IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
E98.A 巻, 10 号
選択された号の論文の29件中1~29を表示しています
Special Section on Recent Developments on Reliability, Maintainability and Dependability
Regular Section
  • Risheng XIA, Junfeng LI, Andrea PRIMAVERA, Stefania CECCHI, Yôiti SUZU ...
    原稿種別: PAPER
    専門分野: Engineering Acoustics
    2015 年 E98.A 巻 10 号 p. 2101-2108
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    Real-time high-quality reverberation simulation plays an important role in many modern applications, such as computer games and virtual reality. Traditional physically and perceptually-based reverberation simulation techniques, however, suffer from the high computational cost and lack of the specific characteristics of the enclosure. In this paper, a hybrid reverberation simulation approach is proposed in which early reflections are reproduced by convolving with the impulse response modeled by the image-source method and late reverberation is reproduced by the feedback delay network. A parametric predictor of energy decay relief is presented for the modeled early reflections and then exploited to compute the parameters of the feedback delay network. This ensures the smooth transition in the time-frequency domain from early to late reflections. Numerical simulation and listening tests validate the effectiveness of this proposed hybrid reverberation simulation approach.
  • Junhai LUO, Heng LIU, Jiangfeng YANG
    原稿種別: PAPER
    専門分野: Systems and Control
    2015 年 E98.A 巻 10 号 p. 2109-2116
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    In this paper, synchronization for uncertain fractional order chaotic systems is investigated. By using the fractional order extension of the Lyapunov stability criterion, a linear feedback controller and an adaptive controller are designed for synchronizing uncertain fractional order chaotic systems without and with unknown external disturbance, respectively. Quadratic Lyapunov functions are used in the stability analysis of fractional-order systems, and fractional order adaptation law is constructed to update design parameter. The proposed methods can guarantee that the synchronization error converges to zero asymptotically. Finally, illustrative examples are given to confirm the theoretical results.
  • Yuichi SUDO, Daisuke BABA, Junya NAKAMURA, Fukuhito OOSHITA, Hirotsugu ...
    原稿種別: PAPER
    専門分野: Algorithms and Data Structures
    2015 年 E98.A 巻 10 号 p. 2117-2128
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    We consider the exploration problem with a single agent in an undirected graph. The problem requires the agent starting from an arbitrary node to explore all the nodes and edges in the graph and return to the starting node. Our goal is to minimize both the number of agent moves and the memory size of the agent, which dominate the amount of communication during the exploration. We focus on the local memory called the whiteboard of each node. There are several exploration algorithms which are very fast (i.e. the exploration is completed within a small number of agent moves such as 2m and m+3n) and do not use whiteboards. These algorithms, however, require large agent memory because the agent must keep the entire information in its memory to explore a graph. We achieve the above goal by reducing the agent memory size of such algorithms with using whiteboards. Specifically, we present two algorithms with no agent memory based on the traditional depth-first traversal and two algorithms with O(n) and O(nlog n) space of agent memory respectively based on the fastest algorithms in the literature by Panaite and Pelc [J. Alg., Vol.33 No.2, 1999].
  • Qian XIAO, Haitao XIE
    原稿種別: PAPER
    専門分野: Graphs and Networks
    2015 年 E98.A 巻 10 号 p. 2129-2138
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    In social websites, users acquire information from adjacent neighbors as well as distant users by seeking along hyperlinks, and therefore, information diffusions, also seen as processes of “user infection”, show both cascading and jumping routes in social networks. Currently, existing analysis suffers from the difficulty in distinguishing between the impacts of information seeking behaviors, i.e. random walks, and other factors leading to user infections. To this end, we present a mechanism to recognize and measure influences of random walks on information diffusions. Firstly, we propose the concept of information propagation structure (IPS), which is also a directed acyclic graph, to represent frequent information diffusion routes in social networks. In IPS, we represent “jumping routes” as virtual arcs and regard them as the traces of random walks. Secondly, we design a frequent IPS mining algorithm (FIPS). By considering descendant node infections as a consequence of ancestor node infections in IPS, we can use a Bayesian network to model each IPS, and learn parameters based on the records of information diffusions passing through the IPS. Finally, we present a quantitative description method of random walks influence, the method is based on Bayesian probabilistic inferring in IPS, which is used to determine the ancestors, whose infection causes the infection of target users. We also employ betweenness centralities of arcs to evaluate contributions of random walks to certain infections. Experiments are carried out with real datasets and simulations. The results show random walks are influential in early and steady phases of information diffusions. They help diffusions pass through some topology limitations in social networks.
  • Rong HU, Kirill MOROZOV, Tsuyoshi TAKAGI
    原稿種別: PAPER
    専門分野: Cryptography and Information Security
    2015 年 E98.A 巻 10 号 p. 2139-2151
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    Code-based public-key encryption schemes (PKE) are the candidates for post-quantum cryptography, since they are believed to resist the attacks using quantum algorithms. The most famous such schemes are the McEliece encryption and the Niederreiter encryption. In this paper, we present the zero-knowledge (ZK) proof systems for proving statements about data encrypted using these schemes. Specifically, we present a proof of plaintext knowledge for both PKE's, and also a verifiable McEliece PKE. The main ingredients of our constructions are the ZK identification schemes by Stern from Crypto'93 and by Jain, Krenn, Pietrzak, and Tentes from Asiacrypt'12.
  • Hayato KOBAYASHI, Kazuhiko MINEMATSU, Tetsu IWATA
    原稿種別: PAPER
    専門分野: Cryptography and Information Security
    2015 年 E98.A 巻 10 号 p. 2152-2164
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    An Authenticated Encryption scheme is used to guarantee both privacy and authenticity of digital data. At FSE 2014, an authenticated encryption scheme called CLOC was proposed. CLOC is designed to handle short input data efficiently without needing heavy precomputation nor large memory. This is achieved by making various cases of different treatments in the encryption process depending on the input data. Five tweak functions are used to handle the conditional branches, and they are designed to satisfy 55 differential probability constraints, which are used in the security proof of CLOC. In this paper, we show that all these 55 constraints are necessary. This shows the design optimality of the tweak functions in CLOC in that the constraints cannot be relaxed, and hence the specification of the tweak functions cannot be simplified.
  • Yan WU, Yuanlong CAO
    原稿種別: PAPER
    専門分野: Coding Theory
    2015 年 E98.A 巻 10 号 p. 2165-2170
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    This paper proposes a construction method of binary Z-periodic complementary sequence set (Z-PCSs) based on binary aperiodic complementary sequence pair (Golay pair) and interleaved technique. The constructed set is optimal or almost optimal with respect to the theoretical bound in different conditons. The set can be used in multi-carrier code division multiple access communication systems. The designed sequence has periodic complementary characteristics, which lead to a strong ability to resist multi-path interference and multiple access interference.
  • Lina BAI, Danna YING
    原稿種別: PAPER
    専門分野: Measurement Technology
    2015 年 E98.A 巻 10 号 p. 2171-2177
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    A novel high common-mode (CM) suppression wideband balanced passband filter (BPF) is proposed using the stub centrally loaded slotline resonators (SCLSR) which have two resonant frequencies (odd- and even-modes) in the desired passband. The odd-mode resonant frequency of the slotline SCLSR can be flexibly controlled by the stub, whereas the even-mode one is fixed. Meanwhile, a transmission zero near the odd-mode resonant frequency can be generated due to the main path signal counteraction. First, the wideband single-ended BPF and corresponding balanced BPF are designed based on the slotline SCLSR with the parallel coupled microstrip line input/output (I/O). Ultra wideband high CM suppression that can be achieved for the slotline resonator structure has no resonant mode under CM excitation. Furthermore, by folding the parallel coupled microstrip line I/O, the source-load coupling is effectively decoupled to improve the CM suppression within the passband. The high suppression wideband balanced BPF is fabricated and measured, respectively. Good agreement between simulation and measurement results is obtained.
  • Peng SONG, Wenming ZHENG, Xinran ZHANG, Yun JIN, Cheng ZHA, Minghai XI ...
    原稿種別: LETTER
    専門分野: Speech and Hearing
    2015 年 E98.A 巻 10 号 p. 2178-2181
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    Most of the current voice conversion methods are conducted based on parallel speech, which is not easily obtained in practice. In this letter, a novel iterative speaker model alignment (ISMA) method is proposed to address this problem. First, the source and target speaker models are each trained from the background model by adopting maximum a posteriori (MAP) algorithm. Then, a novel ISMA method is presented for alignment and transformation of spectral features. Finally, the proposed ISMA approach is further combined with a Gaussian mixture model (GMM) to improve the conversion performance. A series of objective and subjective experiments are carried out on CMU ARCTIC dataset, and the results demonstrate that the proposed method significantly outperforms the state-of-the-art approach.
  • Chao-Li MENG, Shiaw-Wu CHEN, Ann-Chen CHANG
    原稿種別: LETTER
    専門分野: Digital Signal Processing
    2015 年 E98.A 巻 10 号 p. 2182-2186
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    This letter deals with direction-of-arrival (DOA) estimate problem based on gravitational search algorithm (GSA) with multiple signal classification (MUSIC) criterion for code-division multiple access (CDMA) signals. It has been shown that the estimate accuracy of the searching-based MUSIC estimator strictly depends on the number of search grids used during the search process, which is time consuming and the required number of search grids is not clear to determine. In conjunction with the GSA-based optimization, the high resolution DOA estimation can be obtained; meanwhile the searching grid size is no need to know previously. In this letter, we firstly present a GSA-based DOA estimator with MUSIC criterion under high interferer-to-noise ratio circumstances. Second, for the purpose to increase the estimation accuracy, we also propose an improved GSA with adaptive multiple accelerations, which depend on Newton-Raphson method. Several computer simulations are provided for illustration and comparison.
  • Takamitsu MATSUBARA, Takaya ASAKURA, Kenji SUGIMOTO
    原稿種別: LETTER
    専門分野: Systems and Control
    2015 年 E98.A 巻 10 号 p. 2187-2190
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    In this letter, we propose Dynamic Linear Bellman Combination that allows us to composite optimal policies of Kullback-Leibler control for similar tasks with different terminal and non-terminal costs. Simulation results demonstrate the effectiveness of our method.
  • Hung-Yi CHANG, Hung-Lung WANG, Jinn-Shyong YANG, Jou-Ming CHANG
    原稿種別: LETTER
    専門分野: Graphs and Networks
    2015 年 E98.A 巻 10 号 p. 2191-2193
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    Given a graph G, a set of spanning trees of G are completely independent if for any vertices x and y, the paths connecting them on these trees have neither vertex nor edge in common, except x and y. In this paper, we prove that for graphs of order n, with n ≥ 6, if the minimum degree is at least n-2, then there are at least ⌊n/3⌋ completely independent spanning trees.
  • Riham ALTAWY, Amr M. YOUSSEF
    原稿種別: LETTER
    専門分野: Cryptography and Information Security
    2015 年 E98.A 巻 10 号 p. 2194-2198
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    In this letter, we present a meet-in-the-middle attack on the 5-round reduced Kuznyechik cipher which has been recently chosen to be standardized by the Russian federation. Our attack is based on the differential enumeration approach. However, the application of the exact approach is not successful on Kuznyechik due to its optimal round diffusion properties. Accordingly, we adopt an equivalent representation for the last round where we can efficiently filter ciphertext pairs and launch the attack in the chosen ciphertext setting. We also utilize partial sequence matching which further reduces the memory and time complexities. For the 5-round reduced cipher, the 256-bit master key is recovered with an online time complexity of 2140.3, a memory complexity of 2153.3, and a data complexity of 2113.
  • Zhifan YE, Pinhui KE, Shengyuan ZHANG, Zuling CHANG
    原稿種別: LETTER
    専門分野: Cryptography and Information Security
    2015 年 E98.A 巻 10 号 p. 2199-2202
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    For an odd prime p and a positive integer r, new classes of binary sequences with period pr+1 are proposed from Euler quotients in this letter, which include several known classes of binary sequences derived from Fermat quotients and Euler quotients as special cases. The advantage of the new constructions is that they allow one to choose their support sets freely. Furthermore, with some constrains on the support set, the new sequences are proved to possess large linear complexities under the assumption of 2p-1 ≢ 1 mod p2.
  • Fanxin ZENG, Zhenyu ZHANG
    原稿種別: LETTER
    専門分野: Information Theory
    2015 年 E98.A 巻 10 号 p. 2203-2206
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    By investigating the properties that the offsets should satisfy, this letter presents a brief proof of general QAM Golay complementary sequences (GCSs) in Cases I-III constructions. Our aim is to provide a brief, clear, and intelligible derivation so that it is easy for the reader to understand the known Cases I-III constructions of general QAM GCSs.
  • Lin-Zhi SHEN, Xuan GUANG
    原稿種別: LETTER
    専門分野: Coding Theory
    2015 年 E98.A 巻 10 号 p. 2207-2208
    発行日: 2015/10/01
    公開日: 2015/10/01
    ジャーナル 認証あり
    Let v=p1m1p2m2ptmt be the canonical prime factorization of v. In this paper, we give a construction of optimal ((s+1)×v,s+1,1) two-dimensional optical orthogonal codes with both at most one-pulse per wavelength and at most one-pulse per time slot, where s | gcd(p1-1,p2-1,...,pt-1). The method is much simpler than that in [1]. Optimal (m×v,k,1) two-dimensional optical orthogonal codes are also constructed based on the Steiner system S[2,k,m].
feedback
Top