default search action
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume 101
Volume 101-A, Number 1, January 2018
- Kazuto Ogawa:
Foreword. 1-2 - Tsuyoshi Takagi:
Recent Developments in Post-Quantum Cryptography. 3-11 - Jung Hee Cheon, Changmin Lee, Hansol Ryu:
Cryptographic Multilinear Maps and Their Cryptanalysis. 12-18 - Hiroaki Kikuchi, Takayasu Yamaguchi, Koki Hamada, Yuji Yamaoka, Hidenobu Oguri, Jun Sakuma:
Study on Record Linkage of Anonymizied Data. 19-28 - Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
An Efficient Key Generation of ZHFE Public Key Cryptosystem. 29-38 - Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Efficient Homomorphic Encryption with Key Rotation and Security Update. 39-50 - Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada:
Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation. 51-63 - Naoto Yanai, Toru Fujiwara:
Tighter Reductions for Deterministic Identity-Based Signatures. 64-76 - Masayuki Fukumitsu, Shingo Hasegawa:
Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model. 77-87 - Kota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata:
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. 88-98 - Subhadeep Banik, Takanori Isobe, Masakatu Morii:
On Design of Robust Lightweight Stream Cipher with Short Internal State. 99-109 - Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida:
A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Applications. 110-118 - Minoru Kuribayashi, Nobuo Funabiki:
Universal Scoring Function Based on Bias Equalizer for Bias-Based Fingerprinting Codes. 119-128 - Risa Yashiro, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Sakiyama:
Q-Class Authentication System for Double Arbiter PUF. 129-137 - Haruna Higo, Toshiyuki Isshiki, Kengo Mori, Satoshi Obana:
Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks. 138-148 - Sven Wohlgemuth, Kazuo Takaragi:
Privacy-Enhancing Trust Infrastructure for Process Mining. 149-156 - Qiang Gao, Wenping Ma, Wei Luo, Feifei Zhao:
Hash-Chain Improvement of Key Predistribution Schemes Based on Transversal Designs. 157-159
- Fumiaki Maehara:
Foreword. 160 - Tomohiro Araki:
Current Trends in Space Optical Communication Around the World and Its R&D Activities in JAXA. 161-166 - Takahiro Matsumoto, Hideyuki Torii, Yuta Ida, Shinya Matsufuji:
BER Performance of SS System Using a Huffman Sequence against CW Jamming. 167-175 - Masayuki Kinoshita, Takaya Yamazato, Hiraku Okada, Toshiaki Fujii, Shintaro Arai, Tomohiro Yendo, Koji Kamakura:
Simplified Vehicle Vibration Modeling for Image Sensor Communication. 176-184 - Huan-Bang Li, Ryu Miura, Hisashi Nishikawa, Toshinori Kagawa, Fumihide Kojima:
Proposals and Implementation of High Band IR-UWB for Increasing Propagation Distance for Indoor Positioning. 185-194 - Yasuaki Ohira, Takahiro Matsumoto, Hideyuki Torii, Yuta Ida, Shinya Matsufuji:
A Compact Matched Filter Bank for an Optical ZCZ Sequence Set with Zero-Correlation Zone 2z. 195-198
- Tomoki Hayashi, Masafumi Nishida, Norihide Kitaoka, Tomoki Toda, Kazuya Takeda:
Daily Activity Recognition with Large-Scaled Real-Life Recording Datasets Based on Deep Neural Network Using Multi-Modal Signals. 199-210 - Keisuke Yamada, Hironobu Takahashi, Ryuzo Horiuchi:
Availability of Reference Sound Sources for Qualification of Hemi-Anechoic Rooms Based on Deviation of Sound Pressure Level from Inverse Square Law. 211-218 - Li Zhang, Dawei Li, Xuecheng Zou, Yu Hu, Xiaowei Xu:
Scalable and Parameterized Architecture for Efficient Stream Mining. 219-231 - Hiroki Osawa, Akira Suzuki, Takehiro Ito, Xiao Zhou:
The Complexity of (List) Edge-Coloring Reconfiguration Problem. 232-238 - Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Efficient Three-Way Split Formulas for Binary Polynomial Multiplication and Toeplitz Matrix Vector Product. 239-248 - Mitsuharu Arimura:
A Variable-to-Fixed Length Lossless Source Code Attaining Better Performance than Tunstall Code in Several Criterions. 249-258 - Taichi Yoshida, Masahiro Iwahashi, Hitoshi Kiya:
Two-Layer Lossless Coding for High Dynamic Range Images Based on Range Compression and Adaptive Inverse Tone-Mapping. 259-266 - Ryo Fujimoto, Takanori Fujisawa, Masaaki Ikehara:
Sub-Pixel Shift Estimation of Image Based on the Least Squares Approximation in Phase Region. 267-272 - Jinyang Song, Feng Shen, Xiaobo Chen, Di Zhao:
Robust Sparse Signal Recovery in Impulsive Noise Using Bayesian Methods. 273-278 - Meng Zhang, Maozhi Xu:
Generating Pairing-Friendly Elliptic Curves Using Parameterized Families. 279-282 - Kai Liu, Panpan Chen:
Construction of Zero Correlation Zone Sequence Sets over the 16-QAM Constellation. 283-286 - Yang Xiao, Limin Li, Jiachao Chang, Kang Wu, Guang Liang, Jinpei Yu:
A Novel GPS Based Real Time Orbit Determination Using Adaptive Extended Kalman Filter. 287-292 - Ding Xu, Qun Li:
Legitimate Surveillance with a Wireless Powered Monitor in Rayleigh Fading Channels. 293-297 - Zhe Wei, Fang Wang:
On Mitigating On-Off Attacks in Wireless Sensor Networks. 298-301 - Yu-Long Qiao, Zheng-Yi Xing:
Dynamic Texture Classification Using Multivariate Hidden Markov Model. 302-305 - Ming Xu, Xiaosheng Yu, Chengdong Wu, Dongyue Chen:
Saliency Detection Based Region Extraction for Pedestrian Detection System with Thermal Imageries. 306-310
Volume 101-A, Number 2, February 2018
- Shingo Yamaguchi:
Foreword. 312 - Ami Sakakibara, Toshimitsu Ushio:
Hierarchical Control of Concurrent Discrete Event Systems with Linear Temporal Logic Specifications. 313-321 - Shumpei Yoshikawa, Koichi Kobayashi, Yuh Yamashita:
Quantized Event-Triggered Control of Discrete-Time Linear Systems with Switching Triggering Conditions. 322-327 - Hiroki Yamada, Shigemasa Takai:
Nonblocking Similarity Control of Nondeterministic Discrete Event Systems under Event and State Observations. 328-337 - Kazuyuki Ishikawa, Naoki Hayashi, Shigemasa Takai:
Consensus-Based Distributed Particle Swarm Optimization with Event-Triggered Communication. 338-344 - Toshiki Kinoshita, Toshiyuki Miyamoto:
Realizability of Choreography Given by Two Scenarios. 345-356 - Satoshi Taoka, Tadachika Oki, Toshiya Mashima, Toshimasa Watanabe:
Reduction of Constraints from Multipartition to Bipartition in Augmenting Edge-Connectivity of a Graph by One. 357-366 - Andrea Veronica Porco, Ryosuke Ushijima, Morikazu Nakamura:
Automatic Generation of Mixed Integer Programming for Scheduling Problems Based on Colored Timed Petri Nets. 367-372
- Tadashi Maeda:
Foreword. 373 - Kazuaki Kunihiro, Shinichi Hori, Tomoya Kaneko:
High Efficiency Power Amplifiers for Mobile Base Stations: Recent Trends and Future Prospects for 5G. 374-384 - Satoshi Tanaka:
Progress of the Linear RF Power Amplifier for Mobile Phones. 385-395 - Sonshu Sakihara, Satoshi Kitabayashi, Naoki Sakai, Takashi Ohira:
Far-End Reactor Matching to a Traveling Load Along an RF Power Transmission Line. 396-401 - Toru Yazaki, Norio Chujo, Takeshi Takemoto, Hiroki Yamashita, Akira Hyogo:
25-Gbps 3-mW/Gbps/ch VCSEL Driver Circuit in 65-nm CMOS for Multichannel Optical Transmitter. 402-409 - Md. Maruf Hossain, Tetsuya Iizuka, Toru Nakura, Kunihiro Asada:
Optimal Design Method of Sub-Ranging ADC Based on Stochastic Comparator. 410-424 - Chunhui Pan, Hao San:
A 2nd-Order ΔΣAD Modulator Using Dynamic Analog Components with Simplified Operation Phase. 425-433 - He Jiu Zhang, Ning Mei Yu, Nan Lyu, Keren Li:
Two-Step Column-Parallel SAR/Single-Slope ADC for CMOS Image Sensors. 434-437 - Xianliang Luo, Yingmei Chen, Mohamed Atef, Guoxing Wang:
A 44Gbit/s Wide-Dynamic Range and High-Linearity Transimpedance Amplifier in 130nm BiCMOS Technology. 438-440 - Yuka Itano, Taishi Kitano, Yuta Sakamoto, Kiyotaka Komoku, Takayuki Morishita, Nobuyuki Itoh:
Modeling and Layout Optimization of MOM Capacitor for High-Frequency Applications. 441-446
- Akimitsu Doi, Takao Hinamoto, Wu-Sheng Lu:
Analysis and Minimization of l2-Sensitivity for Block-State Realization of IIR Digital Filters. 447-459 - Takao Sato, Akira Yanou, Shiro Masuda:
Ripple-Free Dual-Rate Control with Two-Degree-of-Freedom Integrator. 460-466 - Kotaro Matsumoto, Kazuyoshi Takagi, Naofumi Takagi:
Algorithms for Evaluating the Matrix Polynomial I+A+A2+...+AN-1 with Reduced Number of Matrix Multiplications. 467-471 - Tin Nilar Win, Htoo Htoo, Yutaka Ohsawa:
Safe-Region Generation Method for Versatile Continuous Vicinity Queries in the Road Network Distance. 472-480 - Limin Chen, Jing Xu, Peter Xiaoping Liu, Hui Yu:
A RGB-Guided Low-Rank Method for Compressive Hyperspectral Image Reconstruction. 481-487 - Shinya Mochiduki, Yuki Yokoyama, Keigo Sukegawa, Hiroki Sato, Miyuki Suganuma, Mitsuho Yamada:
Measurement of Accommodation and Convergence Eye Movement when a Display and 3D Movie Move in the Depth Direction Simultaneously. 488-498 - Hiroomi Hikawa, Masayuki Tamaki, Hidetaka Ito:
Off-Chip Training with Additive Perturbation for FPGA-Based Hand Sign Recognition System. 499-506 - Li Juan Deng, Ping Wei, Yan Shen Du, Hua Guo Zhang:
A Semidefinite Programming Approach for Doppler Frequency Shift Based Stationary Target Localization. 507-511 - Fidaa Abed, Ishtiaq Rasool Khan, Susanto Rahardja:
A New Four-Channel Format for Encoding of HDR Images. 512-515 - Yu Min Hwang, Jun Hee Jung, Yoan Shin, Jin Young Kim, Dong In Kim:
Optimal Transmission Policy in Decoupled RF Energy Harvesting Networks. 516-520 - Wen Sun, Lin Gao, Ping Wei, Hua Guo Zhang, Ming Chen:
Particle Filtering Based TBD in Single Frequency Network. 521-525 - Yuqiang Cao, Weiguo Gong, Bo Zhang, Fanxin Zeng, Sen Bai:
Two-Dimensional Compressed Sensing Using Two-Dimensional Random Permutation for Image Encryption-then-Compression Applications. 526-530 - Junya Hiramatsu, Motohiko Isaka:
Lossy Source Coding for Non-Uniform Binary Source with Trellis Codes. 531-534 - Peng Zhao, Jianjun Mu, Yu-Cheng He, Xiaopeng Jiao:
Multipermutation Codes Correcting a Burst of Deletions. 535-538 - Thanh-Dat Le, Oh-Soon Shin:
Outage-Optimal Energy Harvesting Schemes in Relay-Assisted Cognitive Radio Networks. 539-543 - Van-Hiep Vu, Insoo Koo:
Joint Attack-Defense Strategy Based on Game Theory for Cognitive Devices in Covert Communication Networks. 544-548 - Phuc Nguyen Hong, Jaehoon (Paul) Jeong, Chang Wook Ahn:
Lug Position and Orientation Detection for Robotics Using Maximum Trace Bee Colony. 549-552
Volume 101-A, Number 3, March 2018
- Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng:
Implementing 128-Bit Secure MPKC Signatures. 553-569 - Takuya Kusaka:
Analysis of a Sufficient Condition on the Optimality of a Decoded Codeword of Soft-Decision Decodings for Binary Linear Codes on a 4-Level Quantization over an AWGN Channel. 570-576 - Furqan Haider Qureshi, Qasim Umar Khan, Shahzad Amin Sheikh, Muhammad Zeeshan:
Symbol Error Probability Performance of Rectangular QAM with MRC Reception over Generalized α-µ Fading Channels. 577-584 - Wenhua Shi, Xiongwei Zhang, Xia Zou, Meng Sun, Wei Han, Li Li, Gang Min:
Deep Neural Network Based Monaural Speech Enhancement with Low-Rank Analysis and Speech Present Probability. 585-589 - Heemang Song, Seunghoon Cho, Kyung-Jin You, Hyun-Chool Shin:
Improving DOA Estimation and Preventing Target Split Using Automotive Radar Sensor Arrays. 590-594 - Jidong Qin, Jiandong Zhu, Huafeng Peng, Tao Sun, Dexiu Hu:
The Estimation of Satellite Attitude Using the Radar Cross Section Sequence and Particle Swarm Optimization. 595-599 - Fengde Jia, Zishu He:
Clutter Rank Estimation for Diving Platform Radar. 600-603 - Shanqi Pang, Miao Feng, Xunan Wang, Jing Wang:
Construction of Permutations and Bent Functions. 604-607 - Min Dong, Yanli Ren, Guorui Feng:
Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server. 608-611 - Yubo Li, Liying Tian, Shengyi Liu:
Optimal ZCZ Complementary Sequence Sets with Low Column Sequence PMEPR. 612-616 - Haiyang Liu, Yan Li, Lianrong Ma:
On the Second Separating Redundancy of LDPC Codes from Finite Planes. 617-622 - Biao Wang, Xiaopeng Jiao, Jianjun Mu, Zhongfei Wang:
Efficient Early Termination Criterion for ADMM Penalized LDPC Decoder. 623-626 - Hao Zheng, Xingan Xu, Changwei Lv, Yuanfang Shang, Guodong Wang, Chunlin Ji:
Adaptive Extrinsic Information Scaling for Concatenated Zigzag Codes Based on Max-Log-APP. 627-631 - Rajesh Ramanathan, Partha Sharathi Mallick, Thiruvengadam Sundarajan Jayaraman:
Low Complexity Compressive Sensing Greedy Detection of Generalized Quadrature Spatial Modulation. 632-635 - Byungcheol Kang, Jaeseok Kim:
Highly Reliable Multicast Protocol Using Relay Retransmission for WLANs. 636-639 - Yulong Shang, Hojun Kim, Hosung Park, Taejin Jung:
Generalized Spatial Modulation Based on Quaternary Quasi-Orthogonal Sequences. 640-643 - Huiling Hou, Weisheng Hu, Kang Wu, Xuwen Liang:
On-Orbit Estimation and Calibration of GPS Antenna Geometry Offsets for Attitude Determination of LEO Satellites. 644-648 - Sungjun Kim, Daehee Kim, Sunshin An:
Efficient Query Dissemination Scheme for Wireless Heterogeneous Sensor Networks. 649-653 - Yang Li, Zhuang Miao, Ming He, Yafei Zhang, Hang Li:
Deep Attention Residual Hashing. 654-657 - Yuan Gao, Chengdong Wu, Xiaosheng Yu, Wei Zhou, Jiahui Wu:
Full-Automatic Optic Disc Boundary Extraction Based on Active Contour Model with Multiple Energies. 658-661 - Ryo Watanabe, Junpei Komiyama, Atsuyoshi Nakamura, Mineichi Kudo:
UCB-SC: A Fast Variant of KL-UCB-SC for Budgeted Multi-Armed Bandit Problem. 662-667
Volume 101-A, Number 4, April 2018
- Jun Wang, Yuanyun Wang, Chengzhi Deng, Shengqian Wang, Yong Qin:
Regularized Kernel Representation for Visual Tracking. 668-677 - Ryosuke Adachi, Yuh Yamashita:
Delay-Compensated Maximum-Likelihood-Estimation Method and Its Application for Quadrotor UAVs. 678-684 - Yusuke Kimura, Amir Masoud Gharehbaghi, Masahiro Fujita:
C Description Reconstruction Method from a Revised Netlist for ECO Support. 685-696 - Kenji Yasunaga, Kosuke Yuzawa:
Repeated Games for Generating Randomness in Encryption. 697-703 - Xiumin Shen, Yanguo Jia, Xiaofei Song, Yubo Li:
New Construction Methods for Binary Sequence Pairs of Period pq with Ideal Two-Level Correlation. 704-712 - Hiromu Endo, Akira Taguchi:
Color Image Enhancement Method with Variable Emphasis Degree. 713-722 - Jinguang Hao, Gang Wang, Lili Wang, Honggang Wang:
Optimal Design of Notch Filter with Principal Basic Vectors in Subspace. 723-726 - Seitaro Koyama, Shunsuke Aoki, Toshimichi Saito:
Simple Feature Quantities for Analysis of Periodic Orbits in Dynamic Binary Neural Networks. 727-730 - Muhammad ElSheikh, Mohamed Tolba, Amr M. Youssef:
Impossible Differential Attack on Reduced Round SPARX-128/256. 731-733 - Zhengqiang Wang, Chen-chen Wen, Zi-fu Fan, Xiaoyu Wan:
Energy-Efficient Power Allocation with Rate Proportional Fairness Constraint in Non-Orthogonal Multiple Access Systems. 734-737
Volume 101-A, Number 5, May 2018
- Zhangkai Luo, Huali Wang:
Dual-Polarized Phased Array Based Polarization State Modulation for Physical-Layer Secure Communication. 740-747 - Kenya Kondo, Koichi Tanno, Hiroki Tamura, Shigetoshi Nakatake:
Low Voltage CMOS Current Mode Reference Circuit without Operational Amplifiers. 748-754 - Mengyang Li, Mingcong Deng:
Operator-Based Reset Control for Nonlinear System with Unknown Disturbance. 755-762 - Nawfal Al-Zubaidi R.-Smith, Lubomír Brancík:
Proposed Hyperbolic NILT Method - Acceleration Techniques and Two-Dimensional Expansion for Electrical Engineering Applications. 763-771 - Xuehou Tan, Bo Jiang:
The Touring Polygons Problem Revisited. 772-777 - Lei Chen, Wei Lu, Ergude Bao, Liqiang Wang, Weiwei Xing, Yuanyuan Cai:
Naive Bayes Classifier Based Partitioner for MapReduce. 778-786 - Bagus Santoso:
Reviving Identification Scheme Based on Isomorphism of Polynomials with Two Secrets: a Refined Theoretical and Practical Analysis. 787-798 - Leilei Kong, Zhongyuan Han, Haoliang Qi, Zhimao Lu:
A Ranking-Based Text Matching Approach for Plagiarism Detection. 799-810 - Guan Yuan, Mingjun Zhu, Shaojie Qiao, Zhixiao Wang, Lei Zhang:
Sparse High-Noise GPS Trajectory Data Compression and Recovery Based on Compressed Sensing. 811-821