IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E101.A, Issue 3
Displaying 1-21 of 21 articles from this issue
Regular Section
  • Ming-Shing CHEN, Wen-Ding LI, Bo-Yuan PENG, Bo-Yin YANG, Chen-Mou CHEN ...
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2018 Volume E101.A Issue 3 Pages 553-569
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    Multivariate Public Key Cryptosystems (MPKCs) are often touted as future-proofing against Quantum Computers. In 2009, it was shown that hardware advances do not favor just “traditional” alternatives such as ECC and RSA, but also makes MPKCs faster and keeps them competitive at 80-bit security when properly implemented. These techniques became outdated due to emergence of new instruction sets and higher requirements on security. In this paper, we review how MPKC signatures changes from 2009 including new parameters (from a newer security level at 128-bit), crypto-safe implementations, and the impact of new AVX2 and AESNI instructions. We also present new techniques on evaluating multivariate polynomials, multiplications of large finite fields by additive Fast Fourier Transforms, and constant time linear solvers.

    Download PDF (2223K)
  • Takuya KUSAKA
    Article type: PAPER
    Subject area: Coding Theory
    2018 Volume E101.A Issue 3 Pages 570-576
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    In this paper, a study of a sufficient condition on the optimality of a decoded codeword of soft-decision decodings for binary linear codes is shown for a quantized case. A typical uniform 4-level quantizer for soft-decision decodings is employed for the analysis. Simulation results on the (64,42,8) Reed-Muller code indicates that the condition is effective for SN ratios at 3[dB] or higher for any iterative style optimum decodings.

    Download PDF (730K)
  • Furqan Haider QURESHI, Qasim Umar KHAN, Shahzad Amin SHEIKH, Muhammad ...
    Article type: PAPER
    Subject area: Communication Theory and Signals
    2018 Volume E101.A Issue 3 Pages 577-584
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    In this paper, a new and an accurate symbol error probability's analytical model of Rectangular Quadrature Amplitude Modulation in α-µ fading channel is presented for single-user single-input multi-output environment, which can be easily extended to generalized fading channels. The maximal-ratio combining technique is utilized at the receiving end and unified moment generating functions are used to derivate the results. The fading mediums considered are independent and non-identical. The mathematical model presented is applicable for slow and frequency non-selective fading channels only. The final expression is presented in terms of Meijer G-function; it contains single integrals with finite limits to evaluate the mathematical expressions with numerical techniques. The beauty of the model will help evaluate symbol error probability of rectangular quadrature amplitude modulation with spatial diversity over various fading mediums not addressed in this article. To check for the validity of derived analytical expressions, comparison is made between theoretical and simulation results at the end.

    Download PDF (1945K)
  • Wenhua SHI, Xiongwei ZHANG, Xia ZOU, Meng SUN, Wei HAN, Li LI, Gang MI ...
    Article type: LETTER
    Subject area: Noise and Vibration
    2018 Volume E101.A Issue 3 Pages 585-589
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    A monaural speech enhancement method combining deep neural network (DNN) with low rank analysis and speech present probability is proposed in this letter. Low rank and sparse analysis is first applied on the noisy speech spectrogram to get the approximate low rank representation of noise. Then a joint feature training strategy for DNN based speech enhancement is presented, which helps the DNN better predict the target speech. To reduce the residual noise in highly overlapping regions and high frequency domain, speech present probability (SPP) weighted post-processing is employed to further improve the quality of the speech enhanced by trained DNN model. Compared with the supervised non-negative matrix factorization (NMF) and the conventional DNN method, the proposed method obtains improved speech enhancement performance under stationary and non-stationary conditions.

    Download PDF (648K)
  • Heemang SONG, Seunghoon CHO, Kyung-Jin YOU, Hyun-Chool SHIN
    Article type: LETTER
    Subject area: Digital Signal Processing
    2018 Volume E101.A Issue 3 Pages 590-594
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    In this paper, we propose an automotive radar sensor compensation method improving direction of arrival (DOA) and preventing target split tracking. Amplitude and phase mismatching and mutual coupling between radar sensor arrays cause an inaccuracy problem in DOA estimation. By quantifying amplitude and phase distortion levels for each angle, we compensate the sensor distortion. Applying the proposed method to Bartlett, Capon and multiple signal classification (MUSIC) algorithms, we experimentally demonstrate the performance improvement using both experimental data from the chamber and real data obtained in actual road.

    Download PDF (996K)
  • Jidong QIN, Jiandong ZHU, Huafeng PENG, Tao SUN, Dexiu HU
    Article type: LETTER
    Subject area: Digital Signal Processing
    2018 Volume E101.A Issue 3 Pages 595-599
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    The existing methods to estimate satellite attitude by using radar cross section (RCS) sequence suffer from problems such as low precision, computation complexity, etc. To overcome these problems, a novel model of satellite attitude estimation by the local maximum points of the RCS sequence is established and can reduce the computational time by downscaling the dimension of the feature vector. Moreover, a particle swarm optimization method is adopted to improve efficiency of computation. Numerical simulations show that the proposed method is robust and efficient.

    Download PDF (537K)
  • Fengde JIA, Zishu HE
    Article type: LETTER
    Subject area: Analog Signal Processing
    2018 Volume E101.A Issue 3 Pages 600-603
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    A convenient formula for the estimation of the clutter rank of the diving platform radar is derived. Brennan's rule provides a general formula to estimate the clutter rank for the side looking radar with a linear array, which is normally called one-dimensional (1D) estimation problem. With the help of the clutter wavenumber spectrum, the traditional estimation of the clutter rank is extended to the diving scenario and the estimation problem is two-dimensional (2D). The proposed rule is verified by the numerical simulations.

    Download PDF (356K)
  • Shanqi PANG, Miao FENG, Xunan WANG, Jing WANG
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2018 Volume E101.A Issue 3 Pages 604-607
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    Bent functions have been applied to cryptography, spread spectrum, coding theory, and combinatorial design. Permutations play an important role in the design of cryptographic transformations such as block ciphers, hash functions and stream ciphers. By using the Kronecker product this paper presents a general recursive construction method of permutations over finite field. As applications of our method, several infinite classes of permutations are obtained. By means of the permutations obtained and M-M functions we construct several infinite families of bent functions.

    Download PDF (273K)
  • Min DONG, Yanli REN, Guorui FENG
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2018 Volume E101.A Issue 3 Pages 608-611
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    With the popularity of cloud computing services, outsourcing computation has entered a period of rapid development. Modular exponentiation is one of the most expensive operations in public key cryptographic systems, but the current outsourcing algorithms for modular exponentiations (MExps) with single server are inefficient or have small checkability. In this paper, we propose an efficient and fully verifiable algorithm for outsourcing multiple MExps with single untrusted server where the errors can be detected by an outsourcer with a probability of 1. The theory analysis and experimental evaluations also show that the proposed algorithm is the most efficient one compared with the previous work. Finally, we present the outsourcing schemes of digital signature algorithm (DSA) and attribute based encryption (ABE) as two applications of the proposed algorithm.

    Download PDF (374K)
  • Yubo LI, Liying TIAN, Shengyi LIU
    Article type: LETTER
    Subject area: Information Theory
    2018 Volume E101.A Issue 3 Pages 612-616
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    In this letter, based on orthogonal Golay sequence sets and orthogonal matrices, general constructions of zero correlation zone (ZCZ) aperiodic complementary sequence (ZACS) sets are proposed. The resultant ZACSs have column sequence peak-to-mean envelop power ratio (PMEPR) of at most 2, and the parameters of the sequence sets are optimal with respect to the theoretical bound. The novel ZACS sets are suitable for approximately synchronized multi-carrier CDMA (MC-CDMA) communication systems.

    Download PDF (280K)
  • Haiyang LIU, Yan LI, Lianrong MA
    Article type: LETTER
    Subject area: Coding Theory
    2018 Volume E101.A Issue 3 Pages 617-622
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    The separating redundancy is an important concept in the analysis of the error-and-erasure decoding of a linear block code using a parity-check matrix of the code. In this letter, we derive new constructive upper bounds on the second separating redundancies of low-density parity-check (LDPC) codes constructed from projective and Euclidean planes over the field Fq with q even.

    Download PDF (314K)
  • Biao WANG, Xiaopeng JIAO, Jianjun MU, Zhongfei WANG
    Article type: LETTER
    Subject area: Coding Theory
    2018 Volume E101.A Issue 3 Pages 623-626
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    By tracking the changing rate of hard decisions during every two consecutive iterations of the alternating direction method of multipliers (ADMM) penalized decoding, an efficient early termination (ET) criterion is proposed to improve the convergence rate of ADMM penalized decoder for low-density parity-check (LDPC) codes. Compared to the existing ET criterion for ADMM penalized decoding, the proposed method can reduce the average number of iterations significantly at low signal-to-noise ratios with negligible performance degradation.

    Download PDF (482K)
  • Hao ZHENG, Xingan XU, Changwei LV, Yuanfang SHANG, Guodong WANG, Chunl ...
    Article type: LETTER
    Subject area: Coding Theory
    2018 Volume E101.A Issue 3 Pages 627-631
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    Concatenated zigzag (CZ) codes are classified as one kind of parallel-concatenated codes with powerful performance and low complexity. This kind of codes has flexible implementation methods and a good application prospect. We propose a modified turbo-type decoder and adaptive extrinsic information scaling method based on the Max-Log-APP (MLA) algorithm, which can provide a performance improvement also under the relatively low decoding complexity. Simulation results show that the proposed method can effectively help the sub-optimal MLA algorithm to approach the optimal performance. Some contrasts with low-density parity-check (LDPC) codes are also presented in this paper.

    Download PDF (1428K)
  • Rajesh RAMANATHAN, Partha Sharathi MALLICK, Thiruvengadam SUNDARAJAN J ...
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2018 Volume E101.A Issue 3 Pages 632-635
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    In this letter, we propose a generalized quadrature spatial modulation technique (GQSM) which offers additional bits per channel use (bpcu) gains and a low complexity greedy detector algorithm, structured orthogonal matching pursuit (S-OMP)- GQSM, based on compressive sensing (CS) framework. Simulation results show that the bit error rate (BER) performance of the proposed greedy detector is very close to maximum likelihood (ML) and near optimal detectors based on convex programming.

    Download PDF (307K)
  • Byungcheol KANG, Jaeseok KIM
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2018 Volume E101.A Issue 3 Pages 636-639
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    In this letter, a new multicast medium access control protocol for wireless local area network(WLAN) system is proposed to achieve high reliability. Multicast in conventional WLANs offers highly efficient use of wireless resources, but has disadvantages of low reliability and low data rates due to lack of feedback. Our proposed multicast frame includes a sequence that indicates the stations (STAs) that send the ACK frame first. Using the sequence, the proposed system makes feedback for the multicast frame. If some STAs fail to receive the frame, the other STAs that have successfully received the frame retransmit the frame. The proposed multicast protocol with relay retransmission can achieve a 100% frame delivery ratio in a strong-fading channel while IEEE 802.11aa multicast protocol cannot. The proposed multicast protocol can also conserve 48% throughput to the maximum data rate in a strong-fading channel.

    Download PDF (452K)
  • Yulong SHANG, Hojun KIM, Hosung PARK, Taejin JUNG
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2018 Volume E101.A Issue 3 Pages 640-643
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    The conventional generalized spatial modulation (GSM) simultaneously activates multiple transmit antennas in order to improve the spectral efficiency of the original SM. In this letter, to lessen the hardware burden of the multiple RF chains, we provide a new scheme that is designed by combining the GSM scheme using only two active antennas with quaternary quasi-orthogonal sequences of a length of two. Compared with the other SM schemes, the proposed scheme has significant benefits in average error performances and/or their hardware complexities of the RF systems.

    Download PDF (411K)
  • Huiling HOU, Weisheng HU, Kang WU, Xuwen LIANG
    Article type: LETTER
    Subject area: Spread Spectrum Technologies and Applications
    2018 Volume E101.A Issue 3 Pages 644-648
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    In this letter, a novel on-orbit estimation and calibration method of GPS antenna geometry offsets for attitude determination of LEO satellites is proposed. Both baseline vectors in the NED coordinate system are achieved epoch-by-epoch firstly. Then multiple epochs' baseline vectors are united to compute all the offsets via an UKF for a certain long time. After on-orbit estimation and calibration, instantaneous and accurate attitude can be achieved. Numerical results show that the proposed method can obtain the offsets of each baseline in all directions with high accuracy estimation and small STDs, and effective attitudes can be achieved after antenna geometry calibration using the estimated offsets. The high accuracy give the proposed scheme a strong practical-oriented ability.

    Download PDF (988K)
  • Sungjun KIM, Daehee KIM, Sunshin AN
    Article type: LETTER
    Subject area: Mobile Information Network and Personal Communications
    2018 Volume E101.A Issue 3 Pages 649-653
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    In this paper, we define a wireless sensor network with multiple types of sensors as a wireless heterogeneous sensor network (WHSN), and propose an efficient query dissemination scheme (EDT) in the WHSN. The EDT based on total dominant pruning can forward queries to only the nodes with data requested by the user, thereby reducing unnecessary packet transmission. We show that the EDT is suitable for the WHSN environment through a variety of simulations.

    Download PDF (726K)
  • Yang LI, Zhuang MIAO, Ming HE, Yafei ZHANG, Hang LI
    Article type: LETTER
    Subject area: Image
    2018 Volume E101.A Issue 3 Pages 654-657
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    How to represent images into highly compact binary codes is a critical issue in many computer vision tasks. Existing deep hashing methods typically focus on designing loss function by using pairwise or triplet labels. However, these methods ignore the attention mechanism in the human visual system. In this letter, we propose a novel Deep Attention Residual Hashing (DARH) method, which directly learns hash codes based on a simple pointwise classification loss function. Compared to previous methods, our method does not need to generate all possible pairwise or triplet labels from the training dataset. Specifically, we develop a new type of attention layer which can learn human eye fixation and significantly improves the representation ability of hash codes. In addition, we embedded the attention layer into the residual network to simultaneously learn discriminative image features and hash codes in an end-to-end manner. Extensive experiments on standard benchmarks demonstrate that our method preserves the instance-level similarity and outperforms state-of-the-art deep hashing methods in the image retrieval application.

    Download PDF (1178K)
  • Yuan GAO, Chengdong WU, Xiaosheng YU, Wei ZHOU, Jiahui WU
    Article type: LETTER
    Subject area: Vision
    2018 Volume E101.A Issue 3 Pages 658-661
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    Efficient optic disc (OD) segmentation plays a significant role in retinal image analysis and retinal disease screening. In this paper, we present a full-automatic segmentation approach called double boundary extraction for the OD segmentation. The proposed approach consists of the following two stages: first, we utilize an unsupervised learning technology and statistical method based on OD boundary information to obtain the initial contour adaptively. Second, the final optic disc boundary is extracted using the proposed LSO model. The performance of the proposed method is tested on the public DIARETDB1 database and the experimental results demonstrate the effectiveness and advantage of the proposed method.

    Download PDF (1041K)
  • Ryo WATANABE, Junpei KOMIYAMA, Atsuyoshi NAKAMURA, Mineichi KUDO
    Article type: LETTER
    Subject area: Mathematical Systems Science
    2018 Volume E101.A Issue 3 Pages 662-667
    Published: March 01, 2018
    Released on J-STAGE: March 01, 2018
    JOURNAL RESTRICTED ACCESS

    We propose a policy UCB-SC for budgeted multi-armed bandits. The policy is a variant of recently proposed KL-UCB-SC. Unlike KL-UCB-SC, which is computationally prohibitive, UCB-SC runs very fast while keeping KL-UCB-SC's asymptotical optimality when reward and cost distributions are Bernoulli with means around 0.5, which are verified both theoretically and empirically.

    Download PDF (992K)
feedback
Top