IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E92-A No.10  (Publication Date:2009/10/01)
Previous | 
Next
Special Section on Information Theory and Its Applications

pp.2391-2392  FOREWORD
FOREWORD
Tomohiko UYEMATSU  Hirosuke YAMAMOTO  
Summary | Full Text:PDF (83.1KB) >>Buy this Article

pp.2393-2401  PAPER-Shannon Theory
Slepian-Wolf Coding of Individual Sequences Based on Ensembles of Linear Functions
Shigeaki KUZUOKA  
Summary | Full Text:PDF (178KB) >>Buy this Article

pp.2402-2410  PAPER-Coding Theory
Decoding of Separately Encoded Multiple Correlated Sources Transmitted over Noisy Channels
Kentaro KOBAYASHI  Takaya YAMAZATO  Masaaki KATAYAMA  
Summary | Full Text:PDF (348.8KB) >>Buy this Article

pp.2411-2417  PAPER-Coding Theory
Complexity-Reducing Algorithm for Serial Scheduled Min-Sum Decoding of LDPC Codes
Hironori UCHIKAWA  Kohsuke HARADA  
Summary | Full Text:PDF (630.8KB) >>Buy this Article

pp.2418-2430  PAPER-Coding Theory
Adaptive Decoding Algorithms for Low-Density Parity-Check Codes over the Binary Erasure Channel
Gou HOSOYA  Hideki YAGI  Manabu KOBAYASHI  Shigeichi HIRASAWA  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.2431-2437  PAPER-Cryptography and Information Security
An Efficient Signature Scheme with Fast Online Signing
Taek-Young YOUN  Young-Ho PARK  Jongin LIM  
Summary | Full Text:PDF (200.1KB) >>Buy this Article

pp.2438-2446  PAPER-Cryptography and Information Security
Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method
Shigeo TSUJII  Kohtaro TADAKI  Ryou FUJITA  Masahito GOTAISHI  Toshinobu KANEKO  
Summary | Full Text:PDF (399.2KB) >>Buy this Article

pp.2447-2453  PAPER-Cryptography and Information Security
Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function
Shoichi HIROSE  Hidenori KUWAKADO  
Summary | Full Text:PDF (205KB) >>Buy this Article

pp.2454-2462  PAPER-Data Compression
Efficient Compression of Web Graphs
Yasuhito ASANO  Yuya MIYAWAKI  Takao NISHIZEKI  
Summary | Full Text:PDF (228.4KB) >>Buy this Article

pp.2463-2470  PAPER-Image Coding and Processing
Parallel Processing of Distributed Video Coding to Reduce Decoding Time
Yoshihide TONOMURA  Takayuki NAKACHI  Tatsuya FUJII  Hitoshi KIYA  
Summary | Full Text:PDF (733.2KB) >>Buy this Article

pp.2471-2478  PAPER-Image Coding and Processing
A Novel Bandelet-Based Image Inpainting
Kuo-Ming HUNG  Yen-Liang CHEN  Ching-Tang HSIEH  
Summary | Full Text:PDF (506.3KB) >>Buy this Article

pp.2479-2483  LETTER-Coding Theory
LDPC Convolutional Codes Based on Parity Check Polynomials with a Time Period of 3
Yutaka MURAKAMI  Shutai OKAMURA  Shozo OKASAKA  Takaaki KISHIGAMI  Masayuki ORIHASHI  
Summary | Full Text:PDF (876.4KB) >>Buy this Article

pp.2484-2486  LETTER-Coding Theory
On Relationship between the Boston Bound and Well-Known Bounds for Cyclic Codes
Junru ZHENG  Takayasu KAIDA  
Summary | Full Text:PDF (72.3KB) >>Buy this Article

pp.2487-2491  LETTER-Cryptography and Information Security
Strong Anonymous Signature
Rui ZHANG  Hideki IMAI  
Summary | Full Text:PDF (101.6KB) >>Buy this Article

pp.2492-2494  LETTER-Communication Theory
On the Effect of an Invertible Code on Block Undelivered Probability in Cooperative Multi-Hop Relaying Networks
Katsumi SAKAKIBARA  Jumpei TAKETSUGU  
Summary | Full Text:PDF (147.4KB) >>Buy this Article

pp.2495-2497  LETTER-Communication Theory
ISI-Free Power Roll-Off Pulse
Masayuki MOHRI  Masanori HAMAMURA  
Summary | Full Text:PDF (161.8KB) >>Buy this Article

Special Section on Nonlinear Theory and its Applications

pp.2498-2498  FOREWORD
FOREWORD
Yoshihiko HORIO  
Summary | Full Text:PDF (57.4KB) >>Buy this Article

pp.2499-2507  PAPER-Nonlinear Problems
A Novel Robust Impulsive Chaos Synchronization Approach for Uncertain Complex Dynamical Networks
Nariman MAHDAVI MAZDEH  Mohammad Bagher MENHAJ  Heidar Ali TALEBI  
Summary | Full Text:PDF (548.3KB) >>Buy this Article

pp.2508-2513  PAPER-Nonlinear Problems
Stochastic Resonance in an Array of Locally-Coupled McCulloch-Pitts Neurons with Population Heterogeneity
Akira UTAGAWA  Tohru SAHASHI  Tetsuya ASAI  Yoshihito AMEMIYA  
Summary | Full Text:PDF (833.4KB) >>Buy this Article

pp.2514-2521  PAPER-Nonlinear Problems
An Extended Method of SIRMs Connected Fuzzy Inference Method Using Kernel Method
Hirosato SEKI  Fuhito MIZUGUCHI  Satoshi WATANABE  Hiroaki ISHII  Masaharu MIZUMOTO  
Summary | Full Text:PDF (445KB) >>Buy this Article

pp.2522-2530  PAPER-Nonlinear Problems
Moment Vector Equation for Nonlinear Systems and Its Application to Optimal Control
Hideki SATOH  
Summary | Full Text:PDF (304.6KB) >>Buy this Article

pp.2531-2539  PAPER-Nonlinear Problems
Accurate Method for Calculating the Effective Capacitance with RC Loads Based on the Thevenin Model
Minglu JIANG  Zhangcai HUANG  Atsushi KUROKAWA  Shuai FANG  Yasuaki INOUE  
Summary | Full Text:PDF (454.9KB) >>Buy this Article

pp.2540-2545  PAPER-Nonlinear Problems
The Mixed Time-Frequency Steady-State Analysis Method for Nonlinear Circuits Driven by Multitone Signals
Tatsuya KUWAZAKI  Jun SHIRATAKI  Makiko OKUMURA  
Summary | Full Text:PDF (371.4KB) >>Buy this Article

pp.2546-2553  PAPER-Nonlinear Problems
CMOS Circuit Simulation Using Latency Insertion Method
Tadatoshi SEKINE  Hideki ASAI  
Summary | Full Text:PDF (751.4KB) >>Buy this Article

pp.2554-2559  PAPER-Nonlinear Problems
A Fixed Point Theorem in Weak Topology for Successively Recurrent System of Set-Valued Mapping Equations and Its Applications
Kazuo HORIUCHI  
Summary | Full Text:PDF (189.8KB) >>Buy this Article

Regular Section

pp.2560-2571  PAPER-Digital Signal Processing
Image Restoration Using a Universal GMM Learning and Adaptive Wiener Filter
Nobumoto YAMANE  Motohiro TABUCHI  Yoshitaka MORIKAWA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.2572-2579  PAPER-Digital Signal Processing
A Reversible Image Authentication Method without Memorization of Hiding Parameters
Seungwu HAN  Masaaki FUJIYOSHI  Hitoshi KIYA  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.2580-2587  PAPER-VLSI Design Technology and CAD
Transformation of BDD into Heterogeneous MDD with Minimal Cost
Suzana STOJKOVI  Milena STANKOVI  Radomir S. STANKOVI  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.2588-2599  PAPER-Communication Theory and Signals
Double Space Time Transmit Diversity OFDM System with Antenna Shuffling in Spatial Correlated Frequency Selective MIMO Channels
Liang ZHOU  Masahiko SHIMIZU  
Summary | Full Text:PDF (792.9KB) >>Buy this Article

pp.2600-2608  PAPER-Spread Spectrum Technologies and Applications
Performance of Reed-Solomon Coded MC-DS-CDMA with Bi-orthogonal Modulation
Hirokazu TANAKA  Kyung Woon JANG  Shoichiro YAMASAKI  Miki HASEYAMA  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.2609-2617  PAPER-Mobile Information Network and Personal Communications
A Multi-Sensing-Range Method for Efficient Position Estimation by Passive RFID Technology
Toshihiro HORI  Tomotaka WADA  Norie UCHITOMI  Kouichi MUTSUURA  Hiromi OKADA  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.2618-2625  PAPER-Intelligent Transport System
A Multistage Method for Multiobjective Route Selection
Feng WEN  Mitsuo GEN  
Summary | Full Text:PDF (777.9KB) >>Buy this Article

pp.2626-2628  LETTER-Digital Signal Processing
A Windowing Frequency Domain Adaptive Filter for Acoustic Echo Cancellation
Sheng WU  Xiaojun QIU  
Summary | Full Text:PDF (300.3KB) >>Buy this Article

pp.2629-2632  LETTER-Systems and Control
Iterative Learning Control with Advanced Output Data Using Partially Known Impulse Response
Gu-Min JEONG  Chong-Ho CHOI  Hyun-Sik AHN  
Summary | Full Text:PDF (111.4KB) >>Buy this Article

pp.2633-2637  LETTER-Cryptography and Information Security
New Balanced Boolean Functions with Good Cryptographic Properties
Qichun WANG  Xiangyang XUE  Haibin KAN  
Summary | Full Text:PDF (93.8KB) >>Buy this Article

pp.2638-2640  LETTER-Cryptography and Information Security
Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks
Tsu-Yang WU  Yuh-Min TSENG  
Summary | Full Text:PDF (76KB) >>Buy this Article

pp.2641-2643  LETTER-Cryptography and Information Security
Security Vulnerability of ID-Based Key Sharing Schemes
JungYeon HWANG  Taek-Young YOUN  Willy SUSILO  
Summary | Full Text:PDF (80.2KB) >>Buy this Article

pp.2644-2647  LETTER-Cryptography and Information Security
On the Security of a Conditional Proxy Re-Encryption
Xi ZHANG  Min-Rong CHEN  
Summary | Full Text:PDF (83.9KB) >>Buy this Article

Previous | 
Next
go to Page Top