IEICE Transactions on Communications
Online ISSN : 1745-1345
Print ISSN : 0916-8516
E103.B 巻, 5 号
選択された号の論文の13件中1~13を表示しています
Regular Section
  • Masahiro TAKIGAWA, Shinsuke IBI, Seiichi SAMPEI
    原稿種別: PAPER
    専門分野: Fundamental Theories for Communications
    2020 年 E103.B 巻 5 号 p. 495-503
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/11/12
    ジャーナル 認証あり

    This paper proposes a successive interference cancellation (SIC) of independent component analysis (ICA) aided spatial division multiple access (SDMA) for Gaussian filtered frequency shift keying (GFSK) in Bluetooth low energy (BLE) systems. The typical SDMA scheme requires estimations of channel state information (CSI) using orthogonal pilot sequences. However, the orthogonal pilot is not embedded in the BLE packet. This fact motivates us to add ICA detector into BLE systems. In this paper, focusing on the covariance matrix of ICA outputs, SIC can be applied with Cholesky decomposition. Then, in order to address the phase ambiguity problems created by the ICA process, we propose a differential detection scheme based on the MAP algorithm. In practical scenarios, it is subject to carrier frequency offset (CFO) as well as symbol timing offset (STO) induced by the hardware impairments present in the BLE peripherals. The packet error rate (PER) performance is evaluated by computer simulations when BLE peripherals simultaneously communicate in the presence of CFO and STO.

  • Boqi GAO, Takuya MAEKAWA, Daichi AMAGATA, Takahiro HARA
    原稿種別: PAPER
    専門分野: Fundamental Theories for Communications
    2020 年 E103.B 巻 5 号 p. 504-516
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/11/21
    ジャーナル 認証あり

    Mobile wireless sensor networks (WSNs) are facing threats from malicious nodes that disturb packet transmissions, leading to poor mobile WSN performance. Existing studies have proposed a number of methods, such as decision tree-based classification methods and reputation based methods, to detect these malicious nodes. These methods assume that the malicious nodes follow only pre-defined attack models and have no learning ability. However, this underestimation of the capability of malicious node is inappropriate due to recent rapid progresses in machine learning technologies. In this study, we design reinforcement learning-based malicious nodes, and define a novel observation space and sparse reward function for the reinforcement learning. We also design an adaptive learning method to detect these smart malicious nodes. We construct a robust classifier, which is frequently updated, to detect these smart malicious nodes. Extensive experiments show that, in contrast to existing attack models, the developed malicious nodes can degrade network performance without being detected. We also investigate the performance of our detection method, and confirm that the method significantly outperforms the state-of-the-art methods in terms of detection accuracy and false detection rate.

  • Toshiyuki WATANABE, Tetsuya OSHIKATA, Kimihiro NISHIJIMA, Fujio KUROKA ...
    原稿種別: PAPER
    専門分野: Energy in Electronics Communications
    2020 年 E103.B 巻 5 号 p. 517-523
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/11/12
    ジャーナル 認証あり

    An LLC converter has high efficiency and low noise and has thus recently attracted attention in the field of power supplies for use in information and communication systems. A planar transformer is thought to be particularly effective in a high-frequency switching power supply because an ideal primary-secondary interleave structure can be formed by the multilayer structure, and the alternating-current (AC) resistance can be reduced. Based on these facts, we investigated the use of planar transformers in LLC converters. However, high-frequency oscillation, which is not observed in a normal winding transformer, appears in the secondary side current, and the power supply loss is also higher. Our investigation found that the current oscillation and an increase in loss were caused by a primary-secondary capacitance of the transformer. This paper presents countermeasures used to reduce the capacitance between the primary and secondary windings, and a new layer structure for the transformer that reduces the capacitance. The loss is calculated through a simulation and experimentally, and good agreement is obtained. The proposed transformer offers the high efficiency of 98.1% in a 200 W, 12 V output power supply.

  • Than Than NU, Takuya FUJIHASHI, Takashi WATANABE
    原稿種別: PAPER
    専門分野: Network
    2020 年 E103.B 巻 5 号 p. 524-536
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/11/12
    ジャーナル 認証あり

    The conventional digital video encoding and transmission are inefficient for crowdsourced multi-view video uploading due to its high power consumption, and undesirable quality degradation in unstable wireless channel. Soft video delivery scheme known as SoftCast skips digital video encoding and transmission to decrease power consumption in video encoding and transmission. In addition, it achieves graceful quality improvement with the improvement of wireless channel quality by directly sending linear-transformed video signals. However, there are two typical issues to apply conventional soft video delivery to crowdsourced multi-view video uploading. First, since soft video delivery has been designed for direct path between each contributor and the access point (AP), it may suffer low video quality when a contributor uploads its video to the AP over unstable direct wireless path. Second, conventional soft video delivery may suffer low video quality due to the redundant transmission of correlated videos because it does not exploit inter-camera correlations existed in multi-view videos. In this paper, we propose a cluster-based redirect video uploading scheme for high-quality and low-power crowdsourced multi-view video streaming. The proposed scheme integrates the four approaches of network clustering, delegate selection, soft video delivery, and four-dimensional discrete consine transform (4D-DCT) to redirectly upload the captured videos to the AP. Specifically, network clustering and delegate selection leverage the redirect path between the contributors and the AP. Soft video delivery removes power-hungry digital encoding and transmission by directly sending frequency-domain coefficients using multi-dimensional DCT and near-analog modulation. 4D-DCT exploits the content correlations between the contributors to reduce redundant transmissions. Evaluation results show that our proposed scheme outperforms the conventional soft video delivery scheme when the channel quality difference between the direct and redirect paths increases. In addition, our scheme outperforms the digital-based video uploading schemes in terms of both video quality and power consumption. For example, the proposed scheme yields graceful quality improvement with the improvement of wireless channel quality, however, the digital-based schemes suffer from sudden quality degradation due to synchronization errors in decoding.

  • Aijing LI, Guodong WU, Chao DONG, Lei ZHANG
    原稿種別: PAPER
    専門分野: Network
    2020 年 E103.B 巻 5 号 p. 537-544
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/11/06
    ジャーナル フリー

    Media Access Control (MAC) is critical to guarantee different Quality of Service (QoS) requirements for Unmanned Aerial Vehicle (UAV) networks, such as high reliability for safety packets and high throughput for service packets. Meanwhile, due to their ability to provide lower delay and higher data rates, more UAVs are using frequently directional antennas. However, it is challenging to support different QoS in UAV networks with directional antennas, because of the high mobility of UAV which causes serious channel resource loss. In this paper, we propose CU-MAC which is a MAC protocol for Centralized UAV networks with directional antennas. First, we design a mobility prediction based time-frame optimization scheme to provide reliable broadcast service for safety packets. Then, a traffic prediction based channel allocation scheme is proposed to guarantee the priority of video packets which are the most common service packets nowadays. Simulation results show that compared with other representative protocols, CU-MAC achieves higher reliability for safety packets and improves the throughput of service packets, especially video packets.

  • Li TAN, Xiaojiang TANG, Anbar HUSSAIN, Haoyu WANG
    原稿種別: PAPER
    専門分野: Network
    2020 年 E103.B 巻 5 号 p. 545-558
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/11/21
    ジャーナル 認証あり

    To solve the problem of the self-deployment of heterogeneous directional wireless sensor networks in 3D space, this paper proposes a weighted Voronoi diagram-based self-deployment algorithm (3DV-HDDA) in 3D space. To improve the network coverage ratio of the monitoring area, the 3DV-HDDA algorithm uses the weighted Voronoi diagram to move the sensor nodes and introduces virtual boundary torque to rotate the sensor nodes, so that the sensor nodes can reach the optimal position. This work also includes an improvement algorithm (3DV-HDDA-I) based on the positions of the centralized sensor nodes. The difference between the 3DV-HDDA and the 3DV-HDDA-I algorithms is that in the latter the movement of the node is determined by both the weighted Voronoi graph and virtual force. Simulations show that compared to the virtual force algorithm and the unweighted Voronoi graph-based algorithm, the 3DV-HDDA and 3DV-HDDA-I algorithms effectively improve the network coverage ratio of the monitoring area. Compared to the virtual force algorithm, the 3DV-HDDA algorithm increases the coverage from 75.93% to 91.46% while the 3DV-HDDA-I algorithm increases coverage from 76.27% to 91.31%. When compared to the unweighted Voronoi graph-based algorithm, the 3DV-HDDA algorithm improves the coverage from 80.19% to 91.46% while the 3DV-HDDA-I algorithm improves the coverage from 72.25% to 91.31%. Further, the energy consumption of the proposed algorithms after 60 iterations is smaller than the energy consumption using a virtual force algorithm. Experimental results demonstrate the accuracy and effectiveness of the 3DV-HDDA and the 3DV-HDDA-I algorithms.

  • Aijing LI, Chao DONG, Zhimin LI, Qihui WU, Guodong WU
    原稿種別: PAPER
    専門分野: Network
    2020 年 E103.B 巻 5 号 p. 559-569
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/11/21
    ジャーナル 認証あり

    As a key technology for 5G and beyond, Multi-User Multi-Input Multi-Output (MU-MIMO) can achieve Gbps downlink rate by allowing concurrent transmission from one Access Point (AP) to multiple users. However, the huge overhead of full CSI feedback may overwhelm the gain yielded by beamforming. Although there have been many works on compress CSI to reduce the feedback overhead, the performance of beamforming may decrease because the accuracy of channel state degrades. To address the tradeoff between feedback overhead and accuracy, we present a two-stage Multipath Profile based Feedback protocol (MPF). In the first stage, compared with CSI feedback, the channel state is represented by multipath profile which has a smaller size but is accurate enough for user selection. Meanwhile, we propose an implicit polling scheme to decrease the feedback further. In the second stage, only the selected users send their CSI information to the AP to guarantee the low overhead and accuracy of steering matrix calculation. We implement and evaluate MPF with USRP N210. Experiments show that MPF can outperform alternative schemes in a variety of radio environments.

  • Kiyoaki ITOI, Masanao SASAKI, Hiroaki NAKABAYASHI
    原稿種別: PAPER
    専門分野: Antennas and Propagation
    2020 年 E103.B 巻 5 号 p. 570-581
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/11/12
    ジャーナル 認証あり

    This paper presents an algorithm to arrange a large number of antenna elements in the limited space of massive MIMO base station antenna without degrading the communication quality under a street-cell line-of-sight environment in mobile communications. The proposed algorithm works by using mathematical optimization in which the objective function is the correlation coefficient between the channel responses of two elements of the base station antenna, according to an algorithm constructed based on the results obtained through basic examinations of the characteristics of the correlation coefficient between channel responses. The channel responses are computed by using the propagation path information obtained by ray-tracing. The arrangements output by the proposed algorithm are mainly evaluated by channel capacity comparison with uniformly spaced arrangements on the vertical plane in single user and multiuser environments. The evaluation results of these arrangements in downlink demonstrate the superiority of the arrangements generated by the proposed algorithm, especially in term of robustness against an increase in the number of users.

  • Chao MENG, Gang WANG, Bingjian YAN, Yongmei LI
    原稿種別: PAPER
    専門分野: Wireless Communication Technologies
    2020 年 E103.B 巻 5 号 p. 582-590
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/10/29
    ジャーナル 認証あり

    This paper investigates the secrecy energy efficiency maximization (SEEM) problem in a simultaneous wireless information and power transfer (SWIPT) system, wherein a legitimate user (LU) exploits the power splitting (PS) scheme for simultaneous information decoding (ID) and energy harvesting (EH). To prevent interference from eavesdroppers on the LU, artificial noise (AN) is incorporated into the confidential signal at the transmitter. We maximize the secrecy energy efficiency (SEE) by joining the power of the confidential signal, the AN power, and the PS ratio, while taking into account the minimum secrecy rate requirement of the LU, the required minimum harvested energy, the allowed maximum radio frequency transmission power, and the PS ratio. The formulated SEEM problem involves nonconvex fractional programming and is generally intractable. Our solution is Lagrangian relaxation method than can transform the original problem into a two-layer optimization problem. The outer layer problem is a single variable optimization problem with a Lagrange multiplier, which can be solved easily. Meanwhile, the inner layer one is fractional programming, which can be transformed into a subtractive form solved using the Dinkelbach method. A closed-form solution is derived for the power of the confidential signal. Simulation results verify the efficiency of the proposed SEEM algorithm and prove that AN-aided design is an effective method for improving system SEE.

  • Yanxi YANG, Jinguang JIANG, Meilin HE
    原稿種別: PAPER
    専門分野: Wireless Communication Technologies
    2020 年 E103.B 巻 5 号 p. 591-599
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/10/28
    ジャーナル 認証あり

    The carrier-phase multipath effect can seriously affect the accuracy of GPS-based positioning in static short baseline applications. Although several kinds of methods based on time domain and spatial domain techniques have been proposed to mitigate this error, they are still limited by the accuracy of the multipath model and the effectiveness of the correction strategy. After analyzing the existing methods, a new method based on adaptive thresholding wavelet packet transform (AW) and time domain bootstrap spatial domain search strategy (TB) is presented (AWTB). Taking advantage of adaptive thresholding wavelet packet transform, we enhance the precision of the correction model and the efficiency of the extraction method. In addition, by adopting the proposed time domain bootstrap spatial domain strategy, the accuracy and efficiency of subsequent multipath correction are improved significantly. Specifically, after applying the adaptive thresholding wavelet packet method, the mean improvement rate in the RMS values of the single-difference L1 residuals is about 27.93% compared with the original results. Furthermore, after applying the proposed AWTB method, experiments show that the 3D positioning precision is improved by about 38.51% compared with the original results. Even compared with the method based on stationary wavelet transform (SWT), and the method based on wavelet packets denoising (WPD), the 3D precision is improved by about 26.94% over the SWT method and about 22.96% over the WPD method, respectively. It is worth noting that, although the mean time consumption of the proposed algorithm is larger than the original method, the increased time consumption is not a serious burden for overall performance.

  • Satoshi DENNO, Tsubasa INOUE, Yuta KAWAGUCHI, Takuya FUJIWARA, Yafei H ...
    原稿種別: PAPER
    専門分野: Wireless Communication Technologies
    2020 年 E103.B 巻 5 号 p. 600-608
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/11/06
    ジャーナル フリー

    This paper proposes a low complexity soft input decoding in an iterative linear receiver for overloaded MIMO. The proposed soft input decoding applies two types of lattice reduction-aided linear filters to estimate log-likelihood ratio (LLR) in order to reduce the computational complexity. A lattice reduction-aided linear with whitening filter is introduced for the LLR estimation in the proposed decoding. The equivalent noise caused by the linear filter is mitigated with the decoder output stream and the LLR is re-estimated after the equivalent noise mitigation. Furthermore, LLR clipping is introduced in the proposed decoding to avoid the performance degradation due to the incorrect LLRs. The performance of the proposed decoding is evaluated by computer simulation. The proposed decoding achieves about 2dB better BER performance than soft decoding with the exhaustive search algorithm, so called the MLD, at the BER of 10-4, even though the complexity of the proposed decoding is 1/10 as small as that of soft decoding with the exhaustive search.

  • Ning TAI, Huan LIN, Chao WEI, Yongwei LU, Chao WANG, Kaibo CUI
    原稿種別: PAPER
    専門分野: Sensing
    2020 年 E103.B 巻 5 号 p. 609-617
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/11/06
    ジャーナル 認証あり

    Since ISAR is widely applied in many occasions and provides high resolution images of the target, ISAR countermeasures are attracting more and more attention. Most of the present methods of deception jamming are not suitable for engineering realization due to the heavy computation load or the large calculation delay. Deception jamming against ISAR requires large computation resource and real-time performance algorithms. Many studies on false target jamming assume that the jammer is able to receive the target echo or transmit the jamming signal to the real target, which is sometimes not possible. How to impose the target property onto the intercepted radar signal is critical to a deception jammer. This paper proposes a jamming algorithm based on parallel convolution and one-bit quantization. The algorithm is able to produce a single false target on ISAR image by the jammer itself. The requirement for computation resource is within the capabilities of current digital signal processors such as FPGA or DSP. The method processes the samples of radar signal in parallel and generates the jamming signal at the rate of ADC data, solving the problem that the real-time performance is not satisfied when the input data rate for convolution is far higher than the clock frequency of FPGA. In order to reduce the computation load of convolution, one-bit quantization is utilized. The complex multiplication is implemented by logical resources, which significantly reduces the consumption of FPGA multipliers. The parallel convolution jamming signal, whose date rate exceeds the FPGA clock rate, is introduced and analyzed in detail. In theory, the bandwidth of jamming signal can be half of the sampling frequency of high speed ADC, making the proposed jamming algorithm able to counter ultra-wideband ISAR signals. The performance and validity of the proposed method are verified by simulations. This jamming method is real-time and capable of producing a false target of large size at the low cost of FPGA device.

  • Lin JIANG, Xin WU, Yun ZHU, Yu WANG
    原稿種別: PAPER
    専門分野: Multimedia Systems for Communications
    2020 年 E103.B 巻 5 号 p. 618-626
    発行日: 2020/05/01
    公開日: 2020/05/01
    [早期公開] 公開日: 2019/11/12
    ジャーナル 認証あり

    For high definition (HD) videos, the 3D-High Efficiency Video Coding (3D-HEVC) reference algorithm incurs dramatically highly computation loads. Therefore, with the demands for the real-time processing of HD video, a hardware implementation is necessary. In this paper, a reconfigurable architecture is proposed that can support both median filtering preprocessing and mean filtering preprocessing to satisfy different scene depth maps. The architecture sends different instructions to the corresponding processing elements according to different scenarios. Mean filter is used to process near-range images, and median filter is used to process long-range images. The simulation results show that the designed architecture achieves an averaged PSNR of 34.55dB for the tested images. The hardware design for the proposed virtual view synthesis system operates at a maximum clock frequency of 160MHz on the BEE4 platform which is equipped with four Virtex-6 FF1759 LX550T Field-Programmable Gate Array (FPGA) for outputting 720p (1024×768) video at 124fps.

feedback
Top