IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Wideband System (WBS)  (Searched in: 2015)

Search Results: Keywords 'from:2016-03-10 to:2016-03-10'

[Go to Official WBS Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 37  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, WBS 2016-03-10
09:50
Tokyo The University of Electro-Communications Studies on Sudoku Puzzle Based on Coding Theory
Nobumasa Nanami, Shinsuke Hirano, Kazuhiko Yamaguchi (UEC) IT2015-101 ISEC2015-60 WBS2015-84
Sudoku puzzle is popular in worldwide, and it has been discussed by wide variety of researchers. In the sense of coding ... [more] IT2015-101 ISEC2015-60 WBS2015-84
pp.1-6
IT, ISEC, WBS 2016-03-10
10:15
Tokyo The University of Electro-Communications Acceleration of the Arimoto algorithm for computation of random coding exponent function
Hiroki Watanabe, Hiroshi Nagaoka (UEC) IT2015-102 ISEC2015-61 WBS2015-85
The Arimoto algorithm(AA) for computation of random coding exponent function is an alternating maximixation algorithm si... [more] IT2015-102 ISEC2015-61 WBS2015-85
pp.7-12
IT, ISEC, WBS 2016-03-10
10:40
Tokyo The University of Electro-Communications Redundancy of Bayesian Code with Markov Fractal Prior Distributions
Naoya Matsukami, Tsutomu Kawabata (UEC) IT2015-103 ISEC2015-62 WBS2015-86
Bayesian code method is used as a standard in realizing a universal noiseless source code. For a memoryless source, a mi... [more] IT2015-103 ISEC2015-62 WBS2015-86
pp.13-17
IT, ISEC, WBS 2016-03-10
11:05
Tokyo The University of Electro-Communications Bayesian Estimation of the Virus Source of an Infection in a Network Using Any Prior Distribution
Ryousuke Kido, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) IT2015-104 ISEC2015-63 WBS2015-87
We model a phenomenon that a computer virus is spreading in a network as infection of the virus in a graph constructed o... [more] IT2015-104 ISEC2015-63 WBS2015-87
pp.19-24
IT, ISEC, WBS 2016-03-10
10:40
Tokyo The University of Electro-Communications Performance Evaluation on Service Area Constitution for Position Detection Method using Two Unmanned Aerial Vehicle
Hiroyasu Ishikawa, Shin Herai, Shunsuke Sato (Nihon Univ.) IT2015-105 ISEC2015-64 WBS2015-88
The Unmanned aircraft system (UAS) has been researched and developed as a temporal communication system for the emergenc... [more] IT2015-105 ISEC2015-64 WBS2015-88
pp.25-30
IT, ISEC, WBS 2016-03-10
11:05
Tokyo The University of Electro-Communications A Study on PAPR Reduction based on Iterative PTS without Side Information in OFDM Systems
Moeko Yoshida, Teruyuki Miyajima (Ibaraki Univ.) IT2015-106 ISEC2015-65 WBS2015-89
This paper proposes both a new PAPR reduction scheme for OFDM and demodulation method without side information. PAPR is ... [more] IT2015-106 ISEC2015-65 WBS2015-89
pp.31-36
IT, ISEC, WBS 2016-03-10
12:50
Tokyo The University of Electro-Communications Application of MUI cancellers using bipolar MPSC in CDMA radio communication systems
Hiroki Sato, Shinichiro Miyazaki, Tomoko K. Matsushima, Kotoku Omura, Shoichiro Yamasaki (Polytechnic Univ.) IT2015-107 ISEC2015-66 WBS2015-90
Modified prime sequence codes (MPSCs) are often used as unipolar codes in synchronous optical code division multiple acc... [more] IT2015-107 ISEC2015-66 WBS2015-90
pp.37-42
IT, ISEC, WBS 2016-03-10
13:15
Tokyo The University of Electro-Communications A Synchronization Method using Fixed-Symbol for Insertion/Deletion/Substitution Channels
Ryo Shibata, Gou Hosoya, Hiroyuki Yashima (TUS) IT2015-108 ISEC2015-67 WBS2015-91
We investigate a synchronization method over channels impaired by insertion, deletion, and substitution error (IDS chann... [more] IT2015-108 ISEC2015-67 WBS2015-91
pp.43-48
IT, ISEC, WBS 2016-03-10
13:40
Tokyo The University of Electro-Communications Relations Between Conditional Shannon Entropy and Expectation of Norm and Their Applications
Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui) IT2015-109 ISEC2015-68 WBS2015-92
The paper investigates the extremal relations between the Shannon entropy and the $ell_{alpha}$-norm. More precisely, th... [more] IT2015-109 ISEC2015-68 WBS2015-92
pp.49-54
IT, ISEC, WBS 2016-03-10
14:05
Tokyo The University of Electro-Communications The Minimum Codelength of Multiple-Uniprior Index Coding
Masaru Takahashi, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech) IT2015-110 ISEC2015-69 WBS2015-93
Index coding for sharing information via satellite communication is considered. Each receiver knows some of the messages... [more] IT2015-110 ISEC2015-69 WBS2015-93
pp.55-60
IT, ISEC, WBS 2016-03-10
14:30
Tokyo The University of Electro-Communications Intrinsic Randomness Problem for Correlated General Sources
Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech.) IT2015-111 ISEC2015-70 WBS2015-94
Muramatsu et~al. considered the problem of generating statistically independent random numbers from two correlated memor... [more] IT2015-111 ISEC2015-70 WBS2015-94
pp.61-66
IT, ISEC, WBS 2016-03-10
12:50
Tokyo The University of Electro-Communications Revisiting Isomorphism of Polynomials with Two Secrets
Bagus Santoso (UEC) IT2015-112 ISEC2015-71 WBS2015-95
The isomorphism of polynomials with two secret (IP2S) problem is one candidate of computational assumptions for post-qua... [more] IT2015-112 ISEC2015-71 WBS2015-95
pp.67-74
IT, ISEC, WBS 2016-03-10
13:15
Tokyo The University of Electro-Communications Improvement in detection performance of Tardos's fingerprinting code using detailed score distribution
Ryo Inoue, Kazuhiko Yamaguchi (UEC) IT2015-113 ISEC2015-72 WBS2015-96
Tardos proposed c-secure code based on randomness with certain distribution (Tardos’s code). The code is shorter than Bo... [more] IT2015-113 ISEC2015-72 WBS2015-96
pp.75-80
IT, ISEC, WBS 2016-03-10
13:40
Tokyo The University of Electro-Communications Collision-Free Rainbow Table Structure
Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) IT2015-114 ISEC2015-73 WBS2015-97
Rainbow table is a method to crack the password in high speed from hash values. Collision of password candidates occurs,... [more] IT2015-114 ISEC2015-73 WBS2015-97
pp.81-88
IT, ISEC, WBS 2016-03-10
14:05
Tokyo The University of Electro-Communications Message Preprocessing for MD Hash Functions
Hidenori Kuwakado (Kansai Univ.), Shoichi Hirose (Univ. of Fukui) IT2015-115 ISEC2015-74 WBS2015-98
 [more] IT2015-115 ISEC2015-74 WBS2015-98
pp.89-93
IT, ISEC, WBS 2016-03-10
14:30
Tokyo The University of Electro-Communications A Multiplier Architecture for Finite Field of 254bit-Prime Square Order Based on Pipelined 32bit Montgomery Multipliers
Yusuke Nagahama, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) IT2015-116 ISEC2015-75 WBS2015-99
Bilinear Pairing is a major tool to realize advanced cryptographic functionality such as searchable encryption, aggregat... [more] IT2015-116 ISEC2015-75 WBS2015-99
pp.95-100
IT, ISEC, WBS 2016-03-10
15:05
Tokyo The University of Electro-Communications Distance and Correlation Properties for Constant-Weight Codes from an (11,5,2)-Cyclic Difference Set
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.) IT2015-117 ISEC2015-76 WBS2015-100
In 2008 the authors proposed an extended method for constructing constant-weight code over $GF(q)$, which is generalized... [more] IT2015-117 ISEC2015-76 WBS2015-100
pp.101-106
IT, ISEC, WBS 2016-03-10
15:30
Tokyo The University of Electro-Communications The Effective Method of Improving Berlekamp-Preparata Convolutional Codes Decoding by Tail-Biting Technology
Tianyi Zhang, Masato Kitakami (Chiba Univ.) IT2015-118 ISEC2015-77 WBS2015-101
An application of convolutional codes is the burst error correcting. The terminated Berlekamp-Preparata convolutional co... [more] IT2015-118 ISEC2015-77 WBS2015-101
pp.107-112
IT, ISEC, WBS 2016-03-10
15:55
Tokyo The University of Electro-Communications On the bit error probability for constant log-MAP decoding of convolutional codes
Hideki Yoshikawa (Tohoku Gakuin Univ.) IT2015-119 ISEC2015-78 WBS2015-102
 [more] IT2015-119 ISEC2015-78 WBS2015-102
pp.113-117
IT, ISEC, WBS 2016-03-10
16:20
Tokyo The University of Electro-Communications Algebraic Construction of KV Trellises for Linear Block Codes
Masato Tajima IT2015-120 ISEC2015-79 WBS2015-103
In this paper, we present an algebraic construction of Koetter-Vardy (KV) trellises. The proposed method is based on the... [more] IT2015-120 ISEC2015-79 WBS2015-103
pp.119-124
 Results 1 - 20 of 37  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan