The search functionality is under construction.
The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

  • Impact Factor

    0.40

  • Eigenfactor

    0.003

  • article influence

    0.1

  • Cite Score

    1.1

Advance publication (published online immediately after acceptance)

Volume E93-A No.11  (Publication Date:2010/11/01)

    Special Section on Information Theory and Its Applications
  • FOREWORD

    Ikuo OKA  

     
    FOREWORD

      Page(s):
    1867-1867
  • A New Unified Method for Fixed-Length Source Coding Problems of General Sources

    Tomohiko UYEMATSU  

     
    PAPER-Source Coding

      Page(s):
    1868-1877

    This paper establishes a new unified method for fixed-length source coding problems of general sources. Specifically, we introduce an alternative definition of the smooth Renyi entropy of order zero, and show a unified approach to present the fixed-length coding rate in terms of this information quantity. Our definition of the smooth Renyi entropy has a clear operational meaning, and hence is easy to calculate for finite block lengths. Further, we represent various ε-source coding rate and the strong converse property for general sources in terms of the smooth Renyi entropy, and compare them with the results obtained by Han and Renner et al.

  • Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices

    Tetsunao MATSUTA  Tomohiko UYEMATSU  Ryutaroh MATSUMOTO  

     
    PAPER-Source Coding

      Page(s):
    1878-1888

    Low-density parity-check (LDPC) codes become very popular in channel coding, since they can achieve the performance close to maximum-likelihood (ML) decoding with linear complexity of the block length. Recently, Muramatsu et al. proposed a code using LDPC matrices for Slepian-Wolf source coding, and showed that their code can achieve any point in the achievable rate region of Slepian-Wolf source coding. However, since they employed ML decoding, their decoder needs to know the probability distribution of the source. Hence, it is an open problem whether there exists a universal code using LDPC matrices, where universal code means that the error probability of the code vanishes as the block length tends to infinity for all sources whose achievable rate region contains the rate pair of encoders. In this paper, we show the existence of a universal Slepian-Wolf source code using LDPC matrices for stationary memoryless sources.

  • Gaussian Zig-Zag Source Coding Problem

    Yasutada OOHAMA  

     
    PAPER-Source Coding

      Page(s):
    1889-1903

    In 1997, the author considered the separate coding system for two correlated memoryless Gaussian sources and squared distortion measures and determined the rate distortion region in a case where one source plays a role of the partial side information at the decoder. The above source coding system can be extended to a certain class of source network with several decoders, where each decoder has at most one full or partial side information. This class of source network is called the one-helps-one system. In this paper we consider a source network belonging to this class for correlated memoryless Gaussian sources and squared distortion measures. This source network was posed and investigated by Korner and Marton and was called the zig-zag source network. They studied the zig-zag source network in the case of discrete memoryless multiple sources. In this paper we study the zig-zag source network in the case of correlated memoryless Gaussian sources and square distortion. We determine the rate distortion region in a case where sources have a certain correlation property.

  • On the Average Coding Rate of the Tunstall Code for Stationary and Memoryless Sources

    Mitsuharu ARIMURA  

     
    PAPER-Source Coding

      Page(s):
    1904-1911

    The coding rate of a one-shot Tunstall code for stationary and memoryless sources is investigated in non-universal situations so that the probability distribution of the source is known to the encoder and the decoder. When studying the variable-to-fixed length code, the average coding rate has been defined as (i) the codeword length divided by the average block length. We define the average coding rate as (ii) the expectation of the pointwise coding rate, and prove that (ii) converges to the same value as (i).

  • A Note on the Branch-and-Cut Approach to Decoding Linear Block Codes

    Shunsuke HORII  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    PAPER-Coding Theory

      Page(s):
    1912-1917

    Maximum likelihood (ML) decoding of linear block codes can be considered as an integer linear programming (ILP). Since it is an NP-hard problem in general, there are many researches about the algorithms to approximately solve the problem. One of the most popular algorithms is linear programming (LP) decoding proposed by Feldman et al. LP decoding is based on the LP relaxation, which is a method to approximately solve the ILP corresponding to the ML decoding problem. Advanced algorithms for solving ILP (approximately or exactly) include cutting-plane method and branch-and-bound method. As applications of these methods, adaptive LP decoding and branch-and-bound decoding have been proposed by Taghavi et al. and Yang et al., respectively. Another method for solving ILP is the branch-and-cut method, which is a hybrid of cutting-plane and branch-and-bound methods. The branch-and-cut method is widely used to solve ILP, however, it is unobvious that the method works well for the ML decoding problem. In this paper, we show that the branch-and-cut method is certainly effective for the ML decoding problem. Furthermore the branch-and-cut method consists of some technical components and the performance of the algorithm depends on the selection of these components. It is important to consider how to select the technical components in the branch-and-cut method. We see the differences caused by the selection of those technical components and consider which scheme is most effective for the ML decoding problem through numerical simulations.

  • A Note on the Shift Bound for Cyclic Codes by the DFT

    Junru ZHENG  Takayasu KAIDA  

     
    PAPER-Coding Theory

      Page(s):
    1918-1922

    For cyclic codes some well-known lower bounds and some decoding methods up to the half of the bounds are suggested. Particularly, the shift bound is a good lower bound of the minimum distance for cyclic codes, Reed-Muller codes and geometric Goppa codes. In this paper we consider cyclic codes defined by their defining set, and new simple derivation of the shift bound using the discrete Fourier transform with unknown elements and the Blahut theorem is shown. Moreover two examples of binary cyclic codes are given.

  • A Relation between Self-Reciprocal Transformation and Normal Basis over Odd Characteristic Field

    Shigeki KOBAYASHI  Yasuyuki NOGAMI  Tatsuo SUGIMURA  

     
    PAPER-Coding Theory

      Page(s):
    1923-1931

    Let q and f(x) be an odd characteristic and an irreducible polynomial of degree m over Fq, respectively. Then, suppose that F(x)=xmf(x+x-1) becomes irreducible over Fq. This paper shows that the conjugate zeros of F(x) with respect to Fq form a normal basis in Fq2m if and only if those of f(x) form a normal basis in Fqm and the compart of conjugates given as follows are linearly independent over Fq, {γ-γ-1,(γ-γ-1)q, …,(γ-γ-1)qm-1} where γ is a zero of F(x) and thus a proper element in Fq2m. In addition, from the viewpoint of q-polynomial, this paper proposes an efficient method for checking whether or not the conjugate zeros of F(x) satisfy the condition.

  • Multi-Stage Threshold Decoding for Self-Orthogonal Convolutional Codes

    Muhammad AHSAN ULLAH  Kazuma OKADA  Haruo OGIWARA  

     
    PAPER-Coding Theory

      Page(s):
    1932-1941

    This paper describes a least complex, high speed decoding method named multi-stage threshold decoding (MTD-DR). Each stage of MTD-DR is formed by the traditional threshold decoder with a special shift register, called difference register (DR). After flipping each information bit, DR helps to shorten the Hamming and the Euclidian distance between a received word and the decoded codeword for hard and soft decoding, respectively. However, the MTD-DR with self-orthogonal convolutional codes (SOCCs), type 1 in this paper, makes an unavoidable error group, which depends on the tap connection patterns in the encoder, and limits the error performance. This paper introduces a class of SOCCs type 2 which can breakdown that error group, as a result, MTD-DR gives better error performance. For a shorter code (code length = 4200), hard and soft decoding MTD-DR achieves 4.7 dB and 6.5 dB coding gain over the additive white Gaussian noise (AWGN) channel at the bit error rate (BER) 10-5, respectively. In addition, hard and soft decoding MTD-DR for a longer code (code length = 80000) give 5.3 dB and 7.1 dB coding gain under the same condition, respectively. The hard and the soft decoding MTD-DR experiences error flooring at high Eb/N0 region. For improving overall error performance of MTD-DR, this paper proposes parity check codes concatenation with soft decoding MTD-DR as well.

  • Weight Distributions of Multi-Edge Type LDPC Codes

    Kenta KASAI  Tomoharu AWANO  David DECLERCQ  Charly POULLIAT  Kohichi SAKANIWA  

     
    PAPER-Coding Theory

      Page(s):
    1942-1948

    The multi-edge type LDPC codes, introduced by Richardson and Urbanke, present the general class of structured LDPC codes. In this paper, we derive the average weight distributions of the multi-edge type LDPC code ensembles. Furthermore, we investigate the asymptotic exponential growth rate of the average weight distributions and investigate the connection to the stability condition of the density evolution.

  • Fourier Domain Decoding Algorithm of Non-binary LDPC Codes for Parallel Implementation

    Kenta KASAI  Kohichi SAKANIWA  

     
    PAPER-Coding Theory

      Page(s):
    1949-1957

    For decoding non-binary low-density parity-check (LDPC) codes, logarithm-domain sum-product (Log-SP) algorithms were proposed for reducing quantization effects of SP algorithm in conjunction with FFT. Since FFT is not applicable in the logarithm domain, the computations required at check nodes in the Log-SP algorithms are computationally intensive. What is worth, check nodes usually have higher degree than variable nodes. As a result, most of the time for decoding is used for check node computations, which leads to a bottleneck effect. In this paper, we propose a Log-SP algorithm in the Fourier domain. With this algorithm, the role of variable nodes and check nodes are switched. The intensive computations are spread over lower-degree variable nodes, which can be efficiently calculated in parallel. Furthermore, we develop a fast calculation method for the estimated bits and syndromes in the Fourier domain.

  • Self-Synchronizable Decoding Algorithms for Transmission with Redundant Information at Decoder

    Raul MARTINEZ-NORIEGA  Isao ABE  Kazuhiko YAMAGUCHI  

     
    PAPER-Coding Theory

      Page(s):
    1958-1965

    A novel self-synchronizable decoding algorithm for transmissions with redundant information is proposed. We assume that desynchronization occurs because a continuous deletion of bits in the channel. The decoder bases its decision on a metric which involves the syndrome and the Hamming distance between certain codeword and its corresponding updated codeword after one iteration of sum-product decoding. The foundation of the previous assumption relies on what we called "CP-distance." The larger the CP-distance of a code the better the synchronization characteristics. Moreover, our proposal is not restricted to cyclically permutable (CP) codes as previous proposals. Theoretical foundation and experimental results show good performance of our algorithm.

  • Optimum Soft-Output of Autoregressive Detector for Offtrack Interference in LDPC-Coded Perpendicular Magnetic Recording

    Kohsuke HARADA  Haruka OBATA  Hironori UCHIKAWA  Kenji YOSHIDA  Yuji SAKAI  

     
    PAPER-Coding Theory

      Page(s):
    1966-1975

    In this paper, we consider the behavior of an autoregressive (AR) detector for partial-response (PR) signaling against offtrack interference (OTI) environment in perpendicular magnetic recording. Based on the behavior, we derive the optimum branch metric to construct the detector by the Viterbi algorithm. We propose an optimum AR detector for OTI that considers an optimum branch metric calculation and an estimation of noise power due to OTI in order to calculate an accurate branch metric. To evaluate the reliability of soft-output likelihood values calculated by our proposed AR detector, we demonstrate a bit error rate performance (BER) of low-density parity-check (LDPC) codes under OTI existing channel by computer simulation. Our simulation results show the proposed AR detector can achieve a better LDPC-coded BER performance than the conventional AR detector. We also show the BER performance of our proposal can keep within 0.5 dB of the case that perfect channel state information regarding OTI is used in the detector. In addition, we show that the partial-response maximum-likelihood (PRML) detector is robust against OTI even if OTI is not handled by the detector.

  • Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication

    Shun WATANABE  Yasutada OOHAMA  

     
    PAPER-Cryptography and Information Security

      Page(s):
    1976-1983

    We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show a closed form expression of the optimal trade-off between the rate of key generation and the rate of the public communication. Our results clarify an essential difference between the key agreement from discrete sources and that from continuous sources.

  • Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency

    Shota YAMADA  Yutaka KAWAI  Goichiro HANAOKA  Noboru KUNIHIRO  

     
    PAPER-Cryptography and Information Security

      Page(s):
    1984-1993

    In this paper, we propose two new chosen-ciphertext (CCA) secure schemes from the computational Diffie-Hellman (CDH) and bilinear computational Diffie-Hellman (BCDH) assumptions. Our first scheme from the CDH assumption is constructed by extending Cash-Kiltz-Shoup scheme. This scheme yields the same ciphertext as that of Hanaoka-Kurosawa scheme (and thus Cramer-Shoup scheme) with cheaper computational cost for encryption. However, key size is still the same as that of Hanaoka-Kurosawa scheme. Our second scheme from the BCDH assumption is constructed by extending Boyen-Mei-Waters scheme. Though this scheme requires a stronger underlying assumption than the CDH assumption, it yields significantly shorter key size for both public and secret keys. Furthermore, ciphertext length of our second scheme is the same as that of the original Boyen-Mei-Waters scheme.

  • Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption

    Goichiro HANAOKA  Kaoru KUROSAWA  

     
    PAPER-Cryptography and Information Security

      Page(s):
    1994-2006

    In this paper, we introduce the intermediate hashed Diffie-Hellman (IHDH) assumption which is weaker than the hashed DH (HDH) assumption (and thus the decisional DH assumption), and is stronger than the computational DH assumption. We then present two public key encryption schemes with short ciphertexts which are both chosen-ciphertext secure under this assumption. The short-message scheme has smaller size of ciphertexts than Kurosawa-Desmedt (KD) scheme, and the long-message scheme is a KD-size scheme (with arbitrary plaintext length) which is based on a weaker assumption than the HDH assumption.

  • Forward-Secure Group Signatures from Pairings

    Toru NAKANISHI  Yuta HIRA  Nobuo FUNABIKI  

     
    PAPER-Cryptography and Information Security

      Page(s):
    2007-2016

    To reduce the damage of key exposures, forward-secure group signature schemes have been first proposed by Song. In the forward-secure schemes, a secret key of a group member is updated by a one-way function every interval and the previous secret key is erased. Thus, even if a secret key is exposed, the signatures produced by the secret keys of previous intervals remain secure. Since the previous forward-secure group signature schemes are based on the strong RSA assumption, the signatures are longer than pairing-based group signatures. In addition, the complexity of the key update or signing/verification is O(T), where T is the total number of intervals. In this paper, a forward-secure group signature scheme from pairings is proposed. The complexity of our key update and signing/verification is O(log T).

  • Unconditionally Secure Oblivious Transfer from Algebraic Signaling over the Gaussian Channel

    Motohiko ISAKA  

     
    PAPER-Cryptography and Information Security

      Page(s):
    2017-2025

    We study the use of the additive white Gaussian noise channel to achieve a cryptographic primitive that is important in secure multiparty computation. A protocol for unconditionally secure oblivious transfer is presented. We show that channel input alphabets with a certain algebraic structure and their partitions are useful in achieving the requirements on the primitive. Signal design for a protocol with high information rate is discussed.

  • Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers

    Eitaro SHIOJI  Ryutaroh MATSUMOTO  Tomohiko UYEMATSU  

     
    PAPER-Cryptography and Information Security

      Page(s):
    2026-2033

    Silva et al. proposed a universal secure network coding scheme based on MRD codes, which can be applied to any underlying network code. This paper considers a stronger eavesdropping model where the eavesdroppers possess the ability to re-select the tapping links during the transmission. We give a proof for the impossibility of attaining universal security against such adversaries using Silva et al.'s code for all choices of code parameters, even with a restricted number of tapped links. We also consider the cases with restricted tapping duration and derive some conditions for this code to be secure.

  • Improved Subset Difference Method with Ternary Tree

    Kazuhide FUKUSHIMA  Shinsaku KIYOMOTO  Toshiaki TANAKA  Kouichi SAKURAI  

     
    PAPER-Cryptography and Information Security

      Page(s):
    2034-2044

    This paper proposes a ternary subset difference method (SD method) that is resistant to coalition attacks. In order to realize a secure ternary SD method, we design a new cover-finding algorithm, label assignment algorithm and encryption algorithm. These algorithms are required to revoke one or two subtrees simultaneously while maintaining resistance against coalition attacks. We realize this two-way revocation mechanism by creatively using labels and hashed labels. Then, we evaluate the efficiency and security of the ternary SD method. We show that the number of labels on each client device can be reduced by about 20.4 percent. The simulation results show that the proposed scheme reduces the average header length by up to 15.0 percent in case where the total number of devices is 65,536. On the other hand, the computational cost imposed on a client device stays within O(log n). Finally, we prove that the ternary SD method is secure against coalition attacks.

  • Sequential Locally Optimum Test (SLOT): A Sequential Detection Scheme Based on Locally Optimum Test Statistic

    Jinsoo BAE  Seong Ill PARK  Yun Hee KIM  Seokho YOON  Jongho OH  Iickho SONG  Seong-Jun OH  

     
    PAPER-Detection and Wireless Communications

      Page(s):
    2045-2056

    Based on the characteristics of the thresholds of two detection schemes employing locally optimum test statistics, a sequential detection design procedure is proposed and analyzed. The proposed sequential test, called the sequential locally optimum test (SLOT), inherently provides finite stopping time (terminates with probability one within the finite horizon), and thereby avoids undesirable forced termination. The performance of the SLOT is compared with that of the fixed sample-size test, sequential probability ratio test (SPRT), truncated SPRT, and 2-SPRT. It is observed that the SLOT requires smaller average sample numbers than other schemes at most values of the normalized signal amplitude while maintaining the error performance close to the SPRT.

  • On the Diversity-Multiplexing Tradeoff in MIMO Wireless Channels at Finite SNRs

    Hamid EBRAHIMZAD  Abbas MOHAMMADI  

     
    PAPER-Detection and Wireless Communications

      Page(s):
    2057-2064

    In this paper, a new framework to characterize the tradeoff between diversity and multiplexing gains of Multi Input Multi Output (MIMO) wireless systems at finite Signal to Noise Ratios (SNRs) is presented. By suitable definitions of non-asymptotic diversity and multiplexing gains, we extract a useful tool to investigate the performance of space-time schemes at finite SNRs. Exact results on the diversity-multiplexing tradeoff (DMT) are derived for Multi Input Single Output (MISO), Single Input Multi Output (SIMO), and 22 MIMO channels. We show that our outcomes coincide with the Zheng and Tse's results at high SNRs. When the new definitions of non-asymptotic diversity and multiplexing gains are used, the resulted DMT converges to its asymptotic value at realistic SNRs. Furthermore, using these definitions enables the diversity gain to represent the outage probability with reasonable accuracy.

  • Architecture and Circuit Optimization of Hardwired Integer Motion Estimation Engine for H.264/AVC

    Zhenyu LIU  Dongsheng WANG  Takeshi IKENAGA  

     
    PAPER-Image Processing

      Page(s):
    2065-2073

    Variable block size motion estimation developed by the latest video coding standard H.264/AVC is the efficient approach to reduce the temporal redundancies. The intensive computational complexity coming from the variable block size technique makes the hardwired accelerator essential, for real-time applications. Propagate partial sums of absolute differences (Propagate Partial SAD) and SAD Tree hardwired engines outperform other counterparts, especially considering the impact of supporting variable block size technique. In this paper, the authors apply the architecture-level and the circuit-level approaches to improve the maximum operating frequency and reduce the hardware overhead of Propagate Partial SAD and SAD Tree, while other metrics, in terms of latency, memory bandwidth and hardware utilization, of the original architectures are maintained. Experiments demonstrate that by using the proposed approaches, at 110.8 MHz operating frequency, compared with the original architectures, 14.7% and 18.0% gate count can be saved for Propagate Partial SAD and SAD Tree, respectively. With TSMC 0.18 µm 1P6M CMOS technology, the proposed Propagate Partial SAD architecture achieves 231.6 MHz operating frequency at a cost of 84.1 k gates. Correspondingly, the maximum work frequency of the optimized SAD Tree architecture is improved to 204.8 MHz, which is almost two times of the original one, while its hardware overhead is merely 88.5 k-gate.

  • Lossy Coding of Binary Sources with Short Linear Codes

    Misako KOTANI  Motohiko ISAKA  

     
    LETTER-Source Coding

      Page(s):
    2074-2076

    This letter treats lossy source coding of binary sources with short linear block codes. It is numerically shown that very simple basis-reprocessing approach yields good rate-distortion performance with manageable computational complexity for small block lengths. The result for code lengths up to 100 outperforms the message-passing based encoding for low-density codes which are several times longer.

  • Estimation of the Effects in the Experimental Design Using Fourier Transforms

    Yoshifumi UKITA  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  

     
    LETTER-Information Theory

      Page(s):
    2077-2082

    We propose that the model in experimental design be expressed in terms of an orthonormal system. Then, we can easily estimate the effects using Fourier transforms. We also provide the theorems with respect to the sum of squares needed in analysis of variance. Using these theorems, it is clear that we can execute the analysis of variance in this model.

  • Characterization of Factor Graph by Mooij's Sufficient Condition for Convergence of the Sum-Product Algorithm

    Tomoharu SHIBUYA  

     
    LETTER-Coding Theory

      Page(s):
    2083-2088

    Recently, Mooij et al. proposed new sufficient conditions for convergence of the sum-product algorithm, and it was also shown that if the factor graph is a tree, Mooij's sufficient condition for convergence is always activated. In this letter, we show that the converse of the above statement is also true under some assumption, and that the assumption holds for the sum-product decoding. These newly obtained fact implies that Mooij's sufficient condition for convergence of the sum-product decoding is activated if and only if the factor graph of the a posteriori probability of the transmitted codeword is a tree.

  • An Evaluation on Throughput Performance for Type II Hybrid-ARQ Using Non-binary Rate-Compatible-Punctured LDPC Codes

    Takashi KOZAWA  Yasunori IWANAMI  Eiji OKAMOTO  Ryota YAMADA  Naoki OKAMOTO  

     
    LETTER-Coding Theory

      Page(s):
    2089-2091

    In this letter, an NB RCP LDPC (Non-Binary Rate-Compatible-Punctured Low Density Parity Check) code has been designed over the extended Galois Field. The designed code enables us to change the code rate easily by properly puncturing the appropriate symbols from the LDPC mother code. The designed NB RCP LDPC code has been applied to the Type II HARQ (Hybrid Automatic Repeat reQuest) scheme using OFDM (Orthogonal Frequency Division Multiplexing) modulation. The throughput characteristics of the proposed HARQ scheme are evaluated through computation simulation.

  • Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols

    SeongHan SHIN  Kazukuni KOBARA  Hideki IMAI  

     
    LETTER-Cryptography and Information Security

      Page(s):
    2092-2095

    An augmented PAKE (Password-Authenticated Key Exchange) protocol is said to be secure against server-compromise impersonation attacks if an attacker who obtained password verification data from a server cannot impersonate a client without performing off-line dictionary attacks on the password verification data. There are two augmented PAKE protocols where the first one [12] was proposed in the IEEE Communications Letters and the second one [15] was submitted to the IEEE P1363.2 standard working group [9]. In this paper, we show that these two augmented PAKE protocols [12], [15] (claimed to be secure) are actually insecure against server-compromise impersonation attacks. More specifically, we present generic server-compromise impersonation attacks on these augmented PAKE protocols [12],[15].

  • Foreground-Adaptive Motion Detection in Broad Surveillance Environments

    Fan-Chieh CHENG  Shih-Chia HUANG  Shanq-Jang RUAN  

     
    LETTER-Image Processing

      Page(s):
    2096-2097

    In this letter, we propose a novel motion detection method in order to accurately perform the detection of moving objects in the automatic video surveillance system. Based on the proposed Background Generation Mechanism, the presence of either moving object or background information is firstly checked in order to supply the selective updating of the high-quality adaptive background model, which facilitates the further motion detection using the Laplacian distribution model. The overall results of the detection accuracy will be demonstrated that our proposed method attains a substantially higher degree of efficacy, outperforming the state-of-the-art method by average Similarity accuracy rates of up to 56.64%, 27.78%, 50.04%, 43.33%, and 44.09%, respectively.

  • Special Section on Smart Multimedia & Communication Systems
  • FOREWORD

    Mitsuji MUNEYASU  Katsuya KONDO  

     
    FOREWORD

      Page(s):
    2098-2098
  • Development of Millimeter-Wave Mobile Camera and Performance Improvement in Outdoor LOS Environment

    Shinichi SUZUKI  Takayuki NAKAGAWA  Tetsuomi IKEDA  

     
    PAPER

      Page(s):
    2099-2107

    The Millimeter-wave Mobile Camera (MiMoCam) developed by NHK STRL uses millimeter-wave band (42 GHz/55 GHz) to transmit Hi-Vision TV picture with high quality and low latency. Multiple-input multiple-output (MIMO) technology which uses a number of antennas at both the transmitter and receiver can be adapted to use to transmit higher quality Hi-Vision TV picture. The camera was intended to be used in a studio environment where there is a high degree of multi-path, however there are also many requests for the MiMoCam to be used outdoor. This will present a different channel statistics where the camera will be operating in a near line-of-sight (LOS) environment without much reflected waves. We have conducted an outdoor transmission test and measured the outdoors transmission performance of the proposed MIMO system to clarify the possibility of using the MiMoCam in outdoor environment. This paper introduces the features of the MiMoCam system and the MIMO transmission technique used in the MiMoCam and presents the findings of this outdoor test. It was also confirmed that channel correlation of the MIMO propagation channels were suppressed by using orthogonally polarized waves and bit error rate (BER) characteristics with respect to the average receiving carrier-to-noise ratio (CNR) was improved. Finally, we could find the feasibility of the MiMoCam outdoor operation from these results.

  • The Jiggle-Viterbi Algorithm for the RFID Reader Using Structured Data-Encoded Waveforms

    Yung-Yi WANG  Jiunn-Tsair CHEN  

     
    PAPER

      Page(s):
    2108-2114

    Signals received at the interrogator of an RFID system always suffer from various kinds of channel deformation factors, such as the path loss of the wireless channel, insufficient channel bandwidth resulted from the multipath propagation, and the carrier frequency offset between tags and interrogators. In this paper we proposed a novel Viterbi-based algorithm for joint detection of data sequence and compensation of distorted signal waveform. With the assumption that the transmission clock is exactly synchronized at the reader, the proposed algorithm takes advantage of the structured data-encoded waveform to represent the modulation scheme of the RFID system as a trellis diagram and then the Viterbi algorithm is applicable to perform data sequence estimation. Furthermore, to compensate the distorted symbol waveform, the proposed Jiggle-Viterbi algorithm generates two substates, each corresponding to a variant structure waveform with adjustable temporal support, so that the symbol waveform deformation can be compensated and therefore yield a significant better performance in terms of bit error rate. Computer simulations shows that even in the presence of a moderate carrier frequency offset, the proposed approach can work out with an acceptable accuracy on data sequence detection.

  • Path Diversity with Fractional Delay Transmission for Fractional Sampling-MIMO-OFDM System

    Haruki HIGUCHI  Yukitoshi SANADA  

     
    PAPER

      Page(s):
    2115-2121

    Through fractional sampling (FS) it is possible to separate multipath components and achieve path diversity. However, if no path component whose delay corresponds to the sampling point, FS cannot obtain diversity gain. In this paper, a novel scheme to improve the performance with FS over a sparse multipath channel is proposed. The proposed scheme uses multiple transmit antennas and sends multiple signals with fractional delays. The performance improvement with the proposed scheme is confirmed through computer simulation. It is shown that the proposed scheme increases the capacity of a MIMO-OFDM system by a factor of 1.5 to 2 and improves the BER performance on the sparse multipath channels.

  • Sampling Point Selection Scheme for Fractional Sampling-OFDM Receivers on Fast Time-Varying Multipath Channels

    Tatsuya KOBAYASHI  Haruki NISHIMURA  Yukitoshi SANADA  

     
    PAPER

      Page(s):
    2122-2129

    Fractional sampling (FS) and Doppler diversity equalization in OFDM receivers can achieve two types of diversity (path diversity and frequency diversity) simultaneously on time-varying multipath channels. However FS with a higher sampling rate requires the large amount of complexity in demodulation. In this paper, a novel sampling point selection (SPS) scheme with MMSE equalization in FS-OFDM receivers is proposed. On fast time-varying multipath channels, the proposed scheme selects the appropriate samples from the fractionally sampled signals. Through the computer simulation, it is demonstrated that with the proposed scheme, both path diversity gain and Doppler diversity gain can increase as compared to a conventional non-SPS scheme.

  • Construction and Blind Estimation of Phase Sequences for Subcarrier-Phase Control Based PAPR Reduction in LDPC Coded OFDM Systems

    Osamu MUTA  

     
    PAPER

      Page(s):
    2130-2140

    As described in this paper, construction and blind estimation methods of phase sequences are proposed for subcarrier-phase control based peak-to-average power ratio (PAPR) reduction in low-density parity-check (LDPC)-coded orthogonal frequency division multiplexing (OFDM) systems. On the transmitter side, phase sequence patterns are constructed based on a given parity-check matrix. The PAPR of the OFDM signal is reduced by multiplying the constructed phase sequence selected from the same number of candidates as the number of weighting factor (WF) combinations in a partial transmit sequence (PTS) method. On the receiver side, the phase sequence is estimated blindly using the decoding function, i.e., the most likely phase sequence among a limited number of possible phase sequence candidates is inferred by comparing the sum-product calculation results of each candidate. Computer simulation results show that PAPR of QPSK-OFDM and 16QAM-OFDM signals can be reduced respectively by about 3.7 dB and 4.0 dB without marked degradation of the block error rate (BLER) performance as compared to perfect estimation in an attenuated 12-path Rayleigh fading condition.

  • Exact Formulation for Stochastic ML Estimation of DOA

    Haihua CHEN  Masakiyo SUZUKI  

     
    PAPER

      Page(s):
    2141-2152

    This paper addresses the issue of Unconditional or Stochastic Maximum likelihood (SML) estimation of directions-of-arrival (DOA) finding using sensors with arbitrary array configuration. The conventional SML estimation is formulated without an important condition that the covariance matrix of signal components must be non-negative definite. An likelihood function can not be evaluated exactly for all possible sets of directions. First, this paper reveals that the conventional SML has three problems due to the lack of the condition. 1) Solutions in the noise-free case are not unique. 2) Global solution in the noisy case becomes ambiguous occasionally. 3) There exist situations that any local solution does not satisfy the condition of the non-negative definiteness. We propose an exact formulation of the SML estimation of DOA to evaluate an likelihood function exactly for any possible set of directions. The proposed formulation can be utilized without any theoretical difficulty. The three problems of the conventional SML are solved by the proposed exact SML estimation. Furthermore we show a local search technique in the conventional SML has a good chance to find an optimal or suboptimal DOA although the suboptimal solutions violate the condition of the non-negative definiteness. Finally some simulation results are shown to demonstrate good estimation properties of the exact SML estimation.

  • A Cross Layer Perceptual Speech Quality Based Wireless VoIP Service

    Tein-Yaw CHUNG  Yung-Mu CHEN  Liang-Yi HUANG  

     
    PAPER

      Page(s):
    2153-2162

    This paper proposes a cross layer wireless VoIP service which integrates an Adaptive QoS Playout (AQP) algorithm, E-model, Stream Control Transmission Protocol (SCTP), IEEE 802.21 Media Independent Handover (MIH) middleware and two user motion detection services. The proposed AQP algorithm integrates the effect of playout control and lost packet retransmission based on the E-model. Besides, by using the partial reliable transmission service from SCTP and the handoff notification from MIH services in a cross layer manner, AQP can reduce the lateness loss rate and improve speech quality under high frame error rates. In the simulations, the performance of AQP is compared with a fixed playout algorithm and four adaptive playout strategies. The simulation results show that the lateness loss rate of AQP is 2% lower than that of existing playout algorithms and the R-factor is 16% higher than the compared algorithms when a network has 50 ms wired propagation delay and 2.5% frame error rate.

  • 3D Sound Rendering for Multiple Sound Sources Based on Fuzzy Clustering

    Masashi OKADA  Nobuyuki IWANAGA  Tomoya MATSUMURA  Takao ONOYE  Wataru KOBAYASHI  

     
    PAPER

      Page(s):
    2163-2172

    In this paper, we propose a new 3D sound rendering method for multiple sound sources with limited computational resources. The method is based on fuzzy clustering, which achieves dual benefits of two general methods based on amplitude-panning and hard clustering. In embedded systems where the number of reproducible sound sources is restricted, the general methods suffer from localization errors and/or serious quality degradation, whereas the proposed method settles the problems by executing clustering-process and amplitude-panning simultaneously. Computational cost evaluation based on DSP implementation and subjective listening test have been performed to demonstrate the applicability for embedded systems and the effectiveness of the proposed method.

  • Error-Resilient 3-D Wavelet Video Coding with Duplicated Lowest Sub-Band Coefficients and Two-Step Error Concealment Method

    Sunmi KIM  Hirokazu TANAKA  Takahiro OGAWA  Miki HASEYAMA  

     
    PAPER

      Page(s):
    2173-2183

    In this paper, we propose a two-step error concealment algorithm based on an error resilient three-dimensional discrete wavelet transform (3-D DWT) video coding scheme. The proposed scheme consists of an error-resilient encoder duplicating the lowest sub-band bit-streams for dispersive grouped frames and an error concealment decoder. The error concealment method of this decoder is decomposed of two steps, the first step is replacement of erroneous coefficients in the lowest sub-band by the duplicated coefficients, and the second step is interpolation of the missing wavelet coefficients by minimum mean square error (MMSE) estimation. The proposed scheme can achieve robust transmission over unreliable channels. Experimental results provide performance comparisons in terms of peak signal-to-noise ratio (PSNR) and demonstrate increased performances compared to state-of-the-art error concealment schemes.

  • Impulsive Noise Removal in Color Image Using Interactive Evolutionary Computing

    Yohei KATSUYAMA  Kaoru ARAKAWA  

     
    PAPER

      Page(s):
    2184-2192

    A new type of digital filter for removing impulsive noise in color images is proposed using interactive evolutionary computing. This filter is realized as a rule-based system containing switching median filters. This filter detects impulsive noise in color images with rules and applies switching median filters only at the noisy pixel. Interactive evolutionary computing (IEC) is adopted to optimize the filter parameters, considering the subjective assessment by human vision. In order to detect impulsive noise precisely, complicated rules with multiple parameters are required. Here, the relationship between color components and the degree of peculiarity of the pixel value are utilized in the rules. Usually, optimization of such a complicated rule-based system is difficult, but IEC enables such optimization easily. Moreover, human taste and subjective sense are highly considered in the filter performance. Computer simulations are shown for noisy images to verify its high performance.

  • Application of Compressive Projection Principal Component Analysis to MIMO Channel Feedback Scheme

    Chenhao QI  Lenan WU  

     
    LETTER

      Page(s):
    2193-2195

    In this letter, we apply recently proposed compressive projection principal component analysis (CPPCA) for MIMO channel feedback. A novel scheme with compressed feedback and efficient reconstruction is presented. Simulation results based on 3GPP spatial channel model (SCM) demonstrate the scheme is beneficial for large-scale MIMO systems.

  • An Unsupervised Optimization of Structuring Elements for Noise Removal Using GA

    Hiroyuki OKUNO  Yoshiko HANADA  Mitsuji MUNEYASU  Akira ASANO  

     
    LETTER

      Page(s):
    2196-2199

    In this paper we propose an unsupervised method of optimizing structuring elements (SEs) used for impulse noise reduction in texture images through the opening operation which is one of the morphological operations. In this method, a genetic algorithm (GA), which can effectively search wide search spaces, is applied and the size of the shape of the SE is included in the design variables. Through experiments, it is shown that our new approach generally outperforms the conventional method.

  • Special Section on Signal Design and its Application in Communications
  • FOREWORD

    Pingzhi FAN and Naoki SUEHIRO  

     
    FOREWORD

      Page(s):
    2200-2200
  • Recent Advances in Single-Carrier Frequency-Domain Equalization and Distributed Antenna Network

    Fumiyuki ADACHI  Kazuki TAKEDA  Tatsunori OBARA  Tetsuya YAMAMOTO  Hiroki MATSUDA  

     
    INVITED PAPER

      Page(s):
    2201-2211

    Broadband wireless technology that enables a variety of gigabit-per-second class data services is a requirement in future wireless communication systems. Broadband wireless channels become extremely frequency-selective and cause severe inter-symbol interference (ISI). Furthermore, the average received signal power changes in a random manner because of the shadowing and distance-dependant path losses resulted from the movement of a mobile terminal (MT). Accordingly, the transmission performance severely degrades. To overcome the performance degradation, two most promising approaches are the frequency-domain equalization (FDE) and distributed antenna network (DAN). The former takes advantage of channel frequency-selectivity to obtain the frequency-diversity gain. In DAN, a group of distributed antennas serve each user to mitigate the negative impact of shadowing and path losses. This article will introduce the recent advances in FDE and DAN for the broadband single-carrier (SC) transmissions.

  • Crosscorrelation of m-Sequences, Exponential Sums and Dickson Polynomials

    Tor HELLESETH  

     
    INVITED PAPER

      Page(s):
    2212-2219

    Binary maximal-length sequences (or m-sequences) are sequences of period 2m-1 generated by a linear recursion of degree m. Decimating an m-sequence {st} by an integer d relatively prime to 2m-1 leads to another m-sequence {sdt} of the same period. The crosscorrelation of m-sequences has many applications in communication systems and has been an important and well studied problem during more than 40 years. This paper presents an updated survey on the crosscorrelation between binary m-sequences with at most five-valued crosscorrelation and shows some of the many recent connections of this problem to several areas of mathematics such as exponential sums and Dickson polynomials.

  • Low Correlation Zone Sequences from Interleaved Construction

    Udaya PARAMPALLI  Xiaohu TANG  

     
    INVITED PAPER

      Page(s):
    2220-2226

    Recently there has been a surge of interest in construction of low correlation zone sequences. The purpose of this paper is to survey the known results in the area and to present an interleaved construction of binary low correlation zone sequences. The interleaved construction unifies many constructions currently available in the literature. These sequences are useful in quasi-synchronous code-division multiple access (QS-CDMA) communication systems.

  • Lower Bounds on the Maximum Partial Correlations of Frequency Hopping Sequence Set with Low Hit Zone

    Xianhua NIU  Daiyuan PENG  Fang LIU  Xing LIU  

     
    PAPER-Sequences

      Page(s):
    2227-2231

    In order to evaluate the goodness of frequency hopping sequence design, the periodic Hamming correlation function is used as an important measure. Usually, the length of correlation window is shorter than the period of the chosen frequency hopping sequence, so the study of the partial Hamming correlation of frequency hopping sequence is particularly important. In this paper, the maximum partial Hamming correlation lower bounds of frequency hopping sequences with low hit zone, with respect to the size of the frequency slot set, the length of correlation window, the family size, the low hit zone, the maximum partial Hamming autocorrelation and the maximum partial Hamming crosscorrelation are established. It is shown that the new bounds include the known Lempel-Greenberger bound, Peng-Fan bounds, Eun-Jin-Hong-Song bound and Peng-Fan-Lee bounds as special cases.

  • New Classes of Optimal Variable-Weight Optical Orthogonal Codes Based on Cyclic Difference Families

    Dianhua WU  Pingzhi FAN  Xun WANG  Minquan CHENG  

     
    PAPER-Sequences

      Page(s):
    2232-2238

    Variable-weight optical orthogonal code (OOC) was introduced by G-C Yang for multimedia optical CDMA systems with multiple quality of service (QoS) requirement. In this paper, a construction for optimal (υ, {3,4}, 1, {s/(s+1), 1/(s+1)})-OOCs is given. For s=2, it is proved that for each prime υ≡ 1(mod 24), there exists a (υ, {3,4}, 1, {2/3, 1/3})-OOC. A recursive construction for cyclic difference family is also presented. By using these constructions, a number of new infinite classes of optimal (υ, {3,4}, 1, Q)-OOCs for Q = {1/2, 1/2} and {2/3, 1/3} are constructed.

  • No-Hit-Zone Frequency-Hopping Sequence Sets with Optimal Hamming Autocorrelation

    Jin-Ho CHUNG  Yun Kyoung HAN  Kyeongcheol YANG  

     
    PAPER-Sequences

      Page(s):
    2239-2244

    In quasi-synchronous frequency-hopping multiple access (QS-FHMA) systems, no-hit-zone frequency-hopping sequence (NHZ-FHS) sets are commonly employed to minimize multiple access interference. Several new constructions for optimal NHZ-FHS sets are presented in this paper, which are based on interleaving techniques. Two types of NHZ-FHS sets of length 2N for any integer N ≥ 3 are constructed, whose NHZ sizes are some even integers. An optimal NHZ-FHS set of length 2N with odd NHZ size for any integer N ≥ 6 is also presented. And then, optimal NHZ-FHS sets of length kN are given by generalizing one of the proposed constructions for NHZ-FHS sets of length 2N, where k and N are any positive integers such that 2 ≤ k < N. All the FHSs in the new NHZ-FHS sets are non-repeating FHSs which are optimal with respect to the Lempel-Greenberger bound. Our constructions give new parameters which are flexible in the selection of NHZ size and set size.

  • New p-Ary Sequences with Low Correlation and Large Family Size

    Fang LIU  Daiyuan PENG  Xiaohu TANG  Xianhua NIU  

     
    PAPER-Sequences

      Page(s):
    2245-2250

    For an odd prime p, two new families of p-ary sequences of period pn-1 are constructed for odd n = 2l+1=(2m+1)e and even n = 2l = 2me, respectively. It is shown that, for a given integer ρ with 1 ≤ ρ ≤ m, the proposed sequence families both have maximum correlation magnitude , family size (pn-1)p(ρ-1)n+1, and maximum linear span .

  • Quadriphase Z-Complementary Sequences

    Xudong LI  Pingzhi FAN  Xiaohu TANG  Li HAO  

     
    PAPER-Sequences

      Page(s):
    2251-2257

    Aperiodic quadriphase Z-complementary sequences, which include the conventional complementary sequences as special cases, are introduced. It is shown that, the aperiodic quadriphase Z-complementary pairs are normally better than binary ones of the same length, in terms of the number of Z-complementary pairs, and the maximum zero correlation zone. New notions of elementary transformations on quadriphase sequences and elementary operations on sets of quadriphase Z-complementary sequences are presented. In particular, new methods for analyzing the relations among the formulas relative to sets of quadriphase Z-complementary sequences and for describing the sets are proposed. The existence problem of Z-complementary pairs of quadriphase sequences with zero correlation zone equal to 2, 3, and 4 is investigated. Constructions of sets of quadriphase Z-complementary sequences and their mates are given.

  • Some Properties of Logistic Maps over Integers

    Takeru MIYAZAKI  Shunsuke ARAKI  Satoshi UEHARA  

     
    PAPER-Sequences

      Page(s):
    2258-2265

    The logistic map is a chaotic mapping. Although several studies have examined logistic maps over real domains with infinite/finite precisions, there has been little analysis of the logistic map over integers. Focusing on differences between the logistic map over the real domain with infinite precision and the logistic map over integers with finite precision, we herein show the characteristic properties of the logistic map over integers and discuss the sequences generated by the map.

  • Binary Sequence Pairs with Two-Level Correlation and Cyclic Difference Pairs

    Seok-Yong JIN  Hong-Yeop SONG  

     
    PAPER-Sequences

      Page(s):
    2266-2271

    We investigate binary sequence pairs with two-level correlation in terms of their corresponding cyclic difference pairs (CDPs). We define multipliers of a cyclic difference pair and present an existence theorem for multipliers, which could be applied to check the existence/nonexistence of certain hypothetical cyclic difference pairs. Then, we focus on the ideal case where all the out-of-phase correlation coefficients are zero. It is known that such an ideal binary sequence pair exists for length υ = 4u for every u ≥ 1. Using the techniques developed here on the theory of multipliers of a CDP and some exhaustive search, we are able to determine that, for lengths υ ≤ 30, (1) there does not exist "any other" ideal/ binary sequence pair and (2) every example in this range is equivalent to the one of length υ = 4u above. We conjecture that if there is a binary sequence pair with an ideal two-level correlation then its in-phase correlation must be 4. This implies so called the circulant Hadamard matrix conjecture.

  • A Large Class of p-Ary Cyclic Codes and Sequence Families

    Zhengchun ZHOU  Xiaohu TANG  Udaya PARAMPALLI  

     
    PAPER-Sequences

      Page(s):
    2272-2277

    Let n,k,e,m be positive integers such that n≥ 3, 1 ≤ kn-1, gcd(n,k)=e, and m= is odd. In this paper, for an odd prime p, we derive a lower bound for the minimal distance of a large class of p-ary cyclic codes Cl with nonzeros α-1, α-(pk+1), α-(p3k+1), …, α-(p(2l-1)k+1), where 1 ≤ l ≤ and α is a primitive element of the finite field Fpn. Employing these codes, p-ary sequence families with a flexible tradeoff between low correlation and large size are constructed.

  • On Binary Sequence Pairs with Two-Level Periodic Autocorrelation Function

    Kai LIU  Chengqian XU  

     
    PAPER-Sequences

      Page(s):
    2278-2285

    Binary sequence pairs as a class of mismatched filtering of binary sequences can be applied in radar, sonar, and spread spectrum communication system. Binary sequence pairs with two-level periodic autocorrelation function (BSPT) are considered as the extension of usual binary sequences with two-level periodic autocorrelation function. Each of BSPT consists of two binary sequences of which all out-phase periodic crosscorrelation functions, also called periodic autocorrelation functions of sequence pairs, are the same constant. BSPT have an equivalent relationship with difference set pairs (DSP), a new concept of combinatorial mathematics, which means that difference set pairs can be used to research BSPT as a kind of important tool. Based on the equivalent relationship between BSPT and DSP, several families of BSPT including perfect binary sequence pairs are constructed by recursively constructing DSP on the integer ring. The discrete Fourier transform spectrum property of BSPT reveals a necessary condition of BSPT. By interleaving perfect binary sequence pairs and Hadamard matrix, a new family of binary sequence pairs with zero correlation zone used in quasi-synchronous code multiple division address is constructed, which is close to the upper theoretical bound with sequence length increasing.

  • On a ZCZ Code Including a Sequence Used for a Synchronization Symbol

    Shinya MATSUFUJI  Takahiro MATSUMOTO  Tomohiro HAYASHIDA  Takafumi HAYASHI  Noriyoshi KUROYANAGI  Pingzhi FAN  

     
    PAPER-Sequences

      Page(s):
    2286-2290

    This paper presents a ZCZ code which are combinedly used for spreading sequences and a synchronization symbol in quasi-synchronous CDMA systems using PSK, ASK or BFSK. Furthermore a simple matched filter is presented, which simultaneously calculates correlations with any sequences in the ZCZ code.

  • A Comparison of Wireless Optical CDMA Systems Using Chip-Level Detection

    Yusuke KOZAWA  Hiromasa HABUCHI  

     
    PAPER-Spread Spectrum Technologies and Applications

      Page(s):
    2291-2298

    In this paper, the optimum combination of optical pseudo-noise (PN) code and modulation scheme to achieve high total data transmission rate is presented. Moreover, the bit error rate (BER) performance of a wireless OCDMA system using chip-level detection is evaluated through theoretical analysis in the multi-user case. It is shown that, in a wireless OCDMA system with chip-level detection, the total data transmission rate of a multi-pulse pulse position modulation (MPPM) systems with optical pseudo-noise code generated by an M-sequence is better than that of an MPPM system with optical orthogonal code and that of an MPPM system with an extended prime code sequence. Moreover, the total data transmission rate of an MPPM/SIK system using modified pseudo orthogonal M-sequence sets can achieve more than 1.0 [bit/chip].

  • Performance of DS/SS System Using Pseudo-Ternary M-Sequences

    Ryo ENOMOTO  Hiromasa HABUCHI  Koichiro HASHIURA  

     
    PAPER-Spread Spectrum Technologies and Applications

      Page(s):
    2299-2306

    In this paper, newly-found properties of the pseudo-ternary maximum-length shift register sequences (pseudo-ternary M-sequences) are described. In particular, the balance properties, the run-length distribution, the cross-correlation properties, and the decimation relationships are shown. The pseudo-ternary M-sequence is obtained by subtracting the one-chip shifted version from the {+1,-1}-valued M-sequence. Moreover, in this paper, performances of the direct sequence spread spectrum (DS/SS) system using the pseudo-ternary M-sequence are analyzed. In the performance evaluation, tracking error performance (jitter) and bit error rate (BER) performance that takes the jitter into account in DS/SS system with a pseudo-ternary M-sequence non-coherent DLL are evaluated. Using the pseudo-ternary M-sequence instead of the conventional M-sequences can improve the tracking error performance about 2.8 [dB]. Moreover, BER of the DS/SS system using the pseudo-ternary M-sequence is superior about 0.8 [dB] to that using the {+1,-1}-valued M-sequence.

  • Binary Spreading Sequences with Negative Auto-Correlation Based on Chaos Theory and Gold Sequences for Application to Asynchronous DS/CDMA Communications

    Akio TSUNEDA  Yasunori MIYAZAKI  

     
    PAPER-Spread Spectrum Technologies and Applications

      Page(s):
    2307-2311

    Spreading sequences with appropriate negative auto-correlation can reduce average multiple access interference (MAI) in asynchronous DS/CDMA systems compared with the conventional Gold Sequences generated by linear feedback shift registers (LFSRs). We design spreading sequences with negative auto-correlation based on Gold sequences and the chaos theory for the Bernoulli map. By computer simulations, we evaluate BER performances of asynchronous DS/CDMA systems using the proposed sequences.

  • Interference Coordination in Compact Frequency Reuse for Multihop Cellular Networks

    Yue ZHAO  Xuming FANG  Zhengguang ZHAO  

     
    PAPER-Mobile Information Network and Personal Communications

      Page(s):
    2312-2319

    Continuously increasing the bandwidth to enhance the capacity is impractical because of the scarcity of spectrum availability. Fortunately, on the basis of the characteristics of the multihop cellular networks (MCNs), a new compact frequency reuse scheme has been proposed to provide higher spectrum utilization efficiency and larger capacity without increasing the cost on network. Base stations (BSs) and relay stations (RSs) could transmit simultaneously on the same frequency according to the compact frequency reuse scheme. In this situation, however, mobile stations (MSs) near the coverage boundary will suffer serious interference and their traffic quality can hardly be guaranteed. In order to mitigate the interference while maintaining high spectrum utilization efficiency, this paper introduces a fractional frequency reuse (FFR) scheme into multihop cellular networks, in which the principle of FFR scheme and characteristics of frequency resources configurations are described, then the transmission (Tx) power consumption of BS and RSs is analyzed. The proposed scheme can both meet the requirement of high traffic load in future cellular system and maximize the benefit by reducing the Tx power consumption. Numerical results demonstrate that the proposed FFR in compact frequency reuse achieves higher cell coverage probability and larger capacity with respect to the conventional schemes.

  • An Energy Saving Scheduling Scheme for OFDMA Two-Hop Relay Systems

    Yanan HUANG  Xuming FANG  Yue ZHAO  

     
    PAPER-Mobile Information Network and Personal Communications

      Page(s):
    2320-2327

    Being a new feature of next generation of wireless networks, Mobile Multi-hop Relay (MMR) is proposed for the purpose of coverage extension and throughput enhancement in LTE-Advanced, IEEE 802.16 j/m. Besides, with the help of relay, the system energy consumption could be well saved. In this paper, an energy saving scheduling scheme is proposed for OFDMA based two-hop relay systems. The novel scheme adjusts the modulation and coding (MC) mode and allocates the transmit power dynamically according to the resource intensity. It can also guarantee the Quality of Service (QoS) of different services by setting the scheduling priority. The simulation results show that the novel scheduling scheme can reduce energy consumption up to 76.27% compared to the conventional scheduling scheme, and achieve higher throughput while guaranteeing QoS.

  • Compact Matched Filter for Integrand Code Using a Real-Valued Shift-Orthogonal Finite-Length Sequence

    Takahiro MATSUMOTO  

     
    LETTER-Digital Signal Processing

      Page(s):
    2328-2331

    In this paper, we proposed the compact construction of a matched filter for integrand code, which do not require the high-rate clock pulse in two-valued PWM (pulse width modulation) code, using a real-valued shift-orthogonal finite-length sequence, which has a sharp aperiodic autocorrelation function with zero sidelobes except at left and right shift-ends. This matched filters are implemented on a field programmable gate array (FPGA) corresponding to 400,000 logic gates. A proposed matched filter for the sequence of length 129 can be constructed by the circuit scale of about 47% compared with conventional filter.

  • A New Set of Optimal Frequency-Hopping Sequences

    Fang LIU  Daiyuan PENG  Xiaohu TANG  

     
    LETTER-Sequences

      Page(s):
    2332-2336

    In frequency-hopping (FH) multiple access systems, frequency-hopping sequences (FHSs) with optimal Hamming correlation properties are needed. Based on the d-form functions with ideal autocorrelation properties, a new set of FHSs is constructed. The new FHS set is optimal with respect to the Peng-Fan bounds and each FHS in the set is optimal with respect to the Lempel-Greenberger bound.

  • A Generalized Construction of Optimal Zero-Correlation Zone Sequence Set from a Perfect Sequence Pair

    Takafumi HAYASHI  Shinya MATSUFUJI  

     
    LETTER-Sequences

      Page(s):
    2337-2344

    The present paper introduces a new approach to the construction of a sequence set with a zero-correlation zone (ZCZ). This sequence set is referred to as a ZCZ sequence set. The proposed sequence construction generates a ZCZ sequence set from a perfect sequence pair or a single perfect sequence. The proposed method can generate an optimal ZCZ sequence set, the member size of which reaches the theoretical bound.

  • Autocorrelation of New Generalized Cyclotomic Sequences of Period pn

    Seok-Yong JIN  Young-Joon KIM  Hong-Yeop SONG  

     
    LETTER-Sequences

      Page(s):
    2345-2348

    In this paper, we calculate autocorrelation of new generalized cyclotomic sequences of period pn for any n > 0, where p is an odd prime number.