Search Results - "Hosoya, Gou"
-
1
Concatenated LDPC/2-D-Marker Codes and Non-Iterative Detection/Decoding for Recovering Position Errors in Racetrack Memories
Published in IEEE transactions on magnetics (01-09-2020)“…Racetrack memories (RMs) are prone to alignment faults called position errors (PEs), which manifest as insertions and deletions of stored data bits…”
Get full text
Journal Article -
2
Log-Likelihood Ratio Calculation for Iterative Decoding on Rayleigh Fading Channels Using Padé Approximation
Published in Journal of Applied Mathematics (01-01-2013)“…Approximate calculation of channel log-likelihood ratio (LLR) for wireless channels using Padé approximation is presented. LLR is used as an input of iterative…”
Get full text
Journal Article -
3
Spatially-coupled LDPC codes for two dimensional erasure channel
Published in 2017 IEEE Information Theory Workshop (ITW) (01-11-2017)“…In this study, we developed spatially coupled LDPC (SC-LDPC) codes on the two-dimensional array erasure (2DAE) channel. We propose a method of generating new…”
Get full text
Conference Proceeding -
4
Structured Concatenation of Protograph LDPC Codes and Markers for Insertion/Deletion Channels
Published in 2018 International Symposium on Information Theory and Its Applications (ISITA) (01-10-2018)“…In this paper, the structured concatenated coding of protograph LDPC codes and markers for insertion and deletion channels are proposed, where the joint…”
Get full text
Conference Proceeding -
5
Reduction of Delay for Delayed Bit-Interleaved Coded Modulation
Published in 2022 IEEE International Symposium on Information Theory (ISIT) (26-06-2022)“…This study focuses on delayed bit-interleaved coded modulation (DBICM) for a two-dimensional signal constellation and shows that the capacity of DBICM is…”
Get full text
Conference Proceeding -
6
Analysis of Delayed Bit-Interleaved Coded Modulation for APSK
Published in 2021 20th International Symposium on Communications and Information Technologies (ISCIT) (19-10-2021)“…In this work, we study delayed bit-interleaved coded modulation (DBICM) on amplitude and phase-shift keying (APSK) constellation. APSK is attractive for…”
Get full text
Conference Proceeding -
7
Performance of Non-Binary LDPC Codes on Two-Dimensional Array Erasure Models
Published in 2020 International Symposium on Information Theory and Its Applications (ISITA) (24-10-2020)“…In this study, we evaluate the performance of non-binary low-density parity-check (NB-LDPC) codes on two-dimensional array erasure models. For this channel…”
Get full text
Conference Proceeding -
8
Design of Irregular LDPC Codes without Markers for Insertion/Deletion Channels
Published in 2019 IEEE Global Communications Conference (GLOBECOM) (01-12-2019)“…Over the past two decades, irregular low-density parity-check (LDPC) codes have been hardly able to decode information corrupted by insertion and deletion (ID)…”
Get full text
Conference Proceeding -
9
Constellation shaping for non-uniform signals based on truncated Gaussian distribution
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01-10-2016)“…We study the signal shaping based on the truncated Gaussian distribution. Since the possibility of reducing peak-to-average power ratio (PAPR) by the previous…”
Get full text
Conference Proceeding -
10
Constellation shaping for non-uniform signals in bit-interleaved coded modulation combined with multi-stage decoding
Published in 2016 Australian Communications Theory Workshop (AusCTW) (01-01-2016)“…A signal shaping for the bit-interleaved coded modulation (BICM) is considered. Previous work on signal shaped BICM (SBICM) has two problems: (i) It requires…”
Get full text
Conference Proceeding -
11
All-Optical Two-Bit Magnitude Comparator Using Quantum-Dot Semiconductor Optical Amplifier
Published in 2018 Asia Communications and Photonics Conference (ACP) (01-10-2018)“…We construct three types of a two-bit magnitude all-optical digital comparator by cascading logic gates using quantum-dot semiconductor optical amplifiers…”
Get full text
Conference Proceeding -
12
An improvement of approximate BP decoding
Published in 2014 International Symposium on Information Theory and its Applications (01-10-2014)“…In this study, we present new methods for piece-wise linear approximation of Min-Sum (MS) decoding algorithm with good trade-off between performance and…”
Get full text
Conference Proceeding -
13
Simulation of all-optical NOR gate using single quantum-dot SOA and optical filter
Published in 2017 Conference on Lasers and Electro-Optics Pacific Rim (CLEO-PR) (01-07-2017)“…We propose an ultrafast all optical NOR gate for 160 Gb/s return-to-zero Gaussian data signals using a single quantum-dot semiconductor optical amplifier…”
Get full text
Conference Proceeding -
14
Fixed-symbols-based synchronization for insertion/deletion/substitution channels
Published in 2016 International Symposium on Information Theory and Its Applications (ISITA) (01-10-2016)“…We investigate a synchronization method for channels that are impaired by insertion, deletion, and substitution (IDS) errors and include outer low-density…”
Get full text
Conference Proceeding -
15
An iterative decoding algorithm for rate-compatible punctured low-density parity-check codes of high coding rates
Published in 2010 International Symposium On Information Theory & Its Applications (01-10-2010)“…An iterative decoding algorithm of rate-compatible punctured low-density parity-check (RCP-LDPC) codes of high coding rates is developed. This algorithm…”
Get full text
Conference Proceeding -
16
LLR calculation for iterative decoding on fading channels using Padé approximation
Published in 2012 International Conference on Wireless Communications and Signal Processing (WCSP) (01-10-2012)“…In this paper, approximate calculation of channel log likelihood ratio (LLR) for wireless channels using Padé approximation is devised. Due to the lack of…”
Get full text
Conference Proceeding -
17
On the capacity of fingerprinting codes against unknown size of colluders
Published in 2011 7th International Conference on Information Assurance and Security (IAS) (01-12-2011)“…In this paper, a new attack model in which the number of colluders are distributed according to a certain probability distribution is introduced. Two classes…”
Get full text
Conference Proceeding