Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT |
2020-12-03 10:30 |
Online |
Online |
Hamming Distance Enumerators for Number Theoretic Codes Takayuki Nozaki (Yamaguchi Univ) IT2020-48 |
The number theoretic codes are defined by single or multiple congruences and are used for correcting insertion and delet... [more] |
IT2020-48 pp.134-139 |
PRMU |
2020-09-02 16:15 |
Online |
Online |
Pseudo Perfect Coding for Discrete Cross-modal Hashing Yusuke Masuda, Gou Koutaki (Kumamoto Univ.) PRMU2020-16 |
Recently, cross-modal hashing has attracted attention in the field of image processing.
Compressing data which have di... [more] |
PRMU2020-16 pp.53-57 |
IT |
2020-07-16 10:55 |
Online |
Online |
A Selection Method of Transmitted Bits for Polar Codes Using Generalized Hamming Weights Mizuho Asahi, Y. Vamoua, Hideki Yagi (UEC) IT2020-11 |
The polar codes, introduced by Arıkan, can achieve the channel capacity of discrete memoryless channels with low computa... [more] |
IT2020-11 pp.1-6 |
OPE, OCS, OFT (Joint) [detail] |
2018-02-16 12:00 |
Okinawa |
Okinawa Prefectural Museum |
Optical comparator for QPSK signal using delayed interferometer at 10 Gbaud Yohei Aikawa (NIT,Okinawa College) OCS2017-90 OFT2017-75 OPE2017-183 |
As the demand for advanced optical network with low power consumption, we experimentally demonstrated a comparison opera... [more] |
OCS2017-90 OFT2017-75 OPE2017-183 pp.55-60(OCS), pp.35-40(OFT), pp.73-78(OPE) |
IT |
2017-09-08 09:50 |
Yamaguchi |
Centcore Yamaguchi Hotel |
On the weight distributions of the binary codes obtained from Reed-Solomon codes over GF(2^m) Tshihisa Nishijima (Hosei Univ.) IT2017-40 |
In this report, we give a necessary and sufficient condition for symmetry of the weight distribution of the binary ... [more] |
IT2017-40 pp.11-14 |
EMCJ, IEE-EMC, IEE-MAG |
2017-05-18 14:46 |
Overseas |
Nanyang Technological University |
[Poster Presentation]
Electromagnetic Information Leakage Analysis of Cryptographic IC in Correlation Power Analysis Yasunari Kumano, Yusuke Yano, Kengo Iokibe, Hiroto Kagotani, Yoshitaka Toyota (Okayama Univ.) EMCJ2017-10 |
We observed and analyzed electromagnetic information leakage of the Advanced Encryption Standard (AES) cryptographic cir... [more] |
EMCJ2017-10 pp.7-8 |
DC |
2016-06-20 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On State Assignment of Finite State Machines for Soft Error Resilient Stochastic Computing Motoi Fukuda, Hideyuki Ichihara, Tsuyoshi Iwagaki, Tomoo Inoue (Hiroshima City Univ.) DC2016-11 |
Stochastic computing (SC), which is an approximate computation with probabilities, has attracted at- tention owing to it... [more] |
DC2016-11 pp.7-12 |
IT, ISEC, WBS |
2016-03-10 15:05 |
Tokyo |
The University of Electro-Communications |
Distance and Correlation Properties for Constant-Weight Codes from an (11,5,2)-Cyclic Difference Set Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.) IT2015-117 ISEC2015-76 WBS2015-100 |
In 2008 the authors proposed an extended method for constructing constant-weight code over $GF(q)$, which is generalized... [more] |
IT2015-117 ISEC2015-76 WBS2015-100 pp.101-106 |
EMM, IT |
2015-05-21 13:50 |
Kyoto |
Kyoto International Community House |
A Note on Correlation Properties of Periodic Sequences over Extension Fields from a Cyclic Difference Set Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.), Keiichi Takahashi (Kinki Univ.) IT2015-6 EMM2015-6 |
The authors proposed constant-weight sequences over multi-value generalized
form binary constant-weight sequences by L... [more] |
IT2015-6 EMM2015-6 pp.31-34 |
ICD, CPSY |
2014-12-02 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Uniqueness Evaluation of a Current Mismatch type ID Generation Circuit Kenichi Matsunaga, Shoichi Oshima (NTT), Tadashi Minotani (NTT TELECON), Toshihiko Kondo, Hiroki Morimura (NTT) ICD2014-108 CPSY2014-120 |
This paper presents a low-power and uniquely-distributed ID-generation circuit using process variation. Developed circui... [more] |
ICD2014-108 CPSY2014-120 pp.135-139 |
CAS, NLP |
2011-10-20 13:55 |
Shizuoka |
Shizuoka Univ. |
Password Enhancement in Keystroke Dynamics with a Hamming Distance-like Filtering Yoshihiro Kaneko (Gifu Univ.) CAS2011-40 NLP2011-67 |
Keystroke dynamics-based user authentication research has been done for decades and been positioned as one of inexpensiv... [more] |
CAS2011-40 NLP2011-67 pp.43-48 |
MW |
2008-08-29 10:45 |
Osaka |
Osaka-Univ. (Toyonaka) |
Representation and evaluation of a high accurate formula for bit error rate in terms of CNR Kazuhiko Kitayama (NHK Itec), Kazuhisa Haeiwa (Hiroshima City Univ.), Yukio Tatsumi (NHK Itec) MW2008-93 |
So far, accuracy of theoretical formula for BER (Bit Error Rate) in terms of CNR for 64QAM that is used
for terrestria... [more] |
MW2008-93 pp.81-86 |
COMP |
2006-05-24 15:35 |
Fukuoka |
Kyushu Institute of Technology |
DNA Sequence Design by Dynamic Neighborhood Searches Suguru Kawashimo, Hirotaka Ono, Kunihiko Sadakane, Masafumi Yamashita (Kyushu Univ.) |
In recent years, DNA sequence sets are used in various fields such as nanotechnology and nanocomputing. Since there are ... [more] |
COMP2006-16 pp.47-54 |
IT |
2004-09-17 10:50 |
Osaka |
Osaka Sangyo Univ. |
An Approach to the Complete Weight Distribution of a Reed-Solomon Code Toshihisa Nishijima (Hosei Univ.) |
In this paper, to find a clue to a solution of unsolved problems about the complete weight distribution of a Reed-Solomo... [more] |
IT2004-40 pp.13-18 |