Skip to main content

Showing 1–19 of 19 results for author: Nozaki, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.10924  [pdf, ps, other

    cs.IT

    Decoding Algorithm Correcting Single-Insertion Plus Single-Deletion for Non-binary Quantum Codes

    Authors: Ken Nakamura, Takayuki Nozaki

    Abstract: In this paper, we assume an error such that a single insertion occurs and then a single deletion occurs. Under such an error model, this paper provides a decoding algorithm for non-binary quantum codes constructed by Matsumoto and Hagiwara.

    Submitted 17 September, 2024; originally announced September 2024.

    Comments: 6 pages, submitted to ISITA 2024

  2. arXiv:2103.01560  [pdf, other

    cs.IT

    Efficient Encoding Algorithm of Binary and Non-Binary LDPC Codes Using Block Triangulation

    Authors: Yuta Iketo, Takayuki Nozaki

    Abstract: We propose an efficient encoding algorithm for the binary and non-binary low-density parity-check codes. This algorithm transforms the parity part of the parity-check matrix into a block triangular matrix with low weight diagonal submatrices by row and column permutations in the preprocessing stage. This algorithm determines the parity part of a codeword by block back-substitution to reduce the en… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

    Comments: 10 pages, 10 figures, 3 tables, submitted to IEICE trans. Fundamentals

  3. arXiv:2102.00764  [pdf, ps, other

    cs.IT

    Distance Enumerators for Number-Theoretic Codes

    Authors: Takayuki Nozaki

    Abstract: The number-theoretic codes are a class of codes defined by single or multiple congruences and are mainly used for correcting insertion and deletion errors. Since the number-theoretic codes are generally non-linear, the analysis method for such codes is not established enough. The distance enumerator of a code is a unary polynomial whose $i$th coefficient gives the number of the pairs of codewords… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

    Comments: 7 pages, submitted to IEEE ISIT 2021

  4. arXiv:2012.13536  [pdf, other

    cs.IT

    Construction and Encoding Algorithm for Maximum Run-Length Limited Single Insertion/Deletion Correcting Code

    Authors: Reona Takemoto, Takayuki Nozaki

    Abstract: Maximum run-length limited codes are constraint codes used in communication and data storage systems. Insertion/deletion correcting codes correct insertion or deletion errors caused in transmitted sequences and are used for combating synchronization errors. This paper investigates the maximum run-length limited single insertion/deletion correcting (RLL-SIDC) codes. More precisely, we construct eff… ▽ More

    Submitted 25 December, 2020; originally announced December 2020.

    Comments: 8 pages, 3 figures, 7 tables, submitted to IEICE transaction on Fundamentals

  5. arXiv:2010.08075  [pdf

    eess.SY cs.RO

    Stability and Robustness of the Disturbance Observer-based Motion Control Systems in Discrete-Time Domain

    Authors: Emre Sariyildiz, Satoshi Hangai, Tarik Uzunovic, Takahiro Nozaki, Kouhei Ohnishi

    Abstract: This paper analyses the robust stability and performance of the Disturbance Observer- (DOb-) based digital motion control systems in discrete-time domain. It is shown that the phase margin and the robustness of the digital motion controller can be directly adjusted by tuning the nominal plant model and the bandwidth of the observer. However, they have upper and lower bounds due to robust stability… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

    Comments: 11 pages, 17 figures

    Journal ref: IEEE/ASME Transactions on Mechatronics, 2020

  6. Weight Enumerators and Cardinalities for Number-Theoretic Codes

    Authors: Takayuki Nozaki

    Abstract: The number-theoretic codes are a class of codes defined by single or multiple congruences. These codes are mainly used for correcting insertion and deletion errors, and for correcting asymmetric errors. This paper presents a formula for a generalization of the complete weight enumerator for the number-theoretic codes. This formula allows us to derive the weight enumerators and cardinalities for th… ▽ More

    Submitted 24 October, 2022; v1 submitted 16 January, 2020; originally announced January 2020.

    Comments: 9 pages, accepted to IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, vol. 68, no. 11, pp. 7165-7173, Nov. 2022

  7. A Stability Analysis for the Acceleration-based Robust Position Control of Robot Manipulators via Disturbance Observer

    Authors: Emre Sariyildiz, Hiromu Sekiguchi, Takahiro Nozaki, Barkan Ugurlu, Kouhei Ohnishi

    Abstract: This paper proposes a new nonlinear stability analysis for the acceleration-based robust position control of robot manipulators by using Disturbance Observer (DOb). It is shown that if the nominal inertia matrix is properly tuned in the design of DOb, then the position error asymptotically goes to zero in regulation control and is uniformly ultimately bounded in trajectory tracking control. As the… ▽ More

    Submitted 19 February, 2019; originally announced February 2019.

    Comments: 9 pages, 9 figures, Journal

    Journal ref: IEEE/ASME Transactions On Mechatronics, Vol. 23, No. 5, October 2018

  8. arXiv:1804.05543  [pdf, other

    cs.IT

    Efficient Scheduling of Serial Iterative Decoding for Zigzag Decodable Fountain Codes

    Authors: Yoshihiro Murayama, Takayuki Nozaki

    Abstract: Fountain codes are erasure correcting codes realizing reliable communication systems for the multicast on the Internet. The zigzag decodable fountain (ZDF) code is one of generalization of the Raptor code, i.e, applying shift operation to generate the output packets. The ZDF code is decoded by a two-stage iterative decoding algorithm, which combines the packet-wise peeling algorithm and the bit-wi… ▽ More

    Submitted 16 April, 2018; originally announced April 2018.

    Comments: 5 pages, 5 figures, submitted to ISITA 2018

  9. arXiv:1804.04835  [pdf, other

    cs.IT

    Shifted Coded Slotted ALOHA

    Authors: Tomokazu Emoto, Takayuki Nozaki

    Abstract: The random access scheme is a fundamental scenario in which users transmit through a shared channel and cannot coordinate each other. In recent years, successive interference cancellation (SIC) was introduced into the random access scheme. It is possible to decode transmitted packets using collided packets by the SIC. The coded slotted ALOHA (CSA) is a random access scheme using the SIC. The CSA e… ▽ More

    Submitted 13 April, 2018; originally announced April 2018.

    Comments: 5 pages, 7 figures, submitted to ISITA 2018

  10. Erasure Correcting Codes by Using Shift Operation and Exclusive OR

    Authors: Yuta Hanaki, Takayuki Nozaki

    Abstract: This paper proposes an erasure correcting code and its systematic form for the distributed storage system. The proposed codes are encoded by exclusive OR and bit-level shift operation. By the shift operation, the encoded packets are slightly longer than the source packets. This paper evaluates the extra length of encoded packets, called overhead, and shows that the proposed codes have smalle… ▽ More

    Submitted 13 April, 2018; originally announced April 2018.

    Comments: 6 pages, 1 figure, 3 tables, submitted to ISITA 2018

  11. arXiv:1804.04824  [pdf, other

    cs.IT

    An Improvement of Non-binary Code Correcting Single b-Burst of Insertions or Deletions

    Authors: Toyohiko Saeki, Takayuki Nozaki

    Abstract: This paper constructs a non-binary code correcting a single $b$-burst of insertions or deletions with a large cardinality. This paper also proposes a decoding algorithm of this code and evaluates a lower bound of the cardinality of this code. Moreover, we evaluate an asymptotic upper bound on the cardinality of codes which correct a single burst of insertions or deletions.

    Submitted 9 August, 2018; v1 submitted 13 April, 2018; originally announced April 2018.

    Comments: 7 pages, accepted to ISITA 2018

  12. arXiv:1701.06770  [pdf, ps, other

    cs.IT

    Analysis of Breakdown Probability of Wireless Sensor Networks with Unreliable Relay Nodes

    Authors: Takayuki Nozaki, Takafumi Nakano, Tadashi Wadayama

    Abstract: In the present paper, we derive an upper bound of the average network breakdown probability of packet networks with unreliable relay nodes. We here assume that relay nodes get independently broken with a given node breakdown probability. A survivor graph is the induced subgraph obtained by removing the broken relay nodes and their connecting edges from the original graph. If the survivor network i… ▽ More

    Submitted 24 January, 2017; originally announced January 2017.

    Comments: 5 pages, 4 figures, submitted to ISIT2017

  13. arXiv:1606.01660  [pdf, ps, other

    cs.IT

    Cutsize Distributions of Balanced Hypergraph Bipartitions for Random Hypergraphs

    Authors: Takayuki Nozaki

    Abstract: In a previous work, we presented a parallel encoding algorithm for low-density parity-check (LDPC) codes by partitioning hypergraph representation for the LDPC codes. The aim of this research is to analyze the processing time of this encoding algorithm. This paper clarifies that the processing time of the encoding algorithm depends on the minimum cutsize of balanced hypergraph partitions. Moreover… ▽ More

    Submitted 6 June, 2016; originally announced June 2016.

    Comments: 5 pages, 2 figures, to appear at ISIT 2016

  14. Zigzag Decodable Fountain Codes

    Authors: Takayuki Nozaki

    Abstract: This paper proposes a fountain coding system which has lower space decoding complexity and lower decoding erasure rate than the Raptor coding systems. The main idea of the proposed fountain code is employing shift and exclusive OR to generate the output packets. This technique is known as the zigzag decodable code, which is efficiently decoded by the zigzag decoder. In other words, we propose a fo… ▽ More

    Submitted 14 October, 2016; v1 submitted 30 May, 2016; originally announced May 2016.

    Comments: 11 pages, 15 figures, submitted to IEICETransactions, Oct. 2016

    Journal ref: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Vol.E100-A No.8 (2017) pp.1693-1704

  15. Weight Distribution for Non-binary Cluster LDPC Code Ensemble

    Authors: Takayuki Nozaki, Masaki Maehara, Kenta Kasai, Kohichi Sakaniwa

    Abstract: In this paper, we derive the average weight distributions for the irregular non-binary cluster low-density parity-check (LDPC) code ensembles. Moreover, we give the exponential growth rate of the average weight distribution in the limit of large code length. We show that there exist $(2,d_c)$-regular non-binary cluster LDPC code ensembles whose normalized typical minimum distances are strictly pos… ▽ More

    Submitted 16 May, 2013; v1 submitted 11 May, 2013; originally announced May 2013.

    Comments: 12pages, 6 figures, To be presented in ISIT2013, Submitted to IEICE Trans. Fundamentals

  16. arXiv:1202.0979  [pdf, ps, other

    cs.IT

    Spatially-Coupled Binary MacKay-Neal Codes for Channels with Non-Binary Inputs and Affine Subspace Outputs

    Authors: Kenta Kasai, Takayuki Nozaki, Kohichi Sakaniwa

    Abstract: We study LDPC codes for the channel with $2^m$-ary input $\underline{x}\in \mathbb{F}_2^m$ and output $\underline{y}=\underline{x}+\underline{z}\in \mathbb{F}_2^m$. The receiver knows a subspace $V\subset \mathbb{F}_2^m$ from which $\underline{z}=\underline{y}-\underline{x}$ is uniformly chosen. Or equivalently, the receiver receives an affine subspace $\underline{y}-V$ where $\underline{x}$ lies.… ▽ More

    Submitted 20 May, 2012; v1 submitted 5 February, 2012; originally announced February 2012.

  17. Analysis of Error Floors of Non-Binary LDPC Codes over MBIOS Channel

    Authors: Takayuki Nozaki, Kenta Kasai, Kohichi Sakaniwa

    Abstract: In this paper, we investigate the error floors of non-binary low-density parity-check (LDPC) codes transmitted over the memoryless binary-input output-symmetric (MBIOS) channels. We provide a necessary and sufficient condition for successful decoding of zigzag cycle codes over the MBIOS channel by the belief propagation decoder. We consider an expurgated ensemble of non-binary LDPC codes by using… ▽ More

    Submitted 10 June, 2011; originally announced June 2011.

    Comments: 15 pages, 9 figures, The material in this paper was presented in part at IEEE International Conference on Communications, submitted in IEICE transaction fundamentals

  18. Analytical Solution of Covariance Evolution for Irregular LDPC Codes

    Authors: Takayuki Nozaki, Kenta Kasai, Kohichi Sakaniwa

    Abstract: A scaling law developed by Amraoui et al. is a powerful technique to estimate the block error probability of finite length low-density parity-check (LDPC) codes. Solving a system of differential equations called covariance evolution is a method to obtain the scaling parameter. However, the covariance evolution has not been analytically solved. In this paper, we present the analytical solution of t… ▽ More

    Submitted 10 June, 2011; v1 submitted 7 November, 2010; originally announced November 2010.

    Comments: 13pages, submitted to IEEE trans. on information theory, January 2010

    Journal ref: IEEE Transactions on Information Theory (Volume:58, Issue: 7, pp.4770 - 4780, July 2012)

  19. arXiv:0901.2838  [pdf, ps, other

    cs.IT

    Analytical Solution of Covariance Evolution for Regular LDPC Codes

    Authors: Takayuki Nozaki, Kenta Kasai, Kohichi Sakaniwa

    Abstract: The covariance evolution is a system of differential equations with respect to the covariance of the number of edges connecting to the nodes of each residual degree. Solving the covariance evolution, we can derive distributions of the number of check nodes of residual degree 1, which helps us to estimate the block error probability for finite-length LDPC code. Amraoui et al.\ resorted to numeric… ▽ More

    Submitted 19 January, 2009; originally announced January 2009.

    Comments: 5 pages, 3 figures, submitted to ISIT2009