-
Naomi YAGI, Tomomoto ISHIKAWA, Yutaka HATA
Article type: PAPER
Subject area: Ultrasonics
2014 Volume E97.A Issue 4 Pages
913-922
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
This paper describes an ultrasonic system that estimates the cell quantity of an artificial culture bone, which is effective for appropriate treat with a composite of this material and Bone Marrow Stromal Cells. For this system, we examine two approaches for analyzing the ultrasound waves transmitted through the cultured bone, including stem cells to estimate cell quantity: multiple regression and fuzzy inference. We employ two characteristics from the obtained wave for applying each method. These features are the amplitude and the frequency; the amplitude is measured from the obtained wave, and the frequency is calculated by the cross-spectrum method. The results confirmed that the fuzzy inference method yields the accurate estimates of cell quantity in artificial culture bone. Using this ultrasonic estimation system, the orthopaedic surgeons can choose the composites that contain favorable number of cells before the implantation.
View full abstract
-
Sumxin JIANG, Rendong YING, Peilin LIU, Zhenqi LU, Zenghui ZHANG
Article type: PAPER
Subject area: Digital Signal Processing
2014 Volume E97.A Issue 4 Pages
923-930
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
This paper describes a new method for lossy audio signal compression via compressive sensing (CS). In this method, a structured shrinkage operator is employed to decompose the audio signal into three layers, with two sparse layers, tonal and transient, and additive noise, and then, both the tonal and transient layers are compressed using CS. Since the shrinkage operator is able to take into account the structure information of the coefficients in the transform domain, it is able to achieve a better sparse approximation of the audio signal than traditional methods do. In addition, we propose a sparsity allocation algorithm, which adjusts the sparsity between the two layers, thus improving the performance of CS. Experimental results demonstrated that the new method provided a better compression performance than conventional methods did.
View full abstract
-
Bu-Ching LIN, Juinn-Dar HUANG, Jing-Yang JOU
Article type: PAPER
Subject area: VLSI Design Technology and CAD
2014 Volume E97.A Issue 4 Pages
931-939
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
The notion of multiple constant multiplication (MCM) is extensively adopted in digital signal processing (DSP) applications such as finite impulse filter (FIR) designs. A set of adders is utilized to replace regular multipliers for the multiplications between input data and constant filter coefficients. Though many algorithms have been proposed to reduce the total number of adders in an MCM block for area minimization, they do not consider the actual bitwidth of each adder, which may not estimate the hardware cost well enough. Therefore, in this article we propose a bitwidth-aware MCM optimization algorithm that focuses on minimizing the total number of adder bits rather than the adder count. It first builds a subexpression graph based on the given coefficients, derives a set of constraints for adder bitwidth minimization, and then optimally solves the problem through integer linear programming (ILP). Experimental results show that the proposed algorithm can effectively reduce the required adder bit count and outperforms the existing state-of-the-art techniques.
View full abstract
-
Nan WANG, Song CHEN, Cong HAO, Haoran ZHANG, Takeshi YOSHIMURA
Article type: PAPER
Subject area: VLSI Design Technology and CAD
2014 Volume E97.A Issue 4 Pages
940-951
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
In this paper, we address the problem of scheduling operations into control steps with a dual threshold voltage (dual-
Vth) technique, under timing and resource constraints. We present a two-stage algorithm for leakage power optimization. In the threshold voltage (
Vth) assignment stage, the proposed algorithm first initializes all the operations to high-
Vth, and then it iteratively shortens the critical path delay by reassigning the set of operations covering all the critical paths to low-
Vth until the timing constraint is met. In the scheduling stage, a modified force-directed scheduling is implemented to schedule operations and to adjust threshold voltage assignments with a consideration of the resource constraints. To eliminate the potential resource constraint violations, the operations' threshold voltage adjustment problem is formulated as a “weighted interval scheduling” problem. The experimental results show that our proposed method performs better in both running time and leakage power reduction compared with MWIS [3].
View full abstract
-
Shingo YANAGIHARA, Tetsu IWATA
Article type: PAPER
Subject area: Cryptography and Information Security
2014 Volume E97.A Issue 4 Pages
952-963
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
The Generalized Feistel Structure (GFS) is one of the structures used in designs of blockciphers and hash functions. There are several types of GFSs, and we focus on Type 1 and Type 2 GFSs. The security of these structures are well studied and they are adopted in various practical blockciphers and hash functions. The round function used in GFSs consists of two layers. The first layer uses the nonlinear function. Type 1 GFS uses one nonlinear function in this layer, while Type 2 GFS uses a half of the number of sub-blocks. The second layer is a sub-block-wise permutation, and the cyclic shift is generally used in this layer. In this paper, we formalize Type 1.x GFS, which is the natural extension of Type 1 and Type 2 GFSs with respect to the number of nonlinear functions in one round. Next, for Type 1.x GFS using two nonlinear functions in one round, we propose a permutation which has a good diffusion property. We demonstrate that Type 1.x GFS with this permutation has a better diffusion property than other Type 1.x GFS with the sub-block-wise cyclic shift. We also present experimental results of evaluating the diffusion property and the security against the saturation attack, impossible differential attack, differential attack, and linear attack of Type 1.x GFSs with various permutations.
View full abstract
-
Yongbo XIA, Shaoping CHEN, Tor HELLESETH, Chunlei LI
Article type: PAPER
Subject area: Information Theory
2014 Volume E97.A Issue 4 Pages
964-969
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
Let
m ≥ 3 be an odd positive integer,
n=2
m and
p be an odd prime. For the decimation factor $d=\frac{(p^{m}+1)(p^{m}+p-1)}{p+1}$, the cross-correlation between the
p-ary
m-sequence {
tr1n(α
t)} and its all decimated sequences {
tr1n(α
dt+l)} is investigated, where 0 ≤
l < gcd(
d,
pn-1) and α is a primitive element of
Fpn. It is shown that the cross-correlation function takes values in {-1,-1±
ipm|i=1,2,…
p}. The result presented in this paper settles a conjecture proposed by Kim et al. in the 2012 IEEE International Symposium on Information Theory Proceedings paper (pp.1014-1018), and also improves their result.
View full abstract
-
Xiaoni DU, Ji ZHANG, Chenhuang WU
Article type: PAPER
Subject area: Information Theory
2014 Volume E97.A Issue 4 Pages
970-974
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
We determine the linear complexity of binary sequences derived from the polynomial quotient modulo
p defined by $F(u)\equiv \frac{f(u)-f_p(u)}{p} ~(\bmod~ p), \qquad 0 \le F(u) \le p-1,~u\ge 0,$ where
fp(
u)≡
f(
u) (mod
p), for general polynomials $f(x)\in \mathbb{Z}[x]$. The linear complexity equals to one of the following values {
p2-
p,
p2-
p+1,
p2-1,
p2} if 2 is a primitive root modulo
p2, depending on
p≡1 or 3 modulo 4 and the number of solutions of
f'(
u)≡0 (mod)
p, where
f'(
x) is the derivative of
f(
x). Furthermore, we extend the constructions to
d-ary sequences for prime
d|(
p-1) and
d being a primitive root modulo
p2.
View full abstract
-
Takayuki NOZAKI, Kenta KASAI, Kohichi SAKANIWA
Article type: PAPER
Subject area: Coding Theory
2014 Volume E97.A Issue 4 Pages
975-984
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
In this paper, we propose a message passing decoding algorithm which lowers decoding error rates in the error floor regions for non-binary low-density parity-check (LDPC) codes transmitted over the binary erasure channel (BEC) and the memoryless binary-input output-symmetric (MBIOS) channels. In the case for the BEC, this decoding algorithm is a combination with belief propagation (BP) decoding and maximum a posteriori (MAP) decoding on zigzag cycles, which cause decoding errors in the error floor region. We show that MAP decoding on the zigzag cycles is realized by means of a message passing algorithm. Moreover, we extend this decoding algorithm to the MBIOS channels. Simulation results demonstrate that the decoding error rates in the error floor regions by the proposed decoding algorithm are lower than those by the BP decoder.
View full abstract
-
Jungo MORIYASU, Toshimichi SAITO
Article type: LETTER
Subject area: Nonlinear Problems
2014 Volume E97.A Issue 4 Pages
985-988
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
This letter studies the simple dynamic binary neural network characterized by signum activation function and ternary connection parameters. In order to control the sparsity of the connections and the stability of the stored signal, a simple evolutionary algorithm is presented. As a basic example of teacher signals, we consider a binary periodic orbit which corresponds to a control signal of ac-dc regulators. In the numerical experiment, applying the correlation-based learning, the periodic orbit can be stored. The sparsification can be effective to reinforce the stability of the periodic orbit.
View full abstract
-
Shice NI, Yong DOU, Kai CHEN, Jie ZHOU
Article type: LETTER
Subject area: Algorithms and Data Structures
2014 Volume E97.A Issue 4 Pages
989-990
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
This letter proposes a novel high performance crypto coprocessor that relies on Reconfigurable Cryptographic Blocks. We implement the prototype of the coprocessor on Xilinx FPGA chip. And the pipelining technique is adopted to realize data paralleling. The results show that the coprocessor, running at 189MHz, outperforms the software-based SSL protocol.
View full abstract
-
He LIU, Mangui LIANG, Haoliang SUN
Article type: LETTER
Subject area: Cryptography and Information Security
2014 Volume E97.A Issue 4 Pages
991-995
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
In this letter, we propose a new secure and efficient certificateless aggregate signature scheme which has the advantages of both certificateless public key cryptosystem and aggregate signature. Based on the computational Diffie-Hellman problem, our scheme can be proven existentially unforgeable against adaptive chosen-message attacks. Most importantly, our scheme requires short group elements for aggregate signature and constant pairing computations for aggregate verification, which leads to high efficiency due to no relations with the number of signers.
View full abstract
-
Hitoshi TOKUSHIGE
Article type: LETTER
Subject area: Coding Theory
2014 Volume E97.A Issue 4 Pages
996-1000
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
A soft-decision recursive decoding algorithm (RDA) for the class of the binary linear block codes recursively generated using a
u|
u+
v-construction method is proposed. It is well known that Reed-Muller (RM) codes are in this class. A code in this class can be decomposed into left and right components. At a recursive level of the RDA, if the component is decomposable, the RDA is performed for the left component and then for the cosets generated from the left decoding result and the right component. The result of this level is obtained by concatenating the left and right decoding results. If the component is indecomposable, a proposed iterative bounded-distance decoding algorithm is performed. Computer simulations were made to evaluate the RDA for RM codes over an additive white Gaussian-noise channel using binary phase-shift keying modulation. The results show that the block error rates of the RDA are relatively close to those of the maximum-likelihood decoding for the third-order RM code of length 2
6 and better than those of the Chase II decoding for the third-order RM codes of length 2
6 and 2
7, and the fourth-order RM code of length 2
8.
View full abstract
-
Junjun GUO, Jianjun MU, Xiaopeng JIAO, Guiping LI
Article type: LETTER
Subject area: Coding Theory
2014 Volume E97.A Issue 4 Pages
1001-1004
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
In this letter, we present a new scheme to find small fundamental instantons (SFIs) of regular low-density parity-check (LDPC) codes for the linear programming (LP) decoding over the binary symmetric channel (BSC). Based on the fact that each instanton-induced graph (IIG) contains at least one short cycle, we determine potential instantons by constructing possible IIGs which contain short cycles and additional paths connected to the cycles. Then we identify actual instantons from potential ones under the LP decoding. Simulation results on some typical LDPC codes show that our scheme is effective, and more instantons can be obtained by the proposed scheme when compared with the existing instanton search method.
View full abstract
-
Jian GAO, Fang-Wei FU, Linzhi SHEN, Wenli REN
Article type: LETTER
Subject area: Coding Theory
2014 Volume E97.A Issue 4 Pages
1005-1011
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
Generalized quasi-cyclic (GQC) codes with arbitrary lengths over the ring $\mathbb{F}_{q}+u\mathbb{F}_{q}$, where
u2=0,
q=
pn,
n a positive integer and
p a prime number, are investigated. By the Chinese Remainder Theorem, structural properties and the decomposition of GQC codes are given. For 1-generator GQC codes, minimum generating sets and lower bounds on the minimum distance are given.
View full abstract
-
Chengqian XU, Xiaoyu CHEN, Kai LIU
Article type: LETTER
Subject area: Coding Theory
2014 Volume E97.A Issue 4 Pages
1012-1015
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
This letter presents new methods for transforming perfect ternary sequences into perfect 8-QAM+ sequences. Firstly, based on perfect ternary sequences with even period, two mappings which can map two ternary variables to an 8-QAM+ symbol are employed for constructing new perfect 8-QAM+ sequences. In this case, the proposed construction is a generalization of the existing one. Then based on perfect ternary sequence with odd period, perfect 8-QAM sequences are generated. Compared with perfect 8-QAM+ sequences, the resultant sequences have no energy loss.
View full abstract
-
Motoki IIDA, Kazuki SUGENO, Mamiko INAMORI, Yukitoshi SANADA
Article type: LETTER
Subject area: Communication Theory and Signals
2014 Volume E97.A Issue 4 Pages
1016-1020
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
This letter investigates the relationship between antenna position and data communication performance in a magnetic resonance wireless power transfer (MRWPT) system. In MRWPT information such as the types of equipments, the required amount of electrical power, or the timing of power transfer should be exchanged. It is assumed here that power transfer coils in the MRWPT system are employed as antennas for data communication. The frequency characteristics of the antennas change due to coil displacements. The power transfer coils are modeled as a band pass filter (BPF) and the frequency characteristics of the filter are presented in this letter. The characteristics of the filter are derived through circuit simulation and resulting data communication performance is evaluated. Numerical results obtained through computer simulation show that the bit error late (BER) performance can be improved by controlling the center frequency of the communication link.
View full abstract
-
Nan SHA, Yuanyuan GAO, Xiaoxin YI, Wenlong LI, Weiwei YANG
Article type: LETTER
Subject area: Communication Theory and Signals
2014 Volume E97.A Issue 4 Pages
1021-1023
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
A joint continuous phase frequency shift keying (CPFSK) modulation and physical-layer network coding (PNC), i.e., CPFSK-PNC, is proposed for two-way relay channels (TWRCs). This letter discusses the signal detection of the CPFSK-PNC scheme with emphasis on the maximum-likelihood sequence detection (MLSD) algorithm for the relay receiver. The end-to-end error performance of the proposed CPFSK-PNC scheme is evaluated through simulations.
View full abstract
-
Jongwon SEOK, Keunsung BAE
Article type: LETTER
Subject area: Multimedia Environment Technology
2014 Volume E97.A Issue 4 Pages
1024-1026
Published: April 01, 2014
Released on J-STAGE: April 01, 2014
JOURNAL
RESTRICTED ACCESS
Canonical correlation analysis (CCA) is applied to extract features for microphone classification. We utilized the coherence between near-silence regions. Experimental results show the promise of canonical correlation features for microphone classification.
View full abstract