VOL. E81-A NO.10 OCTOBER 1998 ============================= @ == Special Section on Information Theory and Its Applications ========================================================== . FOREWORD ....................................................... 1963 Hisashi OSAWA and Masakatsu MORII PAPERS ====== [Coding Theory] . A Mixed Upper Bound on the Maximum Size of Codes for Multiple Burst Error Correction and Detection ................................. 1964 Mitsuru HAMADA . A Method for Evaluating Minimum Free Chernov Distance of Trellis-Codes for Discrete Memoryless Channel .................. 1972 Tadashi WADAYAMA, Koichiro WAKASUGI, and Masao KASAHARA . On Generalized Hamming Weights of Codes Constructed on Affine Algebraic Varieties ............................................ 1979 Tomoharu SHIBUYA, Jiro MIZUTANI, and Kohichi SAKANIWA . On the Number of Minimum Weight Codewords of Subcodes of Reed-Muller Codes .......................................................... 1990 Hitoshi TOKUSHIGE, Toyoo TAKATA, and Tadao KASAMI . On Reducing Complexity of a Soft-Decision Decoding Algorithm for Cyclic Codes Based on Energy Minimization Principle ............ 1998 Akira SHIOZAKI and Kazutaka AOKI . Adaptive Unequal Error Protection Scheme Using Several Convolutional Codes .......................................................... 2005 Mari MATSUNAGA and Ryuji KOHNO . Codes over the Ring of Integers Modulo E10035mE10034 ........... 2013 A.J. Han VINCK and Hiroyoshi MORITA . Construction Method of UEP Convolutional Codes Based on Conditional Weight Distributions ........................................... 2019 Kazuhiko YAMAGUCHI, Toshiaki WATANABE, and Kingo KOBAYASHI . One-Point Algebraic Geometric Codes from Artin-Schreier Extensions of Hermitian Function Fields ................................... 2025 Daisuke UMEHARA and Tomohiko UYEMATSU [Coded Modulation] . Application of Turbo TCM Codes for Impulsive Noise Channel ..... 2032 Kiyoyuki KOIKE and Haruo OGIWARA . Improvement of Turbo Trellis-Coded Modulation System ........... 2040 Haruo OGIWARA and Masaaki YANO . Application of Soft-In/Soft-Out Viterbi Algrithm to Turbo Trellis-Coded Modulation ....................................... 2047 Tadashi MINOWA and Haruo OGIWARA . Coded Modulation for Satellite Broadcasting Based on Unconventional Partitionings .................................................. 2055 Motohiko ISAKA, Robert H. MORELOS-ZARAGOZA, Marc P.C. FOSSORIER, Shu LIN,and Hideki IMAI [Spread Spectrum System] . Double M-ary/Spread Spectrum Communication Systems ............. 2064 Kentaro TAKEUCHI, Masanori HAMAMURA, and Sin'ichi TACHIKAWA . Improvement of Extended Symbol-Aided Estimation for Rayleigh Fading Channels ....................................................... 2073 Kazunari GENKO, Le-Hai NAM, and Kohichi SAKANIWA . Queueing Analysis of CDMA Unslotted ALOHA Systems with Finite Buffers ........................................................ 2083 Hiraku OKADA, Takaya YAMAZATO, Masaaki KATAYAMA, and Akira OGAWA . On the Stability of Five Types of Slotted ALOHA Systems with Capture and Multiple Packet Reception .................................. 2092 Katsumi SAKAKIBARA, Michiru HANAOKA, and Yoshiharu YUBA . Performance of FH/MFSK Systems for Speech with Activity Detector over Rayleigh Fading Channels .................................. 2101 Jyh-Horng WEN and Jee-Wey WANG . A Nonlinear Distortion Compensation on Layered Multicarrier Modulation Using Iterative Restoration ......................... 2109 Shoichiro YAMASAKI and Hirokazu TANAKA [Source Coding] . Asymptotic Optimality of the Block Sorting Data Compression Algorithm ...................................................... 2117 Mitsuharu ARIMURA and Hirosuke YAMAMOTO . A Generalization of B.S. Clarke and A.R. Barron's Asymptotics of Bayes Codes for FSMX Sources ................................... 2123 Masayuki GOTOH, Toshiyasu MATSUSHIMA, and Shigeichi HIRASAWA [Security] . A Method of Embedding Robust Watermarks into Digital Color Images ....................................................... 2133 Ken-ichi HASHIDA and Akira SHIOZAKI . Constructing Identity-Based Key Distribution Systems over Elliptic Curves ......................................................... 2138 Hisao SAKAZAKI, Eiji OKAMOTO, and Masahiro MAMBO [Neural Networks/Signal Processing/Information Storage] . Generalized Fuzzy Kohonen Clustering Networks .................. 2144 Ching-Tang HSIEH, Chieh-Ching CHIN, and Kuang-Ming SHEN . A Single DSP System for High Quality Enhancement of Diver's Speech ....................................................... 2151 Daoud BERKANI, Hisham HASSANEIN, and Jean-Pierre ADOUL . Error Rate Performance of Trellis Coded PR4ML System for Digital Magnetic Recording Channel with Partial Erasure ................ 2159 Hidetoshi SAITO, Masaichi TAKAI, Yoshihiro OKAMOTO, and Hisashi OSAWA LETTERS ======= [Coding Theory] . Error Correcting Capability of Constant Amplitude Coding for Orthogonal Multi-Code CDMA Systems ............................. 2166 Tadahiro WADA, Takaya YAMAZATO, Masaaki KATAYAMA, and Akira OGAWA . A Probabilistic Algorithm for Determining the Minimum Weight of Cyclic Codes ................................................... 2170 Masami MOHRI and Masakatu MORII . On Symbol Error Probability of DC Component Suppressing Systems 2174 Akiomi KUNISA and Nobuo ITOH [Coded Modulation/Security] . Simulation Probability Density Function for TCM Scheme ......... 2180 Takakazu SAKAI and Koji SHIBATA . On the Security of the Improved Knapsack Cryptosystem .......... 2184 Hidenori KUWAKADO and Hatsukazu TANAKA Regular Section =============== PAPERS ====== [General Fundamentals and Boundaries] . A Universal Single-Authority Election System ................... 2186 Chin-Laung LEI and Chun-I FAN [Analog Signal Processing] . Ultra-Low Power Two-MOS Virtual-Short Circuit and Its Application ....................................................... 2194 Koichi TANNO, Okihiko ISHIZUKA, and Zheng TANG [VLSI Design Technology and CAD] . A Heuristic Algorithm for Boolean Factoring .................... 2201 Giuseppe CARUSO [Modeling and Simulation] . Steady State Solution of Nonlinear Circuits by Asymptotic Periodic Waveform Evaluation ............................................ 2212 Sermsak UATRONGJIT and Nobuo FUJII [Information Security] . Conference Key Supervision in a Level-Based Hierarchy .......... 2219 Ching-Te WANG, Chin-Chen CHANG, and Chu-Hsing LIN [Human Communications and Ergonomics] . How Are the Differences between Selection Strategies Affected by Changes in Target Size, Distance and Direction? ................ 2228 Xiangshi REN and Shinji MORIYA . ABSTRACTS (IEICE Trans., Vol.J81-A, No.10 in Japanese) ......... 2235