Curriculum Vitaes

Shibuya Tomoharu

  (澁谷 智治)

Profile Information

Affiliation
Professor, Faculty of Science and Technology, Department of Information and Communication Sciences, Sophia University
(Concurrent)Dean of the Faculty of Science and Technology
Degree
博士(工学)(Apr, 1999, 東京工業大学)

Researcher number
20262280
J-GLOBAL ID
200901097688266540
researchmap Member ID
1000181747

External link

1991- Applications and fundamental aspects on the error correcting codes, especially on the parameters of algebraic codes
2001- On the performance of LDPC codes and their decoding algorithm
2008- On the convergence behavior of the iterative decoding
2010- Efficient encoding algorithm for linear codes and related topics
Coding for Non-volatile memory
2011- Construction of quantum error correcting codes

On the convergence bihavior of the iterative decoding

(Subject of research)
Error Correcting Codes with Iterative Decoding
Researches in the Parameters of Algebraic Codes


Papers

 63
  • Daisuke Hibino, Tomoharu Shibuya
    122(427) 325-330, Mar, 2023  Last authorCorresponding author
  • Mariko FUJII, Tomoharu SHIBUYA
    IEICE TRANSACTIONS on Information and Systems, E.103-D(1) 11-24, Jan 1, 2020  Peer-reviewed
  • Tomoharu Shibuya, Takeru Sudo
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E100A(12) 2558-2571, Dec 1, 2017  Peer-reviewed
    In this paper, we propose a group theoretic representation suitable for the rank-modulation (RM) scheme over the multi-cell ranking presented by En Gad et al. By introducing an action of the group of all permutation matrices on the set of all permutations, the scheme is clearly reformulated. Moreover, weintroduce the concept ofr-dominating sets over the multi-cell ranking, which is a generalization of conventional dominating sets, inthe design of rank-modulation rewriting codes. The concept together with the proposed group theoretic representation yields an explicit formula of an upper bound on the size of the set of messages that can be stored in the memory by using RM rewriting codes over multi-cell ranking. This bound enables us to consider the trade-off between the size of the storable message set and the rewriting cost more closely. We also provide a concrete example of RM rewriting code that is not available by conventional approaches and whose size of the storable message set can not be achieved by conventional codes.
  • Tomoharu Shibuya, Takeru Sudo
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 131-135, 2016  
    In this paper, we study rank-modulation (RM) rewriting codes based on dominating sets. By introducing a special class of dominating sets in a construction of RM rewriting codes and employing the notion of a group action in an analysis of those codes, we succeeded to construct. RM rewriting codes based on the dominating sets that maximize the amount of stored data under the limit of rewriting cost for flash memories with 4 and 5 cells.
  • Keisuke Kodaira, Mihoko Wada, Tomoharu Shibuya
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E97A(11) 2247-2253, Nov, 2014  Peer-reviewed
    The amplitude damping (AD) quantum channel is one of the models describing evolution of quantum states. The construction of quantum error correcting codes for the AD channel based on classical codes has been presented, and Shor et al. proposed a class of classical codes over F-3 which are efficiently applicable to this construction. In this study, we expand Shor's construction to that over F-7, and succeeded to construct an AD code that has better parameters than AD codes constructed by Shor et al.

Misc.

 44
  • Shibuya Tomoharu, Sudo Takeru
    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 116(33) 115-120, May 19, 2016  
  • Shibuya Tomoharu, Sudo Takeru
    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 116(34) 115-120, May 19, 2016  
  • Kanbayashi Yuya, Shibuya Tomoharu
    Technical report of IEICE. ISEC, 112(461) 113-118, Mar 7, 2013  
    Rank Modulation code is a recoding code expressing information by using the mutual relation between the level of electric charge of each cell constituting a flash memory. Compressed encoding is one of the rank modulation encodings that employ the push up operation to realize a state transition of memory. In this study, we investigate a code constructions based on the dominating set of a transition graph, which is known as one of techniques to inclease the capacity of memory and decrease frequency of the occurrence of the block erasure in the compressed encoding. As a result, we propose a new algorithm to construct a dominating set. Moreover, we show a sufficient condition for the proposed algorithm to generate a minimal dominating set. In addition, we give a concretely an example of minimal dominating set for a memory constituting 5 cells.
  • IHARA Hiroyuki, SHIBUYA Tomoharu
    IEICE technical report. Information theory, 112(124) 85-89, Jul 12, 2012  
    Spatially coupled (SC) low-density parity-check (LDPC) codes are denned by bipartite graphs that are obtained by assembling prototype graphs. The combination and connection of prototype graphs are designated by specifying some parameters, and Kudekar et al. showed that BP threshold of the ensemble of SC LDPC codes agrees with MAP threshold of the ensemble of regular LDPC codes when those parameters are grown up so that the code length tends to infinity. When we design SC LDPC codes with practical code length, however, it is not clear how to set those parameters to enhance the performance of SC LDPC codes. In this paper, we provide the result of numerical experiments that suggest the dependence of error performance of SC LDPC codes over BEC on their design parameters.
  • SHIBUYA Tomoharu
    IEICE technical report, 111(180) 21-26, Aug 18, 2011  
    It is well known that LDPC codes can exhibit excellent performance by iterative decoding with O(n) computational complexity. As for their encoding, however, no algorithm has been developed that can be executed with computation less than O(n^2). Therefore, it has been one of the most important research subject to reduce computational complexity of encoding of LDPC codes. In this paper, we will survey the conventional approaches to reduce computational complexity of encoding of LDPC codes. Then the encoding method of LDPC codes that can be executed with O(n) computation will be introduced.
  • SHIBUYA Tomoharu
    IEICE Technical Report, 110(205) 69-74, Sep 14, 2010  
    Efficient algorithms to solve a system of linear equations have been extensively and deeply investigated in a large number of researches. Among them, the block-triangularization is one of the well-know approaches effective for linear systems defined by matrices with particular characteristics, especially by sparse matrices. In this paper, we propose an encoding algorithm that can be applied to arbitrary linear codes over any finite field and executed with complexity O (w(H)) where w(H) denotes the number of non-zero elements of the parity check matrix H under consideration. By giving our attention to the fact that encoding of a linear code is equivalent to solving a system of linear equations, we propose an encoding algorithm based on the block-triangularization of the part of parity check matrices combining rearrangement of subblocks of them. As the result, any linear codes defined by sparse parity check matrices, such as LDPC codes, can be encoded by the proposed algorithm with complexity O(n) where n denotes the code length.
  • SHIBUYA Tomoharu, NAKADE Keita
    IEICE technical report, 109(444) 147-151, Feb 25, 2010  
    Recently, Haley and Grant introduced the concept of reversible codes - a class of linear codes encodable by the iterative message-passing algorithm based on the Jacobi method over F_2. They also developed a concrete procedure to construct parity check matrices of reversible codes by utilizing some properties of circulant matrices which is described in terms of polynomials over F_2. In this paper, we investigate the size of circulant matrices considered in the Haley's procedure and clarify the necessary and sufficient condition on the size for which reversible codes based on circulant matrices exist. This condition tells us that no reversible codes based on circulant matrices exist other than those constructed by the Haley's procedure.
  • SHIBUYA Tomoharu, NAKADE Keita
    IEICE technical report, 109(446) 147-151, Feb 25, 2010  
    Recently, Haley and Grant introduced the concept of reversible codes - a class of linear codes encodable by the iterative message-passing algorithm based on the Jacobi method over F_2. They also developed a concrete procedure to construct parity check matrices of reversible codes by utilizing some properties of circulant matrices which is described in terms of polynomials over F_2. In this paper, we investigate the size of circulant matrices considered in the Haley's procedure and clarify the necessary and sufficient condition on the size for which reversible codes based on circulant matrices exist. This condition tells us that no reversible codes based on circulant matrices exist other than those constructed by the Haley's procedure.
  • Takayuki Nozaki, Kenta Kasai, Tomoharu Shibuya, Kohichi Sakaniwa
    IEICE Technical Report, 102(202) 37-42, Sep, 2009  
  • SHIBUYA Tomoharu
    IEICE technical report, 108(474) 441-446, Mar 2, 2009  
    Recently, Mooij et al. proposed sufficient conditions for convergence of the sum-product algorithm, which was stated as the upper bound for the spectral radius of a matrix defined by a probability distribution under consideration. In this paper, we adapt Mooij's sufficient conditions to the decoding problem, and derive a sufficient condition for convergence of the sum-product decoding.
  • SHIBUYA Tomoharu
    IEICE technical report, 108(473) 441-446, Mar 2, 2009  
    Recently, Mooij et al. proposed sufficient conditions for convergence of the sum-product algorithm, which was stated as the upper bound for the spectral radius of a matrix defined by a probability distribution under consideration. In this paper, we adapt Mooij's sufficient conditions to the decoding problem, and derive a sufficient condition for convergence of the sum-product decoding.
  • MUTAGUCHI Eri, KASAI Kenta, SHIBUYA Tomoharu, SAKANIWA Kohichi
    IEICE technical report, 108(202) 31-36, Sep 4, 2008  
    Montanari constructed lower bounds on the conditional entropy of the transmitted message using Multi-Poisson ensemble. In case of BEC, this bounds are identical to the conditional entropy of the transmitted message by the analysis of EXIT function by Measson. We will consider the extention of this method to LDPC codes over GF (4).
  • AWANO Tomoharu, KASAI Kenta, SHIBUYA Tomoharu, SAKANIWA Kohichi
    IEICE technical report, 108(202) 99-104, Sep 4, 2008  
    Multi-edge type LDPC codes are introduced by Richardson and Urbanke, and they show examples of their ensembles have better performance than other known ensembles. Orlitsky et al. derived the condition for irregular LDPC code ensembles with minimum distance linearly increasing in code length. Nakasendo et al. derived the condition that code ensembles have exponentially decreasing small linear weight codewords for two-edge type LDPC code ensembles which is simple example of multi-edge type LDPC code ensembles. In this letter, we derive the condition for multi-edge type LDPC code ensembles with exponentially decreasing small linear weight codewords.
  • Takayuki Nozaki, Kenta Kasai, Kohichi Sakaniwa
    第30回 情報理論とその応用シンポジウム予稿集, 774-779, Nov, 2007  
  • MIYAMOTO Shinya, KASAI Kenta, SHIBUYA Tomoharu, SAKANIWA Kohichi
    29(2) 457-460, Nov 28, 2006  
  • ITSUI Takayuki, KASAI Kenta, IKEGAYA Ryoji, SHIBUYA Tomoharu, SAKANIWA Kohichi
    29(2) 461-464, Nov 28, 2006  
  • ITSUI Takayuki, KASAI Kenta, IKEGAYA Ryoji, SHIBUYA Tomoharu, SAKANIWA Kohichi
    IEICE technical report, 105(662) 147-151, Mar 17, 2006  
    The support weight distribution of a code is the number of unique subspaces of the code with specified dimension and support weight. The extrinsic information transfer (EXIT) function on erasure channels is exactly described by the support weight distribution. In this paper, we formulate the average second support weight distribution of regular LDPC code ensembles.
  • IKEGAYA Ryoji, KASAI Kenta, SHIBUYA Tomoharu, SAKANIWA Kohichi
    Proc. 28th Symposium on Information Theory and Its Applications (SITA2005), Nov., 28(1) 115-118, Nov 20, 2005  
  • Kasai Kenta, Miyamoto Shinya, Ichikawa Tomoyuki, Shibuya Tomoharu, Sakaniwa Kohichi
    IEICE technical report. Information theory, 105(84) 43-47, May 19, 2005  
    Jin et al. introduce irregular repeat-accumulate (IRA) codes. IRA codes have a linear-time encoding algorithm. The authors have introduced detailedly represented irregular low-density parity-check code ensembles specified with joint degree distributions between variable nodes and check nodes. In this paper, by using density evolution method [6], we design IRA codes specified with joint degree distributions. Resulting codes have higher thresholds and lower error floors than standard IRA codes.
  • Shibuya Tomoharu
    IEICE technical report. Information theory, 105(84) 37-42, May 19, 2005  
    Since the joint distribution considered in the CCCP decoding presented in the previous work is different from the a posteriori probability considered in the usual sum-product decoding, there is the possibility that the direct comparison of error performance of those decoding algorithms might be unfair. In this paper, we clear up this suspicion by showing that an objective function that is equivalent to the one minimized in the conventional CCCP decoding can be derived from the a posteriori probability distribution treated in the sum-product algorithm. Moreover, we present more efficient implementation of the CCCP decoding.
  • SHIBUYA Tomoharu
    The Journal of the Institute of Electronics, Information and Communication Engineers, 88(4) 253-256, Apr 1, 2005  
  • 渋谷 智治
    数理解析研究所講究録, 1420 206-215, Apr, 2005  
  • SHIMOYAMA Yuji, IKEGAYA Ryoji, KASAI Kenta, SHIBUYA Tomoharu, SAKANIWA Kohichi
    27(1) 9-12, Dec 14, 2004  
  • IKEGAYA Ryoji, KASAI Kenta, SHIMOYAMA Yuji, SHIBUYA Tomoharu, SAKANIWA Kohichi
    27(1) 171-174, Dec 14, 2004  
  • KASAI Kenta, SHIBUYA Tomoharu, SAKANIWA Kohichi
    IEICE Tech. Rep., 104(302) 25-28, Sep 10, 2004  
    Belief Propagation(BP) decoding is equivalent to Maximum a Posteriori(MAP) decoding when the Tanner graph of the code is free of cycles. Performance of BP decoding with Tanner graph with cycle is often not good if the Tanner graph has cycles of length four. Adding redundant parity-checks and puncturing bits, Yedidia et al. transformed high-density parity-check matrices to low-density ones. In this report, we investigate the transformation of parity-check matrices (or equivalently of Tanner graphs) removing cycles of length four in Tanner graphs, which is the special case of Yedidia's transformation. We prove that, when transmission over erasure channels, under the transformation, BP-recoverable erasures are preserved. We show transforming Tanner graph of (7,4,3) Hamming code makes some new BP-recoverable erasures.
  • 渋谷 智治
    数理解析研究所講究録, 1361 80-90, Apr, 2004  
  • SHIMADA Satoshi, KASAI Kenta, SHIBUYA Tomoharu, SAKANIWA Kohichi
    Technical report of IEICE. ISEC, 103(713) 121-126, Mar 9, 2004  
    Richardson et al. showed concentration of the performance of the BP decoder around its average performance in the regular and irregular LDPC code ensemble and that its average performance converges to the performance obtained by density evolution. Furthermore, Kasai et al. presented detailedly represented ensemble and its density evolution in order to look for ensembles which have better threshold than standard irregular ensembles. In this paper, we show concentration of the performance of the BP decoder around its average performance in the detailedly represented ensemble and that its average performance converges to the performance obtained by density evolution.
  • IKEGAYA Ryoji, KASAI Kenta, SHIBUYA Tomoharu, SAKANIWA Kohichi
    26(1) 277-280, Dec 15, 2003  
  • Shibuya Tomoharu
    Proceedings of the Society Conference of IEICE, 2003 "SS-19"-"SS-20", Sep 10, 2003  
  • IKEGAYA Ryoji, KASAI Kenta, SHIBUYA Tomoharu, SAKANIWA Kohichi
    IEICE technical report. Information theory, 103(215) 19-24, Jul 16, 2003  
    Burshtein and Miller provided an asymptotic estimation of the exponent of the average weight distribution for conventional irregular LDPC ensembles defined by Richardson et al., which are based on bipartite graphs. This estimation is derived by the asymptotic estimation of the exponent of a coefficient in multinomials with non-negative coefficients. In this paper, we employ Burshtein's method to provide an asymptotic estimation of the exponent of the average weight distribution for detailedly represented irregular LDPC ensembles. Moreover, we present numerical examples which show the relation between the exponent of the average weight distribution for conventional and detailedly represented ensemble, and provide an example of code ensemble which has larger typical minimum distance than given conventional ensemble has.
  • SHIBUYA Tomoharu, HARADA Ken, TOHYAMA Ryosuke, SAKANIWA Koichi
    IEICE technical report. Information theory, 103(99) 35-40, May 23, 2003  
    It is well known that a decoding algorithm based on sum-product algorithm requires a little computation to give extremely good decoding performance. A conventional CCCP-based decoding algorithm is expected to outperform sum-product decoding algorithm. However, it has huge computational complexity as opposed to sum-product algorithm. In our report, we propose a new CCCP-based decoding algorithm whose computational complexity is comparable to that of sum-product algorithm. We also show by numerical simulations that the decoding performance of the proposed algorithm is better than that of sum-product algorithm for an LDPC code with relatively short length.
  • KASAI Kenta, SHIBUYA Tomoharu, SAKANIWA Kohichi
    Technical report of IEICE. ISEC, 102(743) 149-154, Mar 19, 2003  
    We have proposed a low-density parity-check code ensemble C_1(η,π) and developed its density evolution. The density evolution for C_1(η,π) required a conjecture which was supported empirically. In this report we simplify the conjecture to derive the density evolution for C_1(η,π). Further, we propose a subensemble C_2(η,π) ⊂ C_1(η,π) whose density evolution does not require any conjecture.
  • ONIKUBO Masatoshi, SHIBUYA Tomoharu, SAKANIWA Kohichi
    IEICE technical report. Information theory, 102(198) 13-18, Jul 9, 2002  
    In this paper, we investigate the tightness of Tanner's lower bound for the minimum distance of regular low-density parity-check (LDPC) codes. More precisely, we introduce two classes of regular LDPC codes based on a combinatorial design known as Steiner system and we formulate Tanner's lower bound for these codes. Moreover, we point out that one of these two classes of codes contains EG-LDPC codes and show that Tanner's lower bound agrees with BCH bound for EG-LDPC codes.
  • SHIBUYA Tomoharu, SAKANIWA Kohichi
    24(1) 3-6, Dec 4, 2001  
  • Shibuya Tomoharu, Sakaniwa Kohichi
    Technical report of IEICE. SST, 100(694) 15-22, Mar 16, 2001  
  • OISHI Masakuni, MATSUMOTO Ryutaroh, SHIBUYA Tomoharu, SAKANIWA Kohichi
    Technical report of IEICE. SST, 100(694) 7-14, Mar 16, 2001  
  • SHIBUYA Tomoharu
    Proceedings of the IEICE General Conference, 1999 543-544, Mar 8, 1999  
  • HASEGAWA Ryo, SHIBUYA Tomoharu, SAKANIWA Kohichi
    IEICE technical report. Information theory, 98(513) 1-6, Jan 21, 1999  
    The notion of generalized Hamming weights was first introduced by Wei. Since then, lots of authors have investigated generalized Hamming weights and have derived some estimates or true weights for several codes. As for q-ary Reed-Muller(RM)codes, the calculation method of its generalized Hamming weight was developed by Wei for binary(q=2)case and by Heijnen and Pellikaan for any q. Recently, we proposed a lower bound for the generalized Hamming weight which can be applied to arbitrary [n, k]linear code C. Moreover, we defined a parameter, denote by g(C), which can be easily calculated for given code C and we showed that the t-th generalized Hamming weight of code C, denote by d_t(C), is equal to n-k+t for g(C)+1≤t≤k. C is said to be t-th rank MDS(Maximum Distance Separable)if d_t(C)=n-k+t. For a q-ary RM code of order u and m variables, we have derived an explicit formula of g(C)in term of u, m and q. In this paper, we show that for binary RM codes C, g(C)gives a necessary and sufficient condition on t for C to be t-th rank MDS, that is d_t(C)=n-k+t if and only if g(C)+1≤t≤k.
  • OCHI Shunsuke, SHIBUYA Tomoharu, SAKANIWA Kohichi, YAMADA Isao
    IEICE technical report. Information theory, 97(511) 1-6, Jan 27, 1998  
    It has been reported that Turbo-Codes attain the performance close to the Shannon limits. Since then, Turbo-Codes are much attractive to many researchers. But, the decoding delay due to the iterative decoding can not be disregarded. In this study, we propose a new algorithm emulating BCJR algorithm which is employed in the conventional decoder of Turbo-Codes. Since the proposed algorithm is processed in parallel, the decoding delay can be reduced. We also examine by computer simulation the performance of Turbo-Code with the proposed algorithm. Then we show that the proposed algorithm attains the performance almost same as that of the conventional one.
  • SHIBUYA Tomoharu, MIZUTANI Jiro, SAKANIWA Kohichi
    IEICE technical report. Communication systems, 97(471) 23-28, Jan 20, 1998  
    In this paper, the tightness of lower bounds for generalized Hamming weights proposed in is investigated in the case of some algebraic geometric codes. It is shown that g^*&le;g where g^* denotes the parameter which was introduced in to give the lower bound of generalized Hamming weights and g denotes the genus of the curve C_<ab>. This implies that the range for which our lower bound agrees with the true weight is not narrower than the conventional one.
  • SHIBUYA Tomoharu, MIZUTANI Jiro, SAKANIWA Kohichi
    IEICE technical report. Information theory, 96(494) 61-66, Jan 24, 1997  
    As a generalization of conventional algebraic geometric codes, codes constructed on affine algebraic varieties were proposed by S.Miura. He has shown that by introducing a monomial order and a Grobner basis in the code construction, the Feng-Rao designed distance gives a non-trivial lower bound for the minimum distance of the code. In this paper, we give a lower bound for the generalized Hamming weights of linear codes on affine algebraic varieties constructed by Miura's method. We first investigate a kind of linearly dependent relation on the sequence of parity check matrices by using the monomial order and the Grobner basis employed. Then we provide a lower bound for the generalized Hamming weights of the code. Next, by introducing a number g^* which is determined by a given affine algebraic variety, we show that when the order π of generalized Hamming weights is greater than g^*, the proposed lower bound agrees with the true generalized Hamming weights. Finally, we improve the proposed bound for μ>g^* by using the notion of well-behaving pair which was introduced by Feng and Rao.
  • SHIBUYA Tomoharu, SAKANIWA Kohichi
    Proceedings of the IEICE General Conference, 1996 245-245, Mar 11, 1996  
  • KANEKO Akitoshi, GENKO Kazunari, SHIBUYA Tomoharu, YAMADA Isao, SAKANIWA Kohichi
    Proceedings of the IEICE General Conference, 1996 250-250, Mar 11, 1996  

Books and Other Publications

 6

Presentations

 14
  • Daisuke Hibino, Tomoharu Shibuya
    Technical Committee Meeting on Information Theory, Mar 15, 2023
  • Taiyu Kamiyama, Yuta Ugaya, Keisuke Kodaira, Tomoharu Shibuya
    2018 The International Symposium on Information Theory and Its Applications, Oct 28, 2018, Engineering Sciences Society, IEICE
    conventional secret sharing, password protected secret sharing (PPSS) was invented. Recently, Nakahara et al. improved Ogata's multiple-use PPSS (mPPSS), which protects multiple data by one password, by employing secure computation known as CSEC70 method in the user authentication. In this paper, we propose an attack on Nakahara's mPPSS that presumes on a security hall in the adoption of CSEC70 method. Then, we show that the proposed attack enables an administrator of any server of the system to disclose the password of an arbitrary user in Nakahara's mPPSS.
  • Tomoharu Shibuya
    Japan-Singapore Workshop on Coding and Information Theory, Mar 4, 2018, School of Physical & Mathematical Sciences, Nanyang Technological University
    In this talk, a group theoretic representation suitable for the rank-modulation (RM) scheme over the multi-cell ranking developed by En Gad et al. is presented. By introducing an action of the group of all permutation matrices on the set of all permutations, the scheme is clearly reformulated. Moreover, we introduce the concept of r-dominating sets over the multi-cell ranking, which is a generalization of conventional dominating sets, in the design of rank-modulation rewriting codes. The concept together with the presented group theoretic representation helps to yield an explicit formula of an upper bound on the size of the set of messages that can be stored in the memory by using RM rewriting codes over multi-cell ranking. We also note that this bound enables us to consider the trade-off between the size of the storable message set and the rewriting cost more closely.
  • 須藤 尊, 渋谷 智治
    電子情報通信学会情報理論研究会, Jan 20, 2017, 電子情報通信学会
  • Tomoharu Shibuya, Takeru Sudo
    Conference of Technical Committee on Information Theory, May 20, 2016, IEICE

Research Projects

 13