IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E97.A, Issue 4
Displaying 1-18 of 18 articles from this issue
Regular Section
  • Naomi YAGI, Tomomoto ISHIKAWA, Yutaka HATA
    Article type: PAPER
    Subject area: Ultrasonics
    2014 Volume E97.A Issue 4 Pages 913-922
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    This paper describes an ultrasonic system that estimates the cell quantity of an artificial culture bone, which is effective for appropriate treat with a composite of this material and Bone Marrow Stromal Cells. For this system, we examine two approaches for analyzing the ultrasound waves transmitted through the cultured bone, including stem cells to estimate cell quantity: multiple regression and fuzzy inference. We employ two characteristics from the obtained wave for applying each method. These features are the amplitude and the frequency; the amplitude is measured from the obtained wave, and the frequency is calculated by the cross-spectrum method. The results confirmed that the fuzzy inference method yields the accurate estimates of cell quantity in artificial culture bone. Using this ultrasonic estimation system, the orthopaedic surgeons can choose the composites that contain favorable number of cells before the implantation.
    Download PDF (3228K)
  • Sumxin JIANG, Rendong YING, Peilin LIU, Zhenqi LU, Zenghui ZHANG
    Article type: PAPER
    Subject area: Digital Signal Processing
    2014 Volume E97.A Issue 4 Pages 923-930
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    This paper describes a new method for lossy audio signal compression via compressive sensing (CS). In this method, a structured shrinkage operator is employed to decompose the audio signal into three layers, with two sparse layers, tonal and transient, and additive noise, and then, both the tonal and transient layers are compressed using CS. Since the shrinkage operator is able to take into account the structure information of the coefficients in the transform domain, it is able to achieve a better sparse approximation of the audio signal than traditional methods do. In addition, we propose a sparsity allocation algorithm, which adjusts the sparsity between the two layers, thus improving the performance of CS. Experimental results demonstrated that the new method provided a better compression performance than conventional methods did.
    Download PDF (4906K)
  • Bu-Ching LIN, Juinn-Dar HUANG, Jing-Yang JOU
    Article type: PAPER
    Subject area: VLSI Design Technology and CAD
    2014 Volume E97.A Issue 4 Pages 931-939
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    The notion of multiple constant multiplication (MCM) is extensively adopted in digital signal processing (DSP) applications such as finite impulse filter (FIR) designs. A set of adders is utilized to replace regular multipliers for the multiplications between input data and constant filter coefficients. Though many algorithms have been proposed to reduce the total number of adders in an MCM block for area minimization, they do not consider the actual bitwidth of each adder, which may not estimate the hardware cost well enough. Therefore, in this article we propose a bitwidth-aware MCM optimization algorithm that focuses on minimizing the total number of adder bits rather than the adder count. It first builds a subexpression graph based on the given coefficients, derives a set of constraints for adder bitwidth minimization, and then optimally solves the problem through integer linear programming (ILP). Experimental results show that the proposed algorithm can effectively reduce the required adder bit count and outperforms the existing state-of-the-art techniques.
    Download PDF (2243K)
  • Nan WANG, Song CHEN, Cong HAO, Haoran ZHANG, Takeshi YOSHIMURA
    Article type: PAPER
    Subject area: VLSI Design Technology and CAD
    2014 Volume E97.A Issue 4 Pages 940-951
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    In this paper, we address the problem of scheduling operations into control steps with a dual threshold voltage (dual-Vth) technique, under timing and resource constraints. We present a two-stage algorithm for leakage power optimization. In the threshold voltage (Vth) assignment stage, the proposed algorithm first initializes all the operations to high-Vth, and then it iteratively shortens the critical path delay by reassigning the set of operations covering all the critical paths to low-Vth until the timing constraint is met. In the scheduling stage, a modified force-directed scheduling is implemented to schedule operations and to adjust threshold voltage assignments with a consideration of the resource constraints. To eliminate the potential resource constraint violations, the operations' threshold voltage adjustment problem is formulated as a “weighted interval scheduling” problem. The experimental results show that our proposed method performs better in both running time and leakage power reduction compared with MWIS [3].
    Download PDF (2063K)
  • Shingo YANAGIHARA, Tetsu IWATA
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2014 Volume E97.A Issue 4 Pages 952-963
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    The Generalized Feistel Structure (GFS) is one of the structures used in designs of blockciphers and hash functions. There are several types of GFSs, and we focus on Type 1 and Type 2 GFSs. The security of these structures are well studied and they are adopted in various practical blockciphers and hash functions. The round function used in GFSs consists of two layers. The first layer uses the nonlinear function. Type 1 GFS uses one nonlinear function in this layer, while Type 2 GFS uses a half of the number of sub-blocks. The second layer is a sub-block-wise permutation, and the cyclic shift is generally used in this layer. In this paper, we formalize Type 1.x GFS, which is the natural extension of Type 1 and Type 2 GFSs with respect to the number of nonlinear functions in one round. Next, for Type 1.x GFS using two nonlinear functions in one round, we propose a permutation which has a good diffusion property. We demonstrate that Type 1.x GFS with this permutation has a better diffusion property than other Type 1.x GFS with the sub-block-wise cyclic shift. We also present experimental results of evaluating the diffusion property and the security against the saturation attack, impossible differential attack, differential attack, and linear attack of Type 1.x GFSs with various permutations.
    Download PDF (776K)
  • Yongbo XIA, Shaoping CHEN, Tor HELLESETH, Chunlei LI
    Article type: PAPER
    Subject area: Information Theory
    2014 Volume E97.A Issue 4 Pages 964-969
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    Let m ≥ 3 be an odd positive integer, n=2m and p be an odd prime. For the decimation factor $d=\frac{(p^{m}+1)(p^{m}+p-1)}{p+1}$, the cross-correlation between the p-ary m-sequence {tr1nt)} and its all decimated sequences {tr1ndt+l)} is investigated, where 0 ≤ l < gcd(d,pn-1) and α is a primitive element of Fpn. It is shown that the cross-correlation function takes values in {-1,-1±ipm|i=1,2,…p}. The result presented in this paper settles a conjecture proposed by Kim et al. in the 2012 IEEE International Symposium on Information Theory Proceedings paper (pp.1014-1018), and also improves their result.
    Download PDF (927K)
  • Xiaoni DU, Ji ZHANG, Chenhuang WU
    Article type: PAPER
    Subject area: Information Theory
    2014 Volume E97.A Issue 4 Pages 970-974
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    We determine the linear complexity of binary sequences derived from the polynomial quotient modulo p defined by $F(u)\equiv \frac{f(u)-f_p(u)}{p} ~(\bmod~ p), \qquad 0 \le F(u) \le p-1,~u\ge 0,$ where fp(u)≡f(u) (mod p), for general polynomials $f(x)\in \mathbb{Z}[x]$. The linear complexity equals to one of the following values {p2-p,p2-p+1,p2-1,p2} if 2 is a primitive root modulo p2, depending on p≡1 or 3 modulo 4 and the number of solutions of f'(u)≡0 (mod) p, where f'(x) is the derivative of f(x). Furthermore, we extend the constructions to d-ary sequences for prime d|(p-1) and d being a primitive root modulo p2.
    Download PDF (685K)
  • Takayuki NOZAKI, Kenta KASAI, Kohichi SAKANIWA
    Article type: PAPER
    Subject area: Coding Theory
    2014 Volume E97.A Issue 4 Pages 975-984
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    In this paper, we propose a message passing decoding algorithm which lowers decoding error rates in the error floor regions for non-binary low-density parity-check (LDPC) codes transmitted over the binary erasure channel (BEC) and the memoryless binary-input output-symmetric (MBIOS) channels. In the case for the BEC, this decoding algorithm is a combination with belief propagation (BP) decoding and maximum a posteriori (MAP) decoding on zigzag cycles, which cause decoding errors in the error floor region. We show that MAP decoding on the zigzag cycles is realized by means of a message passing algorithm. Moreover, we extend this decoding algorithm to the MBIOS channels. Simulation results demonstrate that the decoding error rates in the error floor regions by the proposed decoding algorithm are lower than those by the BP decoder.
    Download PDF (702K)
  • Jungo MORIYASU, Toshimichi SAITO
    Article type: LETTER
    Subject area: Nonlinear Problems
    2014 Volume E97.A Issue 4 Pages 985-988
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    This letter studies the simple dynamic binary neural network characterized by signum activation function and ternary connection parameters. In order to control the sparsity of the connections and the stability of the stored signal, a simple evolutionary algorithm is presented. As a basic example of teacher signals, we consider a binary periodic orbit which corresponds to a control signal of ac-dc regulators. In the numerical experiment, applying the correlation-based learning, the periodic orbit can be stored. The sparsification can be effective to reinforce the stability of the periodic orbit.
    Download PDF (1682K)
  • Shice NI, Yong DOU, Kai CHEN, Jie ZHOU
    Article type: LETTER
    Subject area: Algorithms and Data Structures
    2014 Volume E97.A Issue 4 Pages 989-990
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    This letter proposes a novel high performance crypto coprocessor that relies on Reconfigurable Cryptographic Blocks. We implement the prototype of the coprocessor on Xilinx FPGA chip. And the pipelining technique is adopted to realize data paralleling. The results show that the coprocessor, running at 189MHz, outperforms the software-based SSL protocol.
    Download PDF (434K)
  • He LIU, Mangui LIANG, Haoliang SUN
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2014 Volume E97.A Issue 4 Pages 991-995
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    In this letter, we propose a new secure and efficient certificateless aggregate signature scheme which has the advantages of both certificateless public key cryptosystem and aggregate signature. Based on the computational Diffie-Hellman problem, our scheme can be proven existentially unforgeable against adaptive chosen-message attacks. Most importantly, our scheme requires short group elements for aggregate signature and constant pairing computations for aggregate verification, which leads to high efficiency due to no relations with the number of signers.
    Download PDF (123K)
  • Hitoshi TOKUSHIGE
    Article type: LETTER
    Subject area: Coding Theory
    2014 Volume E97.A Issue 4 Pages 996-1000
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    A soft-decision recursive decoding algorithm (RDA) for the class of the binary linear block codes recursively generated using a u|u+v-construction method is proposed. It is well known that Reed-Muller (RM) codes are in this class. A code in this class can be decomposed into left and right components. At a recursive level of the RDA, if the component is decomposable, the RDA is performed for the left component and then for the cosets generated from the left decoding result and the right component. The result of this level is obtained by concatenating the left and right decoding results. If the component is indecomposable, a proposed iterative bounded-distance decoding algorithm is performed. Computer simulations were made to evaluate the RDA for RM codes over an additive white Gaussian-noise channel using binary phase-shift keying modulation. The results show that the block error rates of the RDA are relatively close to those of the maximum-likelihood decoding for the third-order RM code of length 26 and better than those of the Chase II decoding for the third-order RM codes of length 26 and 27, and the fourth-order RM code of length 28.
    Download PDF (276K)
  • Junjun GUO, Jianjun MU, Xiaopeng JIAO, Guiping LI
    Article type: LETTER
    Subject area: Coding Theory
    2014 Volume E97.A Issue 4 Pages 1001-1004
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    In this letter, we present a new scheme to find small fundamental instantons (SFIs) of regular low-density parity-check (LDPC) codes for the linear programming (LP) decoding over the binary symmetric channel (BSC). Based on the fact that each instanton-induced graph (IIG) contains at least one short cycle, we determine potential instantons by constructing possible IIGs which contain short cycles and additional paths connected to the cycles. Then we identify actual instantons from potential ones under the LP decoding. Simulation results on some typical LDPC codes show that our scheme is effective, and more instantons can be obtained by the proposed scheme when compared with the existing instanton search method.
    Download PDF (202K)
  • Jian GAO, Fang-Wei FU, Linzhi SHEN, Wenli REN
    Article type: LETTER
    Subject area: Coding Theory
    2014 Volume E97.A Issue 4 Pages 1005-1011
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    Generalized quasi-cyclic (GQC) codes with arbitrary lengths over the ring $\mathbb{F}_{q}+u\mathbb{F}_{q}$, where u2=0, q=pn, n a positive integer and p a prime number, are investigated. By the Chinese Remainder Theorem, structural properties and the decomposition of GQC codes are given. For 1-generator GQC codes, minimum generating sets and lower bounds on the minimum distance are given.
    Download PDF (152K)
  • Chengqian XU, Xiaoyu CHEN, Kai LIU
    Article type: LETTER
    Subject area: Coding Theory
    2014 Volume E97.A Issue 4 Pages 1012-1015
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    This letter presents new methods for transforming perfect ternary sequences into perfect 8-QAM+ sequences. Firstly, based on perfect ternary sequences with even period, two mappings which can map two ternary variables to an 8-QAM+ symbol are employed for constructing new perfect 8-QAM+ sequences. In this case, the proposed construction is a generalization of the existing one. Then based on perfect ternary sequence with odd period, perfect 8-QAM sequences are generated. Compared with perfect 8-QAM+ sequences, the resultant sequences have no energy loss.
    Download PDF (90K)
  • Motoki IIDA, Kazuki SUGENO, Mamiko INAMORI, Yukitoshi SANADA
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2014 Volume E97.A Issue 4 Pages 1016-1020
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    This letter investigates the relationship between antenna position and data communication performance in a magnetic resonance wireless power transfer (MRWPT) system. In MRWPT information such as the types of equipments, the required amount of electrical power, or the timing of power transfer should be exchanged. It is assumed here that power transfer coils in the MRWPT system are employed as antennas for data communication. The frequency characteristics of the antennas change due to coil displacements. The power transfer coils are modeled as a band pass filter (BPF) and the frequency characteristics of the filter are presented in this letter. The characteristics of the filter are derived through circuit simulation and resulting data communication performance is evaluated. Numerical results obtained through computer simulation show that the bit error late (BER) performance can be improved by controlling the center frequency of the communication link.
    Download PDF (854K)
  • Nan SHA, Yuanyuan GAO, Xiaoxin YI, Wenlong LI, Weiwei YANG
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2014 Volume E97.A Issue 4 Pages 1021-1023
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    A joint continuous phase frequency shift keying (CPFSK) modulation and physical-layer network coding (PNC), i.e., CPFSK-PNC, is proposed for two-way relay channels (TWRCs). This letter discusses the signal detection of the CPFSK-PNC scheme with emphasis on the maximum-likelihood sequence detection (MLSD) algorithm for the relay receiver. The end-to-end error performance of the proposed CPFSK-PNC scheme is evaluated through simulations.
    Download PDF (202K)
  • Jongwon SEOK, Keunsung BAE
    Article type: LETTER
    Subject area: Multimedia Environment Technology
    2014 Volume E97.A Issue 4 Pages 1024-1026
    Published: April 01, 2014
    Released on J-STAGE: April 01, 2014
    JOURNAL RESTRICTED ACCESS
    Canonical correlation analysis (CCA) is applied to extract features for microphone classification. We utilized the coherence between near-silence regions. Experimental results show the promise of canonical correlation features for microphone classification.
    Download PDF (381K)
feedback
Top