IEICE ESS Fundamentals Review
Online ISSN : 1882-0875
ISSN-L : 1882-0875
Volume 12, Issue 3
Displaying 1-22 of 22 articles from this issue
Cover
• 2019 Volume 12 Issue 3 Pages 0
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS
• 2019 Volume 12 Issue 3 Pages 170
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS
Proposed by Editorial Committee
• Hiroshi TANIMOTO
2019 Volume 12 Issue 3 Pages 171-181
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS

Mainly using a differential pair, we analyze the properties of a symmetrical circuit diagram; conversely we try to reinvent the differential pair from scratch using these properties. Through this process, we will give some examples of utilizing the symmetry of a circuit to realize the necessary electrical input-output functions. We thus demonstrate the usefulness and beauty of the symmetry.

Proposed by IT(Information Theory)
• Hajime MATSUI
2019 Volume 12 Issue 3 Pages 182-190
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS

A multiple-valued logic function is a multivariable function whose input and output are in a finite field and is applied to the construction of switching circuits. A multiple-valued logic polynomial is a multivariable polynomial with coefficients in a finite field. It is known that multiple-valued logic functions are equal to multiple-valued logic polynomials. Because error-correcting codes and multiple-valued logic polynomials have a dual relationship with each other, the research results of error-correcting codes can be employed to multiple-valued logic polynomials. In this study, a generalized “convolution theorem” is described, which is a relationship between multiple-valued logic functions and polynomials through discrete Fourier transforms, and it is generalized to a subset of finite fields called a semigroup. Next, this theorem is applied to speed up the multiplication of multiple-valued logic polynomials. Finally, to show a relationship between multiple-valued logic functions and error-correcting codes, a method of explicitly obtaining dual codes is given.

Review Papers
Proposed by RCC(Reliable Communication and Control)
• Masaki OGURA
2019 Volume 12 Issue 3 Pages 191-200
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS

Networked structures can be found in various important applications including communication networks, social networks, and transportation networks. A complex network structure often yields a large-scale dynamical system by connecting possibly simple and low-dimensional dynamical systems. To effectively analyze and control a large-scale dynamical system as a whole, it is of practical importance to develop a methodology for efficiently distributing control resources over a complex network structure. In this context, this article gives an overview of convex-optimization-based approaches for effectively distributing medical and social resources toward the containment of a disease spread over human social networks.

Proposed by SITE(Social Implications of Technology and Information Ethics)
• Shunzo MAJIMA
2019 Volume 12 Issue 3 Pages 201-208
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS

In this article. I examine ethical issues surrounding combat drones, including autonomous ones, as one of the case studies of war ethics or the ethics of war, which is one of the disciplines of applied ethics. The main body of this article consists of 4 sections (Sections 2-5). In Section 2, I will provide a brief overview of war ethics. In Section 3, I will sketch an outline of ‘just war theory’, which is one of the mainstream approaches, along with political realism and pacifism in war ethics. In Section 4, I will introduce several topics and issues, currently being discussed in war ethics. In Section 5, I will conclude by illustrating a hopefully counterfactual dystopian future where fully autonomous combat drones are frequently used as a method of attack.

Miscellaneous Articles
ESS News
• [in Japanese]
2019 Volume 12 Issue 3 Pages 209
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS
• [in Japanese]
2019 Volume 12 Issue 3 Pages 210-212
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS
Let's go to IEICE Workshops!
• [in Japanese]
2019 Volume 12 Issue 3 Pages 213
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS
• [in Japanese]
2019 Volume 12 Issue 3 Pages 214
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS
• [in Japanese]
2019 Volume 12 Issue 3 Pages 214b-215
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS
• [in Japanese]
2019 Volume 12 Issue 3 Pages 215-216
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS
• [in Japanese]
2019 Volume 12 Issue 3 Pages 216
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS
• [in Japanese]
2019 Volume 12 Issue 3 Pages 216b-217
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS
• [in Japanese]
2019 Volume 12 Issue 3 Pages 217-218
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS
• [in Japanese]
2019 Volume 12 Issue 3 Pages 218-219
Published: January 01, 2019
Released on J-STAGE: January 01, 2019
JOURNAL FREE ACCESS