The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

  • Impact Factor

    0.48

  • Eigenfactor

    0.003

  • article influence

    0.1

  • Cite Score

    1.1

Advance publication (published online immediately after acceptance)

Volume E101-A No.3  (Publication Date:2018/03/01)

    Regular Section
  • Implementing 128-Bit Secure MPKC Signatures

    Ming-Shing CHEN  Wen-Ding LI  Bo-Yuan PENG  Bo-Yin YANG  Chen-Mou CHENG  

     
    PAPER-Cryptography and Information Security

      Page(s):
    553-569

    Multivariate Public Key Cryptosystems (MPKCs) are often touted as future-proofing against Quantum Computers. In 2009, it was shown that hardware advances do not favor just “traditional” alternatives such as ECC and RSA, but also makes MPKCs faster and keeps them competitive at 80-bit security when properly implemented. These techniques became outdated due to emergence of new instruction sets and higher requirements on security. In this paper, we review how MPKC signatures changes from 2009 including new parameters (from a newer security level at 128-bit), crypto-safe implementations, and the impact of new AVX2 and AESNI instructions. We also present new techniques on evaluating multivariate polynomials, multiplications of large finite fields by additive Fast Fourier Transforms, and constant time linear solvers.

  • Analysis of a Sufficient Condition on the Optimality of a Decoded Codeword of Soft-Decision Decodings for Binary Linear Codes on a 4-Level Quantization over an AWGN Channel

    Takuya KUSAKA  

     
    PAPER-Coding Theory

      Page(s):
    570-576

    In this paper, a study of a sufficient condition on the optimality of a decoded codeword of soft-decision decodings for binary linear codes is shown for a quantized case. A typical uniform 4-level quantizer for soft-decision decodings is employed for the analysis. Simulation results on the (64,42,8) Reed-Muller code indicates that the condition is effective for SN ratios at 3[dB] or higher for any iterative style optimum decodings.

  • Symbol Error Probability Performance of Rectangular QAM with MRC Reception over Generalized α-µ Fading Channels

    Furqan Haider QURESHI  Qasim Umar KHAN  Shahzad Amin SHEIKH  Muhammad ZEESHAN  

     
    PAPER-Communication Theory and Signals

      Page(s):
    577-584

    In this paper, a new and an accurate symbol error probability's analytical model of Rectangular Quadrature Amplitude Modulation in α-µ fading channel is presented for single-user single-input multi-output environment, which can be easily extended to generalized fading channels. The maximal-ratio combining technique is utilized at the receiving end and unified moment generating functions are used to derivate the results. The fading mediums considered are independent and non-identical. The mathematical model presented is applicable for slow and frequency non-selective fading channels only. The final expression is presented in terms of Meijer G-function; it contains single integrals with finite limits to evaluate the mathematical expressions with numerical techniques. The beauty of the model will help evaluate symbol error probability of rectangular quadrature amplitude modulation with spatial diversity over various fading mediums not addressed in this article. To check for the validity of derived analytical expressions, comparison is made between theoretical and simulation results at the end.

  • Deep Neural Network Based Monaural Speech Enhancement with Low-Rank Analysis and Speech Present Probability

    Wenhua SHI  Xiongwei ZHANG  Xia ZOU  Meng SUN  Wei HAN  Li LI  Gang MIN  

     
    LETTER-Noise and Vibration

      Page(s):
    585-589

    A monaural speech enhancement method combining deep neural network (DNN) with low rank analysis and speech present probability is proposed in this letter. Low rank and sparse analysis is first applied on the noisy speech spectrogram to get the approximate low rank representation of noise. Then a joint feature training strategy for DNN based speech enhancement is presented, which helps the DNN better predict the target speech. To reduce the residual noise in highly overlapping regions and high frequency domain, speech present probability (SPP) weighted post-processing is employed to further improve the quality of the speech enhanced by trained DNN model. Compared with the supervised non-negative matrix factorization (NMF) and the conventional DNN method, the proposed method obtains improved speech enhancement performance under stationary and non-stationary conditions.

  • Improving DOA Estimation and Preventing Target Split Using Automotive Radar Sensor Arrays

    Heemang SONG  Seunghoon CHO  Kyung-Jin YOU  Hyun-Chool SHIN  

     
    LETTER-Digital Signal Processing

      Page(s):
    590-594

    In this paper, we propose an automotive radar sensor compensation method improving direction of arrival (DOA) and preventing target split tracking. Amplitude and phase mismatching and mutual coupling between radar sensor arrays cause an inaccuracy problem in DOA estimation. By quantifying amplitude and phase distortion levels for each angle, we compensate the sensor distortion. Applying the proposed method to Bartlett, Capon and multiple signal classification (MUSIC) algorithms, we experimentally demonstrate the performance improvement using both experimental data from the chamber and real data obtained in actual road.

  • The Estimation of Satellite Attitude Using the Radar Cross Section Sequence and Particle Swarm Optimization

    Jidong QIN  Jiandong ZHU  Huafeng PENG  Tao SUN  Dexiu HU  

     
    LETTER-Digital Signal Processing

      Page(s):
    595-599

    The existing methods to estimate satellite attitude by using radar cross section (RCS) sequence suffer from problems such as low precision, computation complexity, etc. To overcome these problems, a novel model of satellite attitude estimation by the local maximum points of the RCS sequence is established and can reduce the computational time by downscaling the dimension of the feature vector. Moreover, a particle swarm optimization method is adopted to improve efficiency of computation. Numerical simulations show that the proposed method is robust and efficient.

  • Clutter Rank Estimation for Diving Platform Radar

    Fengde JIA  Zishu HE  

     
    LETTER-Analog Signal Processing

      Page(s):
    600-603

    A convenient formula for the estimation of the clutter rank of the diving platform radar is derived. Brennan's rule provides a general formula to estimate the clutter rank for the side looking radar with a linear array, which is normally called one-dimensional (1D) estimation problem. With the help of the clutter wavenumber spectrum, the traditional estimation of the clutter rank is extended to the diving scenario and the estimation problem is two-dimensional (2D). The proposed rule is verified by the numerical simulations.

  • Construction of Permutations and Bent Functions

    Shanqi PANG  Miao FENG  Xunan WANG  Jing WANG  

     
    LETTER-Cryptography and Information Security

      Page(s):
    604-607

    Bent functions have been applied to cryptography, spread spectrum, coding theory, and combinatorial design. Permutations play an important role in the design of cryptographic transformations such as block ciphers, hash functions and stream ciphers. By using the Kronecker product this paper presents a general recursive construction method of permutations over finite field. As applications of our method, several infinite classes of permutations are obtained. By means of the permutations obtained and M-M functions we construct several infinite families of bent functions.

  • Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server

    Min DONG  Yanli REN  Guorui FENG  

     
    LETTER-Cryptography and Information Security

      Page(s):
    608-611

    With the popularity of cloud computing services, outsourcing computation has entered a period of rapid development. Modular exponentiation is one of the most expensive operations in public key cryptographic systems, but the current outsourcing algorithms for modular exponentiations (MExps) with single server are inefficient or have small checkability. In this paper, we propose an efficient and fully verifiable algorithm for outsourcing multiple MExps with single untrusted server where the errors can be detected by an outsourcer with a probability of 1. The theory analysis and experimental evaluations also show that the proposed algorithm is the most efficient one compared with the previous work. Finally, we present the outsourcing schemes of digital signature algorithm (DSA) and attribute based encryption (ABE) as two applications of the proposed algorithm.

  • Optimal ZCZ Complementary Sequence Sets with Low Column Sequence PMEPR

    Yubo LI  Liying TIAN  Shengyi LIU  

     
    LETTER-Information Theory

      Page(s):
    612-616

    In this letter, based on orthogonal Golay sequence sets and orthogonal matrices, general constructions of zero correlation zone (ZCZ) aperiodic complementary sequence (ZACS) sets are proposed. The resultant ZACSs have column sequence peak-to-mean envelop power ratio (PMEPR) of at most 2, and the parameters of the sequence sets are optimal with respect to the theoretical bound. The novel ZACS sets are suitable for approximately synchronized multi-carrier CDMA (MC-CDMA) communication systems.

  • On the Second Separating Redundancy of LDPC Codes from Finite Planes

    Haiyang LIU  Yan LI  Lianrong MA  

     
    LETTER-Coding Theory

      Page(s):
    617-622

    The separating redundancy is an important concept in the analysis of the error-and-erasure decoding of a linear block code using a parity-check matrix of the code. In this letter, we derive new constructive upper bounds on the second separating redundancies of low-density parity-check (LDPC) codes constructed from projective and Euclidean planes over the field Fq with q even.

  • Efficient Early Termination Criterion for ADMM Penalized LDPC Decoder

    Biao WANG  Xiaopeng JIAO  Jianjun MU  Zhongfei WANG  

     
    LETTER-Coding Theory

      Page(s):
    623-626

    By tracking the changing rate of hard decisions during every two consecutive iterations of the alternating direction method of multipliers (ADMM) penalized decoding, an efficient early termination (ET) criterion is proposed to improve the convergence rate of ADMM penalized decoder for low-density parity-check (LDPC) codes. Compared to the existing ET criterion for ADMM penalized decoding, the proposed method can reduce the average number of iterations significantly at low signal-to-noise ratios with negligible performance degradation.

  • Adaptive Extrinsic Information Scaling for Concatenated Zigzag Codes Based on Max-Log-APP

    Hao ZHENG  Xingan XU  Changwei LV  Yuanfang SHANG  Guodong WANG  Chunlin JI  

     
    LETTER-Coding Theory

      Page(s):
    627-631

    Concatenated zigzag (CZ) codes are classified as one kind of parallel-concatenated codes with powerful performance and low complexity. This kind of codes has flexible implementation methods and a good application prospect. We propose a modified turbo-type decoder and adaptive extrinsic information scaling method based on the Max-Log-APP (MLA) algorithm, which can provide a performance improvement also under the relatively low decoding complexity. Simulation results show that the proposed method can effectively help the sub-optimal MLA algorithm to approach the optimal performance. Some contrasts with low-density parity-check (LDPC) codes are also presented in this paper.

  • Low Complexity Compressive Sensing Greedy Detection of Generalized Quadrature Spatial Modulation

    Rajesh RAMANATHAN  Partha Sharathi MALLICK  Thiruvengadam SUNDARAJAN JAYARAMAN  

     
    LETTER-Communication Theory and Signals

      Page(s):
    632-635

    In this letter, we propose a generalized quadrature spatial modulation technique (GQSM) which offers additional bits per channel use (bpcu) gains and a low complexity greedy detector algorithm, structured orthogonal matching pursuit (S-OMP)- GQSM, based on compressive sensing (CS) framework. Simulation results show that the bit error rate (BER) performance of the proposed greedy detector is very close to maximum likelihood (ML) and near optimal detectors based on convex programming.

  • Highly Reliable Multicast Protocol Using Relay Retransmission for WLANs

    Byungcheol KANG  Jaeseok KIM  

     
    LETTER-Communication Theory and Signals

      Page(s):
    636-639

    In this letter, a new multicast medium access control protocol for wireless local area network(WLAN) system is proposed to achieve high reliability. Multicast in conventional WLANs offers highly efficient use of wireless resources, but has disadvantages of low reliability and low data rates due to lack of feedback. Our proposed multicast frame includes a sequence that indicates the stations (STAs) that send the ACK frame first. Using the sequence, the proposed system makes feedback for the multicast frame. If some STAs fail to receive the frame, the other STAs that have successfully received the frame retransmit the frame. The proposed multicast protocol with relay retransmission can achieve a 100% frame delivery ratio in a strong-fading channel while IEEE 802.11aa multicast protocol cannot. The proposed multicast protocol can also conserve 48% throughput to the maximum data rate in a strong-fading channel.

  • Generalized Spatial Modulation Based on Quaternary Quasi-Orthogonal Sequences

    Yulong SHANG  Hojun KIM  Hosung PARK  Taejin JUNG  

     
    LETTER-Communication Theory and Signals

      Page(s):
    640-643

    The conventional generalized spatial modulation (GSM) simultaneously activates multiple transmit antennas in order to improve the spectral efficiency of the original SM. In this letter, to lessen the hardware burden of the multiple RF chains, we provide a new scheme that is designed by combining the GSM scheme using only two active antennas with quaternary quasi-orthogonal sequences of a length of two. Compared with the other SM schemes, the proposed scheme has significant benefits in average error performances and/or their hardware complexities of the RF systems.

  • On-Orbit Estimation and Calibration of GPS Antenna Geometry Offsets for Attitude Determination of LEO Satellites

    Huiling HOU  Weisheng HU  Kang WU  Xuwen LIANG  

     
    LETTER-Spread Spectrum Technologies and Applications

      Page(s):
    644-648

    In this letter, a novel on-orbit estimation and calibration method of GPS antenna geometry offsets for attitude determination of LEO satellites is proposed. Both baseline vectors in the NED coordinate system are achieved epoch-by-epoch firstly. Then multiple epochs' baseline vectors are united to compute all the offsets via an UKF for a certain long time. After on-orbit estimation and calibration, instantaneous and accurate attitude can be achieved. Numerical results show that the proposed method can obtain the offsets of each baseline in all directions with high accuracy estimation and small STDs, and effective attitudes can be achieved after antenna geometry calibration using the estimated offsets. The high accuracy give the proposed scheme a strong practical-oriented ability.

  • Efficient Query Dissemination Scheme for Wireless Heterogeneous Sensor Networks

    Sungjun KIM  Daehee KIM  Sunshin AN  

     
    LETTER-Mobile Information Network and Personal Communications

      Page(s):
    649-653

    In this paper, we define a wireless sensor network with multiple types of sensors as a wireless heterogeneous sensor network (WHSN), and propose an efficient query dissemination scheme (EDT) in the WHSN. The EDT based on total dominant pruning can forward queries to only the nodes with data requested by the user, thereby reducing unnecessary packet transmission. We show that the EDT is suitable for the WHSN environment through a variety of simulations.

  • Deep Attention Residual Hashing

    Yang LI  Zhuang MIAO  Ming HE  Yafei ZHANG  Hang LI  

     
    LETTER-Image

      Page(s):
    654-657

    How to represent images into highly compact binary codes is a critical issue in many computer vision tasks. Existing deep hashing methods typically focus on designing loss function by using pairwise or triplet labels. However, these methods ignore the attention mechanism in the human visual system. In this letter, we propose a novel Deep Attention Residual Hashing (DARH) method, which directly learns hash codes based on a simple pointwise classification loss function. Compared to previous methods, our method does not need to generate all possible pairwise or triplet labels from the training dataset. Specifically, we develop a new type of attention layer which can learn human eye fixation and significantly improves the representation ability of hash codes. In addition, we embedded the attention layer into the residual network to simultaneously learn discriminative image features and hash codes in an end-to-end manner. Extensive experiments on standard benchmarks demonstrate that our method preserves the instance-level similarity and outperforms state-of-the-art deep hashing methods in the image retrieval application.

  • Full-Automatic Optic Disc Boundary Extraction Based on Active Contour Model with Multiple Energies

    Yuan GAO  Chengdong WU  Xiaosheng YU  Wei ZHOU  Jiahui WU  

     
    LETTER-Vision

      Page(s):
    658-661

    Efficient optic disc (OD) segmentation plays a significant role in retinal image analysis and retinal disease screening. In this paper, we present a full-automatic segmentation approach called double boundary extraction for the OD segmentation. The proposed approach consists of the following two stages: first, we utilize an unsupervised learning technology and statistical method based on OD boundary information to obtain the initial contour adaptively. Second, the final optic disc boundary is extracted using the proposed LSO model. The performance of the proposed method is tested on the public DIARETDB1 database and the experimental results demonstrate the effectiveness and advantage of the proposed method.

  • UCB-SC: A Fast Variant of KL-UCB-SC for Budgeted Multi-Armed Bandit Problem

    Ryo WATANABE  Junpei KOMIYAMA  Atsuyoshi NAKAMURA  Mineichi KUDO  

     
    LETTER-Mathematical Systems Science

      Page(s):
    662-667

    We propose a policy UCB-SC for budgeted multi-armed bandits. The policy is a variant of recently proposed KL-UCB-SC. Unlike KL-UCB-SC, which is computationally prohibitive, UCB-SC runs very fast while keeping KL-UCB-SC's asymptotical optimality when reward and cost distributions are Bernoulli with means around 0.5, which are verified both theoretically and empirically.