The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] probability(432hit)

1-20hit(432hit)

  • Stop-Probability-Based Network Topology Discovery Method Open Access

    Yuguang ZHANG  Zhiyong ZHANG  Wei ZHANG  Deming MAO  Zhihong RAO  

     
    PAPER-Network

      Vol:
    E107-B No:9
      Page(s):
    583-594

    Using a limited number of probes has always been a focus in interface-level network topology probing to discover complete network topologies. Stop-set-based network topology probing methods significantly reduce the number of probes sent but suffer from the side effect of incomplete topology information discovery. This study proposes an optimized probing method based on stop probabilities (SPs) that builds on existing stop-set-based network topology discovery methods to address the issue of incomplete topology information owing to multipath routing. The statistics of repeat nodes (RNs) and multipath routing on the Internet are analyzed and combined with the principles of stop-set-based probing methods, highlighting that stopping probing at the first RN compromises the completeness of topology discovery. To address this issue, SPs are introduced to adjust the stopping strategy upon encountering RNs during probing. A method is designed for generating SPs that achieves high completeness and low cost based on the distribution of the number of RNs. Simulation experiments demonstrate that the proposed stop-probability-based probing method almost completely discovers network nodes and links across different regions and times over a two-year period, while significantly reducing probing redundancy. In addition, the proposed approach balances and optimizes the trade-off between complete topology discovery and reduced probing costs compared with existing topology probing methods. Building on this, the factors influencing the probing cost of the proposed method and methods to further reduce the number of probes while ensuring completeness are analyzed. The proposed method yields universally applicable SPs in the current Internet environment.

  • Accurate False-Positive Probability of Multiset-Based Demirci-Selçuk Meet-in-the-Middle Attacks Open Access

    Dongjae LEE  Deukjo HONG  Jaechul SUNG  Seokhie HONG  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2024/03/15
      Vol:
    E107-A No:8
      Page(s):
    1212-1228

    In this study, we focus on evaluating the false-positive probability of the Demirci-Selçuk meet-in-the-middle attack, particularly within the context of configuring precomputed tables with multisets. During the attack, the adversary effectively reduces the size of the key space by filtering out the wrong keys, subsequently recovering the master key from the reduced key space. The false-positive probability is defined as the probability that a wrong key will pass through the filtering process. Due to its direct impact on the post-filtering key space size, the false-positive probability is an important factor that influences the complexity and feasibility of the attack. However, despite its significance, the false-positive probability of the multiset-based Demirci-Selçuk meet-in-the-middle attack has not been thoroughly discussed, to the best of our knowledge. We generalize the Demirci-Selçuk meet-in-the-middle attack and present a sophisticated method for accurately calculating the false-positive probability. We validate our methodology through toy experiments, demonstrating its high precision. Additionally, we propose a method to optimize an attack by determining the optimal format of precomputed data, which requires the precise false-positive probability. Applying our approach to previous attacks on AES and ARIA, we have achieved modest improvements. Specifically, we enhance the memory complexity and time complexity of the offline phase of previous attacks on 7-round AES-128/192/256, 7-round ARIA-192/256, and 8-round ARIA-256 by factors ranging from 20.56 to 23. Additionally, we have improved the overall time complexity of attacks on 7-round ARIA-192/256 by factors of 20.13 and 20.42, respectively.

  • Secrecy Outage Probability and Secrecy Diversity Order of Alamouti STBC with Decision Feedback Detection over Time-Selective Fading Channels Open Access

    Gyulim KIM  Hoojin LEE  Xinrong LI  Seong Ho CHAE  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2023/09/19
      Vol:
    E107-A No:6
      Page(s):
    923-927

    This letter studies the secrecy outage probability (SOP) and the secrecy diversity order of Alamouti STBC with decision feedback (DF) detection over the time-selective fading channels. For given temporal correlations, we have derived the exact SOPs and their asymptotic approximations for all possible combinations of detection schemes including joint maximum likehood (JML), zero-forcing (ZF), and DF at Bob and Eve. We reveal that the SOP is mainly influenced by the detection scheme of the legitimate receiver rather than eavesdropper and the achievable secrecy diversity order converges to two and one for JML only at Bob (i.e., JML-JML/ZF/DF) and for the other cases (i.e., ZF-JML/ZF/DF, DF-JML/ZF/DF), respectively. Here, p-q combination pair indicates that Bob and Eve adopt the detection method p ∈ {JML, ZF, DF} and q ∈ {JML, ZF, DF}, respectively.

  • Performance of the Typical User in RIS-Assisted Indoor Ultra Dense Networks Open Access

    Sinh Cong LAM  Bach Hung LUU  Kumbesan SANDRASEGARAN  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E107-A No:6
      Page(s):
    932-935

    Cooperative Communication is one of the most effective techniques to improve the desired signal quality of the typical user. This paper studies an indoor cellular network system that deploys the Reconfigurable Intelligent Surfaces (RIS) at the position of BSs to enable the cooperative features. To evaluate the network performance, the coverage probability expression of the typical user in the indoor wireless environment with presence of walls and effects of Rayleigh fading is derived. The analytical results shows that the RIS-assisted system outperforms the regular one in terms of coverage probability.

  • Recursive Probability Mass Function Method to Calculate Probability Distributions of Pulse-Shaped Signals

    Tomoya FUKAMI  Hirobumi SAITO  Akira HIROSE  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2023/03/27
      Vol:
    E106-A No:10
      Page(s):
    1286-1296

    This paper proposes an accurate and efficient method to calculate probability distributions of pulse-shaped complex signals. We show that the distribution over the in-phase and quadrature-phase (I/Q) complex plane is obtained by a recursive probability mass function of the accumulator for a pulse-shaping filter. In contrast to existing analytical methods, the proposed method provides complex-plane distributions in addition to instantaneous power distributions. Since digital signal processing generally deals with complex amplitude rather than power, the complex-plane distributions are more useful when considering digital signal processing. In addition, our approach is free from the derivation of signal-dependent functions. This fact results in its easy application to arbitrary constellations and pulse-shaping filters like Monte Carlo simulations. Since the proposed method works without numerical integrals and calculations of transcendental functions, the accuracy degradation caused by floating-point arithmetic is inherently reduced. Even though our method is faster than Monte Carlo simulations, the obtained distributions are more accurate. These features of the proposed method realize a novel framework for evaluating the characteristics of pulse-shaped signals, leading to new modulation, predistortion and peak-to-average power ratio (PAPR) reduction schemes.

  • Theoretical Analysis of Fully Wireless-Power-Transfer Node Networks Open Access

    Hiroshi SAITO  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2023/05/10
      Vol:
    E106-B No:10
      Page(s):
    864-872

    The performance of a fully wireless-power-transfer (WPT) node network, in which each node transfers (and receives) energy through a wireless channel when it has sufficient (and insufficient) energy in its battery, was theoretically analyzed. The lost job ratio (LJR), namely, is the ratio of (i) the amount of jobs that cannot be done due to battery of a node running out to (ii) the amount of jobs that should be done, is used as a performance metric. It describes the effect of the battery of each node running out and how much additional energy is needed. Although it is known that WPT can reduce the probability of the battery running out among a few nodes within a small area, the performance of a fully WPT network has not been clarified. By using stochastic geometry and first-passage-time analysis for a diffusion process, the expected LJR was theoretically derived. Numerical examples demonstrate that the key parameters determining the performance of the network are node density, threshold switching of statuses between “transferring energy” and “receiving energy,” and the parameters of power conversion. They also demonstrate the followings: (1) The mean energy stored in the node battery decreases in the networks because of the loss caused by WPT, and a fully WPT network cannot decrease the probability of the battery running out under the current WPT efficiency. (2) When the saturation value of power conversion increases, a fully WPT network can decrease the probability of the battery running out although the mean energy stored in the node battery still decreases in the networks. This result is explained by the fact that the variance of stored energy in each node battery becomes smaller due to transfer of energy from nodes of sufficient energy to nodes of insufficient energy.

  • Performance Analysis and Optimization of Worst Case User in CoMP Ultra Dense Networks

    Sinh Cong LAM  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2023/03/27
      Vol:
    E106-B No:10
      Page(s):
    979-986

    In the cellular system, the Worst Case User (WCU), whose distances to three nearest BSs are the similar, usually achieves the lowest performance. Improving user performance, especially the WCU, is a big problem for both network designers and operators. This paper works on the WCU in terms of coverage probability analysis by the stochastic geometry tool and data rate optimization with the transmission power constraint by the reinforcement learning technique under the Stretched Pathloss Model (SPLM). In analysis, only fast fading from the WCU to the serving Base Stations (BSs) is taken into the analysis to derive the lower bound coverage probability. Furthermore, the paper assumes that the Coordinated Multi-Point (CoMP) technique is only employed for the WCU to enhance its downlink signal and avoid the explosion of Intercell Interference (ICI). Through the analysis and simulation, the paper states that to improve the WCU performance under bad wireless environments, an increase in transmission power can be a possible solution. However, in good environments, the deployment of advanced techniques such as Joint Transmission (JT), Joint Scheduling (JS), and reinforcement learning is an suitable solution.

  • Exploiting RIS-Aided Cooperative Non-Orthogonal Multiple Access with Full-Duplex Relaying

    Guoqing DONG  Zhen YANG  Youhong FENG  Bin LYU  

     
    LETTER-Mobile Information Network and Personal Communications

      Pubricized:
    2023/01/06
      Vol:
    E106-A No:7
      Page(s):
    1011-1015

    In this paper, a novel reconfigurable intelligent surface (RIS)-aided full-duplex (FD) cooperative non-orthogonal multiple access (CNOMA) network is investigated over Nakagami-m fading channels, where two RISs are employed to help the communication of paired users. To evaluate the potential benefits of our proposed scheme, we first derive the closed-form expressions of the outage probability. Then, we derive users' diversity orders according to the asymptotic approximation at high signal-to-noise-ratio (SNR). Simulation results validate our analysis and reveal that users' diversity orders are affected by their channel fading parameters, the self-interference of FD, and the number of RIS elements.

  • Performance of Modified Fractional Frequency Reuse in Nakagami-m Fading Channel

    Sinh Cong LAM  Bach Hung LUU  Nam Hoang NGUYEN  Trong Minh HOANG  

     
    LETTER-Mobile Information Network and Personal Communications

      Pubricized:
    2023/01/18
      Vol:
    E106-A No:7
      Page(s):
    1016-1019

    Fractional Frequency Reuse (FFR), which was introduced by 3GPP is considered the powerful technique to improve user performance. However, implementation of FFR is a challenge due to strong dependence between base stations (BSs) in terms of resource allocations. This paper studies a modified and flexible FFR scheme that allows all BSs works independently. The analytical and simulation results prove that the modified FFR scheme outperforms the conventional FFR.

  • On Secrecy Performance Analysis for Downlink RIS-Aided NOMA Systems

    Shu XU  Chen LIU  Hong WANG  Mujun QIAN  Jin LI  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2022/11/21
      Vol:
    E106-B No:5
      Page(s):
    402-415

    Reconfigurable intelligent surface (RIS) has the capability of boosting system performance by manipulating the wireless propagation environment. This paper investigates a downlink RIS-aided non-orthogonal multiple access (NOMA) system, where a RIS is deployed to enhance physical-layer security (PLS) in the presence of an eavesdropper. In order to improve the main link's security, the RIS is deployed between the source and the users, in which a reflecting element separation scheme is developed to aid data transmission of both the cell-center and the cell-edge users. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed RIS-aided NOMA scheme. To obtain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. Moreover, the secrecy diversity order is derived according to the asymptotic approximation in the high signal-to-noise ratio (SNR) and main-to-eavesdropper ratio (MER) regime. Furthermore, based on the derived results, the power allocation coefficient and number of elements are optimized to minimize the system SOP. Simulations demonstrate that the theoretical results match well with the simulation results and the SOP of the proposed scheme is clearly less than that of the conventional orthogonal multiple access (OMA) scheme obviously.

  • Intelligent Reconfigurable Surface-Aided Space-Time Line Code for 6G IoT Systems: A Low-Complexity Approach

    Donghyun KIM  Bang Chul JUNG  

     
    LETTER-Information Theory

      Pubricized:
    2022/08/10
      Vol:
    E106-A No:2
      Page(s):
    154-158

    Intelligent reconfigurable surfaces (IRS) have attracted much attention from both industry and academia due to their performance improving capability and low complexity for 6G wireless communication systems. In this letter, we introduce an IRS-assisted space-time line code (STLC) technique. The STLC was introduced as a promising technique to acquire the optimal diversity gain in 1×2 single-input multiple-output (SIMO) channel without channel state information at receiver (CSIR). Using the cosine similarity theorem, we propose a novel phase-steering technique for the proposed IRS-assisted STLC technique. We also mathematically characterize the proposed IRS-assisted STLC technique in terms of outage probability and bit-error rate (BER). Based on computer simulations, it is shown that the results of analysis shows well match with the computer simulation results for various communication scenarios.

  • Distortion Analysis of RF Power Amplifier Using Probability Density of Input Signal and AM-AM Characteristics

    Satoshi TANAKA  

     
    PAPER

      Pubricized:
    2022/05/11
      Vol:
    E105-A No:11
      Page(s):
    1436-1442

    When confirming the ACLR (adjacent channel leakage power ratio), which are representative indicators of distortion in the design of PA (power amplifier), it is well known how to calculate the AM-AM/PM characteristics of PA, input time series data of modulated signals, and analyze the output by Fourier analysis. In 5G (5th generation) mobile phones, not only QPSK (quadrature phase shift keying) modulation but also 16QAM (quadrature modulation), 64QAM, and 256QAM are becoming more multivalued as modulation signals. In addition, the modulation band may exceed 100MHz, and the amount of time series data increases, and the increase in calculation time becomes a problem. In order to shorten the calculation time, calculating the total amount of distortion generated by PA from the probability density of the modulation signal and the AM (amplitude modulation)-AM/PM (phase modulation) characteristics of PA is considered. For the AM-AM characteristics of PA, in this paper, IMD3 (inter modulation distortion 3) obtained from probability density and IMD3 by Fourier analysis, which are often used so long, are compared. As a result, it was confirmed that the result of probability density analysis is similar to that of Fourier analysis, when the nonlinearity is somewhat small. In addition, the agreement between the proposed method and the conventional method was confirmed with an error of about 2.0dB of ACLR using the modulation waves with a bandwidth of 5MHz, RB (resource block) being 25, and QPSK modulation.

  • Neuron-Network-Based Mixture Probability Model for Passenger Walking Time Distribution Estimation

    Hao FANG  Chi-Hua CHEN  Dewang CHEN  Feng-Jang HWANG  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2022/01/28
      Vol:
    E105-D No:5
      Page(s):
    1112-1115

    Aiming for accurate data-driven predictions for the passenger walking time, this study proposes a novel neuron-network-based mixture probability (NNBMP) model with repetition learning (RL) to estimate the probability density distribution of passenger walking time (PWT) in the metro station. Our conducted experiments for Fuzhou metro stations demonstrate that the proposed NNBMP-RL model achieved the mean absolute error, mean square error, and mean absolute percentage error of 0.0078, 1.33 × 10-4, and 19.41%, respectively, and it outperformed all the seven compared models. The developed NNBMP model fitting accurately the PWT distribution in the metro station is readily applicable to the microscopic analyses of passenger flow.

  • Maximum Doppler Frequency Detection Based on Likelihood Estimation With Theoretical Thresholds Open Access

    Satoshi DENNO  Kazuma HOTTA  Yafei HOU  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2021/10/25
      Vol:
    E105-B No:5
      Page(s):
    657-664

    This paper proposes a novel maximum Doppler frequency detection technique for user moving velocity estimation. The maximum Doppler frequency is estimated in the proposed detection technique by making use of the fact that user moving velocity is not distributed continuously. The fluctuation of the channel state information during a packet is applied for the proposed detection, in which likelihood estimation is performed by comparing the fluctuation with the thresholds. The thresholds are theoretically derived on the assumption that the fluctuation is distributed with an exponential function. An approximated detection technique is proposed to simplify the theoretical threshold derivation. The performance of the proposed detection is evaluated by computer simulation. The proposed detection accomplishes better detection performance as the fluctuation values are summed over more packets. The proposed detection achieves about 90% correct detection performance in a fading channel with the Eb/N0 = 35dB, when the fluctuation values are summed over only three packets. Furthermore, the approximated detection also achieves the same detection performance.

  • Comparison of a Probabilistic Returning Scheme for Preemptive and Non-Preemptive Schemes in Cognitive Radio Networks with Two Classes of Secondary Users

    Yuan ZHAO  Wuyi YUE  Yutaka TAKAHASHI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2021/09/24
      Vol:
    E105-B No:3
      Page(s):
    338-346

    In this paper, we consider the transmission needs of communication networks for two classes of secondary users (SUs), named SU1 and SU2 (lowest priority) in cognitive radio networks (CRNs). In such CRNs, primary users (PUs) have preemptive priority over both SU1's users (SU1s) and SU2's users (SU2s). We propose a preemptive scheme (referred to as the P Scheme) and a non-preemptive scheme (referred to as the Non-P Scheme) when considering the interactions between SU1s and SU2s. Focusing on the transmission interruptions to SU2 packets, we present a probabilistic returning scheme with a returning probability to realize feedback control for SU2 packets. We present a Markov chain model to develop some formulas for SU1 and SU2 packets, and compare the influences of the P Scheme and the Non-P Scheme in the proposed probabilistic returning scheme. Numerical analyses compare the impact of the returning probability on the P Scheme and the Non-P Scheme. Furthermore, we optimize the returning probability and compare the optimal numerical results yielded by the P Scheme and the Non-P Scheme.

  • Analysis of Signal Distribution in ASE-Limited Optical On-Off Keying Direct-Detection Systems

    Hiroki KAWAHARA  Kyo INOUE  Koji IGARASHI  

     
    PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2021/05/14
      Vol:
    E104-B No:11
      Page(s):
    1386-1394

    This paper provides on a theoretical and numerical study of the probability density function (PDF) of the on-off keying (OOK) signals in ASE-limited systems. We present simple closed formulas of PDFs for the optical intensity and the received baseband signal. To confirm the validity of our model, the calculation results yielded by the proposed formulas are compared with those of numerical simulations and the conventional Gaussian model. Our theoretical and numerical results confirm that the signal distribution differs from a Gaussian profile. It is also demonstrated that our model can properly evaluate the signal distribution and the resultant BER performance, especially for systems with an optical bandwidth close to the receiver baseband width.

  • A Multi-Task Scheme for Supervised DNN-Based Single-Channel Speech Enhancement by Using Speech Presence Probability as the Secondary Training Target

    Lei WANG  Jie ZHU  Kangbo SUN  

    This paper has been cancelled due to violation of duplicate submission policy on IEICE Transactions on Information and Systems.
     
    PAPER-Speech and Hearing

      Pubricized:
    2021/08/05
      Vol:
    E104-D No:11
      Page(s):
    1963-1970

    To cope with complicated interference scenarios in realistic acoustic environment, supervised deep neural networks (DNNs) are investigated to estimate different user-defined targets. Such techniques can be broadly categorized into magnitude estimation and time-frequency mask estimation techniques. Further, the mask such as the Wiener gain can be estimated directly or derived by the estimated interference power spectral density (PSD) or the estimated signal-to-interference ratio (SIR). In this paper, we propose to incorporate the multi-task learning in DNN-based single-channel speech enhancement by using the speech presence probability (SPP) as a secondary target to assist the target estimation in the main task. The domain-specific information is shared between two tasks to learn a more generalizable representation. Since the performance of multi-task network is sensitive to the weight parameters of loss function, the homoscedastic uncertainty is introduced to adaptively learn the weights, which is proven to outperform the fixed weighting method. Simulation results show the proposed multi-task scheme improves the speech enhancement performance overall compared to the conventional single-task methods. And the joint direct mask and SPP estimation yields the best performance among all the considered techniques.

  • Image Based Coding of Spatial Probability Distribution on Human Dynamics Data

    Hideaki KIMATA  Xiaojun WU  Ryuichi TANIDA  

     
    PAPER

      Pubricized:
    2021/06/24
      Vol:
    E104-D No:10
      Page(s):
    1545-1554

    The need for real-time use of human dynamics data is increasing. The technical requirements for this include improved databases for handling a large amount of data as well as highly accurate sensing of people's movements. A bitmap index format has been proposed for high-speed processing of data that spreads in a two-dimensional space. Using the same format is expected to provide a service that searches queries, reads out desired data, visualizes it, and analyzes it. In this study, we propose a coding format that enables human dynamics data to compress it in the target data size, in order to save data storage for successive increase of real-time human dynamics data. In the proposed method, the spatial population distribution, which is expressed by a probability distribution, is approximated and compressed using the one-pixel one-byte data format normally used for image coding. We utilize two kinds of approximation, which are accuracy of probability and precision of spatial location, in order to control the data size and the amount of information. For accuracy of probability, we propose a non-linear mapping method for the spatial distribution, and for precision of spatial location, we propose spatial scalable layered coding to refine the mesh level of the spatial distribution. Also, in order to enable additional detailed analysis, we propose another scalable layered coding that improves the accuracy of the distribution. We demonstrate through experiments that the proposed data approximation and coding format achieve sufficient approximation of spatial population distribution in the given condition of target data size.

  • Network Tomography Using Routing Probability for Undeterministic Routing Open Access

    Rie TAGYO  Daisuke IKEGAMI  Ryoichi KAWAHARA  

     
    PAPER-Network

      Pubricized:
    2021/01/14
      Vol:
    E104-B No:7
      Page(s):
    837-848

    The increased performance of mobile terminals has made it feasible to collect data using users' terminals. By making the best use of the network performance data widely collected in this way, network operators should deeply understand the current network conditions, identify the performance-degraded components in the network, and estimate the degree of their performance degradation. For their demands, one powerful solution with such end-to-end data measured by users' terminals is network tomography. Meanwhile, with the advance of network virtualization by software-defined networking, routing is dynamically changed due to congestion or other factors, and each end-to-end measurement flow collected from users may pass through different paths between even the same origin-destination node pair. Therefore, it is difficult and costly to identify through which path each measurement flow has passed, so it is also difficult to naively apply conventional network tomography to such networks where the measurement paths cannot be uniquely determined. We propose a novel network tomography for the networks with undeterministic routing where the measurement flows pass through multiple paths in spite of the origin-destination node pair being the same. The basic idea of our method is to introduce routing probability in accordance with the aggregated information of measurement flows. We present two algorithms and evaluate their performances by comparing them with algorithms of conventional tomography using determined routing information. Moreover, we verify that the proposed algorithms are applicable to a more practical network.

  • Statistical Analysis of Phase-Only Correlation Functions under the Phase Fluctuation of Signals due to Additive Gaussian Noise

    Shunsuke YAMAKI  Kazuhiro FUKUI  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2020/09/29
      Vol:
    E104-A No:4
      Page(s):
    671-679

    This paper proposes statistical analysis of phase-only correlation (POC) functions under the phase fluctuation of signals due to additive Gaussian noise. We derive probability density function of phase-spectrum differences between original signal and its noise-corrupted signal with additive Gaussian noise. Furthermore, we evaluate the expectation and variance of the POC functions between these two signals. As the variance of Gaussian noise increases, the expectation of the peak of the POC function monotonically decreases and variance of the POC function monotonically increases. These results mathematically guarantee the validity of the POC functions used for similarity measure in matching techniques.

1-20hit(432hit)