IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E106.A, Issue 12
Displaying 1-20 of 20 articles from this issue
Special Section on Signal Design and Its Applications in Communications
  • Pingzhi FAN, Tetsuya KOJIMA
    2023 Volume E106.A Issue 12 Pages 1450-1451
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    JOURNAL FREE ACCESS
    Download PDF (901K)
  • Arne WINTERHOF
    Article type: INVITED PAPER
    Subject area: Cryptography and Information Security
    2023 Volume E106.A Issue 12 Pages 1452-1460
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: May 31, 2023
    JOURNAL FREE ACCESS

    In this survey we summarize properties of pseudorandomness and non-randomness of some number-theoretic sequences and present results on their behaviour under the following measures of pseudorandomness: balance, linear complexity, correlation measure of order k, expansion complexity and 2-adic complexity. The number-theoretic sequences are the Legendre sequence and the two-prime generator, the Thue-Morse sequence and its sub-sequence along squares, and the prime omega sequences for integers and polynomials.

    Download PDF (493K)
  • Serdar BOZTAŞ, Ferruh ÖZBUDAK, Eda TEKİN
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2023 Volume E106.A Issue 12 Pages 1461-1469
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: August 10, 2023
    JOURNAL FREE ACCESS

    In this paper we obtain a new method to compute the correlation values of two arbitrary sequences defined by a mapping from 𝔽4n to 𝔽4. We apply this method to demonstrate that the usual nonbinary maximal length sequences have almost ideal correlation under the canonical complex correlation definition and investigate some decimations giving good cross correlation. The techniques we develop are of independent interest for future investigation of sequence design and related problems, including Boolean functions.

    Download PDF (1758K)
  • Hao WU, Xiaoni DU, Xingbin QIAO
    Article type: PAPER
    Subject area: Coding Theory
    2023 Volume E106.A Issue 12 Pages 1470-1474
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: August 16, 2023
    JOURNAL FREE ACCESS

    Linear codes have wide applications in many fields such as data storage, communication, cryptography, combinatorics. As a subclass of linear codes, minimal linear codes can be used to construct secret sharing schemes with good access structures. In this paper, we first construct some new classes of linear codes by selecting definition set properly. Then, the lengths, dimensions and the weight distribution of the codes are determined by investigating whether the intersections of the supports of vectors and the definition sets are empty. Results show that both wide and narrow minimal linear codes are contained in the new codes. Finally, we extend some existing results to general cases.

    Download PDF (1147K)
  • Shinya MATSUFUJI, Sho KURODA, Yuta IDA, Takahiro MATSUMOTO, Naoki SUEH ...
    Article type: PAPER
    Subject area: Information Theory
    2023 Volume E106.A Issue 12 Pages 1475-1483
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: September 05, 2023
    JOURNAL FREE ACCESS

    A set consisting of K subsets of Msequences of length L is called a complementary sequence set expressed by A(L, K, M), if the sum of the out-of-phase aperiodic autocorrelation functions of the sequences within a subset and the sum of the cross-correlation functions between the corresponding sequences in any two subsets are zero at any phase shift. Suehiro et al. first proposed complementary set A(Nn, N, N) where N and n are positive integers greater than or equal to 2. Recently, several complementary sets related to Suehiro's construction, such as N being a power of a prime number, have been proposed. However, there is no discussion about their inclusion relation and properties of sequences. This paper rigorously formulates and investigates the (generalized) logic functions of the complementary sets by Suehiro et al. in order to understand its construction method and the properties of sequences. As a result, it is shown that there exists a case where the logic function is bent when n is even. This means that each series can be guaranteed to have pseudo-random properties to some extent. In other words, it means that the complementary set can be successfully applied to communication on fluctuating channels. The logic functions also allow simplification of sequence generators and their matched filters.

    Download PDF (1226K)
  • Ting WANG, Xianhua NIU, Yaoxuan WANG, Jianhong ZHOU, Ling XIONG
    Article type: PAPER
    Subject area: Information Theory
    2023 Volume E106.A Issue 12 Pages 1484-1492
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: August 16, 2023
    JOURNAL FREE ACCESS

    The frequency hopping sequence plays a crucial role in determining the system's anti-jamming performance, in frequency hopping communication systems. If the adjacent frequency points of FHS can ensure wide-gap, it will better improve the anti-interference capability of the FH communication system. Moreover, if the period of the sequence is expanded, and each frequency point does not repeat in the same sequence, the system's ability to resist electromagnetic interference will be enhanced. And a one-coincidence frequency-hopping sequence set consists of FHSs with maximum Hamming autocorrelation 0 and cross-correlation 1. In this paper, we present two constructions of wide-gap frequency-hopping sequence sets. One construction is a new class of wide-gap one-coincidence FHS set, and the other is a WGFHS set with long period. These two WGFHS sets are optimal with respect to WG-Peng-Fan bound. And each sequence of these WGFHS sets is optimal with respect to WG-Lempel-Greenberger bound.

    Download PDF (929K)
  • Dody ICHWANA PUTRA, Muhammad HARRY BINTANG PRATAMA, Ryotaro ISSHIKI, Y ...
    Article type: PAPER
    Subject area: Digital Signal Processing
    2023 Volume E106.A Issue 12 Pages 1493-1503
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: August 22, 2023
    JOURNAL FREE ACCESS

    This paper presents a unified software and hardware wireless AI platform (USHWAP) for developing and evaluating machine learning in wireless systems. The platform integrates multi-software development such as MATLAB and Python with hardware platforms like FPGA and SDR, allowing for flexible and scalable device and edge computing application development. The USHWAP is implemented and validated using FPGAs and SDRs. Wireless signal classification, wireless LAN sensing, and rate adaptation are used as examples to showcase the platform's capabilities. The platform enables versatile development, including software simulation and real-time hardware implementation, offering flexibility and scalability for multiple applications. It is intended to be used by wireless-AI researchers to develop and evaluate intelligent algorithms in a laboratory environment.

    Download PDF (6495K)
  • Ali ARDALANI, Alexander POTT
    Article type: PAPER
    Subject area: Digital Signal Processing
    2023 Volume E106.A Issue 12 Pages 1504-1510
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: August 24, 2023
    JOURNAL FREE ACCESS

    A Costas array of size n is an n × n binary matrix such that no two of the $\binom{n}{2}$ line segments connecting 1s have the same length and slope. Costas arrays are found by finite-field-based construction methods and their manipulations (systematically constructed) and exhaustive search methods. The arrays found exhaustively, which are of completely unknown origin, are called sporadic. Most studies in Costas arrays have tended to focus on systematically constructed Costas arrays rather than sporadic ones, which reveals the hardness of examining a link between systematically constructed Costas arrays and sporadic ones. This paper introduces a new transformation that preserves the Costas property for some Costas arrays, but not all. We observed that this transformation could transform some systematically constructed Costas arrays to sporadic ones and vice versa. Moreover, we introduce a family of arrays with the property that the auto-correlation of each array and the cross-correlation between any two arrays in this family is bounded above by two.

    Download PDF (832K)
  • Yuta KODERA
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2023 Volume E106.A Issue 12 Pages 1511-1515
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: August 08, 2023
    JOURNAL FREE ACCESS

    This paper focuses on a pseudorandom number generator called an NTU sequence for use in cryptography. The generator is defined with an m-sequence and Legendre symbol over an odd characteristic field. Since the previous researches have shown that the generator has maximum complexity; however, its bit distribution property is not balanced. To address this drawback, the author introduces dynamic mapping for the generation process and evaluates the period and some distribution properties in this paper.

    Download PDF (325K)
  • Bing LIU, Rong LUO, Yong WANG
    Article type: LETTER
    Subject area: Coding Theory
    2023 Volume E106.A Issue 12 Pages 1516-1520
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: August 08, 2023
    JOURNAL FREE ACCESS

    Even correlation and odd correlation of sequences are two kinds of measures for their similarities. Both kinds of correlation have important applications in communication and radar. Compared with vast knowledge on sequences with good even correlation, relatively little is known on sequences with preferable odd correlation. In this paper, a generic construction of sequences with low odd correlation is proposed via interleaving technique. Notably, it can generate new sets of binary sequences with optimal odd correlation asymptotically meeting the Sarwate bound.

    Download PDF (185K)
  • Chenchen LIU, Wenyi ZHANG, Xiaoni DU
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2023 Volume E106.A Issue 12 Pages 1521-1524
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: August 08, 2023
    JOURNAL FREE ACCESS

    The calculation of cross-correlation between a sequence with good autocorrelation and its decimated sequence is an interesting problem in the field of sequence design. In this letter, we consider a class of ternary sequences with perfect autocorrelation, proposed by Shedd and Sarwate (IEEE Trans. Inf. Theory, 1979, DOI: 10.1109/TIT.1979.1055998), which is generated based on the cross-correlation between m-sequence and its d-decimation sequence. We calculate the cross-correlation distribution between a certain pair of such ternary perfect sequences and show that the cross-correlation takes three different values.

    Download PDF (170K)
Regular Section
  • Yu ZHOU, Jianyong HU, Xudong MIAO, Xiaoni DU
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2023 Volume E106.A Issue 12 Pages 1525-1530
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: May 24, 2023
    JOURNAL FREE ACCESS

    Low confusion coefficient values can make side-channel attacks harder for vector Boolean functions in Block cipher. In this paper, we give new results of confusion coefficient for fg, fg, fg and fg for different Boolean functions f and g, respectively. And we deduce a relationship on the sum-of-squares of the confusion coefficient between one n-variable function and two (n - 1)-variable decomposition functions. Finally, we find that the confusion coefficient of vector Boolean functions is affine invariant.

    Download PDF (1380K)
  • Yuto NAKAZAWA, Toru NAKANISHI
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2023 Volume E106.A Issue 12 Pages 1531-1543
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: June 29, 2023
    JOURNAL FREE ACCESS

    A group signature scheme allows us to anonymously sign a message on behalf of a group. One of important issues in the group signatures is user revocation, and thus lots of revocable group signature (RGS) schemes have been proposed so far. One of the applications suitable to the group signature is privacy-enhancing crowdsensing, where the group signature allows mobile sensing users to be anonymously authenticated to hide the location. In the mobile environment, verifier-local revocation (VLR) type of RGS schemes are suitable, since revocation list (RL) is not needed in the user side. However, in the conventional VLR-RGS schemes, the revocation check in the verifier needs O(R) cryptographic operations for the number R of revoked users. On this background, VLR-RGS schemes with efficient revocation check have been recently proposed, where the revocation check is just (bit-string) matching. However, in the existing schemes, signatures are linkable in the same interval or in the same application-independent task with a public index. The linkability is useful in some scenarios, but users want the unlinkability for the stronger anonymity. In this paper, by introducing a property that at most K unlinkable signatures can be issued by a signer during each interval for a fixed integer K, we propose a VLR-RGS scheme with the revocation token matching. In our scheme, even the signatures during the same interval are unlinkable. Furthermore, since used indexes are hidden, the strong anonymity remains. The overheads are the computational costs of the revocation algorithm and the RL size. We show that the overheads are practical in use cases of crowdsensing.

    Download PDF (1200K)
  • Xi CHEN, Guodong JIANG, Kaikai CHI, Shubin ZHANG, Gang CHEN, Jiang LIU
    Article type: PAPER
    Subject area: Communication Theory and Signals
    2023 Volume E106.A Issue 12 Pages 1544-1554
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: June 19, 2023
    JOURNAL FREE ACCESS

    Many nodes in Internet of Things (IoT) rely on batteries for power. Additionally, the demand for executing compute-intensive and latency-sensitive tasks is increasing for IoT nodes. In some practical scenarios, the computation tasks of WDs have the non-separable characteristic, that is, binary offloading strategies should be used. In this paper, we focus on the design of an efficient binary offloading algorithm that minimizes system energy consumption (EC) for TDMA-based wireless-powered multi-access edge computing networks, where WDs either compute tasks locally or offload them to hybrid access points (H-APs). We formulate the EC minimization problem which is a non-convex problem and decompose it into a master problem optimizing binary offloading decision and a subproblem optimizing WPT duration and task offloading transmission durations. For the master problem, a DRL based method is applied to obtain the near-optimal offloading decision. For the subproblem, we firstly consider the scenario where the nodes do not have completion time constraints and obtain the optimal analytical solution. Then we consider the scenario with the constraints. By jointly using the Golden Section Method and bisection method, the optimal solution can be obtained due to the convexity of the constraint function. Simulation results show that the proposed offloading algorithm based on DRL can achieve the near-minimal EC.

    Download PDF (2774K)
  • Weitao JIAN, Ming CAI, Wei HUANG, Shichang LI
    Article type: PAPER
    Subject area: Intelligent Transport System
    2023 Volume E106.A Issue 12 Pages 1555-1568
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: June 26, 2023
    JOURNAL FREE ACCESS

    Mobility as a Service (MaaS) is a smart mobility model that integrates mobility services to deliver transportation needs through a single interface, offering users flexible and personalizd mobility. This paper presents a structural approach for developing a MaaS system architecture under Autonomous Transportation Systems (ATS), which is a new transition from the Intelligent Transportation Systems (ITS) with emerging technologies. Five primary components, including system elements, user needs, services, functions, and technologies, are defined to represent the system architecture. Based on the components, we introduce three architecture elements: functional architecture, logical architecture and physical architecture. Furthermore, this paper presents an evaluation process, links the architecture elements during the process and develops a three-layer structure for system performance evaluation. The proposed MaaS system architecture design can help the administration make services planning and implement planned services in an organized way, and support further technical deployment of mobility services.

    Download PDF (3438K)
  • Atikur RAHMAN, Nozomi KINJO, Isao NAKANISHI
    Article type: PAPER
    Subject area: Biometrics
    2023 Volume E106.A Issue 12 Pages 1569-1576
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: June 19, 2023
    JOURNAL FREE ACCESS

    Person authentication using biometric information has recently become popular among researchers. User management based on biometrics is more reliable than that using conventional methods. To secure private information, it is necessary to build continuous authentication-based user management systems. Brain waves are suitable biometric modalities for continuous authentication. This study is based on biometric authentication using brain waves evoked by invisible visual stimuli. Invisible visual stimulation is considered over visual stimulation to overcome the obstacles faced by a user when using a system. Invisible stimuli are confirmed by changing the intensity of the image and presenting high-speed stimulation. To ensure invisibility, stimuli of different intensities were tested, and the stimuli with an intensity of 5% was confirmed to be invisible. To improve the verification performance, a continuous wavelet transform was introduced over the Fourier transform because it extracts both time and frequency information from the brain wave. The scalogram obtained by the wavelet transform was used as an individual feature and for synchronizing the template and test data. Furthermore, to improve the synchronization performance, the waveband was split based on the power distribution of the scalogram. A performance evaluation using 20 subjects showed an equal error rate of 3.8%.

    Download PDF (3598K)
  • Ho-Lim CHOI
    Article type: LETTER
    Subject area: Systems and Control
    2023 Volume E106.A Issue 12 Pages 1577-1579
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: June 12, 2023
    JOURNAL FREE ACCESS

    In this letter, we study the adaptive regulation problem for a chain of integrators in which there are different individual delays in measured feedback states for a controller. These delays are considered to be unknown and time-varying, and they can be arbitrarily fast-varying. We analytically show that a feedback controller with a dynamic gain can adaptively regulate a chain of integrators in the presence of unknown individual state delays. A simulation result is given for illustration.

    Download PDF (339K)
  • Shuichi FUKUNAGA
    Article type: LETTER
    Subject area: Systems and Control
    2023 Volume E106.A Issue 12 Pages 1580-1584
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: June 02, 2023
    JOURNAL FREE ACCESS

    The robust recursive identification method of ARX models is proposed using the beta divergence. The proposed parameter update law suppresses the effect of outliers using a weight function that is automatically determined by minimizing the beta divergence. A numerical example illustrates the efficacy of the proposed method.

    Download PDF (472K)
  • Masahiro KAMINAGA
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2023 Volume E106.A Issue 12 Pages 1585-1588
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: May 30, 2023
    JOURNAL FREE ACCESS

    This paper shows that upper bounds on the coefficients of the shortest vector of a lattice can be represented using the smallest eigenvalue of the Gram matrix for the lattice, obtains its distribution for high-dimensional random Goldstein-Mayer lattice, and applies it to determine the percentage of zeros of coefficient vector.

    Download PDF (278K)
  • Lin-Zhi SHEN, Yu-Jie WANG
    Article type: LETTER
    Subject area: Coding Theory
    2023 Volume E106.A Issue 12 Pages 1589-1592
    Published: December 01, 2023
    Released on J-STAGE: December 01, 2023
    Advance online publication: May 30, 2023
    JOURNAL FREE ACCESS

    For an [n, k, d] (r, δ)-locally repairable codes ((r, δ)-LRCs), its minimum distance d satisfies the Singleton-like bound. The construction of optimal (r, δ)-LRC, attaining this Singleton-like bound, is an important research problem in recent years for thier applications in distributed storage systems. In this letter, we use Reed-Solomon codes to construct two classes of optimal (r, δ)-LRCs. The optimal LRCs are given by the evaluations of multiple polynomials of degree at most r - 1 at some points in 𝔽q. The first class gives the [(r + δ - 1)t, rt - s, δ + s] optimal (r, δ)-LRC over 𝔽q provided that r + δ + s - 1≤q, s≤δ, s<r, and any positive t. The code length is unbounded. The second class gives the [r + r' + d + δ - 2, r + r', d] optimal (r, δ)-LRC over 𝔽q provided that r - r'd - δ and r + d - 1≤q + 1, which will produce optimal (r, δ)-LRCs with large minimum distance.

    Download PDF (191K)
feedback
Top