IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Current issue
Displaying 1-9 of 9 articles from this issue
Special Section on Information and Communication Technologies for Safe and Secure Life
  • Tomotaka WADA
    2024 Volume E107.A Issue 4 Pages 610
    Published: April 01, 2024
    Released on J-STAGE: April 01, 2024
    JOURNAL FREE ACCESS
    Download PDF (201K)
  • Sumiko MIYATA, Ryoichi SHINKUMA
    Article type: INVITED PAPER
    2024 Volume E107.A Issue 4 Pages 611-618
    Published: April 01, 2024
    Released on J-STAGE: April 01, 2024
    Advance online publication: November 09, 2023
    JOURNAL FREE ACCESS

    Streaming systems that can maintain Quality of Experience (QoE) for users have attracted much attention because they can be applied in various fields, such as emergency response training and medical surgery. Dynamic Adaptive Streaming over HTTP (DASH) is a typical protocol for streaming system. In order to improve QoE in DASH, a multi-server system has been presented by pseudo-increasing bandwidth through multiple servers. This multi-server system is designed to share streaming content efficiently in addition to having redundant server resources for each streaming content, which is excellent for fault tolerance. Assigning DASH server to users in these multi-servers environment is important to maintain QoE, thus a method of server assignment of users (user allocation method) for multi-servers is presented by using cooperative game theory. However, this conventional user allocation method does not take into account the size of the server bandwidth, thus users are concentrated on a particular server at the start of playback. Although the average required bit rate of video usually fluctuates, bit rate fluctuations are not taken into account. These phenomena may decrease QoE. In this paper, we propose a novel user allocation method using coalition structure generation in cooperative game theory to improve the QoE of all users in an immediate and stable manner in DASH environment. Our proposed method can avoid user concentration, since the bandwidth used by the overall system is taken into account. Moreover, our proposed method can be performed every time the average required bit rate changes. We demonstrate the effectiveness of our method through simulations using Network Simulator 3 (NS3).

    Download PDF (1336K)
  • Ryu ISHII, Kyosuke YAMASHITA, Zihao SONG, Yusuke SAKAI, Tadanori TERUY ...
    Article type: PAPER
    2024 Volume E107.A Issue 4 Pages 619-633
    Published: April 01, 2024
    Released on J-STAGE: April 01, 2024
    Advance online publication: October 10, 2023
    JOURNAL FREE ACCESS

    Fault-tolerant aggregate signature (FT-AS) is a special type of aggregate signature that is equipped with the functionality for tracing signers who generated invalid signatures in the case an aggregate signature is detected as invalid. In existing FT-AS schemes (whose tracing functionality requires multi-rounds), a verifier needs to send a feedback to an aggregator for efficiently tracing the invalid signer(s). However, in practice, if this feedback is not responded to the aggregator in a sufficiently fast and timely manner, the tracing process will fail. Therefore, it is important to estimate whether this feedback can be responded and received in time on a real system. In this work, we measure the total processing time required for the feedback by implementing an existing FT-AS scheme, and evaluate whether the scheme works without problems in real systems. Our experimental results show that the time required for the feedback is 605.3ms for a typical parameter setting, which indicates that if the acceptable feedback time is significantly larger than a few hundred ms, the existing FT-AS scheme would effectively work in such systems. However, there are situations where such feedback time is not acceptable, in which case the existing FT-AS scheme cannot be used. Therefore, we further propose a novel FT-AS scheme that does not require any feedback. We also implement our new scheme and show that a feedback in this scheme is completely eliminated but the size of its aggregate signature (affecting the communication cost from the aggregator to the verifier) is 144.9 times larger than that of the existing FT-AS scheme (with feedbacks) for a typical parameter setting, and thus has a trade-off between the feedback waiting time and the communication cost from the verifier to the aggregator with the existing FT-AS scheme.

    Download PDF (3181K)
  • Noboru HAYASAKA, Riku KASAI, Takuya FUTAGAMI
    Article type: LETTER
    2024 Volume E107.A Issue 4 Pages 634-637
    Published: April 01, 2024
    Released on J-STAGE: April 01, 2024
    Advance online publication: October 05, 2023
    JOURNAL FREE ACCESS

    In this paper, we propose a noise-robust scream detection method with the aim of expanding the scream detection system, a sound-based security system. The proposed method uses enhanced screams using Wave-U-Net, which was effective as a noise reduction method for noisy screams. However, the enhanced screams showed different frequency components from clean screams and erroneously emphasized frequency components similar to scream in noise. Therefore, Wave-U-Net was applied even in the process of training Gaussian mixture models, which are discriminators. We conducted detection experiments using the proposed method in various noise environments and determined that the false acceptance rate was reduced by an average of 2.1% or more compared with the conventional method.

    Download PDF (780K)
Regular Section
  • Kazuya SHIMEI, Kentaro KOBAYASHI, Wataru CHUJO
    Article type: PAPER
    Subject area: Communication Theory and Signals
    2024 Volume E107.A Issue 4 Pages 638-653
    Published: April 01, 2024
    Released on J-STAGE: April 01, 2024
    Advance online publication: August 07, 2023
    JOURNAL FREE ACCESS

    We study a visible light communication (VLC) system that modulates data signals by changing the color components of image contents on a digital signage display, captures them with an image sensor, and demodulates them using image processing. This system requires that the modulated data signals should not be perceived by the human eye. Previous studies have proposed modulation methods with a chromaticity component that is difficult for the human eye to perceive, and we have also proposed a modulation method with perceptually uniform color space based on human perception characteristics. However, which chromaticity component performs better depends on the image contents, and the evaluation only for some specific image contents was not sufficient. In this paper, we evaluate the communication and visual quality of the modulation methods with chromaticity components for various standard images to clarify the superiority of the method with perceptually uniform color space. In addition, we propose a novel modulation and demodulation method using diversity combining to eliminate the dependency of performance on the image contents. Experimental results show that the proposed method can improve the communication and visual quality for almost all the standard images.

    Download PDF (4933K)
  • Lin CHEN, Xueyuan YIN, Dandan ZHAO, Hongwei LU, Lu LI, Yixiang CHEN
    Article type: PAPER
    Subject area: General Fundamentals and Boundaries
    2024 Volume E107.A Issue 4 Pages 654-665
    Published: April 01, 2024
    Released on J-STAGE: April 01, 2024
    Advance online publication: August 07, 2023
    JOURNAL FREE ACCESS

    ARM chips with low energy consumption and low-cost investment have been rapidly applied to smart office and smart entertainment including cloud mobile phones and cloud games. This paper first summarizes key technologies and development status of the above scenarios including CPU, memory, IO hardware virtualization characteristics, ARM hypervisor and container, GPU virtualization, network virtualization, resource management and remote transmission technologies. Then, in view of the current lack of publicly referenced ARM cloud constructing solutions, this paper proposes and constructs an implementation framework for building an ARM cloud, and successively focuses on the formal definition of virtualization framework, Android container system and resource quota management methods, GPU virtualization based on API remoting and GPU pass-through, and the remote transmission technology. Finally, the experimental results show that the proposed model and corresponding component implementation methods are effective, especially, the pass-through mode for virtualizing GPU resources has higher performance and higher parallelism.

    Download PDF (8001K)
  • Katsuya KOSUKEGAWA, Kazuhiko KAWAMOTO
    Article type: LETTER
    Subject area: Nonlinear Problems
    2024 Volume E107.A Issue 4 Pages 666-669
    Published: April 01, 2024
    Released on J-STAGE: April 01, 2024
    Advance online publication: August 07, 2023
    JOURNAL FREE ACCESS

    We considered the problem of forecasting the degradation recovery process of civil structures for prognosis and health management. In this process, structural health degrades over time but recovers when a maintenance intervention is performed. Maintenance interventions are typically recorded in terms of date and type. Such records can be represented as binary time series. Using binary maintenance intervention records, we forecast the process by using Long Short-Term Memory (LSTM). In this study, we experimentally examined how to feed binary time series data into LSTM. To this end, we compared the concatenation and reinitialization methods. The former is used to concatenate maintenance intervention records and health data and feed them into LSTM. The latter is used to reinitialize the LSTM internal memory when maintenance intervention is performed. The experimental results with the synthetic data revealed that the concatenation method outperformed the reinitialization method.

    Download PDF (276K)
  • Haiyang LIU, Lianrong MA
    Article type: LETTER
    Subject area: Coding Theory
    2024 Volume E107.A Issue 4 Pages 670-674
    Published: April 01, 2024
    Released on J-STAGE: April 01, 2024
    Advance online publication: August 16, 2023
    JOURNAL FREE ACCESS

    Given an odd prime q and an integer mq, a binary mq × q2 quasi-cyclic parity-check matrix H(m, q) can be constructed for an array low-density parity-check (LDPC) code C(m, q). In this letter, we investigate the first separating redundancy of C(m, q). We prove that H(m, q) is 1-separating for any pair of (m, q), from which we conclude that the first separating redundancy of C(m, q) is upper bounded by mq. Then we show that our upper bound on the first separating redundancy of C(m, q) is tighter than the general deterministic and constructive upper bounds in the literature. For m = 2, we further prove that the first separating redundancy of C(2, q) is 2q for any odd prime q. For m ≥ 3, we conjecture that the first separating redundancy of C(m, q) is mq for any fixed m and sufficiently large q.

    Download PDF (327K)
  • Chih-Chang SHEN, Jia-Sheng LI
    Article type: LETTER
    Subject area: Spread Spectrum Technologies and Applications
    2024 Volume E107.A Issue 4 Pages 675-679
    Published: April 01, 2024
    Released on J-STAGE: April 01, 2024
    Advance online publication: August 07, 2023
    JOURNAL FREE ACCESS

    This letter deals with the joint direction of arrival and direction of departure estimation problem for overloaded target in bistatic multiple-input multiple-output radar system. In order to achieve the purpose of effective estimation, the presented Khatri-Rao (KR) MUSIC estimator with the ability to handle overloaded targets mainly combines the subspace characteristics of the target reflected wave signal and the KR product based on the array response. This letter also presents a computationally efficient KR noise subspace projection matrix estimation technique to reduce the computational load due to perform high-dimensional singular value decomposition. Finally, the effectiveness of the proposed method is verified by computer simulation.

    Download PDF (391K)
feedback
Top