The objective of critical nodes problem is to minimize pair-wise connectivity as a result of removing a specific number of nodes in the residual graph. From a mathematical modeling perspective, it comes the truth that the more the number of fragmented components and the evenly distributed of disconnected sub-graphs, the better the quality of the solution. Basing on this conclusion, we proposed a new Cluster Expansion Method for Critical Node Problem (CEMCNP), which on the one hand exploits a contraction mechanism to greedy simplify the complexity of sparse graph model, and on the other hand adopts an incremental cluster expansion approach in order to maintain the size of formed component within reasonable limitation. The proposed algorithm also relies heavily on the idea of multi-start iterative local search algorithm, whereas brings in a diversified late acceptance local search strategy to keep the balance between interleaving diversification and intensification in the process of neighborhood search. Extensive evaluations show that CEMCNP running on 35 of total 42 benchmark instances are superior to the outcome of KBV, while holding 3 previous best results out of the challenging instances. In addition, CEMCNP also demonstrates equivalent performance in comparison with the existing MANCNP and VPMS algorithms over 22 of total 42 graph models with fewer number of node exchange operations.
Hideaki OHASHI Toshiyuki SHIMIZU Masatoshi YOSHIKAWA
Peer assessment in education has pedagogical benefits and is a promising method for grading a large number of submissions. At the same time, student reliability has been regarded as a problem; consequently, various methods of estimating highly reliable grades from scores given by multiple students have been proposed. Under most of the existing methods, a nonadaptive allocation pattern, which performs allocation in advance, is assumed. In this study, we analyze the effect of student-submission allocation on score estimation in peer assessment under a nonadaptive allocation setting. We examine three types of nonadaptive allocation methods, random allocation, circular allocation and group allocation, which are considered the commonly used approaches among the existing nonadaptive peer assessment methods. Through simulation experiments, we show that circular allocation and group allocation tend to yield lower accuracy than random allocation. Then, we utilize this result to improve the existing adaptive allocation method, which performs allocation and assessment in parallel and tends to make similar allocation result to circular allocation. We propose the method to replace part of the allocation with random allocation, and show that the method is effective through experiments.
Sejin JUNG Eui-Sub KIM Junbeom YOO
Traditional safety analysis techniques have shown difficulties in incorporating dynamically changing structures of CPSs (Cyber-Physical Systems). STPA (System-Theoretic Process Analysis), one of the widely used, needs to unfold and arrange all hidden structures before beginning a full-fledged analysis. This paper proposes an intermediate model “Information Unfolding Model (IUM)” and a process “Information Unfolding Process (IUP)” to unfold dynamic structures which are hidden in CPSs and so help analysts construct control structures in STPA thoroughly.
Duc Minh NGUYEN Hiroshi SHIRAI
In this study, edge diffraction of an electromagnetic plane wave by two-dimensional conducting wedges has been analyzed by the physical optics (PO) method for both E and H polarizations. Non-uniform and uniform asymptotic solutions of diffracted fields have been derived. A unified edge diffraction coefficient has also been derived with four cotangent functions from the conventional angle-dependent coefficients. Numerical calculations have been made to compare the results with those by other methods, such as the exact solution and the uniform geometrical theory of diffraction (UTD). A good agreement has been observed to confirm the validity of our method.
In this paper, we present a scheme to compute either AB or AB2 multiplications over GF(2m) and propose a bit-parallel systolic architecture based on the proposed algorithm. The AB multiplication algorithm is derived in the same form as the formula of AB2 multiplication algorithm, and an architecture that can perform AB multiplication by adding very little extra hardware to AB2 multiplier is designed. Therefore, the proposed architecture can be effectively applied to hardware constrained applications that cannot deploy AB2 multiplier and AB multiplier separately.
Jinkyu KANG Seongah JEONG Hoojin LEE
In this letter, we analyze the error rate performance of M-ary coherent free-space optical (FSO) communications under strong atmospheric turbulence. Specifically, we derive the exact error rates for M-ary phase shift keying (MPSK) and M-ary quadrature amplitude modulation (MQAM) based on moment-generating function (MGF) with negative exponential distributed turbulence, where maximum ratio combining (MRC) receiver is adopted to mitigate the turbulence effects. Additionally, by evaluating the asymptotic error rate in high signal-to-noise ratio (SNR) regime, it is possible to effectively investigate and predict the error rate performance for various system configurations. The accuracy and the effectiveness of our theoretical analyses are verified via numerical results.
Tomoki KAGA Mamoru OKUMURA Eiji OKAMOTO Tetsuya YAMAMOTO
In the fifth-generation mobile communications system (5G), it is critical to ensure wireless security as well as large-capacity and high-speed communication. To achieve this, a chaos modulation method as an encrypted and channel-coded modulation method in the physical layer is proposed. However, in the conventional chaos modulation method, the decoding complexity increases exponentially with respect to the modulation order. To solve this problem, in this study, a hybrid modulation method that applies quadrature amplitude modulation (QAM) and chaos to reduce the amount of decoding complexity, in which some transmission bits are allocated to QAM while maintaining the encryption for all bits is proposed. In the proposed method, a low-complexity decoding method is constructed by ordering chaos and QAM symbols based on the theory of index modulation. Numerical results show that the proposed method maintains good error-rate performance with reduced decoding complexity and ensures wireless security.
Koichi KITAMURA Koichi KOBAYASHI Yuh YAMASHITA
In this paper, event-triggered control over a sensor network is studied as one of the control methods of cyber-physical systems. Event-triggered control is a method that communications occur only when the measured value is widely changed. In the proposed method, by solving an LMI (Linear Matrix Inequality) feasibility problem, an event-triggered output feedback controller such that the closed-loop system is asymptotically stable is derived. First, the problem formulation is given. Next, the control problem is reduced to an LMI feasibility problem. Finally, the proposed method is demonstrated by a numerical example.
Masaki NAKAMURA Shuki HIGASHI Kazutoshi SAKAKIBARA Kazuhiro OGATA
Because processes run concurrently in multitask systems, the size of the state space grows exponentially. Therefore, it is not straightforward to formally verify that such systems enjoy desired properties. Real-time constrains make the formal verification more challenging. In this paper, we propose the following to address the challenge: (1) a way to model multitask real-time systems as observational transition systems (OTSs), a kind of state transition systems, (2) a way to describe their specifications in CafeOBJ, an algebraic specification language, and (3) a way to verify that such systems enjoy desired properties based on such formal specifications by writing proof scores, proof plans, in CafeOBJ. As a case study, we model Fischer's protocol, a well-known real-time mutual exclusion protocol, as an OTS, describe its specification in CafeOBJ, and verify that the protocol enjoys the mutual exclusion property when an arbitrary number of processes participates in the protocol*.
Wen SHI Jianling LIU Jingyu ZHANG Yuran MEN Hongwei CHEN Deke WANG Yang CAO
Syndrome is a crucial principle of Traditional Chinese Medicine. Formula classification is an effective approach to discover herb combinations for the clinical treatment of syndromes. In this study, a local search based firefly algorithm (LSFA) for parameter optimization and feature selection of support vector machines (SVMs) for formula classification is proposed. Parameters C and γ of SVMs are optimized by LSFA. Meanwhile, the effectiveness of herbs in formula classification is adopted as a feature. LSFA searches for well-performing subsets of features to maximize classification accuracy. In LSFA, a local search of fireflies is developed to improve FA. Simulations demonstrate that the proposed LSFA-SVM algorithm outperforms other classification algorithms on different datasets. Parameters C and γ and the features are optimized by LSFA to obtain better classification performance. The performance of FA is enhanced by the proposed local search mechanism.
Hequn LI Jiaxi LU Jinfa WANG Hai ZHAO Jiuqiang XU Xingchi CHEN
Real-time and scalable multicast services are of paramount importance to Industrial Internet of Things (IIoT) applications. To realize these services, the multicast algorithm should, on the one hand, ensure the maximum delay of a multicast session not exceeding its upper delay bound. On the other hand, the algorithm should minimize session costs. As an emerging networking paradigm, Software-defined Networking (SDN) can provide a global view of the network to multicast algorithms, thereby bringing new opportunities for realizing the desired multicast services in IIoT environments. Unfortunately, existing SDN-based multicast (SDM) algorithms cannot meet the real-time and scalable requirements simultaneously. Therefore, in this paper, we focus on SDM algorithm design for IIoT environments. To be specific, the paper first converts the multicast tree construction problem for SDM in IIoT environments into a delay-bounded least-cost shared tree problem and proves that it is an NP-complete problem. Then, the paper puts forward a shared tree (ST) algorithm called SDM4IIoT to compute suboptimal solutions to the problem. The algorithm consists of five steps: 1) construct a delay-optimal shared tree; 2) divide the tree into a set of subpaths and a subtree; 3) optimize the cost of each subpath by relaxing the delay constraint; 4) optimize the subtree cost in the same manner; 5) recombine them into a shared tree. Simulation results show that the algorithm can provide real-time support that other ST algorithms cannot. In addition, it can achieve good scalability. Its cost is only 20.56% higher than the cost-optimal ST algorithm. Furthermore, its computation time is also acceptable. The algorithm can help to realize real-time and scalable multicast services for IIoT applications.
Hiro TAMURA Kiyoshi YANAGISAWA Atsushi SHIRANE Kenichi OKADA
This paper presents a physical layer wireless device identification method that uses a convolutional neural network (CNN) operating on a quadrant IQ transition image. This work introduces classification and detection tasks in one process. The proposed method can identify IoT wireless devices by exploiting their RF fingerprints, a technology to identify wireless devices by using unique variations in analog signals. We propose a quadrant IQ image technique to reduce the size of CNN while maintaining accuracy. The CNN utilizes the IQ transition image, which image processing cut out into four-part. An over-the-air experiment is performed on six Zigbee wireless devices to confirm the proposed identification method's validity. The measurement results demonstrate that the proposed method can achieve 99% accuracy with the light-weight CNN model with 36,500 weight parameters in serial use and 146,000 in parallel use. Furthermore, the proposed threshold algorithm can verify the authenticity using one classifier and achieved 80% accuracy for further secured wireless communication. This work also introduces the identification of expanded signals with SNR between 10 to 30dB. As a result, at SNR values above 20dB, the proposals achieve classification and detection accuracies of 87% and 80%, respectively.
Fifth-generation (5G) mobile communication systems employ beamforming technology using massive multiple-input and multiple-output (MIMO) to improve the reception quality and spectrum efficiency within a cell. Meanwhile, coordinated beamforming among multiple base stations is an effective approach to improving the spectrum efficiency at the cell edges, in which massive MIMO is deployed at geographically distant base stations and beamforming control is conducted in a cooperative manner. Codebook-based beamforming is a method for realizing multi-cell coordinated beamforming, in which each base station selects one of multiple beams that are predefined in a codebook. In codebook-based beamforming, it is important to design an efficient codebook that takes into account the beam allocation and the number of beams. In general, the larger the number of beams defined in a codebook, the more finely tuned the beam control can be and a greater improvement in spectrum efficiency can be expected. However, it requires a huge signal processing to optimize the beam combinations with a large number of beams by coordinated beamforming. This paper proposes a novel codebook design that efficiently assigns beam directions and widths in a vertical plane. Computer simulations showed that the proposed codebook performs as well as the conventional method while requiring fewer beam combinations.
Hikaru FUJISAKI Makoto NAKASHIZUKA
This paper presents a deep network based on morphological filters for Gaussian denoising. The morphological filters can be applied with only addition, max, and min functions and require few computational resources. Therefore, the proposed network is suitable for implementation using a small microprocessor. Each layer of the proposed network consists of a top-hat transform, which extracts small peaks and valleys of noise components from the input image. Noise components are iteratively reduced in each layer by subtracting the noise components from the input image. In this paper, the extensions of opening and closing are introduced as linear combinations of the morphological filters for the top-hat transform of this deep network. Multiplications are only required for the linear combination of the morphological filters in the proposed network. Because almost all parameters of the network are structuring elements of the morphological filters, the feature maps and parameters can be represented in short bit-length integer form, which is suitable for implementation with single instructions, multiple data (SIMD) instructions. Denoising examples show that the proposed network obtains denoising results comparable to those of BM3D [1] without linear convolutions and with approximately one tenth the number of parameters of a full-scale deep convolutional neural network [2]. Moreover, the computational time of the proposed method using SIMD instructions of a microprocessor is also presented.
Koji TASHIRO Kenji HOSHINO Atsushi NAGATE
High-altitude platform stations (HAPSs) are recognized as a promising technology for coverage extension in the sixth generation (6G) mobile communications and beyond. The purpose of this study is to develop a HAPS system with a coverage radius of 100km and high capacity by focusing on the following two aspects: array antenna structure and user selection. HAPS systems must jointly use massive multiple-input multiple-output (mMIMO) and multiuser MIMO techniques to increase their capacity. However, the coverage achieved by a conventional planar array antenna is limited to a circular area with a radius of only tens of kilometers. A conventional semi-orthogonal user selection (SUS) scheme based on the orthogonality of channel vectors achieves high capacity, but it has high complexity. First, this paper proposes a cylindrical mMIMO system to achieve an ultra-wide coverage radius of 100km and high capacity. Second, this paper presents a novel angle-based user selection (AUS) scheme, where a user selection problem is formulated as a maximization of the minimum angular difference between users over all user groups. Finally, a low-complexity suboptimal algorithm (SA) for AUS is also proposed. Assuming an area with a 100km radius, simulation results demonstrate that the proposed cylindrical mMIMO system improves the signal-to-interference-plus-noise ratio by approx. 12dB at the boundary of the area, and it achieves approx. 1.5 times higher capacity than the conventional mMIMO which uses a planar array antenna. In addition, the results show that the proposed AUS scheme improves the lower percentiles in the system capacity distribution compared with SUS and basic random user selection. Furthermore, the computational complexity of the proposed SA is in the order of only 1/4000 that of SUS.
In this paper, for improving the robustness of D2D-based SNS by avoiding the cascading failure, we propose an autonomous decentralized friendship management called virtual temporal friendship creation. In our proposed virtual temporal friendship creation, some virtual temporal friendships are created among users based on an optimization problem to improve the robustness although these friendships cannot be used to perform the message exchange in SNS. We investigate the impact of creating a new friendship on the node resilience for the optimization problem. Then we consider an autonomous decentralized algorithm based on the obtained results for the optimization problem of virtual temporal friendship creation. We evaluate the performance of the virtual temporal friendship creation with simulation and investigate the effectiveness of this method by comparing with the performance of a method with meta-heuristic algorithm. From numerical examples, we show that the virtual temporal friendship creation can improve the robustness quickly in an autonomous and decentralized way.
Zhaogang SHU Tarik TALEB Jaeseung SONG
Through the concept of network slicing, a single physical network infrastructure can be split into multiple logically-independent Network Slices (NS), each of which is customized for the needs of its respective individual user or industrial vertical. In the beyond 5G (B5G) system, this customization can be done for many targeted services, including, but not limited to, 5G use cases and beyond 5G. The network slices should be optimized and customized to stitch a suitable environment for targeted industrial services and verticals. This paper proposes a novel Quality of Service (QoS) framework that optimizes and customizes the network slices to ensure the service level agreement (SLA) in terms of end-to-end reliability, delay, and bandwidth communication. The proposed framework makes use of network softwarization technologies, including software-defined networking (SDN) and network function virtualization (NFV), to preserve the SLA and ensure elasticity in managing the NS. This paper also mathematically models the end-to-end network by considering three parts: radio access network (RAN), transport network (TN), and core network (CN). The network is modeled in an abstract manner based on these three parts. Finally, we develop a prototype system to implement these algorithms using the open network operating system (ONOS) as a SDN controller. Simulations are conducted using the Mininet simulator. The results show that our QoS framework and the proposed resource allocation algorithms can effectively schedule network resources for various NS types and provide reliable E2E QoS services to end-users.
Tomoyuki FURUICHI Mizuki MOTOYOSHI Suguru KAMEDA Takashi SHIBA Noriharu SUEMATSU
To reduce the complexity of direct radio frequency (RF) undersampling real-time spectrum monitoring in wireless Internet of Things (IoT) bands (920MHz, 2.4GHz, and 5 GHz bands), a design method of sampling frequencies is proposed in this paper. The Direct RF Undersampling receiver architecture enables the use of ADC with sampling clock lower frequency than receiving RF signal, but it needs RF signal identification signal processing from folded spectrums with multiple sampling clock frequencies. The proposed design method allows fewer sampling frequencies to be used than the conventional design method for continuous frequency range (D.C. to 5GHz-band). The proposed method reduced 2 sampling frequencies in wireless IoT bands case compared with the continuous range. The design result using the proposed method is verified by measurement.
Volume integral equations combined with orthogonality of guided mode and non-guided field are proposed for the TE incidence of two-dimensional optical slab waveguide. The slab waveguide is assumed to satisfy the single mode condition. The formulation of the integral equations are described in detail. The matrix equation obtained by applying the method of moments to the integral equations is shown. Numerical results for step, gap, and grating waveguides are given. They are compared to published papers to validate the proposed method.
Yaying SHEN Qun LI Ding XU Ziyi ZHANG Rui YANG
A triple loss based framework for generalized zero-shot learning is presented in this letter. The approach learns a shared latent space for image features and attributes by using aligned variational autoencoders and variants of triplet loss. Then we train a classifier in the latent space. The experimental results demonstrate that the proposed framework achieves great improvement.