IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E98.A , Issue 3
Showing 1-20 articles out of 20 articles from the selected issue
Regular Section
  • Eugin HYUN, Woojin OH, Jong-Hun LEE
    Type: PAPER
    Subject area: Digital Signal Processing
    2015 Volume E98.A Issue 3 Pages 801-810
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    In automotive frequency modulated continuous wave (FMCW) radar based on multiple ramps with different slope, an effective pairing algorithm is required to simultaneously detect the target range and velocity. That is, as finding beat-frequencies intersecting at a single point of the range-Doppler map, we extract the range and velocity of a target. Unlike the ideal case, however, in a real radar system, even though multiple beat frequencies are originated from the same target, these beat frequencies have many different intersection values, resulting in mismatch pairing during the pairing step. Moreover, this problem also reduces the detection accuracy and the radar detection performance. In this study, we found that mismatch pairing is caused by the round-off errors of the range-beat frequency and Doppler frequency, as well as their various combinations in the discrete frequency domain. We also investigated the effect of mismatch pairing on detection performance, and proposed a new approach to minimize this problem. First, we propose integer and half-integer frequency position-based pairing method during extraction of the range and Doppler frequencies in each ramp to increase detection accuracy. Second, we propose a window-based pairing method to identify the same target from range-Doppler frequencies extracted in the first step. We also find the appropriate window size to overcome pairing mismatch. Finally, we propose the method to obtain a higher accuracy of range and velocity by weighting the values determined in one window. To verify the detection performance of the proposed method by comparison with the typical method, simulations were conducted. Then, in a real field test using the developed radar prototype, the detection probability of the proposed algorithm showed more than 60% improvement in comparison with the conventional method.
    Download PDF (4885K)
  • Shingo YOSHIZAWA, Mai NOZAKI, Hiroshi TANIMOTO
    Type: PAPER
    Subject area: Digital Signal Processing
    2015 Volume E98.A Issue 3 Pages 811-819
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    Due to increasing demand for machine-to-machine (M2M) communication, simultaneous connections for many terminals are requested for current wireless communication systems. Interleave division multiple access (IDMA) has superior multiuser detection performance and attains high data transmission efficiency in multiuser communications. This paper describes the VLSI implementation of an interference canceller for OFDM-IDMA systems. The conventional architecture decreases a throughput in pipeline processing due to wait time occurring in interleave and deinterleave memory units. The proposed architecture adopts dual-frame processing to solve the problem of the wait time and achieves a high utilization ratio in pipeline stage operation. In the implementation results, the proposed architecture has reduced circuit area and power consumption by 25% and 41% for BPSK demodulation and 33% and 44% for QPSK demodulation compared with the conventional architecture on the same throughput condition.
    Download PDF (2125K)
  • Kenta IWAI, Yoshinobu KAJIKAWA
    Type: PAPER
    Subject area: Digital Signal Processing
    2015 Volume E98.A Issue 3 Pages 820-832
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    In this paper, we propose a 3rd-order nonlinear IIR filter for compensating nonlinear distortions of loudspeaker systems. Nonlinear distortions are common around the lowest resonance frequency for electrodynamic loudspeaker systems. One interesting approach to compensating nonlinear distortions is to employ a mirror filter. The mirror filter is derived from the nonlinear differential equation for loudspeaker systems. The nonlinear parameters of a loudspeaker system, which include the force factor, stiffness, and so forth, depend on the displacement of the diaphragm. The conventional filter structure, which is called the 2nd-order nonlinear IIR filter that originates the mirror filter, cannot reduce nonlinear distortions at high frequencies because it does not take into account the nonlinearity of the self-inductance of loudspeaker systems. To deal with this problem, the proposed filter takes into account the nonlinearity of the self-inductance and has a 3rd-order nonlinear IIR filter structure. Hence, this filter can reduce nonlinear distortions at high frequencies while maintaining a lower computational complexity than that of a Volterra filter-based compensator. Experimental results demonstrate that the proposed filter outperforms the conventional filter by more than 2dB for 2nd-order nonlinear distortions at high frequencies.
    Download PDF (1817K)
  • Dijian CHEN, Zhiwei HAO, Kenji FUJIMOTO, Tatsuya SUZUKI
    Type: PAPER
    Subject area: Systems and Control
    2015 Volume E98.A Issue 3 Pages 833-842
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    This paper develops the double generating function method for the discrete-time linear quadratic optimal control problem. This method can give generators for optimal solutions only in terms of pre-computed coefficients and boundary conditions, which is useful for the on-line repetitive computation for different boundary conditions. Moreover, since each generator contains inverse terms, the invertibility analysis is also performed to conclude that the terms in the generators constructed by double generating functions with opposite time directions are invertible under some mild conditions, while the terms with the same time directions will become singular when the time goes infinity which may cause instability in numerical computations. Examples demonstrate the effectiveness of the developed method.
    Download PDF (1303K)
  • Jingyuan ZHAO, Meiqin WANG, Jiazhe CHEN, Yuliang ZHENG
    Type: PAPER
    Subject area: Cryptography and Information Security
    2015 Volume E98.A Issue 3 Pages 843-852
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    SAFER block cipher family consists of SAFER K, SAFER SK, SAFER+ and SAFER++. As the first proposed block cipher of them, SAFER K is strengthened by SAFER SK with improved key schedule. SAFER+ is designed as an AES candidate and Bluetooth uses a customized version of it for security. SAFER++, a variant of SAFER+, is among the cryptographic primitives selected for the second phase of the NESSIE project. In this paper, we take advantage of properties of the linear transformation and S-boxes to identify new impossible differentials for SAFER SK, SAFER+, and SAFER++. Moreover, we give the impossible differential attacks on 4-round SAFER SK/128 and 4-round SAFER+/128(256), 5-round SAFER++/128 and 5.5-round SAFER++/256. Our attacks significantly improve previously known impossible differential attacks on them. Specifically, our attacks on SAFER+ are the best attack in terms of number of rounds.
    Download PDF (2456K)
  • Eiichiro FUJISAKI, Akinori KAWACHI, Ryo NISHIMAKI, Keisuke TANAKA, Ken ...
    Type: PAPER
    Subject area: Cryptography and Information Security
    2015 Volume E98.A Issue 3 Pages 853-862
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    Leakage resilient cryptography is often considered in the presence of a very strong leakage oracle: An adversary may submit arbitrary efficiently computable function f to the leakage oracle to receive f(x), where x denotes the entire secret that a party possesses. This model is somewhat too strong in the setting of public-key encryption (PKE). It is known that no secret-key leakage resilient PKE scheme exists if the adversary may have access to the secret-key leakage oracle to receive only one bit after it was given the challenge ciphertext. Similarly, there exists no sender-randomness leakage resilient PKE scheme if one-bit leakage occurs after the target public key was given to the adversary. At TCC 2011, Halevi and Lin have broken the barrier of after-the-fact leakage, by proposing the so-called split state model, where a secret key of a party is explicitly divided into at least two pieces, and the adversary may have not access to the entire secret at once, but each divided pieces, one by one. In the split-state model, they have constructed post-challenge secret-key leakage resilient CPA secure PKEs from hash proof systems, but the construction of CCA secure post-challenge secret-key leakage PKE has remained open. They have also remained open to construct sender-randomness leakage PKE in the split state model. This paper provides a solution to the open issues. We also note that the proposal of Halevi and Lin is post-challenge secret-key leakage CPA secure against a single challenge ciphertext; not against multiple challenges. We present an efficient generic construction that converts any CCA secure PKE scheme into a multiple-challenge CCA secure PKE that simultaneously tolerates post-challenge secret-key and sender-randomness leakage in the split state model, without any additional assumption. In addition, our leakage amount of the resulting schemes is the same as that of Halevi and Lin CPA PKE, i.e., (1/2+γ)l/2 where l denotes the length of the entire secret (key or randomness) and γ denotes a universal (possitive) constant less than 1/2. Our conversion is generic and available for many other public-key primitives. For instance, it can convert any identity-based encryption (IBE) scheme to a post-challenge master-key leakage and sender-randomness leakage secure IBE.
    Download PDF (887K)
  • Xiang FENG, Shuguo LI
    Type: PAPER
    Subject area: Cryptography and Information Security
    2015 Volume E98.A Issue 3 Pages 863-869
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    Field Programmable Gate Array (FPGA) implementation of Elliptic Curve Cryptography (ECC) over GF(p) is commonly not fast enough to meet the request of high-performance applications. There are three critical factors to determine the performance of ECC processor over GF(p): multiplication structure, modular multiplication algorithm, and scalar point multiplication scheduling. This work proposes a novel multiplication structure which is a two-stage pipeline on the basis of Karatsuba-Ofman algorithm. With the proposed multiplication structure, we design a 256-bit modular multiplier based on Improved Barret Modular Multiplication algorithm. Upon the modular multiplier, we finish the scalar point multiplication scheduling and implement a high-performance ECC processor on FPGA. Compared with the previous modular multipliers, our modular multiplier reduces the 256-bit modular multiplication time by 28% at least. Synthesis result on Altera Stratix II shows that our ECC processor can complete a 256-bit ECC scalar point multiplication in 0.51ms, which is at least 1.3 times faster than the currently reported FPGA ECC processors over GF(p).
    Download PDF (1050K)
  • Sicong LIU, Fang YANG, Chao ZHANG, Jian SONG
    Type: LETTER
    Subject area: Noise and Vibration
    2015 Volume E98.A Issue 3 Pages 870-873
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    A narrowband interference (NBI) estimation and mitigation method based on compressive sensing (CS) for communication systems with repeated training sequences is investigated in this letter. The proposed CS-based differential measuring method is performed through the differential operation on the inter-block-interference-free regions of the received adjacent training sequences. The sparse NBI signal can be accurately recovered from a time-domain measurement vector of small size under the CS framework, without requiring channel information or dedicated resources. Theoretical analysis and simulation results show that the proposed method is robust to NBI under multi-path fading channels.
    Download PDF (537K)
  • Xushan CHEN, Xiongwei ZHANG, Jibin YANG, Meng SUN, Weiwei YANG
    Type: LETTER
    Subject area: Digital Signal Processing
    2015 Volume E98.A Issue 3 Pages 874-877
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    Compressive sensing (CS) exploits the sparsity or compressibility of signals to recover themselves from a small set of nonadaptive, linear measurements. The number of measurements is much smaller than Nyquist-rate, thus signal recovery is achieved at relatively expense. Thus, many signal processing problems which do not require exact signal recovery have attracted considerable attention recently. In this paper, we establish a framework for parameter estimation of a signal corrupted by additive colored Gaussian noise (ACGN) based on compressive measurements. We also derive the Cramer-Rao lower bound (CRB) for the frequency estimation problems in compressive domain and prove some useful properties of the CRB under different compressive measurements. Finally, we show that the theoretical conclusions are along with experimental results.
    Download PDF (154K)
  • Ann-Chen CHANG, Chih-Chang SHEN
    Type: LETTER
    Subject area: Digital Signal Processing
    2015 Volume E98.A Issue 3 Pages 878-880
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    This letter deals with the carrier frequency offsets (CFO) estimation problem for orthogonal frequency division multiple access (OFDMA) uplink systems. Combined with centro-symmetric (CS) trimmed autocorrelation matrix and weighting subspace projection, the proposed estimator has better estimate performance than MVDR, MUSIC, CS-MUSIC, and ESPRIT estimators, especially in relatively less of OFDMA blocks and low SNR situations. Simulation results are presented to verify the efficiency of the proposed estimator.
    Download PDF (223K)
  • Xiao Yu LUO, Ping WEI, Lu GAN, Hong Shu LIAO
    Type: LETTER
    Subject area: Digital Signal Processing
    2015 Volume E98.A Issue 3 Pages 881-884
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    Recently, Gan and Luo have proposed a direction-of-arrival estimation method for uncorrelated and coherent signals in the presence of multipath propagation [3]. In their method, uncorrelated and coherent signals are distinguished by rotational invariance techniques and the property of the moduli of eigenvalues. However, due to the limitation of finite number of sensors, the pseudo-inverse matrix derived in this method is an approximate one. When the number of sensors is small, the approximation error is large, which adversely affects the property of the moduli of eigenvalues. Consequently, the method in [3] performs poorly in identifying uncorrelated signals under such circumstance. Moreover, in cases of small number of snapshots and low signal to noise ratio, the performance of their method is poor as well. Therefore, in this letter we first study the approximation in [3] and then propose an improved method that performs better in distinguishing between uncorrelated signals and coherent signals and in the aforementioned two cases. The simulation results demonstrate the effectiveness and efficiency of the proposed method.
    Download PDF (236K)
  • Sungryul LEE
    Type: LETTER
    Subject area: Systems and Control
    2015 Volume E98.A Issue 3 Pages 885-889
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    This letter investigates the consensus problem for an undirected network of high-order integrators with an arbitrarily large communication delay. A consensus protocol with the low gain parameter that can eliminate an effect of time delay on the consensus problem is proposed newly. Moreover, it is proved that under some sufficient conditions, it can solve the consensus problem in the presence of an arbitrarily large communication delay. A simulation example is presented to verify the validness of the proposed design.
    Download PDF (240K)
  • In Hyuk KIM, Young Ik SON
    Type: LETTER
    Subject area: Systems and Control
    2015 Volume E98.A Issue 3 Pages 890-893
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    In order to improve the motion control performance, a new friction determination method, using the LuGre model, is proposed. The model parameters are determined by performing two-step closed-loop experiments using a proportional-integral observer (PIO). The PIO is also used to develop a robust motion controller to deal with additional uncertainties including the effect of the inaccurate estimation of the friction. The experimental results reveal improved performance compared to that of a single-PIO-based controller.
    Download PDF (741K)
  • Yun BU, Tian Qian LI, Qiang ZHANG
    Type: LETTER
    Subject area: Numerical Analysis and Optimization
    2015 Volume E98.A Issue 3 Pages 894-897
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    It is very difficult to know evolution state of ACO in its working. To solve the problem, we propose using colony entropy and mean colony entropy to monitor the algorithm. The two functions show fluctuation and declining trends depended on time t in a tour and iteration number. According to the principle, that each updated edge will get the same increment is improper. Then a weighted algorithm is proposed to calculate each arc's increment based on its selected probability. The strategy can provide more exploration to help to find the global optimum value, and experiments show its improved performance.
    Download PDF (384K)
  • Fei TANG, Hongda LI, Jinyong CHANG
    Type: LETTER
    Subject area: Cryptography and Information Security
    2015 Volume E98.A Issue 3 Pages 898-905
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    In a proxy re-signatures (PRS) scheme, a semi-trusted proxy is given some information which allows it to translate a user i's signature on a message m into another user j's signature on the same message m. However, the proxy cannot, on it own, compute signatures for either i or j. This notion introduced by Blaze et a. at EUROCRYPT 1998, and then revisited by Ateniese and Hohenberger at CCS 2005. The existence of multi-use unidirectional PRS scheme is an open problem left by AH05. Whereafter, at CCS 2008, Libert and Vergnaud constructed the first multi-use unidirectional PRS scheme. However, there is a major drawback in the LV08 scheme that the size of the signatures is linear in the number of translations. Hence, Libert and Vergnaud said that a more challenging task would be to find out implementations of such primitives where the size of signatures and the verification cost do not grow linearly with the number of translations. In this work we resolve this task by constructing a such PRS scheme in the standard model by using indistinguishability obfuscation. A shortcoming of our construction is that the security is selective but not full.
    Download PDF (146K)
  • Xinran LI, Fang-Wei FU, Xuan GUANG
    Type: LETTER
    Subject area: Cryptography and Information Security
    2015 Volume E98.A Issue 3 Pages 906-911
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    FOX is a family of block ciphers published in 2004 and is famous for its provable security to cryptanalysis. In this paper, we present multiple 4-round impossible differentials and several new results of impossible differential attacks on 5,6,7-round FOX64 and 5-round FOX128 with the multiple differentials and the new early abort technique which shall reduce the data complexity and the time complexity respectively. In terms of the data complexity and the time complexity, our results are better than any of the previously known attacks.
    Download PDF (226K)
  • Minglong QI, Shengwu XIONG, Jingling YUAN, Wenbi RAO, Luo ZHONG
    Type: LETTER
    Subject area: Cryptography and Information Security
    2015 Volume E98.A Issue 3 Pages 912-917
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    In this letter, we give a trace representation of binary Jacobi sequences with period pq over an extension field of the odd prime field Fr. Our method is based on the use of a pqth root of unity over the extension field, and the representation of the Jacobi sequences by corresponding indicator functions and quadratic characters of two primes p and q.
    Download PDF (116K)
  • Ding XU, Qun LI
    Type: LETTER
    Subject area: Communication Theory and Signals
    2015 Volume E98.A Issue 3 Pages 918-922
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    This paper studies the problem of power allocation for a two-way orthogonal frequency division multiplexing (OFDM) based cognitive radio (CR) network to maximize the ergodic capacities of the secondary users (SUs). Under the assumption that the SUs know the channel state information (CSI) of the interference links between the SUs and the primary user (PU) perfectly, the optimal power allocation algorithm under the interference and transmit power constraints is derived. In addition, we further assume that the SUs only know the channel distribution information (CDI) of the interference links and propose a heuristic algorithm under the interference outage and transmit power constraints based on Gaussian approximation. It is shown that the ergodic capacity with CDI is not degraded compared to that with perfect CSI under tight transmit power constraint. Moreover, it is shown that the interference outage constraint is satisfied even for very small number of subcarriers if an interference power margin is adopted for Gaussian approximation.
    Download PDF (533K)
  • Sung-Bok CHOI, Young-Hwan YOU, Hyoung-Kyu SONG
    Type: LETTER
    Subject area: Communication Theory and Signals
    2015 Volume E98.A Issue 3 Pages 923-926
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    Many wireless communication systems use a relay station for cooperative diversity or cell coverage extension. In this letter, an efficient partial single relay selection scheme is proposed for wireless communications. The conventional schemes such as the best harmonic mean and the threshold-based relay selection should know channel state informaion (CSI), or noise variance at all stations in advance. But the proposed scheme does not require any priori information. It uses a characteristic of the repeated signal pattern at candidates of the relay station. Simulation results show that the performance of proposed scheme is very close to the best harmonic mean relay selection scheme as one of the optimal relay selection schemes.
    Download PDF (302K)
  • Kohei INOUE, Kenji HARA, Kiichi URAHAMA
    Type: LETTER
    Subject area: Image
    2015 Volume E98.A Issue 3 Pages 927-931
    Published: 2015
    Released: March 01, 2015
    JOURNALS RESTRICTED ACCESS
    Recently, hue-preserving color image enhancement methods have been proposed by several researchers. However, the theoretical comparison of the performance of their methods has not been conducted yet. In this paper, we propose a hue-preserving saturation maximization method, and show a relationship of the saturation of enhanced colors by related methods. We also demonstrate the correctness of the relationship experimentally.
    Download PDF (147K)
feedback
Top