-
SemantIC: Semantic Interference Cancellation Towards 6G Wireless Communications
Authors:
Wensheng Lin,
Yuna Yan,
Lixin Li,
Zhu Han,
Tad Matsumoto
Abstract:
This letter proposes a novel anti-interference technique, semantic interference cancellation (SemantIC), for enhancing information quality towards the sixth-generation (6G) wireless networks. SemantIC only requires the receiver to concatenate the channel decoder with a semantic auto-encoder. This constructs a turbo loop which iteratively and alternately eliminates noise in the signal domain and th…
▽ More
This letter proposes a novel anti-interference technique, semantic interference cancellation (SemantIC), for enhancing information quality towards the sixth-generation (6G) wireless networks. SemantIC only requires the receiver to concatenate the channel decoder with a semantic auto-encoder. This constructs a turbo loop which iteratively and alternately eliminates noise in the signal domain and the semantic domain. From the viewpoint of network information theory, the neural network of the semantic auto-encoder stores side information by training, and provides side information in iterative decoding, as an implementation of the Wyner-Ziv theorem. Simulation results verify the performance improvement by SemantIC without extra channel resource cost.
△ Less
Submitted 14 June, 2024; v1 submitted 19 October, 2023;
originally announced October 2023.
-
Semantic-Forward Relaying: A Novel Framework Towards 6G Cooperative Communications
Authors:
Wensheng Lin,
Yuna Yan,
Lixin Li,
Zhu Han,
Tad Matsumoto
Abstract:
This letter proposes a novel relaying framework, semantic-forward (SF), for cooperative communications towards the sixth-generation (6G) wireless networks. The SF relay extracts and transmits the semantic features, which reduces forwarding payload, and also improves the network robustness against intra-link errors. Based on the theoretical basis for cooperative communications with side information…
▽ More
This letter proposes a novel relaying framework, semantic-forward (SF), for cooperative communications towards the sixth-generation (6G) wireless networks. The SF relay extracts and transmits the semantic features, which reduces forwarding payload, and also improves the network robustness against intra-link errors. Based on the theoretical basis for cooperative communications with side information and the turbo principle, we design a joint source-channel coding algorithm to iteratively exchange the extrinsic information for enhancing the decoding gains at the destination. Surprisingly, simulation results indicate that even in bad channel conditions, SF relaying can still effectively improve the recovered information quality.
△ Less
Submitted 12 January, 2024; v1 submitted 11 October, 2023;
originally announced October 2023.
-
Analyzing the Closed-Loop Performance of Detect-And-Avoid Systems
Authors:
Ítalo Romani de Oliveira,
Thiago Matsumoto,
Aaron Mayne,
Antonio Gracia Berna
Abstract:
Detect-And-Avoid (DAA) algorithms for unmanned air vehicles have industry standards called Minimum Operational Performance Standards (MOPS), establishing criteria to check whether they can ensure safe separation for all plausible operational conditions. However, these MOPS ensure performance for the avoidance maneuvers, which are open-loop, but not for the maneuvers that bring the air vehicles bac…
▽ More
Detect-And-Avoid (DAA) algorithms for unmanned air vehicles have industry standards called Minimum Operational Performance Standards (MOPS), establishing criteria to check whether they can ensure safe separation for all plausible operational conditions. However, these MOPS ensure performance for the avoidance maneuvers, which are open-loop, but not for the maneuvers that bring the air vehicles back to their intended courses, closing the control loop of the missions. In this paper, we analyze the closed-loop performance of existing DAA algorithms, by experimenting large numbers of traffic configurations with 4 aircraft in a delimited airspace.
We measure and analyze their rates of loss of separation and timeout events, the latter happening when a chain of maneuvers exceeds the maximum supply of energy in a vehicle. We also analyze the efficiency of the closed-loop logic, expressed as the excess fuel rate, and study the relationship between safety and efficiency in these scenarios. Our results show that the inefficiency caused by DAA algorithms is very significant in dense airspaces and that it offers ample space for improvement.
Performing the simulations of the closed-loop mission management logic can be highly time consuming. Despite there being Neural Network approximations of DAA logic that alleviate the computational load, none of those that we found available can properly handle cases with more than one intruder in the ownship surveillance range. Therefore, in an attempt to overcome the high computational cost of analyzing the closed-loop performance of DAA algorithms, we study the correlation between inefficiency and safety of closed-loop scenarios, and some indicators from the corresponding open-loop scenarios, such as angle of deviation and number of deviations per flight time.
△ Less
Submitted 27 July, 2023;
originally announced July 2023.
-
Radar-Based Noncontact Measurement of Heartbeat of Humans and Chimpanzees Using Millimeter-Wave Radar with Topology Method
Authors:
Itsuki Iwata,
Takuya Sakamoto,
Takuya Matsumoto,
Satoshi Hirata
Abstract:
This study proposes a method to determine the filter parameters required for the topology method, which is a radar-based noncontact method for measurement of heart inter-beat intervals. The effectiveness of the proposed method is evaluated by performing radar measurements involving both human participants and chimpanzee subjects. The proposed method is designed to enable setting of the filter cuto…
▽ More
This study proposes a method to determine the filter parameters required for the topology method, which is a radar-based noncontact method for measurement of heart inter-beat intervals. The effectiveness of the proposed method is evaluated by performing radar measurements involving both human participants and chimpanzee subjects. The proposed method is designed to enable setting of the filter cutoff frequency to eliminate respiratory components while maintaining the higher harmonics of the heartbeat components. Measurements using a millimeter-wave radar system and a reference contact-type electrocardiogram sensor demonstrate that the smallest errors that occur when measuring heart inter-beat intervals using the proposed method can be as small as 4.43 and 2.55 ms for humans and chimpanzees, respectively. These results indicate the possibility of using noncontact physiological measurements to monitor both humans and chimpanzees.
△ Less
Submitted 19 July, 2023;
originally announced July 2023.
-
Nervus: A Comprehensive Deep Learning Classification, Regression, and Prognostication Tool for both Medical Image and Clinical Data Analysis
Authors:
Toshimasa Matsumoto,
Shannon L Walston,
Yukio Miki,
Daiju Ueda
Abstract:
The goal of our research is to create a comprehensive and flexible library that is easy to use for medical imaging research, and capable of handling grayscale images, multiple inputs (both images and tabular data), and multi-label tasks. We have named it Nervus. Based on the PyTorch library, which is suitable for AI for research purposes, we created a four-part model to handle comprehensive inputs…
▽ More
The goal of our research is to create a comprehensive and flexible library that is easy to use for medical imaging research, and capable of handling grayscale images, multiple inputs (both images and tabular data), and multi-label tasks. We have named it Nervus. Based on the PyTorch library, which is suitable for AI for research purposes, we created a four-part model to handle comprehensive inputs and outputs. Nervus consists of four parts. First is the dataloader, then the feature extractor, the feature mixer, and finally the classifier. The dataloader preprocesses the input data, the feature extractor extracts the features between the training data and ground truth labels, feature mixer mixes the features of the extractors, and the classifier classifies the input data from feature mixer based on the task. We have created Nervus, which is a comprehensive and flexible model library that is easy to use for medical imaging research which can handle grayscale images, multi-inputs and multi-label tasks. This will be helpful for researchers in the field of radiology.
△ Less
Submitted 12 December, 2022;
originally announced December 2022.
-
Decentralized Air Traffic Management for Advanced Air Mobility
Authors:
Ítalo Romani de Oliveira,
Euclides Carlos Pinto Neto,
Thiago Toshio Matsumoto,
Huafeng Yu
Abstract:
Leading proposals for Advanced Air Mobility (AAM) recognize the need for strategic and tactical airspace deconfliction, where the need for coordination appears in different forms and nuances. One recurring element is the use of pre-defined airways or corridors, a natural way to create order, with proven success from the conventional, manned, Air Traffic Management (ATM). But, while ATM is evolving…
▽ More
Leading proposals for Advanced Air Mobility (AAM) recognize the need for strategic and tactical airspace deconfliction, where the need for coordination appears in different forms and nuances. One recurring element is the use of pre-defined airways or corridors, a natural way to create order, with proven success from the conventional, manned, Air Traffic Management (ATM). But, while ATM is evolving to 4D Trajectory-Based Operations, when we apply the ATM principles to very dense and potentially more complex operations such as AAM, we have to consider their limitations in such demanding new environment. The requirement of following circulation corridors most often increase flight distance and inevitably create bottlenecks, hence we explore the hypothesis of not using corridors, testing such option via a simple and scalable simulation model. Other motivations for comparing different forms of traffic coordination are redundancy and diversity, which have potential to increase system safety. Relying on a single method to maintain traffic separation of course would not be allowed in practice. However, the concepts that we have seen so far leave a gap between two very distinct and co-existing methods: one, cooperative and centered on a ground-based Provider of Services for UAM (PSU), and another, which is mostly non-cooperative and independent, centered on the individual aircraft, commonly referred to as Detect-And-Avoid (DAA). This duality achieves a welcomed diversity, however presents several points for improvement.
In-between these opposite methods, this paper analyzes the performance of an airborne cooperative method to coordinate traffic which is capable of safely solving conflicts of multiple aircraft (more than two) and achieve higher efficiency than DAA alone, thus with potential for being an alternative or a live fallback for ground-based traffic coordination.
△ Less
Submitted 24 August, 2021;
originally announced August 2021.
-
Comparing the Performance of Traffic Coordination Methods for Advanced Aerial Mobility
Authors:
Ítalo Romani de Oliveira,
Euclides C. Pinto Neto,
Thiago Matsumoto,
Huafeng Yu,
Emiliano Bartolomé,
Guillermo Frontera,
Aaron Mayne
Abstract:
Traffic Management in Advanced Aerial Mobility (AAM) inherits many elements of conventional Air Traffic Management (ATM), but brings new complexities and challenges of its own. One of its ways of guaranteeing separation is the use of airborne, stand-alone Detect-And-Avoid, an operational concept where each aircraft decides its avoidance maneuvers independently, observing right-of-way rules and, in…
▽ More
Traffic Management in Advanced Aerial Mobility (AAM) inherits many elements of conventional Air Traffic Management (ATM), but brings new complexities and challenges of its own. One of its ways of guaranteeing separation is the use of airborne, stand-alone Detect-And-Avoid, an operational concept where each aircraft decides its avoidance maneuvers independently, observing right-of-way rules and, in specific implementations, some form of pairwise coordination. This is a fundamental safety element for autonomous aircraft but, according to our research, is not sufficient for high-density airspaces as envisioned for urban environments. In these environments, some way of explicit and strategic traffic coordination must be in place, as done for conventional ATM. For efficiency reasons, ATM is evolving to more flexible uses of the airspace, such that the use of dynamically allocated corridors is a rising concept for AAM. These strategic forms of traffic coordination are potentially highly efficient if the aircraft adhere to their trajectory contracts and there are no significant perturbations to the traffic. However, if significant perturbations occur, such as loss of data communication, or the sudden appearance of an intruder, a centralized system may not react appropriately in due time. In busy scenarios, even small deviations from plans may compound so rapidly as to result in large differences in the overall achieved scenario, resulting in congestions and convoluted conflicts. Therefore, it is worth studying traffic coordination techniques that work locally with shorter look-ahead times. To that end, we explore an airborne collaborative method for traffic coordination, which is capable of safely solving conflicts with multiple aircraft, stressing its capabilities throughout a large number of scenarios and comparing its performance with established methods.
△ Less
Submitted 26 August, 2021; v1 submitted 24 August, 2021;
originally announced August 2021.
-
Evaluation Framework for Performance Limitation of Autonomous Systems under Sensor Attack
Authors:
Koichi Shimizu,
Daisuke Suzuki,
Ryo Muramatsu,
Hisashi Mori,
Tomoyuki Nagatsuka,
Tsutomu Matsumoto
Abstract:
Autonomous systems such as self-driving cars rely on sensors to perceive the surrounding world. Measures must be taken against attacks on sensors, which have been a hot topic in the last few years. For that goal one must first evaluate how sensor attacks affect the system, i.e. which part or whole of the system will fail if some of the built-in sensors are compromised, or will keep safe, etc. Amon…
▽ More
Autonomous systems such as self-driving cars rely on sensors to perceive the surrounding world. Measures must be taken against attacks on sensors, which have been a hot topic in the last few years. For that goal one must first evaluate how sensor attacks affect the system, i.e. which part or whole of the system will fail if some of the built-in sensors are compromised, or will keep safe, etc. Among the relevant safety standards, ISO/PAS 21448 addresses the safety of road vehicles taking into account the performance limitations of sensors, but leaves security aspects out of scope. On the other hand, ISO/SAE 21434 addresses the security perspective during the development process of vehicular systems, but not specific threats such as sensor attacks. As a result the safety of autonomous systems under sensor attack is yet to be addressed. In this paper we propose a framework that combines safety analysis for scenario identification, and scenario-based simulation with sensor attack models embedded. Given an autonomous system model, we identify hazard scenarios caused by sensor attacks, and evaluate the performance limitations in the scenarios. We report on a prototype simulator for autonomous vehicles with radar, cameras and LiDAR along with attack models against the sensors. Our experiments show that our framework can evaluate how the system safety changes as parameters of the attacks and the sensors vary.
△ Less
Submitted 12 March, 2021;
originally announced March 2021.