Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shuichi Itoh is active.

Publication


Featured researches published by Shuichi Itoh.


IEEE Transactions on Biomedical Engineering | 1998

A wavelet transform-based ECG compression method guaranteeing desired signal quality

Jie Chen; Shuichi Itoh

This paper presents a new electrocardiogram (ECG) compression method based on orthonormal wavelet transform and an adaptive quantization strategy, by which a predetermined percent root mean square difference (PRD) can be guaranteed with high compression ratio and low implementation complexity.


international symposium on information theory | 1997

Irregular sampling theorems for wavelet subspaces

Wen Chen; Shuichi Itoh; Junji Shiki

From the Paley-Wiener 1/4-theorem, the finite energy signal f(t) can be reconstructed from its irregularly sampled values f(k+/spl delta//sub /spl kappa//) if f(t) is band-limited and sup/sub /spl kappa//|/spl delta//sub /spl kappa//|<1/4. We consider the signals in wavelet subspaces and wish to recover the signals from its irregular samples by using scaling functions. Then the method of estimating the upper bound of sup/sub /spl kappa//|/spl delta//sub /spl kappa//| such that the irregularly sampled signals can be recovered is very important. Following the work done by Liu and Walter (see J. Fourier Anal. Appl., vol.2, no.2, p.181-9, 1995), we present an algorithm which can estimate a proper upper bound of sup/sub /spl kappa//|/spl delta//sub /spl kappa//|. Compared to Paley-Wiener 1/4-theorem, this theorem can relax the upper bound for sampling in some wavelet subspaces.


IEEE Transactions on Information Theory | 2002

On sampling in shift invariant spaces

Wen Chen; Shuichi Itoh; Junji Shiki

A necessary and sufficient condition for sampling in the general framework of shift invariant spaces is derived. Then this result is applied, respectively, to the regular sampling and the perturbation of regular sampling in shift invariant spaces. A simple necessary and sufficient condition for regular sampling in shift invariant spaces is attained. Furthermore, an improved estimate for the perturbation is derived for the perturbation of regular sampling in shift invariant spaces. The derived estimate is easy to calculate, and shown to be optimal in some shift invariant spaces. The algorithm to calculate the reconstruction frame is also presented.


Computer Networks | 2007

A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation

Alireza Nemaney Pour; Kazuya Kumekawa; Toshihiko Kato; Shuichi Itoh

This paper proposes an efficient protocol and associate algorithm for group key management in secure multicast. This protocol is based on a hierarchy approach in which the group is logically divided into subgroups. The group key is organized using member secrets assigned to each member and server secrets assigned to each subgroup, and the inverse value of the member secrets are also used to manage the group key when a member leaves. In this case, each member in a single subgroup needs to store the inverse values of the other members in that subgroup with the exception of its own. When a member joins the group, after updating the previous group key in the server, the new key is sent to all existing group members, and the inverse value of the new member is sent to subgroup members (where there is a join), by exploiting IP multicast. Most importantly, the server just sends the inverse value of the leaving member to the subgroups when a member leaves. Then, the group key is updated by each remaining member in the subgroups by using that inverse value. Consequently, the benefits are two-fold. First, only one key needs to be generated by the server at each event. Second, not only the computational overhead is reduced but also new key information can be multicast to all members simultaneously. This paper describes the details of our novel protocol and the related algorithm.


IEEE Transactions on Communications | 2009

A coded convolutional spreading CDMA system with turbo equalization for downlink transmission over a frequency selective fading channel

Nalin S. Weerasinghe; Suguru Watanabe; Takeshi Hashimoto; Shuichi Itoh

In this paper, a coded convolutional spreading codedivision multiaccess with cyclic prefix (CS-CDMA/CP) system in conjunction with iterative receivers is proposed for synchronous downlink transmission over frequency selective fading channels and its performance is compared with the uncoded CS-CDMA/CP employing maximum-likelihood sequence estimation (MLSE) receiver as well as with the conventional coded direct sequence CDMA (DS-CDMA) employing (maximal ratio combining-) MRC-RAKE. Contrary to the uncoded CSCDMA/ CP system which suffers from performance degradation at low signal-to-noise power ratios (SNRs), it is demonstrated that the proposed scheme can attain almost the full path diversity gain over all SNRs with single-user complexity. Compared with the coded DS-CDMA system with single-user receivers, the proposed system is free from multiuser interference (MUI) whenever the multipath delay of the channel does not exceed the designed maximum delay. It is also demonstrated, moreover, that the proposed system shows a robust performance even if the channel length exceed the designed maximum delay slightly. Because of the subblock structure of CS-CDMA/CP, the proposed system can utilize time-diversity effects, when the channel subjects fast fading, and this greatly improves the resultant performance. Finally, it is shown that the receiver complexity of the proposed system is compared quite favorably with the iterative multiuser receivers for coded DS-CDMA systems of comparable performance.


Electronics and Communications in Japan Part Iii-fundamental Electronic Science | 1999

WAVELET SAMPLING THEOREMS FOR IRREGULARLY SAMPLED SIGNALS

Wen Chen; Shuichi Itoh; Junji Shiki

SUMMARY A formula for recovering the original signal from itsirregularly sampled values using wavelets, which extendsthe Walter sampling theorem to the irregular sampling caseand generalizes the PaleyŒWiener 1/4-Theorem by remov-ing the symmetricity constraint for sampling, is pre-sented.a 1999 Scripta Technica, Electron Comm Jpn Pt 3,82(5): 65Œ71, 1999Key words: Wavelet; sampling theorem; scalingfunction; orthogonality; biorthogonality. 1. Introduction In digital signal and image processing, digital com-munications, and so forth, a continuous signal is usuallyrepresented and processed by using its discrete samples.How, then, are we to reconstruct the original signal from itsdiscrete samples? The classical Shannon sampling theoremgives the following formula for band-limited finite energysignals.For a finite energy s-band continuous signalf( t), 2t ˛ R , that is, supp f^(w) I [- s , s] and f ˛ L (R), it canbe recovered by the formulawhere f^ is the Fourier transform of f(t) defined byIf we let s =


international conference on its telecommunications | 2006

A Dense Mode Ad hoc Multicast Routing Protocol Constructing Shortest Path Trees with Low Control Overhead

Tsutomu Kozaka; Toshihiko Kato; Shuichi Itoh; Yoshiyori Urano

In recent years, an ad hoc network is paid to attention widely, and many routing protocols are studied actively not only for unicasting but also for multicasting. Ad hoc multicast communication can be applied to a many-to-many conference among vehicles. Here, it is required to reduce the number of hops in the multicast data delivery and reduce the control message overhead, in order to save wireless channel bandwidth. From this requirement, it is considered that the dense mode multicast routing with low control overhead is appropriate for ad hoc many-to-many conference application. In this paper, we propose a new ad hoc multicast routing protocol, which constructs the shortest path tree efficiently and guarantees the operation of dense mode such as the broadcast & prune. This paper describes the result of designing our multicast routing protocol and that of performance evaluation in terms of control message overhead


international symposium on information theory | 1995

An algorithm for designing a pattern classifier by using MDL criterion

Hideaki Tsuchiya; Shuichi Itoh; Takeshi Hashimoto

The algorithm for designing a pattern classifier, which uses MDL criterion and a binary data structure, is proposed. The algorithm gives a partitioning of the space of the K-dimensional attribute and gives an estimated probability model for this partitioning. The volume of bins in this partitioning is asymptotically upper bounded by /spl Oscr/((log N/N)/sup K/(K+2/)/sup )/ for large N in probability, where N is the length of training sequence. The redundancy of the code length and the divergence of the estimated model are asymptotically upper bounded by /spl Oscr/(K(log N/N)/sup 2/(K+2/)/sup )/. The classification error is asymptotically upper bounded by /spl Oscr/(K/sup 1/2/(log N/N)/sup 1/(K+2/)/sup )/.


advances in mobile multimedia | 2008

Method of predicting number of on-demand video requests using time series data for video cache system

Hiroyuki Kimiyama; Shuichi Itoh

We propose a method of predicting the number of requests for video titles in an on-demand video delivery system considering their time dependency. To handle many heterogeneous video requests in a video streaming delivery network system using video servers, it is effective to introduce video caching systems in the network system. For the cache system design in video delivery network systems, an effective cache algorithm for predicting how many requests will occur in the future is needed. Since almost all such proposed algorithms are for WWW systems, they do not consider the time dependency of the number of requests, so they are not applicable to a video system with time-dependent requests because a customer in the system watches one video title just one time. In our method, the number of requests is represented by a function of time by considering how a customer obtains information about a video and requests it and by considering that a customer requests each video only once. We have developed a method of calculating the coefficients of the function from the series of the number of requests and for estimating the number of requests in the future. We evaluated the convergence and calculation time. The results show that the calculations converge and the calculation time is 31 ms. They also show that the calculation cost is acceptable for a general video delivery system.


workshop on information technologies and systems | 1994

Wavelet transform based ECG data compression with desired reconstruction signal quality

Jie Chen; Shuichi Itoh; Takeshi Hashimoto

This paper proposes a new coding strategy by which the desired quality of reproduced signal can be guaranteed with the minimum cost of coding rate. The idea was successfully introduced to the DOWT-based coding system for the ECG compression application.

Collaboration


Dive into the Shuichi Itoh's collaboration.

Top Co-Authors

Avatar

Toshihiko Kato

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar

Wen Chen

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Takeshi Hashimoto

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar

Jie Chen

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Junji Shiki

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar

Kazuya Kumekawa

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar

Hideaki Tsuchiya

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar

Alireza Nemaney Pour

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge