The search functionality is under construction.
The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

  • Impact Factor

    0.40

  • Eigenfactor

    0.003

  • article influence

    0.1

  • Cite Score

    1.1

Advance publication (published online immediately after acceptance)

Volume E104-A No.7  (Publication Date:2021/07/01)

    Regular Section
  • Feedback Path-Tracking Pre-Inverse Type Active Noise Control

    Keisuke OKANO  Naoto SASAOKA  Yoshio ITOH  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2020/12/28
      Page(s):
    954-961

    We propose online feedback path modeling with a pre-inverse type active noise control (PIANC) system to track the fluctuation stably in the feedback path. The conventional active noise control (ANC) system with online feedback path modeling (FBPM) filter bases filtered-x least mean square (FxLMS) algorithm. In the FxLMS algorithm, the error of FBPM influences a control filter, which generates an anti-noise, and secondary path modeling (SPM) filter. The control filter diverges when the error is too large. Therefore, it is difficult for the FxLMS algorithm to track the feedback path without divergence. On the other hand, the proposed approach converges stably because the FBPM filter's error does not influence a control filter on the PIANC system. Thus, the proposed method can reduce noise while tracking the feedback path. This paper verified the effectiveness of the proposed method by convergence analysis, computer simulation, and implementation of a digital signal processor.

  • Coherent Signal DOA Estimation Using Eigenvector Associated with Max Eigenvalue

    Rui LI  Ruqi XIAO  Hong GU  Weimin SU  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2021/01/07
      Page(s):
    962-967

    A novel direction of arrival (DOA) estimation method for the coherent signal is presented in this paper. The proposed method applies the eigenvector associated with max eigenvalue, which contains the DOAs of all signals, to form a Toeplitz matrix, yielding an unconstrained optimization problem. Then, the DOA is obtained by peak searching of the pseudo power spectrum without the knowledge of signal number. It is illustrated that the method has a great performance and low computation complexity for the coherent signal. Simulation results verify the usefulness of the method.

  • Multi-Input Functional Encryption with Controlled Decryption

    Nuttapong ATTRAPADUNG  Goichiro HANAOKA  Takato HIRANO  Yutaka KAWAI  Yoshihiro KOSEKI  Jacob C. N. SCHULDT  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/01/12
      Page(s):
    968-978

    In this paper, we put forward the notion of a token-based multi-input functional encryption (token-based MIFE) scheme - a notion intended to give encryptors a mechanism to control the decryption of encrypted messages, by extending the encryption and decryption algorithms to additionally use tokens. The basic idea is that a decryptor must hold an appropriate decryption token in addition to his secrete key, to be able to decrypt. This type of scheme can address security concerns potentially arising in applications of functional encryption aimed at addressing the problem of privacy preserving data analysis. We firstly formalize token-based MIFE, and then provide two basic schemes; both are based on an ordinary MIFE scheme, but the first additionally makes use of a public key encryption scheme, whereas the second makes use of a pseudorandom function (PRF). Lastly, we extend the latter construction to allow decryption tokens to be restricted to specified set of encryptions, even if all encryptions have been done using the same encryption token. This is achieved by using a constrained PRF.

  • Optimal and Asymptotically Optimal Codebooks as Regards the Levenshtein Bounds

    Hong-Li WANG  Li-Li FAN  Gang WANG  Lin-Zhi SHEN  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2021/01/12
      Page(s):
    979-983

    In the letter, two classes of optimal codebooks and asymptotically optimal codebooks in regard to the Levenshtein bound are presented, which are based on mutually unbiased bases (MUB) and approximately mutually unbiased bases (AMUB), respectively.

  • Complete l-Diversity Grouping Algorithm for Multiple Sensitive Attributes and Its Applications

    Yuelei XIAO  Shuang HUANG  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2021/01/12
      Page(s):
    984-990

    For the first stage of the multi-sensitive bucketization (MSB) method, the l-diversity grouping for multiple sensitive attributes is incomplete, causing more information loss. To solve this problem, we give the definitions of the l-diversity avoidance set for multiple sensitive attributes and the avoiding of a multiple dimensional bucket, and propose a complete l-diversity grouping (CLDG) algorithm for multiple sensitive attributes. Then, we improve the first stages of the MSB algorithms by applying the CLDG algorithm to them. The experimental results show that the grouping ratio of the improved first stages of the MSB algorithms is significantly higher than that of the original first stages of the MSB algorithms, decreasing the information loss of the published microdata.

  • Cyclic LRCs with Availability from Linearized Polynomials

    Pan TAN  Zhengchun ZHOU   Haode YAN  Yong WANG  

     
    LETTER-Coding Theory

      Pubricized:
    2021/01/18
      Page(s):
    991-995

    Locally repairable codes (LRCs) with availability have received considerable attention in recent years since they are able to solve many problems in distributed storage systems such as repairing multiple node failures and managing hot data. Constructing LRCs with locality r and availability t (also called (r, t)-LRCs) with new parameters becomes an interesting research subject in coding theory. The objective of this paper is to propose two generic constructions of cyclic (r, t)-LRCs via linearized polynomials over finite fields. These two constructions include two earlier ones of cyclic LRCs from trace functions and truncated trace functions as special cases and lead to LRCs with new parameters that can not be produced by earlier ones.

  • Encrypted Traffic Categorization Based on Flow Byte Sequence Convolution Aggregation Network

    Lin YAN  Mingyong ZENG  Shuai REN  Zhangkai LUO  

     
    LETTER-Mobile Information Network and Personal Communications

      Pubricized:
    2020/12/24
      Page(s):
    996-999

    Traffic categorization aims to classify network traffic into major service types. A modern deep neural network based on temporal sequence modeling is proposed for encrypted traffic categorization. The contemporary techniques such as dilated convolution and residual connection are adopted as the basic building block. The raw traffic files are pre-processed to generate 1-dimensional flow byte sequences and are feed into our specially-devised network. The proposed approach outperforms other existing methods greatly on a public traffic dataset.

  • Color Conversion Formula with Saturation Correction from HSI Color Space to RGB Color Space

    Minako KAMIYAMA  Akira TAGUCHI  

     
    LETTER-Image

      Pubricized:
    2021/01/18
      Page(s):
    1000-1005

    In color image processing, preservation of hue is required. Therefore, perceptual color models such as HSI and HSV have been used. Hue-Saturation-Intensity (HSI) is a public color model, and many color applications have been made based on this model. However, the transformation from the conventional HSI (C-HSI) color space to the RGB color space after processing intensity/saturation in the C-HSI color space often generates the gamut problem, because the shape of C-HSI color space is a triangular pyramid which includes the RGB color space. When the output of intensity/saturation processing result is located in the outside of the common region of RGB color space and C-HSI color space, it is necessary to move to the RGB color space. The effective way of hue and intensity preserving saturation correction algorithm is proposed. According to the proposed saturation correction algorithm, the corrected saturation value is same as the processing result in the ideal HSI color space whose gamut same as the RGB gamut.