The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

6201-6220hit(16314hit)

  • Gaussian Zig-Zag Source Coding Problem

    Yasutada OOHAMA  

     
    PAPER-Source Coding

      Vol:
    E93-A No:11
      Page(s):
    1889-1903

    In 1997, the author considered the separate coding system for two correlated memoryless Gaussian sources and squared distortion measures and determined the rate distortion region in a case where one source plays a role of the partial side information at the decoder. The above source coding system can be extended to a certain class of source network with several decoders, where each decoder has at most one full or partial side information. This class of source network is called the one-helps-one system. In this paper we consider a source network belonging to this class for correlated memoryless Gaussian sources and squared distortion measures. This source network was posed and investigated by Korner and Marton and was called the zig-zag source network. They studied the zig-zag source network in the case of discrete memoryless multiple sources. In this paper we study the zig-zag source network in the case of correlated memoryless Gaussian sources and square distortion. We determine the rate distortion region in a case where sources have a certain correlation property.

  • A Note on the Branch-and-Cut Approach to Decoding Linear Block Codes

    Shunsuke HORII  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    PAPER-Coding Theory

      Vol:
    E93-A No:11
      Page(s):
    1912-1917

    Maximum likelihood (ML) decoding of linear block codes can be considered as an integer linear programming (ILP). Since it is an NP-hard problem in general, there are many researches about the algorithms to approximately solve the problem. One of the most popular algorithms is linear programming (LP) decoding proposed by Feldman et al. LP decoding is based on the LP relaxation, which is a method to approximately solve the ILP corresponding to the ML decoding problem. Advanced algorithms for solving ILP (approximately or exactly) include cutting-plane method and branch-and-bound method. As applications of these methods, adaptive LP decoding and branch-and-bound decoding have been proposed by Taghavi et al. and Yang et al., respectively. Another method for solving ILP is the branch-and-cut method, which is a hybrid of cutting-plane and branch-and-bound methods. The branch-and-cut method is widely used to solve ILP, however, it is unobvious that the method works well for the ML decoding problem. In this paper, we show that the branch-and-cut method is certainly effective for the ML decoding problem. Furthermore the branch-and-cut method consists of some technical components and the performance of the algorithm depends on the selection of these components. It is important to consider how to select the technical components in the branch-and-cut method. We see the differences caused by the selection of those technical components and consider which scheme is most effective for the ML decoding problem through numerical simulations.

  • A Relation between Self-Reciprocal Transformation and Normal Basis over Odd Characteristic Field

    Shigeki KOBAYASHI  Yasuyuki NOGAMI  Tatsuo SUGIMURA  

     
    PAPER-Coding Theory

      Vol:
    E93-A No:11
      Page(s):
    1923-1931

    Let q and f(x) be an odd characteristic and an irreducible polynomial of degree m over Fq, respectively. Then, suppose that F(x)=xmf(x+x-1) becomes irreducible over Fq. This paper shows that the conjugate zeros of F(x) with respect to Fq form a normal basis in Fq2m if and only if those of f(x) form a normal basis in Fqm and the compart of conjugates given as follows are linearly independent over Fq, {γ-γ-1,(γ-γ-1)q, …,(γ-γ-1)qm-1} where γ is a zero of F(x) and thus a proper element in Fq2m. In addition, from the viewpoint of q-polynomial, this paper proposes an efficient method for checking whether or not the conjugate zeros of F(x) satisfy the condition.

  • Weight Distributions of Multi-Edge Type LDPC Codes

    Kenta KASAI  Tomoharu AWANO  David DECLERCQ  Charly POULLIAT  Kohichi SAKANIWA  

     
    PAPER-Coding Theory

      Vol:
    E93-A No:11
      Page(s):
    1942-1948

    The multi-edge type LDPC codes, introduced by Richardson and Urbanke, present the general class of structured LDPC codes. In this paper, we derive the average weight distributions of the multi-edge type LDPC code ensembles. Furthermore, we investigate the asymptotic exponential growth rate of the average weight distributions and investigate the connection to the stability condition of the density evolution.

  • Optimum Soft-Output of Autoregressive Detector for Offtrack Interference in LDPC-Coded Perpendicular Magnetic Recording

    Kohsuke HARADA  Haruka OBATA  Hironori UCHIKAWA  Kenji YOSHIDA  Yuji SAKAI  

     
    PAPER-Coding Theory

      Vol:
    E93-A No:11
      Page(s):
    1966-1975

    In this paper, we consider the behavior of an autoregressive (AR) detector for partial-response (PR) signaling against offtrack interference (OTI) environment in perpendicular magnetic recording. Based on the behavior, we derive the optimum branch metric to construct the detector by the Viterbi algorithm. We propose an optimum AR detector for OTI that considers an optimum branch metric calculation and an estimation of noise power due to OTI in order to calculate an accurate branch metric. To evaluate the reliability of soft-output likelihood values calculated by our proposed AR detector, we demonstrate a bit error rate performance (BER) of low-density parity-check (LDPC) codes under OTI existing channel by computer simulation. Our simulation results show the proposed AR detector can achieve a better LDPC-coded BER performance than the conventional AR detector. We also show the BER performance of our proposal can keep within 0.5 dB of the case that perfect channel state information regarding OTI is used in the detector. In addition, we show that the partial-response maximum-likelihood (PRML) detector is robust against OTI even if OTI is not handled by the detector.

  • Forward-Secure Group Signatures from Pairings

    Toru NAKANISHI  Yuta HIRA  Nobuo FUNABIKI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:11
      Page(s):
    2007-2016

    To reduce the damage of key exposures, forward-secure group signature schemes have been first proposed by Song. In the forward-secure schemes, a secret key of a group member is updated by a one-way function every interval and the previous secret key is erased. Thus, even if a secret key is exposed, the signatures produced by the secret keys of previous intervals remain secure. Since the previous forward-secure group signature schemes are based on the strong RSA assumption, the signatures are longer than pairing-based group signatures. In addition, the complexity of the key update or signing/verification is O(T), where T is the total number of intervals. In this paper, a forward-secure group signature scheme from pairings is proposed. The complexity of our key update and signing/verification is O(log T).

  • On the Diversity-Multiplexing Tradeoff in MIMO Wireless Channels at Finite SNRs

    Hamid EBRAHIMZAD  Abbas MOHAMMADI  

     
    PAPER-Detection and Wireless Communications

      Vol:
    E93-A No:11
      Page(s):
    2057-2064

    In this paper, a new framework to characterize the tradeoff between diversity and multiplexing gains of Multi Input Multi Output (MIMO) wireless systems at finite Signal to Noise Ratios (SNRs) is presented. By suitable definitions of non-asymptotic diversity and multiplexing gains, we extract a useful tool to investigate the performance of space-time schemes at finite SNRs. Exact results on the diversity-multiplexing tradeoff (DMT) are derived for Multi Input Single Output (MISO), Single Input Multi Output (SIMO), and 22 MIMO channels. We show that our outcomes coincide with the Zheng and Tse's results at high SNRs. When the new definitions of non-asymptotic diversity and multiplexing gains are used, the resulted DMT converges to its asymptotic value at realistic SNRs. Furthermore, using these definitions enables the diversity gain to represent the outage probability with reasonable accuracy.

  • Characterization of Factor Graph by Mooij's Sufficient Condition for Convergence of the Sum-Product Algorithm

    Tomoharu SHIBUYA  

     
    LETTER-Coding Theory

      Vol:
    E93-A No:11
      Page(s):
    2083-2088

    Recently, Mooij et al. proposed new sufficient conditions for convergence of the sum-product algorithm, and it was also shown that if the factor graph is a tree, Mooij's sufficient condition for convergence is always activated. In this letter, we show that the converse of the above statement is also true under some assumption, and that the assumption holds for the sum-product decoding. These newly obtained fact implies that Mooij's sufficient condition for convergence of the sum-product decoding is activated if and only if the factor graph of the a posteriori probability of the transmitted codeword is a tree.

  • Sorted Sector Covering Combined with Image Condensation -- An Efficient Method for Local Dimming of Direct-Lit and Edge-Lit LCDs Open Access

    Marc ALBRECHT  Andreas KARRENBAUER  Tobias JUNG  Chihao XU  

     
    INVITED PAPER

      Vol:
    E93-C No:11
      Page(s):
    1556-1563

    We consider the backlight calculation of local dimming as an optimization problem. The luminance produced by many LEDs at each pixel considered is calculated which should cover the gray value of each pixel, while the sum of LED currents is to be minimized. For this purpose a specific approach called as "Sorted Sector Covering" (SSC) was developed and is described in this paper. In our pre-processing unit called condenser the source image is reduced to a matrix of much lower resolution so that the computation effort of the SSC algorithm is drastically reduced. During this preprocessing phase, filter functions can be integrated so that a further reduction of the power consumption is achieved. Our processing system allows high power saving and high visual quality at low processor cost. We approach the local dimming problem in the physical viewing direction -- from LED to pixel. The luminance for the pixel is based on the light spread function (LSF) and the PWM values of the LEDs. As the physical viewing direction is chosen, this method is universal and can be applied for any kind of LED arrangement -- direct-lit as well as edge-lit. It is validated on prototypes, e.g., a locally dimmed edge-lit TV.

  • A New Unified Method for Fixed-Length Source Coding Problems of General Sources

    Tomohiko UYEMATSU  

     
    PAPER-Source Coding

      Vol:
    E93-A No:11
      Page(s):
    1868-1877

    This paper establishes a new unified method for fixed-length source coding problems of general sources. Specifically, we introduce an alternative definition of the smooth Renyi entropy of order zero, and show a unified approach to present the fixed-length coding rate in terms of this information quantity. Our definition of the smooth Renyi entropy has a clear operational meaning, and hence is easy to calculate for finite block lengths. Further, we represent various ε-source coding rate and the strong converse property for general sources in terms of the smooth Renyi entropy, and compare them with the results obtained by Han and Renner et al.

  • Optimal Algorithms for Finding Density-Constrained Longest and Heaviest Paths in a Tree

    Sung Kwon KIM  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E93-D No:11
      Page(s):
    2989-2994

    Let T be a tree with n nodes, in which each edge is associated with a length and a weight. The density-constrained longest (heaviest) path problem is to find a path of T with maximum path length (weight) whose path density is bounded by an upper bound and a lower bound. The path density is the path weight divided by the path length. We show that both problems can be solved in optimal O(n log n) time.

  • Improved Indoor Location Estimation Using Fluorescent Light Communication System with a Nine-Channel Receiver

    Xiaohan LIU  Hideo MAKINO  Kenichi MASE  

     
    PAPER

      Vol:
    E93-B No:11
      Page(s):
    2936-2944

    The need for efficient movement and precise location of robots in intelligent robot control systems within complex buildings is becoming increasingly important. This paper proposes an indoor positioning and communication platform using Fluorescent Light Communication (FLC) employing a newly developed nine-channel receiver, and discusses a new location estimation method using FLC, that involves a simulation model and coordinate calculation formulae. A series of experiments is performed. Distance errors of less than 25 cm are achieved. The enhanced FLC system yields benefits such as greater precision and ease of use.

  • Opportunistic Spectrum Access in Unslotted Primary Networks

    Yutae LEE  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E93-B No:11
      Page(s):
    3141-3143

    We propose an opportunistic spectrum access scheme for unslotted secondary users exploiting spectrum opportunities in unslotted primary networks. An analytical model is developed to investigate the performance of the proposed scheme, and numerical results are presented to evaluate the performance in unslotted primary networks.

  • A Self-Calibration Technique for Capacitor Mismatch Errors of an Interleaved SAR ADC

    Yasuhide KURAMOCHI  Masayuki KAWABATA  Kouichiro UEKUSA  Akira MATSUZAWA  

     
    PAPER-Electronic Circuits

      Vol:
    E93-C No:11
      Page(s):
    1630-1637

    We present self-calibration techniques for an interleaved SAR (Successive Approximation Register) ADC. The calibration technique is based on hardware corrections for linearity of single stage, gain error and mismatch errors of parallel ADCs. The 4-interleaved 11-bit ADC has been fabricated in a 0.18-µm CMOS process. Using the calibrations, measurement and calculation results show that the differences of ramp characteristic among the 4-interleaving ADC can be decresased to under 0.63 LSB.

  • Estimation of the Effects in the Experimental Design Using Fourier Transforms

    Yoshifumi UKITA  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    LETTER-Information Theory

      Vol:
    E93-A No:11
      Page(s):
    2077-2082

    We propose that the model in experimental design be expressed in terms of an orthonormal system. Then, we can easily estimate the effects using Fourier transforms. We also provide the theorems with respect to the sum of squares needed in analysis of variance. Using these theorems, it is clear that we can execute the analysis of variance in this model.

  • A UML Approximation of Three Chidamber-Kemerer Metrics and Their Ability to Predict Faulty Code across Software Projects

    Ana Erika CAMARGO CRUZ  Koichiro OCHIMIZU  

     
    PAPER-Software Engineering

      Vol:
    E93-D No:11
      Page(s):
    3038-3050

    Design-complexity metrics, while measured from the code, have shown to be good predictors of fault-prone object-oriented programs. Some of the most often used metrics are the Chidamber and Kemerer metrics (CK). This paper discusses how to make early predictions of fault-prone object-oriented classes, using a UML approximation of three CK metrics. First, we present a simple approach to approximate Weighted Methods per Class (WMC), Response For Class (RFC) and Coupling Between Objects (CBO) CK metrics using UML collaboration diagrams. Then, we study the application of two data normalization techniques. Such study has a twofold purpose: to decrease the error approximation in measuring the mentioned CK metrics from UML diagrams, and to obtain a more similar data distribution of these metrics among software projects so that better prediction results are obtained when using the same prediction model across different software projects. Finally, we construct three prediction models with the source code of a package of an open source software project (Mylyn from Eclipse), and we test them with several other packages and three different small size software projects, using their UML and code metrics for comparison. The results of our empirical study lead us to conclude that the proposed UML RFC and UML CBO metrics can predict fault-proneness of code almost with the same accuracy as their respective code metrics do. The elimination of outliers and the normalization procedure used were of great utility, not only for enabling our UML metrics to predict fault-proneness of code using a code-based prediction model but also for improving the prediction results of our models across different software packages and projects.

  • Exact Formulation for Stochastic ML Estimation of DOA

    Haihua CHEN  Masakiyo SUZUKI  

     
    PAPER

      Vol:
    E93-A No:11
      Page(s):
    2141-2152

    This paper addresses the issue of Unconditional or Stochastic Maximum likelihood (SML) estimation of directions-of-arrival (DOA) finding using sensors with arbitrary array configuration. The conventional SML estimation is formulated without an important condition that the covariance matrix of signal components must be non-negative definite. An likelihood function can not be evaluated exactly for all possible sets of directions. First, this paper reveals that the conventional SML has three problems due to the lack of the condition. 1) Solutions in the noise-free case are not unique. 2) Global solution in the noisy case becomes ambiguous occasionally. 3) There exist situations that any local solution does not satisfy the condition of the non-negative definiteness. We propose an exact formulation of the SML estimation of DOA to evaluate an likelihood function exactly for any possible set of directions. The proposed formulation can be utilized without any theoretical difficulty. The three problems of the conventional SML are solved by the proposed exact SML estimation. Furthermore we show a local search technique in the conventional SML has a good chance to find an optimal or suboptimal DOA although the suboptimal solutions violate the condition of the non-negative definiteness. Finally some simulation results are shown to demonstrate good estimation properties of the exact SML estimation.

  • Performance of DS/SS System Using Pseudo-Ternary M-Sequences

    Ryo ENOMOTO  Hiromasa HABUCHI  Koichiro HASHIURA  

     
    PAPER-Spread Spectrum Technologies and Applications

      Vol:
    E93-A No:11
      Page(s):
    2299-2306

    In this paper, newly-found properties of the pseudo-ternary maximum-length shift register sequences (pseudo-ternary M-sequences) are described. In particular, the balance properties, the run-length distribution, the cross-correlation properties, and the decimation relationships are shown. The pseudo-ternary M-sequence is obtained by subtracting the one-chip shifted version from the {+1,-1}-valued M-sequence. Moreover, in this paper, performances of the direct sequence spread spectrum (DS/SS) system using the pseudo-ternary M-sequence are analyzed. In the performance evaluation, tracking error performance (jitter) and bit error rate (BER) performance that takes the jitter into account in DS/SS system with a pseudo-ternary M-sequence non-coherent DLL are evaluated. Using the pseudo-ternary M-sequence instead of the conventional M-sequences can improve the tracking error performance about 2.8 [dB]. Moreover, BER of the DS/SS system using the pseudo-ternary M-sequence is superior about 0.8 [dB] to that using the {+1,-1}-valued M-sequence.

  • Design and Analysis on Macro Diversity Scheme for Broadcast Services in Mobile Cellular Systems

    Yang LIU  Hui ZHAO  Yunchuan YANG  Wenbo WANG  Kan ZHENG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:11
      Page(s):
    3113-3120

    Recently, broadcast services are introduced in cellular networks and macro diversity is an effective way to combat fading. In this paper, we propose a kind of distributed space-time block codes (STBCs) for macro diversity which is constructed from the total antennas of multiple cooperating base stations, and all the antennas form an equivalent multiple input multiple output (MIMO) system. This code is termed High-Dimension-Full-Rate-Quasi-Orthogonal STBC (HDFR-QOSTBC) which can be characterized as: (1) It can be applied with any number of transmit antennas especially when the number of transmit antennas is large; (2) The code is with full transmit rate of one; (3) The Maximum Likelihood (ML) decoding complexity of this code is controllable and limited to Nt/2-symbol-decodable for total Nt transmit antennas. Then, we completely analyze the structure of the equivalent channel for the kind of codes and reveal a property that the eigenvectors of the equivalent channel are constant and independent from the channel realization, and this characteristic can be exploited for a new transmission structure with single-symbol linear decoder. Furthermore, we analyze different macro diversity schemes and give a performance comparison. The simulation results show that the proposed scheme is practical for the broadcast systems with significant performance improvement comparing with soft-combination and cyclic delay diversity (CDD) methods.

  • Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices

    Tetsunao MATSUTA  Tomohiko UYEMATSU  Ryutaroh MATSUMOTO  

     
    PAPER-Source Coding

      Vol:
    E93-A No:11
      Page(s):
    1878-1888

    Low-density parity-check (LDPC) codes become very popular in channel coding, since they can achieve the performance close to maximum-likelihood (ML) decoding with linear complexity of the block length. Recently, Muramatsu et al. proposed a code using LDPC matrices for Slepian-Wolf source coding, and showed that their code can achieve any point in the achievable rate region of Slepian-Wolf source coding. However, since they employed ML decoding, their decoder needs to know the probability distribution of the source. Hence, it is an open problem whether there exists a universal code using LDPC matrices, where universal code means that the error probability of the code vanishes as the block length tends to infinity for all sources whose achievable rate region contains the rate pair of encoders. In this paper, we show the existence of a universal Slepian-Wolf source code using LDPC matrices for stationary memoryless sources.

6201-6220hit(16314hit)