IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
E92.A 巻, 10 号
選択された号の論文の38件中1~38を表示しています
Special Section on Information Theory and Its Applications
Special Section on Nonlinear Theory and its Applications
  • Yoshihiko HORIO
    2009 年E92.A 巻10 号 p. 2498
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
  • Nariman Mahdavi MAZDEH, Mohammad Bagher MENHAJ, Heidar Ali TALEBI
    原稿種別: PAPER
    専門分野: Nonlinear Problems
    2009 年E92.A 巻10 号 p. 2499-2507
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    This paper presents a novel approach for robust impulsive synchronization of uncertain complex dynamical networks, each node of which possesses chaotic dynamics with different parameters perturbation and external disturbances as well as unknown but bounded network coupling effects. A new sufficient condition is proposed that guarantees the global robust synchronizing of such a network. Finally, the effectiveness of the proposed approach is evaluated by performing simulations on two illustrative examples.
  • Akira UTAGAWA, Tohru SAHASHI, Tetsuya ASAI, Yoshihito AMEMIYA
    原稿種別: PAPER
    専門分野: Nonlinear Problems
    2009 年E92.A 巻10 号 p. 2508-2513
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    We found a new class of stochastic resonance (SR) in a simple neural network that consists of i) photoreceptors generating nonuniform outputs for common inputs with random offsets, ii) an ensemble of noisy McCulloch-Pitts (MP) neurons each of which has random threshold values in the temporal domain, iii) local coupling connections between the photoreceptors and the MP neurons with variable receptive fields (RFs), iv) output cells, and v) local coupling connections between the MP neurons and the output cells. We calculated correlation values between the inputs and the outputs as a function of the RF size and intensities of the random components in photoreceptors and the MP neurons. We show the existence of “optimal noise intensities” of the MP neurons under the nonidentical photoreceptors and “nonzero optimal RF sizes, ” which indicated that optimal correlation values of this SR model were determined by two critical parameters; noise intensities (well-known) and RF sizes as a new parameter.
  • Hirosato SEKI, Fuhito MIZUGUCHI, Satoshi WATANABE, Hiroaki ISHII, Masa ...
    原稿種別: PAPER
    専門分野: Nonlinear Problems
    2009 年E92.A 巻10 号 p. 2514-2521
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    The single input rule modules connected fuzzy inference method (SIRMs method) by Yubazaki et al. can decrease the number of fuzzy rules drastically in comparison with the conventional fuzzy inference methods. Moreover, Seki et al. have proposed a functional-type SIRMs method which generalizes the consequent part of the SIRMs method to function. However, these SIRMs methods can not be applied to XOR (Exclusive OR). In this paper, we propose a “kernel-type SIRMs method” which uses the kernel trick to the SIRMs method, and show that this method can treat XOR. Further, a learning algorithm of the proposed SIRMs method is derived by using the steepest descent method, and compared with the one of conventional SIRMs method and kernel perceptron by applying to identification of nonlinear functions, medical diagnostic system and discriminant analysis of Iris data.
  • Hideki SATOH
    原稿種別: PAPER
    専門分野: Nonlinear Problems
    2009 年E92.A 巻10 号 p. 2522-2530
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    A method was developed for deriving the control input for a multi-dimensional discrete-time nonlinear system so that a performance index is approximately minimized. First, a moment vector equation (MVE) is derived; it is a multi-dimensional linear equation that approximates a nonlinear system in the whole domain of the system state and control input. Next, the performance index is approximated by using a quadratic form with respect to the moment vector. On the basis of the MVE and the quadratic form, an approximate optimal controller is derived by solving the linear quadratic optimal control problem. A bilinear optimal control problem and a mountain-car problem were solved using this method, and the solutions were nearly optimal.
  • Minglu JIANG, Zhangcai HUANG, Atsushi KUROKAWA, Shuai FANG, Yasuaki IN ...
    原稿種別: PAPER
    専門分野: Nonlinear Problems
    2009 年E92.A 巻10 号 p. 2531-2539
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    In deep submicron designs, predicting gate delays with interconnect load is a noteworthy work for Static Timing Analysis (STA). The effective capacitance Ceff concept and the Thevenin model that replaces the gate with a linear resistor and a voltage source are usually used to calculate the delay of gate with interconnect load. In conventional methods, it is not considered that the charges transferred into interconnect load and Ceff in the Thevenin model are not equal. The charge difference between interconnect load and Ceff has the large influence to the accuracy of computing Ceff. In this paper, an advanced effective capacitance model is proposed to consider the above problem in the Thevenin model, where the influence of the charge difference is modeled as one part of the effective capacitance to compute the gate delay. Experimental results show a significant improvement in accuracy when the charge difference between interconnect load and Ceff is considered.
  • Tatsuya KUWAZAKI, Jun SHIRATAKI, Makiko OKUMURA
    原稿種別: PAPER
    専門分野: Nonlinear Problems
    2009 年E92.A 巻10 号 p. 2540-2545
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    This paper presents the mixed time-frequency steady-state analysis method for efficient simulation of circuits whose excitation frequencies are widely separated. These circuits can be written by multitime partial differential equations. In this paper, an axis of the slow time-scale is formulated in the time domain and another axis of the fast time-scale is formulated in the frequency domain. We show that computational cost, however, is not dependent on the interval of frequencies, whereas for the harmonic balance or transient analysis, it increases as the interval of frequencies increases.
  • Tadatoshi SEKINE, Hideki ASAI
    原稿種別: PAPER
    専門分野: Nonlinear Problems
    2009 年E92.A 巻10 号 p. 2546-2553
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    This paper describes the application techniques of the latency insertion method (LIM) to CMOS circuit simulations. Though the existing LIM algorithm to CMOS circuit performs fast transient analysis, CMOS circuits are not modeled accurately. As a result, they do not provide accurate simulations. We propose a more accurate LIM scheme for the CMOS inverter circuit by adopting a more accurate model of the CMOS inverter characteristics. Moreover, we present the way to expand the LIM algorithm to general CMOS circuit simulations. In order to apply LIM to the general CMOS circuits which consist of CMOS NAND and NOR, we derive the updating formulas of the explicit form of the LIM algorithm. By using the explicit form of the LIM scheme, it becomes easy to take in the characteristics of CMOS NAND and NOR into the LIM simulations. As a result, it is confirmed that our techniques are useful and efficient for the simulations of CMOS circuits.
  • Kazuo HORIUCHI
    原稿種別: PAPER
    専門分野: Nonlinear Problems
    2009 年E92.A 巻10 号 p. 2554-2559
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    Let us introduce n (≥ 2) mappings fi(i = 1, …, n ≡ 0) defined on reflexive real Banach spaces Xi-1 and let fi : Xi-1Yi be completely continuous on bounded convex closed subsets $X_{i-1}^{(0)} \\subset X_{i-1}$. Moreover, let us introduce n set-valued mappings $F_i : X_{i-1} \\ imes Y_i \\ o {\\cal F}_c(X_i)$ (the family of all non-empty compact subsets of Xi), (i=1, …, n ≡ 0). Here, we have a fixed point theorem in weak topology on the successively recurrent system of set-valued mapping equations: xiFi(xi-1, fi(xi-1)), (i=1, …, n ≡ 0). This theorem can be applied immediately to analysis of the availability of system of circular networks of channels undergone by uncertain fluctuations and to evaluation of the tolerability of behaviors of those systems.
Regular Section
  • Nobumoto YAMANE, Motohiro TABUCHI, Yoshitaka MORIKAWA
    原稿種別: PAPER
    専門分野: Digital Signal Processing
    2009 年E92.A 巻10 号 p. 2560-2571
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    In this paper, an image restoration method using the Wiener filter is proposed. In order to bring the theory of the Wiener filter consistent with images that have spatially varying statistics, the proposed method adopts the locally adaptive Wiener filter (AWF) based on the universal Gaussian mixture distribution model (UNI-GMM) previously proposed for denoising. Applying the UNI-GMM-AWF for deconvolution problem, the proposed method employs the stationary Wiener filter (SWF) as a pre-filter. The SWF in the discrete cosine transform domain shrinks the blur point spread function and facilitates the modeling and filtering at the proceeding AWF. The SWF and UNI-GMM are learned using a generic training image set and the proposed method is tuned toward the image set. Simulation results are presented to demonstrate the effectiveness of the proposed method.
  • Seungwu HAN, Masaaki FUJIYOSHI, Hitoshi KIYA
    原稿種別: PAPER
    専門分野: Digital Signal Processing
    2009 年E92.A 巻10 号 p. 2572-2579
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    This paper proposes a novel reversible image authentication method that does not memorize the parameters for extracting embedded authentication data from an image. The proposed method once distorts an image to hide data for authentication into the image, it recovers the original image from the distorted image unless tamper is applied to the image, i.e., reversible. By comparing extracted data and data generated from the restored image, this method detects image tampering and further localizes tampered regions by the unit of block. The proposed method extracts hidden data without memorization of parameters used in its algorithm. This feature makes the proposed method practical. Whereas any method memorizing parameters faces severe problems with storage and management of parameters, according to the increase in the number of memorized parameters that is caused by serving accurate tamper localization and/or by applying itself to a huge number of image collection, e.g., video sequences. Simulation results show the effectiveness of the proposed method.
  • Suzana STOJKOVIC, Milena STANKOVIC, Radomir S. STANKOVIC
    原稿種別: PAPER
    専門分野: VLSI Design Technology and CAD
    2009 年E92.A 巻10 号 p. 2580-2587
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    Decision diagrams (DDs) are data structures commonly used for representation of discrete functions with large number of variables. Binary DDs (BDDs) are used for representation and manipulation with Boolean functions. Complexity of a BDD is usually measured by its size, that is defined as the number of non-terminal nodes in the BDD. Minimization of the sizes of DDs is a problem greatly considered in literature and many related algorithms (exact and heuristic) have been proposed. However, there are many functions for which BDDs when minimized are still large and can have even an exponential size in the number of variables. An approach to derive compact decision diagram representations for such functions is transformation of BDDs into Multi-valued DDs (MDDs) and Heterogeneous MDDs (HMDDs). Complexity of MDDs and HMDDs is measured by the cost which is a generalization of the notion of the size by taking into account complexity of nodes in MDDs and HMDDs. This paper presents a method for transformation of BDD into HMDD with minimal cost. The proposed method reduces the time for determination of the type of nodes in HMDDs by introducing a matrix expressing dependency (interconnections) among nodes at different levels. Comparing to other methods for conversion of BDDs into HMDDs, the method reduces the number of traverses of a BDD necessary for collecting enough information to construct an equivalent HMDD. For an experimental verification of its efficiency, the method is applied to construction of HMDDs for some benchmark functions and their arithmetic and Walsh spectra.
  • Liang ZHOU, Masahiko SHIMIZU
    原稿種別: PAPER
    専門分野: Communication Theory and Signals
    2009 年E92.A 巻10 号 p. 2588-2599
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    In this paper, we study low complexity transceiver for double space time transmit diversity (DSTTD) and orthogonal frequency division multiplexing (OFDM) system with antenna shuffling. Firstly, we propose a novel antenna shuffling method based on the criterion of minimizing the condition number of channel correlation matrix. The condition number is an indicator about the quality of the channel. By selecting the minimum of condition number which has better channel quality, consequently, a linear detector with respect to this new channel may achieve better performance results. A low complexity variant of the condition number calculation is also proposed, and it is shown that this criterion can be reduced to the minimum mean square error (MMSE) based criterion. Furthermore, the weighted soft decision Viterbi decoding is applied to mitigate noise enhancement inherent to zero forcing (ZF) and MMSE linear receivers and improve error rate performance. Next, we propose an algorithm to reduce the amount of feedback by exploiting the fact that the channel frequency responses across OFDM subcarriers are correlated. In the proposed algorithm, subcarriers are clustered in blocks, which are allocated the same shuffling pattern with the largest number of the shuffling patterns in the cluster. This way, the signaling overhead can be reduced in comparison with each subcarrier based feedback. Extensive simulations show that the proposed techniques for DSTTD-OFDM system outperform other existing techniques under both uncorrelated and highly spatial correlated frequency selective MIMO fading channels.
  • Hirokazu TANAKA, Kyung Woon JANG, Shoichiro YAMASAKI, Miki HASEYAMA
    原稿種別: PAPER
    専門分野: Spread Spectrum Technologies and Applications
    2009 年E92.A 巻10 号 p. 2600-2608
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    In this paper, an error correction scheme suitable for MC-DS-CDMA system with bi-orthogonal modulation is proposed. The input sequence of a bi-orthogonal modulator consists of n - 1 bit code selection bit sequence and 1 bit sign bit sequence. In order to apply an efficient error correction code, the following points should be considered; (1) if the code selection bits can be protected sufficiently, the sign bit error can also be reduced sufficiently, (2) since a code selection bit sequence consists of n - 1 bits, employing a symbol error correcting code is more effective for encoding code selection bits, (3) the complexity of the error correction encoder and decoder implementations should be minimum. Based on these conditions, we propose to employ Reed-Solomon (RS) code for encoding the code selection bits and no error correction code for the sign bit. Additionally, detection algorithm at the bi-orthogonal demodulator is modified for compensating degradations of the sign bit error rate performance. The performance in an Additive White Gaussian Noise (AWGN) channel is evaluated by both theoretical analysis and computer simulations. The performance evaluations by simulations on multi-path fading channels are also shown. It is shown that the proposed scheme has remarkable improvement.
  • Toshihiro HORI, Tomotaka WADA, Norie UCHITOMI, Kouichi MUTSUURA, Hirom ...
    原稿種別: PAPER
    専門分野: Mobile Information Network and Personal Communications
    2009 年E92.A 巻10 号 p. 2609-2617
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    The RFID tag system has received attention as an identification source. Each RFID tag is attached to some object. With the unique ID of the RFID tag, a user identifies the object provided with the RFID tag, and derives appropriate information about the object. One of important applications of the RFID technology is the position estimation of RFID tags. It can be very useful to acquire the location information concerning the RFID tags. It can be applied to navigation systems and positional detection systems for robots etc. In this paper, we propose a new position estimation method of RFID tags by using a probabilistic approach. In this method, mobile objects (person and robot, etc.) with RFID readers estimate the positions of RFID tags with multiple communication ranges. We show the effectiveness of the proposed method by computer simulations.
  • Feng WEN, Mitsuo GEN
    原稿種別: PAPER
    専門分野: Intelligent Transport System
    2009 年E92.A 巻10 号 p. 2618-2625
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    The multiobjective route selection problem (m-RSP) is a key research topic in the car navigation system (CNS) for ITS (Intelligent Transportation System). In this paper, we propose an interactive multistage weight-based Dijkstra genetic algorithm (mwD-GA) to solve it. The purpose of the proposed approach is to create enough Pareto-optimal routes with good distribution for the car driver depending on his/her preference. At the same time, the routes can be recalculated according to the driver's preferences by the multistage framework proposed. In the solution approach proposed, the accurate route searching ability of the Dijkstra algorithm and the exploration ability of the Genetic algorithm (GA) are effectively combined together for solving the m-RSP problems. Solutions provided by the proposed approach are compared with the current research to show the effectiveness and practicability of the solution approach proposed.
  • Sheng WU, Xiaojun QIU
    原稿種別: LETTER
    専門分野: Digital Signal Processing
    2009 年E92.A 巻10 号 p. 2626-2628
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    This letter proposes a windowing frequency domain adaptive algorithm, which reuses the filtering error to apply window function in the filter updating symmetrically. By using a proper window function to reduce the negative influence of the spectral leakage, the proposed algorithm can significantly improve the performance of the acoustic echo cancellation for speech signals.
  • Gu-Min JEONG, Chong-Ho CHOI, Hyun-Sik AHN
    原稿種別: LETTER
    専門分野: Systems and Control
    2009 年E92.A 巻10 号 p. 2629-2632
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    This letter investigates an ADILC (Iterative Learning Control with Advanced Output Data) scheme for nonminimum phase systems using a partially known impulse response. ADILC has a simple learning structure that can be applied to both minimum phase and nonminimum phase systems. However, in the latter case, the overall control time horizon must be considered in the input update law, which makes the dimension of the matrices in the convergence condition very large. Also, this makes it difficult to find a proper learning gain matrix. In this letter, a new sufficient condition is derived from the convergence condition, which can be used to find the learning gain matrix for nonminimum phase systems if we know the first part of the impulse response up to a sufficient order. Based on this, an iterative learning control scheme is proposed using the estimation of the first part of the impulse response for nonminimum phase systems.
  • Qichun WANG, Xiangyang XUE, Haibin KAN
    原稿種別: LETTER
    専門分野: Cryptography and Information Security
    2009 年E92.A 巻10 号 p. 2633-2637
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    It is known that Boolean functions used in stream ciphers should have good cryptographic properties to resist fast algebraic attacks. In this paper, we study a new class of Boolean functions with good cryptographic properties: balancedness, optimum algebraic degree, optimum algebraic immunity and a high nonlinearity.
  • Tsu-Yang WU, Yuh-Min TSENG
    原稿種別: LETTER
    専門分野: Cryptography and Information Security
    2009 年E92.A 巻10 号 p. 2638-2640
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    In PKC 2004, Choi et al. proposed an ID-based authenticated group key agreement (AGKA) protocol using bilinear pairings. Unfortunately, their protocol suffered from an impersonation attack and an insider colluding attack. In 2008, Choi et al. presented an improvement to resist insider attacks. In their modified protocol, they used an ID-based signature scheme on transcripts for binding them in a session to prevent replay of transcripts. In particular, they smartly used the batch verification technique to reduce the computational cost. In this paper, we first show that Choi et al.'s modified AGKA protocol still suffers from an insider colluding attack. Then, we prove that the batch verification of the adopted ID-based signature scheme in their modified protocol suffers from a forgery attack.
  • JungYeon HWANG, Taek-Young YOUN, Willy SUSILO
    原稿種別: LETTER
    専門分野: Cryptography and Information Security
    2009 年E92.A 巻10 号 p. 2641-2643
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    Recently, several ID-based key sharing schemes have been proposed, where an initiation phase generates users' secret key associated with identities under the hardness of integer factorization. In this letter, we show that, unfortunately any key sharing scheme with this initiation phase is intrinsically insecure in the sense that the collusion of some users enables them to derive master private keys and hence, generating any user's secret key.
  • Xi ZHANG, Min-Rong CHEN
    原稿種別: LETTER
    専門分野: Cryptography and Information Security
    2009 年E92.A 巻10 号 p. 2644-2647
    発行日: 2009/10/01
    公開日: 2009/10/01
    ジャーナル 認証あり
    To enable fine-grained delegations for proxy re-encryption systems, in AsiaCCS'09, Weng et al.'s introduced the concept of conditional proxy re-encryption (C-PRE), in which the proxy can convert a ciphertext only if a specified condition is satisfied. Weng et al. also proposed a C-PRE scheme, and claimed that their scheme is secure against chosen-ciphertext attack (CCA). In this paper, we show that their scheme is not CCA-secure under their defined security model.
feedback
Top