Online ISSN : 

IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Volume E83-A No.10  (Publication Date:2000/10/25)
Previous | 
Next
Special Section on Information Theory and Its Applications

pp.1869-1869  FOREWORD
FOREWORD
Haruo OGIWARA  Naohisa KOMATSU  Kenji NAKAGAWA  
Summary | Full Text:PDF >>
Buy this Article


pp.1870-1877  PAPER-Coding Theory
A Sufficient Condition for a Code to Achieve the Minimum Decoding Error Probability--Generalization of Perfect and Quasi-Perfect Codes
Mitsuru HAMADA  
Summary | Full Text:PDF >>
Buy this Article


pp.1878-1883  PAPER-Coding Theory
Constructing Quantum Error-Correcting Codes for pm-State Systems from Classical Error-Correcting Codes
Ryutaroh MATSUMOTO  Tomohiko UYEMATSU  
Summary | Full Text:PDF >>
Buy this Article


pp.1884-1890  PAPER-Coding Theory
MAP and LogMAP Decoding Algorithms for Linear Block Codes Using a Code Structure
Yuichi KAJI  Ryujiro SHIBUYA  Toru FUJIWARA  Tadao KASAMI  Shu LIN  
Summary | Full Text:PDF >>
Buy this Article


pp.1891-1897  PAPER-Source Coding and Data Compression
Error Exponent for Coding of Memoryless Gaussian Sources with a Fidelity Criterion
Shunsuke IHARA  Masashi KUBO  
Summary | Full Text:PDF >>
Buy this Article


pp.1898-1903  PAPER-Source Coding and Data Compression
A Context Tree Weighting Algorithm with an Incremental Context Set
Tsutomu KAWABATA  Frans M. J. WILLEMS  
Summary | Full Text:PDF >>
Buy this Article


pp.1904-1913  PAPER-Mobile Communication
Blind Channel Estimation for Time-Varying Frequency-Selective Fading Channels
Koji SHIBATA  Takuma YAGI  Takakazu SAKAI  Atsushi NAKAGAKI  
Summary | Full Text:PDF >>
Buy this Article


pp.1914-1920  PAPER-Multiple Access Channel
T-User Uniquely Decodable k-Ary Affine Code for Multiple-Access Adder Channel
Jun CHENG  Yoichiro WATANABE  
Summary | Full Text:PDF >>
Buy this Article


pp.1921-1928  PAPER-Image Processing
Optimal Grid Pattern for Automated Camera Calibration Using Cross Ratio
Chikara MATSUNAGA  Yasushi KANAZAWA  Kenichi KANATANI  
Summary | Full Text:PDF >>
Buy this Article


pp.1929-1935  PAPER-Code for Computer Memory
Addition of Integers in a Computer Memory: Information Theory Approach
Vladimir B. BALAKIRSKY  
Summary | Full Text:PDF >>
Buy this Article


pp.1936-1944  PAPER-Information Network
Knockout ATM Switch with Two Speedup Factors under Non-uniform Traffic with Variable Hot-spot Ports
Yoshiyuki NISHINO  Iwao SASASE  
Summary | Full Text:PDF >>
Buy this Article


pp.1945-1954  PAPER-Information Network
Non-Collision Packet Reservation Multiple Access with Random Transmission to Idle Slots
Mioko TADENUMA  Iwao SASASE  
Summary | Full Text:PDF >>
Buy this Article


pp.1955-1962  PAPER-Identity Verification
Extraction of Personal Features from On-Line Handwriting Information in Context-Independent Characters
Yasushi YAMAZAKI  Naohisa KOMATSU  
Summary | Full Text:PDF >>
Buy this Article


pp.1963-1965  LETTER-Coding Theory
An Improvement to GMD-Like Decoding Algorithms
Hitoshi TOKUSHIGE  Yuansheng TANG  Takuya KOUMOTO  Tadao KASAMI  
Summary | Full Text:PDF >>
Buy this Article


pp.1966-1970  LETTER-Coding Theory
On the Relation between Viterbi Decoding with Labels and the SOVA
Masato TAJIMA  Keiji TAKIDA  Zenshiro KAWASAKI  
Summary | Full Text:PDF >>
Buy this Article


pp.1971-1974  LETTER-Coding Theory
Combination of Turbo Decoding and Equalization Using Soft-Output Viterbi Algorithm
Haruo OGIWARA  Naoki TSUKAHARA  
Summary | Full Text:PDF >>
Buy this Article


pp.1975-1978  LETTER-Coding Theory
A Simulation Probability Density Function Design for TCM Scheme in Impulsive Noise Environment
Takakazu SAKAI  Koji SHIBATA  
Summary | Full Text:PDF >>
Buy this Article


pp.1979-1982  LETTER-Source Coding and Data Compression
A Note on a Sequence Related to the Lempel-Ziv Parsing
Tsutomu KAWABATA  
Summary | Full Text:PDF >>
Buy this Article


pp.1983-1986  LETTER-Cryptography and Information Security
A Generalization of the Simmons' Bounds on Secret-Key Authentication Systems
Hiroki KOGA  
Summary | Full Text:PDF >>
Buy this Article


pp.1987-1991  LETTER-Cryptography and Information Security
A Study on Secret Key Reconciliation Protocol "Cascade"
Tomohiro SUGIMOTO  Kouichi YAMAZAKI  
Summary | Full Text:PDF >>
Buy this Article


pp.1992-1995  LETTER-Multicarrier System
A Study on Reducing the Nonlinear Distortion in Multicarrier Systems
Masaaki HARADA  Takaya YAMAZATO  Masaaki KATAYAMA  Akira OGAWA  
Summary | Full Text:PDF >>
Buy this Article


pp.1996-1999  LETTER-Mobile Communication
Performance of Mobile Multimedia System Applied to Trellis Coded Modulation on Rayleigh Fading Channel
Hirokazu TANAKA  Shoichiro YAMASAKI  
Summary | Full Text:PDF >>
Buy this Article


Regular Section

pp.2000-2008  PAPER-Numerical Analysis and Optimization
A Parallel Approach for Computing Complex Eigenvalue Problems
Yao-Lin JIANG  Richard M. M. CHEN  Zu-Lan HUANG  
Summary | Full Text:PDF >>
Buy this Article


pp.2009-2014  PAPER-Graphs and Networks
On a Relation between -Centroid and -Blocks in a Graph
Masashi TAKEUCHI  Shoji SOEJIMA  
Summary | Full Text:PDF >>
Buy this Article


pp.2015-2022  PAPER-Information Security
A Digital Image Watermarking Scheme Withstanding Malicious Attacks
Akira SHIOZAKI  Jiro TANIMOTO  Motoi IWATA  
Summary | Full Text:PDF >>
Buy this Article


pp.2023-2034  PAPER-Communication Theory and Signals
Modeling of Nonuniform Coupled Transmission Lines Interconnect Using Genetic Algorithms
Ahmad CHELDAVI  Gholamali REZAI-RAD  
Summary | Full Text:PDF >>
Buy this Article


pp.2035-2039  LETTER-Digital Signal Processing
An ARMA Prefiltering Approach to Adaptive Equalization
Tetsuya SHIMAMURA  Tomoyuki TAKADA  Jouji SUZUKI  
Summary | Full Text:PDF >>
Buy this Article


pp.2040-2043  LETTER-Image
Image Compression by New Sub-Image Block Classification Techniques Using Neural Networks
Newaz M. S. RAHIM  Takashi YAHAGI  
Summary | Full Text:PDF >>
Buy this Article


Previous | 
Next
go to Page Top