default search action
Yutaka Jitsumatsu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Tania Sultana, Sho Kurosaki, Yutaka Jitsumatsu, Shigehide Kuhara, Jun'ichi Takeuchi:
Brain Tumor Classification using Under-Sampled k-Space Data: A Deep Learning Approach. IEICE Trans. Inf. Syst. 106(11): 1831-1841 (2023) - [c34]Yutaka Jitsumatsu:
Computation of Marton's Error Exponent for Discrete Memoryless Sources. ISIT 2023: 1372-1377 - [i6]Yutaka Jitsumatsu:
Computing the optimal error exponential function for fixed-length lossy coding in discrete memoryless sources. CoRR abs/2304.11558 (2023) - [i5]Yutaka Jitsumatsu:
Computation of the optimal error exponent function for fixed-length lossy source coding in discrete memoryless sources. CoRR abs/2312.03784 (2023) - [i4]Yutaka Jitsumatsu:
2D Sinc Interpolation-Based Fractional Delay and Doppler Estimation Using Time and Frequency Shifted Gaussian Pulses. CoRR abs/2312.04969 (2023) - 2022
- [i3]Yutaka Jitsumatsu, Yasutada Oohama:
A Family of Algorithms for Computing Information-Theoretic Forms of Strong Converse Exponents in Channel Coding and Lossy Source Coding. CoRR abs/2205.06027 (2022) - 2021
- [j4]Yutaka Jitsumatsu, Ukyo Michiwaki, Yasutada Oohama:
Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 295-304 (2021) - 2020
- [j3]Yutaka Jitsumatsu, Yasutada Oohama:
A New Iterative Algorithm for Computing the Correct Decoding Probability Exponent of Discrete Memoryless Channels. IEEE Trans. Inf. Theory 66(3): 1585-1606 (2020)
2010 – 2019
- 2019
- [i2]Yutaka Jitsumatsu, Ukyo Michiwaki, Yasutada Oohama:
The Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels. CoRR abs/1901.06442 (2019) - 2018
- [j2]Dongshin Yang, Yutaka Jitsumatsu:
Super Resolution Channel Estimation by Using Spread Spectrum Signal and Atomic Norm Minimization. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2141-2148 (2018) - [c33]Dongshin Yang, Yutaka Jitsumatsu:
Super Resolution Channel Estimation with Spread Spectrum Signal and Atomic Norm Minimization. ISITA 2018: 144-148 - [c32]Ukyo Michiwaki, Yutaka Jitsumatsu:
A new proof of an inequality between two secrecy exponents. ISITA 2018: 747-751 - 2017
- [c31]Yutaka Jitsumatsu:
Computation of the random coding secrecy exponent for a constant composition ensemble. ISIT 2017: 1713-1717 - 2016
- [c30]Yutaka Jitsumatsu, Yasutada Oohama:
Computing the optimal exponent of correct decoding for discrete memoryless sources. ISIT 2016: 1531-1535 - [i1]Yutaka Jitsumatsu, Yasutada Oohama:
An Iterative Algorithm for Computing the Optimal Exponent of Correct Decoding Probability for Rates below the Rate Distortion Function. CoRR abs/1601.06094 (2016) - 2015
- [c29]Yasutada Oohama, Yutaka Jitsumatsu:
A new iterative algorithm for computing the optimal exponent of correct decoding for discrete memoryless channels. ISIT 2015: 924-928 - [c28]Shuntaro Ito, Dongshin Yang, Yutaka Jitsumatsu:
Estimation of Multi-Path Channels by Using the Annihilating Filter Method. VTC Fall 2015: 1-5 - 2014
- [c27]Yutaka Jitsumatsu, Tohru Kohda:
Digital Phase Updating Loop and Delay-Doppler Space Division Multiplexing for Higher Order MPSK. MACOM 2014: 1-15 - [c26]Yutaka Jitsumatsu, Masahiro Hashiguchi, Tatsuro Higuchi:
Optimal Sign Patterns for a Generalized Schmidl-Cox Method. SETA 2014: 269-279 - [c25]Tohru Kohda, Yutaka Jitsumatsu, Kazuyuki Aihara:
Phase-tuned layers with multiple 2D SS codes realize 16PSK communication. WCNC 2014: 457-462 - [c24]Tatsuro Higuchi, Yutaka Jitsumatsu:
Design criteria of preamble sequence for multipath fading channels with Doppler shift. WPMC 2014: 152-157 - 2013
- [c23]Takaki Makino, Yukiko Iwata, Yutaka Jitsumatsu, Masao Hotta, Hao San, Kazuyuki Aihara:
Rigorous analysis of quantization error of an A/D converter based on β-map. ISCAS 2013: 369-372 - [c22]Yutaka Jitsumatsu, Tohru Kohda, Kazuyuki Aihara:
Spread spectrum-based cooperative and individual time-frequency synchronization. ISWCS 2013: 1-5 - [c21]Tohru Kohda, Yutaka Jitsumatsu, Kazuyuki Aihara:
Recovering noncoherent MPSK signal with unknown delay and Doppler using its ambiguity function. ITST 2013: 255-260 - [c20]Tohru Kohda, Yutaka Jitsumatsu, Kazuyuki Aihara:
Signals that can be easily time-frequency synchronized from their ambiguity function. ITW 2013: 1-5 - [c19]Yutaka Jitsumatsu, Tohru Kohda, Kazuyuki Aihara:
Delay-Doppler Space Division-Based Multiple-Access Solves Multiple-Target Detection. MACOM 2013: 39-53 - [c18]Tohru Kohda, Yutaka Jitsumatsu, Kazuyuki Aihara:
Gabor Division/Spread Spectrum System Is Separable in Time and Frequency Synchronization. VTC Fall 2013: 1-5 - [c17]Tohru Kohda, Yutaka Jitsumatsu, Kazuyuki Aihara:
PLL-free receiver for Gabor division/spread spectrum system. WiMob 2013: 645-652 - 2012
- [c16]Tohru Kohda, Yutaka Jitsumatsu, Kazuyuki Aihara:
Frequency-division spread-spectrum makes frequency synchronisation easy. GLOBECOM 2012: 3952-3958 - [c15]Tohru Kohda, Yutaka Jitsumatsu, Kazuyuki Aihara:
Frequency synchronisation using SS technique. ISWCS 2012: 855-859 - [c14]Yutaka Jitsumatsu, Tohru Kohda, Kazuyuki Aihara:
Welch Bound for Bandlimited and Timelimited Signals. SETA 2012: 269-278 - 2011
- [c13]Tohru Kohda, Yutaka Jitsumatsu, Kazuyuki Aihara:
2D Markovian SS codes flatten time-frequency distribution of signals in asynchronous Gabor division CDMA systems. ICASSP 2011: 3140-3143 - 2010
- [c12]Mohamed Saber, Yutaka Jitsumatsu, Muhammad Tahir Abbas Khan:
Design and implementation of low power digital phase-locked loop. ISITA 2010: 928-933
2000 – 2009
- 2008
- [c11]Yutaka Jitsumatsu, Tohru Kohda:
Quasi-Orthogonal Multi-Carrier CDMA. GLOBECOM 2008: 1157-1161 - [c10]Yutaka Jitsumatsu, Tohru Kohda:
Prolate spheroidal wave functions induce Gaussian chip waveforms. ISIT 2008: 1363-1367 - 2007
- [c9]Yutaka Jitsumatsu, Tohru Kohda:
Welch Bound for FIR Lowpass Filtered Sequences. ISIT 2007: 2506-2509 - 2006
- [c8]Yutaka Jitsumatsu, Tahir Abbas Khan, Tohru Kohda:
Gaussian Chip Waveform Together with Markovian Spreading Codes Improve BER Performance in Chip-Asynchronous CDMA Systems. GLOBECOM 2006 - [c7]Yutaka Jitsumatsu, Tohru Kohda:
Gaussian chip shaping enhances the superiority of Markovian codes in DS/CDMA systems. ISCAS 2006 - [c6]Yutaka Jitsumatsu, Tohru Kohda:
A lower bound on the mean squared correlations for band-limited asynchronous DS/CDMA systems. ISIT 2006: 1524-1528 - [c5]Yutaka Jitsumatsu, Tohru Kohda:
Chip-Asynchronous Version of Welch Bound: Gaussian Pulse Improves BER Performance. SETA 2006: 351-363 - 2005
- [j1]Tahir Abbas Khan, Nobuoki Eshima, Yutaka Jitsumatsu, Tohru Kohda:
Code Acquisition in DS/CDMA Systems by Employing a Detector Based on a posteriori Probability Calculation. IEICE Trans. Commun. 88-B(10): 4047-4055 (2005) - [c4]Yutaka Jitsumatsu, Tohru Kohda:
Design of code-matched receiver for DS/CDMA communications. ISCAS (2) 2005: 884-887 - [c3]Tohru Abbas Khan, Nobuoki Eshima, Yutaka Jitsumatsu, Tohru Kohda:
A novel code acquisition algorithm and its application to Markov spreading codes. ISCAS (3) 2005: 2056-2059 - 2004
- [c2]Nobuoki Eshima, Yutaka Jitsumatsu, Tohru Kohda:
Markovian SS codes imply inversion-free code acquisition in asynchronous DS/CDMA systems. ISCAS (4) 2004: 617-620 - 2003
- [c1]Tohru Kohda, Yutaka Jitsumatsu, Tahir Abbas Khan:
Spread-spectrum Markovian-code acquisition in asynchronous DS/CDMA systems. ISCAS (3) 2003: 750-753
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint