首页 > 最新文献

IEICE Transactions on Communications最新文献

英文 中文
Service Deployment Model with Virtual Network Function Resizing Based on Per-Flow Priority 基于逐流优先级调整虚拟网络功能大小的业务部署模型
4区 计算机科学 Q3 Engineering Pub Date : 2023-09-01 DOI: 10.1587/transcom.2022ebp3145
Keigo AKAHOSHI, Eiji OKI
This paper investigates a service deployment model for network function virtualization which handles per-flow priority to minimize the deployment cost. Service providers need to implement network services each of which consists of one or more virtual network functions (VNFs) with satisfying requirements of service delays. In our previous work, we studied the service deployment model with per-host priority; flows belonging to the same service, for the same VNF, and handled on the same host have the same priority. We formulated the model as an optimization problem, and developed a heuristic algorithm named FlexSize to solve it in practical time. In this paper, we address per-flow priority, in which flows of the same service, VNF, and host have different priorities. In addition, we expand FlexSize to handle per-flow priority. We evaluate per-flow and per-host priorities, and the numerical results show that per-flow priority reduces deployment cost compared with per-host priority.
研究了一种针对网络功能虚拟化的服务部署模型,该模型通过处理每个流的优先级来最小化部署成本。服务提供商需要实现由一个或多个虚拟网络功能(VNFs)组成的网络服务,并满足服务延迟的要求。在我们之前的工作中,我们研究了每个主机优先级的服务部署模型;属于相同服务、用于相同VNF并在同一主机上处理的流具有相同的优先级。我们将该模型描述为一个优化问题,并开发了一种名为FlexSize的启发式算法来在实际时间内求解该问题。在本文中,我们讨论了每个流的优先级,其中相同服务、VNF和主机的流具有不同的优先级。此外,我们扩展了FlexSize来处理每个流的优先级。我们评估了每流优先级和每主机优先级,数值结果表明,与每主机优先级相比,每流优先级降低了部署成本。
{"title":"Service Deployment Model with Virtual Network Function Resizing Based on Per-Flow Priority","authors":"Keigo AKAHOSHI, Eiji OKI","doi":"10.1587/transcom.2022ebp3145","DOIUrl":"https://doi.org/10.1587/transcom.2022ebp3145","url":null,"abstract":"This paper investigates a service deployment model for network function virtualization which handles per-flow priority to minimize the deployment cost. Service providers need to implement network services each of which consists of one or more virtual network functions (VNFs) with satisfying requirements of service delays. In our previous work, we studied the service deployment model with per-host priority; flows belonging to the same service, for the same VNF, and handled on the same host have the same priority. We formulated the model as an optimization problem, and developed a heuristic algorithm named FlexSize to solve it in practical time. In this paper, we address per-flow priority, in which flows of the same service, VNF, and host have different priorities. In addition, we expand FlexSize to handle per-flow priority. We evaluate per-flow and per-host priorities, and the numerical results show that per-flow priority reduces deployment cost compared with per-host priority.","PeriodicalId":48825,"journal":{"name":"IEICE Transactions on Communications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135944513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Edge-Cloud Cooperation for Machine Learning Accuracy Considering Transmission Latency and Bandwidth Congestion 考虑传输延迟和带宽拥塞的机器学习精度边缘云合作优化
4区 计算机科学 Q3 Engineering Pub Date : 2023-09-01 DOI: 10.1587/transcom.2022ebp3171
KENGO TAJIRI, RYOICHI KAWAHARA, YOICHI MATSUO
Machine learning (ML) has been used for various tasks in network operations in recent years. However, since the scale of networks has grown and the amount of data generated has increased, it has been increasingly difficult for network operators to conduct their tasks with a single server using ML. Thus, ML with edge-cloud cooperation has been attracting attention for efficiently processing and analyzing a large amount of data. In the edge-cloud cooperation setting, although transmission latency, bandwidth congestion, and accuracy of tasks using ML depend on the load balance of processing data with edge servers and a cloud server in edge-cloud cooperation, the relationship is too complex to estimate. In this paper, we focus on monitoring anomalous traffic as an example of ML tasks for network operations and formulate transmission latency, bandwidth congestion, and the accuracy of the task with edge-cloud cooperation considering the ratio of the amount of data preprocessed in edge servers to that in a cloud server. Moreover, we formulate an optimization problem under constraints for transmission latency and bandwidth congestion to select the proper ratio by using our formulation. By solving our optimization problem, the optimal load balance between edge servers and a cloud server can be selected, and the accuracy of anomalous traffic monitoring can be estimated. Our formulation and optimization framework can be used for other ML tasks by considering the generating distribution of data and the type of an ML model. In accordance with our formulation, we simulated the optimal load balance of edge-cloud cooperation in a topology that mimicked a Japanese network and conducted an anomalous traffic detection experiment by using real traffic data to compare the estimated accuracy based on our formulation and the actual accuracy based on the experiment.
近年来,机器学习(ML)已被用于网络操作中的各种任务。然而,随着网络规模的扩大和产生的数据量的增加,网络运营商越来越难以使用机器学习在单个服务器上完成任务,因此,机器学习与边缘云合作以高效处理和分析大量数据而受到关注。在边缘云协作设置中,虽然使用ML的任务的传输延迟、带宽拥塞和准确性取决于边缘云协作中边缘服务器和云服务器处理数据的负载平衡,但这种关系过于复杂而难以估计。在本文中,我们以网络操作的ML任务为例,重点关注异常流量的监控,并考虑边缘服务器中预处理的数据量与云服务器中预处理的数据量的比例,制定边缘云合作任务的传输延迟、带宽拥塞和准确性。在此基础上,提出了在传输延迟和带宽拥塞约束下选择合适比例的优化问题。通过求解该优化问题,可以选择边缘服务器和云服务器之间的最优负载均衡,并估计异常流量监控的准确性。通过考虑数据的生成分布和ML模型的类型,我们的公式和优化框架可以用于其他ML任务。根据我们的公式,我们在模拟日本网络的拓扑结构中模拟了边缘云协作的最优负载均衡,并使用真实流量数据进行了异常流量检测实验,比较了基于我们公式的估计精度和基于实验的实际精度。
{"title":"Optimizing Edge-Cloud Cooperation for Machine Learning Accuracy Considering Transmission Latency and Bandwidth Congestion","authors":"KENGO TAJIRI, RYOICHI KAWAHARA, YOICHI MATSUO","doi":"10.1587/transcom.2022ebp3171","DOIUrl":"https://doi.org/10.1587/transcom.2022ebp3171","url":null,"abstract":"Machine learning (ML) has been used for various tasks in network operations in recent years. However, since the scale of networks has grown and the amount of data generated has increased, it has been increasingly difficult for network operators to conduct their tasks with a single server using ML. Thus, ML with edge-cloud cooperation has been attracting attention for efficiently processing and analyzing a large amount of data. In the edge-cloud cooperation setting, although transmission latency, bandwidth congestion, and accuracy of tasks using ML depend on the load balance of processing data with edge servers and a cloud server in edge-cloud cooperation, the relationship is too complex to estimate. In this paper, we focus on monitoring anomalous traffic as an example of ML tasks for network operations and formulate transmission latency, bandwidth congestion, and the accuracy of the task with edge-cloud cooperation considering the ratio of the amount of data preprocessed in edge servers to that in a cloud server. Moreover, we formulate an optimization problem under constraints for transmission latency and bandwidth congestion to select the proper ratio by using our formulation. By solving our optimization problem, the optimal load balance between edge servers and a cloud server can be selected, and the accuracy of anomalous traffic monitoring can be estimated. Our formulation and optimization framework can be used for other ML tasks by considering the generating distribution of data and the type of an ML model. In accordance with our formulation, we simulated the optimal load balance of edge-cloud cooperation in a topology that mimicked a Japanese network and conducted an anomalous traffic detection experiment by using real traffic data to compare the estimated accuracy based on our formulation and the actual accuracy based on the experiment.","PeriodicalId":48825,"journal":{"name":"IEICE Transactions on Communications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135944514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection Model of Internet of Things Based on LightGBM 基于LightGBM的物联网入侵检测模型
4区 计算机科学 Q3 Engineering Pub Date : 2023-08-01 DOI: 10.1587/transcom.2022ebp3169
Guosheng Zhao, Yang Wang, Jian Wang
Internet of Things (IoT) devices are widely used in various fields. However, their limited computing resources make them extremely vulnerable and difficult to be effectively protected. Traditional intrusion detection systems (IDS) focus on high accuracy and low false alarm rate (FAR), making them often have too high spatiotemporal complexity to be deployed in IoT devices. In response to the above problems, this paper proposes an intrusion detection model of IoT based on the light gradient boosting machine (LightGBM). Firstly, the one-dimensional convolutional neural network (CNN) is used to extract features from network traffic to reduce the feature dimensions. Then, the LightGBM is used for classification to detect the type of network traffic belongs. The LightGBM is more lightweight on the basis of inheriting the advantages of the gradient boosting tree. The LightGBM has a faster decision tree construction process. Experiments on the TON-IoT and BoT-IoT datasets show that the proposed model has stronger performance and more lightweight than the comparison models. The proposed model can shorten the prediction time by 90.66% and is better than the comparison models in accuracy and other performance metrics. The proposed model has strong detection capability for denial of service (DoS) and distributed denial of service (DDoS) attacks. Experimental results on the testbed built with IoT devices such as Raspberry Pi show that the proposed model can perform effective and real-time intrusion detection on IoT devices.
物联网(IoT)设备广泛应用于各个领域。然而,它们有限的计算资源使它们极易受到攻击,难以得到有效保护。传统的入侵检测系统(IDS)侧重于高精度和低虚警率(FAR),这使得它们往往具有过高的时空复杂性,无法部署在物联网设备中。针对上述问题,本文提出了一种基于光梯度增强机(LightGBM)的物联网入侵检测模型。首先,利用一维卷积神经网络(CNN)从网络流量中提取特征,降低特征维数;然后使用LightGBM进行分类,检测网络流量所属的类型。LightGBM在继承梯度增强树优点的基础上实现了更轻量化。LightGBM具有更快的决策树构建过程。在TON-IoT和BoT-IoT数据集上的实验表明,该模型比对比模型具有更强的性能和更轻量化。该模型可将预测时间缩短90.66%,在准确率和其他性能指标上优于比较模型。该模型对拒绝服务(DoS)和分布式拒绝服务(DDoS)攻击具有较强的检测能力。基于树莓派等物联网设备搭建的测试平台上的实验结果表明,该模型可以对物联网设备进行有效的实时入侵检测。
{"title":"Intrusion Detection Model of Internet of Things Based on LightGBM","authors":"Guosheng Zhao, Yang Wang, Jian Wang","doi":"10.1587/transcom.2022ebp3169","DOIUrl":"https://doi.org/10.1587/transcom.2022ebp3169","url":null,"abstract":"Internet of Things (IoT) devices are widely used in various fields. However, their limited computing resources make them extremely vulnerable and difficult to be effectively protected. Traditional intrusion detection systems (IDS) focus on high accuracy and low false alarm rate (FAR), making them often have too high spatiotemporal complexity to be deployed in IoT devices. In response to the above problems, this paper proposes an intrusion detection model of IoT based on the light gradient boosting machine (LightGBM). Firstly, the one-dimensional convolutional neural network (CNN) is used to extract features from network traffic to reduce the feature dimensions. Then, the LightGBM is used for classification to detect the type of network traffic belongs. The LightGBM is more lightweight on the basis of inheriting the advantages of the gradient boosting tree. The LightGBM has a faster decision tree construction process. Experiments on the TON-IoT and BoT-IoT datasets show that the proposed model has stronger performance and more lightweight than the comparison models. The proposed model can shorten the prediction time by 90.66% and is better than the comparison models in accuracy and other performance metrics. The proposed model has strong detection capability for denial of service (DoS) and distributed denial of service (DDoS) attacks. Experimental results on the testbed built with IoT devices such as Raspberry Pi show that the proposed model can perform effective and real-time intrusion detection on IoT devices.","PeriodicalId":48825,"journal":{"name":"IEICE Transactions on Communications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134984313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Reinforcement Learning-Based Coordinated Robust Spatial Reuse in Broadcast-Overlaid WLANs 广播覆盖无线局域网中基于对抗强化学习的协调鲁棒空间复用
IF 0.7 4区 计算机科学 Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1587/transcom.2022ebp3026
Yuto Kihira, Yusuke Koda, Koji Yamamoto, T. Nishio
{"title":"Adversarial Reinforcement Learning-Based Coordinated Robust Spatial Reuse in Broadcast-Overlaid WLANs","authors":"Yuto Kihira, Yusuke Koda, Koji Yamamoto, T. Nishio","doi":"10.1587/transcom.2022ebp3026","DOIUrl":"https://doi.org/10.1587/transcom.2022ebp3026","url":null,"abstract":"","PeriodicalId":48825,"journal":{"name":"IEICE Transactions on Communications","volume":"50 1","pages":"203-212"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73442954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Small-Scale Demonstration of Remote Control of Patrol and Work Robot with Arms Employing Local 5G System 基于本地5G系统的带臂巡逻工作机器人远程控制的小规模演示
IF 0.7 4区 计算机科学 Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1587/transcom.2022cep0004
Issei Makino, Junji Terai, N. Miki
{"title":"Small-Scale Demonstration of Remote Control of Patrol and Work Robot with Arms Employing Local 5G System","authors":"Issei Makino, Junji Terai, N. Miki","doi":"10.1587/transcom.2022cep0004","DOIUrl":"https://doi.org/10.1587/transcom.2022cep0004","url":null,"abstract":"","PeriodicalId":48825,"journal":{"name":"IEICE Transactions on Communications","volume":"11 1","pages":"101-108"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72817581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HARQ Using Hierarchical Tree-Structured Random Access Identifiers in NOMA-Based Random Access 基于随机存取的分层树结构随机存取标识符HARQ
IF 0.7 4区 计算机科学 Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1587/transcom.2023ebp3001
Megumi A Asada, Nobuhide Nonaka, K. Higuchi
SUMMARY We propose an e ffi cient hybrid automatic repeat request (HARQ) method that simultaneously achieves packet combining and resolution of the collisions of random access identifiers (RAIDs) during re-transmission in a non-orthogonal multiple access (NOMA)-based random access system. Here, the RAID functions as a separator for simultaneously received packets that use the same channel in NOMA. An example of this is a scrambling code used in 4G and 5G systems. Since users independently select a RAID from the candidate set prepared by the system, the decoding of received packets fails when multiple users select the same RAID. Random RAID reselection by each user when attempting retrans-mission can resolve a RAID collision; however, packet combining between the previous and retransmitted packets is not possible in this case because the base station receiver does not know the relationship between the RAID of the previously transmitted packet and that of the retransmitted packet. To address this problem, we propose a HARQ method that employs novel hierarchical tree-structured RAID groups in which the RAID for the previous packet transmission has a one-to-one relationship with the set of RAIDs for retransmission. The proposed method resolves RAID collisions at retrans-mission by randomly reselecting for each user a RAID from the dedicated RAID set from the previous transmission. Since the relationship between the RAIDs at the previous transmission and retransmission is known at the base station, packet combining is achieved simultaneously. Computer simulation results show the e ff ectiveness of the proposed method.
在基于非正交多址(NOMA)的随机接入系统中,提出了一种高效的混合自动重复请求(HARQ)方法,在重传过程中同时实现分组合并和随机接入标识符(raid)冲突的解决。在这里,RAID作为同时接收使用NOMA中相同通道的数据包的分隔符。4G和5G系统中使用的加扰码就是一个例子。由于用户独立地从系统准备的候选集中选择RAID,因此当多个用户选择相同的RAID时,接收到的数据包解码失败。每个用户在尝试重传时随机重新选择RAID,可以解决RAID冲突;但是,在这种情况下,不可能在先前传输的数据包和重传的数据包之间进行分组合并,因为基站接收器不知道先前传输的数据包和重传数据包的RAID之间的关系。为了解决这个问题,我们提出了一种HARQ方法,该方法采用新颖的分层树结构RAID组,其中用于前一个数据包传输的RAID组与用于重传的RAID组具有一对一的关系。该方法通过从上一次传输的专用RAID集中随机为每个用户重新选择一个RAID来解决重传时的RAID冲突。由于基站知道前一次传输和重传时raid之间的关系,因此可以同时实现分组合并。计算机仿真结果表明了该方法的有效性。
{"title":"HARQ Using Hierarchical Tree-Structured Random Access Identifiers in NOMA-Based Random Access","authors":"Megumi A Asada, Nobuhide Nonaka, K. Higuchi","doi":"10.1587/transcom.2023ebp3001","DOIUrl":"https://doi.org/10.1587/transcom.2023ebp3001","url":null,"abstract":"SUMMARY We propose an e ffi cient hybrid automatic repeat request (HARQ) method that simultaneously achieves packet combining and resolution of the collisions of random access identifiers (RAIDs) during re-transmission in a non-orthogonal multiple access (NOMA)-based random access system. Here, the RAID functions as a separator for simultaneously received packets that use the same channel in NOMA. An example of this is a scrambling code used in 4G and 5G systems. Since users independently select a RAID from the candidate set prepared by the system, the decoding of received packets fails when multiple users select the same RAID. Random RAID reselection by each user when attempting retrans-mission can resolve a RAID collision; however, packet combining between the previous and retransmitted packets is not possible in this case because the base station receiver does not know the relationship between the RAID of the previously transmitted packet and that of the retransmitted packet. To address this problem, we propose a HARQ method that employs novel hierarchical tree-structured RAID groups in which the RAID for the previous packet transmission has a one-to-one relationship with the set of RAIDs for retransmission. The proposed method resolves RAID collisions at retrans-mission by randomly reselecting for each user a RAID from the dedicated RAID set from the previous transmission. Since the relationship between the RAIDs at the previous transmission and retransmission is known at the base station, packet combining is achieved simultaneously. Computer simulation results show the e ff ectiveness of the proposed method.","PeriodicalId":48825,"journal":{"name":"IEICE Transactions on Communications","volume":"47 1","pages":"696-704"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76182195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Critical Location of Communications Network with Power Grid Power Supply 电网供电通信网络的关键位置
IF 0.7 4区 计算机科学 Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1587/transcom.2022ebp3022
H. Saito
SUMMARY When a disaster hits a network, network service disruptions can occur even if the network facilities have survived and battery and power generators are provided. This is because in the event of a disaster, the power supply will not be restarted within the lifetime of the battery or oil transportation will not be restarted before running out of oil and power will be running out. Therefore, taking a power grid into account is important. This paper proposes a polynomial-time algorithm to identify the critical location C ∗ D of a communications network N c when a disaster hits. Electrical power grid N p supplies power to the nodes of N c , and a link in N c is disconnected when a node or a link in N c or N p fails. Here, the disaster area is modeled as co-centric disks and the failure probability is higher in the inner disk than the outer one. The location of the center of the disaster with the greatest expected number of disconnected links in N c is taken as the critical location C ∗ D . key words: disaster, critical location, network failure, cascading failure, power grid
当网络发生灾难时,即使网络设施幸存下来,并且提供了电池和发电机,也可能导致网络业务中断。这是因为在发生灾难的情况下,在电池的使用寿命内不会重新启动电源,或者在油耗尽之前不会重新启动输油,电力将耗尽。因此,考虑电网是很重要的。本文提出一种多项式时间算法来辨识通讯网路N C发生灾难时的临界位置C * D。电网np为nc的节点供电,当nc或np中的节点或链路故障时,nc中的链路将断开。这里将灾区建模为同心盘,内盘的故障概率高于外盘。灾情中心在N c中具有最大预期断链数的位置作为临界位置c * D。关键词:灾害,关键位置,网络故障,级联故障,电网
{"title":"Critical Location of Communications Network with Power Grid Power Supply","authors":"H. Saito","doi":"10.1587/transcom.2022ebp3022","DOIUrl":"https://doi.org/10.1587/transcom.2022ebp3022","url":null,"abstract":"SUMMARY When a disaster hits a network, network service disruptions can occur even if the network facilities have survived and battery and power generators are provided. This is because in the event of a disaster, the power supply will not be restarted within the lifetime of the battery or oil transportation will not be restarted before running out of oil and power will be running out. Therefore, taking a power grid into account is important. This paper proposes a polynomial-time algorithm to identify the critical location C ∗ D of a communications network N c when a disaster hits. Electrical power grid N p supplies power to the nodes of N c , and a link in N c is disconnected when a node or a link in N c or N p fails. Here, the disaster area is modeled as co-centric disks and the failure probability is higher in the inner disk than the outer one. The location of the center of the disaster with the greatest expected number of disconnected links in N c is taken as the critical location C ∗ D . key words: disaster, critical location, network failure, cascading failure, power grid","PeriodicalId":48825,"journal":{"name":"IEICE Transactions on Communications","volume":"104 1","pages":"166-173"},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87772975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance of Collaborative MIMO Reception with User Grouping Schemes 基于用户分组方案的协同MIMO接收性能研究
4区 计算机科学 Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1587/transcom.2023ebp3075
Eiku ANDO, Yukitoshi SANADA
This paper proposes user equipment (UE) grouping schemes and evaluates the performance of a scheduling scheme for each formed group in collaborative multiple-input multiple-output (MIMO) reception. In previous research, the criterion for UE grouping and the effects of group scheduling has never been presented. In the UE grouping scheme, two criteria, the base station (BS)-oriented one and the UE-oriented one, are presented. The BS-oriented full search scheme achieves ideal performance though it requires knowledge of the relative positions of all UEs. Therefore, the UE-oriented local search scheme is also proposed. As the scheduling scheme, proportional fairness scheduling is used in resource allocation for each formed group. When the number of total UEs increases, the difference in the number of UEs among groups enlarges. Numerical results obtained through computer simulation show that the throughput per user increases and the fairness among users decreases when the number of UEs in a cell increases in the proposed schemes compared to those of the conventional scheme.
提出了用户设备(UE)分组方案,并对协同多输入多输出(MIMO)接收中各组成组调度方案的性能进行了评价。在以往的研究中,UE分组的准则和分组调度的效果从未被提出。在终端分组方案中,提出了面向基站和面向终端的两个标准。面向bs的全搜索方案虽然需要知道所有ue的相对位置,但性能很理想。因此,本文还提出了面向ue的局部搜索方案。调度方案采用比例公平调度,对每个组成的组进行资源分配。当总ue数增加时,组间ue数差异增大。通过计算机仿真得到的数值结果表明,与传统方案相比,当小区内ue数量增加时,所提出的方案的每用户吞吐量增加,用户间公平性降低。
{"title":"Performance of Collaborative MIMO Reception with User Grouping Schemes","authors":"Eiku ANDO, Yukitoshi SANADA","doi":"10.1587/transcom.2023ebp3075","DOIUrl":"https://doi.org/10.1587/transcom.2023ebp3075","url":null,"abstract":"This paper proposes user equipment (UE) grouping schemes and evaluates the performance of a scheduling scheme for each formed group in collaborative multiple-input multiple-output (MIMO) reception. In previous research, the criterion for UE grouping and the effects of group scheduling has never been presented. In the UE grouping scheme, two criteria, the base station (BS)-oriented one and the UE-oriented one, are presented. The BS-oriented full search scheme achieves ideal performance though it requires knowledge of the relative positions of all UEs. Therefore, the UE-oriented local search scheme is also proposed. As the scheduling scheme, proportional fairness scheduling is used in resource allocation for each formed group. When the number of total UEs increases, the difference in the number of UEs among groups enlarges. Numerical results obtained through computer simulation show that the throughput per user increases and the fairness among users decreases when the number of UEs in a cell increases in the proposed schemes compared to those of the conventional scheme.","PeriodicalId":48825,"journal":{"name":"IEICE Transactions on Communications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135104539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An ESL-Cancelling Circuit for a Shunt-Connected Film Capacitor Filter Using Vertically Stacked Coupled Square Loops 采用垂直堆叠耦合方形环路的并联膜电容滤波器的esl消除电路
4区 计算机科学 Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1587/transcom.2023cep0002
Satoshi YONEDA, Akihito KOBAYASHI, Eiji TANIGUCHI
An ESL-cancelling circuit for a shunt-connected film capacitor filter using vertically stacked coupled square loops is reported in this paper. The circuit is applicable for a shunt-connected capacitor filter whose equivalent series inductance (ESL) of the shunt-path causes deterioration of filter performance at frequencies above the self-resonant frequency. Two pairs of vertically stacked magnetically coupled square loops are used in the circuit those can equivalently add negative inductance in series to the shunt-path to cancel ESL for improvement of the filter performance. The ESL-cancelling circuit for a 1-μF film capacitor was designed according to the Biot-Savart law and electromagnetic (EM)-analysis, and the prototype was fabricated with an FR4 substrate. The measured result showed 20-dB improvement of the filter performance above the self-resonant frequency as designed, satisfying Sdd21 less than -40 dB at 1 MHz to 100 MHz. This result is almost equivalent to reduce ESL of the shunt-path to less than 1 nH at 100 MHz and is also difficult to realize using any kind of a single bulky film capacitor without cancelling ESL.
本文报道了一种采用垂直堆叠耦合方形环路的分流式薄膜电容滤波器的esl消除电路。该电路适用于并联电容滤波器,其并联路径的等效串联电感(ESL)在高于自谐振频率的频率上导致滤波器性能恶化。该电路采用两对垂直堆叠的磁耦合方环,等效地在并联路径上串联增加负电感,以抵消ESL,提高滤波器性能。根据Biot-Savart定律和电磁分析,设计了1 μ f薄膜电容器的esl消除电路,并在FR4衬底上制作了原型电路。测量结果表明,在自谐振频率以上,滤波器的性能比设计的提高了20 dB,在1 ~ 100 MHz范围内满足Sdd21小于-40 dB。这一结果几乎相当于在100 MHz时将并联路径的ESL降低到小于1 nH,并且在不取消ESL的情况下使用任何一种单一笨重的薄膜电容器也很难实现。
{"title":"An ESL-Cancelling Circuit for a Shunt-Connected Film Capacitor Filter Using Vertically Stacked Coupled Square Loops","authors":"Satoshi YONEDA, Akihito KOBAYASHI, Eiji TANIGUCHI","doi":"10.1587/transcom.2023cep0002","DOIUrl":"https://doi.org/10.1587/transcom.2023cep0002","url":null,"abstract":"An ESL-cancelling circuit for a shunt-connected film capacitor filter using vertically stacked coupled square loops is reported in this paper. The circuit is applicable for a shunt-connected capacitor filter whose equivalent series inductance (ESL) of the shunt-path causes deterioration of filter performance at frequencies above the self-resonant frequency. Two pairs of vertically stacked magnetically coupled square loops are used in the circuit those can equivalently add negative inductance in series to the shunt-path to cancel ESL for improvement of the filter performance. The ESL-cancelling circuit for a 1-μF film capacitor was designed according to the Biot-Savart law and electromagnetic (EM)-analysis, and the prototype was fabricated with an FR4 substrate. The measured result showed 20-dB improvement of the filter performance above the self-resonant frequency as designed, satisfying Sdd21 less than -40 dB at 1 MHz to 100 MHz. This result is almost equivalent to reduce ESL of the shunt-path to less than 1 nH at 100 MHz and is also difficult to realize using any kind of a single bulky film capacitor without cancelling ESL.","PeriodicalId":48825,"journal":{"name":"IEICE Transactions on Communications","volume":"319 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135357285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demodulation framework based on machine learning for unrepeated transmission systems 基于机器学习的非重复传输系统解调框架
4区 计算机科学 Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1587/transcom.2023pnp0003
Ryuta SHIRAKI, Yojiro MORI, Hiroshi HASEGAWA
We propose a demodulation framework to extend the maximum distance of unrepeated transmission systems, where the simplest back propagation (BP), polarization and phase recovery, data arrangement for machine learning (ML), and symbol decision based on ML are rationally combined. The deterministic waveform distortion caused by fiber nonlinearity and chromatic dispersion is partially eliminated by BP whose calculation cost is minimized by adopting the single-step Fourier method in a pre-processing step. The non-deterministic waveform distortion, i.e., polarization and phase fluctuations, can be eliminated in a precise manner. Finally, the optimized ML model conducts the symbol decision under the influence of residual deterministic waveform distortion that cannot be cancelled by the simplest BP. Extensive numerical simulations confirm that a DP-16QAM signal can be transmitted over 240 km of a standard single-mode fiber without optical repeaters. The maximum transmission distance is extended by 25 km.
我们提出了一种解调框架来扩展非重复传输系统的最大距离,其中最简单的反向传播(BP),极化和相位恢复,机器学习(ML)的数据安排以及基于ML的符号决策被合理地结合起来。在预处理步骤中采用单步傅立叶方法,使BP算法的计算成本最小,从而部分消除了光纤非线性和色散引起的确定性波形畸变。可以精确地消除非确定性波形畸变,即极化和相位波动。最后,优化后的ML模型在残差确定性波形失真的影响下进行符号决策,而最简单的BP无法消除残差确定性波形失真。大量的数值模拟证实,DP-16QAM信号可以在没有光中继器的情况下在240公里的标准单模光纤中传输。最大传输距离延长25公里。
{"title":"Demodulation framework based on machine learning for unrepeated transmission systems","authors":"Ryuta SHIRAKI, Yojiro MORI, Hiroshi HASEGAWA","doi":"10.1587/transcom.2023pnp0003","DOIUrl":"https://doi.org/10.1587/transcom.2023pnp0003","url":null,"abstract":"We propose a demodulation framework to extend the maximum distance of unrepeated transmission systems, where the simplest back propagation (BP), polarization and phase recovery, data arrangement for machine learning (ML), and symbol decision based on ML are rationally combined. The deterministic waveform distortion caused by fiber nonlinearity and chromatic dispersion is partially eliminated by BP whose calculation cost is minimized by adopting the single-step Fourier method in a pre-processing step. The non-deterministic waveform distortion, i.e., polarization and phase fluctuations, can be eliminated in a precise manner. Finally, the optimized ML model conducts the symbol decision under the influence of residual deterministic waveform distortion that cannot be cancelled by the simplest BP. Extensive numerical simulations confirm that a DP-16QAM signal can be transmitted over 240 km of a standard single-mode fiber without optical repeaters. The maximum transmission distance is extended by 25 km.","PeriodicalId":48825,"journal":{"name":"IEICE Transactions on Communications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135402680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEICE Transactions on Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1