The search functionality is under construction.

Author Search Result

[Author] Hiroshi KAMABE(8hit)

1-8hit
  • FOREWORD

    Hiroshi KAMABE  

     
    FOREWORD

      Vol:
    E95-A No:12
      Page(s):
    2099-2099
  • Worst-Case Performance of ILIFC with Inversion Cells

    Akira YAMAWAKI  Hiroshi KAMABE  Shan LU  

     
    PAPER-Coding Theory for Strage

      Vol:
    E100-A No:12
      Page(s):
    2662-2670

    Index-less Indexed Flash Code (ILIFC) is a coding scheme for flash memories in which one bit of a data sequence is stored in a slice consisting of several cells but the index of the bit is stored implicitly. Although several modified ILIFC schemes have been proposed, in this research we consider an ILIFC with inversion cells (I-ILIFC). The I-ILIFC reduces the total number of cell level changes at each write request. Computer simulation is used to show that the I-ILIFC improves the average performance of the ILIFC in many cases. This paper presents our derivation of the lower bound on the number of write operations by I-ILIFC and shows that the worst-case performance of the I-ILIFC is better than that of the ILIFC if the code length is sufficiently large. Additionally, we consider another lower bound thereon. The results show that the threshold of the code length that determines whether the I-ILIFC improves the worst-case performance of the ILIFC is lower than that in the first lower bound.

  • User Identification and Channel Estimation by Iterative DNN-Based Decoder on Multiple-Access Fading Channel Open Access

    Lantian WEI  Shan LU  Hiroshi KAMABE  Jun CHENG  

     
    PAPER-Communication Theory and Signals

      Pubricized:
    2021/09/01
      Vol:
    E105-A No:3
      Page(s):
    417-424

    In the user identification (UI) scheme for a multiple-access fading channel based on a randomly generated (0, 1, -1)-signature code, previous studies used the signature code over a noisy multiple-access adder channel, and only the user state information (USI) was decoded by the signature decoder. However, by considering the communication model as a compressed sensing process, it is possible to estimate the channel coefficients while identifying users. In this study, to improve the efficiency of the decoding process, we propose an iterative deep neural network (DNN)-based decoder. Simulation results show that for the randomly generated (0, 1, -1)-signature code, the proposed DNN-based decoder requires less computing time than the classical signal recovery algorithm used in compressed sensing while achieving higher UI and channel estimation (CE) accuracies.

  • Irreducible Components of Canonical Graphs for Second Order Spectral Nulls

    Hiroshi KAMABE  

     
    PAPER-Coding Theory

      Vol:
    E80-A No:11
      Page(s):
    2073-2088

    Irreducible components of canonical graphs for second order spectral null constraints at a rational submultiple of the symbol frequency fsk/n are studied where fs is the symbol frequency. We show that if n is prime then a canonical graph consists of disjoint irreducible components. We also show that the number of irreducible components of a canonical graphs is finite if n is prime. For the case n = 2 and p O mod n, all aperiodic irreducible components are identified explicitly where p is a parameter of a canonical graph.

  • Higher Order Spectral Density Nulls and Spectral Lines

    Hiroshi KAMABE  

     
    PAPER

      Vol:
    E74-A No:9
      Page(s):
    2531-2539

    Codes having order-K spectral density nulls, i.e., codes such that the power spectral density of the encoded sequences and its first 2K-1 derivatives vanish at rational submultiples f of the symbol frequency are investigated. Several necessary and sufficient conditions for a code to have an order-K spectral density null at f are given. A lower bound on the minimum Euclidean distance of a code with an integer alphabet and with an order-K spectral density null also is derived. Canonical diagrams for higher order spectral density nulls and nonzero spectral lines are introduced.

  • Construction of Parallel Random I/O Codes Using Coset Coding with Hamming Codes

    Akira YAMAWAKI  Hiroshi KAMABE  Shan LU  

     
    PAPER-Coding theory for storage

      Vol:
    E101-A No:12
      Page(s):
    2125-2134

    In multilevel flash memory, in general, multiple read thresholds are required to read a single logical page. Random I/O (RIO) code, introduced by Sharon and Alrod, is a coding scheme that enables the reading of one logical page using a single read threshold. It was shown that the construction of RIO codes is equivalent to the construction of write-once memory (WOM) codes. Yaakobi and Motwani proposed a family of RIO codes, called parallel RIO (P-RIO) code, in which all logical pages are encoded in parallel. In this paper, we utilize coset coding with Hamming codes in order to construct P-RIO codes. Coset coding is a technique to construct WOM codes using linear binary codes. We leverage information on the data of all pages to encode each page. Our P-RIO codes, using which more pages can be stored than RIO codes constructed via coset coding, have parameters for which RIO codes do not exist.

  • Unrestricted-Rate Parallel Random Input-Output Codes for Multilevel Flash Memory

    Shan LU  Hiroshi KAMABE  Jun CHENG  Akira YAMAWAKI  

     
    PAPER-Coding theory for storage

      Vol:
    E101-A No:12
      Page(s):
    2135-2140

    Recent years have seen increasing efforts to improve the input/output performance of multilevel flash memory. In this regard, we propose a coding scheme for two-page unrestricted-rate parallel random input-output (P-RIO) code, which enables different code rates to be used for each page of multilevel memory. On the second page, the set of cell-state vectors for each message consists of two complementary vectors with length n. There are a total of 2n-1 sets that are disjoint to guarantee that they are uniquely decodable for 2n-1 messages. On the first page, the set of cell-state vectors for each message consists of all weight-u vectors with their non-zero elements restricted to the same (2u-1) positions, where the non-negative integer u is less than or equal to half of the code length. Finding cell-state vector sets such that they are disjoint on the first page is equivalent to the construction of constant-weight codes, and the number of disjoint sets is the best-known number of code words in the constant-weight codes. Our coding scheme is constructive, and the code length is arbitrary. The sum rates of our proposed codes are higher than those of previous work.

  • FOREWORD Open Access

    Ken-ichi IWATA  Hiroshi KAMABE  

     
    FOREWORD

      Vol:
    E105-A No:3
      Page(s):
    344-344