-
Yin REN, Suhao YU, Aihuang GUO
Article type: PAPER
Article ID: 2025EAP1037
Published: 2025
Advance online publication: June 16, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
With the expansion of industrial applications and data volumes, building a user-edge-cloud collaborative network and efficiently distributing computing tasks has emerged as a critical solution to alleviate terminal computing burdens and ensure quality of service (QoS). However, existing studies often overlook extra delays in the offloading process, including queuing, propagation, and wired transmission delays, significantly impacting task delay and offloading strategies. To this end, this paper proposes a multi-slice task offloading and resource allocation scheme for user-edge-cloud networks, targeting delay minimization while considering various delay factors. This scheme jointly optimizes offloading mode, offloading ratio, user association, and resource allocation under task delay constraints. To address the problem's non-convexity, an alternating optimization framework is employed to decompose the problem into offloading mode selection and resource allocation subproblems. Specifically, a deep reinforcement learning (DRL)-based algorithm is developed for offloading mode selection, while convex optimization techniques are applied to determine optimal offloading ratios and resource allocation. Additionally, a matching theory-based algorithm establishes optimal connections between users and base stations (BSs). Simulations validate the effectiveness of the proposed scheme, showing that the three-layer offloading mode, i.e., collaborative computing across user, edge, and cloud reduces latency compared to single-layer and two-layer modes for large-scale tasks.
View full abstract
-
Fan XU, Sumin LIU, Keyu YAN, Baishun LI
Article type: PAPER
Article ID: 2025EAP1042
Published: 2025
Advance online publication: June 16, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Automatic Question Generation (AQG) aims to generate natural and relevant questions based on a given context and optional answers. It is a significant and challenging task in the field of natural language processing. However, existing AQG models often produce a single type of question with repetitive content, which hinders the diversity of the generated questions. In this paper, we introduce a Diversify Question Generation model based on the Diffusion Model (DQG-DM). Our model effectively incorporates latent variables and fine-grained question types to ensure both the relevance and diversity of the generated questions. Experiments conducted on two benchmark datasets demonstrate that our proposed model outperforms the state-of-the-art results.
View full abstract
-
Yingnan QI, Chuhong TANG, Haiyang LIU, Lianrong MA
Article type: LETTER
Article ID: 2025EAL2024
Published: 2025
Advance online publication: June 12, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this letter, we construct a class of binary parity-check matrices with column weight 3 and show that these matrices have full-rank. Then we prove that the stopping distance of each binary parity-check matrix is equal to the minimum distance of the code specified by the parity-check matrix. Taken together, we obtain a new class of binary linear codes with optimal stopping redundancy.
View full abstract
-
Yingqi LIANG, Jiaolong WANG, Jihe WANG, Shiaodi ZHOU, Chengxi ZHANG
Article type: LETTER
Article ID: 2025EAL2028
Published: 2025
Advance online publication: June 10, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
For linear state estimation problems involving Brownian motion process noise, this paper proposes a novel adaptive Kalman filter that leverages online assessment of the power spectral density (PSD) for continuous-time dynamic noise. Unlike existing adaptive filters that estimate the entire noise covariance matrix, this work proposes to directly evaluate the noise PSD according to a analytical derivation for process noise covariance. As the key innovation, the proposed adaption scheme significantly reduces the number of scalar unknowns and results in enhanced accuracy for estimating the PSD of Brownian motion noise. As the resulted advantage, the new adaptive Kalman filter mitigates the crucial reliance on noise statistics without extra computation. Numerical examples of target tracking demonstrate the new adaptive Kalman filter's filtering adaptability, accuracy, and simplicity.
View full abstract
-
Ryusei EDA, Kota HISAFURU, Nozomu TOGAWA
Article type: PAPER
Article ID: 2024EAP1145
Published: 2025
Advance online publication: June 06, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Recently, IoT (Internet-of-Things) devices are very widely used in our daily lives and their design and manufacturing are often outsourced to third parties to make them at a low cost. Meanwhile, malfunctions may be inserted into them intentionally by malicious third parties. Utilizing power waveforms measured from IoT devices is one of the effective ways to detect its anomalous behaviors. Most IoT devices regularly consume steady-state power due to the operating system and/or hardware components and we have to remove it from the total power to detect anomalous behaviors. However, the existing methods manually or semi-manually remove the steady-state power and further they utilize the pre-determined features in the power waveform to detect anomalies. Hence, they cannot well detect them automatically. In this paper, we propose a method, called Gen-Power2, to detect anomalous behaviors in IoT devices utilizing the generative machine-learning model. The proposed method generates an application power waveform by inferring the steady-state power by machine-learning from the observed total power waveform. Then, the anomalous application behaviors are detected by automatically extracting the latent features from the generated application power waveform. Experimental evaluations show that Gen-Power2 detects anomalous application behaviors successfully, while the recent state-of-the-art method cannot detect them.
View full abstract
-
Yunli LI, Lijing ZHENG, Hengtai WANG, Changhui CHEN, Xiaoda TIAN
Article type: PAPER
Article ID: 2025EAP1050
Published: 2025
Advance online publication: June 06, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Permutations on the vector spaces $\mathbb{F}_{q}^n$ are few at present. Inspired by the work of Chi, Li and Qu [1], we construct two classes of permutations with 3-homogeneous structures in trivariate form over $\mathbb{F}_{2^m}^3$. To establish their permutation properties, we formulate a system of equations and analyze it using techniques such as resultants, multivariate methods, and the method of undetermined coefficients.
View full abstract
-
baokang WANG, min YU, wenlun ZHANG
Article type: PAPER
Article ID: 2024EAP1180
Published: 2025
Advance online publication: June 04, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Cache tiling or recursive data layouts for two-dimensional (2-D) data access has been proposed to ameliorate the poor data locality caused by conventional layouts like row-major and column-major. However, cache tiling and recursive data layouts require non-conventional address computation, which involves bit-level manipulations that are not supported in current processors, there is also a significant overhead in execution time due to software-based tiling address calculation. In this paper, we design a cache memory with hardware-based tile/line accessibility support for 2-D data access and a tile-set-based tag comparison (TSTC) scheme to optimize overall hardware scale overhead. Our technique captures the benefits of locality of the sophisticated data layouts while avoiding the cost of software-based address computation. Simulation results show the proposed method improves the performance of matrix multiplication (MM) over conventional data layout and Z-Morton order layout by reducing L1 cache, L2 cache and Translation Lookaside Buffer (TLB) misses, especially at larger matrix sizes. We implement the proposed cache with a SIMD-based data path by using 40 nm Complementary Metal-Oxide-Semiconductor (CMOS) technology. The entire hardware overhead of the proposed TSTC method was reduced to only 10% of that required for a conventional cache without performance degradation.
View full abstract
-
Huang Wei, Yuan Jiangnan
Article type: PAPER
Article ID: 2024EAP1159
Published: 2025
Advance online publication: June 02, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Indoor localization is essential for navigation, tracking, and path planning applications. Traditional systems, based on sensors like inertial devices and LiDAR, offer high accuracy but are costly and prone to cumulative errors. We propose a cost-effective multi-sensor fusion system specifically tailored for two-dimensional localization of two-wheeled mobile robots, combining Wi-Fi channel state information (CSI) and odometry, using an extended Kalman filter (EKF) and an adaptive Monte Carlo localization (CSI-AMCL) algorithm to enhance accuracy. Our innovative 1D convolutional neural network (1D-CNN) based on residual networks effectively processes CSI data, improving adaptability in complex environments by addressing the vanishing gradient issue. Our approach increases accuracy by 56% compared to Wi-Fi fingerprinting. Tests show a 20.1% improvement over WIO-EKF and a 36.3% improvement over Fusion-dhl. This demonstrates the potential of our method for enhancing multi-sensor fusion systems.
View full abstract
-
Hao WEN, Zhe-Ming LU, Fengli SHEN, Ziqian LU, Yangming ZHENG, Jialin C ...
Article type: PAPER
Article ID: 2024EAP1162
Published: 2025
Advance online publication: June 02, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
The skeleton modality provides an efficient representation of human pose. However, its lack of appearance information can lead to poor performance in tasks requiring such information. To address this, we propose a multimodal skeleton representation that integrates intermediate feature maps from a pose estimation network, called Pose Feature Map Enhanced Skeleton Representation (PFMESR). Specifically, we estimate the joint positions of the human body in the video and locate the local features related to each joint from the feature maps of the pose estimation network. These local features are then aligned and fused with the skeleton features in the action recognition network. We believe that the feature maps from the pose estimation network contain rich appearance information that complements the skeleton information. Experiments on multiple datasets demonstrate that this approach significantly improves action recognition performance and yields favorable results in the Action-Identity Recognition task, proving the effectiveness of incorporating appearance information from pose estimation feature maps. We also investigated the relationship between PFMESR's performance and sampling depth and range to explore its effectiveness under different parameters. Additionally, we validated the generality of PFMESR by applying it to various skeleton-based methods. Our method surpasses the state-of-the-art on multiple skeleton-based action recognition benchmarks, achieving accuracies of 94.6 % on the NTU RGB+D 60 cross-subject split, 97.7 % on the NTU RGB+D 60 cross-view split, and 93.1 % on the NTU RGB+D 120 cross-subject split.
View full abstract
-
Satoshi SHOJI, Wataru YATA, Keita KUME, Isao YAMADA
Article type: PAPER
Article ID: 2025EAP1035
Published: 2025
Advance online publication: June 02, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
For a regularized least squares estimation of discrete-valued signals, we propose a Linearly involved Generalized Moreau Enhanced (LiGME) regularizer, as a nonconvex regularizer, of designated isolated minimizers. The proposed regularizer is designed as a Generalized Moreau Enhancement (GME) of the so-called sum-of-absolute-values (SOAV) convex regularizer. Every candidate vector in the discrete-valued set is aimed to be assigned to an isolated local minimizer of the proposed regularizer while the overall convexity of the regularized least squares model is maintained. Moreover, a global minimizer of the proposed model can be approximated iteratively by using a variant of the constrained LiGME (cLiGME) algorithm. To enhance the accuracy of the proposed estimation, we also propose a pair of simple modifications, called respectively an iterative reweighting and a generalized superiorization. Numerical experiments demonstrate the effectiveness of the proposed model and algorithms in a scenario of multiple-input multiple-output (MIMO) signal detection.
View full abstract
-
Takafumi MIYATA
Article type: PAPER
Article ID: 2024EAP1118
Published: 2025
Advance online publication: May 29, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
This paper presents an iterative algorithm for computing an eigenvalue close to a user-specified value and its corresponding eigenvector of a nonlinear eigenvalue problem. This algorithm iterates two parts alternately. The first part is the existing algorithm called the successive approximation algorithm, where the Taylor expansion of a matrix is used to transform the nonlinear problem to the linear problem. By solving the linear problem, an approximate eigenvalue and an approximate eigenvector of the nonlinear problem are computed. The second part refines the approximate eigenvalue computed by the first part. To this end, we approximately compute the Rayleigh functional, which is the solution of the nonlinear equation defined by the approximate eigenvector, and use it as a new approximate eigenvalue. Experimental results show that a combination of the successive approximation algorithm and the Rayleigh functionals converges within fewer iterations and requires less computational time in comparison with the existing successive approximation algorithms.
View full abstract
-
Kenichi KURATA
Article type: PAPER
Article ID: 2024EAP1171
Published: 2025
Advance online publication: May 28, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
There are some research projects on the analysis of traffic states by using mathematical models. In this article, we propose a new method based on a distributed constant circuit, namely an electrical circuit based on distributed elements. In this method the distributed constant circuit is regarded as a traffic circuit. The voltage on the distributed constant circuit is regarded as traffic pressure, like the previous works based on the lumped elements on the lumped constant circuit. However, these previous works have some difficulties on the definition of the traffic pressure. In virtue of the distributed elements composed of not Resistance, but Inductance and Capacitance, the input voltage does not augment unreasonably. The analogy between traffic circuit and electrical circuit becomes more reasonable. Moreover, the status of traffic light is also taken into account. The validity of our proposed method was confirmed by some simulations based on distributed constant circuits.
View full abstract
-
Shoichi HIROSE, Hidenori KUWAKADO
Article type: PAPER
Article ID: 2025CIP0005
Published: 2025
Advance online publication: May 28, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
This paper presents two novel keyed hashing modes, KHC1 and KHC2, designed to construct hash functions that guarantee both collision resistance and pseudorandomness. These modes employ compression functions alongside unique encoding schemes, enabling efficient handling of variable-length inputs. The proposed constructions achieve collision resistance, provided that the underlying compression function satisfies the extended notion of collision resistance, which ensures that it is intractable to find distinct input pairs whose output difference falls within a small set. They are also proven to be secure pseudorandom functions (PRFs) under the assumption that the underlying compression function is a secure PRF under related-key attacks. They accept a 256-bit key as input and guarantee 128-bit security against quantum key recovery when instantiated with the SHA-256 compression function. Furthermore, we implemented KHC1 and KHC2 instantiated with the SHA-256 compression function and evaluated their performance. The results confirm that both constructions achieve the efficiency expected by the theoretical evaluation and outperform HMAC-SHA-256 for short messages.
View full abstract
-
Masahiro KAMINAGA, Takuya MINE
Article type: LETTER
Article ID: 2025EAL2038
Published: 2025
Advance online publication: May 28, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
We propose a probabilistic interpretation of the Gap Shortest Vector Problem by leveraging Södergren's analysis of random lattices. By linking shortest vector norms with the Gaussian heuristic, our study characterizes GapSVP behavior in high dimensions and informs secure parameter choices in lattice-based cryptography.
View full abstract
-
Yutong WANG, Kai LIU, Xiaoyu CHANG, Yubo LI
Article type: PAPER
Article ID: 2025EAP1048
Published: 2025
Advance online publication: May 27, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Symmetrical Z-complementary code sets (SZCCSs), as a novel type of training sequences, have demonstrated exceptional channel estimation performance when applied to generalized spatial modulation (GSM) systems. This paper addresses the current limitations in the design methods and parameter range of SZCCSs by proposing three schemes. Initially, by analyzing the complementary properties of Discrete Fourier Transform (DFT) matrix elements, we construct a class of optimal SZCCSs using the Kronecker product of unit modulus sequences and DFT matrices. Subsequently, to diversify the parameter of code quantity, we perform the Kronecker product with complete complementary codes (CCCs) and orthogonal matrices, resulting in a class of optimal SZCCSs. Also, if a sequence with low autocorrelation replace the orthogonal matrix, the resulting SZCCS exhibits low autocorrelation sidelobes outside the zero correlation zone and complete complementary cross correlation characteristics. The study offer a broad range of parameters not previously identified in the literature, significantly enriching the parameter space of SZCCSs. Simulation results validate that the proposed SZCCSs show superior resistance to multipath interference in GSM systems compared to traditional sequences, highlighting their potential advantages in channel estimation.
View full abstract
-
Ryuya HAYASHI, Junichiro HAYATA, Keisuke HARA, Kenta NOMURA, Masaki KA ...
Article type: PAPER
Article ID: 2024DMP0006
Published: 2025
Advance online publication: May 26, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Private information retrieval (PIR) allows a client to obtain records from a database without revealing the retrieved index to the server. In the single-server model, it has been known that (plain) PIR is vulnerable to selective failure attacks, where a (malicious) server intends to learn information of an index by getting a client's decoded result. Recently, as one solution for this problem, Ben-David et al. (TCC 2022) proposed verifiable PIR (vPIR) that allows a client to verify that the queried database satisfies certain properties. However, the existing vPIR scheme is not practically efficient, especially when we consider the multi-query setting, where a client makes multiple queries for a server to retrieve some records either in parallel or in sequence.
In this paper, we introduce a new formalization of multi-query vPIR and provide an efficient scheme based on authenticated PIR (APIR) and succinct non-interatctive arguments of knowledge (SNARKs). More precisely, thanks to the nice property of APIR, the communication cost of our multiquery vPIR scheme is O(n · |a| + |π|), where n is the number of queries, |a| is the APIR communication size, and |π| is the SNARK proof size. That is, the communication includes only one SNARK proof. In addition to this result, to show the effectiveness of our multi-query vPIR scheme in a real-world scenario, we present a practical application of vPIR on the online certificate status protocol (OCSP) and provide a comprehensive theoretical evaluation on our scheme in this scenario. Especially in the setting of our application, we observe that integrating SNARK proofs (for verifiability) does not significantly increase the communication cost.
View full abstract
-
Kyoichi ASANO, Mitsugu IWAMOTO, Yohei WATANABE
Article type: PAPER
Article ID: 2024DMP0013
Published: 2025
Advance online publication: May 23, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Key-insulated encryption (KIE) is one of the countermeasures against the exposure of secret keys in public-key cryptography. In KIE, a user can update secret keys with a helper key to ensure that even if many secret keys, where each of them corresponds to each time period, are leaked, the security for other time periods is not compromised. However, KIE does not have resilience against the partial exposure of secret keys. Although there is public key encryption resilient to such partial exposure, unlike KIE, it cannot ensure security against the exposure of a whole secret key. In this paper, we introduce leakage-resilient key-insulated encryption (LR-KIE) that satisfies resilience against both partial and whole exposure of secret keys. We show three LR-KIE schemes from any leakage-resilient identity-based encryption scheme and/or any leakage-resilient secret sharing scheme.
View full abstract
-
Ming YAN, Tongjiang YAN, Yuhua SUN, Xiaoni DU
Article type: LETTER
Article ID: 2025EAL2035
Published: 2025
Advance online publication: May 23, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this paper, we present a new classification method for the defining sets of η-constacyclic codes of length $n=\frac{q^4+1}{2}$. This classification can simplify the calculation of the dimensions of the Hermitian hulls for these codes, while deriving the numbers of sharing pre-shared maximally entangled states of the corresponding entanglement-assisted quantum error-correcting codes under various design distances.
View full abstract
-
Yu LI, Hai CHEN, Cheng ZHANG, Shimin GONG, Bo GU
Article type: LETTER
Article ID: 2025EAL2039
Published: 2025
Advance online publication: May 23, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Flying Ad-hoc Networks (FANETs) frequently suffer from widespread disconnections due to unpredictable external disruptions, consequently leading to network partitioning into segments in which UAVs become isolated from the base station. To address this issue, this letter proposes the Infection-based Leader Election (ILE) algorithm to autonomously restore network connectivity after disruptions. The ILE identifies and elects a leader within each disconnected segment, which subsequently guides the restoration process. By limiting information exchange to neighboring nodes, the ILE achieves significant reductions in both computational complexity and communication overhead. After the leadership election process is completed, the elected leader coordinates nodes within the partition to execute cascading movements, enabling rapid restoration of network connectivity. The simulation results validate the effectiveness of our algorithm, demonstrating notable improvements in communication overhead and restoration time.
View full abstract
-
Yutong WANG, Jian LI, Peng XIAO, Zichen ZHANG, Zhiwei GUO, lsack BULUG ...
Article type: PAPER
Article ID: 2025EAP1038
Published: 2025
Advance online publication: May 23, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In online social media, various fake news highly impact experience quality (QoE) of consumers. Nowadays, researchers in this area concentrated on either semantic analysis or contextual awareness. However, social media is a spatiotemporal place, and much important information such as social activities, social connection and social attributes, can make sense. Hence, this work proposes an intelligent fake news detection method by leveraging semantic spatiotemporal fusion. It uses the RoBERTa model to process posts made by users to understand their semantic content. Then, the processed data is fed into a Long Short-Term Memory network (LSTM) to capture the temporal features of the posts. Additionally, the study constructs a spatial model using Graph Attention Networks (GATs) to simulate the spread of fake news. Performance of the proposed method is testified on a realworld dataset specifically collected by our research team. And the results reveal that this innovative approach not only improves the accuracy of fake news detection but also optimizes consumer service quality.
View full abstract
-
Xueyuan ZHANG, Shaoyu, Xianmang HE, Yujia LI
Article type: LETTER
Article ID: 2025EAL2015
Published: 2025
Advance online publication: May 21, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In the constant dimension codes (CDCs) case, to explore the largest possible value Aq(n, d, k) is one of the most fundamental topics in subspace coding. Echelon-Ferrers is an approach proposed in 2009 for CDCs' construction, and has received extensive attentions. In this letter, in order to further improve the constructions, we study the method which combines linkage construction and echelon-Ferrers construction. This allows us to produce some improvements to lower bounds for constant dimension codes, including Aq(13, 4, 4),Aq(17, 4, 4), Aq(19, 6, 6) etc.
View full abstract
-
Xuanyu LIU, Pinhui KE, Zuling CHANG
Article type: LETTER
Article ID: 2025EAL2018
Published: 2025
Advance online publication: May 21, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Symmetric 2-adic complexity stands out as a better measure for appraising the strength of a periodic sequence against the rational approximation attack. In this letter, we determine the symmetric 2-adic complexity of a class of interleaving cascade binary sequences with period 4N (where N ≡ 3 (mod 4)), which was introduced recently. Our results indicate that the symmetric 2-adic complexity of these sequences is not less than 2N.
View full abstract
-
Kengo NAKATA, Daisuke MIYASHITA, Asuka MAKI, Fumihiko TACHIBANA, Shini ...
Article type: PAPER
Article ID: 2025EAP1034
Published: 2025
Advance online publication: May 21, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Quantization is an effective way to reduce memory and computational costs in the inference of convolutional neural networks. However, it remains unclear which model can achieve higher recognition accuracy while minimizing memory and computational costs: a large model (with a large number of parameters) quantized to an extremely low bit width (1 or 2 bits) or a small model (with a small number of parameters) quantized to a moderately low bit width (3, 4, or 5 bits). In this paper, we define a metric that combines the numbers of parameters and computations with the bit widths of quantized weight parameters. By utilizing this metric, we demonstrate that Pareto-optimal performance, where the best accuracy is attained at a given memory or computational cost, is achieved when a small model is moderately quantized, not when a large model is extremely quantized. Based on this finding, we empirically show that the Pareto frontier is improved by 4.3 × in a post-training quantization scenario for a quantized ResNet-50 model using the ImageNet dataset.
View full abstract
-
Bojun CAI, Qiaozhi HUA, Amr TOLBA, Bin NING, Qiong GU
Article type: PAPER
Article ID: 2025EAP1005
Published: 2025
Advance online publication: May 19, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Accurate prediction of transportation carbon emissions is crucial for the government to formulate transportation strategies. However, due to the characteristics of the traffic carbon emission data, such as nonlinearity, uncertainty, and abrupt changes, accurately predicting traffic carbon emissions faces significant challenges. In this paper, we propose the LNSSA-BiLSTM-MHA model, which combines the improved Sparrow Search Algorithm based on the logistic-tent-cosine chaotic mapping and the Narrowed Opposition-Based Learning Strategy (LNSSA) with the BiLSTM-MHA model to improve the accuracy of transportation carbon emission prediction. Firstly, the LNSSA algorithm is proposed for model hyperparameter search, which combines Logistic-Tent-Cosine chaotic mapping with Narrowed Opposition-Based Learning strategy to improve the SSA algorithm. Among them, the logistic-tent-cosine chaotic mapping is used to uniformly initialize the population, and the Narrowed Opposition-Based Learning strategy is used to reduce the solution space. Secondly, the BiLSTM model is used to analyze the temporal data features in both forward and reverse directions. Finally, we combine the multihead attention mechanism to learn data features from different subspaces. The private data set of six intersections of roads in Xiangyang City from 2023 to 2024 is collected. We perform model training and experimental analysis on this private dataset. Using the evaluation metrics RMSE, MSE, and MAE, the results showed that the LNSSA-BiLSTM-MHA model outperformed the comparison models LSTM, GRU, LSTM-Attention, GRU-Attention, CNN-LSTM-Attention, CNN-GRU-Attention and ResNet-GRU-Attention by 32%, 54% and 35%, respectively, in six datasets.
View full abstract
-
Sapiah Sakri, Zuhaira Muhammad Zain, Ghada Aldehim, Nazik Alturki, Had ...
Article type: PAPER
Article ID: 2024EAP1025
Published: 2025
Advance online publication: May 13, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
While COVID-19 poses significant global challenges, this study proposes leveraging deep learning models to predict adverse events post-vaccination. Using the Vaccine Adverse Event Reporting System (VAERS) dataset, which includes potential side effects of Pfizer, Janssen, and Moderna vaccines, the study partitions the data to predict vaccination adverse events (VAE) such as "died," "hospitalized," and "recovered." The proposed DeepCNNBDLSTM model combines deep neural network layers with convolutional and bidirectional long short-term memory layers. Baseline models include deep neural networks, bidirectional long short-term memory, convolutional neural networks, and long short-term memory. Performance metrics such as confusion matrix, AUCROC, accuracy, F1-score, precision, and recall are evaluated. Experimental results show the proposed model outperforms by achieving an accuracy of 89.05% for predicting 'recovered' VAE (trained on Pfizer dataset), 99.03% accuracy for predicting 'hospitalized' VAE, and 99.86% accuracy for predicting 'died' VAE (both trained on Moderna dataset). These insights may aid doctors in selecting the most effective COVID-19 vaccine for patient protection.
View full abstract
-
Po-Chun YANG, Bi-Jing JUANG, Chuan-Yi LIU, Chung-Hsuan WANG, Chi-chao ...
Article type: PAPER
Article ID: 2024EAP1153
Published: 2025
Advance online publication: May 13, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Partial transmit sequence (PTS) is an effective technique to mitigate the peak-to-average power ratio (PAPR) problem in orthogonal frequency-division multiplexing (OFDM) systems. Some past research proposed a Q-section coded PTS scheme with the progressive edge-growth (PEG) search algorithm for construction of the employed quasi-cyclic low-density parity-check (QC-LDPC) codes. In this paper, a new approach of the Q-section PTS scheme for PAPR reduction and error correction is devised based on algebraically constructed QC-LDPC codes with masking. The corresponding Q-section constraint is then turned into one only on the masking matrix which is easy to satisfy, based on which QC-LDPC codes can be flexibly constructed and designed without extra search complexity. Our method allows for a single algebraically constructed base matrix to generate a family of Q-section QC-LDPC codes with different lengths and rates. The performance of the constructed codes can be guaranteed by employing analysis such as density evolution. The corresponding efficient ways of encoding and decoding applicable to general QC-LDPC codes are also proposed. Our scheme need not transmit extra side information and has no extra cost compared with the traditional PTS scheme. The PAPR control patterns are embedded in specific bit positions of the codeword so that the information bits can be recovered without attempting all possible control patterns during decoding. Finally, simulation results show that our design can provide better error performance than previous codes and have similar PAPR reduction performance.
View full abstract
-
Lin ZHOU, Tongjia YAN, Mingyang LI, Ao LI
Article type: PAPER
Article ID: 2025EAP1011
Published: 2025
Advance online publication: May 13, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In recent years, the performance of phase-aware speech enhancement neural networks has steadily improved. However, dealing with complex-valued Short-Time Fourier Transform (STFT) spectrograms involves complex operations and phase estimation, which increases the complexity and parameter number of the model. To address this, we have built upon the foundation of DCTCRN and introduced real-valued Short-Time Discrete Cosine Transform (STDCT) spectrograms as input features, which avoids the complexities associated with phase estimation and modeling amplitude-phase relationships. To further enhance skip connections without increasing parameters, we have incorporated the SimAM attention mechanism. Additionally, we have added dual-path RNN modules between the encoder and decoder to capture long dependencies in both time and frequency dimensions. We have also introduced Hardtanh as the new scaling function. Through comparative experiments and ablation studies, we have confirmed the effectiveness of using STDCT spectrograms, attention mechanism and Hardtanh scaling function. Our approach demonstrates higher competitiveness in objective performance metrics compared to recent speech enhancement models. Notably, it achieves this while maintaining a relatively low parameter number, thus raising the performance ceiling of the DCTCRN series models.
View full abstract
-
Meiting XUE, Jinbo ZHANG, Yixuan ZHANG, Huan ZHANG, Chenpu LI, Bei ZHA ...
Article type: PAPER
Article ID: 2024EAP1148
Published: 2025
Advance online publication: May 12, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Large-scale interactive systems require efficient performance and scalability to accommodate user demands. The response time of individual requests can be a limiting factor for overall performance. One effective solution is to employ a consistent hashing algorithm for request distribution, which alleviates the load on each server and enhances response speed. However, existing consistent hash algorithms often fail to account for the heterogeneity of resources, which may degrade performance and result in underutilized resources. To solve this problem, this paper proposes a solution based on the study of cluster load balancing using a consistent hash algorithm to increase the resource utilization. Firstly, The scheme adopts a two-dimensional spatial coordinate positioning. Partitions are formed by dividing the ring created by the value range of the CRC32 or CRC64 hash function. The partition and relative position for a key are determined by its vertical and horizontal coordinate, respectively. Secondly, nodes with different performance are assigned with different weights, and each partition also has a corresponding weight which determined by the number and weight of nodes within it. Experiments have shown that this scheme can achieve a search rate of more than 30 million keys per second, with a resource utilization rate of over 80% within the cluster, and maintain stability when changing the number of nodes, thereby improving the overall performance of the system.
View full abstract
-
Ryo ISHIKAWA, Shohei MORI, Mototaka ARAKAWA, Hiroshi KANAI
Article type: LETTER
Article ID: 2024EAL2116
Published: 2025
Advance online publication: May 07, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this study, blood vessel shape was accurately measured to evaluate the viscoelastic properties of the radial artery. For a robust measurement, the shape parameters of the elliptical blood vessel were determined by integrating the brightness over the entire vessel instead of using the brightness gradient at the vessel boundary. The usefulness of the proposed method is demonstrated through simulations and in vivo experiments. The results obtained exhibit considerable potential for estimating the viscoelastic properties of elliptically deformed blood vessels.
View full abstract
-
Jinu GONG, Hoojin LEE
Article type: LETTER
Article ID: 2025EAL2008
Published: 2025
Advance online publication: May 07, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this letter, we extend the analysis of outage probability of decode-and-forward dual-hop system over Nakagami-m fading to include non-integer fading parameters, which addresses a limitation of previous studies that were restricted to integer values. By deriving a generalized expression, we can provide a unified framework applicable to more general and practical scenarios. Extensive numerical results are presented to validate that our proposed closed-form formula can embrace more general Nakagami-m fading environments, obviously showing its compactness and accuracy.
View full abstract
-
Manal FATIMA, Sa'ed ABED, Osman HASAN
Article type: PAPER
Article ID: 2025EAP1033
Published: 2025
Advance online publication: May 07, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Approximate computing (AC) has been increasingly used to meet the growing demand for energy-efficient and high-performance computing in error-tolerant applications, particularly in the fields of machine learning, signal processing, and multimedia applications. Approximate synthesis tools are an essential component in approximate circuit design and optimization as they enable designers to trade-off accuracy for reduced power consumption, area, and delay. However, these approximate synthesis tools are quite vulnerable to adversarial attacks as it is quite challenging to distinguish between a change in the functionality of the given circuit due to an approximation or a Hardware Trojan (HT). In this paper, we propose an approach for HT detection using Triple modular Redundancy in APproximate Synthesis (HT-TRAPS) tools. The approach also utilizes functional and side channel power and timing analysis to distinguish approximations from HTs and is applicable for either identifying a clean netlist or detecting the presence of a HT at the gate-level post-approximate synthesis stage. We implement the HT-TRAPS approach using a full stack of open-source and commercial tools, including BLASYS, ABACUS, SCOAP and Xilinx Vivado, and thoroughly evaluate its effectiveness by detecting various Trojan benchmarks, such as B19-T100, B19-T200, and B19-500 Trojans, inserted in several circuits, such as the approximated Absolute Difference calculator, Butterfly filter, a classifier, x2, a 16-bit Multiplier and a 32-bit Adder.
View full abstract
-
Takuma YOSHIOKA, Toru NAKANISHI, Teruaki KITASUKA
Article type: PAPER
Article ID: 2024EAP1166
Published: 2025
Advance online publication: April 24, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
A system of zero-knowledge proofs on graph signatures has been proposed, where a graph can be signed, and the owner of the graph signature can prove a graph relation such as the connectivity and isolation of any two vertexes on the graph without disclosing all information about the graph. The correctness of the graph information is guaranteed by the signature. One of the applications is a virtualized infrastructure, where an infrastructure provider manages a distributed system, and each tenant is allocated a specific portion of this infrastructure for use. Tenants need to check with the provider that their resources are properly connected (connectivity) and that their resources are properly separated from the resources of other tenants (isolation). On the other hand, the provider cannot simply disclose the entire infrastructure topology to each tenant. Using the zero-knowledge proof system on graph signatures, both requirements can be addressed. Previously, an efficient zero-knowledge proof system on graph signatures using a bilinear-map accumulator has been proposed, where the verification time and the size of the proof data do not depend on the number of graph vertexes and edges. However, this system has two problems. First, since the proof does not include labels, it is not possible to prove the connectivity considering network bandwidth and cost. Second, since it assumes undirected graphs, it cannot handle applications on directed graphs such as network flows. In this paper, we extend the previous system and propose a zero-knowledge proof system of the connectivity for directed graphs where each edge has labels. We implemented our system on a PC using a pairing library and evaluate it by measuring the processing times. Compared to the conference version of this paper, we show the formal definitions and the security proofs of our proposed system, and add implementation-based evaluations reflecting the application to the virtualized infrastructure.
View full abstract
-
Conggai LI, Feng LIU, Yanli XU
Article type: LETTER
Article ID: 2025EAL2019
Published: 2025
Advance online publication: April 24, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
This letter studies the robust transceiver designs for multiple-input multiple-output (MIMO) interference channels with imperfect channel state information (CSI). The sum power minimization problem is considered subject to signal-to-interference-plus-noise ratio (SINR) constraint under CSI mismatch with statistical error model. Since the problem is a joint design of transmitter and receiver beamformers, an alternating approach is developed by exploiting the primal decomposition. Specifically, closed-form expressions are derived as a solution for the robust transceiver design. Numerical results are provided to demonstrate the robustness of the proposed algorithm and the performance efficiency in combating channel errors.
View full abstract
-
Bowen LIU, Hongbo ZHU, Wenbo ZHANG, Yuanguo BI, Qi QI
Article type: LETTER
Article ID: 2025EAL2036
Published: 2025
Advance online publication: April 24, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Precise and automatic segmentation of pulmonary lesions is crucial for assisting pulmonologists in accurate diagnosis and decision-making. Despite advances in deep learning, segmenting pulmonary nodules remains challenging due to factors like small lesions, irregular boundaries, and data imbalance. We propose an edge detail enhancement method (EDC-UNet) for pulmonary nodule segmentation, which integrates deformable convolutional layers to improve flexibility for various lesion morphologies and dilated convolution-based residual blocks to enhance feature extraction. Additionally, a Sobel-based detail supervision module in the decoder helps capture low-level spatial details, improving segmentation of blurred edges. Extensive experiments on the LIDC-IDRI and LUNA16 datasets demonstrate that EDC-UNet outperforms other models, highlighting its potential for medical image analysis.
View full abstract
-
Ruicong ZHI, Jing HU, Jinming PING, Fei WAN
Article type: PAPER
Article ID: 2024EAP1128
Published: 2025
Advance online publication: April 22, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Automatic Micro-Expression (ME) spotting is a fundamental yet essential task in Micro-Expression analysis from videos. Due to the brief and subtle of ME, the ME spotting task is challenging and the spotting performance need to be further improved. However, current works generally neglect the correlation between expression proposals in a video. In this work, we propose a two-stage relation-aware graph convolutional network (MES-RANet) to locate the temporal positions of macro- and micro-expression. First, we adopt a temporal evaluation module (TEM) to predict the frame-level probabilities from the spatial-temporal feature sequences and generate candidate proposals for the subsequent module. Specifically, in relation-aware module (RAM), we formulate video proposals as graph nodes, and proposal-proposal correlations as edges to construct graphs. Then apply the relation-aware network to model the relations among proposals and learn powerful representations for the boundary regression. Comprehensive experiment results show that MES-RANet is effective and achieves competitive performance compared with state-of-the-art methods on two public benchmark datasets CAS(ME)2 and SAMM-LV. Codes are available at https://github.com/hahaluluyo/MES-RANet.
View full abstract
-
Liliang ZHOU, Zengrui YI, Rong LUO, Zhengchun ZHOU
Article type: LETTER
Article ID: 2025EAL2032
Published: 2025
Advance online publication: April 22, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Automatic modulation recognition in low-computation edge devices under noisy environments has become increasingly critical. To address the dual challenges of lightweight design and noise resistance, this paper proposes WCTFormer, a novel lightweight network that integrates discrete wavelet transform for frequency-domain noise suppression and a Transformer for global feature extraction, enabling robust performance in low SNR conditions. Experiments on open-source datasets demonstrate that WCTFormer achieves superior recognition accuracy, with 92.40% accuracy at 0 dB SNR, requiring only 60K parameters. WCTFormer combines high recognition performance and computational efficiency, making it suitable for deployment in resource-constrained edge devices.
View full abstract
-
Hiroshi FUJISAKI
Article type: PAPER
Article ID: 2025EAP1004
Published: 2025
Advance online publication: April 18, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
The stream version of asymmetric binary systems (ABS) invented by Duda is an entropy coder for information sources with a finite alphabet. It has the state parameter l of a nonnegative integer and the probability parameter p with 0 < p < 1. First we observe that the edge shift XG associated with the stream version of ABS has the topological entropy h(XG) = log 2. Then we define the edge shift XH associated with output blocks from the stream version of ABS, and show that h(XH) = h(XG), which implies that XG and XH are finitely equivalent. The encoding and decoding algorithms for the stream version of ABS establish a bijection between XG and XH. We consider the case where p = 1/β with the golden mean β = (1 + √5)/2. Eventually we show that XG and XH are conjugate for l = 7, and that they are almost conjugate for l = 10.
View full abstract
-
Daozheng CHEN, Feng LIU, Conggai LI, Jun GAO, Yanli XU
Article type: LETTER
Article ID: 2025EAL2011
Published: 2025
Advance online publication: April 17, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
For a given forward transmission scheme, the backward transmission in reverse direction is often wanted in practical communications. This letter proposes an optimal scheme for the backward transmission of the propagation-delay (PD) based general X channel with two receivers, which is reciprocal to forward transmission. With cyclic interference alignment, the desired messages are shown to be allocated at specified time-slots without interference, while other interfering messages are aligned in the remaining time-slots. Thus the backward transmission achieves the maximal degrees of freedom (DoF) with the reciprocal PD channel, which supports optimal bidirectional transmission of the X channel with two receivers.
View full abstract
-
Weixin LIU, Kaifang CHENG, Qiuyan WANG, Yang YAN, Guanghao JIN
Article type: LETTER
Article ID: 2025EAL2022
Published: 2025
Advance online publication: April 17, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Codebooks possessing optimal correlation property are utilized to differentiate signals among various users in code-division multiple-access (CDMA) systems. In this paper, a class of codebooks is proposed based on additive characters over finite fields and is verified to be optimal with respect to the Levenshtein bound. By shortening the length of the presented optimal codebooks, a kind of asymptotically optimal codebooks is obtained. To our knowledge, the presented asymptotically optimal codebooks have new parameters. Further more, these optimal and asymptotically optimal codebooks are highly desirable in synchronous Direct-Sequence CDMA systems, as they facilitate the expansion of subscriber capacity within the constrained spectral resources.
View full abstract
-
CHANGWEI TU, ZHILIANG HUANG, YOUYAN ZHANG
Article type: LETTER
Article ID: 2024EAL2095
Published: 2025
Advance online publication: April 14, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this letter, we optimize the weight distribution of the polar codes by exchanging elements in the information set and the frozen set. Based on the work of M. Rowshan et al., we propose two improvements. First, the rows with the twice weight of the minimum weight row are usually selected by the original scheme for the added rows. By our improvement, we select rows with the largest weights such as 4 or 8 times of the minimum weight row. This modification optimizes the weight distribution of polar codes. Furthermore, if there is a case where the selected row weights are the same, the row with higher reliability is selected. Second, we consider the influence of balancing rows for the removed rows. In the original scheme, one core row is removed and then an added row is selected at each step. Our strategy is to fix the position of several added rows, and then remove the core rows or balancing rows globally. This modification can not only reduce the number of Min-Weight codewords but also optimize the channel reliability of the removed rows. Simulation results show that the decoding performance of modified codes has been greatly improved at the practical block error rate of 10-2 - 10-3 without changing the code rate of the polar codes.
View full abstract
-
Qi Qi, Zheng Liu, Yu Guo
Article type: LETTER
Article ID: 2024EAL2091
Published: 2025
Advance online publication: April 11, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Accurate scene representation holds practical significance for autonomous driving and virtual reality. This letter proposes a network to optimize images encoding and features learning for better scene representations. Experimental results show that this method can render high-quality novel images on both synthetic and real-world datasets.
View full abstract
-
Yukika SUZUKI, Izumi TSUNOKUNI, Yusuke IKEDA
Article type: LETTER
Article ID: 2024EAL2094
Published: 2025
Advance online publication: April 09, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Mode matching (MM) is a sound field reproduction method based on spherical harmonic expansion. In this study, we propose a higher-order MM method using a limited number of microphones based on the sparse equivalent method. Simulation experiments show that the proposed method achieves a significant improvement in reproduction accuracy.
View full abstract
-
Arata EJIRI, Masahiro Oya
Article type: PAPER
Article ID: 2024EAP1094
Published: 2025
Advance online publication: April 09, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Scoring competitions such as gymnastics have a particularly high demand for accuracy and fairness of judgment. In recent years, Fujitsu has collaborated with the International Gymnastics Federation and Japan Gymnastics Association to develop an “artificial intelligence gymnastics judgement system” using three-dimensional laser sensors. In this system, multiple microelectromechanical system (MEMS) mirror-type laser sensors are used for the stereoscopic measurement of gymnastics. MEMS mirrors are typically driven at the same frequency as their mechanical resonance frequency. Because the amplitude and phase greatly fluctuate with changes in resonance frequency, controlling the rotation angle to keep the amplitude and phase accurate is crucial. Herein, we developed an amplitude control method that does not use the mirror rotation angular velocity using a sin/cos amplitude model. We developed an adaptive control system for system parameter fluctuations because of changes in the resonance frequency of a MEMS mirror system. Using the developed method for the sin/cos amplitude model, we can theoretically evaluate the stability of the control system and the convergence to the target value. Through numerical simulations where this controller was applied to a high-order model with characteristics similar to those of the actual machine, we confirmed that the amplitude tracking error and convergence time were reduced even when the system parameters fluctuated significantly, demonstrating the usefulness of the proposed adaptive control system.
View full abstract
-
Jiekun ZHANG, Xiaoyu CHEN, Luyi ZHENG, Yubo LI
Article type: LETTER
Article ID: 2024EAL2100
Published: 2025
Advance online publication: April 08, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this letter, we propose constructions of Type-II Even-Length binary Z-complementary pairs (EB-ZCPs) with parameters such as (3N1N2N3, 3N1N2N3 - 1) and ((N1N2)n L, (N1N2)n L - L + Z), respectively, where N1, N2, N3 are restricted to 2α10β26γ and n represents the times of iterations. The width of zero correlation zone (ZCZ) can reach or approach the theoretical upper bound, and the obtained Type-II EB-ZCPs have the low upper bound of peak-to-mean envelope power ratio (PMEPR), which can not be produced by existing constructions. Therefore, the constructions in this letter can provide more new types of ZCPs to suppress the potential asynchronous interference in broadband wireless communication systems.
View full abstract
-
Shota NAKAYAMA, Koichi KOBAYASHI, Yuh YAMASHITA
Article type: PAPER
Article ID: 2024EAP1163
Published: 2025
Advance online publication: April 08, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
A cyber-physical system (CPS) is a system where physical and information components are connected through a communication network. From the viewpoints of energy conservation and reduction of communication amount, the control input update and the sampling should be asynchronously performed only when necessary. In this paper, an event-based design method for asynchronously updating the control input and the sampling interval is proposed. A switched system is used as a mathematical model of CPSs. In the proposed method, based on the upper bound of the Lyapunov function, the update time of the control input, the switching signal, and the next sampling time are determined. As a control specification, it is guaranteed that the closed-loop system is uniformly ultimately bounded. Through a numerical example, the effectiveness of the proposed method is presented.
View full abstract
-
Gakuto OGAWA, Naoki HAYASHI, Masahiro INUIGUCHI
Article type: PAPER
Article ID: 2024EAP1170
Published: 2025
Advance online publication: April 08, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In this paper, we consider a distributed method for constrained optimization problems that incorporates self-triggered communication. Each agent cooperatively searches for an optimal solution by exchanging estimates over a communication network among agents. Local communications are sporadically conducted to ensure that the error between the current and last triggered estimates is within a predefined threshold. The next trigger time is computed at the current trigger time in a self-triggered manner. After the information exchange, the estimate is iteratively updated by a consensus-based dual decomposition algorithm. We show that the dual estimates of agents asymptotically converge to an optimal solution under a diminishing and summable stepsize condition. Simulation results show that the proposed self-triggered algorithm can reduce the overall number of communications compared to time-triggered approaches.
View full abstract
-
Lilong HOU, Liang JIN, Shuaifang XIAO, Yangming LOU, Xiaoyan HU, Jingh ...
Article type: LETTER
Article ID: 2025EAL2021
Published: 2025
Advance online publication: April 07, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Existing Two-dimensional Direction-of-Arrival (2-D DOA) estimation methods of multipath signals using uniform planar array (UPA) face challenges related to high hardware costs and high computational complexity. In this letter, we exploit the current advances in Dynamic Metasurface Antennas (DMA) to propose a new 2-D DOA estimation method of multipath signals using DMA. The proposed method first employs DMA with fewer RF chains to design a space-time isomeric scheme, which acquire equivalent multi-dimensional received signals by rapidly changing the pattern within a single pilot symbol period. Then, the array data are accurately reconstructed using a generalized inverse matrix algorithm. After that, we obtain two standard linear array data by summing over the rows data and the columns data, respectively. The corresponding angles of each multipath are estimated by the Method of Direction Estimation (MODE) algorithm. Finally, the elevation and azimuth angles are obtained by trigonometric function calculation according to the geometric relationship. Simulation results illustrate that the proposed method reduces computational complexity and verifies its effectiveness using DMA, demonstrating that DMA with fewer RF chains can achieve the same estimation performance as the UPA.
View full abstract
-
Xi Ding, Xiang Li, Kunyu Liu, Yuguang Xu, Xiaofeng Wu, Peiyuan Wang, Z ...
Article type: PAPER
Article ID: 2025EAP1021
Published: 2025
Advance online publication: April 07, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Pulmonary nodule imaging diagnosis is in a leading position in the field of deep learning research, but few can really be deployed and promoted. In this study, we summarize the reasons that hinder the deployment of research results, and develop a pulmonary nodule diagnostic model using 1015 cases of CT (Computed Tomography) images and diagnostic image reports from Yantai Affiliated Hospital of Binzhou Medical University, where the LIDC-IDRI dataset was used for external testing. Our model includes three paths: a physician diagnostic path developed by extracting and statistical analysis of high-frequency terms in diagnostic image reports, an AI (Artificial Intelligence) diagnostic path developed by training CT images, and a human-computer collaborative diagnostic path developed by the hypergraph convolutional neural network (HGCN). The results show that both in the internal test set (AUC of 0.9745) and in the external test set (AUC of 0.9694), the human-computer collaborative path achieves optimal results, which confirms that our model can combine the experience of physicians with the computational power of AI to achieve more accurate and reliable diagnosis; in addition, the easy-to-access input data and the github-shared code also increase the possibility of model deployment.
View full abstract
-
Shuhei NAKAMURA, Yusuke TANI, Hiroki FURUE
Article type: PAPER
Article ID: 2024EAP1124
Published: 2025
Advance online publication: April 02, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
In 2022, Wang et al. proposed the multivariate signature scheme SNOVA as a UOV variant over the non-commutative ring of l × l matrices over 𝔽q. This scheme has small public key and signature size and is a second round candidate of NIST PQC additional digital signature project. Recently, Ikematsu and Akiyama, and Li and Ding show that the core matrices of SNOVA with v vinegar-variables and o oil-variables are regarded as the representation matrices of UOV with lv vinegar-variables and lo oil-variables over 𝔽q, and thus we can apply existing key recovery attacks as a plain UOV. In this article, we propose a method that reduces SNOVA to smaller UOV with v vinegar-variables and o oil-variables over 𝔽ql. As a result, we show that the previous first round parameter sets at l = 2 do not meet the NIST PQC security levels. We also confirm that the present parameter sets are secure from existing key recovery attacks with our approach.
View full abstract
-
Yu ZHOU, Wentao LI, Rong CHENG, Jinhua WANG, Xinfeng DONG, Xiaoni DU
Article type: LETTER
Article ID: 2024EAL2110
Published: 2025
Advance online publication: March 31, 2025
JOURNAL
FREE ACCESS
ADVANCE PUBLICATION
Difference distribution table (DDT) plays an important role in studying the cryptographic properties of (n, n)-functions, (n, n)-functions with the same DDT are called DDT-equivalent. In this paper, we give one sufficient and necessary condition on DDT-equivalent according to autocorrelation distributions at first, and obtain some methods about new DDT-equivalent based on old DDT-equivalent. Finally, a construction algorithm on DDT-equivalent is present, we fully give DDT-equivalent for all balanced (3, 3)-functions.
View full abstract