{"id":99,"date":"2023-06-12T16:45:19","date_gmt":"2023-06-12T07:45:19","guid":{"rendered":"https:\/\/www.me.inf.kyushu-u.ac.jp\/jitsumatsu\/?page_id=99"},"modified":"2025-04-02T17:42:18","modified_gmt":"2025-04-02T08:42:18","slug":"publication","status":"publish","type":"page","link":"https:\/\/www.me.inf.kyushu-u.ac.jp\/jitsumatsu\/publication\/","title":{"rendered":"\u7814\u7a76\u696d\u7e3e"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">\u82f1\u6587\u8ad6\u6587\u8a8c\uff08\u67fb\u8aad\u3042\u308a\uff09<\/h2>\n\n\n\n<ol style=\"list-style-type:1\" class=\"wp-block-list\">\n<li>Yutaka Jitsumatsu,<br>&#8220;<a href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=ja&amp;user=vujCTTQAAAAJ&amp;sortby=pubdate&amp;citation_for_view=vujCTTQAAAAJ:VOx2b1Wkg3QC\">Computation of the optimal error exponent function for fixed-length lossy source coding in discrete memoryless sources<\/a>,&#8221; <em>IEEE Transactions on Information Theory<\/em>, (Early Access)<\/li>\n\n\n\n<li>HA Tanaka, S Suga, A Keida, H Nakao, Y Jitsumatsu, IZ Kiss, <br>&#8220;<a href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=ja&amp;user=vujCTTQAAAAJ&amp;sortby=pubdate&amp;citation_for_view=vujCTTQAAAAJ:XiVPGOgt02cC\">Inferring noise intensity and phase response from noisy synchronous oscillators<\/a>,&#8221; <em>Physical Review Research<\/em> 7 (1), 013076<\/li>\n\n\n\n<li>T Sultana, S Kurosaki, Y Jitsumatsu, S Kuhara, J Takeuchi,<br>&#8220;<a href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=ja&amp;user=vujCTTQAAAAJ&amp;sortby=pubdate&amp;citation_for_view=vujCTTQAAAAJ:fQNAKQ3IYiAC\">Brain Tumor Classification using Under-Sampled k-Space Data: A Deep Learning Approach<\/a>,&#8221; <em>IEICE TRANSACTIONS on Information and Systems<\/em> 106 (11), 1831-1841<\/li>\n\n\n\n<li>Yutaka Jitsumatsu,<br>&#8220;<a href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=ja&amp;user=vujCTTQAAAAJ&amp;sortby=pubdate&amp;citation_for_view=vujCTTQAAAAJ:xtRiw3GOFMkC\">Invariant set of two-dimensional dynamics of golden ratio encoders<\/a>,&#8221; <em>Nonlinear Theory and Its Applications, IEICE<\/em> 12 (1), 75-87<\/li>\n\n\n\n<li>Yutaka Jitsumatsu, Ukyo Michiwaki, Yasutada Oohama,<br>\u201cInformation Leakage Given Eavesdropper\u2019s Received Signals in Wiretap Channels,\u201d&nbsp;<em>IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences<\/em>, Jan. 2021<\/li>\n\n\n\n<li>Yutaka Jitsumatsu, Yasutada Oohama,<br>\u201cNew Iterative Algorithm for Computing the Correct Decoding Probability Exponent of Discrete Memoryless Channels,\u201d&nbsp;<em>IEEE Transactions on Information Theory<\/em>, Vol.66, No.3, pp.1585-1606, 2020.<\/li>\n\n\n\n<li>Dongshin Yang, and Yutaka Jitsumatsu,<br>\u201cSuper Resolution Channel Estimation by Using Spread Spectrum Signal and Atomic Norm Minimization,\u201d&nbsp;<em>IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences<\/em>, E101A(12), pp.2141-2148, 2018.<\/li>\n\n\n\n<li>Dongshin Yang*, and Yutaka Jitsumatsu,<br>\u201cDividing the Grids of Compressed Sensing for Channel Estimation and Investigating Markov Codes,\u201d&nbsp;<em>Nonlinear Theory and Its Appl., IEICE<\/em>, Vol.9, No.2, pp.259-267, 2018.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Kazuya Matsumura,<br>\u201cA \u03b2-ary to Binary Conversion for Random Number Generation Using a \u03b2 Encoder,\u201d&nbsp;<em>Nonlinear Theory and Its Appl.<\/em>, IEICE, Vol.7, No.1, pp.38-55, 2016. DOI: 10.1587\/nolta.7.38<\/li>\n\n\n\n<li>Takaki Makino*, Yukiko Iwata, Katsutoshi Shinohara, Yutaka Jitsumatsu, Masao Hotta, Hao San, Kazuyuki Aihara,<br>\u201cRigorous Estimates of Quantization Error for A\/D Converters Based on Beta-Map\u201d&nbsp;<em>Nonlinear Theory and Its Appl.<\/em>, IEICE, Vol.6, No.1, pp.99-111, 2015. DOI: 10.1587\/nolta.6.99<\/li>\n\n\n\n<li>Mohamed Saber, Yutaka Jitsumatsu, and Muhammad Tahir Abbas Khan,<br>\u201cA Simple Design to Mitigate Problems of Conventional Digital Phase Locked Loop,\u201d\u00a0<em>Signal Processing: An international journal (SPIJ)<\/em>, Vol.6, No.2, pp.65-77, 2012.<\/li>\n\n\n\n<li>Mohamed Mohamed Saber*, Muhammad Tahir Abbas Khan, and Yutaka Jitsumatsu,<br>\u201cFrequency and Power Estimator for Digital Receivers in Doppler Shift Environments,\u201d&nbsp;<em>Signal Processing: An international journal (SPIJ)<\/em>, Vol.5, No.5, pp.185-202, 2011. DOI: Not Available<\/li>\n\n\n\n<li>Mohamed Saber*, and Yutaka Jitsumatsu**, and Muhammad Tahir Abbas Khan,<br>\u201cA Low Power Digital Phase Locked Loop With ROM-free Numerically Controlled Oscillator,\u201d&nbsp;<em>Signal Processing: An international journal (SPIJ)<\/em>, Vol.5, No.4, pp.142-155, 2011. DOI: Not Available<\/li>\n\n\n\n<li>Mohamed Saber*, and Yutaka Jitsumatsu**, and Muhammad Tahir Abbas Khan,<br>\u201cDesign and Implementation of Low Ripple Low Power Digital Phase-Locked Loop,\u201d<em>&nbsp;Signal Processing: An international journal (SPIJ)<\/em>, Vol.4, No.6, pp.304-317, 2011. DOI: Not Available<\/li>\n\n\n\n<li>Muhammad Tahir Abbas Khan*, Nobuoki Eshima, Yutaka Jitsumatsu, Tohru Kohda,<br>\u201cCode Acquisition in DS\/CDMA Systems by Employing a Detector Based on a posteriori Probability Calculation,\u201d<br><em>IEICE Trans. on Communications,<\/em>&nbsp;E88-B (10), pp. 4047-4055, 2005. DOI: 10.1093\/ietcom\/e88-b.10.4047<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tahir Abbas Khan, Tohru Kohda,<br>\u201cReduction of MAI in Asynchronous DS\/CDMA Systems Using Post-Filter,\u201d&nbsp;<em>IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences<\/em>, E87-A (9), pp. 2301-2307, 2004.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tohru Kohda,<br>\u201cBit Error Rate of Incompletely Synchronised Correlator in Asynchronous DS\/CDMA System Using SS Markovian Codes,\u201d<br><em>Electronics Letters<\/em>, 38 (9), pp. 415-416, 2002. DOI: 10.1049\/el:20020276<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tetsuo Nishi,<br>\u201cOn the Number of Solutions for a Class of Piecewise-Linear Equations Related to Transistor Circuits,\u201d&nbsp;<em>IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences<\/em>, E84-A (9), pp. 2221-2229, 2001.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tetsuo Nishi,<br>\u201cRelation between the Stored and the Dissipated Energies of a Circuit Composed of Linear Capacitors, Linear\/Nonlinear Resistors and DC Voltage Sources,\u201d\u00a0<em>IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences<\/em>, E82-A (9), pp. 1802-1808, 1999.<\/li>\n\n\n\n<li>\u5be6\u677e\u8c4a*\uff0c\u897f\u54f2\u751f\uff0c<br>\u201c\u3042\u308b\u7a2e\u306e2\u5909\u6570\u9023\u7acb\u65b9\u7a0b\u5f0f\u306e\u89e3\u306e\u6700\u5927\u500b\u6570,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u8ad6\u6587\u8a8cA82(7), pp.1175-1176, 1999.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">\u56fd\u969b\u4f1a\u8b70\uff08\u67fb\u8aad\u3042\u308a\uff09<\/h2>\n\n\n\n<ol style=\"list-style-type:1\" class=\"wp-block-list\">\n<li>Yutaka Jitsumatsu and Liancheng Sun, <br>&#8220;<a href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=ja&amp;user=vujCTTQAAAAJ&amp;sortby=pubdate&amp;citation_for_view=vujCTTQAAAAJ:eJXPG6dFmWUC\">2D Sinc Interpolation-Based Fractional Delay and Doppler Estimation Using Time and Frequency Shifted Gaussian Pulses<\/a>,&#8221; <em>2025 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)<\/em><\/li>\n\n\n\n<li>Zhuoran Li, Osamu Muta, Yutaka Jitsumatsu,<br>&#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10479642\/\">Performance Evaluation of Cooperative Positioning with User-Terminal Collaboration<\/a>,&#8221; <em>2023 11th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)<\/em><\/li>\n\n\n\n<li>Y Jitsumatsu, <br><a href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=ja&amp;user=vujCTTQAAAAJ&amp;sortby=pubdate&amp;citation_for_view=vujCTTQAAAAJ:5Ul4iDaHHb8C\">Computation of Marton\u2019s Error Exponent for Discrete Memoryless Source<\/a>, <em>2023 IEEE International Symposium on Information Theory (ISIT)<\/em>, 1372-1377<\/li>\n\n\n\n<li>Shizen Kitazaki, Masnori Kawakita, Yutaka Jitsumatsu, Shigehide Kuhara, Akio Hiwatashi and Jun\u2019ichi Takeuchi,<br>\u201cMagnetic Resonance Angiography Image Restoration by Super-Resolution Based on Deep Learning,\u201d<br>The European Society for Magnetic Resonance in Medicine and Biology Congress 2019 (ESMRMB2019)<\/li>\n\n\n\n<li>Ukyo Michiwaki *, and Yutaka Jitsumatsu**,<br>\u201cA New Proof of an Inequality between Two Secrecy Exponents,\u201d<br><em>2018 Int. Symp. Inform. Theory and Its Appl. (ISITA2018)<\/em>, pp.747-751, Singapore, 2018.<\/li>\n\n\n\n<li>Dongshin Yang*, and Yutaka Jitsumatsu**,<br>\u201cSuper Resolution Channel Estimation with Spread Spectrum Signal and Atomic Norm Minimization,\u201d<br><em>2018 Int. Symp. Inform. Theory and Its Appl. (ISITA2018)<\/em>, pp.144-148, Singapore, 2018.<\/li>\n\n\n\n<li>Koji Itaya*, and Yutaka Jitsumatsu**,<br>\u201cRandom Number Generation Using Outputs from Multiple Beta Encoders\u201d<br><em>Int. Symp. Nonlinear Theory and its Application (NOLTA2017)<\/em>, 4 pages, Cancun, Mexico, 2017.<\/li>\n\n\n\n<li>Dongshin Yang*, Yutaka Jitsumatsu**,<br>\u201cCompressive Sensing of Up-Sampled Model and Atomic Norm for Super-Resolution Radar,\u201d<br><em>Int. Radar Symp. (IRS2017)<\/em>, pp.1-9, Prague, Czech Republic, 2017.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*,<br>\u201cComputation of the Random Coding Secrecy Exponent for a Constant Composition Ensemble,\u201d<br><em>IEEE Int. Symp. Information Theory (ISIT2017)<\/em>, pp. 1713-1717, Aachen, Germany, 2017.<\/li>\n\n\n\n<li>Yeelai Chew*, Yutaka Jitsumatsu**,<br>\u201cEstimation of Beta-Value for Pipelined Beta Encoders,\u201d<br><em>Int. Symp. Nonlinear Theory and its Application (NOLTA2016)<\/em>, pp.521-525, Yugawara, Japan, 2016.<\/li>\n\n\n\n<li>Koji Itaya*, and Yutaka Jitsumatsu**,<br>\u201cRandom Number Generation Using Outputs from Multiple Beta Encoders,\u201d<br><em>Int. Symp. Nonlinear Theory and its Application (NOLTA2016)<\/em>, pp.249-252, Yugawara, Japan, 2016.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Yasutada Oohama,,<br>\u201cComputing the Optimal Exponent of Correct Decoding for Discrete Memoryless Sources,\u201d<br><em>IEEE Int. Symp. Information Theory (ISIT2016)<\/em>, pp. 1531-1535, Barcelona, Spain, 2016.<\/li>\n\n\n\n<li>Shuntaro Ito*, Dongshin Yang, and Yutaka Jitsumatsu**,<br>\u201cEstimation of Multi-Path Channels by Using the Annihilating Filter Method,\u201d<br><em>IEEE 82nd Vehicular Technology Conf. (VTC2015Fall)<\/em>, pp.1-5, Boston, USA, 2015.<\/li>\n\n\n\n<li>Yeelai Shu*, Yutaka Jitsumatsu**, Kohei Oda,<br>\u201cPerformance Evaluation of a Random Number Generation Using a Beta Encoder,\u201d<br><em>2015 Int. Symp. Nonlinear Theory and its Application (NOLTA2015)<\/em>, pp.511\u2013514, Hong Kong, China, 2015. (Student Paper Award\u53d7\u8cde)<\/li>\n\n\n\n<li>Yasutada Oohama, Yutaka Jitsumatsu*,<br>\u201cA New Iterative Algorithm for Computing the Optimal Exponent of Correct Decoding for Discrete Memoryless Channels,\u201d<br><em>IEEE Int. Symp. Information Theory (ISIT2015)<\/em>, pp. 924-928, Hong Kong, China, 2015.<\/li>\n\n\n\n<li>Tatsuro Higuchi, Yutaka Jitsumatsu**,<br>\u201cDesign Criteria of Preamble Sequence for Multipath Fading Channels with Doppler Shift,\u201d<br><em>Int. Symp. Wireless Personal Multimedia Communications<\/em>&nbsp;<em>(WPMC2014)<\/em>, pp. 152-157, Sydney, Australia, 2014.<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu*, Kazuyuki Aihara,<br>\u201cPhase-Tuned Layers with Multiple 2D SS Codes Realize 16PSK Communication,\u201d<br><em>IEEE Wireless Communications and Networking Conf. (WCNC2014)<\/em>, pp. 457-462, Istanbul, Turkey, 2014<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tohru Kohda, Kazuyuki Aihara,<br>\u201cDelay-Doppler Space Division-Based Multiple-Access Solves Multiple-Target Detection,\u201d<br><em>6th Int. Workshop on Multiple Access Commun. (MACOM2013)<\/em>, pp.39-53, Vilnius, Lithuania, 2013. (BEST PAPER AWARD\u53d7\u8cde)<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu*, Kazuyuki Aihara,<br>\u201cPLL-Free Receiver for Gabor Division\/Spread Spectrum System,\u201d<br><em>Int. Conf. Wireless and Mobile Computing, Networking and Communications (WiMob2013)<\/em>, pp. 645-652, Lyon, France, 2013.<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu*<em>,<\/em>\u00a0Kazuyuki Aihara,<br>\u201cGabor Division\/Spread Spectrum System is Separable in Time and Frequency Synchronization,\u201d<br><em>IEEE Vehicular Technology Conf. (VTC2013 Fall)<\/em>, pp.1-5, Las Vegas, USA, 2013.<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu*, Kazuyuki Aihara,<br>\u201cSignals That Can Be Easily Time-Frequency Synchronized from Their Ambiguity Function\u201d<br><em>2013 IEEE Information Theory Workshop (ITW)<\/em>, pp. 439-443, Seville, Spain, 2013.<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu*, Kazuyuki Aihara,<br>\u201cSeparability of Time-Frequency Synchronization\u201d<br><em>Int. Radar Symposium (IRS2013)<\/em>, pp. 964-969, Dresden, Germany, 2013.<\/li>\n\n\n\n<li>Takaki Makino, Yukiko Iwata, Yutaka Jitsumatsu*, Masao Hotta, Hao San, Kazuyuki Aihara,<br>\u201cRigorous Analysis of Quantization Error of an A\/D Converter Based on \u03b2-Map,\u201d<br><em>IEEE Int. Symp. Circuits and Systems (ISCAS2013)<\/em>, pp. 369-372, Beijing, China, 2013.<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu*, Kazuyuki Aihara,<br>\u201cRecovering Noncoherent MPSK Signal with Unknown Delay and Doppler Using Its Ambiguity Function,\u201d<br><em>13th Int. Conf. ITS Telecommunications (ITST 2013)<\/em>, pp. 255-260, Tampere, Finland, 2013.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tohru Kohda, Kazuyuki Aihara,<br>\u201cSpread Spectrum-Based Cooperative and Individual Time-Frequency Synchronization\u201d<br><em>Int. Symp. Wireless Communication Systems (ISWCS2013)<\/em>, pp. 497-501, Ilmenau, Germany, 2013.<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu*, Kazuyuki Aihara,<br>\u201cFrequency-Division Spread-Spectrum Makes Frequency Synchronisation Easy,\u201d<br><em>IEEE Global Telecommunications Conf. (Globecom 2012)<\/em>, pp. 3976-3982, Anaheim, USA 2012.<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu*, Kazuyuki Aihara,<br>\u201cFrequency Synchronisation Using SS Technique\u201d<br><em>Int. Symp. Wireless Communication Systems(ISWCS2012)<\/em>, pp. 855-859, Paris, France, 2012.<\/li>\n\n\n\n<li>Mohamed Saber, Yutaka Jitsumatsu, Muhammad Tahir Abbas Khan,<br>\u201cEstimation of Frequency, Power and Phase Using Modified Digital Phase Locked Loop,\u201d<br><em>2012 Int. Conf. Systems and Informatics (ICSAI 2012)<\/em>, pp. 1601-1605, Yantai, China, 2012.<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu.*, Kazuyuki Aihara,<br>\u201cMarkovian SS Codes Flatten the Spectrum of UWB Gaussian Pulse\u201d<br><em>IEEE Int. Conf. Ultra-Wideband (ICUWB2011)<\/em>, pp. 317-321, Bologna, Italy, 2011.<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu*, Kazuyuki Aihara,<br>\u201c2D Markovian SS Codes Flatten Time-Frequency Distribution of Signals in Asynchronous Gabor Division CDMA Systems\u201d<br><em>IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP2011)<\/em>, pp. 3140-3143, Prague, Czech Republic,2011.<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu*,<br>\u201cIs Markov Code Superior to I.I.D. in Communication Systems?\u201d<br><em>Int. Sympo. on Nonlinear Theory and its Appl. (NOLTA2010)<\/em>, 4 pages, Krakow, Poland, 2010.<\/li>\n\n\n\n<li>Mohamed Saber, Yutaka Jitsumatsu, Muhammad Tahir Abbas Khan,<br>\u201cDesign and Implementation of Low Power Digital Phase-Locked Loop,\u201d<br><em>2010 Int. Symp. Information Theory and Its Appl. (ISITA2010)<\/em>, pp. 928-933, Taichung, Taiwan, 2010.<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu*, Kenjiro Fujino, Kazuyuki Aihara,<br>\u201cFrequency Division (FD)-Based CDMA System Which Permits Frequency Offset\u201d<br><em>IEEE Int. Symp. Spread Spectrum Tech. and Appl. (ISSSTA2010)<\/em>, pp. 61-66, Taichung, Taiwan, 2010.<\/li>\n\n\n\n<li>Mohamed Saber, Yutaka Jitsumatsu, Muhammad Tahir Abbas Khan,<br>\u201cLow Noise-Low Power Digital Phase-Locked Loop,\u201d<br>IEEE Region 10 Annual Int. Conf. <em>(TENCON2010)<\/em>, pp. 1324-1329, Fukuoka, Japan, 2010.<\/li>\n\n\n\n<li>Mohamed Saber , Yutaka Jitsumatsu, Tohru Kohda,<br>\u201cA Low-Power Implementation of Arctangent Function for Communication Applications Using FPGA\u201d<br><em>4th Int. Workshop on Signal Design and Its Appl. in Communications (IWSDA\u201909)<\/em>, Fukuoka, Japan, pp. 60-63, 2009.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tohru Kohda,<br>\u201cMarkov Codes Make Gaussian Pulse Superior to a Raised Cosine Pulse,\u201d<br><em>IEEE Int. Symp. Spread Spectrum Techniques and Appl. (ISSSTA2008)<\/em>, pp. 730-734, Bologna, Italy, 2008.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tohru Kohda,<br>\u201cQuasi-Orthogonal Multi-Carrier CDMA,\u201d<br><em>IEEE Global Telecommunications Conf. (Globecom2008)<\/em>, pp. 1157-1161, New Orleans, USA, 2008.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Masato Ogata, Tohru Kohda, A<br>\u201cComparison Between Prolate Spheroidal and Gaussian FIR Pulse Shaping Filters,\u201d<br><em>2008 Int. Conf. Signals and Electronic Systems (ICSES\u201908)<\/em>, pp. 343-346, Krakow, Poland, 2008.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tohru Kohda,<br>\u201cAn MC-UWB System with Overlapping Gaussian Subcarriers,\u201d<br><em>Int. Sympo. on Nonlinear Theory and its Appl. (NOLTA2008)<\/em>, pp.724-727, Budapest, Hungary, 2008.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tohru Kohda,<br>\u201cProlate Spheroidal Wave Functions Induce Gaussian Chip Waveforms,\u201d<br><em>IEEE Int. Symp. Information Theory (ISIT2008)<\/em>, pp. 1363-1367, Toronto, Canada, 2008.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tohru Kohda,<br>\u201cWelch Bound for FIR Lowpass Filtered Sequences,\u201d<br><em>IEEE Int. Symp. Information Theory<\/em>, pp. 2506-2509, Nice, France, 2007.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Muhammad Tahir Abbas Khan, Tohru Kohda,<br>\u201cGaussian Chip Waveform Together with Markovian Spreading Codes Improve BER Performance in Chip-Asynchronous CDMA Systems,\u201d<br><em>IEEE Global Telecommunications Conf. (Globecom2006)<\/em>, pp.1-5, San Francisco, 2006.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tohru Kohda,<br>\u201cA Lower Bound on the Mean Squared Correlations for Band-Limited Asynchronous DS\/CDMA Systems,\u201d<br><em>IEEE Int. Symp. Information Theory<\/em>, pp. 1524-1528, Seattle, USA, 2006.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tohru Kohda,<br>\u201cGaussian Chip Shaping Enhances the Superiority of Markovian Codes in DS\/CDMA Systems,\u201d<br><em>IEEE Int. Symp. Circuits and Systems<\/em>&nbsp;<em>(ISCAS2006)<\/em>, pp. 3117-3120, Island of Kos, Greece, 2006.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Muhammad Tahir Abbas Khan, Tohru Kohda,<br>\u201cIntroducing ISI Can Lead to Reduction in BER of Chip-Asynchronous DS\/CDMA Systems,\u201d<br><em>The 9th Int. Symp. on Wireless Personal Multimedia Communications (WPMC2016)<\/em>, pp.1-5, San Diego, 2006.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Tohru Kohda,<br>\u201cDesign of Code-Matched Receiver for DS\/CDMA Communications,\u201d<br><em>IEEE Int. Symp. Circuits and Systems (ISCAS2005)<\/em>, pp. 884-887, Kobe, Japan, 2005.<\/li>\n\n\n\n<li>Tahir Abbas Khan, Nobuoki Eshima, Yutaka Jitsumatsu, Tohru Kohda,<br>\u201cA Novel Code Acquisition Algorithm and Its Application to Markov Spreading Codes,\u201d<br><em>IEEE Int. Symp. Circuits and Systems (ISCAS2005)<\/em>, pp. 2056-2059, Kobe, Japan, 2005.<\/li>\n\n\n\n<li>Tahir Abbas Khan, Nobuoki Eshima, Yutaka Jitsumatsu, Tohru Kohda,<br>\u201cMaximum a posteriori Probability (MAP) Code Acquisition in Multiuser DS\/CDMA Systems,\u201d<br><em>2005 Asia-Pacific Conf. Communications (APCC2005),&nbsp;<\/em>pp. 654-658, Perth, Australia, 2005.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, Yosuke Hattori, Tahir Abbas Khan, Tohru Kohda,<br>\u201cBit Error Rates of Information and Watermark Bits in Digital Watermarking Systems Based on SS Techniques,\u201d<br><em>IEEE Int. Symp. Spread Spectrum Tech. and Appl. (ISSSTA2004)<\/em>, pp. 890-893, Sydney, Australia, 2004.<\/li>\n\n\n\n<li>Tahir Abbas Khan*, Nobuoki Eshima, Yutaka Jitsumatsu, Tohru Kohda,<br>\u201cAn a posteriori Probability Threshold Rule for Multiuser Code Acquisition in DS\/CDMA Systems: Theoretical and approximate methods,\u201d<br><em>IEEE Vehicular Technology Conf. (VTC2004Spring)<\/em>, 59 (3), pp. 1386-1390, Milan, Italy, 2004.<\/li>\n\n\n\n<li>Nobuoki Eshima, Yutaka Jitsmatsu, Tohru Kohda,<br>\u201cMarkovian SS Codes Imply Inversion-Free Code Acquisition in Asynchronous DS\/CDMA Systems,\u201d<br><em>IEEE Int. Symp. Circuits and Systems (ISCAS2004)<\/em>, 4, pp. IV-617-IV-620, Vancouver, Canada, 2004.<\/li>\n\n\n\n<li>Yutaka Jitsumatsu*, and Tohru Kohda,<br>\u201cCorrelation Reduces Bit Error Rate of LFSR Codes up to Optimum,\u201d<br><em>Sequences and Their Appl. (SETA2004)<\/em>, pp. 108-112, Seoul, Korea, 2004.<\/li>\n\n\n\n<li>Tohru Kohda, Yutaka Jitsumatsu*, Tahir Abbas Khan,<br>\u201cSpread-spectrum Markovian-Code Acquisition in Asynchronous DS\/CDMA Systems,\u201d<br><em>IEEE Int. Symp. Circuits and Systems (ISCAS2003),<\/em>&nbsp;Vol.3, pp. III750-III753, Bangkok, Thailand, 2003.<\/li>\n\n\n\n<li>Tahir Abbas Khan, Nobuoki Eshima, Yutaka Jitsumatsu, Tohru Kohda,<br>\u201cMultiuser Code Acquisition in DS\/CDMA Systems,\u201d<br><em>2003 IEEE Topical Conf. Wireless Communication Technology<\/em>, pp. 121-122, Honolulu, USA, 2003.<\/li>\n\n\n\n<li>Tohru Kohda, Yoshinobu Matsumura, Yutaka Jitsumatsu,<br>\u201cBit Error Rate in an Asynchronous DS\/CDMA System Using Markovian SS Codes,\u201d<br><em>IEEE 7th Int. Symp. on Spread-Spectrum Tech. and Appl<\/em>,, pp.pp.571-575, Prague, Czech Republic, 2002<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"\u8b1b\u6f14\u767a\u8868\">\u8b1b\u6f14\u767a\u8868<\/h2>\n\n\n\n<ol style=\"list-style-type:1\" class=\"wp-block-list\">\n<li>\u91dc\u91ce \u592a\u90ce, \u5be6\u677e \u8c4a**, \u8fbb \u5efa,<br>\u201c\u7573\u307f\u8fbc\u307f\u30cb\u30e5\u30fc\u30e9\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u3088\u308b\u5ca9\u77f3\u7269\u6027\u306e\u63a8\u5b9a,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u4fe1\u53f7\u51e6\u7406\u7814\u7a76\u4f1a, SIP2020-7, pp.29-34, 2020.5.<\/li>\n\n\n\n<li>Tania Sultana, Sho Kurosaki, Yutaka Jitsumatsu, Junichi Takeuchi,<br>\u201cAccuracy of Brain Tumor Detection and Classification Based on Under Sampled k-Space Signals,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u60c5\u5831\u8ad6\u7684\u5b66\u7fd2\u7406\u8ad6\u3068\u6a5f\u68b0\u5b66\u7fd2\u7814\u7a76\u4f1a, IBISML2019-46, pp.91-94, 2020.3<\/li>\n\n\n\n<li>\u6e21\u9089 \u4e00\u8f1d, \u5be6\u677e \u8c4a**,<br>\u201cCooperative Jamming\u306b\u304a\u3051\u308b\u59a8\u5bb3\u8005\u306e\u8a08\u753b\u7684\u8a2d\u7f6e\u306e\u691c\u8a0e,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u901a\u4fe1\u65b9\u5f0f\u7814\u7a76\u4f1a, CS2019-118 , pp.117 \u2013 124 , 2020.2<\/li>\n\n\n\n<li>\u7acb\u548c\u540d \u96bc\u4eba, \u5be6\u677e \u8c4a**,<br>\u201c\u5927\u898f\u6a21\u30de\u30b7\u30f3\u30bf\u30a4\u30d7\u901a\u4fe1\u306b\u304a\u3051\u308b\u30b9\u30d1\u30fc\u30b9\u91cd\u306d\u5408\u308f\u305b\u7b26\u53f7,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u901a\u4fe1\u65b9\u5f0f\u7814\u7a76\u4f1a \u6280\u8853\u7814\u7a76\u5831\u544a, CS2019-117 , pp.111-115 , 2020.2.<\/li>\n\n\n\n<li>\u4f50\u85e4 \u5927\u7965, \u5be6\u677e \u8c4a**,<br>\u201c\u30c6\u30d7\u30ea\u30c3\u30c4\u884c\u5217\u306e\u4f4e\u30e9\u30f3\u30af\u88dc\u9593\u306eMRI\u3078\u306e\u5fdc\u7528,\u201d<br>\u7b2c42\u56de\u60c5\u5831\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0, pp.446-451, 2019.12.<\/li>\n\n\n\n<li>\u7acb\u548c\u540d \u96bc\u4eba, \u5be6\u677e \u8c4a**,<br>&nbsp;\u201c\u30b9\u30d1\u30fc\u30b9\u91cd\u306d\u5408\u308f\u305b\u7b26\u53f7\u306b\u3088\u308b\u591a\u5143\u63a5\u7d9a\u306e\u6027\u80fd\u8a55\u4fa1,\u201d<br>\u7b2c42\u56de\u60c5\u5831\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0, pp.335-340, 2019.10.<\/li>\n\n\n\n<li>\u7acb\u548c\u540d \u96bc\u4eba, \u5be6\u677e \u8c4a**,<br>\u201c\u30b9\u30d1\u30fc\u30b9\u91cd\u306d\u5408\u308f\u305b\u7b26\u53f7\u3092\u7528\u3044\u305f\u591a\u5143\u63a5\u7d9a\u306e\u8aa4\u308a\u7387\u306e\u6027\u80fd,\u201d<br>\u9769\u65b0\u7684\u7121\u7dda\u901a\u4fe1\u6280\u8853\u306b\u95a2\u3059\u308b\u6a2a\u65ad\u578b\u7814\u7a76\u4f1a (MIKA), (\u30dd\u30b9\u30bf\u30fc\u767a\u8868) 2019.<\/li>\n\n\n\n<li>\u9053\u8107 \u53f3\u4eac, \u5be6\u677e \u8c4a**,<br>\u201c\u4e8c\u5143\u5bfe\u79f0\u6d88\u5931\u76d7\u8074\u901a\u4fe1\u8def\u306b\u304a\u3051\u308b\u6761\u4ef6\u4ed8\u304d\u60c5\u5831\u6f0f\u6d29\u91cf\u306e\u5206\u5e03,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u60c5\u5831\u7406\u8ad6\u7814\u7a76\u4f1a, Vol.118, No.477, pp.263-268, 2019.03.<\/li>\n\n\n\n<li>\u5317\u5d0e\u81ea\u7136, \u5ddd\u559c\u7530 \u96c5\u5247, \u5be6\u677e \u8c4a, \u4e45\u539f \u91cd\u82f1, \u6a0b\u6e21 \u662d\u96c4, \u7af9\u5185 \u7d14\u4e00,<br>\u201c\u6df1\u5c64\u5b66\u7fd2\u8d85\u89e3\u50cf\u3092\u7528\u3044\u305f\u78c1\u6c17\u5171\u9cf4\u8840\u7ba1\u753b\u50cf\u306e\u5fa9\u5143\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u60c5\u5831\u8ad6\u7684\u5b66\u7fd2\u7406\u8ad6\u3068\u6a5f\u68b0\u5b66\u7fd2\u7814\u7a76\u4f1a, Vol.118, No.472, pp.65-72, 2019.03.<\/li>\n\n\n\n<li>\u9053\u8107 \u53f3\u4eac, \u5be6\u677e \u8c4a**,<br>\u201c\u76d7\u8074\u4fe1\u53f7\u304c\u4e0e\u3048\u3089\u308c\u305f\u4e0b\u3067\u306e\u60c5\u5831\u6f0f\u6d29\u91cf\u306e\u5b9a\u7fa9\u3068\u305d\u306e\u78ba\u7387\u5206\u5e03,\u201d<br>\u7b2c41\u56de\u60c5\u5831\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0(SITA2018), pp. 493-498, 2018.<br>(2018\u5e74SITA\u82e5\u624b\u7814\u7a76\u8005\u8ad6\u6587\u8cde\u53d7\u8cde, \u8868\u5f70\u5f0f2019\u5e7411\u6708)<\/li>\n\n\n\n<li>\u5317\u5d0e\u81ea\u7136, \u5ddd\u559c\u7530 \u96c5\u5247, \u5be6\u677e \u8c4a, \u4e45\u539f \u91cd\u82f1, \u6a0b\u6e21 \u662d\u96c4, \u7af9\u5185 \u7d14\u4e00,<br>\u201c\u6df1\u5c64\u5b66\u7fd2\u8d85\u89e3\u50cf\u3092\u7528\u3044\u305fMRI\u518d\u69cb\u6210\u306e\u691c\u8a0e,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u60c5\u5831\u8ad6\u7684\u5b66\u7fd2\u7406\u8ad6\u3068\u6a5f\u68b0\u5b66\u7fd2\u7814\u7a76\u4f1a, Vol.118, No. 220, pp. 21-29, 2018.09.<\/li>\n\n\n\n<li>Yang D. and Jitsumatsu, Y.**,<br>\u201cChannel Estimation by Using Spread Spectrum Signal and Atomic Norm Minimization,\u201d<br>The 40th Symp. on Inform. Theory and its Applications, 2017.&nbsp;<\/li>\n\n\n\n<li>Jitsumatsu, Y.*,<br>\u201cOn the computation of secrecy exponent functions \u201d<br>The 40th Symp. on Inform. Theory and its Applications, 2017.\u00a0<\/li>\n\n\n\n<li>\u9053\u8107 \u53f3\u4eac, \u5be6\u677e \u8c4a**,<br>\u201c\u6b63\u5fa9\u53f7\u6307\u6570\u3092\u6c42\u3081\u308b\u65b0\u3057\u3044\u5206\u5e03\u66f4\u65b0\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0,\u201d<br>\u7b2c1\u56de\u60c5\u5831\u7406\u8ad6\u304a\u3088\u3073\u7b26\u53f7\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7, 2017.&nbsp;<\/li>\n\n\n\n<li>\u5c0f\u7530 \u6643\u5e73, \u5be6\u677e \u8c4a**,<br>\u201c\u03b2\u9032\/2\u9032\u5909\u63db\u306b\u57fa\u3065\u304f\u4e71\u6570\u751f\u6210\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306e\u6027\u80fd\u8a55\u4fa1,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u60c5\u5831\u7406\u8ad6\u7814\u7a76\u4f1a, p.77-82, 2017.&nbsp;<\/li>\n\n\n\n<li>\u897f\u90e8 \u6d0b\u4ecb, \u5be6\u677e \u8c4a**,<br>\u201cAtomic Norm\u3092\u7528\u3044\u305f\u7dda\u30b9\u30da\u30af\u30c8\u30eb\u63a8\u5b9a\u6cd5\u306e\u6027\u80fd\u8a55\u4fa1,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u60c5\u5831\u7406\u8ad6\u7814\u7a76\u4f1a, Vol. 116, no.394, pp.255-260, 2017.&nbsp;<\/li>\n\n\n\n<li>\u6881 \u540c\u4fe1, \u5be6\u677e \u8c4a**,<br>\u201c\u5727\u7e2e\u30bb\u30f3\u30b7\u30f3\u30b0\u306b\u57fa\u3065\u304f\u901a\u4fe1\u8def\u63a8\u5b9a\u6cd5\u306b\u304a\u3051\u308b\u30d1\u30e9\u30e1\u30fc\u30bf\u306e\u96e2\u6563\u5316\u554f\u984c,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u7dcf\u5408\u5927\u4f1a, p.131, 2016.&nbsp;<\/li>\n\n\n\n<li>\u897f\u90e8 \u6d0b\u4ecb, \u53e4\u8cc0 \u90c1\u6d77, \u5be6\u677e \u8c4a**,<br>\u201c\u9023\u7d9a\u5024\u30d1\u30e9\u30e1\u30fc\u30bf\u63a8\u5b9a\u306b\u304a\u3051\u308b\u5727\u7e2e\u30bb\u30f3\u30b7\u30f3\u30b0\u306e\u624b\u6cd5\u306e\u6027\u80fd\u6bd4\u8f03,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u7dcf\u5408\u5927\u4f1a, p.132, 2016.<\/li>\n\n\n\n<li>\u5468 \u8aed\u6765, \u5be6\u677e \u8c4a**,<br>\u201c\u03b2\u5909\u63db\u5668\u306b\u304a\u3051\u308b\u03b2\u5024\u306e\u6700\u5c24\u63a8\u5b9a,\u201d \u96fb\u6c17\u5b66\u4f1a\u96fb\u5b50\u56de\u8def\u7814\u7a76\u4f1a, 2016.&nbsp;<\/li>\n\n\n\n<li>\u677f\u8c37 \u6d69\u5fd7, \u5be6\u677e \u8c4a**,<br>\u201c\u8907\u6570\u306e\u03b2\u5909\u63db\u5668\u51fa\u529b\u3092\u7528\u3044\u305f\u4e71\u6570\u751f\u6210,\u201d \u96fb\u6c17\u5b66\u4f1a\u96fb\u5b50\u56de\u8def\u7814\u7a76\u4f1a, 2016.&nbsp;<\/li>\n\n\n\n<li>\u5be6\u677e \u8c4a*, \u5927\u6ff1\u9756\u5321,<br>\u201cA New Iterative Algorithm for Computing the Optimal Exponent of Correct Decoding Probability for Discrete Memoryless Channels under Input Constraint,\u201d<br>\u7b2c38\u56de\u60c5\u5831\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0, p. 607-612, 2015.11.&nbsp;<\/li>\n\n\n\n<li>\u5c0f\u7530 \u6643\u5e73, \u5be6\u677e \u8c4a**,<br>\u201c\u5b9f\u6570\u03b2\u3092\u57fa\u6570\u3068\u3059\u308bA\/D\u5909\u63db\u5668\u306b\u304a\u3051\u308b\u03b2\u306e\u63a8\u5b9a\u5024\u306e\u66f4\u65b0\u6cd5,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u60c5\u5831\u7406\u8ad6\u7814\u7a76\u4f1a, vol.115, no.137, pp.77-82, 2015.07<\/li>\n\n\n\n<li>Jitsumatsu, Y.*, Yang, D., Higuchi, T.,<br>\u201cOptimal Reference Block Partitions for Multipath Fading Channels with Doppler Shift,\u201d<br>[CI=0] The Third Int. Japan-Egypt Conf. on Electronics, Commun. and Comp, Fukuoka, Japan, 2015.<\/li>\n\n\n\n<li>Jitsumatsu, Y.*, Matsumura, K.,<br>\u201cA Random Binary Sequence Generator Based on Beta Encoders,\u201d<br>Workshop on \u03b2-transformation and related topics, 2015.03\u00a0<\/li>\n\n\n\n<li>\u677e\u6751 \u548c\u4e5f, \u5bfa\u53f8 \u54f2\u90ce, \u5c0f\u7530 \u6643\u5e73, \u5be6\u677e \u8c4a**,<br>\u201c\u03b2\u5909\u63db\u5668\u3092\u5229\u7528\u3057\u305f\u4e71\u6570\u751f\u6210,\u201d<br>2015\u5e74 \u6697\u53f7\u3068\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0 (SCIS2015), 4E1-4, pp.1-8, 2015&nbsp;<\/li>\n\n\n\n<li>\u5be6\u677e \u8c4a*, \u9999\u7530 \u5fb9, \u5408\u539f \u4e00\u5e78,<br>\u201c\u901a\u4fe1\u306b\u304a\u3051\u308b\u6642\u9593\u540c\u671f\u3068\u5468\u6ce2\u6570\u540c\u671f\u306e\u5206\u96e2\u53ef\u80fd\u6761\u4ef6,\u2019\u2019<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u77ed\u8ddd\u96e2\u7121\u7dda\u7814\u7a76\u4f1a, Vol.113, No.180, pp.27-31, pp.2013.08.&nbsp;<\/li>\n\n\n\n<li>\u6a0b\u53e3 \u5dfd\u6717, \u5be6\u677e \u8c4a**,<br>\u201cTD\/S<sup>3<\/sup>\u53d7\u4fe1\u5668\u306e\u5468\u6ce2\u6570\u30aa\u30d5\u30bb\u30c3\u30c8\u8010\u6027,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u975e\u7dda\u5f62\u554f\u984c\u7814\u7a76\u4f1a, NLP2013-19, pp.53-58, 2013.05.&nbsp;<\/li>\n\n\n\n<li>\u5be6\u677e \u8c4a*, \u9999\u7530 \u5fb9, \u5408\u539f \u4e00\u5e78,<br>\u201c\u901a\u4fe1\u306e\u540c\u671f\u6cd5\u3068\u9023\u60f3\u8a18\u61b6\u306e\u60f3\u8d77\u904e\u7a0b,\u201d<br>\u7b2c5\u56de\u7b26\u53f7\u3068\u529b\u5b66\u7cfb\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7, 2014.03.<\/li>\n\n\n\n<li>\u5be6\u677e \u8c4a*, \u9999\u7530 \u5fb9, \u5408\u539f \u4e00\u5e78,<br>\u201c\u975e\u540c\u671fCDMA\u3068\u9023\u60f3\u8a18\u61b6,\u201d<br>\u7b2c5\u56de\u7b26\u53f7\u3068\u529b\u5b66\u7cfb\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7, 2014.03.&nbsp;<\/li>\n\n\n\n<li>\u677e\u6751 \u548c\u4e5f, \u5be6\u677e \u8c4a**, \u9999\u7530 \u5fb9,<br>\u201c\u03b2\u5199\u50cf\u30a2\u30c8\u30e9\u30af\u30bf\u306b\u57fa\u3065\u304f\u64ec\u4f3c\u4e71\u6570\u751f\u6210\u5668\u306e\u56de\u8def\u5b9f\u88c5\u3068\u305d\u306e\u4e71\u6570\u691c\u5b9a,\u201d<br>\u96fb\u5b50\u56de\u8def\u7814\u7a76\u4f1a, vol. ECT-14-26, pp.134-140, 2014.01.&nbsp;<\/li>\n\n\n\n<li>\u5be6\u677e \u8c4a*, \u9999\u7530 \u5fb9, \u5408\u539f \u4e00\u5e78,<br>\u201c\u901a\u4fe1\u306e\u540c\u671f\u554f\u984c\u306b\u95a2\u3059\u308b\u4e00\u8003\u5bdf,\u201d<br>\u7b2c4\u56de\u3000\u5b89\u5168\u30fb\u5b89\u5fc3\u306a\u751f\u6d3b\u306e\u305f\u3081\u306e\u60c5\u5831\u901a\u4fe1\u30b7\u30b9\u30c6\u30e0\uff08ICSSSL\uff09\u7814\u7a76\u4f1a, 2013.12.&nbsp;<\/li>\n\n\n\n<li>\u524d\u7530 \u5c1a\u54c9, \u5be6\u677e \u8c4a**, \u9999\u7530 \u5fb9,<br>\u201c\u975e\u540c\u671fCDMA \u306b\u304a\u3051\u308b\u30e6\u30fc\u30b6\u9593\u5e72\u6e09\u306e\u6700\u9069\u5316\u3068\u30ab\u30aa\u30b9\u306b\u57fa\u3065\u304f\u62e1\u6563\u7b26\u53f7,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u975e\u7dda\u5f62\u554f\u984c\u7814\u7a76\u4f1a, Vol.111, No.276, pp. 91-96, 2012.11.&nbsp;<\/li>\n\n\n\n<li>\u524d\u5cf6 \u76f4\u6597, \u5be6\u677e \u8c4a**, \u6c38\u7530 \u8ce2\u4e8c, \u5ca1\u7530 \u771f\u4eba, \u9999\u7530 \u5fb9,<br>\u201c\u7a7a\u9593\u3086\u3089\u304e\u306e\u3042\u308b\u9023\u60f3\u8a18\u61b6\u306b\u304a\u3051\u308bS\/N \u89e3\u6790,\u201d<br>\u7b2c34 \u56de\u60c5\u5831\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0, 2011.11.&nbsp;<\/li>\n\n\n\n<li>\u936c\u5d0e \u8fb0\u99ac, \u9999\u7530 \u5fb9, \u5be6\u677e \u8c4a,<br>\u201c\u6642\u9593\u30fb\u5468\u6ce2\u6570\u306e\u305a\u308c\u3092\u8a31\u5bb9\u3059\u308bMC-CDMA\u306e\u6027\u80fd\u8a55\u4fa1,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u60c5\u5831\u7406\u8ad6\u7814\u7a76\u4f1a, Vol.110, No.442, pp. 271-276, 2011.03.&nbsp;<\/li>\n\n\n\n<li>\u524d\u7530 \u5c1a\u54c9, \u5be6\u677e \u8c4a**, \u9999\u7530 \u5fb9,<br>\u201c\u975e\u540c\u671fCDMA\u901a\u4fe1\u306b\u304a\u3051\u308b\u9045\u308c\u6642\u9593\u304c\u30e6\u30fc\u30b6\u9593\u5e72\u6e09\u306b\u4e0e\u3048\u308b\u5f71\u97ff,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u56de\u8def\u3068\u30b7\u30b9\u30c6\u30e0\u7814\u7a76\u4f1a, Vol.110, No.389, pp. 61-66, 2011.01.&nbsp;<\/li>\n\n\n\n<li>\u524d\u5cf6 \u76f4\u6597, \u5be6\u677e \u8c4a**, \u9999\u7530 \u5fb9,<br>\u201c\u63fa\u3089\u304e\u306e\u3042\u308b\u30cb\u30e5\u30fc\u30e9\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u304a\u3051\u308b\u9023\u60f3\u8a18\u61b6,\u201d<br>\u7b2c33\u56de\u60c5\u5831\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0, pp. 862-867, 2010.12.&nbsp;<\/li>\n\n\n\n<li>\u524d\u7530 \u5c1a\u54c9, \u5be6\u677e \u8c4a**, \u9999\u7530 \u5fb9,<br>\u201c\u30c1\u30c3\u30d7\u975e\u540c\u671fCDMA\u306b\u304a\u3051\u308b\u76f8\u4e92\u76f8\u95a2\u306e\u4e8c\u4e57\u306e\u7dcf\u548c\u306b\u3064\u3044\u3066,\u201d<br>\u7b2c33\u56de\u60c5\u5831\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0, pp. 478-483, 2010.12.&nbsp;<\/li>\n\n\n\n<li>\u9999\u7530 \u5fb9, \u5be6\u677e \u8c4a*, \u85e4\u91ce \u5065\u6cbb\u90ce, \u5408\u539f \u4e00\u5e78,<br>\u201cFD-based CDMA\u306b\u304a\u3051\u308bMAI\u306e\u5206\u6563\u306e\u8a55\u4fa1,\u201d<br>\u7b2c33\u56de\u60c5\u5831\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0, pp. 472-477, 2010.12.&nbsp;<\/li>\n\n\n\n<li>\u9999\u7530 \u5fb9, \u5be6\u677e \u8c4a*, \u524d\u5cf6 \u76f4\u6597,<br>\u201c\u63fa\u3089\u304e\u306e\u3042\u308b\u30cb\u30e5\u30fc\u30e9\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u304a\u3051\u308b\u9023\u60f3\u8a18\u61b6,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u60c5\u5831\u7406\u8ad6\u7814\u7a76\u4f1a, Vol.110, No.43, pp.1-5, 2010.05.&nbsp;<\/li>\n\n\n\n<li>\u9999\u7530 \u5fb9, \u5be6\u677e \u8c4a*, \u936c\u5d0e \u8fb0\u99ac, \u85e4\u91ce \u5065\u6cbb\u90ce,<br>\u201c\u30de\u30eb\u30b3\u30d5\u7b26\u53f7\u3067\u62e1\u6563\u5909\u8abf\u3055\u308c\u305f\u30ac\u30a6\u30b9\u30d5\u30a3\u30eb\u30bf\u7279\u6027\u3068\u305d\u306e\u30d5\u30a3\u30eb\u30bf\u30d0\u30f3\u30af\u7279\u6027,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u60c5\u5831\u7406\u8ad6\u7814\u7a76\u4f1a, Vol.108, No.472, pp.91-98, 2009.03.&nbsp;<\/li>\n\n\n\n<li>Jitsumatsu, Y.*, Kohda, T.,<br>\u201cSpreading sequences for CDMA channels with ISI\u201d<br>\u7b2c31\u56de \u60c5\u5831\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0, pp.54-59, 2008.10.&nbsp;<\/li>\n\n\n\n<li>Jitsumatsu, Y.*, Kohda, T.,<br>\u201cMarkov codes compensate ISI of Gaussian pulse,\u201d<br>\u7b2c\uff16\u56de\u30b7\u30e3\u30ce\u30f3\u7406\u8ad6\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7(STW08), 2008.11.&nbsp;<\/li>\n\n\n\n<li>Jitsumatsu, Y.*, Kohda, T.,<br>\u201cSlepian\u2019s prolate spheroidal wave functions revisited,\u201d<br>\u7b2c30\u56de \u60c5\u5831\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0, 2007.11.&nbsp;<\/li>\n\n\n\n<li>\u7fbd\u6839 \u7adc\u4e00, \u5be6\u677e \u8c4a**, \u9999\u7530 \u5fb9,<br>\u201c\u30de\u30eb\u30c1\u30e6\u30fc\u30b6\u53d7\u4fe1\u5668\u306e\u30d3\u30c3\u30c8\u53cd\u8ee2\u306b\u3088\u308b\u30a8\u30cd\u30eb\u30ae\u30fc\u95a2\u6570\u6e1b\u5c11\u6cd5,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u60c5\u5831\u7406\u8ad6\u7814\u7a76\u4f1a, Vol.106, No.594, pp.123-128, 2007.03.&nbsp;<\/li>\n\n\n\n<li>Jitsumatsu, Y.*, Khan, M. T. A., Kohda, T.,<br>\u201cCross Correlation Matrices for Multiuser Chip-Asynchronous DS\/CDMA systems,\u201d IEICE Tech. Report, Vol.105, No. 661, pp.159-163, 2006.03.&nbsp;<\/li>\n\n\n\n<li>Jitsumatsu, Y.*, Khan, M.T.A., and Kohda, T.,<br>\u201cVariance of Average Interference Parameters for LFSR and Random Markov Codes,\u201d<br>The 28th Sympo. on Information Theory and Its Applications (SITA2005), pp. 629-632, 2005.12.&nbsp;<\/li>\n\n\n\n<li>\u4e95\u4e0a \u7fd4\u592a\uff0c\u5be6\u677e \u8c4a**\uff0c\u9999\u7530 \u5fb9,<br>\u201c\u975e\u540c\u671fCDMA\u901a\u4fe1\u304b\u3089\u5c0e\u304b\u308c\u308b\u9023\u60f3\u8a18\u61b6\u306e\u7d50\u5408\u91cd\u307f,\u201d<br>\u7b2c28\u56de\u60c5\u5831\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u5b66\u4f1a (SITA2005), pp. 79-82, 2005.12.&nbsp;<\/li>\n\n\n\n<li>Jitsumatsu, Y.*, Hordoir L. Kohda, T.,<br>\u201cDigital Watermarking Based on Spread Spectrum Technique,\u201d<br>Proc. of the 2005 Symposium on Cryptography and Information Sequrity (SCIS2005).&nbsp;<\/li>\n\n\n\n<li>Jitsumatsu, Y.*, and Kohda, T.,<br>\u201cAssociative Memories with Asynchronously Overlapping Connections Learn Markov Pattern Better than I.I.D,\u201d<br>Proc. of the 28th Sympo. on Information Theory and Its Applications (SITA2005), pp. 87-90, 2005.12.&nbsp;<\/li>\n\n\n\n<li>\u670d\u90e8 \u6d0b\u8f14\uff0c\u5be6\u677e \u8c4a**\uff0c\u9999\u7530 \u5fb9,&nbsp;<br>\u201c\u30b9\u30da\u30af\u30c8\u30eb\u62e1\u6563\u65b9\u5f0f\u3092\u5229\u7528\u3057\u305f\u753b\u50cf\u4f1d\u9001\u6642\u306e\u96fb\u5b50\u900f\u304b\u3057\u30b7\u30b9\u30c6\u30e0\u306b\u304a\u3051\u308b\u900f\u304b\u3057\u30d3\u30c3\u30c8\u306e\u30d3\u30c3\u30c8\u8aa4\u308a\u7387,\u201d<br>Proc. of 2004., the 2004 Sympo. on Cryptography and Information Security (SCIS2004), pp.1197-1201, 2004.01.&nbsp;<\/li>\n\n\n\n<li>\u5be6\u677e \u8c4a*, \u6c5f\u5cf6 \u4f38\u8208, \u9999\u7530 \u5fb9,<br>\u201c\u30c1\u30c3\u30d7\u540c\u671fDS\/CDMA\u30b7\u30b9\u30c6\u30e0\u306b\u304a\u3051\u308b\u30de\u30eb\u30b3\u30d5SS\u7b26\u53f7\u306e\u540c\u671f\u6355\u6349,\u201d<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a,\u60c5\u5831\u7406\u8ad6\u7814\u7a76\u4f1a, Vol.103, No.308, pp.19-23, 2003.09.<\/li>\n\n\n\n<li>\u5be6\u677e \u8c4a*, \u9999\u7530 \u5fb9,<br>\u201c\u30de\u30eb\u30b3\u30d5\u9023\u9396\u306b\u57fa\u3065\u304f\u30b9\u30da\u30af\u30c8\u30eb\u62e1\u6563\u7b26\u53f7\u306e\u81ea\u5df1\u76f8\u95a2\u95a2\u6570\u306b\u3064\u3044\u3066,\u201d<br>\u7b2c24\u56de\u60c5\u5831\u7406\u8ad6\u3068\u305d\u306e\u5fdc\u7528\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0\u4e88\u7a3f\u96c6, 2001.12.&nbsp;<\/li>\n\n\n\n<li>\u5be6\u677e \u8c4a*, \u9999\u7530 \u5fb9,<br>\u201c\u591a\u5143\u901a\u4fe1\u306b\u304a\u3051\u308b\u540c\u671f\u78ba\u7acb\u306e\u96e3\u6613\u5ea6\u306b\u3064\u3044\u3066,\u201d<br>\u6570\u7406\u89e3\u6790\u7814\u7a76\u6240\u8b1b\u7a76\u93321240, \u77ed\u671f\u5171\u540c\u7814\u7a76\u300c\u78ba\u7387\u6570\u5024\u89e3\u6790\u306b\u65bc\u3051\u308b\u8af8\u554f\u984c, V\u300d, 2001.12.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u82f1\u6587\u8ad6\u6587\u8a8c\uff08\u67fb\u8aad\u3042\u308a\uff09 \u56fd\u969b\u4f1a\u8b70\uff08\u67fb\u8aad\u3042\u308a\uff09 \u8b1b\u6f14\u767a\u8868<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_wp_rev_ctl_limit":""},"class_list":["post-99","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.me.inf.kyushu-u.ac.jp\/jitsumatsu\/wp-json\/wp\/v2\/pages\/99","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.me.inf.kyushu-u.ac.jp\/jitsumatsu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.me.inf.kyushu-u.ac.jp\/jitsumatsu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.me.inf.kyushu-u.ac.jp\/jitsumatsu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.me.inf.kyushu-u.ac.jp\/jitsumatsu\/wp-json\/wp\/v2\/comments?post=99"}],"version-history":[{"count":3,"href":"https:\/\/www.me.inf.kyushu-u.ac.jp\/jitsumatsu\/wp-json\/wp\/v2\/pages\/99\/revisions"}],"predecessor-version":[{"id":398,"href":"https:\/\/www.me.inf.kyushu-u.ac.jp\/jitsumatsu\/wp-json\/wp\/v2\/pages\/99\/revisions\/398"}],"wp:attachment":[{"href":"https:\/\/www.me.inf.kyushu-u.ac.jp\/jitsumatsu\/wp-json\/wp\/v2\/media?parent=99"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}