Abstract is missing.
- Constructions of Gaussian integer Z-periodic complementary sequence setsXiaoyu Chen, Yubo Li, Xiuping Peng, Hongbin Lin. 4-8 [doi]
- A new method to construct golay complementary set and near-complementary set by paraunitary matricesDongxu Ma, Zilong Wang, Guang Gong, Hui Li 0006. 9-13 [doi]
- New optimal binary Z-complementary pairs of odd lengthsAvik Ranjan Adhikary, Sudhan Majhi, Zilong Liu, Yong Liang Guan. 14-18 [doi]
- Doppler resilient Z-complementary waveforms from ESP sequencesJiahuan Wang, Pingzhi Fan, Yang Yang, Zilong Liu, Yong Liang Guan. 19-23 [doi]
- A method to construct complementary sets of non-power-of-two length by concatenationZilong Wang, Erzhong Xue, Jinjin Chai. 24-28 [doi]
- Raptor decoding for high overloaded wireless super-dense networksI. Nyoman Apraz Ramatryana, Khoirul Anwar. 29-33 [doi]
- An opportunistic-bit transmission scheme with enhanced spectral efficiencyYingyang Chen, Mingxi Yin, Bingli Jiao. 34-38 [doi]
- Capacity results on the multiple-access wiretap channel with noiseless feedbackBin Dai. 39-43 [doi]
- A theoretical analysis of visible-light variable N-parallel code-shift-keying in LOS indoor environmentsKeisuke Osawa, Hiromasa Habuchi, Yusuke Kozawa. 44-48 [doi]
- Reinhard's global operator based inverse tone mapping with one parameterYuma Kinoshita, Sayaka Shiota, Hitoshi Kiya. 49-53 [doi]
- Speeding up image identification with visually protected features for JPEG imageKenta Iida, Hitoshi Kiya. 54-58 [doi]
- Lattice adaptive filtering-based method for acoustic feedback cancellation in hearing aids with robustness against sudden changes in the feedback pathMuhammad Tahir Akhtar, Akinori Nishihara. 59-63 [doi]
- On the security of block scrambling-based image encryption including JPEG distorsion against jigsaw puzzle solver attacksTatsuya Chuman, Hitoshi Kiya. 64-68 [doi]
- Linear complexity of generalized NTU sequencesKazuyoshi Tsuchiya, Chiaki Ogawa, Yasuyuki Nogami, Satoshi Uehara. 74-78 [doi]
- A kind of disjoint cyclic perfect mendelsohn difference family and its applications in strictly optimal FHSsShanding Xu, Xiwang Cao, Chunming Tang. 79-83 [doi]
- Linear complexity of pseudo random binary sequence generated by trace function and Legendre symbol over proper sub extension fieldAli Md. Arshad, Takeru Miyazaki, Shoji Heguri, Yasuyuki Nogami, Satoshi Uehara, Robert Morelos-Zaragoza. 84-88 [doi]
- The effect of carrier frequency offsets on an IDMA-UFMC systemJui-Hsien Hsieh, Ming-Fu Tang, Mao Chao Lin, Borching Su. 89-93 [doi]
- Coded random access with simple header detection for finite length wireless IoT networksKhoirul Anwar, Juansyah, Budi Syihabuddin, Nachwan Mufti Adriansyah. 94-98 [doi]
- Impact of framed-DOOK optical wireless system using error correcting codesRan Sun, Hiromasa Habuchi, Yusuke Kozawa. 99-102 [doi]
- A class of two-weight and three-weight codes from a certain non-quadratic functionGuangkui Xu, Xiwang Cao, Wei Du, Gaojun Luo. 103-107 [doi]
- Constructions of asymmetric binary ZCZ sequence setsTao Liu, Yubo Li, Chengqian Xu, Xiaoyu Chen. 108-111 [doi]
- New perfect sequences from Helleseth-Gong sequencesYang Yang, Yong Wang. 112-116 [doi]
- A construction of optimal generators of odd lengths for perfect sequence familiesMin Kyu Sonq, Gangsan Kim, Hong-Yeop Song. 117-121 [doi]
- Construction of ZCZ Huffman sequences for underground multiplexing sonarYoshihiro Tanada, Kiminori Sato, Masato Iguchi, Baiko Sai. 122-126 [doi]
- A study on a digital watermarking technique for music data using distortion effectYuto Matsunaga, Tetsuya Kojima, Naofumi Aoki, Yoshinori Dobashi, Tsuyoshi Yamamoto. 131-134 [doi]
- On the host signal approximation for image data hiding scheme based on complete complementary codesTetsuya Kojima, Kakeru Kato. 135-139 [doi]
- Novel authentication scheme with pseudorandom sequences in the frequency domain of imagesPatrick Vicky, Udaya Parampalli. 140-144 [doi]
- Three hop AF relay transmissions for OFDM applying real and imaginary TFI pilot signalsYuta Ida, Takahiro Matsumoto, Shinya Matsufuji. 145-148 [doi]
- New two-layered pseudo-noise code for optical-wireless code-shift keying/SCDMATakashi Tokunaga, Hiromasa Habuchi, Yusuke Kozawa. 149-153 [doi]
- A study on PAPR reduction in OFDM using complex hadamard matricesZeming Dong, Shinya Matsufuji, Yuta Ida, Takahiro Matsumoto. 154-158 [doi]
- Influence of ISI on synchronous OCDMA system using an optical ZCZ sequence set on a diffuse channelTakahiro Matsumoto, Masanori Kurashita, Yasuaki Ohira, Hideyuki Torii, Yuta Ida, Shinya Matsufuji. 159-163 [doi]
- Semi-bent functions with perfect three-level additive autocorrelationDeng Tang, Yang Yang, Shaojing Fu. 164-168 [doi]
- A lower bound on the 2-adic complexity of Whiteman's generalized cyclotomic sequences of order 4 with length pqYuhua Sun, Qiang Wang, Qiuyan Wang, Tongjiang Yan. 169-172 [doi]
- Sequence design for optimized ambiguity function and PAPR under arbitrary spectrum hole constraintTianjun Liu, Pingzhi Fan, Jiangdong Li, Yang Yang, Zilong Liu, Yong Liang Guan. 173-177 [doi]
- On the consecutive sets of defining sequence for lower bounds on cyclic codesJunru Zheng, Takayasu Kaida. 178-181 [doi]
- Some properties of Z4 sequences obtained by using the gray code mapping from two binary m-sequencesMasahiro Goto, Satoshi Uehara, Yasuyuki Nogami. 182-186 [doi]
- A class of linear codes with two and three weightsXiaodan Li, Xiaoni Du, Hongxia Lv, Liping Zhaq. 187-190 [doi]
- A lower bound on the second-order nonlinearity of the class of Maiorana-McFarland bent functionsQi Gao, Deng Tang. 191-195 [doi]
- Interpretation of polar codes with Plotkin construction based on Gaussian approximationJinsoo Park, Inseon Kim, Hong-Yeop Song. 196-198 [doi]