Trans.Fundamentals.
2017-06   PDF Top 10 downloads


1. [25 download]
Vol.E100-A No.6 pp.1279-1285
 PAPER  Digital Signal Processing
Toward Large-Pixel Number High-Speed Imaging Exploiting Time and Space Sparsity
Naoki NOGAMIAkira HIRABAYASHITakashi IJIRIJeremy WHITE
Summary | Full Text:PDF(1.9MB)

2. [10 download]
Vol.E100-A No.6 pp.1296-1305
 PAPER  Cryptography and Information Security
Analysis and Improvements of the Full Spritz Stream Cipher
Subhadeep BANIKTakanori ISOBEMasakatu MORII
Summary | Full Text:PDF(870.2KB)

3. [9 download]
Vol.E98-A No.1 pp.313-322
 PAPER  
Pedestrian Dead Reckoning for Mobile Phones Using Magnetic Deviation Map
Noriaki KAKIUCHIKenichi SUNAGAWAShunsuke KAMIJO
Summary | Full Text:PDF(6.5MB)

3. [9 download]
Vol.E100-A No.6 pp.1342-1345
 LETTER  Coding Theory
On the Single-Parity Locally Repairable Codes
Yanbo LUJie HAOShu-Tao XIA
Summary | Full Text:PDF(101.7KB)

5. [8 download]
Vol.E96-A No.1 pp.237-241
 LETTER  
A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday Bound
Kan YASUDA
Summary | Full Text:PDF(171.1KB)

5. [8 download]
Vol.E100-A No.6 pp.1325-1332
 PAPER  Vision
Particle Filter Target Tracking Algorithm Based on Dynamic Niche Genetic Algorithm
Weicheng XIEJunxu WEIZhichao CHENTianqian LI
Summary | Full Text:PDF(4.4MB)

5. [8 download]
Vol.E100-A No.6 pp.1315-1324
 PAPER  Communication Theory and Signals
Multipath Routing Handoff for Mobile Wireless Ad Hoc Network Infrastructure
KyengHeum NADaeHee KIMSunShin AN
Summary | Full Text:PDF(2.7MB)

8. [7 download]
Vol.E99-A No.9 pp.1655-1664
 PAPER  
Weighted 4D-DCT Basis for Compressively Sampled Light Fields
Yusuke MIYAGIKeita TAKAHASHIToshiaki FUJII
Summary | Full Text:PDF(15.8MB)

8. [7 download]
Vol.E99-A No.12 pp.2136-2146
 PAPER  Information Theoretic Security
Error and Secrecy Exponents for Wiretap Channels under Two-Fold Cost Constraints
Hiroyuki ENDOTe Sun HANMasahide SASAKI
Summary | Full Text:PDF(858.7KB)

8. [7 download]
Vol.E94-A No.1 pp.233-244
 PAPER  Biometrics
Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification
Kenta TAKAHASHIShinji HIRATA
Summary | Full Text:PDF(861KB)

go to Page Top