IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E104.A, Issue 8
Displaying 1-11 of 11 articles from this issue
Regular Section
  • Masayoshi NAKAMOTO, Naoyuki AIKAWA
    Article type: PAPER
    Subject area: Digital Signal Processing
    2021 Volume E104.A Issue 8 Pages 1006-1018
    Published: August 01, 2021
    Released on J-STAGE: August 01, 2021
    Advance online publication: February 15, 2021
    JOURNAL FREE ACCESS

    Recent trends in designing filters involve development of sparse filters with coefficients that not only have real but also zero values. These sparse filters can achieve a high performance through optimizing the selection of the zero coefficients and computing the real (non-zero) coefficients. Designing an infinite impulse response (IIR) sparse filter is more challenging than designing a finite impulse response (FIR) sparse filter. Therefore, studies on the design of IIR sparse filters have been rare. In this study, we consider IIR filters whose coefficients involve zero value, called sparse IIR filter. First, we formulate the design problem as a linear programing problem without imposing any stability condition. Subsequently, we reformulate the design problem by altering the error function and prepare several possible denominator polynomials with stable poles. Finally, by incorporating these methods into successive thinning algorithms, we develop a new design algorithm for the filters. To demonstrate the effectiveness of the proposed method, its performance is compared with that of other existing methods.

    Download PDF (1357K)
  • Makoto YAMASHITA, Naoki HAYASHI, Takeshi HATANAKA, Shigemasa TAKAI
    Article type: PAPER
    Subject area: Systems and Control
    2021 Volume E104.A Issue 8 Pages 1019-1026
    Published: August 01, 2021
    Released on J-STAGE: August 01, 2021
    Advance online publication: February 04, 2021
    JOURNAL RESTRICTED ACCESS

    This paper investigates a constrained distributed online optimization problem over strongly connected communication networks, where a local cost function of each agent varies in time due to environmental factors. We propose a distributed online projected subgradient method over unbalanced directed networks. The performance of the proposed method is evaluated by a regret which is defined by the error between the cumulative cost over time and the cost of the optimal strategy in hindsight. We show that a logarithmic regret bound can be achieved for strongly convex cost functions. We also demonstrate the validity of the proposed method through a numerical example on distributed estimation over a diffusion field.

    Download PDF (2520K)
  • Yang YAN, Yao YAO, Zhi CHEN, Qiuyan WANG
    Article type: PAPER
    Subject area: Information Theory
    2021 Volume E104.A Issue 8 Pages 1027-1032
    Published: August 01, 2021
    Released on J-STAGE: August 01, 2021
    Advance online publication: February 08, 2021
    JOURNAL RESTRICTED ACCESS

    Codebooks with small inner-product correlation have applied in direct spread code division multiple access communications, space-time codes and compressed sensing. In general, it is difficult to construct optimal codebooks achieving the Welch bound or the Levenstein bound. This paper focuses on constructing asymptotically optimal codebooks with characters of cyclic groups. Based on the proposed constructions, two classes of asymptotically optimal codebooks with respect to the Welch bound are presented. In addition, parameters of these codebooks are new.

    Download PDF (678K)
  • Ryosuke SUGIURA, Yutaka KAMAMOTO, Takehiro MORIYA
    Article type: PAPER
    Subject area: Coding Theory
    2021 Volume E104.A Issue 8 Pages 1033-1042
    Published: August 01, 2021
    Released on J-STAGE: August 01, 2021
    Advance online publication: February 08, 2021
    JOURNAL RESTRICTED ACCESS

    This paper presents extended-domain Golomb (XDG) code, an extension of Golomb code for sparse geometric sources as well as a generalization of extended-domain Golomb-Rice (XDGR) code, based on the idea of almost instantaneous fixed-to-variable length (AIFV) codes. Showing that the XDGR encoding can be interpreted as extended usage of the code proposed in the previous works, this paper discusses the following two facts: The proposed XDG code can be constructed as an AIFV code relating to Golomb code as XDGR code does to Rice code; XDG and Golomb codes are symmetric in the sense of relative redundancy. The proposed XDG code can be efficiently used for losslessly compressing geometric sources too sparse for the conventional Golomb and Rice codes. According to the symmetry, its relative redundancy is guaranteed to be as low as Golomb code compressing non-sparse geometric sources. Awing to this fact, the parameter of the proposed XDG code, which is more finely tunable than the conventional XDGR code, can be optimized for given inputs using the conventional techniques. Therefore, it is expected to be more useful for many coding applications that deal with geometric sources at low bit rates.

    Download PDF (2100K)
  • Thanh Vu DANG, Hoang Trong VO, Gwang Hyun YU, Jin Young KIM
    Article type: PAPER
    Subject area: Image
    2021 Volume E104.A Issue 8 Pages 1043-1050
    Published: August 01, 2021
    Released on J-STAGE: August 01, 2021
    Advance online publication: January 27, 2021
    JOURNAL FREE ACCESS

    Capsules are fundamental informative units that are introduced into capsule networks to manipulate the hierarchical presentation of patterns. The part-hole relationship of an entity is learned through capsule layers, using a routing-by-agreement mechanism that is approximated by a voting procedure. Nevertheless, existing routing methods are computationally inefficient. We address this issue by proposing a novel routing mechanism, namely “shortcut routing”, that directly learns to activate global capsules from local capsules. In our method, the number of operations in the routing procedure is reduced by omitting the capsules in intermediate layers, resulting in lighter routing. To further address the computational problem, we investigate an attention-based approach, and propose fuzzy coefficients, which have been found to be efficient than mixture coefficients from EM routing. Our method achieves on-par classification results on the Mnist (99.52%), smallnorb (93.91%), and affNist (89.02%) datasets. Compared to EM routing, our fuzzy-based and attention-based routing methods attain reductions of 1.42 and 2.5 in terms of the number of calculations.

    Download PDF (834K)
  • Kenji UEHARA, Kunihiko HIRAISHI, Kokolo IKEDA
    Article type: PAPER
    Subject area: Mathematical Systems Science
    2021 Volume E104.A Issue 8 Pages 1051-1058
    Published: August 01, 2021
    Released on J-STAGE: August 01, 2021
    Advance online publication: January 22, 2021
    JOURNAL RESTRICTED ACCESS

    Boarding is the last step of aircraft turnaround and its completion in the shortest possible time is desired. In this paper, we propose a new boarding strategy that outperforms conventional strategies such as the back-to-front strategy and the outside-in strategy. The Steffen method is known as one of the most efficient boarding strategies in literature, but it is hard to be realized in the real situation because the complete sorting of passengers in a prescribed order is required. The proposed strategy shows a performance close to that of the Steffen method and can be easily implemented by using a special gate system.

    Download PDF (2921K)
  • Masato KIKUCHI, Kento KAWAKAMI, Kazuho WATANABE, Mitsuo YOSHIDA, Kyoji ...
    Article type: PAPER
    Subject area: Mathematical Systems Science
    2021 Volume E104.A Issue 8 Pages 1059-1074
    Published: August 01, 2021
    Released on J-STAGE: August 01, 2021
    Advance online publication: February 08, 2021
    JOURNAL RESTRICTED ACCESS

    Likelihood ratios (LRs), which are commonly used for probabilistic data processing, are often estimated based on the frequency counts of individual elements obtained from samples. In natural language processing, an element can be a continuous sequence of N items, called an N-gram, in which each item is a word, letter, etc. In this paper, we attempt to estimate LRs based on N-gram frequency information. A naive estimation approach that uses only N-gram frequencies is sensitive to low-frequency (rare) N-grams and not applicable to zero-frequency (unobserved) N-grams; these are known as the low- and zero-frequency problems, respectively. To address these problems, we propose a method for decomposing N-grams into item units and then applying their frequencies along with the original N-gram frequencies. Our method can obtain the estimates of unobserved N-grams by using the unit frequencies. Although using only unit frequencies ignores dependencies between items, our method takes advantage of the fact that certain items often co-occur in practice and therefore maintains their dependencies by using the relevant N-gram frequencies. We also introduce a regularization to achieve robust estimation for rare N-grams. Our experimental results demonstrate that our method is effective at solving both problems and can effectively control dependencies.

    Download PDF (3632K)
  • Lingjun KONG, Haiyang LIU, Jin TIAN, Shunwai ZHANG, Shengmei ZHAO, Yi ...
    Article type: LETTER
    Subject area: Coding Theory
    2021 Volume E104.A Issue 8 Pages 1075-1079
    Published: August 01, 2021
    Released on J-STAGE: August 01, 2021
    Advance online publication: February 16, 2021
    JOURNAL RESTRICTED ACCESS

    In this letter, a method for the construction of polar codes based on the mutual information approximation (MIA) is proposed for the 4Tb/in2 two-dimensional inter-symbol interference (2D-ISI) channels, such as the bit-patterned magnetic recording (BPMR) and two-dimensional magnetic recording (TDMR). The basic idea is to exploit the MIA between the input and output of a 2D detector to establish a log-likelihood ratio (LLR) distribution model based on the MIA results, which compensates the gap caused by the 2D ISI channel. Consequently, the polar codes obtained by the optimization techniques previously developed for the additive white Gaussian noise (AWGN) channels can also have satisfactory performances over 2D-ISI channels. Simulated results show that the proposed polar codes can outperform the polar codes constructed by the traditional methods over 4Tb/in2 2D-ISI channels.

    Download PDF (471K)
  • Seongah JEONG, Jinkyu KANG, Hoojin LEE
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2021 Volume E104.A Issue 8 Pages 1080-1083
    Published: August 01, 2021
    Released on J-STAGE: August 01, 2021
    Advance online publication: February 08, 2021
    JOURNAL RESTRICTED ACCESS

    In this letter, we investigate tight analytical and asymptotic upper bounds for bit error rate (BER) of constitutional codes over exponentially correlated Nakagami-m fading channels. Specifically, we derive the BER expression depending on an exact closed-form formula for pairwise error event probabilities (PEEP). Moreover, the corresponding asymptotic analysis in high signal-to-noise ratio (SNR) regime is also explored, which is verified via numerical results. This allows us to have explicit insights on the achievable coding gain and diversity order.

    Download PDF (330K)
  • Fang WANG, Zhe WEI
    Article type: LETTER
    Subject area: Mobile Information Network and Personal Communications
    2021 Volume E104.A Issue 8 Pages 1084-1087
    Published: August 01, 2021
    Released on J-STAGE: August 01, 2021
    Advance online publication: February 19, 2021
    JOURNAL RESTRICTED ACCESS

    The unattended malicious nodes pose great security threats to the integrity of the IoT sensor networks. However, preventions such as cryptography and authentication are difficult to be deployed in resource constrained IoT sensor nodes with low processing capabilities and short power supply. To tackle these malicious sensor nodes, in this study, the trust computing method is applied into the IoT sensor networks as a light weight security mechanism, and based on the theory of Chebyshev Polynomials for the approximation of time series, the trust data sequence generated by each sensor node is linearized and treated as a time series for malicious node detection. The proposed method is evaluated against existing schemes using several simulations and the results demonstrate that our method can better deal with malicious nodes resulting in higher correct packet delivery rate.

    Download PDF (362K)
  • Seiichi KOJIMA, Noriaki SUETAKE
    Article type: LETTER
    Subject area: Image
    2021 Volume E104.A Issue 8 Pages 1088-1092
    Published: August 01, 2021
    Released on J-STAGE: August 01, 2021
    Advance online publication: February 17, 2021
    JOURNAL RESTRICTED ACCESS

    LIME is a method for low-light image enhancement. Though LIME significantly enhances the contrast in dark regions, the effect of contrast enhancement tends to be insufficient in bright regions. In this letter, we propose an improved method of LIME. In the proposed method, the contrast in bright regions are improved while maintaining the contrast enhancement effect in dark regions.

    Download PDF (14199K)
feedback
Top