-
Hiroshi YASUKAWA, Akira ASANO
2014 Volume E97.A Issue 11 Pages
2095-2096
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
-
Yuki TANAKA, Yukitoshi SANADA
Article type: PAPER
2014 Volume E97.A Issue 11 Pages
2097-2106
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
Wireless communications for the control of industrial equipments need to send a large amount of short packets frequently and to improve frame efficiency. The OFDM frame of wireless local area networks has short preambles that are used for timing synchronization and coarse frequency offset estimation. As the short preambles are repeated in a time domain, they occupies subcarriers intermittently. Therefore, in this paper, a new frame format with OFDM modulation in which data symbols are orthogonally multiplexed with the preamble symbols in the frequency domain is proposed. Two preamble sequences that are based on an IEEE802.11g short preamble sequence and a Zadoff-Chu sequence are examined. The ratio of transmission powers between the pilot subcarrier and the data subcarrier is also varied. The timing synchronization probability with those sequences has been evaluated on different channel models. It is shown through the experiment that the synchronization performance is almost the same as that without data multiplexing at
Es/
N0 of more than 8dB.
View full abstract
-
Wannida SAE-TANG, Shenchuan LIU, Masaaki FUJIYOSHI, Hitoshi KIYA
Article type: PAPER
2014 Volume E97.A Issue 11 Pages
2107-2113
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
In this paper, a compression-friendly copyright- and privacy-protected image trading system is proposed. In the image trading system, the copyright of the image and the consumer's privacy is important. In addition, it should preserve existing image compression standards. In the proposed method, for privacy protection, the content provider (CP) multiplies random signs to the discrete wavelet transformed (DWTed) coefficients of an image to generate the visually encrypted image. The proposed visually protected images can be efficiently compressed by using JPEG 2000 which compresses the image in the DWTed domain as well. For copyright protection, the trusted third party (TTP) applies digital fingerprinting to the image in the encrypted domain. While in the conventional system, the amplitude-only image (AOI) which is the inversely transformed amplitude spectra of an image is used for privacy protection. Since, the AOI consists of real numbers, to store and transmit the AOI, it has to be quantized before compression. Therefore, quantization errors cannot be avoided in the conventional system. On the other hand, the proposed method applies the digital fingerprint in the DWTed domain, so clipping errors in decoding the image by the TTP is avoided. In addition, only a seed number which is input to a pseudo random number generator is shared between the CP and the consumer, whereas an extra image is shared in the conventional systems. Experimental results show that the proposed system is efficient in terms of privacy protection, compression performance, quality of fingerprinted images, and correct fingerprint extracting performance.
View full abstract
-
Akitoshi ITAI, Hiroshi YASUKAWA, Ichi TAKUMI, Masayasu HATA
Article type: PAPER
2014 Volume E97.A Issue 11 Pages
2114-2120
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
This paper proposes a background noise estimation method using an outer product expansion with non-linear filters for ELF (extremely low frequency) electromagnetic (EM) waves. We proposed a novel source separation technique that uses a tensor product expansion. This signal separation technique means that the background noise, which is observed in almost all input signals, can be estimated using a tensor product expansion (TPE) where the absolute error (AE) is used as the error function, which is thus known as TPE-AE. TPE-AE has two problems: the first is that the results of TPE-AE are strongly affected by Gaussian random noise, and the second is that the estimated signal varies widely because of the random search. To solve these problems, an outer product expansion based on a modified trimmed mean (MTM) is proposed in this paper. The results show that this novel technique separates the background noise from the signal more accurately than conventional methods.
View full abstract
-
Hiroki TANJI, Ryo TANAKA, Kyohei TABATA, Yoshito ISEKI, Takahiro MURAK ...
Article type: PAPER
2014 Volume E97.A Issue 11 Pages
2121-2129
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
In this paper, we present update rules for convolutive nonnegative matrix factorization (NMF) in which cost functions are based on the squared Euclidean distance, the Kullback-Leibler (KL) divergence and the Itakura-Saito (IS) divergence. We define an auxiliary function for each cost function and derive the update rule. We also apply this method to the single-channel signal separation in speech signals. Experimental results showed that the convergence of our KL divergence-based method was better than that in the conventional method, and our method achieved single-channel signal separation successfully.
View full abstract
-
Gaoxing CHEN, Lei SUN, Zhenyu LIU, Takeshi IKENAGA
Article type: PAPER
2014 Volume E97.A Issue 11 Pages
2130-2138
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
High efficiency video coding (HEVC) is a video compression standard that outperforms the predecessor H.264/AVC by doubling the compression efficiency. To enhance the intra prediction accuracy, 35 intra prediction modes were used in the prediction units (PUs), with partition sizes ranging from 4 × 4 to 64 × 64 in HEVC. However, the manifold prediction modes dramatically increase the encoding complexity. This paper proposes a fast mode- and depth-decision algorithm based on edge detection and reconfiguration to alleviate the large computational complexity in intra prediction with trivial degradation in accuracy. For mode decision, we propose pixel gradient statistics (PGS) and mode refinement (MR). PGS uses pixel gradient information to assist in selecting the prediction mode after rough mode decision (RMD). MR uses the neighboring mode information to select the best PU mode (BPM). For depth decision, we propose a partition reconfiguration algorithm to replace the original partitioning order with a more reasonable structure, by using the smoothness of the coding unit as a criterion in deciding the prediction depth. Smoothness detection is based on the PGS result. Experiment results show that the proposed method saves about 41.50% of the original processing time with little degradation (BD bitrate increased by 0.66% and BDPSNR decreased by 0.060dB) in the coding gain.
View full abstract
-
Takashi SUDO, Hirokazu TANAKA, Chika SUGIMOTO, Ryuji KOHNO
Article type: PAPER
2014 Volume E97.A Issue 11 Pages
2139-2146
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
Hands-free communications between cellular phones must be robust enough to withstand echo-path variation, and highly nonlinear echoes must be suppressed at low cost, when acoustic echo cancellation or suppression is applied to them. This paper proposes a spectrum-selective nonlinear echo suppression (SS-ES) approach as a solution to these issues. SS-ES is characterized by the selection of either a spectrum of the residual signal from an adaptive filter or a spectrum of the sending input signal depending on the amount of linear echo cancellation in an adaptive filter. Compared to conventional methods, the objective evaluation results of the SS-ES approach show an improvement of approximately 0.8-2.2dB, 0.23-2.39dB, and 0.26-0.50 in average echo return loss enhancement (ERLE), average root-mean-square log-spectral distortion (RMS-LSD), and the perceptual evaluation of speech quality (PESQ) value, respectively, under echo-path variation and double-talk conditions.
View full abstract
-
Toshiyuki DOBASHI, Tatsuya MUROFUSHI, Masahiro IWAHASHI, Hitoshi KIYA
Article type: PAPER
2014 Volume E97.A Issue 11 Pages
2147-2153
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
A global tone mapping operation (TMO) for high dynamic range (HDR) images with fixed-point arithmetic is proposed and evaluated in this paper. A TMO generates a low dynamic range (LDR) image from an HDR image by compressing its dynamic range. Since an HDR image is generally expressed in a floating-point data format, a TMO also deals with floating-point data even though a resultant LDR image is integer data. The proposed method treats a floating-point number as two 8-bit integer numbers which correspond to an exponent part and a mantissa part, and applies tone mapping to these integer numbers separately. Moreover, the method conducts all calculations in the tone mapping with only fixed-point arithmetic. As a result, the method reduces a memory cost and a computational cost. The evaluation shows that the proposed method reduces 81.25% of memory usage. The experimental results show that the processing speed of the proposed method with fixed-point arithmetic is 23.1 times faster than the conventional method with floating-point arithmetic. Furthermore, they also show the PSNR of LDR images obtained by the proposed method are comparable to those of the conventional method, though reducing computational and memory cost.
View full abstract
-
Tatsuya UGAI, Keita SATO, Kaoru ARAKAWA, Hiroshi HARASHIMA
Article type: PAPER
2014 Volume E97.A Issue 11 Pages
2154-2160
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
A method to synthesize facial caricatures with non-planar expression is proposed. Several methods have been already proposed to synthesize facial caricatures automatically, but they mainly synthesize plane facial caricatures which look somewhat monotonous. In order to generate expressive facial caricature, the image should be expressed in non-planar style, expressing the depth of the face by shading and highlighting. In this paper, a new method to express such non-planar effect in facial caricatures is proposed by blending the grayscale information of the real face image into the plane caricature. Some methods also have been proposed to generate non-planar facial caricature, but the proposed method can adjust the degree of non-planar expression by interactive evolutionary computing, so that the obtained expression is satisfied by the user based on his/her subjective criteria. Since the color of the face looks changed, when the grayscale information of the natural face image is mixed, the color information of the skin area are also set by interactive evolutionary computing. Experimental results show the high performance of the proposed method.
View full abstract
-
Pramual CHOORAT, Werapon CHIRACHARIT, Kosin CHAMNONGTHAI, Takao ONOYE
Article type: PAPER
2014 Volume E97.A Issue 11 Pages
2161-2169
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
In developing an automatic system of a single tooth length measurement on x-ray image, since a tooth shape is assumed to be straight and curve, an algorithm which can accurately deal with straight and curve is required. This paper proposes an automatic algorithm for measuring the length of single straight and curve teeth. In the algorithm consisting of control point determination, curve fitting, and length measurement, PCA is employed to find the first and second principle axes as vertical and horizontal ones of the tooth, and two terminal points of vertical axis and the junction of those axes are determined as three first-order control points. Signature is then used to find a peak representing tooth root apex as the forth control point. Bezier curve, Euclidean distance, and perspective transform are finally applied with determined four control points in curve fitting and tooth length measurement. In the experiment, comparing with the conventional PCA-based method, the average mean square error (MSE) of the line points plotted by the expert is reduced from 7.548 pixels to 4.714 pixels for tooth image type-I, whereas the average MSE value is reduced from 7.713 pixels and 7.877 pixels to 4.809 pixels and 5.253 pixels for left side and right side of tooth image type-H, respectively.
View full abstract
-
Chao ZHANG, Junzhou YU
Article type: LETTER
2014 Volume E97.A Issue 11 Pages
2170-2173
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
Due to the high speed mobile environment, the aeronautical Cognitive Radio (CR) communications base on the channel with the time-variant stochastic non-continuous spectrum. The traditional fading channel models, such as Rayleigh, Rice, Nakagami-
m and multipath channel models, can not describe the whole property of the channels of CR communications. In this letter, the statistical channel modeling scheme for aeronautical CR communications is proposed with a M/M/
s(1) queuing model, which properly describes the random spectrum occupation of the primary users, i.e. aircrafts in aeronautical communications. The proposed channel model can be easily utilized in the channel simulation to testify the validity and efficiency of the aeronautical CR communications.
View full abstract
-
Liang ZHAO, Jun ZHANG, Xuejun ZHANG, Yun BAI
Article type: LETTER
2014 Volume E97.A Issue 11 Pages
2174-2177
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
The timing synchronization scheme for massive MIMO systems is proposed with CCK (Complementary Code Keying) codes in this letter. Our proposed scheme is specifically designed to generate synchronization sequence with large family size. The optimal sequences can be constructed with ZCZ or LCZ based on the number of antennas. Furthermore Monte Carlo simulation results confirmed the expected detection probability for massive MIMO systems.
View full abstract
-
Shogo TOKAI, Takayoshi MORIOKA, Hiroyuki HASE
Article type: LETTER
2014 Volume E97.A Issue 11 Pages
2178-2180
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
We propose a method to extract scene situation by orientation sensors of multiple mobile phones' environment. By using orientations recorded with videos, we analyzed their view concentrations as a remarkable position of the scene for each frame of videos. In an experiment for a soccer scene, the extracted points can be related to a trajectory of a soccer ball.
View full abstract
-
Taku ODAKA, Wannida SAE-TANG, Masaaki FUJIYOSHI, Hiroyuki KOBAYASHI, M ...
Article type: LETTER
2014 Volume E97.A Issue 11 Pages
2181-2183
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
This letter proposes an efficient lossless compression method for high dynamic range (HDR) images in OpenEXR format. The proposed method transforms an HDR image to an indexed image and packs the histogram of the indexed image. Finally the packed image is losslessly compressed by using any existing lossless compression algorithm such as JPEG 2000. Experimental results show that the proposed method reduces the bit rate of compressed OpenEXR images compared with equipped lossless compression methods of OpenEXR format.
View full abstract
-
Shi BAO, Go TANAKA
Article type: LETTER
2014 Volume E97.A Issue 11 Pages
2184-2188
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
In the impulse noise removal from a color image, vector filters are suitable for suppressing false color generation. However, the vector filters do not select optimal vectors to restore noise corrupted pixels. To cope with this problem, a cost function-based vector filter is proposed in this letter.
View full abstract
-
Kenta IWAI, Yoshinobu KAJIKAWA
Article type: PAPER
Subject area: Digital Signal Processing
2014 Volume E97.A Issue 11 Pages
2189-2199
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
In this paper, we propose a parameter estimation method using Volterra kernels for the nonlinear IIR filters, which are used for the linearization of closed-box loudspeaker systems. The nonlinear IIR filter, which originates from a mirror filter, employs nonlinear parameters of the loudspeaker system. Hence, it is very important to realize an appropriate estimation method for the nonlinear parameters to increase the compensation ability of nonlinear distortions. However, it is difficult to obtain exact nonlinear parameters using the conventional parameter estimation method for nonlinear IIR filter, which uses the displacement characteristic of the diaphragm. The conventional method has two problems. First, it requires the displacement characteristic of the diaphragm but it is difficult to measure such tiny displacements. Moreover, a laser displacement gauge is required as an extra measurement instrument. Second, it has a limitation in the excitation signal used to measure the displacement of the diaphragm. On the other hand, in the proposed estimation method for nonlinear IIR filter, the parameters are updated using simulated annealing (SA) according to the cost function that represents the amount of compensation and these procedures are repeated until a given iteration count. The amount of compensation is calculated through computer simulation in which Volterra kernels of a target loudspeaker system is utilized as the loudspeaker model and then the loudspeaker model is compensated by the nonlinear IIR filter with the present parameters. Hence, the proposed method requires only an ordinary microphone and can utilize any excitation signal to estimate the nonlinear parameters. Some experimental results demonstrate that the proposed method can estimate the parameters more accurately than the conventional estimation method.
View full abstract
-
Hiroaki MUKAIDANI, Ryousei TANABATA, Chihiro MATSUMOTO
Article type: PAPER
Subject area: Systems and Control
2014 Volume E97.A Issue 11 Pages
2200-2211
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
In this paper, the
H2/
H∞ control problem for a class of stochastic discrete-time linear systems with state-, control-, and external-disturbance-dependent noise or (
x,
u,
v)-dependent noise involving multiple decision makers is investigated. It is shown that the conditions for the existence of a strategy are given by the solvability of cross-coupled stochastic algebraic Riccati equations (CSAREs). Some algorithms for solving these equations are discussed. Moreover, weakly-coupled large-scale stochastic systems are considered as an important application, and some illustrative examples are provided to demonstrate the effectiveness of the proposed decision strategies.
View full abstract
-
Takumi HASEGAWA, Tadashi TSUBONE
Article type: PAPER
Subject area: Nonlinear Problems
2014 Volume E97.A Issue 11 Pages
2212-2217
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
We consider an improved control method based on the Stability Transformation Method. Stability Transformation Method detects unknown and unstable periodic orbits of chaotic dynamical systems. Based on the approach to realize the Stability Transformation Method in real systems, we have proposed a control method which can stabilize unknown and unstable periodic orbits embedded in chaotic attractors. However, setting of the control parameters of the control system has remained as unsolved issue. When the dynamics of a target system are unknown, the control parameters have to be set by trial and error. In this paper, we improve the control method with the automatic adjustment function of the control parameters. We show an example of stabilizing unstable periodic orbits of the 3-dimensional hysteresis chaos generator by using the proposed control method. Some results are confirmed by laboratory measurements. The results imply that any unknown and unstable periodic orbits can be stabilized by using the proposed method, if the target chaos system is reduced to 1-dimensional return map.
View full abstract
-
Mahmoud BAKHSHIZADEH, Ali JAHANIAN
Article type: PAPER
Subject area: VLSI Design Technology and CAD
2014 Volume E97.A Issue 11 Pages
2218-2226
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
Hardware Trojan or any other kind of unwanted hardware modifications has been thought as a major challenge in many commercial and secure applications. Currently, detection and prevention of hardware Trojans appeared as an important requirement in such systems. In this paper, a new concept, Trojan Vulnerability Map, is introduced to model the immunity of various regions of hardware against hardware attacks. Then, placement and routing algorithms are proposed to improve the immunity of hardware using the Trojan Vulnerability Map. Experimental results show that the proposed placement and routing algorithm reduces the hardware vulnerability by 25.65% and 4.08%, respectively. These benefits are earned in cost of negligible total wire length and delay overhead.
View full abstract
-
Xingbao ZHOU, Fan YANG, Hai ZHOU, Min GONG, Hengliang ZHU, Ye ZHANG, X ...
Article type: PAPER
Subject area: VLSI Design Technology and CAD
2014 Volume E97.A Issue 11 Pages
2227-2235
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
Post-Silicon Tunable (PST) buffers are widely adopted in high-performance integrated circuits to fix timing violations introduced by process variations. In typical optimization procedures, the statistical timing analysis of the circuits with PST clock buffers will be executed more than 2000 times for large scale circuits. Therefore, the efficiency of the statistical timing analysis is crucial to the PST clock buffer optimization algorithms. In this paper, we propose a stochastic collocation based efficient statistical timing analysis method for circuits with PST buffers. In the proposed method, we employ the Howard algorithm to calculate the clock periods of the circuits on less than 100 deterministic sparse-grid collocation points. Afterwards, we use these obtained clock periods to derive the yield of the circuits according to the stochastic collocation theory. Compared with the state-of-the-art statistical timing analysis method for the circuits with PST clock buffers, the proposed method achieves up to 22X speedup with comparable accuracy.
View full abstract
-
Haiyang LIU, Gang DENG, Jie CHEN
Article type: PAPER
Subject area: Coding Theory
2014 Volume E97.A Issue 11 Pages
2236-2246
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
In this paper, we investigate the minimum-weight codewords of array LDPC codes
C(
m,
q), where
q is an odd prime and
m ≤
q. Using some analytical approaches, the lower bound on the number of minimum-weight codewords of
C(
m,
q) given by Kaji (IEEE Int. Symp. Inf. Theory, June/July 2009) is proven to be tight for
m = 4 and
q > 19. In other words,
C(4,
q) has 4
q2(
q-1) minimum-weight codewords for all
q > 19. In addition, we show some interesting universal properties of the supports of generators of minimum-weight codewords of the code
C(4,
q)(
q > 19).
View full abstract
-
Keisuke KODAIRA, Mihoko WADA, Tomoharu SHIBUYA
Article type: PAPER
Subject area: Coding Theory
2014 Volume E97.A Issue 11 Pages
2247-2253
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
The amplitude damping (AD) quantum channel is one of the models describing evolution of quantum states. The construction of quantum error correcting codes for the AD channel based on classical codes has been presented, and Shor et al. proposed a class of classical codes over F
3 which are efficiently applicable to this construction. In this study, we expand Shor's construction to that over F
7, and succeeded to construct an AD code that has better parameters than AD codes constructed by Shor et al.
View full abstract
-
Keunseok CHO, Sangbae JEONG, Minsoo HAHN
Article type: LETTER
Subject area: Speech and Hearing
2014 Volume E97.A Issue 11 Pages
2254-2257
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
This paper proposes a new algorithm to encode the spectral envelope for G.729.1 more accurately. It applies the normalized least-mean- square (NLMS) algorithm to each subband energy of the modified discrete cosine transform (MDCT) in the time-domain alias cancellation (TDAC) of G.729.1. By utilizing the estimation error of subband energies by means of NLMS, allocated bit reduction for spectral envelope coding is achieved. The saved bits are then reused to improve the spectral envelope estimation and thus enhance the sound quality. Experimental results confirm that the proposed algorithm improves the sound quality under both clean and packet loss conditions.
View full abstract
-
Yao ZHENG, Limin XIAO, Wenqi TANG, Lihong SHANG, Guangchao YAO, Li RUA ...
Article type: LETTER
Subject area: Algorithms and Data Structures
2014 Volume E97.A Issue 11 Pages
2258-2262
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
The dynamic time warping (DTW) algorithm is widely used to determine time series similarity search. As DTW has quadratic time complexity, the time taken for similarity search is the bottleneck for virtually all time series data mining algorithms. In this paper, we present a parallel approach for DTW on a heterogeneous platform with a graphics processing unit (GPU). In order to exploit fine-grained data-level parallelism, we propose a specific parallel decomposition in DTW. Furthermore, we introduce an optimization technique called diamond tiling to improve the utilization of threads. Results show that our approach substantially reduces computational time.
View full abstract
-
Qiuyan WANG, Yupeng JIANG, Dongdai LIN, Xuan GUANG
Article type: LETTER
Subject area: Cryptography and Information Security
2014 Volume E97.A Issue 11 Pages
2263-2266
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
Jacobi sequences have good cryptography properties. Li et al. [X. Li et al., Linear Complexity of a New Generalized Cyclotomic Sequence of Order Two of Length pq
*, IEICE Trans. Fundamentals, vol.E96-A, no.5, pp.1001-1005, 2013] defined a new modified Jacobi sequence of order two and got its linear complexity. In this corresponding, we determine the linear complexity and minimal polynomials of the new modified Jacobi sequence of order
d. Our results show that the sequence is good from the viewpoint of linear complexity.
View full abstract
-
Jinyong CHANG, Rui XUE
Article type: LETTER
Subject area: Cryptography and Information Security
2014 Volume E97.A Issue 11 Pages
2267-2271
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
In this letter, we formally present the definition of KDM-CCA1 security in public key setting, which falls in between the existing KDM-CPA and KDM-CCA2 security. We also prove that if a public key encryption scheme is CCA1 secure and has the properties of secret-key multiplication (or addition) homomorphism, and conditioned plaintext-restorability, then it is KDM-CCA1 secure w.r.t. two ensembles of functions that had been used in [15],[17], respectively. For concrete scheme, we show that the (tailored) Damgård's Elgamal scheme achieves this KDM-CCA1 security based on different assumptions.
View full abstract
-
Ding XU, Qun LI
Article type: LETTER
Subject area: Communication Theory and Signals
2014 Volume E97.A Issue 11 Pages
2272-2275
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
The outage capacity of the fading cognitive multicast channel (CMC) is investigated in this paper. Assume that the instantaneous channel state information (CSI) of the interference link between the cognitive base station (CBS) and the primary user (PU) is available at the CBS, we derive the outage capacity in Rayleigh fading environments under the interference power and the transmit power constraints. Under the condition that the interference power limit is sufficiently larger or smaller than the transmit power limit, the asymptotic outage capacity is obtained in closed-form. Assume that only the channel distribution information (CDI) of the interference link is available at the CBS, the outage capacity under the interference outage and the transmit power constraints is derived in closed-form. The theoretical results are confirmed by simulations. It is shown that the outage capacity is not degraded due to partial knowledge of the interference link when the interference power limit is sufficiently larger than the transmit power limit. It is also shown that the capacity gain due to increasing the number of the secondary users (SUs) is negligible if the number of the SUs is already large. Additionally, the case of CDI with estimation error is also investigated. Interestingly, we show that the estimation error of CDI may be a positive factor for improving the outage capacity of the CMC.
View full abstract
-
Byung-Kyu KIM, Young-Hwan YOU
Article type: LETTER
Subject area: Communication Theory and Signals
2014 Volume E97.A Issue 11 Pages
2276-2278
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
In this letter, we propose a simple algorithm to jointly estimate the symbol timing offset (STO) and carrier frequency offset (CFO) of wireless body area network (WBAN) signals. The preamble specified in IEEE 802.15.6 WBAN is used to achieve an accurate timing and frequency estimation based on the differential correlation. Simulations demonstrate that the proposed joint estimation scheme can be effectively employed to get accurate STO and CFO estimate with less complexity.
View full abstract
-
Feng YU, Lei WANG, Dan GAO, Yingguan WANG, Xiaolin ZHANG
Article type: LETTER
Subject area: Communication Theory and Signals
2014 Volume E97.A Issue 11 Pages
2279-2282
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
In this paper, a real-time medium access control (MAC) protocol based on a coding-black-burst mechanism with low latency and high energy efficiency is proposed for wireless sensor networks. The Black-Burst (BB) mechanism is used to provide real-time access. However, when the traffic load is heavy, BB will cause a lot of energy loss and latency due to its large length. A binary coding mechanism is applied to BB in our coding-black-burst-based protocol to reduce the energy consumption and latency by at least (
L-2(log
2 L+1)) for L-length BB. The new mechanism also gives priority to the real-time traffic with longer waiting delays to access the channel. The theoretical analysis and simulation results indicate that our protocol provides low end-to-end delay and high energy efficiency for real-time communication.
View full abstract
-
Kenichiro FURUTA
Article type: LETTER
Subject area: General Fundamentals and Boundaries
2014 Volume E97.A Issue 11 Pages
2283-2286
Published: 2014
Released on J-STAGE: November 01, 2014
JOURNAL
RESTRICTED ACCESS
We focus on a characteristic which is specific to the quantum repeater protocol. In the quantum repeater protocol, quantum states which are generated by the protocol do not depend on receivers. Therefore, we can reuse EPR pairs which are generated before a change of a receiver for the quantum repeater protocol after the change. The purpose of reusing is advancing the finishing time of sharing EPR pairs, which is not equal to increasing the fidelity. In this paper, we construct concrete methods of reusing EPR pairs and analyze the effectiveness of reusing EPR pairs. Besides, we derive conditions in which reusing EPR pairs is effective.
View full abstract