Journal: IEICE Transactions

Volume 103-A, Issue 3

582 -- 588Keisuke Okano, Takaki Itatsu, Naoto Sasaoka, Yoshio Itoh. Auxiliary-Noise Power-Scheduling Method for Online Secondary Path Modeling in Pre-Inverse Active Noise Control System
589 -- 595Yuma Murakawa, Yuhei Sadanda, Takashi Hikihara. Parallelization of Boost and Buck Type DC-DC Converters by Individual Passivity-Based Control
596 -- 604Daichi Watari, Ittetsu Taniguchi, Takao Onoye. SOH Aware System-Level Battery Management Methodology for Decentralized Energy Network
605 -- 612Tianyi Zhang, Masato Kitakami. Tail-Biting Berlekamp-Preparata Convolutional Codes for Phased-Burst-Error-Correcting
613 -- 622Koji Ishii. Slotted-ALOHA Based Average Consensus Problem with Adaptive Call-Occurrence Probability
623 -- 628Zhaoyang Qiu, Qi Zhang, Minhong Sun, Jun Zhu 0009. Parameter Estimation for Multiple Chirp Signals Based on Single Channel Nyquist Folding Receiver
629 -- 630Yuya Hosoda, Arata Kawamura, Youji Iiguni. An Efficient Image to Sound Mapping Method Preserving Speech Spectral Envelope
631 -- 633Wenhua Zhang, Shidong Zhang, Yong Wang 0032, Jianpeng Wang. q-Ary Cyclic Codes with Optimal Parameters
634 -- 637Chao He, Rong Luo, Mei Yang. A Class of Binary Cyclic Codes and Their Weight Distributions
638 -- 642Pengli Yang, Fuqi Mu. Outage Performance of Multi-Carrier Relay Selections in Multi-Hop OFDM with Index Modulation
643 -- 648Lin Du, Chang Tian, Mingyong Zeng, Jiabao Wang, Shanshan Jiao, Qing Shen, Guodong Wu. Dual Network Fusion for Person Re-Identification

Volume 103-A, Issue 2

389 -- 0Toshiyuki Miyamoto. Foreword
390 -- 397Yuta Hasegawa, Takafumi Kanazawa. Game Theoretic Analysis of Incentive-Based Power Consumption Reduction Problems with For-Profit or Nonprofit Aggregator
398 -- 406Kazuki Nakada, Keiji Miura. Mathematical Analysis of Phase Resetting Control Mechanism during Rhythmic Movements
407 -- 416Ryo Hase, Norihiko Shinomiya. An Evolutionary Game for Analyzing Switching Behavior of Consumers in Electricity Retail Markets
417 -- 427Shimpei Miura, Shigemasa Takai. Decentralized Supervisory Control of Timed Discrete Event Systems with Conditional Decisions for Enforcing Forcible Events
428 -- 434Naoki Hayashi, Kazuyuki Ishikawa, Shigemasa Takai. Distributed Subgradient Method for Constrained Convex Optimization with Quantized and Event-Triggered Communication
435 -- 442Naoki Hayashi, Yuichi Kajiyama, Shigemasa Takai. Consensus-Based Quantized Algorithm for Convex Optimization with Smooth Cost Functions
443 -- 450Shun Andoh, Koichi Kobayashi, Yuh Yamashita. Self-Triggered Pinning Consensus Control for Multi-Agent Systems
451 -- 461Takashi Tomita, Daisuke Ishii, Toru Murakami, Shigeki Takeuchi, Toshiaki Aoki. Template-Based Monte-Carlo Test-Suite Generation for Large and Complex Simulink Models
462 -- 468Ryo Masuda, Koichi Kobayashi, Yuh Yamashita. Dynamic Surveillance by Multiple Agents with Fuel Constraints
469 -- 477Ryosuke Adachi, Yuh Yamashita, Koichi Kobayashi. Distributed Observer over Delayed Sensor Networks for Systems with Unknown Inputs
478 -- 485Shunsuke Yamaki, Ryo Suzuki, Makoto Yoshizawa. Statistical Analysis of Phase-Only Correlation Functions Between Two Signals with Stochastic Phase-Spectra Following Bivariate Circular Probability Distributions
486 -- 491Kenya Kondo, Hiroki Tamura, Koichi Tanno. High-PSRR, Low-Voltage CMOS Current Mode Reference Circuit Using Self-Regulator with Adaptive Biasing Technique
492 -- 501Yuma Abe, Masaki Ogura, Hiroyuki Tsuji, Amane Miura, Shuichi Adachi. Resource and Network Management Framework for a Large-Scale Satellite Communications System
502 -- 509Hau Sim Choo, Chia Yee Ooi, Michiko Inoue, Nordinah Ismail, Mehrdad Moghbel, Chee Hoo Kok. Register-Transfer-Level Features for Machine-Learning-Based Hardware Trojan Detection
510 -- 522Miki Miyauchi. Topological Stack-Queue Mixed Layouts of Graphs
523 -- 532Satoshi Mizutani, Xufeng Zhao, Toshio Nakagawa. Which Replacement Is Better at Working Cycles or Number of Failures
533 -- 537Xiaobo Zhang, Wenbo Xu 0003, Yan Tian, Jiaru Lin, Wenjun Xu. Improved Analysis for SOMP Algorithm in Terms of Restricted Isometry Property
538 -- 541Tatsuya Fujii, Kohsei Araki, Kazuhiro Shouno. Synthesis of a Complex Prototype Ladder Filter Excluding Inductors with Finite Transmission Zeros Suitable for Fully Differential Gm-C Realization
542 -- 546Meiting Xue, Huan Zhang 0004, Weijun Li, Feng Yu. Sorting Matrix Architecture for Continuous Data Sequences
547 -- 552Fanxin Zeng, Xiping He, Guixin Xuan, Zhenyu Zhang 0001, Yanni Peng, Li Yan. A Family of New 16-QAM Golay Complementary Sequences without Higher PEP Upper Bounds
553 -- 555Hao Liang 0004, Aijun Liu, Heng Wang, Kui Xu 0001. Adaptive HARQ Transmission of Polar Codes with a Common Information Set
556 -- 562Shanqi Pang, Yongmei Li, Rong Yan. Schematic Orthogonal Arrays of Strength Two
563 -- 566You-Zhu Li, Yongqiang Jia, Hong Shu Liao. Radiometric Identification Based on Parameters Estimation of Transmitter Imperfections
567 -- 570Hyeok Koo Jung. Sign Reversal Channel Switching Method in Space-Time Block Code for OFDM Systems
571 -- 575Guowei Teng, Hao Li, Zhenglong Yang. Temporal Domain Difference Based Secondary Background Modeling Algorithm
576 -- 579Ziming He. On Performance of Deep Learning for Harmonic Spur Cancellation in OFDM Systems
580 -- 581Hideyuki Imai. Shift Invariance Property of a Non-Negative Matrix Factorization

Volume 103-A, Issue 1

1 -- 0Atsushi Fujioka. Foreword
2 -- 10Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida. Towards Minimizing RAM Requirement for Implementation of Grain-128a on ARM Cortex-M3
11 -- 20Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto. Laser-Induced Controllable Instruction Replacement Fault Attack
21 -- 32Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka. Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications
33 -- 40Junichi Tomida, Masayuki Abe, Tatsuaki Okamoto. Efficient Inner Product Functional Encryption with Full-Hiding Security
41 -- 73Tatsuaki Okamoto, Katsuyuki Takashima. Decentralized Attribute-Based Encryption and Signatures
74 -- 106Katsuyuki Takashima. Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
107 -- 113Junichiro Hayata, Masahito Ishizaka, Yusuke Sakai 0001, Goichiro Hanaoka, Kanta Matsuura. Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
114 -- 124Yu Zhang, Yansong Zhao, Yifan Wang, Yin Li. Searchable Public Key Encryption Supporting Simple Boolean Keywords Search
125 -- 140Keita Emura, Takuya Hayashi 0001. A Revocable Group Signature Scheme with Scalability from Simple Assumptions
141 -- 149Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki. A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption
150 -- 164Goichiro Hanaoka, Yusuke Sakai 0001, Toshiya Shimizu, Takeshi Shimoyama, SeongHan Shin. A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications
165 -- 172Yusuke Sakai 0001, Goichiro Hanaoka. Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model
173 -- 182Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi. On the Complexity of the LWR-Solving BKW Algorithm
183 -- 194Satoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai 0001, Fuyuki Kitagawa, Yutaka Kawai, Goichiro Hanaoka. Verifiable Privacy-Preserving Data Aggregation Protocols
195 -- 211Seiko Arita, Sari Handa. Fully Homomorphic Encryption Scheme Based on Decomposition Ring
212 -- 214Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Takanori Isobe 0001. Security of Related-Key Differential Attacks on TWINE, Revisited
215 -- 220Xiaochen Liu, Yuanyuan Gao, Nan Sha, Guozhen Zang, Kui Xu 0001. Secrecy Rate Optimization for RF Powered Two-Hop Untrusted Relay Networks with Non-Linear EH Model
221 -- 224Shaojing Fu, Yunpeng Yu, Ming Xu 0002. A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations
225 -- 0Takayoshi Yokota. Foreword
226 -- 230Koichi Sakai. Public Transport Promotion and Mobility-as-a-Service
231 -- 242Mahmud Dwi Sulistiyo, Yasutomo Kawanishi, Daisuke Deguchi, Ichiro Ide, Takatsugu Hirayama, Jiang Yu Zheng, Hiroshi Murase. Attribute-Aware Loss Function for Accurate Semantic Segmentation Considering the Pedestrian Orientations
243 -- 251Akira John Suzuki, Masahiro Yamamoto, Kiyoshi Mizui. Visible Light V2V Communication and Ranging System Prototypes Using Spread Spectrum Techniques
252 -- 264Abraham Monrroy, Eijiro Takeuchi, Shinpei Kato, Masato Edahiro. An Open Multi-Sensor Fusion Toolbox for Autonomous Vehicles
265 -- 267Chi-Hua Chen. A Cell Probe-Based Method for Vehicle Speed Estimation
268 -- 0Minoru Okada. Foreword
269 -- 277Huan-Bang Li, Kenichi Takizawa, Fumihide Kojima. Accelerating Outdoor UWB - Domestic Regulation Transition and Standardization within IEEE 802.15
278 -- 286Takamasa Shimada, Noriko Konno, Atsuya Yokoi, Noriharu Miyaho. Psychological and Physiological Effects of Visible Light Communication Using Versatile CSK Code Patterns
287 -- 294Ran Sun, Hiromasa Habuchi, Yusuke Kozawa. Free Space Optical Turbo Coded Communication System with Hybrid PPM-OOK Signaling
295 -- 296Deng-Fong Lu, Chin Hsia, Kun-Chu Lee. An Integrated Wideband Operational Transconductance Amplifier with Complementary Slew-Rate Enhancer
297 -- 302Yun Zhang, Bingrui Li, Shujuan Yu, Meisheng Zhao. Blind Detection Algorithm Based on Spectrum Sharing and Coexistence for Machine-to-Machine Communication
303 -- 312Sou Nobukawa, Hirotaka Doho, Natsusaku Shibata, Haruhiko Nishimura, Teruya Yamanishi. Chaos-Chaos Intermittency Synchronization Controlled by External Feedback Signals in Chua's Circuits
313 -- 324Takanori Isobe 0001, Kazuhiko Minematsu. Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
325 -- 333Ramy Taki ElDin, Hajime Matsui. Run-Length Constraint of Cyclic Reverse-Complement and Constant GC-Content DNA Codes
334 -- 345Toshihiro Niinomi, Hideki Yagi, Shigeichi Hirasawa. Decision Feedback Scheme with Criterion LR+Th for the Ensemble of Linear Block Codes
346 -- 355Shu Fujita, Keita Takahashi, Toshiaki Fujii. Good Group Sparsity Prior for Light Field Interpolation
356 -- 360Xingyu Zhang, Xia Zou, Meng Sun 0001, Penglong Wu, Yimin Wang, Jun He. On the Complementary Role of DNN Multi-Level Enhancement for Noisy Robust Speaker Recognition in an I-Vector Framework
361 -- 365Wei Jhang, Shiaw-Wu Chen, Ann-Chen Chang. Computationally Efficient DOA Estimation for Massive Uniform Linear Array
366 -- 369Deng Tang. A Note on the Algebraic Immunity of the Enhanced Boolean Functions
370 -- 375Yang Ding, Xiaohua Lu. Galois Hulls of Cyclic Codes over Finite Fields
376 -- 381Feng Liu 0004, Xuecheng He, Conggai Li, YanLi Xu. CsiNet-Plus Model with Truncation and Noise on CSI Feedback
382 -- 388Shengnan Yan, Mingxin Liu, Jingjing Si. Distributed Collaborative Spectrum Sensing Using 1-Bit Compressive Sensing in Cognitive Radio Networks