Ferdinand Peper’s research while affiliated with National Institute of Information and Communications Technology and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (168)


Energy-Efficient Pseudo-Ratchet for Brownian Computers through One-Dimensional Quantum Brownian Motion
  • Preprint

May 2025

·

1 Read

·

Ferdinand Peper

·

·

Tomio Petrosky

Brownian computers utilize thermal fluctuations as a resource for computation and hold promise for achieving ultra-low-energy computations. However, the lack of a statistical direction in Brownian motion necessitates the incorporation of ratchets that facilitate the speeding up and completion of computations in Brownian computers. To make the ratchet mechanism work effectively, an external field is required to overcome thermal fluctuations, which has the drawback of increasing energy consumption. As a remedy for this drawback, we introduce a new approach based on one-dimensional (1D) quantum Brownian motion, which exhibits intrinsic unidirectional transport even in the absence of external forces or asymmetric potential gradients, thereby functioning as an effective pseudo-ratchet. Specifically, we exploit that quantum resonance effects in 1D systems divide the momentum space of particles into subspaces. These subspaces have no momentum inversion symmetry, resulting in the natural emergence of unidirectional flow. We analyze this pseudo-ratchet mechanism without energy dissipation from an entropic perspective and show that it remains consistent with the second law of thermodynamics.



FIGURE 6. Flowchart of the basic CSMA/CA algorithm in IEEE 802.15.4. Default parameters that we use in our study are the minimum backoff exponent of minBE = 3, the maximum backoff exponent maxBE = 5, and the maximum number of backoffs maxBO = 5
FIGURE 7. State transitions in the Markov chain model based on [35] for the CSMA/CA analysis. We use this diagram for two steps in our computation: (1) determining the average number of the backoff steps from the beginning of a round to its end, and (2) computing the steady state success probability.
FIGURE 8. Success probability over the number of nodes Nn for message interarrival time τ = 4 s. Circular markers are from APCMA simulations, black square markers are from the CSMA/CA simulations, and all lines are from the corresponding analyses results.
FIGURE 9. One-sided confidence interval lengths of the simulated success probability averaged over the number of nodes Nn for message interarrival time τ = 4 s.
FIGURE 15. Analytical capacity of APCMA system at τ = 4 s in terms of channel utilization b A when the success probability is ps A = 0.95, shown as function of number of pulses Np and number of bits for codeword N b .
Performance Evaluation of Asynchronous Pulse Code Multiple Access in Massive IoT Networks
  • Article
  • Full-text available

January 2024

·

31 Reads

·

1 Citation

IEEE Access

The Internet of Things (IoT) has revolutionized the way we interact with everyday objects by connecting sensors/actuators to the Internet to monitor and control various aspects of our environment. As the number of IoT devices continues to grow, efficient medium access control protocols are needed to ensure that communication takes place in a reliable and scalable manner. In this paper, we investigate the performance of the Asynchronous Pulse Code Multiple Access (APCMA) protocol in massive IoT scenarios through simulations and analysis. We show that APCMA is able to outperform CSMA/CA in terms of the number of successfully transmitted messages in scenarios with up to 30,000 transmitting sensor nodes while also being able to utilize the channel more efficiently. We also examine the sensitivity of APCMA’s performance with respect to its parameters.

Download


Thermodynamic cost of Brownian computers in the stochastic thermodynamics of resetting

September 2023

·

15 Reads

·

3 Citations

The European Physical Journal Special Topics

We analyze the thermodynamic cost of a logically reversible Brownian Turing machine operating in the first-passage time protocol based on the stochastic thermodynamics of resetting. In this framework, the thermodynamic cost of computation is the reset entropy production, which is interpreted as the information reduction by a resetter external to the computer. At the level of a single trajectory, the reset entropy production is associated with unidirectional transitions and is a function of the time-dependent distribution probability. We analyze an approximation that replaces the distribution probability with the empirical sojourn time, which can be obtained at the single-trajectory level. The approximation is suitable for the numerical analysis by the Gillespie algorithm and provides a reasonable average value for the reset entropy.



Brownian Circuits: From Computation to Neural Networks

May 2023

·

14 Reads

Advances in Intelligent Systems and Computing

Brownian circuits use the fluctuations of signals, implemented by tokens, to drive computation. They have been shown to significantly reduce the required complexity of circuits or platforms implementing these circuits, such as cellular automata. The original model of Brownian circuits eyed computation models in which operations on individual tokens are at the core. This paper discusses models in which collections of tokens are used as signals in Brownian circuits, in particular neural networks. We show how previously proposed Brownian circuit primitives can be employed to implement neural functionality, like thresholding, synchronization, and learning.KeywordsBrownian circuitsFluctuation-driven computationAsynchronous circuitsNeural networks


Thermodynamic cost of Brownian computers in the stochastic thermodynamics of resetting

April 2023

·

7 Reads

We analyze the thermodynamic cost of a logically reversible Brownian Turing machine operating in the first-passage time protocol based on the stochastic thermodynamics of resetting. In this framework, the thermodynamic cost of computation is the reset entropy production, which is interpreted as the information reduction by a resetter external to the computer. At the level of a single trajectory, the reset entropy production is associated with unidirectional transitions and is a function of the time-dependent distribution probability. We analyze an approximation that replaces the distribution probability with the empirical sojourn time, which can be obtained at the single-trajectory level. The approximation is suitable for the numerical analysis by the Gillespie algorithm and provides a reasonable average value for the reset entropy.


Performance evaluation of CSS-APCMA for massive IoT using GNU Radio/USRP

January 2023

·

34 Reads

·

3 Citations

IEICE Communications Express

Asynchronous Pulse Code Multiple Access (APCMA) is a pulse-based communication system for massive IoT. It enables high-density communication because it can decode messages with a high probability even if they collide. We evaluate the performance of APCMA with Chirp Spread Spectrum-modulated pulses (CSS-APCMA) by comparing it with On-Off Keying APCMA (OOK-APCMA) and LoRa. Our first experiment shows that APCMA has a lower packet error rate (PER) than LoRa in a congested environment. Our second experiment shows that CSS-APCMA has a smaller PER than OOK-APCMA in a noisy environment. Our results confirm that CSS-APCMA is suitable for massive IoT.


Computation time and thermodynamic uncertainty relation of Brownian circuits

May 2022

·

26 Reads

We analyze a token-based Brownian circuit in which Brownian particles, coined `tokens,' move randomly by exploiting thermal fluctuations, searching for a path in multi-token state space corresponding to the solution of a given problem. The circuit can evaluate a Boolean function with a unique solution. However, its computation time varies with each run. We numerically calculate the probability distributions of Brownian adders' computation time, given by the first-passage time, and analyze the thermodynamic uncertainty relation and the thermodynamic cost based on stochastic thermodynamics. The computation can be completed in finite time without environment entropy production, i.e., without wasting heat to the environment. The thermodynamics cost is paid through error-free output detection and the resets of computation cycles. The signal-to-noise ratio quantifies the computation time's predictability, and it is well estimated by the mixed bound, which is approximated by the square root of the number of token detections. The thermodynamic cost tends to play a minor role in token-based Brownian circuits in computation cycles. This contrasts with the logically reversible Brownian Turing machine, in which the entropy production increases logarithmically with the size of the state space, and thus worsens the mixed bound.


Citations (55)


... However, inducing the directed motion of a Brownian particle requires work to be performed on the particle and thus entails energy dissipation [16]. Therefore, both improving computation speed and enhancing reliability of computation involve fundamental trade-offs with minimizing energy consumption [17,18]. ...

Reference:

Energy-Efficient Pseudo-Ratchet for Brownian Computers through One-Dimensional Quantum Brownian Motion
Thermodynamic cost of Brownian computers in the stochastic thermodynamics of resetting
  • Citing Article
  • September 2023

The European Physical Journal Special Topics

... CSS is used in several types of LPWA systems, such as LoRa and ELTRES, because it has a high tolerance to noise and interference, and can achieve long-distance communication. In [11], [12] and in this paper, we use a chirp pulse for each pulse to improve the reception sensitivity of APCMA, which we call CSS-APCMA. ...

Performance evaluation of CSS-APCMA for massive IoT using GNU Radio/USRP
  • Citing Article
  • January 2023

IEICE Communications Express

... The receiver first detects whether there is a pulse in each time slot and converts the received signal into a pulse train, assigning a "1" to a detected slot and a "0" to an undetected slot. There are two decoding schemes from pulse trains to received data: one is spike automaton [8] and the other is using a shift register [1], [9], which is the algorithm used in this paper. The shift register is a method where decoding is performed by shifting the pulse train by one slot at each clock cycle and comparing it with all available codewords. ...

Application of APCMA protocol to power packet networks for multiplexing power packet transmissions
  • Citing Article
  • October 2020

Nonlinear Theory and Its Applications IEICE

... To solve this problem, APCMA uses separable codewords with four or more pulses to become robust against packet collisions. Several codewords, such as 4-pulse codes, 5-pulse codes, and 6-pulse codes have been designed to decode them with high probability in [2], [7]. This paper uses a 5-pulse code, specifically consisting of four symmetrically arranged pulses and one central pulse. ...

Evaluation and optimization of asynchronous pulse code multiple access
  • Citing Article
  • April 2022

Nonlinear Theory and Its Applications IEICE

... In [20], we compared the performance when using APCMA codes with 4 to 6 pulses and up to 2,500 nodes with that of CSMA/CA by simulations, assuming that both systems operate with an equal throughput, but with different packet interarrival times. That study is extended in the current paper to a wider range of scenarios, and a more theoretical approach is followed as well. ...

Evaluating Multiple-Access Protocols: Asynchronous Pulse Coding vs. Carrier-Sense with Collision Avoidance
  • Citing Chapter
  • February 2022

Lecture Notes of the Institute for Computer Sciences

... The conventional ACAs, therefore, seem hard to capture the systematic and detailed dynamics of delays in information transmission between land cells. Recently, a special type of ACAs, called asynchronous communicating cellular automata (ACCAs), was proposed [25], which enable each cell not only to do transitions at random times, but also to be able to communicate with either neighbor via an asynchronous protocol. This turns out to be able to separate the communication and transitions of any cell, and thus the cell may update its state depending on some past state of a neighbor, rather than the neighbor's current state, which tends to facilitate stochastic delays to be involved into the LUCC simulation. ...

Asynchronous communicating cellular automata: Formalization, robustness and equivalence

Information Sciences

... It is shown in [2] that APCMA has a higher success probability than CSMA/CA, while [3] shows experiments of high-density communication using 500 APCMA transmitters. In [4], the pulses in the APCMA codewords are enhanced to be modulated by Chirp Spread Spectrum (CSS) to improve reception sensitivity and facilitate long-distance communication. ...

Design and Implementation of Pulse-Based Protocol with Chirp Spread Spectrum for Massive IoT
  • Citing Conference Paper
  • October 2021

... The implementation of asynchrony directly affects the computational ability-for example, in chemical reaction networks, which are an asynchronous model, depending on the setting, their computational power varies between primitive recursive functions, Boolean circuits, and Turing machines [6]. Similarly, even though cellular automata are capable of universal computation, a certain threshold in terms of their size and state count needs to be met to allow for it: this question has been extensively investigated both for CAs [27,23,5,7,17,3,11,24,37] and ACAs [9,20,19,32,1]. Despite that, the limits of asynchronous universality are not known, and the smallest constructions still lag behind their synchronous counterparts, hinting at some foundational discrepancy between collective synchronous and asynchronous computation. ...

Effect of random fluctuations on minimizing the complexity of universal asynchronous cellular automata

Physica D Nonlinear Phenomena

... The decoding of messages at the receiver is done by a pattern recognition algorithm using either a finite automaton that operates on pulse sequences [34], [36], or a shift register that detects pulse sequences entering at the left and shifting one cell to the right each time step [37], [38]. ...

Performance evaluation of pulse-based multiplexing protocol implemented on massive IoT devices
  • Citing Article
  • January 2021

Nonlinear Theory and Its Applications IEICE

... When calculating the PA nonlinearity quotient, two consecutive signals are received: one with high power and one with low power. In practical applications, IoT technologies like LoRa require packet fragmentation to increase throughput and minimize data loss caused by collisions [63]- [66]. The payload significantly limits the maximum number of LoRa sensors that can communicate on the same channel [67], [68]. ...

High-Density Resource-Restricted Pulse-Based IoT Networks

IEEE Transactions on Green Communications and Networking