of water pipes using wireless communication technology and identifies the sound of water leakage using machine leaning technology. To collect acoustic data effectively, this system combines three types of data-collection methods: drive-by, walk-by, and static. To design this system, it is important to ascertain the wireless communication distance that can be achieved with sensors installed in a basement. This paper also reports on radio propagation from underground manholes made from reinforced concrete and resin concrete in residential and commercial areas using the 920 MHz band. We reveal that it is possible to design a practical system that uses radio communication from underground sensors.

  • Mobile Network Architectures and Context-Aware Network Control Technology in the IoT Era Open Access

    Takanori IWAI  Daichi KOMINAMI  Masayuki MURATA  Ryogo KUBO  Kozo SATODA  

     
    INVITED PAPER

      Pubricized:
    2018/04/13
      Vol:
    E101-B No:10
      Page(s):
    2083-2093

    As IoT services become more popular, mobile networks will have to accommodate a wide variety of devices that have different requirements such as different bandwidth limitations and latencies. This paper describes edge distributed mobile network architectures for the IoT era based on dedicated network technology and multi-access edge computing technology, which have been discussed in 3GPP and ETSI. Furthermore, it describes two context-aware control methods that will make mobile networks on the network architecture more efficient, reliable, and real-time: autonomous and distributed mobility management and bandwidth-guaranteed transmission rate control in a networked control system.

  • Restricted Access Window Based Hidden Node Problem Mitigating Algorithm in IEEE 802.11ah Networks

    Ruoyu WANG  Min LIN  

     
    PAPER-Network

      Pubricized:
    2018/03/29
      Vol:
    E101-B No:10
      Page(s):
    2162-2171

    IEEE 802.11ah is a specification being developed for sub-1GHz license-exempt operation and is intended to provide Low Power Wide Area (LPWA) communication services and support Internet of Things (IoT) features such as large-scale networks and extended transmission range. However, these features also make the 802.11ah networks highly susceptible to channel contention and hidden node problem (HNP). To address the problems, the 11ah Task Group proposed a Restricted Access Window (RAW) mechanism. It shows outstanding performance in alleviating channel contention, but its effect on solving HNP is unsatisfactory. In this paper, we propose a simple and effective hidden node grouping algorithm (HNGA) based on IEEE 802.11ah RAW. The algorithm collects hidden node information by taking advantage of the 802.11 association process and then performs two-stage uniform grouping to prevent hidden node collisions (HNCs). Performance of the proposed algorithm is evaluated in comparison with other existing schemes in a hidden node situation. The results show that our proposed algorithm eliminates most of hidden node pairs inside a RAW group with low overhead penalty, thereby improving the performance of the network. Moreover, the algorithm is immune to HNCs caused by cross slot boundary transmissions.

  • Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames

    Qian LU  Haipeng QU  Yuan ZHUANG  Xi-Jun LIN  Yuzhan OUYANG  

     
    PAPER-Information Network

      Pubricized:
    2018/07/02
      Vol:
    E101-D No:10
      Page(s):
    2465-2473

    With the development of wireless network technology and popularization of mobile devices, the Wireless Local Area Network (WLAN) has become an indispensable part of our daily life. Although the 802.11-based WLAN provides enormous convenience for users to access the Internet, it also gives rise to a number of security issues. One of the most severe threat encountered by Wi-Fi users is the evil twin attacks. The evil twin, a kind of rogue access points (RAPs), masquerades as a legitimate access point (AP) to lure users to connect it. Due to the characteristics of strong concealment, high confusion, great harmfulness and easy implementation, the evil twin has led to significant loss of sensitive information and become one of the most prominent security threats in recent years. In this paper, we propose a passive client-based detection solution that enables users to independently identify and locate evil twins without any assistance from a wireless network administrator. Because of the forwarding behavior of evil twins, proposed method compares 802.11 data frames sent by target APs to users to determine evil twin attacks. We implemented our detection technique in a Python tool named ET-spotter. Through implementation and evaluation in our study, our algorithm achieves 96% accuracy in distinguishing evil twins from legitimate APs.

61-80hit(874hit)