IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E100-A No.9  (Publication Date:2017/09/01)
[Whole issue]:PDF (46.8MB)
Previous | 
Next
Special Section on Signal Processing on Irregular Sampling Grids

pp.1742-1742  FOREWORD
FOREWORD
Masahiro Okuda  
Summary | Full Text:PDF (249.9KB) >>Buy this Article

pp.1743-1750  PAPER
Design of Two Channel Biorthogonal Graph Wavelet Filter Banks with Half-Band Kernels
Xi ZHANG  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.1751-1759  PAPER
Non-Blind Deconvolution of Point Cloud Attributes in Graph Spectral Domain
Kaoru YAMAMOTO  Masaki ONUKI  Yuichi TANAKA  
Summary | Full Text:PDF (5.5MB) >>Buy this Article

pp.1760-1762  LETTER
High Precision Deep Sea Geomagnetic Data Sampling and Recovery with Three-Dimensional Compressive Sensing
Chao ZHANG  Yufei ZHAO  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

Special Section on Discrete Mathematics and Its Applications

pp.1763-1763  FOREWORD
FOREWORD
Takashi Horiyama  
Summary | Full Text:PDF (183.5KB) >>Buy this Article

pp.1764-1772  PAPER
A Polynomial Time Pattern Matching Algorithm on Graph Patterns of Bounded Treewidth
Takayoshi SHOUDAI  Takashi YAMADA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.1773-1784  PAPER
Frontier-Based Search for Enumerating All Constrained Subgraphs with Compressed Representation
Jun KAWAHARA  Takeru INOUE  Hiroaki IWASHITA  Shin-ichi MINATO  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.1785-1793  PAPER
Packed Compact Tries: A Fast and Efficient Data Structure for Online String Processing
Takuya TAKAGI  Shunsuke INENAGA  Kunihiko SADAKANE  Hiroki ARIMURA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.1794-1803  PAPER
Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols
Kazuki YONEYAMA  
Summary | Full Text:PDF (269.9KB) >>Buy this Article

pp.1804-1815  PAPER
Constructing Subspace Membership Encryption through Inner Product Encryption
Shuichi KATSUMATA  Noboru KUNIHIRO  
Summary | Full Text:PDF (732.9KB) >>Buy this Article

pp.1816-1824  PAPER
Long Period Sequences Generated by the Logistic Map over Finite Fields with Control Parameter Four
Kazuyoshi TSUCHIYA  Yasuyuki NOGAMI  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1825-1837  PAPER
Group Signature with Deniability: How to Disavow a Signature
Ai ISHIDA  Keita EMURA  Goichiro HANAOKA  Yusuke SAKAI  Keisuke TANAKA  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.1838-1845  PAPER
An Improvement of Scalar Multiplication by Skew Frobenius Map with Multi-Scalar Multiplication for KSS Curve
Md. Al-Amin KHANDAKER  Yasuyuki NOGAMI  
Summary | Full Text:PDF (751.9KB) >>Buy this Article

pp.1846-1856  PAPER
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation
Go OHTAKE  Kazuto OGAWA  Goichiro HANAOKA  Shota YAMADA  Kohei KASAMATSU  Takashi YAMAKAWA  Hideki IMAI  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.1857-1869  PAPER
Generic Transformation for Signatures in the Continual Leakage Model
Yuyu WANG  Keisuke TANAKA  
Summary | Full Text:PDF (623.4KB) >>Buy this Article

pp.1870-1881  PAPER
Provably Secure Structured Signature Schemes with Tighter Reductions
Naoto YANAI  Tomoya IWASAKI  Masaki INAMURA  Keiichi IWAMURA  
Summary | Full Text:PDF (1008.4KB) >>Buy this Article

pp.1882-1890  PAPER
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security
Nuttapong ATTRAPADUNG  Goichiro HANAOKA  Shota YAMADA  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1891-1899  PAPER
Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs
Hyungrok JO  Christophe PETIT  Tsuyoshi TAKAGI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1900-1909  PAPER
Card-Based Protocols Using Regular Polygon Cards
Kazumasa SHINAGAWA  Takaaki MIZUKI  Jacob C.N. SCHULDT  Koji NUIDA  Naoki KANAYAMA  Takashi NISHIDE  Goichiro HANAOKA  Eiji OKAMOTO  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.1910-1923  PAPER
On the Security of Non-Interactive Key Exchange against Related-Key Attacks
Hiraku MORITA  Jacob C.N. SCHULDT  Takahiro MATSUDA  Goichiro HANAOKA  Tetsu IWATA  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1924-1931  PAPER
Signatures from Trapdoor Commitments with Strong Openings
Goichiro HANAOKA  Jacob C. N. SCHULDT  
Summary | Full Text:PDF (558.7KB) >>Buy this Article

pp.1932-1935  LETTER
Completely Independent Spanning Trees on 4-Regular Chordal Rings
Jou-Ming CHANG  Hung-Yi CHANG  Hung-Lung WANG  Kung-Jui PAI  Jinn-Shyong YANG  
Summary | Full Text:PDF (312.7KB) >>Buy this Article

pp.1936-1941  LETTER
Designs of Zero Correlation Zone Sequence Pair Set with Inter-Subset Uncorrelated Property
Xiaoli ZENG  Longye WANG  Hong WEN  
Summary | Full Text:PDF (257.3KB) >>Buy this Article

Regular Section

pp.1942-1950  PAPER-Digital Signal Processing
Speech Enhancement with Impact Noise Activity Detection Based on the Kurtosis of an Instantaneous Power Spectrum
Naoto SASAOKA  Naoya HAMAHASHI  Yoshio ITOH  
Summary | Full Text:PDF (3.2MB) >>Buy this Article

pp.1951-1955  PAPER-Digital Signal Processing
Low-Latency Low-Cost Architecture for Square and Cube Roots
Jihyuck JO  In-Cheol PARK  
Summary | Full Text:PDF (729.4KB) >>Buy this Article

pp.1956-1964  PAPER-Nonlinear Problems
On the Key Parameters of the Oscillator-Based Random Source
Chenyang GUO  Yujie ZHOU  
Summary | Full Text:PDF (3.4MB) >>Buy this Article

pp.1965-1972  PAPER-Cryptography and Information Security
Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform
Qinglan ZHAO  Dong ZHENG  Xiangxue LI  Yinghui ZHANG  Xiaoli DONG  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.1973-1984  PAPER-Information Theory
A Compact Tree Representation of an Antidictionary
Takahiro OTA  Hiroyoshi MORITA  
Summary | Full Text:PDF (420.6KB) >>Buy this Article

pp.1985-1992  PAPER-Mobile Information Network and Personal Communications
Efficient Fault-Aware Routing for Wireless Sensor Networks
Jaekeun YUN  Daehee KIM  Sunshin AN  
Summary | Full Text:PDF (1.9MB) >>Buy this Article

pp.1993-2000  PAPER-Image
Image Restoration of JPEG Encoded Images via Block Matching and Wiener Filtering
Yutaka TAKAGI  Takanori FUJISAWA  Masaaki IKEHARA  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.2001-2012  PAPER-Measurement Technology
Time-of-Arrival-Based Indoor Smartphone Localization Using Light-Synchronized Acoustic Waves
Takayuki AKIYAMA  Masanori SUGIMOTO  Hiromichi HASHIZUME  
Summary | Full Text:PDF (4.1MB) >>Buy this Article

pp.2013-2020  PAPER-General Fundamentals and Boundaries
Sufficient and Necessary Conditions of Distributed Compressed Sensing with Prior Information
Wenbo XU  Yupeng CUI  Yun TIAN  Siye WANG  Jiaru LIN  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.2021-2025  LETTER-Digital Signal Processing
Spectral Distribution of Wigner Matrices in Finite Dimensions and Its Application to LPI Performance Evaluation of Radar Waveforms
Jun CHEN  Fei WANG  Jianjiang ZHOU  Chenguang SHI  
Summary | Full Text:PDF (150.9KB) >>Buy this Article

pp.2026-2030  LETTER-Digital Signal Processing
Parameterized L1-Minimization Algorithm for Off-the-Gird Spectral Compressive Sensing
Wei ZHANG  Feng YU  
Summary | Full Text:PDF (384.2KB) >>Buy this Article

pp.2031-2033  LETTER-VLSI Design Technology and CAD
A Finite Automaton-Based String Matching Engine on Graphic Processing Unit
JinMyung YOON  Kang-Il CHOI  HyunJin KIM  
Summary | Full Text:PDF (328.4KB) >>Buy this Article

pp.2034-2037  LETTER-Numerical Analysis and Optimization
Neighbor-Interactive Bee Colony for Problems with Local Structures
Phuc Nguyen HONG  Chang Wook AHN  Jaehoon (Paul) JEONG  
Summary | Full Text:PDF (306.9KB) >>Buy this Article

pp.2038-2043  LETTER-Numerical Analysis and Optimization
Dynamic Power Allocation Based on Rain Attenuation Prediction for High Throughput Broadband Satellite Systems
Shengchao SHI  Guangxia LI  Zhiqiang LI  Bin GAO  Zhangkai LUO  
Summary | Full Text:PDF (394.8KB) >>Buy this Article

pp.2044-2047  LETTER-Information Theory
An Improved Independence Test Method for the Convolutional Multicast Algorithm
Xubo ZHAO  Xiaoping LI  Tongjiang YAN  
Summary | Full Text:PDF (90.8KB) >>Buy this Article

pp.2048-2051  LETTER-Coding Theory
A Family of at Least Almost Optimal p-Ary Cyclic Codes
Xia LI  Deng TANG  Feng CHENG  
Summary | Full Text:PDF (115.2KB) >>Buy this Article

pp.2052-2055  LETTER-Coding Theory
Reduced-Complexity Belief Propagation Decoding for Polar Codes
Jung-Hyun KIM  Inseon KIM  Gangsan KIM  Hong-Yeop SONG  
Summary | Full Text:PDF (565.1KB) >>Buy this Article

pp.2056-2060  LETTER-Coding Theory
Constructions of Gaussian Integer Periodic Complementary Sequences with ZCZ
Deming KONG  Xiaoyu CHEN  Yubo LI  
Summary | Full Text:PDF (102.1KB) >>Buy this Article

pp.2061-2064  LETTER-Communication Theory and Signals
Joint User and Power Allocation in Underlay Cognitive Radio Networks with Multiple Primary Users' Security Constraints
Ding XU  Qun LI  
Summary | Full Text:PDF (247.2KB) >>Buy this Article

pp.2065-2068  LETTER-Communication Theory and Signals
An Efficient Resource Allocation Algorithm for Underlay Cognitive Radio Multichannel Multicast Networks
Qun LI  Ding XU  
Summary | Full Text:PDF (226.2KB) >>Buy this Article

pp.2069-2072  LETTER-Image
Automatic Optic Disc Boundary Extraction Based on Saliency Object Detection and Modified Local Intensity Clustering Model in Retinal Images
Wei ZHOU  Chengdong WU  Yuan GAO  Xiaosheng YU  
Summary | Full Text:PDF (821.1KB) >>Buy this Article

Previous | 
Next
go to Page Top