IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Latest Issue

Online ISSN : 1745-1337
Volume E101-A No.5  (Publication Date:2018/05/01)
[Whole issue]:PDF (22.3MB)
Previous | 
Top 10 downloads
Regular Section

pp.740-747  PAPER-Digital Signal Processing
Dual-Polarized Phased Array Based Polarization State Modulation for Physical-Layer Secure Communication
Zhangkai LUO  Huali WANG  
Summary | Full Text:PDF (779.8KB) >>Buy this Article

pp.748-754  PAPER-Analog Signal Processing
Low Voltage CMOS Current Mode Reference Circuit without Operational Amplifiers
Kenya KONDO  Koichi TANNO  Hiroki TAMURA  Shigetoshi NAKATAKE  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.755-762  PAPER-Systems and Control
Operator-Based Reset Control for Nonlinear System with Unknown Disturbance
Mengyang LI  Mingcong DENG  
Summary | Full Text:PDF (933.7KB) >>Buy this Article

pp.763-771  PAPER-Numerical Analysis and Optimization
Proposed Hyperbolic NILT Method — Acceleration Techniques and Two-Dimensional Expansion for Electrical Engineering Applications
Nawfal AL-ZUBAIDI R-SMITH  Lubomír BRANČÍK  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.772-777  PAPER-Algorithms and Data Structures
The Touring Polygons Problem Revisited
Xuehou TAN  Bo JIANG  
Summary | Full Text:PDF (810KB) >>Buy this Article

pp.778-786  PAPER-Graphs and Networks
Naive Bayes Classifier Based Partitioner for MapReduce
Lei CHEN  Wei LU  Ergude BAO  Liqiang WANG  Weiwei XING  Yuanyuan CAI  
Summary | Full Text:PDF (3.7MB) >>Buy this Article

pp.787-798  PAPER-Cryptography and Information Security
Reviving Identification Scheme Based on Isomorphism of Polynomials with Two Secrets: a Refined Theoretical and Practical Analysis
Bagus SANTOSO  
Summary | Full Text:PDF (628.6KB) >>Buy this Article

pp.799-810  PAPER-Information Theory
A Ranking-Based Text Matching Approach for Plagiarism Detection
Leilei KONG  Zhongyuan HAN  Haoliang QI  Zhimao LU  
Summary | Full Text:PDF (4.4MB) >>Buy this Article

pp.811-821  PAPER-Mobile Information Network and Personal Communications
Sparse High-Noise GPS Trajectory Data Compression and Recovery Based on Compressed Sensing
Guan YUAN  Mingjun ZHU  Shaojie QIAO  Zhixiao WANG  Lei ZHANG  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.822-830  PAPER-Mobile Information Network and Personal Communications
Digital Self-Interference Cancellation for LTE-Compatible In-Band Full-Duplex Systems
Changyong SHIN  Jiho HAN  
Summary | Full Text:PDF (977.2KB) >>Buy this Article

pp.831-843  PAPER-Intelligent Transport System
A Stayed Location Estimation Method for Sparse GPS Positioning Information Based on Positioning Accuracy and Short-Time Cluster Removal
Sae IWATA  Tomoyuki NITTA  Toshinori TAKAYAMA  Masao YANAGISAWA  Nozomu TOGAWA  
Summary | Full Text:PDF (2.8MB) >>Buy this Article

pp.844-847  LETTER-Digital Signal Processing
Robust Variable Step-Size Affine Projection SAF Algorithm against Impulsive Noises
Jae-hyeon JEON  Sang Won NAM  
Summary | Full Text:PDF (254.3KB) >>Buy this Article

pp.848-849  LETTER-Digital Signal Processing
Advanced DBS (Direct-Binary Search) Method for Compensating Spatial Chromatic Errors on RGB Digital Holograms in a Wide-Depth Range with Binary Holograms
Thibault LEPORTIER  Min-Chul PARK  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.850-854  LETTER-Digital Signal Processing
A Near-Optimal Receiver for MSK Modulation Under Symmetric Alpha-Stable Noise
Kaijie ZHOU  Huali WANG  Huan HAO  Zhangkai LUO  
Summary | Full Text:PDF (392.5KB) >>Buy this Article

pp.855-858  LETTER-Digital Signal Processing
Perfect Gaussian Integer Sequence Pairs from Cyclic Difference Set Pairs
Hongbin LIN  Xiuping PENG  Chao FENG  Qisheng TONG  Kai LIU  
Summary | Full Text:PDF (151.2KB) >>Buy this Article

pp.859-862  LETTER-Cryptography and Information Security
Related-Key Differential Attack on Round-Reduced Bel-T-256
Ahmed ABDELKHALEK  Mohamed TOLBA  Amr M. YOUSSEF  
Summary | Full Text:PDF (564.5KB) >>Buy this Article

pp.863-866  LETTER-Cryptography and Information Security
Impossible Differential Cryptanalysis of Fantomas and Robin
Xuan SHEN  Guoqiang LIU  Chao LI  Longjiang QU  
Summary | Full Text:PDF (302.1KB) >>Buy this Article

pp.867-871  LETTER-Information Theory
Linear Complexity of Quaternary Sequences over Z4 Based on Ding-Helleseth Generalized Cyclotomic Classes
Xina ZHANG  Xiaoni DU  Chenhuang WU  
Summary | Full Text:PDF (308.8KB) >>Buy this Article

pp.872-877  LETTER-Communication Theory and Signals
A Novel Transmission Scheme for Polarization Dependent Loss Elimination in Dual-Polarized Satellite Systems
Zhangkai LUO  Huali WANG  Kaijie ZHOU  
Summary | Full Text:PDF (462.6KB) >>Buy this Article

pp.878-882  LETTER-Communication Theory and Signals
Proactive Eavesdropping through a Third-Party Jammer
Ding XU  Qun LI  
Summary | Full Text:PDF (344.2KB) >>Buy this Article

Previous | 
go to Page Top