首页 > 最新文献

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences最新文献

英文 中文
Observation of Human-operated Accesses using Remote Management Device Honeypot 远程管理设备蜜罐对人工操作访问的观察
4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023cip0018
Takayuki SASAKI, Mami KAWAGUCHI, Takuhiro KUMAGAI, Katsunari YOSHIOKA, Tsutomu MATSUMOTO
In recent years, cyber attacks against infrastructure have become more serious. Unfortunately, infrastructures with vulnerable remote management devices, which allow attackers to control the infrastructure, have been reported. Targeted attacks against infrastructure are conducted manually by human attackers rather than automated scripts. Here, open questions are how often the attacks against such infrastructure happen and what attackers do after intrusions. In this empirical study, we observe the accesses, including attacks and security investigation activities, using the customized infrastructure honeypot. The proposed honeypot comprises (1) a platform that easily deploys real devices as honeypots, (2) a mechanism to increase the number of fictional facilities by changing the displayed facility names on the WebUI for each honeypot instance, (3) an interaction mechanism with visitors to infer their purpose, and (4) tracking mechanisms to identify visitors for long-term activities. We implemented and deployed the honeypot for 31 months. Our honeypot observed critical operations, such as changing configurations of a remote management device. We also observed long-term access to WebUI and Telnet service of the honeypot.
近年来,针对基础设施的网络攻击日益严重。不幸的是,据报道,基础设施具有易受攻击的远程管理设备,允许攻击者控制基础设施。针对基础设施的目标攻击是由人类攻击者手动执行的,而不是由自动化脚本执行的。在这里,有待解决的问题是针对此类基础设施的攻击发生的频率,以及攻击者在入侵后做了什么。在本实证研究中,我们使用定制的基础设施蜜罐来观察访问,包括攻击和安全调查活动。提议的蜜罐包括(1)一个可以轻松部署真实设备作为蜜罐的平台,(2)一个通过更改每个蜜罐实例在web上显示的设施名称来增加虚拟设施数量的机制,(3)一个与访问者的交互机制,以推断其目的,以及(4)跟踪机制,以识别长期活动的访问者。我们用了31个月的时间来实施和部署蜜罐。我们的蜜罐观察到关键操作,例如更改远程管理设备的配置。我们还观察到蜜罐的web和Telnet服务的长期访问。
{"title":"Observation of Human-operated Accesses using Remote Management Device Honeypot","authors":"Takayuki SASAKI, Mami KAWAGUCHI, Takuhiro KUMAGAI, Katsunari YOSHIOKA, Tsutomu MATSUMOTO","doi":"10.1587/transfun.2023cip0018","DOIUrl":"https://doi.org/10.1587/transfun.2023cip0018","url":null,"abstract":"In recent years, cyber attacks against infrastructure have become more serious. Unfortunately, infrastructures with vulnerable remote management devices, which allow attackers to control the infrastructure, have been reported. Targeted attacks against infrastructure are conducted manually by human attackers rather than automated scripts. Here, open questions are how often the attacks against such infrastructure happen and what attackers do after intrusions. In this empirical study, we observe the accesses, including attacks and security investigation activities, using the customized infrastructure honeypot. The proposed honeypot comprises (1) a platform that easily deploys real devices as honeypots, (2) a mechanism to increase the number of fictional facilities by changing the displayed facility names on the WebUI for each honeypot instance, (3) an interaction mechanism with visitors to infer their purpose, and (4) tracking mechanisms to identify visitors for long-term activities. We implemented and deployed the honeypot for 31 months. Our honeypot observed critical operations, such as changing configurations of a remote management device. We also observed long-term access to WebUI and Telnet service of the honeypot.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135501212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Malware Classifier considering PE Section Information 考虑PE截面信息的集成恶意软件分类器
4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023cip0024
Ren TAKEUCHI, Rikima MITSUHASHI, Masakatsu NISHIGAKI, Tetsushi OHKI
The war between cyber attackers and security analysts is gradually intensifying. Owing to the ease of obtaining and creating support tools, recent malware continues to diversify into variants and new species. This increases the burden on security analysts and hinders quick analysis. Identifying malware families is crucial for efficiently analyzing diversified malware; thus, numerous low-cost, general-purpose, deep-learning-based classification techniques have been proposed in recent years. Among these methods, malware images that represent binary features as images are often used. However, no models or architectures specific to malware classification have been proposed in previous studies. Herein, we conduct a detailed analysis of the behavior and structure of malware and focus on PE sections that capture the unique characteristics of malware. First, we validate the features of each PE section that can distinguish malware families. Then, we identify PE sections that contain adequate features to classify families. Further, we propose an ensemble learning-based classification method that combines features of highly discriminative PE sections to improve classification accuracy. The validation of two datasets confirms that the proposed method improves accuracy over the baseline, thereby emphasizing its importance.
网络攻击者和安全分析师之间的战争正在逐渐加剧。由于易于获取和创建支持工具,最近的恶意软件继续向变体和新物种多样化。这增加了安全分析人员的负担,阻碍了快速分析。识别恶意软件家族是有效分析各种恶意软件的关键;因此,近年来提出了许多低成本、通用、基于深度学习的分类技术。在这些方法中,经常使用将二进制特征表示为图像的恶意软件映像。然而,在以往的研究中,并没有提出针对恶意软件分类的模型或架构。在这里,我们对恶意软件的行为和结构进行了详细的分析,并专注于捕获恶意软件独特特征的PE部分。首先,我们验证了每个PE部分可以区分恶意软件家族的特征。然后,我们确定PE部分包含足够的特征来分类家庭。此外,我们提出了一种基于集成学习的分类方法,该方法结合了高判别性PE截面的特征来提高分类精度。两个数据集的验证证实了所提出的方法比基线提高了精度,从而强调了它的重要性。
{"title":"Ensemble Malware Classifier considering PE Section Information","authors":"Ren TAKEUCHI, Rikima MITSUHASHI, Masakatsu NISHIGAKI, Tetsushi OHKI","doi":"10.1587/transfun.2023cip0024","DOIUrl":"https://doi.org/10.1587/transfun.2023cip0024","url":null,"abstract":"The war between cyber attackers and security analysts is gradually intensifying. Owing to the ease of obtaining and creating support tools, recent malware continues to diversify into variants and new species. This increases the burden on security analysts and hinders quick analysis. Identifying malware families is crucial for efficiently analyzing diversified malware; thus, numerous low-cost, general-purpose, deep-learning-based classification techniques have been proposed in recent years. Among these methods, malware images that represent binary features as images are often used. However, no models or architectures specific to malware classification have been proposed in previous studies. Herein, we conduct a detailed analysis of the behavior and structure of malware and focus on PE sections that capture the unique characteristics of malware. First, we validate the features of each PE section that can distinguish malware families. Then, we identify PE sections that contain adequate features to classify families. Further, we propose an ensemble learning-based classification method that combines features of highly discriminative PE sections to improve classification accuracy. The validation of two datasets confirms that the proposed method improves accuracy over the baseline, thereby emphasizing its importance.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135501215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Properties of <i>k</i>-bit Delay Decodable Codes &lt;i&gt;k&lt;/i&gt;-位延迟可解码码的性质
4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023tap0016
Kengo HASHIMOTO, Ken-ichi IWATA
The class of k-bit delay decodable codes, source codes allowing decoding delay of at most k bits for k ≥ 0, can attain a shorter average codeword length than Huffman codes. This paper discusses the general properties of the class of k-bit delay decodable codes with a finite number of code tables and proves two theorems which enable us to limit the scope of codes to be considered when discussing optimal k-bit delay decodable codes.
k位延迟可解码码,即在k≥0时允许最多k位解码延迟的源代码,可以获得比霍夫曼码更短的平均码字长度。本文讨论了具有有限码表的k位延迟可解码码的一般性质,并证明了两个定理,使我们在讨论最优k位延迟可解码码时能够限制所考虑的码的范围。
{"title":"Properties of &lt;i&gt;k&lt;/i&gt;-bit Delay Decodable Codes","authors":"Kengo HASHIMOTO, Ken-ichi IWATA","doi":"10.1587/transfun.2023tap0016","DOIUrl":"https://doi.org/10.1587/transfun.2023tap0016","url":null,"abstract":"The class of k-bit delay decodable codes, source codes allowing decoding delay of at most k bits for k ≥ 0, can attain a shorter average codeword length than Huffman codes. This paper discusses the general properties of the class of k-bit delay decodable codes with a finite number of code tables and proves two theorems which enable us to limit the scope of codes to be considered when discussing optimal k-bit delay decodable codes.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134966845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dataset Distillation Using Parameter Pruning 使用参数修剪的数据集蒸馏
4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023eal2053
Guang LI, Ren TOGO, Takahiro OGAWA, Miki HASEYAMA
In this study, we propose a novel dataset distillation method based on parameter pruning. The proposed method can synthesize more robust distilled datasets and improve distillation performance by pruning difficult-to-match parameters during the distillation process. Experimental results on two benchmark datasets show the superiority of the proposed method.
在这项研究中,我们提出了一种新的基于参数修剪的数据集蒸馏方法。该方法通过对蒸馏过程中难以匹配的参数进行修剪,可以合成更鲁棒的蒸馏数据集,提高蒸馏性能。在两个基准数据集上的实验结果表明了该方法的优越性。
{"title":"Dataset Distillation Using Parameter Pruning","authors":"Guang LI, Ren TOGO, Takahiro OGAWA, Miki HASEYAMA","doi":"10.1587/transfun.2023eal2053","DOIUrl":"https://doi.org/10.1587/transfun.2023eal2053","url":null,"abstract":"In this study, we propose a novel dataset distillation method based on parameter pruning. The proposed method can synthesize more robust distilled datasets and improve distillation performance by pruning difficult-to-match parameters during the distillation process. Experimental results on two benchmark datasets show the superiority of the proposed method.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134889656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Constructions of Cross Z-Complementary Pairs with new lengths 具有新长度的交叉z互补对的新结构
4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023eap1075
Longye WANG, Chunlin CHEN, Xiaoli ZENG, Houshan LIU, Lingguo KONG, Qingping YU, Qingsong WANG
Spatial modulation (SM) is a type of multiple-input multiple-output (MIMO) technology that provides several benefits over traditional MIMO systems. SM-MIMO is characterized by its unique transmission principle, which results in lower costs, enhanced spectrum utilization, and reduced inter-channel interference. To optimize channel estimation performance over frequency-selective channels in the spatial modulation system, cross Z-complementary pairs (CZCPs) have been proposed as training sequences. The zero correlation zone (ZCZ) properties of CZCPs for auto-correlation sums and cross-correlation sums enable them to achieve optimal channel estimation performance. In this paper, we systematically construct CZCPs based on binary Gary complementary pairs and binary Gary complementary pairs via Turyn's method. We employ a special matrix operation and concatenation method to obtain CZCPs with new lengths 2M + N and 2(M + L), where M and L are the lengths of binary GCP, and N is the length of binary GCP via Turyn's method. Further, we obtain the perfect CZCP with new length 4N and extend the lengths of CZCPs.
空间调制(SM)是一种多输入多输出(MIMO)技术,与传统的MIMO系统相比具有许多优点。SM-MIMO以其独特的传输原理为特点,降低了成本,提高了频谱利用率,减少了信道间干扰。为了优化空间调制系统在频率选择信道上的信道估计性能,提出了交叉z互补对(CZCPs)作为训练序列。对于自相关和互相关和,czcp的零相关区(ZCZ)特性使它们能够获得最佳的信道估计性能。本文利用Turyn方法系统地构造了基于二进制Gary互补对和二进制Gary互补对的czcp。我们采用特殊的矩阵运算和串接方法得到了新的长度为2M + N和2(M + L)的czcp,其中M和L为二进制GCP的长度,N为二进制GCP的长度。进一步,我们得到了新长度为4N的完美CZCP,并扩展了CZCP的长度。
{"title":"Novel Constructions of Cross Z-Complementary Pairs with new lengths","authors":"Longye WANG, Chunlin CHEN, Xiaoli ZENG, Houshan LIU, Lingguo KONG, Qingping YU, Qingsong WANG","doi":"10.1587/transfun.2023eap1075","DOIUrl":"https://doi.org/10.1587/transfun.2023eap1075","url":null,"abstract":"Spatial modulation (SM) is a type of multiple-input multiple-output (MIMO) technology that provides several benefits over traditional MIMO systems. SM-MIMO is characterized by its unique transmission principle, which results in lower costs, enhanced spectrum utilization, and reduced inter-channel interference. To optimize channel estimation performance over frequency-selective channels in the spatial modulation system, cross Z-complementary pairs (CZCPs) have been proposed as training sequences. The zero correlation zone (ZCZ) properties of CZCPs for auto-correlation sums and cross-correlation sums enable them to achieve optimal channel estimation performance. In this paper, we systematically construct CZCPs based on binary Gary complementary pairs and binary Gary complementary pairs via Turyn's method. We employ a special matrix operation and concatenation method to obtain CZCPs with new lengths 2M + N and 2(M + L), where M and L are the lengths of binary GCP, and N is the length of binary GCP via Turyn's method. Further, we obtain the perfect CZCP with new length 4N and extend the lengths of CZCPs.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136053322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of parasitic elements on L-type LC/CL matching circuits 寄生元件对l型LC/CL匹配电路的影响
4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023gcp0004
Satoshi Tanaka, Takeshi Yoshida, Minoru Fujishima
L-type LC/CL matching circuits are well known for their simple analytical solutions and have been applied to many radio-frequency (RF) circuits. When actually constructing a circuit, parasitic elements are added to inductors and capacitors. Therefore, each L and C element has a self-resonant frequency, which affects the characteristics of the matching circuit. In this paper, the parallel parasitic capacitance to the inductor and the series parasitic inductor to the capacitance are taken up as parasitic elements, and the details of the effects of the self-resonant frequency of each element on the S11, voltage standing wave ratio (VSWR) and S21 characteristics are reported. When a parasitic element is added, each characteristic basically tends to deteriorate as the self-resonant frequency decreases. However, as an interesting feature, we found that the combination of resonant frequencies determines the VSWR and passband characteristics, regardless of whether it is the inductor or the capacitor.
l型LC/CL匹配电路以其简单的解析解而闻名,并已应用于许多射频(RF)电路中。当实际构造电路时,寄生元件被添加到电感和电容器中。因此,每个L和C元件都有一个自谐振频率,影响匹配电路的特性。本文以电感并联寄生电容和电感串联寄生电容为寄生元件,详细报道了各元件的自谐振频率对S11、电压驻波比(VSWR)和S21特性的影响。当加入寄生元件时,随着自谐振频率的降低,各特性基本趋于恶化。然而,作为一个有趣的特征,我们发现谐振频率的组合决定了VSWR和通带特性,无论是电感还是电容。
{"title":"Effects of parasitic elements on L-type LC/CL matching circuits","authors":"Satoshi Tanaka, Takeshi Yoshida, Minoru Fujishima","doi":"10.1587/transfun.2023gcp0004","DOIUrl":"https://doi.org/10.1587/transfun.2023gcp0004","url":null,"abstract":"L-type LC/CL matching circuits are well known for their simple analytical solutions and have been applied to many radio-frequency (RF) circuits. When actually constructing a circuit, parasitic elements are added to inductors and capacitors. Therefore, each L and C element has a self-resonant frequency, which affects the characteristics of the matching circuit. In this paper, the parallel parasitic capacitance to the inductor and the series parasitic inductor to the capacitance are taken up as parasitic elements, and the details of the effects of the self-resonant frequency of each element on the S11, voltage standing wave ratio (VSWR) and S21 characteristics are reported. When a parasitic element is added, each characteristic basically tends to deteriorate as the self-resonant frequency decreases. However, as an interesting feature, we found that the combination of resonant frequencies determines the VSWR and passband characteristics, regardless of whether it is the inductor or the capacitor.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135447067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two classes of optimal ternary cyclic codes with minimum distance four 最小距离为4的两类最优三元循环码
4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023eal2055
Chao HE, Xiaoqiong RAN, Rong LUO
Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms. Let C(t,e) denote the cyclic code with two nonzero αt and αe, where α is a generator of 𝔽*3m. In this letter, we investigate the ternary cyclic codes with parameters [3m-1, 3m-1-2m, 4] based on some results proposed by Ding and Helleseth in 2013. Two new classes of optimal ternary cyclic codes C(t,e) are presented by choosing the proper t and e and determining the solutions of certain equations over 𝔽3m.
循环码是线性码的一个子类,由于具有高效的编码和解码算法,因此在消费电子、数据存储系统和通信系统中都有应用。设C(t,e)表示具有两个非零αt和αe的循环码,其中α是一个生成函数。本文基于Ding和Helleseth在2013年提出的一些结果,研究了参数为[3m- 1,3m -1-2m, 4]的三元循环码。通过选择合适的t和e,确定𝔽3m上若干方程的解,给出了两类新的最优三元循环码C(t,e)。
{"title":"Two classes of optimal ternary cyclic codes with minimum distance four","authors":"Chao HE, Xiaoqiong RAN, Rong LUO","doi":"10.1587/transfun.2023eal2055","DOIUrl":"https://doi.org/10.1587/transfun.2023eal2055","url":null,"abstract":"Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms. Let C(t,e) denote the cyclic code with two nonzero αt and αe, where α is a generator of 𝔽*3m. In this letter, we investigate the ternary cyclic codes with parameters [3m-1, 3m-1-2m, 4] based on some results proposed by Ding and Helleseth in 2013. Two new classes of optimal ternary cyclic codes C(t,e) are presented by choosing the proper t and e and determining the solutions of certain equations over 𝔽3m.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136367970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A BDD-Based Approach to Finite-Time Control of Boolean Networks 基于bdd的布尔网络有限时间控制方法
4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023map0006
Fuma MOTOYAMA, Koichi KOBAYASHI, Yuh YAMASHITA
Control of complex networks such as gene regulatory networks is one of the fundamental problems in control theory. A Boolean network (BN) is one of the mathematical models in complex networks, and represents the dynamic behavior by Boolean functions. In this paper, a solution method for the finite-time control problem of BNs is proposed using a BDD (binary decision diagram). In this problem, we find all combinations of the initial state and the control input sequence such that a certain control specification is satisfied. The use of BDDs enables us to solve this problem for BNs such that the conventional method cannot be applied. First, after the outline of BNs and BDDs is explained, the problem studied in this paper is given. Next, a solution method using BDDs is proposed. Finally, a numerical example on a 67-node BN is presented.
基因调控网络等复杂网络的控制是控制论的基本问题之一。布尔网络是复杂网络中的一种数学模型,它用布尔函数来表示网络的动态行为。本文提出了一种利用二元决策图(BDD)求解网络有限时间控制问题的方法。在这个问题中,我们找到了满足一定控制规范的初始状态和控制输入序列的所有组合。bdd的使用使我们能够为bn解决这一问题,从而使传统方法无法适用。首先,在概述了bdn和bdd的基础上,给出了本文研究的问题。其次,提出了一种基于bdd的求解方法。最后,给出了一个67节点BN的数值算例。
{"title":"A BDD-Based Approach to Finite-Time Control of Boolean Networks","authors":"Fuma MOTOYAMA, Koichi KOBAYASHI, Yuh YAMASHITA","doi":"10.1587/transfun.2023map0006","DOIUrl":"https://doi.org/10.1587/transfun.2023map0006","url":null,"abstract":"Control of complex networks such as gene regulatory networks is one of the fundamental problems in control theory. A Boolean network (BN) is one of the mathematical models in complex networks, and represents the dynamic behavior by Boolean functions. In this paper, a solution method for the finite-time control problem of BNs is proposed using a BDD (binary decision diagram). In this problem, we find all combinations of the initial state and the control input sequence such that a certain control specification is satisfied. The use of BDDs enables us to solve this problem for BNs such that the conventional method cannot be applied. First, after the outline of BNs and BDDs is explained, the problem studied in this paper is given. Next, a solution method using BDDs is proposed. Finally, a numerical example on a 67-node BN is presented.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135104550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach to Construct Huffman Sequences With Low PAPR 一种构造低PAPR霍夫曼序列的新方法
4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023eap1062
Wenjian WANG, Zhi GU, Avik RANJAN ADHIKARY, Rong LUO
The auto-correlation property of Huffman sequence makes it a good candidate for its application in radar and communication systems. However, high peak-to-average power ratio (PAPR) of Huffman sequence severely limits its application value. In this paper, we propose a novel algorithm to construct Huffman sequences with low PAPR. We have used the roots of the polynomials corresponding to Huffman sequences of length M + 1 to construct Huffman sequences of length 2M + 1, with low PAPR.
霍夫曼序列的自相关特性使其在雷达和通信系统中有很好的应用前景。然而,霍夫曼序列的高峰均功率比(PAPR)严重限制了其应用价值。本文提出了一种构造低PAPR霍夫曼序列的新算法。我们利用长度为M + 1的霍夫曼序列对应的多项式的根构造了长度为2M + 1的霍夫曼序列,具有低PAPR。
{"title":"A Novel Approach to Construct Huffman Sequences With Low PAPR","authors":"Wenjian WANG, Zhi GU, Avik RANJAN ADHIKARY, Rong LUO","doi":"10.1587/transfun.2023eap1062","DOIUrl":"https://doi.org/10.1587/transfun.2023eap1062","url":null,"abstract":"The auto-correlation property of Huffman sequence makes it a good candidate for its application in radar and communication systems. However, high peak-to-average power ratio (PAPR) of Huffman sequence severely limits its application value. In this paper, we propose a novel algorithm to construct Huffman sequences with low PAPR. We have used the roots of the polynomials corresponding to Huffman sequences of length M + 1 to construct Huffman sequences of length 2M + 1, with low PAPR.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135260759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extension of Counting LTL and Its Application to a Path Planning Problem for Heterogeneous Multi-Robot Systems 计数LTL的扩展及其在异构多机器人系统路径规划问题中的应用
4区 计算机科学 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1587/transfun.2023mai0001
Kotaro NAGAE, Toshimitsu USHIO
We address a path planning problem for heterogeneous multi-robot systems under specifications consisting of temporal constraints and routing tasks such as package delivery services. The robots are partitioned into several groups based on their dynamics and specifications. We introduce a concise description of such tasks, called a work, and extend counting LTL to represent such specifications. We convert the problem into an ILP problem. We show that the number of variables in the ILP problem is fewer than that of the existing method using cLTL+. By simulation, we show that the computation time of the proposed method is faster than that of the existing method.
我们解决了异构多机器人系统在时间约束和路由任务(如包裹递送服务)的规范下的路径规划问题。根据机器人的动力学和规格,将机器人分为几组。我们介绍了这些任务的简明描述,称为工作,并扩展计数LTL来表示这些规范。我们把这个问题转化为ILP问题。我们证明了在ILP问题中的变量数量比使用cLTL+的现有方法要少。仿真结果表明,该方法的计算速度比现有方法快。
{"title":"Extension of Counting LTL and Its Application to a Path Planning Problem for Heterogeneous Multi-Robot Systems","authors":"Kotaro NAGAE, Toshimitsu USHIO","doi":"10.1587/transfun.2023mai0001","DOIUrl":"https://doi.org/10.1587/transfun.2023mai0001","url":null,"abstract":"We address a path planning problem for heterogeneous multi-robot systems under specifications consisting of temporal constraints and routing tasks such as package delivery services. The robots are partitioned into several groups based on their dynamics and specifications. We introduce a concise description of such tasks, called a work, and extend counting LTL to represent such specifications. We convert the problem into an ILP problem. We show that the number of variables in the ILP problem is fewer than that of the existing method using cLTL+. By simulation, we show that the computation time of the proposed method is faster than that of the existing method.","PeriodicalId":55003,"journal":{"name":"Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135843896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1