IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E95.A, Issue 9
Displaying 1-30 of 30 articles from this issue
Special Section on Software Reliability Engineering
  • Tadashi DOHI
    2012 Volume E95.A Issue 9 Pages 1449-1450
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    Download PDF (239K)
  • Ngoc Hung PHAM, Viet Ha NGUYEN, Toshiaki AOKI, Takuya KATAYAMA
    Article type: PAPER
    2012 Volume E95.A Issue 9 Pages 1451-1460
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    The minimized assumption generation has been recognized as an important improvement of the assume-guarantee verification method in order to generate minimal assumptions. The generated minimal assumptions can be used to recheck the whole component-based software at a lower computational cost. The method is not only fitted to component-based software but also has a potential to solve the state space explosion problem in model checking. However, the computational cost for generating the minimal assumption is very high so the method is difficult to be applied in practice. This paper presents an optimization as a continuous work of the minimized assumption generation method in order to reduce the complexity of the method. The key idea of this method is to find a smaller assumption in a sub-tree of the search tree containing the candidate assumptions using the depth-limited search strategy. With this approach, the improved method can generate assumptions with a lower computational cost and consumption memory than the minimized method. The generated assumptions are also effective for rechecking the systems at much lower computational cost in the context of software evolution. An implemented tool supporting the improved method and experimental results are also presented and discussed.
    Download PDF (1448K)
  • Shinya IKEMOTO, Tadashi DOHI
    Article type: PAPER
    2012 Volume E95.A Issue 9 Pages 1461-1468
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    An exponential regression-based model with stochastic intensity is developed to describe the software reliability growth phenomena, where the software testing metrics depend on the intensity process. For such a generalized modeling framework, the common maximum likelihood method cannot be applied any more to the parameter estimation. In this paper, we propose to use the pseudo maximum likelihood method for the parameter estimation and to seek not only the model parameters but also the software reliability measures approximately. It is shown in numerical experiments with real software fault data that the resulting software reliability models based on four parametric approximations provide the better goodness-of-fit performance than the common non-homogeneous Poisson process models without testing metric information.
    Download PDF (1637K)
  • Koichi TOKUNO, Shigeru YAMADA
    Article type: PAPER
    2012 Volume E95.A Issue 9 Pages 1469-1477
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    In this paper, we discuss the stochastic modeling for operational software reliability measurement, assuming that the testing environment is originally different from the user operation one. In particular, we introduce the concept of systemability which is defined as the reliability characteristic subject to the uncertainty of the field operational environment into the model. First we introduce the environmental factor to consistently bridge the gap between the software failure-occurrence characteristics during the testing and the operation phases. Then we consider the randomness of the environmental factor, i.e., the environmental factor is treated as a random-distributed variable. We use the Markovian imperfect debugging model to describe the software reliability growth phenomena in the testing and the operation phases. We derive the analytical solutions of the several operational software reliability assessment measures which are given as the functions of time and the number of debuggings. Finally, we show several numerical illustrations to investigate the impacts of the consideration of systemability on the field software reliability evaluation.
    Download PDF (521K)
  • Passakorn PHANNACHITTA, Akinori IHARA, Pijak JIRAPIWONG, Masao OHIRA, ...
    Article type: PAPER
    2012 Volume E95.A Issue 9 Pages 1478-1489
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    Nowadays, software development societies have given more precedence to Open Source Software (OSS). There is much research aimed at understanding the OSS society to sustain the OSS product. To lead an OSS project to a successful conclusion, researchers study how developers change source codes called patches in project repositories. In existing studies, we found an argument in the conventional patch acceptance detection procedure. It was so simplified that it omitted important cases from the analysis, and would lead researchers to wrong conclusions. In this research, we propose an algorithm to overcome the problem. To prove out our algorithm, we constructed a framework and conducted two case studies. As a result, we came to a new and interesting understanding of patch activities.
    Download PDF (1980K)
  • Xiao XIAO, Tadashi DOHI
    Article type: PAPER
    2012 Volume E95.A Issue 9 Pages 1490-1497
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    The non-homogeneous Poisson process (NHPP) has been applied successfully to model nonstationary counting phenomena for a large class of problems. In software reliability engineering, the NHPP-based software reliability models (SRMs) are of a very important class. Since NHPP is characterized by its rate (intensity) function, which is known as the software failure rate of NHPP-based SRM, it is of great interest to estimate accurately the rate function from observed software failure data. In the existing work the same authors introduced a Haar-wavelet-based technique for this problem and found that the Haar wavelet transform provided a very powerful performance in estimating software failure rate. In this paper, we consider the application potentiality of a Daubechies wavelet estimator in the estimation of software failure rate, given the software failure time data. We give practical solutions by overcoming technical difficulties in applying the Daubechies wavelet estimator to the real software failure time data.
    Download PDF (729K)
  • Myrizki SANDHI YUDHA, Ryohei ASANO, Hirohisa AMAN
    Article type: LETTER
    2012 Volume E95.A Issue 9 Pages 1498-1500
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    Code clones are duplicated or similar code fragments, and they have been known as major entities affecting the software maintainability. Sometimes there are “co-changes” in pair of code clones: when a code fragment is changed, the clone of the fragment is also changed. Such a co-change is one of key event to discuss the successful management of code clone. This paper analyzes the trends of co-changed code clones by using the length and the content of code clones. The empirical results show that: (1) there would be a specific length of clone to be mostly co-changed (around 60-100 tokens), and (2) code clones without any “control flow keywords” have a higher possibility to be co-changed than the others.
    Download PDF (92K)
  • Toru NANBA, Tatsuhiro TSUCHIYA, Tohru KIKUNO
    Article type: LETTER
    2012 Volume E95.A Issue 9 Pages 1501-1505
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    This letter discusses the applicability of boolean satisfiability (SAT) solving to pairwise testing in practice. Due to its recent rapid advance, using SAT solving seems a promising approach for search-based testing and indeed has already been practiced in test generation for pairwise testing. The previous approaches use SAT solving either for finding a small test set in the absence of parameter constraints or handling constraints, but not for both. This letter proposes an approach that uses a SAT solver for constructing a test set for pairwise testing in the presence of parameter constraints. This allows us to make full use of SAT solving for pairwise testing in practice.
    Download PDF (90K)
Regular Section
  • Yen-Ching CHANG, Liang-Hwa CHEN, Li-Chun LAI, Chun-Ming CHANG
    Article type: PAPER
    Subject area: Digital Signal Processing
    2012 Volume E95.A Issue 9 Pages 1506-1511
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    Discrete-Time fractional Brownian motion (DFBM) and its increment process, called discrete-time fractional Gaussian noise (DFGN), are usually used to describe natural and biomedical phenomena. These two processes are dominated by one parameter, called the Hurst exponent, which needs to be estimated in order to capture the characteristics of physical signals. In the previous work, a variance estimator for estimating the Hurst exponent directly via DFBM was provided, and it didn't consider point selection for linear regression. Since physical signals often appear to be DFGN-type, not DFBM-type, it is imperative to first transform DFGN into DFBM in real applications. In this paper, we show that the variance estimator possesses another form, which can be estimated directly via the autocorrelation functions of DFGN. The above extra procedure of transforming DFGN into DFBM can thus be avoided. On the other hand, the point selection for linear regression is also considered. Experimental results show that 4-point linear regression is almost optimal in most cases. Therefore, our proposed variance estimator is more efficient and accurate than the original one mentioned above. Besides, it is also superior to AR and MA methods in speed and accuracy.
    Download PDF (1339K)
  • Koichi KOBAYASHI, Kunihiko HIRAISHI
    Article type: PAPER
    Subject area: Systems and Control
    2012 Volume E95.A Issue 9 Pages 1512-1517
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    In this paper, the optimal control problem of a probabilistic Boolean network (PBN), which is one of the significant models in gene regulatory networks, is discussed. In the existing methods of optimal control for PBNs, it is necessary to compute state transition diagrams with 2n nodes for a given PBN with n states. To avoid this computation, a polynomial optimization approach is proposed. In the proposed method, a PBN is transformed into a polynomial system, and the optimal control problem is reduced to a polynomial optimization problem. Since state transition diagrams are not computed, the proposed method is convenient for users.
    Download PDF (484K)
  • Ryohei HORI, Tatsuya KITAMORI, Taisuke UEOKA, Masaya YOSHIKAWA, Takesh ...
    Article type: PAPER
    Subject area: VLSI Design Technology and CAD
    2012 Volume E95.A Issue 9 Pages 1518-1528
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    Various kinds of structured ASICs have been proposed that can customize logic functions using a few photomasks, which decreases the initial cost, especially that of expensive photo-masks. In the past, we have developed a via programmable structured ASIC “VPEX2” (Via Programmable logic device using EXclusive-or array) that is capable of changing logics on 2 via (the 1st and 3rd via) layers. The logic element (LE) of VPEX2 is composed of EXOR gate and 2 NOT gates. However, “VPEX2” architecture has the two important penalty, the area penalty is 5-6 times that of the ASIC and wiring congestion by detouring wires to avoid I/O terminals. In this paper, we propose a new architecture “VPEX3” in order to achieve the practical structures. In VPEX3, we applied three techniques for decrease area penalty and higher wiring efficiency: (1) LE area is reduced approximately 60% by omitting 1 NOT gate on a LE and the gate width reduction, (2) the kinds of configurable logic function on a single LE is increased from 13 to 22 by introducing “flexible AOI gate technique” and (3) flexible I/O terminal by introducing 2nd via as a programmable layers. Furthermore, the delay model for via programmable wiring is necessary in order to evaluate via programmable wiring architecture compared to standard cell ASIC. We extracted wiring delay characteristics from the ring oscillator test circuit using both of normal wiring and via-programmable wiring. These three new architectures and via programmable wiring-delay-model revealed that an area-delay product of “VPEX3” is as small as twice that of ASIC. Chip-cost estimation among FPGA, “VPEX2”, “VPEX3” and ASIC revealed that the “VPEX3” is the most cost-effective architecture for Systems-on-chips (SoCs) whose production volume is from one thousand to several tens of thousands units.
    Download PDF (2359K)
  • Nan LIU, Song CHEN, Takeshi YOSHIMURA
    Article type: PAPER
    Subject area: VLSI Design Technology and CAD
    2012 Volume E95.A Issue 9 Pages 1529-1537
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    Heterogeneous resources such as configurable logic blocks (CLBs), multiplier blocks (MULs) and RAM blocks (RAMs) where millions of logic gates are included have been added to field programmable gate arrays (FPGAs). The fixed-outline floorplanning used by the existing methods always has a big penalty item in the objective function to ensure all the modules are placed in the specified chip region, which maybe greatly degrade the wirelength. This paper presents a three-phase floorplanning method for heterogeneous FPGAs. First, a non-slicing free-outline floorplanning method is used to optimize the wirelength, however, in this phase, the satisfaction of resource requirements from functional modules might fail. Second, a min-cost-max-flow algorithm is used to tune the assignment of CLBs to functional modules, and assign contiguous regions to each module so that all the functional modules satisfy CLB requirements. Finally, the MULs and RAMs are allocated to modules by a network flow model. CLBs hold the maximum quantity among all the resources. Therefore, making a high utilization of them means an enhancement of the FPGA densities. The proposed method can improve the utilization of CLBs, hence, much larger circuits could be mapped to the same FPGA chip. The results show that about 7-85% wirelength reduction is obtained, and CLB utilization is improved by about 25%.
    Download PDF (3594K)
  • Seungju LEE, Masao YANAGISAWA, Nozomu TOGAWA
    Article type: PAPER
    Subject area: VLSI Design Technology and CAD
    2012 Volume E95.A Issue 9 Pages 1538-1549
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    Network-on-chip (NoC) architectures have emerged as a promising solution to the lack of scalability in multi-processor systems-on-chips (MPSoCs). With the explosive growth in the usage of multimedia applications, it is expected that NoC serves as a multimedia server supporting multi-class services. In this paper, we propose a configuration algorithm for a hybrid bus-NoC architecture together with simulation results. Our target architecture is a hybrid bus-NoC architecture, called busmesh NoC, which is a generalized version of a hybrid NoC with local buses. In our BMNoC configuration algorithm, cores which have a heavy communication volume between them are mapped in a cluster node (CN) and connected by a local bus. CNs can have communication with each other via edge switches (ESes) and mesh routers (MRs). With this hierarchical communication network, our proposed algorithm can improve the latency as compared with conventional methods. Several realistic applications applied to our algorithm illustrate the better performance than earlier studies and feasibility of our proposed algorithm.
    Download PDF (1729K)
  • HyungChul KANG, Deukjo HONG, Dukjae MOON, Daesung KWON, Jaechul SUNG, ...
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2012 Volume E95.A Issue 9 Pages 1550-1560
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    We present attacks on the generalized Feistel schemes, where each round function consists of a subkey XOR, S-boxes, and then a linear transformation (i.e. a Substitution-Permutation (SP) round function). Our techniques are based on rebound attacks. We assume that the S-boxes have a good differential property and the linear transformation has an optimal branch number. Under this assumption, we firstly describe known-key distinguishers on the type-1, -2, and -3 generalized Feistel schemes up to 21, 13 and 8 rounds, respectively. Then, we use the distinguishers to make several attacks on hash functions where Merkle-Damgård domain extender is used and the compression function is constructed with Matyas-Meyer-Oseas or Miyaguchi-Preneel hash modes from generalized Feistel schemes. Collision attacks are made for 11 rounds of type-1 Feistel scheme. Near collision attacks are made for 13 rounds of type-1 Feistel scheme and 9 rounds of type-2 Feistel scheme. Half collision attacks are made for 15 rounds of type-1 Feistel scheme, 9 rounds of type-2 Feistel scheme, and 5 rounds of type-3 Feistel scheme.
    Download PDF (1732K)
  • Masakazu YOSHIDA, Manabu HAGIWARA, Takayuki MIYADERA, Hideki IMAI
    Article type: PAPER
    Subject area: Information Theory
    2012 Volume E95.A Issue 9 Pages 1561-1569
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    Entangled states play crucial roles in quantum information theory and its applied technologies. In various protocols such as quantum teleportation and quantum key distribution, a good entangled state shared by a pair of distant players is indispensable. In this paper, we numerically examine entanglement sharing protocols using quantum LDPC CSS codes. The sum-product decoding method enables us to detect uncorrectable errors, and thus, two protocols, Detection and Resending (DR) protocol and Non-Detection (ND) protocol are considered. In DR protocol, the players abort the protocol and repeat it if they detect the uncorrectable errors, whereas in ND protocol they do not abort the protocol. We show that DR protocol yields smaller error rate than ND protocol. In addition, it is shown that rather high reliability can be achieved by DR protocol with quantum LDPC CSS codes.
    Download PDF (1286K)
  • Xubo ZHAO, Wangmei GUO
    Article type: PAPER
    Subject area: Coding Theory
    2012 Volume E95.A Issue 9 Pages 1570-1576
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    In this paper, the correspondence between the weighted line graph and the Mason signal flow graph (MSFG) has been established, which gives an interpretation of a convolutional network code (CNC) over a cyclic network from a different perspective. Furthermore, by virtue of Mason theorem, we present two new equivalent conditions to evaluate whether the global encoding kernels (GEKs) can be uniquely determined by the given complete set of local encoding kernels (LEKs) in a CNC over a cyclic network. These two new equivalent conditions turn out to be more intuitive. Moreover, we give an alternative simple proof of an existing result.
    Download PDF (596K)
  • Hideyuki TORII, Takahiro MATSUMOTO, Makoto NAKAMURA
    Article type: PAPER
    Subject area: Spread Spectrum Technologies and Applications
    2012 Volume E95.A Issue 9 Pages 1577-1586
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    The present paper proposes a new method for constructing polyphase asymmetric zero-correlation zone (A-ZCZ) sequence sets. The proposed method can generate A-ZCZ sequence sets that cannot be obtained from methods proposed by other researchers and is a generalized version of our previously proposed method. An A-ZCZ sequence set can be regarded as a ZCZ sequence set. The newly obtained A-ZCZ sequence sets include quasi-optimal ZCZ sequence sets of which the zero-cross-correlation zone (ZCCZ) length between different sequence subsets is larger than the mathematical upper bound of conventional ZCZ sequence sets. A new method for extending the A-ZCZ sequence sets is also presented in the present paper.
    Download PDF (345K)
  • Jiangping HE, Wei SONG, Hongwei JI, Xin YANG
    Article type: PAPER
    Subject area: Image
    2012 Volume E95.A Issue 9 Pages 1587-1595
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    This paper presents a Microscopic Local Binary Pattern (MLBP) for texture classification. The conventional LBP methods which rely on the uniform patterns discard some texture information by merging the nonuniform patterns. MLBP preserves the information by classifying the nonuniform patterns using the structure similarity at microscopic level. First, the nonuniform patterns are classified into three groups using the macroscopic information. Second, the three groups are individually divided into several subgroups based on the microscopic structure information. The experiments show that MLBP achieves a better result compared with the other LBP related methods.
    Download PDF (4113K)
  • Manato FUJIMOTO, Tomotaka WADA, Atsuki INADA, Kouichi MUTSUURA, Hiromi ...
    Article type: PAPER
    Subject area: Measurement Technology
    2012 Volume E95.A Issue 9 Pages 1596-1605
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    Radio frequency identification (RFID) system has gained attention as a new identification source that achieves a ubiquitous environment. Each RFID tag has a unique ID and is attached to an object. A user reads the unique ID of an RFID tag by using RFID readers and obtains the information on the object. One of the important technologies that use the RFID systems is the position estimation of RFID tags. Position estimation means estimating the location of the object with the RFID tag. Acquiring the location information of the RFID tag can be very useful. If a user can know the position of the RFID tag, the position estimation can be applied to a navigation system for walkers. In this paper, we propose a new position estimation method named Swift Communication Range Recognition (S-CRR) as an extended improvement on previous CRR that shortens the estimation delay. In this method, the position of an RFID tag is estimated by selecting the communication area model that corresponds to its boundary angles. We evaluated its performance by experiments and simulations of the RFID system. As the results, we found that S-CRR can estimate the position of an RFID tag comparatively accurately and quickly.
    Download PDF (3695K)
  • Kun-Ching WANG
    Article type: LETTER
    Subject area: Engineering Acoustics
    2012 Volume E95.A Issue 9 Pages 1606-1609
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    A novel long-term sub-band entropy (LT-SubEntropy) measure, which uses improved long-term spectral analysis and sub-band entropy, is proposed for voice activity detection (VAD). Based on the measure, we can accurately exploit the inherent nature of the formant structure on speech spectrogram (the well-known as voiceprint). Results show that the proposed VAD is superior to existing standard VAD methods at low SNR levels, especially at variable-level noise.
    Download PDF (399K)
  • Sang Ha PARK, Seokjin LEE, Koeng-Mo SUNG
    Article type: LETTER
    Subject area: Engineering Acoustics
    2012 Volume E95.A Issue 9 Pages 1610-1614
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    Non-negative matrix factorization (NMF) is widely used for music transcription because of its efficiency. However, the conventional NMF-based music transcription algorithm often causes harmonic confusion errors or time split-up errors, because the NMF decomposes the time-frequency data according to the activated frequency in its time. To solve these problems, we proposed an NMF with temporal continuity and harmonicity constraints. The temporal continuity constraint prevented the time split-up of the continuous time components, and the harmonicity constraint helped to bind the fundamental with harmonic frequencies by reducing the additional octave errors. The transcription performance of the proposed algorithm was compared with that of the conventional algorithms, which showed that the proposed method helped to reduce additional false errors and increased the overall transcription performance.
    Download PDF (375K)
  • Min ZHU, Huigang WANG, Guoyue CHEN, Kenji MUTO
    Article type: LETTER
    Subject area: Noise and Vibration
    2012 Volume E95.A Issue 9 Pages 1615-1618
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    It is shown that simple preprocessing on the reference signals in multichannel feedforward ANC system can improve the convergence performance of the adaptive ANC algorithm. A fast and efficient blind preprocessing algorithm in frequency domain is proposed to reduce the computational complexity even that the reference sensors are located far from the noise sources. The permutation problem at different frequency bin is also addressed and solved by an independent vector analysis algorithm. The basic principle and performance comparison are given to verify our conclusion.
    Download PDF (341K)
  • Xun-yong ZHANG, Chen HE, Ling-ge JIANG
    Article type: LETTER
    Subject area: Digital Signal Processing
    2012 Volume E95.A Issue 9 Pages 1619-1622
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    In this paper, we propose a successive signal-to-leakage-plus-noise ratio (SLNR) based precoding with geometric mean decomposition (GMD) for the downlink multi-user multiple-input multiple-output (MU-MIMO) systems. The known leakages are canceled at the transmit side, and SLNR is calculated with the unknown leakages. GMD is applied to cancel the known leakages, so the subchannels for each receiver have equal gain. We further improve the proposed precoding scheme by ordering users. Simulation results show that the proposed schemes have a considerable bit error rate (BER) improvement over the original SLNR scheme.
    Download PDF (299K)
  • Hyun-Do KIM, Ho-Lim CHOI
    Article type: LETTER
    Subject area: Systems and Control
    2012 Volume E95.A Issue 9 Pages 1623-1626
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    In this letter, we consider a control problem of a chain of integrators by output feedback under sensor noise. First, we introduce a measurement output feedback controller which drives all states and output of the considered system to arbitrarily small bounds. Then, we suggest a measurement output feedback controller coupled with a switching gain-scaling factor in order to improve the transient response and retain the same arbitrarily small ultimate bounds as well. An example is given to show the advantage of the proposed control method.
    Download PDF (179K)
  • Katsumi KONISHI
    Article type: LETTER
    Subject area: Systems and Control
    2012 Volume E95.A Issue 9 Pages 1627-1630
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    This letter proposes a simple heuristic to identify the discrete-time switched autoregressive exogenous (SARX) systems. The goal of the identification is to identify the switching sequence and the system parameters of all submodels simultaneously. In this letter the SARX system identification problem is formulated as the l0 norm minimization problem, and an iterative algorithm is proposed by applying the reweighted least squares technique. Although the proposed algorithm is heuristic, the numerical examples show its efficiency and robustness for noise.
    Download PDF (295K)
  • Kwangsu LEE, Jong Hwan PARK, Dong Hoon LEE
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2012 Volume E95.A Issue 9 Pages 1631-1636
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    Recently, Luo et al. proposed an efficient hierarchical identity based encryption (HIBE) scheme with constant size of ciphertexts, and proved its full security under standard assumptions. To construct the scheme, they used the dual system encryption technique of Waters, and devised a method that compresses the tag values of dual system encryption. In this paper, we show that the security proof of Luo et al. is wrong since there exists an algorithm that distinguishes whether it is a simulation or not.
    Download PDF (112K)
  • Zhihua NIU, Zhe LI, Zhixiong CHEN, Tongjiang YAN
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2012 Volume E95.A Issue 9 Pages 1637-1641
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    The linear complexity and its stability of periodic sequences are of fundamental importance as measure indexes on the security of stream ciphers and the k-error linear complexity reveals the stability of the linear complexity properly. Recently, Zhou designed an algorithm for computing the k-error linear complexity of 2pn periodic sequences over GF(q). In this paper, we develop a genetic algorithm to confirm that one can't get the real k-error linear complexity for some sequenes by the Zhou's algorithm. Analysis indicates that the Zhou's algorithm is unreasonable in some steps. The corrected algorithm is presented. Such algorithm will increase the amount of computation, but is necessary to get the real k-error linear complexity. Here p and q are odd prime, and q is a primitive root (modp2).
    Download PDF (220K)
  • Ziming HE, Yi MA, Rahim TAFAZOLLI
    Article type: LETTER
    Subject area: Information Theory
    2012 Volume E95.A Issue 9 Pages 1642-1645
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    This letter presents a novel opportunistic cooperative positioning approach for orthogonal frequency-division multiple access (OFDMA) systems. The basic idea is to allow idle mobile terminals (MTs) opportunistically estimating the arrival timing of the training sequences for uplink synchronization from active MTs. The major advantage of the proposed approach over state-of-the-arts is that the positioning-related measurements among MTs are performed without the paid of training overhead. Moreover, Cramér-Rao lower bound (CRLB) is utilized to derive the positioning accuracy limit of the proposed approach, and the numerical results show that the proposed approach can improve the accuracy of non-cooperative approaches with the a-priori stochastic knowledge of clock bias among idle MTs.
    Download PDF (439K)
  • Yubo LI, Chengqian XU, Kai LIU, Gang LI, Sai YU
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2012 Volume E95.A Issue 9 Pages 1646-1650
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    In this correspondence, we devise a new method for constructing a ternary column sequence set of length 3m+1-1 form ternary sequences of period 3m-1 with ideal autocorrelation, and the ternary LCZ sequence set of period 3n-1 is constructed by using the column sequence set when (m+1)|n. In addition, the method is popularized to the p-ary LCZ sequence. The resultant LCZ sequence sets in this paper are optimal with respect to the Tang-Fan-Matsufuji bound.
    Download PDF (102K)
  • Chanwoo PARK, Jungwoo LEE
    Article type: LETTER
    Subject area: Intelligent Transport System
    2012 Volume E95.A Issue 9 Pages 1651-1654
    Published: September 01, 2012
    Released on J-STAGE: September 01, 2012
    JOURNAL RESTRICTED ACCESS
    The research on driverless cars has been making much progress lately. In this paper, we propose a new traffic control system without traffic lights at an intersection. We assume a system with fully autonomous driverless cars, and infrastructure to avoid collision completely. When automobiles approach an intersection, they communicates with the access point in both random access mode and polling mode, and the movement of the automobiles will be coordinated by the infra structure (access point). Traffic congestion is very difficult to predict and deal with because it is a function of many unknown factors such as number of cars, weather, road conditions, accidents, etc. The proposed algorithm is designed for urban road networks to ease the congestion, and make it more predictable at the same time. A key idea of this paper is that IEEE 802.11 DCF/PCF mechanisms are used to control traffic flow for driverless cars when there are no traffic lights at an intersection. The algorithm uses the concept of contention/contention-free period of IEEE 802.11 to find a balance between the efficiency of traffic flow and the fairness between users.
    Download PDF (429K)
feedback
Top