The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] digit(1035hit)

1-20hit(1035hit)

  • State-Space Realization of Adaptive IIR Notch Digital Filters with Unbiased Parameter-Estimation Open Access

    Yoichi HINAMOTO  Shotaro NISHIMURA  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2024/07/09
      Vol:
    E107-A No:11
      Page(s):
    1650-1657

    A state-space approach for adaptive second-order IIR notch digital filters is explored. A simplified iterative algorithm is derived from the gradient-descent method to minimize the mean-squared output of an adaptive notch digital filter. The stability and parameter-estimation bias are then analyzed by employing a first-order linear dynamical system. As a consequence, it is clarified that the resulting parameter estimate is unbiased. Finally, a numerical example is presented to demonstrate the validity and effectiveness of the adaptive state-space notch digital filter and bias analysis of parameter estimation.

  • Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors Open Access

    Koichi MORIYAMA  Akira OTSUKA  

     
    INVITED PAPER

      Pubricized:
    2024/04/15
      Vol:
    E107-D No:9
      Page(s):
    1112-1122

    This article describes the idea of utilizing Attested Execution Secure Processors (AESPs) that fit into building a secure Self-Sovereign Identity (SSI) system satisfying Sybil-resistance under permissionless blockchains. Today’s circumstances requiring people to be more online have encouraged us to address digital identity preserving privacy. There is a momentum of research addressing SSI, and many researchers approach blockchain technology as a foundation. SSI brings natural persons various benefits such as owning controls; on the other side, digital identity systems in the real world require Sybil-resistance to comply with Anti-Money-Laundering (AML) and other needs. The main idea in our proposal is to utilize AESPs for three reasons: first is the use of attested execution capability along with tamper-resistance, which is a strong assumption; second is powerfulness and flexibility, allowing various open-source programs to be executed within a secure enclave, and the third is that equipping hardware-assisted security in mobile devices has become a norm. Rafael Pass et al.’s formal abstraction of AESPs and the ideal functionality $\color{brown}{\mathcal{G}_\mathtt{att}}$ enable us to formulate how hardware-assisted security works for secure digital identity systems preserving privacy under permissionless blockchains mathematically. Our proposal of the AESP-based SSI architecture and system protocols, $\color{blue}{\Pi^{\mathcal{G}_\mathtt{att}}}$, demonstrates the advantages of building a proper SSI system that satisfies the Sybil-resistant requirement. The protocols may eliminate the online distributed committee assumed in other research, such as CanDID, because of assuming AESPs; thus, $\color{blue}{\Pi^{\mathcal{G}_\mathtt{att}}}$ allows not to rely on multi-party computation (MPC), bringing drastic flexibility and efficiency compared with the existing SSI systems.

  • Waveguide Slot Array with Code-Division Multiplexing Function for Single RF Chain Digital Beamforming Open Access

    Narihiro NAKAMOTO  Kazunari KIHIRA  Toru FUKASAWA  Yoshio INASAWA  Naoki SHINOHARA  

     
    PAPER-Antennas and Propagation

      Vol:
    E107-B No:8
      Page(s):
    541-551

    This study presents a novel waveguide slot array with a code-division multiplexing function for single RF chain digital beamforming. The proposed antenna is comprised of a rectangular metallic waveguide’s bottom part and a multilayer printed circuit board (PCB) with the rectangular waveguide’s top wall and slot apertures. Multiple pairs of two symmetric longitudinal slots are etched on the metal surface of the PCB, and a PIN diode is mounted across each slot. The received signals of each slot pair are multiplexed in a code-division multiplexing fashion by switching the diodes’ bias according to the Walsh Hadamard code, and the original signals are then recovered through a despreading process in the digital domain for digital beamforming. A prototype antenna with eight slot pairs has been fabricated and tested for proof of concept. The measured results show the feasibility of the proposed antenna.

  • Investigation and Improvement on Self-Dithered MASH ΔΣ Modulator for Fractional-N Frequency Synthesis Open Access

    Yuyang ZHU  Zunsong YANG  Masaru OSADA  Haoming ZHANG  Tetsuya IIZUKA  

     
    LETTER

      Pubricized:
    2023/12/05
      Vol:
    E107-A No:5
      Page(s):
    746-750

    Self-dithered digital delta-sigma modulators (DDSMs) are commonly used in fractional-N frequency synthesizers due to their ability to eliminate unwanted spurs from the synthesizer’s spectra without requiring additional hardware. However, when operating with a low-bit input, self-dithered DDSMs can still suffer from spurious tones at certain inputs. In this paper, we propose a self-dithered MASH 1-1-1-1 structure to mitigate the spur issue in the self-dithered MASH DDSMs. The proposed self-dithered MASH 1-1-1-1 suppresses the spurs with shaped dithering and achieves 4th order noise shaping.

  • Effect of Perceptually Uniform Color Space and Diversity of Chromaticity Components on Digital Signage and Image Sensor-Based Visible Light Communication Open Access

    Kazuya SHIMEI  Kentaro KOBAYASHI  Wataru CHUJO  

     
    PAPER-Communication Theory and Signals

      Pubricized:
    2023/08/07
      Vol:
    E107-A No:4
      Page(s):
    638-653

    We study a visible light communication (VLC) system that modulates data signals by changing the color components of image contents on a digital signage display, captures them with an image sensor, and demodulates them using image processing. This system requires that the modulated data signals should not be perceived by the human eye. Previous studies have proposed modulation methods with a chromaticity component that is difficult for the human eye to perceive, and we have also proposed a modulation method with perceptually uniform color space based on human perception characteristics. However, which chromaticity component performs better depends on the image contents, and the evaluation only for some specific image contents was not sufficient. In this paper, we evaluate the communication and visual quality of the modulation methods with chromaticity components for various standard images to clarify the superiority of the method with perceptually uniform color space. In addition, we propose a novel modulation and demodulation method using diversity combining to eliminate the dependency of performance on the image contents. Experimental results show that the proposed method can improve the communication and visual quality for almost all the standard images.

  • A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme with Key Aggregation

    Rikuhiro KOJIMA  Jacob C. N. SCHULDT  Goichiro HANAOKA  

     
    PAPER

      Pubricized:
    2023/09/20
      Vol:
    E107-A No:3
      Page(s):
    193-202

    Multi-signatures have seen renewed interest due to their application to blockchains, e.g., BIP 340 (one of the Bitcoin improvement proposals), which has triggered the proposals of several new schemes with improved efficiency. However, many previous works have a “loose” security reduction (a large gap between the difficulty of the security assumption and breaking the scheme) or depend on strong idealized assumptions such as the algebraic group model (AGM). This makes the achieved level of security uncertain when instantiated in groups typically used in practice, and it becomes unclear for developers how secure a given scheme is for a given choice of security parameters. Thus, this leads to the question “what kind of schemes can we construct that achieves tight security based on standard assumptions?”. In this paper, we show a simple two-round tightly-secure pairing-based multi-signature scheme based on the computation Diffie-Hellman problem in the random oracle model. This proposal is the first two-round multi-signature scheme that achieves tight security based on a computational assumption and supports key aggregation. Furthermore, our scheme reduce the signature bit size by 19% compared with the shortest existing tightly-secure DDH-based multi-signature scheme. Moreover, we implemented our scheme in C++ and confirmed that it is efficient in practice; to complete the verification takes less than 1[ms] with a total (computational) signing time of 13[ms] for under 100 signers. The source code of the implementation is published as OSS.

  • Invisible Digital Image by Thin-Film Interference of Niobium Oxide Using Its Periodic Repeatability Open Access

    Shuichi MAEDA  Akihiro FUKAMI  Kaiki YAMAZAKI  

     
    INVITED PAPER

      Pubricized:
    2023/08/22
      Vol:
    E107-C No:2
      Page(s):
    42-46

    There are several benefits of the information that is invisible to the human eye. “Invisible” here means that it can be visualized or quantified when using instruments. For example, it can improve security without compromising product design. We have succeeded in making an invisible digital image on a metal substrate using periodic repeatability by thin-film interference of niobium oxides. Although this digital information is invisible in the visible light wavelength range of 400-800nm, but detectable in the infrared light that of 800-1150nm. This technology has a potential to be applied to anti-counterfeiting and traceability.

  • Interdigital and Multi-Via Structures for Mushroom-Type Metasurface Reflectors

    Taisei URAKAMI  Tamami MARUYAMA  Shimpei NISHIYAMA  Manato KUSAMIZU  Akira ONO  Takahiro SHIOZAWA  

     
    PAPER-Antennas and Propagation

      Vol:
    E107-B No:2
      Page(s):
    309-320

    The novel patch element shapes with the interdigital and multi-via structures for mushroom-type metasurface reflectors are proposed for controlling the reflection phases. The interdigital structure provides a wide reflection phase range by changing the depth of the interdigital fingers. In addition, the multi-via structure provides the higher positive reflection phases such as near +180°. The sufficient reflection phase range of 360° and the low polarization dependent properties could be confirmed by the electromagnetic field simulation. The metasurface reflector for the normal incident plane wave was designed. The desired reflection angles and sharp far field patterns of the reflected beams could be confirmed in the simulation results. The prototype reflectors for the experiments should be designed in the same way as the primary reflector design of the reflector antenna. Specifically, the reflector design method based on the ray tracing method using the incident wave phase was proposed for the prototype. The experimental radiation pattern for the reflector antenna composed of the transmitting antenna (TX) and the prototype metasurface reflector was similar to the simulated radiation pattern. The effectiveness of the proposed structures and their design methods could be confirmed by these simulation and experiment results.

  • Low-Complexity Digital Channelizer Design for Software Defined Radio

    Jinguang HAO  Gang WANG  Honggang WANG  Lili WANG  Xuefeng LIU  

     
    PAPER-Communication Theory and Signals

      Pubricized:
    2023/07/19
      Vol:
    E107-A No:1
      Page(s):
    134-140

    In software defined radio systems, a channelizer plays an important role in extracting the desired signals from a wideband signal. Compared to the conventional methods, the proposed scheme provides a solution to design a digital channelizer extracting the multiple subband signals at different center frequencies with low complexity. To do this, this paper formulates the problem as an optimization problem, which minimizes the required multiplications number subject to the constraints of the ripple in the passbands and the stopbands for single channel and combined multiple channels. In addition, a solution to solve the optimization problem is also presented and the corresponding structure is demonstrated. Simulation results show that the proposed scheme requires smaller number of the multiplications than other conventional methods. Moreover, unlike other methods, this structure can process signals with different bandwidths at different center frequencies simultaneously only by changing the status of the corresponding multiplexers without hardware reimplementation.

  • Demodulation Framework Based on Machine Learning for Unrepeated Transmission Systems

    Ryuta SHIRAKI  Yojiro MORI  Hiroshi HASEGAWA  

     
    PAPER

      Pubricized:
    2023/09/14
      Vol:
    E107-B No:1
      Page(s):
    39-48

    We propose a demodulation framework to extend the maximum distance of unrepeated transmission systems, where the simplest back propagation (BP), polarization and phase recovery, data arrangement for machine learning (ML), and symbol decision based on ML are rationally combined. The deterministic waveform distortion caused by fiber nonlinearity and chromatic dispersion is partially eliminated by BP whose calculation cost is minimized by adopting the single-step Fourier method in a pre-processing step. The non-deterministic waveform distortion, i.e., polarization and phase fluctuations, can be eliminated in a precise manner. Finally, the optimized ML model conducts the symbol decision under the influence of residual deterministic waveform distortion that cannot be cancelled by the simplest BP. Extensive numerical simulations confirm that a DP-16QAM signal can be transmitted over 240km of a standard single-mode fiber without optical repeaters. The maximum transmission distance is extended by 25km.

  • D2EcoSys: Decentralized Digital Twin EcoSystem Empower Co-Creation City-Level Digital Twins Open Access

    Kenji KANAI  Hidehiro KANEMITSU  Taku YAMAZAKI  Shintaro MORI  Aram MINE  Sumiko MIYATA  Hironobu IMAMURA  Hidenori NAKAZATO  

     
    INVITED PAPER

      Pubricized:
    2023/10/26
      Vol:
    E107-B No:1
      Page(s):
    50-62

    A city-level digital twin is a critical enabling technology to construct a smart city that helps improve citizens' living conditions and quality of life. Currently, research and development regarding the digital replica city are pursued worldwide. However, many research projects only focus on creating the 3D city model. A mechanism to involve key players, such as data providers, service providers, and application developers, is essential for constructing the digital replica city and producing various city applications. Based on this motivation, the authors of this paper are pursuing a research project, namely Decentralized Digital Twin EcoSystem (D2EcoSys), to create an ecosystem to advance (and self-grow) the digital replica city regarding time and space directions, city services, and values. This paper introduces an overview of the D2EcoSys project: vision, problem statement, and approach. In addition, the paper discusses the recent research results regarding networking technologies and demonstrates an early testbed built in the Kashiwa-no-ha smart city.

  • Multibeam Digital Predistorter with Intercarrier Interference Suppression for Millimeter-Wave Array Antenna Transmitters

    Tomoya OTA  Alexander N. LOZHKIN  Ken TAMANOI  Hiroyoshi ISHIKAWA  Takurou NISHIKAWA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2023/08/03
      Vol:
    E106-B No:12
      Page(s):
    1470-1478

    This paper proposes a multibeam digital predistorter (DPD) that suppresses intercarrier interference caused by nonlinear distortions of power amplifiers (PAs) while reducing the power consumption of a multibeam array antenna transmitter. The proposed DPD reduces power consumption by allowing the final PAs of the array antenna transmitter to operate in a highly efficient nonlinear mode and compensating for the nonlinear distortions of the PAs with a unified dedicated DPD per subarray. Additionally, it provides the required high-quality signal transmission for high throughputs, such as realizing a 256-quadrature amplitude modulation (QAM) transmission instead of a 64-QAM transmission. Specifically, it adds an inverse-component signal to cancel the interference from an adjacent carrier of another beam. Consequently, it can suppress the intercarrier interference in the beam direction and improve the error vector magnitude (EVM) during the multibeam transmission, in which the frequency bands of the beams are adjacent. The experimental results obtained for two beams at 28.0 and 28.4GHz demonstrate that, compared with the previous single-beam DPD, the proposed multibeam DPD can improve the EVM. Also, they demonstrate that the proposed DPD can achieve an EVM value of <3%, which completely satisfies the 3GPP requirements for a 256-QAM transmission.

  • Demodulation Performance Comparison of High-Speed Coherent Nyquist Pulse Signal with Analog and Digital Demultiplexing Schemes

    Masato YOSHIDA  Kosuke KIMURA  Toshihiko HIROOKA  Keisuke KASAI  Masataka NAKAZAWA  

     
    PAPER

      Pubricized:
    2023/05/11
      Vol:
    E106-B No:11
      Page(s):
    1059-1064

    We compare the demodulation performance of an analog OTDM demultiplexing scheme and digitized OTDM demultiplexing with an ultrahigh-speed digital signal processor in a single-channel OTDM coherent Nyquist pulse transmission. We evaluated the demodulation performance for 40, 80, and 160Gbaud OTDM signals with a baseline rate of 10Gbaud. As a result, we clarified that the analog scheme performs significantly better since the bandwidth for handling the demultiplexed signal is as narrow as 10GHz regardless of the symbol rate. This enables us to use a low-speed A/D converter (ADC) with a large effective number of bits (ENOB). On the other hand, in the digital scheme, the higher the symbol rate becomes, the more bandwidth the receiver requires. Therefore, it is necessary to use an ultrahigh-speed ADC with a low ENOB for a 160Gbaud signal. We measured the ENOB of the ultrahigh-speed ADC used in the digital scheme and showed that the measured ENOB was approximately 1.5 bits lower than that of the low-speed ADC used in the analog scheme. This 1.5-bit decrease causes a large degradation in the demodulation performance obtained with the digital demultiplexing scheme.

  • Real-Time Detection of Fiber Bending and/or Optical Filter Shift by Machine-Learning of Tapped Raw Digital Coherent Optical Signals

    Yuichiro NISHIKAWA  Shota NISHIJIMA  Akira HIRANO  

     
    PAPER

      Pubricized:
    2023/05/19
      Vol:
    E106-B No:11
      Page(s):
    1065-1073

    We have proposed autonomous network diagnosis platform for operation of future large capacity and virtualized network, including 5G and beyond 5G services. As for the one candidate of information collection and analyzing function blocks in the platform, we proposed novel optical sensing techniques that utilized tapped raw signal data acquired from digital coherent optical receivers. The raw signal data is captured before various digital signal processing for demodulation. Therefore, it contains various waveform deformation and/or noise as it experiences through transmission fibers. In this paper, we examined to detect two possible failures in transmission lines including fiber bending and optical filter shift by analyzing the above-mentioned raw signal data with the help of machine learning. For the purpose, we have implemented Docker container applications in WhiteBox Cassini to acquire real-time raw signal data. We generated CNN model for the detections in off-line processing and used them for real-time detections. We have confirmed successful detection of optical fiber bend and/or optical filter shift in real-time with high accuracy. Also, we evaluated their tolerance against ASE noise and invented novel approach to improve detection accuracy. In addition to that, we succeeded to detect them even in the situation of simultaneous occurrence of those failures.

  • A DFT and IWT-DCT Based Image Watermarking Scheme for Industry

    Lei LI  Hong-Jun ZHANG  Hang-Yu FAN  Zhe-Ming LU  

     
    LETTER-Information Network

      Pubricized:
    2023/08/22
      Vol:
    E106-D No:11
      Page(s):
    1916-1921

    Until today, digital image watermarking has not been large-scale used in the industry. The first reason is that the watermarking efficiency is low and the real-time performance cannot be satisfied. The second reason is that the watermarking scheme cannot cope with various attacks. To solve above problems, this paper presents a multi-domain based digital image watermarking scheme, where a fast DFT (Discrete Fourier Transform) based watermarking method is proposed for synchronization correction and an IWT-DCT (Integer Wavelet Transform-Discrete Cosine Transform) based watermarking method is proposed for information embedding. The proposed scheme has high efficiency during embedding and extraction. Compared with five existing schemes, the robustness of our scheme is very strong and our scheme can cope with many common attacks and compound attacks, and thus can be used in wide application scenarios.

  • Experimental Investigation on Electromagnetic Immunity and Conduction Immunity of Digital Control Circuit Based on ARM

    Yang XIAO  Zhongyuan ZHOU  Xiang ZHOU  Qi ZHOU  Mingjie SHENG  Yixing GU  Mingliang YANG  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2023/05/19
      Vol:
    E106-B No:10
      Page(s):
    969-978

    This paper analyzes the typical functions of digital control circuit and its function modules, and develops a set of digital control circuit equipment based on Advanced RISC Machines (ARM) with typical function modules, including principle design, interference injection trace design, function design, and study the failure mode and threshold of typical function modules. Based on continuous wave (CW) and pulse wave, the direct power injection (DPI) method is used to test the conduction immunity of the digital control circuit, and the failure mode and sensitivity threshold of the digital control circuit are quantitatively obtained. This method can provide experimental verification for the immunity ability of the digital control circuit to different electromagnetic interference.

  • Adaptive Buffering Time Optimization for Path Tracking Control of Unmanned Vehicle by Cloud Server with Digital Twin

    Yudai YOSHIMOTO  Masaki MINAGAWA  Ryohei NAKAMURA  Hisaya HADAMA  

     
    PAPER-Navigation, Guidance and Control Systems

      Pubricized:
    2022/12/26
      Vol:
    E106-B No:7
      Page(s):
    603-613

    Autonomous driving technology is expected to be applied to various applications with unmanned vehicles (UVs), such as small delivery vehicles for office supplies and smart wheelchairs. UV remote control by a cloud server (CS) would achieve cost-effective applications with a large number of UVs. In general, dead time in real-time feedback control reduces the control accuracy. On remote path tracking control by the CS, UV control accuracy deteriorates due to transmission delay and jitter through the Internet. Digital twin computing (DTC) and jitter buffer are effective to solve this problem. In our previous study, we clarified effectiveness of them in UV remote control by CS. The jitter buffer absorbs the transmission delay jitter of control signals. This is effective to achieve accurate UV remote control. Adaptive buffering time optimization according to real-time transmission characteristics is necessary to achieve more accurate UV control in CS-based remote control system with DTC and jitter buffer. In this study, we proposed a method for the adaptive optimization according to real-time transmission delay characteristics. To quantitatively evaluate the effectiveness of the method, we created a UV remote control simulator of the control system. The results of simulations quantitatively clarify that the adaptive optimization by the proposed method improves the UV control accuracy.

  • Intelligent Tool Condition Monitoring Based on Multi-Scale Convolutional Recurrent Neural Network

    Xincheng CAO  Bin YAO  Binqiang CHEN  Wangpeng HE  Suqin GUO  Kun CHEN  

     
    PAPER-Smart Industry

      Pubricized:
    2022/06/16
      Vol:
    E106-D No:5
      Page(s):
    644-652

    Tool condition monitoring is one of the core tasks of intelligent manufacturing in digital workshop. This paper presents an intelligent recognize method of tool condition based on deep learning. First, the industrial microphone is used to collect the acoustic signal during machining; then, a central fractal decomposition algorithm is proposed to extract sensitive information; finally, the multi-scale convolutional recurrent neural network is used for deep feature extraction and pattern recognition. The multi-process milling experiments proved that the proposed method is superior to the existing methods, and the recognition accuracy reached 88%.

  • Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption

    Kaisei KAJITA  Go OHTAKE  Kazuto OGAWA  Koji NUIDA  Tsuyoshi TAKAGI  

     
    PAPER

      Pubricized:
    2022/09/08
      Vol:
    E106-A No:3
      Page(s):
    228-240

    We propose a short signature scheme under the ring-SIS assumption in the standard model. Specifically, by revisiting an existing construction [Ducas and Micciancio, CRYPTO 2014], we demonstrate lattice-based signatures with improved reduction loss. As far as we know, there are no ways to use multiple tags in the signature simulation of security proof in the lattice tag-based signatures. We address the tag-collision possibility in the lattice setting, which improves reduction loss. Our scheme generates tags from messages by constructing a scheme under a mild security condition that is existentially unforgeable against random message attack with auxiliary information. Thus our scheme can reduce the signature size since it does not need to send tags with the signatures. Our scheme has short signature sizes of O(1) and achieves tighter reduction loss than that of Ducas et al.'s scheme. Our proposed scheme has two variants. Our scheme with one property has tighter reduction and the same verification key size of O(log n) as that of Ducas et al.'s scheme, where n is the security parameter. Our scheme with the other property achieves much tighter reduction loss of O(Q/n) and verification key size of O(n), where Q is the number of signing queries.

  • Secure Revocation Features in eKYC - Privacy Protection in Central Bank Digital Currency

    Kazuo TAKARAGI  Takashi KUBOTA  Sven WOHLGEMUTH  Katsuyuki UMEZAWA  Hiroki KOYANAGI  

     
    PAPER

      Pubricized:
    2022/10/07
      Vol:
    E106-A No:3
      Page(s):
    325-332

    Central bank digital currencies require the implementation of eKYC to verify whether a trading customer is eligible online. When an organization issues an ID proof of a customer for eKYC, that proof is usually achieved in practice by a hierarchy of issuers. However, the customer wants to disclose only part of the issuer's chain and documents to the trading partner due to privacy concerns. In this research, delegatable anonymous credential (DAC) and zero-knowledge range proof (ZKRP) allow customers to arbitrarily change parts of the delegation chain and message body to range proofs expressed in inequalities. That way, customers can protect the privacy they need with their own control. Zero-knowledge proof is applied to prove the inequality between two time stamps by the time stamp server (signature presentation, public key revocation, or non-revocation) without disclosing the signature content and stamped time. It makes it possible to prove that the registration information of the national ID card is valid or invalid while keeping the user's personal information anonymous. This research aims to contribute to the realization of a sustainable financial system based on self-sovereign identity management with privacy-enhanced PKI.

1-20hit(1035hit)