IEICE TRANSACTIONS on Fundamentals

  • Impact Factor

    0.40

  • Eigenfactor

    0.003

  • article influence

    0.1

  • Cite Score

    1.1

Advance publication (published online immediately after acceptance)

Volume E97-A No.11  (Publication Date:2014/11/01)

    Special Section on Smart Multimedia & Communication Systems
  • FOREWORD

    Hiroshi YASUKAWA  Akira ASANO  

     
    FOREWORD

      Page(s):
    2095-2096
  • Timing Synchronization Performance of Short Preamble Sequence with Orthogonal Frequency Multiplexed Data Symbols

    Yuki TANAKA  Yukitoshi SANADA  

     
    PAPER

      Page(s):
    2097-2106

    Wireless communications for the control of industrial equipments need to send a large amount of short packets frequently and to improve frame efficiency. The OFDM frame of wireless local area networks has short preambles that are used for timing synchronization and coarse frequency offset estimation. As the short preambles are repeated in a time domain, they occupies subcarriers intermittently. Therefore, in this paper, a new frame format with OFDM modulation in which data symbols are orthogonally multiplexed with the preamble symbols in the frequency domain is proposed. Two preamble sequences that are based on an IEEE802.11g short preamble sequence and a Zadoff-Chu sequence are examined. The ratio of transmission powers between the pilot subcarrier and the data subcarrier is also varied. The timing synchronization probability with those sequences has been evaluated on different channel models. It is shown through the experiment that the synchronization performance is almost the same as that without data multiplexing at Es/N0 of more than 8dB.

  • A Copyright- and Privacy-Protected Image Trading System Using Fingerprinting in Discrete Wavelet Domain with JPEG 2000

    Wannida SAE-TANG  Shenchuan LIU  Masaaki FUJIYOSHI  Hitoshi KIYA  

     
    PAPER

      Page(s):
    2107-2113

    In this paper, a compression-friendly copyright- and privacy-protected image trading system is proposed. In the image trading system, the copyright of the image and the consumer's privacy is important. In addition, it should preserve existing image compression standards. In the proposed method, for privacy protection, the content provider (CP) multiplies random signs to the discrete wavelet transformed (DWTed) coefficients of an image to generate the visually encrypted image. The proposed visually protected images can be efficiently compressed by using JPEG 2000 which compresses the image in the DWTed domain as well. For copyright protection, the trusted third party (TTP) applies digital fingerprinting to the image in the encrypted domain. While in the conventional system, the amplitude-only image (AOI) which is the inversely transformed amplitude spectra of an image is used for privacy protection. Since, the AOI consists of real numbers, to store and transmit the AOI, it has to be quantized before compression. Therefore, quantization errors cannot be avoided in the conventional system. On the other hand, the proposed method applies the digital fingerprint in the DWTed domain, so clipping errors in decoding the image by the TTP is avoided. In addition, only a seed number which is input to a pseudo random number generator is shared between the CP and the consumer, whereas an extra image is shared in the conventional systems. Experimental results show that the proposed system is efficient in terms of privacy protection, compression performance, quality of fingerprinted images, and correct fingerprint extracting performance.

  • The Background Noise Estimation in the ELF Electromagnetic Wave Data Using Outer Product Expansion with Non-linear Filter

    Akitoshi ITAI  Hiroshi YASUKAWA  Ichi TAKUMI  Masayasu HATA  

     
    PAPER

      Page(s):
    2114-2120

    This paper proposes a background noise estimation method using an outer product expansion with non-linear filters for ELF (extremely low frequency) electromagnetic (EM) waves. We proposed a novel source separation technique that uses a tensor product expansion. This signal separation technique means that the background noise, which is observed in almost all input signals, can be estimated using a tensor product expansion (TPE) where the absolute error (AE) is used as the error function, which is thus known as TPE-AE. TPE-AE has two problems: the first is that the results of TPE-AE are strongly affected by Gaussian random noise, and the second is that the estimated signal varies widely because of the random search. To solve these problems, an outer product expansion based on a modified trimmed mean (MTM) is proposed in this paper. The results show that this novel technique separates the background noise from the signal more accurately than conventional methods.

  • Derivation of Update Rules for Convolutive NMF Based on Squared Euclidean Distance, KL Divergence, and IS Divergence

    Hiroki TANJI  Ryo TANAKA  Kyohei TABATA  Yoshito ISEKI  Takahiro MURAKAMI  Yoshihisa ISHIDA  

     
    PAPER

      Page(s):
    2121-2129

    In this paper, we present update rules for convolutive nonnegative matrix factorization (NMF) in which cost functions are based on the squared Euclidean distance, the Kullback-Leibler (KL) divergence and the Itakura-Saito (IS) divergence. We define an auxiliary function for each cost function and derive the update rule. We also apply this method to the single-channel signal separation in speech signals. Experimental results showed that the convergence of our KL divergence-based method was better than that in the conventional method, and our method achieved single-channel signal separation successfully.

  • Fast Mode and Depth Decision for HEVC Intra Prediction Based on Edge Detection and Partition Reconfiguration

    Gaoxing CHEN  Lei SUN  Zhenyu LIU  Takeshi IKENAGA  

     
    PAPER

      Page(s):
    2130-2138

    High efficiency video coding (HEVC) is a video compression standard that outperforms the predecessor H.264/AVC by doubling the compression efficiency. To enhance the intra prediction accuracy, 35 intra prediction modes were used in the prediction units (PUs), with partition sizes ranging from 4 × 4 to 64 × 64 in HEVC. However, the manifold prediction modes dramatically increase the encoding complexity. This paper proposes a fast mode- and depth-decision algorithm based on edge detection and reconfiguration to alleviate the large computational complexity in intra prediction with trivial degradation in accuracy. For mode decision, we propose pixel gradient statistics (PGS) and mode refinement (MR). PGS uses pixel gradient information to assist in selecting the prediction mode after rough mode decision (RMD). MR uses the neighboring mode information to select the best PU mode (BPM). For depth decision, we propose a partition reconfiguration algorithm to replace the original partitioning order with a more reasonable structure, by using the smoothness of the coding unit as a criterion in deciding the prediction depth. Smoothness detection is based on the PGS result. Experiment results show that the proposed method saves about 41.50% of the original processing time with little degradation (BD bitrate increased by 0.66% and BDPSNR decreased by 0.060dB) in the coding gain.

  • Nonlinear Acoustic Echo Suppression Based on Spectrum Selection Using the Amount of Linear Echo Cancellation

    Takashi SUDO  Hirokazu TANAKA  Chika SUGIMOTO  Ryuji KOHNO  

     
    PAPER

      Page(s):
    2139-2146

    Hands-free communications between cellular phones must be robust enough to withstand echo-path variation, and highly nonlinear echoes must be suppressed at low cost, when acoustic echo cancellation or suppression is applied to them. This paper proposes a spectrum-selective nonlinear echo suppression (SS-ES) approach as a solution to these issues. SS-ES is characterized by the selection of either a spectrum of the residual signal from an adaptive filter or a spectrum of the sending input signal depending on the amount of linear echo cancellation in an adaptive filter. Compared to conventional methods, the objective evaluation results of the SS-ES approach show an improvement of approximately 0.8-2.2dB, 0.23-2.39dB, and 0.26-0.50 in average echo return loss enhancement (ERLE), average root-mean-square log-spectral distortion (RMS-LSD), and the perceptual evaluation of speech quality (PESQ) value, respectively, under echo-path variation and double-talk conditions.

  • A Fixed-Point Global Tone Mapping Operation for HDR Images in the RGBE Format

    Toshiyuki DOBASHI  Tatsuya MUROFUSHI  Masahiro IWAHASHI  Hitoshi KIYA  

     
    PAPER

      Page(s):
    2147-2153

    A global tone mapping operation (TMO) for high dynamic range (HDR) images with fixed-point arithmetic is proposed and evaluated in this paper. A TMO generates a low dynamic range (LDR) image from an HDR image by compressing its dynamic range. Since an HDR image is generally expressed in a floating-point data format, a TMO also deals with floating-point data even though a resultant LDR image is integer data. The proposed method treats a floating-point number as two 8-bit integer numbers which correspond to an exponent part and a mantissa part, and applies tone mapping to these integer numbers separately. Moreover, the method conducts all calculations in the tone mapping with only fixed-point arithmetic. As a result, the method reduces a memory cost and a computational cost. The evaluation shows that the proposed method reduces 81.25% of memory usage. The experimental results show that the processing speed of the proposed method with fixed-point arithmetic is 23.1 times faster than the conventional method with floating-point arithmetic. Furthermore, they also show the PSNR of LDR images obtained by the proposed method are comparable to those of the conventional method, though reducing computational and memory cost.

  • Interactive Evolutionary System for Synthesizing Facial Caricature with Non-planar Expression

    Tatsuya UGAI  Keita SATO  Kaoru ARAKAWA  Hiroshi HARASHIMA  

     
    PAPER

      Page(s):
    2154-2160

    A method to synthesize facial caricatures with non-planar expression is proposed. Several methods have been already proposed to synthesize facial caricatures automatically, but they mainly synthesize plane facial caricatures which look somewhat monotonous. In order to generate expressive facial caricature, the image should be expressed in non-planar style, expressing the depth of the face by shading and highlighting. In this paper, a new method to express such non-planar effect in facial caricatures is proposed by blending the grayscale information of the real face image into the plane caricature. Some methods also have been proposed to generate non-planar facial caricature, but the proposed method can adjust the degree of non-planar expression by interactive evolutionary computing, so that the obtained expression is satisfied by the user based on his/her subjective criteria. Since the color of the face looks changed, when the grayscale information of the natural face image is mixed, the color information of the skin area are also set by interactive evolutionary computing. Experimental results show the high performance of the proposed method.

  • Measurement of Length of a Single Tooth Using PCA-Signature and Bezier Curve

    Pramual CHOORAT  Werapon CHIRACHARIT  Kosin CHAMNONGTHAI  Takao ONOYE  

     
    PAPER

      Page(s):
    2161-2169

    In developing an automatic system of a single tooth length measurement on x-ray image, since a tooth shape is assumed to be straight and curve, an algorithm which can accurately deal with straight and curve is required. This paper proposes an automatic algorithm for measuring the length of single straight and curve teeth. In the algorithm consisting of control point determination, curve fitting, and length measurement, PCA is employed to find the first and second principle axes as vertical and horizontal ones of the tooth, and two terminal points of vertical axis and the junction of those axes are determined as three first-order control points. Signature is then used to find a peak representing tooth root apex as the forth control point. Bezier curve, Euclidean distance, and perspective transform are finally applied with determined four control points in curve fitting and tooth length measurement. In the experiment, comparing with the conventional PCA-based method, the average mean square error (MSE) of the line points plotted by the expert is reduced from 7.548 pixels to 4.714 pixels for tooth image type-I, whereas the average MSE value is reduced from 7.713 pixels and 7.877 pixels to 4.809 pixels and 5.253 pixels for left side and right side of tooth image type-H, respectively.

  • Statistical Channel Modeling for Aeronautical Cognitive Radio Communications

    Chao ZHANG  Junzhou YU  

     
    LETTER

      Page(s):
    2170-2173

    Due to the high speed mobile environment, the aeronautical Cognitive Radio (CR) communications base on the channel with the time-variant stochastic non-continuous spectrum. The traditional fading channel models, such as Rayleigh, Rice, Nakagami-m and multipath channel models, can not describe the whole property of the channels of CR communications. In this letter, the statistical channel modeling scheme for aeronautical CR communications is proposed with a M/M/s(1) queuing model, which properly describes the random spectrum occupation of the primary users, i.e. aircrafts in aeronautical communications. The proposed channel model can be easily utilized in the channel simulation to testify the validity and efficiency of the aeronautical CR communications.

  • Timing Synchronization for Massive MIMO System with Extended CCK Codes

    Liang ZHAO  Jun ZHANG  Xuejun ZHANG  Yun BAI  

     
    LETTER

      Page(s):
    2174-2177

    The timing synchronization scheme for massive MIMO systems is proposed with CCK (Complementary Code Keying) codes in this letter. Our proposed scheme is specifically designed to generate synchronization sequence with large family size. The optimal sequences can be constructed with ZCZ or LCZ based on the number of antennas. Furthermore Monte Carlo simulation results confirmed the expected detection probability for massive MIMO systems.

  • Scene Analysis from Viewing Orientations in a Shooting Environment of Multiple Mobile Phones

    Shogo TOKAI  Takayoshi MORIOKA  Hiroyuki HASE  

     
    LETTER

      Page(s):
    2178-2180

    We propose a method to extract scene situation by orientation sensors of multiple mobile phones' environment. By using orientations recorded with videos, we analyzed their view concentrations as a remarkable position of the scene for each frame of videos. In an experiment for a soccer scene, the extracted points can be related to a trajectory of a soccer ball.

  • An Efficient Lossless Compression Method Using Histogram Packing for HDR Images in OpenEXR Format

    Taku ODAKA  Wannida SAE-TANG  Masaaki FUJIYOSHI  Hiroyuki KOBAYASHI  Masahiro IWAHASHI  Hitoshi KIYA  

     
    LETTER

      Page(s):
    2181-2183

    This letter proposes an efficient lossless compression method for high dynamic range (HDR) images in OpenEXR format. The proposed method transforms an HDR image to an indexed image and packs the histogram of the indexed image. Finally the packed image is losslessly compressed by using any existing lossless compression algorithm such as JPEG 2000. Experimental results show that the proposed method reduces the bit rate of compressed OpenEXR images compared with equipped lossless compression methods of OpenEXR format.

  • Cost Function-Based Vector Filter for Suppressing False Color

    Shi BAO  Go TANAKA  

     
    LETTER

      Page(s):
    2184-2188

    In the impulse noise removal from a color image, vector filters are suitable for suppressing false color generation. However, the vector filters do not select optimal vectors to restore noise corrupted pixels. To cope with this problem, a cost function-based vector filter is proposed in this letter.

  • Regular Section
  • Parameter Estimation Method Using Volterra Kernels for Nonlinear IIR Filters

    Kenta IWAI  Yoshinobu KAJIKAWA  

     
    PAPER-Digital Signal Processing

      Page(s):
    2189-2199

    In this paper, we propose a parameter estimation method using Volterra kernels for the nonlinear IIR filters, which are used for the linearization of closed-box loudspeaker systems. The nonlinear IIR filter, which originates from a mirror filter, employs nonlinear parameters of the loudspeaker system. Hence, it is very important to realize an appropriate estimation method for the nonlinear parameters to increase the compensation ability of nonlinear distortions. However, it is difficult to obtain exact nonlinear parameters using the conventional parameter estimation method for nonlinear IIR filter, which uses the displacement characteristic of the diaphragm. The conventional method has two problems. First, it requires the displacement characteristic of the diaphragm but it is difficult to measure such tiny displacements. Moreover, a laser displacement gauge is required as an extra measurement instrument. Second, it has a limitation in the excitation signal used to measure the displacement of the diaphragm. On the other hand, in the proposed estimation method for nonlinear IIR filter, the parameters are updated using simulated annealing (SA) according to the cost function that represents the amount of compensation and these procedures are repeated until a given iteration count. The amount of compensation is calculated through computer simulation in which Volterra kernels of a target loudspeaker system is utilized as the loudspeaker model and then the loudspeaker model is compensated by the nonlinear IIR filter with the present parameters. Hence, the proposed method requires only an ordinary microphone and can utilize any excitation signal to estimate the nonlinear parameters. Some experimental results demonstrate that the proposed method can estimate the parameters more accurately than the conventional estimation method.

  • Dynamic Game Approach of H2/H Control for Stochastic Discrete-Time Systems

    Hiroaki MUKAIDANI  Ryousei TANABATA  Chihiro MATSUMOTO  

     
    PAPER-Systems and Control

      Page(s):
    2200-2211

    In this paper, the H2/H control problem for a class of stochastic discrete-time linear systems with state-, control-, and external-disturbance-dependent noise or (x, u, v)-dependent noise involving multiple decision makers is investigated. It is shown that the conditions for the existence of a strategy are given by the solvability of cross-coupled stochastic algebraic Riccati equations (CSAREs). Some algorithms for solving these equations are discussed. Moreover, weakly-coupled large-scale stochastic systems are considered as an important application, and some illustrative examples are provided to demonstrate the effectiveness of the proposed decision strategies.

  • Self-Tuning Approach to Stabilizing Unknown and Unstable Periodic Orbits

    Takumi HASEGAWA  Tadashi TSUBONE  

     
    PAPER-Nonlinear Problems

      Page(s):
    2212-2217

    We consider an improved control method based on the Stability Transformation Method. Stability Transformation Method detects unknown and unstable periodic orbits of chaotic dynamical systems. Based on the approach to realize the Stability Transformation Method in real systems, we have proposed a control method which can stabilize unknown and unstable periodic orbits embedded in chaotic attractors. However, setting of the control parameters of the control system has remained as unsolved issue. When the dynamics of a target system are unknown, the control parameters have to be set by trial and error. In this paper, we improve the control method with the automatic adjustment function of the control parameters. We show an example of stabilizing unstable periodic orbits of the 3-dimensional hysteresis chaos generator by using the proposed control method. Some results are confirmed by laboratory measurements. The results imply that any unknown and unstable periodic orbits can be stabilized by using the proposed method, if the target chaos system is reduced to 1-dimensional return map.

  • Trojan Vulnerability Map: An Efficient Metric for Modeling and Improving the Security Level of Hardware

    Mahmoud BAKHSHIZADEH  Ali JAHANIAN  

     
    PAPER-VLSI Design Technology and CAD

      Page(s):
    2218-2226

    Hardware Trojan or any other kind of unwanted hardware modifications has been thought as a major challenge in many commercial and secure applications. Currently, detection and prevention of hardware Trojans appeared as an important requirement in such systems. In this paper, a new concept, Trojan Vulnerability Map, is introduced to model the immunity of various regions of hardware against hardware attacks. Then, placement and routing algorithms are proposed to improve the immunity of hardware using the Trojan Vulnerability Map. Experimental results show that the proposed placement and routing algorithm reduces the hardware vulnerability by 25.65% and 4.08%, respectively. These benefits are earned in cost of negligible total wire length and delay overhead.

  • Efficient Statistical Timing Analysis for Circuits with Post-Silicon Tunable Buffers

    Xingbao ZHOU  Fan YANG  Hai ZHOU  Min GONG  Hengliang ZHU  Ye ZHANG  Xuan ZENG  

     
    PAPER-VLSI Design Technology and CAD

      Page(s):
    2227-2235

    Post-Silicon Tunable (PST) buffers are widely adopted in high-performance integrated circuits to fix timing violations introduced by process variations. In typical optimization procedures, the statistical timing analysis of the circuits with PST clock buffers will be executed more than 2000 times for large scale circuits. Therefore, the efficiency of the statistical timing analysis is crucial to the PST clock buffer optimization algorithms. In this paper, we propose a stochastic collocation based efficient statistical timing analysis method for circuits with PST buffers. In the proposed method, we employ the Howard algorithm to calculate the clock periods of the circuits on less than 100 deterministic sparse-grid collocation points. Afterwards, we use these obtained clock periods to derive the yield of the circuits according to the stochastic collocation theory. Compared with the state-of-the-art statistical timing analysis method for the circuits with PST clock buffers, the proposed method achieves up to 22X speedup with comparable accuracy.

  • On the Minimum-Weight Codewords of Array LDPC Codes with Column Weight 4

    Haiyang LIU  Gang DENG  Jie CHEN  

     
    PAPER-Coding Theory

      Page(s):
    2236-2246

    In this paper, we investigate the minimum-weight codewords of array LDPC codes C(m,q), where q is an odd prime and mq. Using some analytical approaches, the lower bound on the number of minimum-weight codewords of C(m,q) given by Kaji (IEEE Int. Symp. Inf. Theory, June/July 2009) is proven to be tight for m = 4 and q > 19. In other words, C(4,q) has 4q2(q-1) minimum-weight codewords for all q > 19. In addition, we show some interesting universal properties of the supports of generators of minimum-weight codewords of the code C(4,q)(q > 19).

  • Single Error Correcting Quantum Codes for the Amplitude Damping Channel Based on Classical Codes over GF(7)

    Keisuke KODAIRA  Mihoko WADA  Tomoharu SHIBUYA  

     
    PAPER-Coding Theory

      Page(s):
    2247-2253

    The amplitude damping (AD) quantum channel is one of the models describing evolution of quantum states. The construction of quantum error correcting codes for the AD channel based on classical codes has been presented, and Shor et al. proposed a class of classical codes over F3 which are efficiently applicable to this construction. In this study, we expand Shor's construction to that over F7, and succeeded to construct an AD code that has better parameters than AD codes constructed by Shor et al.

  • Improved Spectral Envelope Coding Algorithm Using Adaptive Filtering for G.729.1

    Keunseok CHO  Sangbae JEONG  Minsoo HAHN  

     
    LETTER-Speech and Hearing

      Page(s):
    2254-2257

    This paper proposes a new algorithm to encode the spectral envelope for G.729.1 more accurately. It applies the normalized least-mean- square (NLMS) algorithm to each subband energy of the modified discrete cosine transform (MDCT) in the time-domain alias cancellation (TDAC) of G.729.1. By utilizing the estimation error of subband energies by means of NLMS, allocated bit reduction for spectral envelope coding is achieved. The saved bits are then reused to improve the spectral envelope estimation and thus enhance the sound quality. Experimental results confirm that the proposed algorithm improves the sound quality under both clean and packet loss conditions.

  • Parallelization of Dynamic Time Warping on a Heterogeneous Platform

    Yao ZHENG  Limin XIAO  Wenqi TANG  Lihong SHANG  Guangchao YAO  Li RUAN  

     
    LETTER-Algorithms and Data Structures

      Page(s):
    2258-2262

    The dynamic time warping (DTW) algorithm is widely used to determine time series similarity search. As DTW has quadratic time complexity, the time taken for similarity search is the bottleneck for virtually all time series data mining algorithms. In this paper, we present a parallel approach for DTW on a heterogeneous platform with a graphics processing unit (GPU). In order to exploit fine-grained data-level parallelism, we propose a specific parallel decomposition in DTW. Furthermore, we introduce an optimization technique called diamond tiling to improve the utilization of threads. Results show that our approach substantially reduces computational time.

  • On the Linear Complexity of New Modified Jacobi Sequences

    Qiuyan WANG  Yupeng JIANG  Dongdai LIN  Xuan GUANG  

     
    LETTER-Cryptography and Information Security

      Page(s):
    2263-2266

    Jacobi sequences have good cryptography properties. Li et al. [X. Li et al., Linear Complexity of a New Generalized Cyclotomic Sequence of Order Two of Length pq*, IEICE Trans. Fundamentals, vol.E96-A, no.5, pp.1001-1005, 2013] defined a new modified Jacobi sequence of order two and got its linear complexity. In this corresponding, we determine the linear complexity and minimal polynomials of the new modified Jacobi sequence of order d. Our results show that the sequence is good from the viewpoint of linear complexity.

  • On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack

    Jinyong CHANG  Rui XUE  

     
    LETTER-Cryptography and Information Security

      Page(s):
    2267-2271

    In this letter, we formally present the definition of KDM-CCA1 security in public key setting, which falls in between the existing KDM-CPA and KDM-CCA2 security. We also prove that if a public key encryption scheme is CCA1 secure and has the properties of secret-key multiplication (or addition) homomorphism, and conditioned plaintext-restorability, then it is KDM-CCA1 secure w.r.t. two ensembles of functions that had been used in [15],[17], respectively. For concrete scheme, we show that the (tailored) Damgård's Elgamal scheme achieves this KDM-CCA1 security based on different assumptions.

  • On the Outage Capacity of Fading Cognitive Multicast Channel

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Page(s):
    2272-2275

    The outage capacity of the fading cognitive multicast channel (CMC) is investigated in this paper. Assume that the instantaneous channel state information (CSI) of the interference link between the cognitive base station (CBS) and the primary user (PU) is available at the CBS, we derive the outage capacity in Rayleigh fading environments under the interference power and the transmit power constraints. Under the condition that the interference power limit is sufficiently larger or smaller than the transmit power limit, the asymptotic outage capacity is obtained in closed-form. Assume that only the channel distribution information (CDI) of the interference link is available at the CBS, the outage capacity under the interference outage and the transmit power constraints is derived in closed-form. The theoretical results are confirmed by simulations. It is shown that the outage capacity is not degraded due to partial knowledge of the interference link when the interference power limit is sufficiently larger than the transmit power limit. It is also shown that the capacity gain due to increasing the number of the secondary users (SUs) is negligible if the number of the SUs is already large. Additionally, the case of CDI with estimation error is also investigated. Interestingly, we show that the estimation error of CDI may be a positive factor for improving the outage capacity of the CMC.

  • Simple Joint Symbol Timing and Carrier Frequency Offset Estimation for Wireless Body Area Networks

    Byung-Kyu KIM  Young-Hwan YOU  

     
    LETTER-Communication Theory and Signals

      Page(s):
    2276-2278

    In this letter, we propose a simple algorithm to jointly estimate the symbol timing offset (STO) and carrier frequency offset (CFO) of wireless body area network (WBAN) signals. The preamble specified in IEEE 802.15.6 WBAN is used to achieve an accurate timing and frequency estimation based on the differential correlation. Simulations demonstrate that the proposed joint estimation scheme can be effectively employed to get accurate STO and CFO estimate with less complexity.

  • Real-Time MAC Protocol Based on Coding-Black-Burst in Wireless Sensor Networks

    Feng YU  Lei WANG  Dan GAO  Yingguan WANG  Xiaolin ZHANG  

     
    LETTER-Communication Theory and Signals

      Page(s):
    2279-2282

    In this paper, a real-time medium access control (MAC) protocol based on a coding-black-burst mechanism with low latency and high energy efficiency is proposed for wireless sensor networks. The Black-Burst (BB) mechanism is used to provide real-time access. However, when the traffic load is heavy, BB will cause a lot of energy loss and latency due to its large length. A binary coding mechanism is applied to BB in our coding-black-burst-based protocol to reduce the energy consumption and latency by at least (L-2(log2 L+1)) for L-length BB. The new mechanism also gives priority to the real-time traffic with longer waiting delays to access the channel. The theoretical analysis and simulation results indicate that our protocol provides low end-to-end delay and high energy efficiency for real-time communication.

  • Reusing EPR Pairs for Change of Receiver in Quantum Repeater

    Kenichiro FURUTA  

     
    LETTER-General Fundamentals and Boundaries

      Page(s):
    2283-2286

    We focus on a characteristic which is specific to the quantum repeater protocol. In the quantum repeater protocol, quantum states which are generated by the protocol do not depend on receivers. Therefore, we can reuse EPR pairs which are generated before a change of a receiver for the quantum repeater protocol after the change. The purpose of reusing is advancing the finishing time of sharing EPR pairs, which is not equal to increasing the fidelity. In this paper, we construct concrete methods of reusing EPR pairs and analyze the effectiveness of reusing EPR pairs. Besides, we derive conditions in which reusing EPR pairs is effective.

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.