The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Rong SUN(18hit)

1-18hit
  • On the Linear Complexity of Some Ternary Sequences with Ideal Autocorrelation

    Xiaoni DU  Yu ZHOU  Rong SUN  Guozhen XIAO  

     
    LETTER-Spread Spectrum Technologies and Applications

      Vol:
    E91-A No:2
      Page(s):
    709-712

    In this letter, we examine the linear complexity of some 3-ary sequences, proposed by No, of period 3n-1(n=3ek, e, k integer) with the ideal autocorrelation property. The exact value of linear complexity k(6e)w is determined when the parameter r =. Furthermore, the upper bound of the linear complexity is given when the other forms of the value r is taken. Finally, a Maple program is designed to illustrate the validity of the results.

  • Lowering Error Floors of Irregular LDPC Codes by Combining Construction and Decoding

    Xiaopeng JIAO  Jianjun MU  Fan FANG  Rong SUN  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:1
      Page(s):
    271-274

    Irregular low-density parity-check (LDPC) codes generally have good decoding performance in the waterfall region, but they exhibit higher error floors than regular ones. In this letter, we present a hybrid method, which combines code construction and the iterative decoding algorithm, to tackle this problem. Simulation results show that the proposed scheme decreases the error floor significantly for irregular LDPC codes over binary-input additive white Gaussian noise (BIAWGN) channel.

  • Iterative Decoding for the Davey-MacKay Construction over IDS-AWGN Channel

    Xiaopeng JIAO  Jianjun MU  Rong SUN  

     
    LETTER-Coding Theory

      Vol:
    E96-A No:5
      Page(s):
    1006-1009

    Turbo equalization is an iterative equalization and decoding technique that can achieve impressive performance gains for communication systems. In this letter, we investigate the turbo equalization method for the decoding of the Davey-MacKay (DM) construction over the IDS-AWGN channels, which indicates a cascaded insertion, deletion, substitution (IDS) channel and an additive white Gaussian noise (AWGN) channel. The inner decoder for the DM construction can be seen as an maximum a-posteriori (MAP) detector. It receives the beliefs generated by the outer LDPC decoder when turbo equalization is used. Two decoding schemes with different kinds of inner decoders, namely hard-input inner decoder and soft-input inner decoder, are investigated. Simulation results show that significant performance gains are obtained for both decoders with respect to the insertion/deletion probability at different SNR values.

  • On the Randomness of Generalized Cyclotomic Sequences of Order Two and Length pq

    Shengqiang LI  Zhixiong CHEN  Rong SUN  Guozhen XIAO  

     
    LETTER-Information Security

      Vol:
    E90-A No:9
      Page(s):
    2037-2041

    In this letter we introduce new generalized cyclotomic sequences of order two and length pq firstly, then we determine the linear complexity and autocorrelation values of these sequences. Our results show that these sequences are rather good from the linear complexity viewpoint.

  • A Construction of Binary Cyclotomic Sequences Using Extension Fields

    Zhixiong CHEN  Xiaoni DU  Rong SUN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E92-A No:2
      Page(s):
    663-667

    Based on the cyclotomy classes of extension fields, a family of binary cyclotomic sequences are constructed and their pseudorandom measures (i.e., the well-distribution measure and the correlation measure of order k) are estimated using certain exponential sums. A lower bound on the linear complexity profile is also presented in terms of the correlation measure.

  • Nonbinary Quasi-Cyclic LDPC Cycle Codes with Low-Density Systematic Quasi-Cyclic Generator Matrices

    Yang YANG  Chao CHEN  Jianjun MU  Jing WANG  Rong SUN  Xinmei WANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E94-B No:9
      Page(s):
    2620-2623

    In this letter, we propose an appealing class of nonbinary quasi-cyclic low-density parity-check (QC-LDPC) cycle codes. The parity-check matrix is carefully designed such that the corresponding generator matrix has some nice properties: 1) systematic, 2) quasi-cyclic, and 3) sparse, which allows a parallel encoding with low complexity. Simulation results show that the performance of the proposed encoding-aware LDPC codes is comparable to that of the progressive-edge-growth (PEG) constructed nonbinary LDPC cycle codes.

  • The Structure and Magnetic Properties of Mn-Zn Ferrite Thin Films Fabricated by Electroless Plating in Aqueous Solution

    Fashen LI  Jianrong SUN  Xuewen WANG  Jianbo WANG  

     
    PAPER

      Vol:
    E90-C No:8
      Page(s):
    1561-1564

    Mn1-xZnxFe2O4 thin films with various Zn contents, 300 nm in thickness, were synthesized on glass substrates directly by electroless plating in aqueous solution at 90 without a heat treatment. With XRD, SEM, VSM, the crystallographic structure, morphology of the films and the macroscopic magnetic properties were characterized. The Mn-Zn ferrite films have a single phase spinel structure and well-crystallized columnar grains grow perpendicularly to the substrate. The change of the coercivity is not consistent with that of the bulk materials. As the Zn content in the films increases, the value of Hc decreases firstly, and then increases. At x=0.5, the minimum value of Hc is 3.7 kA/m and the value of Ms is 419.6 kA/m. The hyperfine magnetic fields, cation occupations and the distribution of the magnetic moments in film plane were studied by the conversion electron Mossbauer spectroscopy (CEMS).

  • Autocorrelation and Linear Complexity of the New Generalized Cyclotomic Sequences

    Tongjiang YAN  Rong SUN  Guozhen XIAO  

     
    PAPER-Information Security

      Vol:
    E90-A No:4
      Page(s):
    857-864

    This paper contributes to a new generalized cyclotomic sequences of order two with respect to p1e1p2e2… ptet. The emphasis is on the linear complexity and autocorrelation of new prime-square sequences and two-prime sequences, two special cases of these generalized cyclotomic sequences. Our method is based on their characteristic polynomials. Results show that these sequences possess good linear complexity. Under certain conditions, the autocorrelation functions of new prime-square sequences and two-prime sequences may be three-valued.

  • Dynamic Bubble-Check Algorithm for Check Node Processing in Q-Ary LDPC Decoders

    Wei LIN  Baoming BAI  Xiao MA  Rong SUN  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:5
      Page(s):
    1815-1818

    A simplified algorithm for check node processing of extended min-sum (EMS) q-ary LDPC decoders is presented in this letter. Compared with the bubble check algorithm, the so-called dynamic bubble-check (DBC) algorithm aims to further reduce the computational complexity for the elementary check node (ECN) processing. By introducing two flag vectors in ECN processing, The DBC algorithm can use the minimum number of comparisons at each step. Simulation results show that, DBC algorithm uses significantly fewer comparison operations than the bubble check algorithm, and presents no performance loss compared with standard EMS algorithm on AWGN channels.

  • Design of Quasi-Cyclic Cycle LDPC Codes over GF(q)

    ShuKai HU  Chao CHEN  Rong SUN  XinMei WANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:3
      Page(s):
    983-986

    Quasi-cyclic (QC) low-density parity-check (LDPC) codes have several appealing properties regarding decoding, storage requirements and encoding aspects. In this paper, we focus on the QC LDPC codes over GF(q) whose parity-check matrices have fixed column weight j = 2. By investigating two subgraphs in the Tanner graphs of the corresponding base matrices, we derive two upper bounds on the minimum Hamming distance for this class of codes. In addition, a method is proposed to construct QC LDPC codes over GF(q), which have good Hamming distance distributions. Simulations show that our designed codes have good performance.

  • Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings

    Xuefei CAO  Weidong KOU  Yong YU  Rong SUN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:12
      Page(s):
    3833-3836

    This letter proposes an identity-based authenticated key agreement protocol. Different from available comparable ones, the new protocol realizes implicit authentication without bilinear pairings which makes it more efficient. The security of proposed protocol can be reduced to the standard Computational Diffie-Hellman problem. Two variants of the protocol are also given, with one achieving the security-efficiency trade-off and the other providing authenticated key agreement between users of different domains.

  • Parity-Check Matrix Extension to Lower the Error Floors of Irregular LDPC Codes

    Jianjun MU  Xiaopeng JIAO  Jianguang LIU  Rong SUN  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E94-B No:6
      Page(s):
    1725-1727

    Trapping sets have been identified as one of the main factors causing error floors of low-density parity-check (LDPC) codes at high SNR values. By adding several new rows to the original parity-check matrix, a novel method is proposed to eliminate small trapping sets in the LDPC code's Tanner graph. Based on this parity-check matrix extension, we design new codes with low error floors from the original irregular LDPC codes. Simulation results show that the proposed method can lower the error floors of irregular LDPC codes significantly at high SNR values over AWGN channels.

  • Linear Transmitter Precoding Design with Matching Weighted SLNR for Multiuser MIMO Downlink Systems

    Chuiqiang SUN  Jianhua GE  Rong SUN  Xinxin BAO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:12
      Page(s):
    3915-3917

    A multiuser precoding algorithm based on matching weighted signal-to-leakage-and-noise ratio (SLNR) is proposed for multiuser MIMO downlink systems. In the proposed algorithm, the matching weight factor is selected based on the effective channel gain, and the leakage power caused by each user is weighted by the factor. The precoding vector is obtained by maximizing the matching weighted SLNR. Simulation results show the superiority of the proposed scheme in terms of bit error rate over the conventional SLNR schemes.

  • Trace Representation of a New Class of Sextic Residue Sequences of Period p≡3 ( mod 8)

    Xiaoni DU  Zhixiong CHEN  Ailing SHI  Rong SUN  

     
    LETTER-Information Theory

      Vol:
    E92-A No:2
      Page(s):
    668-670

    A new class of sextic residue sequences of period prime p=4u2+27=6f+1 ≡ 3 ( mod 8) are presented. Their trace function representations are determined. And the exact value of the linear complexity is derived from the trace function representations. The result indicates that the new sextic sequences are quite good from the linear complexity viewpoint.

  • Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme

    Fagen LI  Shijie ZHOU  Rong SUN  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:7
      Page(s):
    1820-1823

    In a proxy multi-signature scheme, a designated proxy signer can generate the signature on behalf of a group of original signers. Recently, Wang and Cao proposed an identity based proxy multi-signature scheme along with a security model. Although they proved that their scheme is secure under this model, we disprove their claim and show that their scheme is not secure.

  • A Simple but Effective Congestion Control Scheme for Safety-Related Events in VANET

    Chen CHEN  Qingqi PEI  Xiaoji LI  Rong SUN  

     
    LETTER-Computer System

      Vol:
    E95-D No:10
      Page(s):
    2548-2551

    In this letter, a Simple but Effective Congestion Control scheme (SECC) in VANET has been proposed to guarantee the successful transmissions for safety-related nodes. The strategy derive a Maximum Beacon Load Activity Indicator (MBLAI) to restrain the neighboring general periodical beacon load for the investigated safety-related “observation nodes”, i.e., the nodes associated with some emergent events. This mechanism actually reserves some bandwidth for the safety-related nodes to make them have higher priorities than periodical beacons to access channel. Different from the static congestion control scheme in IEEE802.11p, this strategy could provide dynamic control strength for congestion according to tolerant packets drop ratio for different applications.

  • Semi-Irregular LDPC Codes Used in MBC

    Rong SUN  Arika FUKUDA  Kaiji MUKUMOTO  Xinmei WANG  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:4
      Page(s):
    998-1000

    Based on the channel properties of of the meteor burst communication, a kind of semi-irregular LDPC codes suitable for MBC is presented. Simulation results show that the application of this kind of semi-irregular LDPC codes in MBC yields better performance than the regular ones. Some theoretical analyses are given.

  • More Efficient VLR Group Signature Satisfying Exculpability

    Jingliang ZHANG  Lizhen MA  Rong SUN  Yumin WANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E91-A No:7
      Page(s):
    1831-1835

    In this letter, we improve NF'07 (Nakanishi and Funabiki) VLR group signature scheme such that it satisfies exculpability and has lower computation costs. In the proposed scheme, a group member generates his own private key together with the group manager in order to realize exculpability while the signature size is not made longer. Also, a new revocation check method is proposed at the step of verifying, and the computation costs of verifying are independent of the number of the revoked members, while they are linear with the number of the revoked members in the original scheme. Thus, the proposed scheme is more efficient than the original scheme and can be applicable to mobile environments such as IEEE 802.1x.