-
NR-Surface: NextG-ready $μ$W-reconfigurable mmWave Metasurface
Authors:
Minseok Kim,
Namjo Ahn,
Song Min Kim
Abstract:
Metasurface has recently emerged as an economic solution to expand mmWave coverage. However, their pervasive deployment remains a challenge, mainly due to the difficulty in reaching the tight 260ns NR synchronization requirement and real-time wireless reconfiguration while maintaining multi-year battery life. This paper presents NR-Surface, the first real-time reconfigurable metasurface fully comp…
▽ More
Metasurface has recently emerged as an economic solution to expand mmWave coverage. However, their pervasive deployment remains a challenge, mainly due to the difficulty in reaching the tight 260ns NR synchronization requirement and real-time wireless reconfiguration while maintaining multi-year battery life. This paper presents NR-Surface, the first real-time reconfigurable metasurface fully compliant with the NR standard, operating at 242.7 $μ$W for a 2.1-year lifetime on an AA battery. NR-Surface incorporates (i) a new extremely low-power (14KHz sampling) reconfiguration interface, NarrowBand Packet Unit (NBPU), for synchronization and real-time reconfiguration, and (ii) a highly responsive and low-leakage metasurface designed for low-duty cycled operation, by carefully leveraging the structure and the periodicity of the NR beam management procedure in the NR standard. NR-Surface is prototyped and evaluated end-to-end with NR BS built on srsRAN to demonstrate diverse usage scenarios including multiple NR-Surface per BS, multiple UE per NR-Surface, and 3D beamforming. Around-the-corner UE evaluations showcase NR-Surface efficacy under different user mobility patterns (20.3dB gain) and dynamic blockage (22.2dB gain).
△ Less
Submitted 14 March, 2024;
originally announced March 2024.
-
NTIRE 2020 Challenge on Real-World Image Super-Resolution: Methods and Results
Authors:
Andreas Lugmayr,
Martin Danelljan,
Radu Timofte,
Namhyuk Ahn,
Dongwoon Bai,
Jie Cai,
Yun Cao,
Junyang Chen,
Kaihua Cheng,
SeYoung Chun,
Wei Deng,
Mostafa El-Khamy,
Chiu Man Ho,
Xiaozhong Ji,
Amin Kheradmand,
Gwantae Kim,
Hanseok Ko,
Kanghyu Lee,
Jungwon Lee,
Hao Li,
Ziluan Liu,
Zhi-Song Liu,
Shuai Liu,
Yunhua Lu,
Zibo Meng
, et al. (21 additional authors not shown)
Abstract:
This paper reviews the NTIRE 2020 challenge on real world super-resolution. It focuses on the participating methods and final results. The challenge addresses the real world setting, where paired true high and low-resolution images are unavailable. For training, only one set of source input images is therefore provided along with a set of unpaired high-quality target images. In Track 1: Image Proc…
▽ More
This paper reviews the NTIRE 2020 challenge on real world super-resolution. It focuses on the participating methods and final results. The challenge addresses the real world setting, where paired true high and low-resolution images are unavailable. For training, only one set of source input images is therefore provided along with a set of unpaired high-quality target images. In Track 1: Image Processing artifacts, the aim is to super-resolve images with synthetically generated image processing artifacts. This allows for quantitative benchmarking of the approaches \wrt a ground-truth image. In Track 2: Smartphone Images, real low-quality smart phone images have to be super-resolved. In both tracks, the ultimate goal is to achieve the best perceptual quality, evaluated using a human study. This is the second challenge on the subject, following AIM 2019, targeting to advance the state-of-the-art in super-resolution. To measure the performance we use the benchmark protocol from AIM 2019. In total 22 teams competed in the final testing phase, demonstrating new and innovative solutions to the problem.
△ Less
Submitted 5 May, 2020;
originally announced May 2020.
-
Rethinking Data Augmentation for Image Super-resolution: A Comprehensive Analysis and a New Strategy
Authors:
Jaejun Yoo,
Namhyuk Ahn,
Kyung-Ah Sohn
Abstract:
Data augmentation is an effective way to improve the performance of deep networks. Unfortunately, current methods are mostly developed for high-level vision tasks (e.g., classification) and few are studied for low-level vision tasks (e.g., image restoration). In this paper, we provide a comprehensive analysis of the existing augmentation methods applied to the super-resolution task. We find that t…
▽ More
Data augmentation is an effective way to improve the performance of deep networks. Unfortunately, current methods are mostly developed for high-level vision tasks (e.g., classification) and few are studied for low-level vision tasks (e.g., image restoration). In this paper, we provide a comprehensive analysis of the existing augmentation methods applied to the super-resolution task. We find that the methods discarding or manipulating the pixels or features too much hamper the image restoration, where the spatial relationship is very important. Based on our analyses, we propose CutBlur that cuts a low-resolution patch and pastes it to the corresponding high-resolution image region and vice versa. The key intuition of CutBlur is to enable a model to learn not only "how" but also "where" to super-resolve an image. By doing so, the model can understand "how much", instead of blindly learning to apply super-resolution to every given pixel. Our method consistently and significantly improves the performance across various scenarios, especially when the model size is big and the data is collected under real-world environments. We also show that our method improves other low-level vision tasks, such as denoising and compression artifact removal.
△ Less
Submitted 23 April, 2020; v1 submitted 1 April, 2020;
originally announced April 2020.
-
Schemes for Privacy Data Destruction in a NAND Flash Memory
Authors:
Na-Young Ahn,
Dong Hoon Lee
Abstract:
We propose schemes for efficiently destroying privacy data in a NAND flash memory. Generally, even if privcy data is discarded from NAND flash memories, there is a high probability that the data will remain in an invalid block. This is a management problem that arises from the specificity of a program operation and an erase operation of NAND flash memories. When updating pages or performing a garb…
▽ More
We propose schemes for efficiently destroying privacy data in a NAND flash memory. Generally, even if privcy data is discarded from NAND flash memories, there is a high probability that the data will remain in an invalid block. This is a management problem that arises from the specificity of a program operation and an erase operation of NAND flash memories. When updating pages or performing a garbage collection, there is a problem that valid data remains in at least one unmapped memory block. Is it possible to apply the obligation to delete privacy data from existing NAND flash memory? This paper is the answer to this question. We propose a partial overwriting scheme, a SLC programming scheme, and a deletion duty pulse application scheme for invalid pages to effectively solve privacy data destruction issues due to the remaining data. Such privacy data destruction schemes basically utilize at least one state in which data can be written to the programmed cells based on a multi-level cell program operation. Our privacy data destruction schemes have advantages in terms of block management as compared with conventional erase schemes, and are very economical in terms of time and cost. The proposed privacy data destruction schemes can be easily applied to many storage devices and data centers using NAND flash memories.
△ Less
Submitted 27 December, 2019;
originally announced January 2020.
-
Vehicle Communication using Hash Chain-based Secure Cluster
Authors:
Na-Young Ahn,
Dong Hoon Lee
Abstract:
We introduce a hash chain-based secure cluster. Here, secure cluster refers to a set of vehicles having vehicular secrecy capacity of more than a reference value. Since vehicle communication is performed in such a secure cluster, basically secure vehicle communication can be expected. Secure hash clusters can also be expected by sharing hash chains derived from vehicle identification numbers. We a…
▽ More
We introduce a hash chain-based secure cluster. Here, secure cluster refers to a set of vehicles having vehicular secrecy capacity of more than a reference value. Since vehicle communication is performed in such a secure cluster, basically secure vehicle communication can be expected. Secure hash clusters can also be expected by sharing hash chains derived from vehicle identification numbers. We are also convinced that our paper is essential for future autonomous vehicles by providing secure clustering services using MEC. In the near term, autonomous driving, our paper makes it possible to expect strong and practically safe vehicle communications.
△ Less
Submitted 27 December, 2019;
originally announced December 2019.
-
Physical Layer Security of Autonomous Driving: Secure Vehicle-to-Vehicle Communication in A Security Cluster
Authors:
Na-Young Ahn,
Dong Hoon Lee
Abstract:
We suggest secure Vehicle-to-Vehicle communications in a secure cluster. Here, the security cluster refers to a group of vehicles having a certain level or more of secrecy capacity. Usually, there are many difficulties in defining secrecy capacity, but we define vehicular secrecy capacity for the vehicle defined only by SNR values. Defined vehicular secrecy capacity is practical and efficient in a…
▽ More
We suggest secure Vehicle-to-Vehicle communications in a secure cluster. Here, the security cluster refers to a group of vehicles having a certain level or more of secrecy capacity. Usually, there are many difficulties in defining secrecy capacity, but we define vehicular secrecy capacity for the vehicle defined only by SNR values. Defined vehicular secrecy capacity is practical and efficient in achieving physical layer security in V2V. Typically, secrecy capacity may be changed by antenna related parameters, path related parameters, and noise related parameters. In addition to these conventional parameters, we address unique vehicle-related parameters, such as vehicle speed, safety distance, speed limit, response time, etc. in connection with autonomous driving. We confirm the relationship between vehicle-related secrecy parameters and secrecy capacity through modeling in highway and urban traffic situations. These vehicular secrecy parameters enable real-time control of vehicle secrecy capacity of V2V communications. We can use vehicular secrecy capacity to achieve secure vehicle communications from attackers such as quantum computers. Our research enables economic, effective and efficient physical layer security in autonomous driving.
△ Less
Submitted 13 December, 2019;
originally announced December 2019.