IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E104.A, Issue 7
Displaying 1-8 of 8 articles from this issue
Regular Section
  • Keisuke OKANO, Naoto SASAOKA, Yoshio ITOH
    Article type: PAPER
    Subject area: Digital Signal Processing
    2021 Volume E104.A Issue 7 Pages 954-961
    Published: July 01, 2021
    Released on J-STAGE: July 01, 2021
    Advance online publication: December 28, 2020
    JOURNAL RESTRICTED ACCESS

    We propose online feedback path modeling with a pre-inverse type active noise control (PIANC) system to track the fluctuation stably in the feedback path. The conventional active noise control (ANC) system with online feedback path modeling (FBPM) filter bases filtered-x least mean square (FxLMS) algorithm. In the FxLMS algorithm, the error of FBPM influences a control filter, which generates an anti-noise, and secondary path modeling (SPM) filter. The control filter diverges when the error is too large. Therefore, it is difficult for the FxLMS algorithm to track the feedback path without divergence. On the other hand, the proposed approach converges stably because the FBPM filter's error does not influence a control filter on the PIANC system. Thus, the proposed method can reduce noise while tracking the feedback path. This paper verified the effectiveness of the proposed method by convergence analysis, computer simulation, and implementation of a digital signal processor.

    Download PDF (2143K)
  • Rui LI, Ruqi XIAO, Hong GU, Weimin SU
    Article type: PAPER
    Subject area: Digital Signal Processing
    2021 Volume E104.A Issue 7 Pages 962-967
    Published: July 01, 2021
    Released on J-STAGE: July 01, 2021
    Advance online publication: January 07, 2021
    JOURNAL RESTRICTED ACCESS

    A novel direction of arrival (DOA) estimation method for the coherent signal is presented in this paper. The proposed method applies the eigenvector associated with max eigenvalue, which contains the DOAs of all signals, to form a Toeplitz matrix, yielding an unconstrained optimization problem. Then, the DOA is obtained by peak searching of the pseudo power spectrum without the knowledge of signal number. It is illustrated that the method has a great performance and low computation complexity for the coherent signal. Simulation results verify the usefulness of the method.

    Download PDF (4186K)
  • Nuttapong ATTRAPADUNG, Goichiro HANAOKA, Takato HIRANO, Yutaka KAWAI, ...
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2021 Volume E104.A Issue 7 Pages 968-978
    Published: July 01, 2021
    Released on J-STAGE: July 01, 2021
    Advance online publication: January 12, 2021
    JOURNAL RESTRICTED ACCESS

    In this paper, we put forward the notion of a token-based multi-input functional encryption (token-based MIFE) scheme - a notion intended to give encryptors a mechanism to control the decryption of encrypted messages, by extending the encryption and decryption algorithms to additionally use tokens. The basic idea is that a decryptor must hold an appropriate decryption token in addition to his secrete key, to be able to decrypt. This type of scheme can address security concerns potentially arising in applications of functional encryption aimed at addressing the problem of privacy preserving data analysis. We firstly formalize token-based MIFE, and then provide two basic schemes; both are based on an ordinary MIFE scheme, but the first additionally makes use of a public key encryption scheme, whereas the second makes use of a pseudorandom function (PRF). Lastly, we extend the latter construction to allow decryption tokens to be restricted to specified set of encryptions, even if all encryptions have been done using the same encryption token. This is achieved by using a constrained PRF.

    Download PDF (1628K)
  • Hong-Li WANG, Li-Li FAN, Gang WANG, Lin-Zhi SHEN
    Article type: LETTER
    Subject area: Digital Signal Processing
    2021 Volume E104.A Issue 7 Pages 979-983
    Published: July 01, 2021
    Released on J-STAGE: July 01, 2021
    Advance online publication: January 12, 2021
    JOURNAL RESTRICTED ACCESS

    In the letter, two classes of optimal codebooks and asymptotically optimal codebooks in regard to the Levenshtein bound are presented, which are based on mutually unbiased bases (MUB) and approximately mutually unbiased bases (AMUB), respectively.

    Download PDF (178K)
  • Yuelei XIAO, Shuang HUANG
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2021 Volume E104.A Issue 7 Pages 984-990
    Published: July 01, 2021
    Released on J-STAGE: July 01, 2021
    Advance online publication: January 12, 2021
    JOURNAL RESTRICTED ACCESS

    For the first stage of the multi-sensitive bucketization (MSB) method, the l-diversity grouping for multiple sensitive attributes is incomplete, causing more information loss. To solve this problem, we give the definitions of the l-diversity avoidance set for multiple sensitive attributes and the avoiding of a multiple dimensional bucket, and propose a complete l-diversity grouping (CLDG) algorithm for multiple sensitive attributes. Then, we improve the first stages of the MSB algorithms by applying the CLDG algorithm to them. The experimental results show that the grouping ratio of the improved first stages of the MSB algorithms is significantly higher than that of the original first stages of the MSB algorithms, decreasing the information loss of the published microdata.

    Download PDF (850K)
  • Pan TAN, Zhengchun ZHOU, Haode YAN, Yong WANG
    Article type: LETTER
    Subject area: Coding Theory
    2021 Volume E104.A Issue 7 Pages 991-995
    Published: July 01, 2021
    Released on J-STAGE: July 01, 2021
    Advance online publication: January 18, 2021
    JOURNAL RESTRICTED ACCESS

    Locally repairable codes (LRCs) with availability have received considerable attention in recent years since they are able to solve many problems in distributed storage systems such as repairing multiple node failures and managing hot data. Constructing LRCs with locality r and availability t (also called (r, t)-LRCs) with new parameters becomes an interesting research subject in coding theory. The objective of this paper is to propose two generic constructions of cyclic (r, t)-LRCs via linearized polynomials over finite fields. These two constructions include two earlier ones of cyclic LRCs from trace functions and truncated trace functions as special cases and lead to LRCs with new parameters that can not be produced by earlier ones.

    Download PDF (305K)
  • Lin YAN, Mingyong ZENG, Shuai REN, Zhangkai LUO
    Article type: LETTER
    Subject area: Mobile Information Network and Personal Communications
    2021 Volume E104.A Issue 7 Pages 996-999
    Published: July 01, 2021
    Released on J-STAGE: July 01, 2021
    Advance online publication: December 24, 2020
    JOURNAL RESTRICTED ACCESS

    Traffic categorization aims to classify network traffic into major service types. A modern deep neural network based on temporal sequence modeling is proposed for encrypted traffic categorization. The contemporary techniques such as dilated convolution and residual connection are adopted as the basic building block. The raw traffic files are pre-processed to generate 1-dimensional flow byte sequences and are feed into our specially-devised network. The proposed approach outperforms other existing methods greatly on a public traffic dataset.

    Download PDF (397K)
  • Minako KAMIYAMA, Akira TAGUCHI
    Article type: LETTER
    Subject area: Image
    2021 Volume E104.A Issue 7 Pages 1000-1005
    Published: July 01, 2021
    Released on J-STAGE: July 01, 2021
    Advance online publication: January 18, 2021
    JOURNAL RESTRICTED ACCESS

    In color image processing, preservation of hue is required. Therefore, perceptual color models such as HSI and HSV have been used. Hue-Saturation-Intensity (HSI) is a public color model, and many color applications have been made based on this model. However, the transformation from the conventional HSI (C-HSI) color space to the RGB color space after processing intensity/saturation in the C-HSI color space often generates the gamut problem, because the shape of C-HSI color space is a triangular pyramid which includes the RGB color space. When the output of intensity/saturation processing result is located in the outside of the common region of RGB color space and C-HSI color space, it is necessary to move to the RGB color space. The effective way of hue and intensity preserving saturation correction algorithm is proposed. According to the proposed saturation correction algorithm, the corrected saturation value is same as the processing result in the ideal HSI color space whose gamut same as the RGB gamut.

    Download PDF (1103K)
feedback
Top