Online ISSN : 

IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
0.42 1.1
Volume E86-A No.10  (Publication Date:2003/10/01)
Previous | 
Next
Special Section on Information Theory and Its Applications

pp.2427-2427  FOREWORD
FOREWORD
Masaaki KATAYAMA  Tomohiko UYEMATSU  
Summary | Full Text:PDF (56.8KB) >>
Buy this Article


pp.2428-2434  PAPER-Coding Theory
On Tanner's Lower Bound for the Minimum Distance of Regular LDPC Codes Based on Combinatorial Designs
Tomoharu SHIBUYA  Masatoshi ONIKUBO  Kohichi SAKANIWA  
Summary | Full Text:PDF (275.6KB) >>
Buy this Article


pp.2435-2444  PAPER-Coding Theory
Detailedly Represented Irregular Low-Density Parity-Check Codes
Kenta KASAI  Tomoharu SHIBUYA  Kohichi SAKANIWA  
Summary | Full Text:PDF (379.6KB) >>
Buy this Article


pp.2445-2451  PAPER-Coding Theory
Selection Method of Test Patterns in Soft-Decision Iterative Bounded Distance Decoding Algorithms
Hitoshi TOKUSHIGE  Takuya KOUMOTO  Marc P.C. FOSSORIER  Tadao KASAMI  
Summary | Full Text:PDF (402.9KB) >>
Buy this Article


pp.2452-2460  PAPER-Coding Theory
An Iterative Decoding Algorithm for Channels with Additive Linear Dynamical Noise
Tadashi WADAYAMA  
Summary | Full Text:PDF (355.2KB) >>
Buy this Article


pp.2461-2472  PAPER-Coding Theory
Complexity Reduction of the Gazelle and Snyders Decoding Algorithm for Maximum Likelihood Decoding
Hideki YAGI  Manabu KOBAYASHI  Shigeichi HIRASAWA  
Summary | Full Text:PDF (342.4KB) >>
Buy this Article


pp.2473-2482  PAPER-Coding Theory
Iterative Decoding of High Dimensionality Parity Code
Toshio FUKUTA  Yuuichi HAMASUNA  Ichi TAKUMI  Masayasu HATA  Takahiro NAKANISHI  
Summary | Full Text:PDF (754.3KB) >>
Buy this Article


pp.2483-2491  PAPER-Communication Systems
A New Modulation Technique Based on Pulse Position Modulation and Code Shift Keying
Fumie ONO  Hiromasa HABUCHI  
Summary | Full Text:PDF (1.4MB) >>
Buy this Article


pp.2492-2500  PAPER-Communication Systems
Influence of Chip Frequency on Characterizing Radio Channels for Rake Receiver Fingers for CDMA Systems in Microcellular Environment
Hassan M. EL-SALLABI  Pertti VAINIKAINEN  
Summary | Full Text:PDF (1.8MB) >>
Buy this Article


pp.2501-2509  PAPER-Communication Systems
Beam-Space Time Coding Exploiting the Overlap among Beampatterns
Kouji ISHII  Giuseppe ABREU  Ryuji KOHNO  
Summary | Full Text:PDF (823.3KB) >>
Buy this Article


pp.2510-2516  PAPER-Source Coding/Image Processing
A Tree Based Algorithm for Generating All Possible Binary Compact Codes with N Codewords
Mohammadali KHOSRAVIFARD  Morteza ESMAEILI  Hossein SAIDI  T. Aaron GULLIVER  
Summary | Full Text:PDF (371.2KB) >>
Buy this Article


pp.2517-2525  PAPER-Source Coding/Image Processing
A Source Model with Probability Distribution over Word Set and Recurrence Time Theorem
Masayuki GOTO  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  
Summary | Full Text:PDF (284.1KB) >>
Buy this Article


pp.2526-2534  PAPER-Source Coding/Image Processing
Semiautomatic Segmentation Using Spatio-Temporal Gradual Region Merging for MPEG-4
Young-Ro KIM  Jae-Hwan KIM  Yoon KIM  Sung-Jea KO  
Summary | Full Text:PDF (1.4MB) >>
Buy this Article


pp.2535-2541  PAPER-Source Coding/Image Processing
On-Line Writer Recognition for Thai Numeral
Pitak THUMWARIN  Takenobu MATSUURA  
Summary | Full Text:PDF (2.2MB) >>
Buy this Article


pp.2542-2551  PAPER-Information Security
Two Algorithms for Random Number Generation Implemented by Using Arithmetic of Limited Precision
Tomohiko UYEMATSU  Yuan LI  
Summary | Full Text:PDF (247.6KB) >>
Buy this Article


pp.2552-2559  PAPER-Information Security
Efficient Relative Time-Stamping Scheme Based on the Ternary Link
Yuichi IGARASHI  Hidenori KUWAKADO  Hatsukazu TANAKA  
Summary | Full Text:PDF (415.6KB) >>
Buy this Article


pp.2560-2568  PAPER-Information Security
An Efficient Anonymous Survey for Attribute Statistics Using a Group Signature Scheme with Attribute Tracing
Toru NAKANISHI  Yuji SUGIYAMA  
Summary | Full Text:PDF (265.1KB) >>
Buy this Article


pp.2569-2576  PAPER-Information Security
Elliptic Curve Cryptosystem on Smart Card Access with Threshold Scheme
Shyi-Tsong WU  
Summary | Full Text:PDF (548.8KB) >>
Buy this Article


pp.2577-2588  PAPER-Information Security
A Construction Method of Visual Secret Sharing Schemes for Plural Secret Images
Mitsugu IWAMOTO  Hirosuke YAMAMOTO  
Summary | Full Text:PDF (389.5KB) >>
Buy this Article


pp.2589-2595  PAPER-Information Security
A Random-Error-Resilient Collusion-Secure Fingerprinting Code, Randomized c-Secure CRT Code
Hajime WATANABE  Takashi KITAGAWA  
Summary | Full Text:PDF (297.4KB) >>
Buy this Article


pp.2596-2600  LETTER-Coding Theory
Reduced Complexity Iterative Decoding Using a Sub-Optimum Minimum Distance Search
Jun ASATANI  Takuya KOUMOTO  Kenichi TOMITA  Tadao KASAMI  
Summary | Full Text:PDF (558.1KB) >>
Buy this Article


pp.2601-2606  LETTER-Coding Theory
Performance of a Decoding Algorithm for LDPC Codes Based on the Concave-Convex Procedure
Tomoharu SHIBUYA  Kohichi SAKANIWA  
Summary | Full Text:PDF (251.9KB) >>
Buy this Article


pp.2607-2614  LETTER-Communications Systems
Cell Boundary Shifting with Power Ratio Control and Tilted Antenna Arrays in a Cellular Wireless Communications
Jie ZHOU  Shigenobu SASAKI  Hisakazu KIKUCHI  Yoshikuni ONOZATO  
Summary | Full Text:PDF (668.5KB) >>
Buy this Article


pp.2615-2617  LETTER-Source Coding/Image Processing
Conditional Lempel-Ziv Complexity and Its Application to Source Coding Theorem with Side Information
Tomohiko UYEMATSU  Shigeaki KUZUOKA  
Summary | Full Text:PDF (134.3KB) >>
Buy this Article


pp.2618-2622  LETTER-Source Coding/Image Processing
Scene-Adaptive Frame-Layer Rate Control for Low Bit Rate Video
Jae-Young PYUN  Yoon KIM  Sung-Jea KO  HwangJun SONG  
Summary | Full Text:PDF (471.1KB) >>
Buy this Article


pp.2623-2627  LETTER-Source Coding/Image Processing
Face Image Recognition by 2-Dimensional Discrete Walsh Transform and Multi-Layer Neural Network
Masahiro YOSHIDA  Takeshi KAMIO  Hideki ASAI  
Summary | Full Text:PDF (181KB) >>
Buy this Article


pp.2628-2632  LETTER-Source Coding/Image Processing
Iterative Wavelet-Based Feature Extraction for Texture Segmentation
Jing-Wein WANG  
Summary | Full Text:PDF (705.8KB) >>
Buy this Article


pp.2633-2635  LETTER-Information Security
A New Provably Secure Signature Scheme
Chik-How TAN  Xun YI  Chee-Kheong SIEW  
Summary | Full Text:PDF (142.4KB) >>
Buy this Article


pp.2636-2638  LETTER-Information Security
Internal-State Reconstruction of a Stream Cipher RC4
Yoshiaki SHIRAISHI  Toshihiro OHIGASHI  Masakatu MORII  
Summary | Full Text:PDF (146.9KB) >>
Buy this Article


Regular Section

pp.2639-2649  PAPER-Digital Signal Processing
An Efficient Algorithm for Detecting Singularity in Signals Using Wavelet Transform
Huiqin JIANG  Takashi YAHAGI  Jianming LU  
Summary | Full Text:PDF (682.1KB) >>
Buy this Article


pp.2650-2658  PAPER-Nonlinear Problems
A Fuzzy Ranking Method for Fuzzy Numbers
Jee-Hyong LEE  Kwan-Ho YOU  
Summary | Full Text:PDF (471.2KB) >>
Buy this Article


pp.2659-2669  PAPER-VLSI Design Technology and CAD
High-Level Synthesis by Ants on a Tree
Rachaporn KEINPRASIT  Prabhas CHONGSTITVATANA  
Summary | Full Text:PDF (406.1KB) >>
Buy this Article


pp.2670-2677  PAPER-Spread Spectrum Technologies and Applications
Multibits/Sequence-Period Optical CDMA Receiver with Double Optical Hardlimiters
Kenji WAKAFUJI  Tomoaki OHTSUKI  
Summary | Full Text:PDF (536.2KB) >>
Buy this Article


pp.2678-2689  PAPER-Image
Automated Edge Detection by a Fuzzy Morphological Gradient
Sathit INTAJAG  Kitti PAITHOONWATANAKIJ  
Summary | Full Text:PDF (900.9KB) >>
Buy this Article


pp.2690-2692  LETTER-Digital Signal Processing
Solution of Eigenvalue Integral Equation with Exponentially Oscillating Covariance Function
Vitaly KOBER  Josue ALVAREZ-BORREGO  Tae Sun CHOI  
Summary | Full Text:PDF (123.3KB) >>
Buy this Article


pp.2693-2699  LETTER-Systems and Control
Output Feedback Tracking Control Using a Fuzzy Disturbance Observer
Euntai KIM  Mignon PARK  
Summary | Full Text:PDF (264.9KB) >>
Buy this Article


pp.2700-2703  LETTER-Systems and Control
On Stability of Singular Systems with Saturating Actuators
Jia-Rong LIANG  Ho-Lim CHOI  Jong-Tae LIM  
Summary | Full Text:PDF (134.5KB) >>
Buy this Article


pp.2704-2709  LETTER-Graphs and Networks
Parallel Algorithms for Finding the Center of Interval and Circular-Arc Graphs
Fang Rong HSU  Man Kwan SHAN  
Summary | Full Text:PDF (348.5KB) >>
Buy this Article


pp.2710-2712  LETTER-Communication Theory and Signals
Frequency Synchronization Technique for the Multiple-Input Multiple-Output Antenna System
Mi-Jeong KIM  Kyung-Geun LEE  Hyoung-Kyu SONG  
Summary | Full Text:PDF (207.5KB) >>
Buy this Article


pp.2713-2717  LETTER-Image
Noise Removal from Highly Corrupted Color Images with Adaptive Neighborhoods
Mikhail MOZEROV  Vitaly KOBER  Tae-Sun CHOI  
Summary | Full Text:PDF (990KB) >>
Buy this Article


Previous | 
Next
go to Page Top