Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NLP |
2024-05-10 09:55 |
Kagawa |
Kagawa Prefecture Social Welfare Center |
Suppression mechanism of combustion instability in a swirl-stabilized combustor Kazune Sato, Takuya Tamura, Yusuke Nabae, Hiroshi Gotoda (TUS) NLP2024-10 |
(To be available after the conference date) [more] |
NLP2024-10 pp.49-51 |
RCS |
2024-04-26 09:30 |
Hiroshima |
(Primary: On-site, Secondary: Online) |
Performance Comparison of Null-Space Expansion in Low Computation Block Diagonalization-based Multi-User Massive MIMO Yuki Sasaki (Tokyo Univ, of Science), Kabuto Arai (The Univ. of Electro-Communications), Kazuki Maruta (Tokyo Univ, of Science) RCS2024-6 |
This paper proposes a novel precoding weight design that enhances interference suppression performance with low computat... [more] |
RCS2024-6 pp.26-31 |
RCS |
2024-04-26 09:55 |
Hiroshima |
(Primary: On-site, Secondary: Online) |
Performance Improvement by Dimensionality Reduction of Interference Subspace on One-Shot Null-Space Expansion for Massive MIMO Soya Nakamura, Yuki Sasaki, Kazuki Maruta (Tokyo Univ. of Science) RCS2024-7 |
Massive MIMO Null Space Expansion (NSE) is effective multiuser precoding scheme in time-varying channels,taking advantag... [more] |
RCS2024-7 pp.32-37 |
RCS |
2024-04-26 10:20 |
Hiroshima |
(Primary: On-site, Secondary: Online) |
Extended Angle-Domain Beam Grouping-Based Beam Selection for Massive MIMO Analog Beamforming Using NOMA in Cellular Downlink Nobuhide Nonaka, Kenichi Higuchi (Tokyo Univ. of Science) RCS2024-8 |
[more] |
RCS2024-8 pp.38-45 |
RCS |
2024-04-26 11:30 |
Hiroshima |
(Primary: On-site, Secondary: Online) |
[Invited Lecture]
Effectiveness of Crowdsourced Radio Unit (CRU) to Accommodate Multiple Terminals in Dense Environment Hideya So (SIT), Kazuki Maruta (TUS), Yu Nakayama (TUAT) RCS2024-10 |
Centralized Radio Access Networks (C-RANs) have been considered to accommodate the increasing mobile traffic year by yea... [more] |
RCS2024-10 p.47 |
HWS |
2024-04-19 16:50 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Supply chain risk and hardware trojan protection Shinichi Kawamura, Tsutomu Matsumoto, Hirotaka Yoshida (AIST), Yasuyoshi Uemura (SCU), Makoto Nagata (Kobe Univ.), Makoto Ikeda (Tokyo Univ.), Ken Takano (LINTEC) HWS2024-6 |
[more] |
HWS2024-6 pp.24-29 |
MW, WPT |
2024-04-18 14:45 |
Kanagawa |
Kanagawa University (Primary: On-site, Secondary: Online) |
A 125 GHz Broadband Compact CMOS Power Divider Shun Beppu, Kyoya Takano (Tokyo Univ. of Sciencee) WPT2024-5 MW2024-5 |
[more] |
WPT2024-5 MW2024-5 pp.23-26 |
NS |
2024-04-12 11:50 |
Okayama |
Okayama Prefectural Library + Online (Primary: On-site, Secondary: Online) |
Evaluation of Anomaly Localization Method Using Receiver-Side Quality Data in Optical Transmission Systems Kohei Watanabe, Hiroshi Yamamoto, Hiroki Date, Daisaku Shimazaki (NTT), Yutaka Fukuchi, Hideki Maeda (TUS) NS2024-12 |
Optical transport networks require high reliability and availability since they are important infrastructure for carryin... [more] |
NS2024-12 pp.53-57 |
CCS |
2024-03-27 10:15 |
Hokkaido |
RUSUTSU RESORT |
Performance Evaluation of Coupling Models between Oscillators for Performance Improving of Desynchronization-type TDMA Hiroyuki Yasuda (The Univ. of Tokyo), Mikio Hasegawa (Tokyo Univ. of Science), Kazuyuki Aihara (The Univ. of Tokyo) CCS2023-39 |
[more] |
CCS2023-39 pp.1-5 |
CCS |
2024-03-27 11:05 |
Hokkaido |
RUSUTSU RESORT |
Implementation of Wireless Spiking Neural Networks with Asynchronous Pulse Code Multiple Access Haruto Ota, Ryuji Nagazawa, Jiaying Lin, Kien Nguyen (Chiba Univ.), Hiroyuki Torikai (Housei Univ.), Mikio Hasegawa (Tokyo Univ. of Science), Woo-Joo Hwang (Pusan National Univ.), Hiroo Sekiya (Chiba Univ.) CCS2023-41 |
(To be available after the conference date) [more] |
CCS2023-41 pp.12-17 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2024-03-22 09:50 |
Nagasaki |
Ikinoshima Hall (Primary: On-site, Secondary: Online) |
Integration of Vector Extension and Simultaneous Multithreading for a RISC-V Processor Hidetaro Tanaka, Shogo Takata, Hironori Nakajo (TUAT) CPSY2023-43 DC2023-109 |
In vector architectures, the potential for parallel execution lies in the chaining of instruction sequences. However, a ... [more] |
CPSY2023-43 DC2023-109 pp.29-34 |
AP |
2024-03-14 13:50 |
Fukui |
UNIVERSITY OF FUKUI (Primary: On-site, Secondary: Online) |
[Invited Talk (Young Researcher)]
Studies on computation time improvements for the MR/FDTD method Kei Asahi, Takuji Arima (TUAT) AP2023-206 |
With the ongoing developments of the telecommunication technologies, further complexification of the commonly used commun... [more] |
AP2023-206 pp.29-34 |
CAS, CS |
2024-03-14 16:45 |
Okinawa |
|
A Study of Designing Flat Passband FIR Filters with Specified Attenuation and Variable Multiple Factors in Stopband Toma Miyata (Salesian Polytechnic), Yasunori Sugita (NUT), Naoyuki Aikawa (TUS) CAS2023-124 CS2023-117 |
In order to efficiently eliminate noise in weight measurement, design methods of FIR filters with high attenuation in a ... [more] |
CAS2023-124 CS2023-117 pp.74-77 |
KBSE |
2024-03-14 17:35 |
Okinawa |
Okinawa Prefectual General Welfare Center (Primary: On-site, Secondary: Online) |
Priority-based On-the-fly Exploration for Discrete Controller Synthesis Hiroki Takeuchi, Takuto Yamauchi (Waseda Univ.), Kenji Tei (Tokyo Tech) KBSE2023-80 |
[more] |
KBSE2023-80 pp.82-83 |
RCS, SR, SRW (Joint) |
2024-03-13 09:55 |
Tokyo |
The University of Tokyo (Hongo Campus), and online (Primary: On-site, Secondary: Online) |
User Scheduling based on Expanded Null-Space for Massive MIMO Yuki Sasaki (Tokyo Univ. of Scince), Kabuto Arai (The Univ. of Electro-Communications), Jin Nakazato (UTokyo), Kazuki Maruta (Tokyo Univ. of Scince) RCS2023-250 |
This paper proposes a user scheduling scheme for multi-user massive MIMO (MU-mMIMO), particularly effective in time-vary... [more] |
RCS2023-250 pp.1-6 |
NLP, MSS |
2024-03-13 10:50 |
Misc. |
Kikai-Shinko-Kaikan Bldg. |
An Intelligent Traffic Signal Control Method for a Fukui-Ishibashi-Type Traffic Flow Model
-- Applications to a Real City Model and Verification -- Takuya Akiyama, Tatsuya Kai (Tokyo Univ. of Science) MSS2023-72 NLP2023-124 |
[more] |
MSS2023-72 NLP2023-124 pp.9-12 |
IE, MVE, CQ, IMQ (Joint) [detail] |
2024-03-13 10:20 |
Okinawa |
Okinawa Sangyo Shien Center (Primary: On-site, Secondary: Online) |
Exploring the impressions formed from age-specific product descriptions generated by ChatGPT Tatsuya Maseki, Rintaro Chujo, Ari Hautasaari, Yoshihiro Kawahara, Takeshi Naemura (Tokyo Univ.) IMQ2023-26 IE2023-81 MVE2023-55 |
This study explores the generation of product descriptions on flea market apps that take into account the reader’s age g... [more] |
IMQ2023-26 IE2023-81 MVE2023-55 pp.75-80 |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network. Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 |
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more] |
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 pp.249-253 |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Content-Similarity in DNS Graph WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 |
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] |
IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 pp.332-336 |
RCC, ISEC, IT, WBS |
2024-03-14 15:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Machine Learning Using DNS Graph Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 |
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more] |
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 pp.337-342 |