Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICD, SDM, ITE-IST [detail] |
2016-08-03 14:40 |
Osaka |
Central Electric Club |
PN-Body Tied Super Steep SS FET with Body Bias below 1V and Drain Bias 0.1V Takahiro Yoshida, Jiro Ida, Takashi Horii (KIT), Masao Okihara (Lapis), Yasuo Arai (KEK) SDM2016-66 ICD2016-34 |
We have found out that the super steep Subthreshold Slope (SS) of the PN-body tied SOI FET appeared with the body voltag... [more] |
SDM2016-66 ICD2016-34 pp.117-121 |
IT, EMM |
2016-05-19 13:40 |
Hokkaido |
Otaru Economic Center |
A Consideration on Relationships between Correlation of Information Stored on Nodes and Coding Efficiency for Cooperative Regenerating Codes Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.) IT2016-5 EMM2016-5 |
In this study, we consider cooperative regenerating codes for distributed storage systems.
Cooperative regenerating cod... [more] |
IT2016-5 EMM2016-5 pp.25-30 |
EMCJ, IEE-EMC |
2015-12-18 11:20 |
Aichi |
TOYOTA CENTRAL R&D LABS., INC. |
Effect of AC Coupling of Ground Connection between Audio Equipment on Propagation Noise Suppression and Inter-Modulation Distortion Reduction Shuhei Tagaya, Takahiro Yoshida (Tokyo Univ. of Science) EMCJ2015-93 |
As we consider that the propagation noise on the ground line of interconnection between audio equipment affect their pla... [more] |
EMCJ2015-93 pp.19-23 |
BioX |
2015-08-24 16:15 |
Hokkaido |
Otaru Port Marina |
A Study on Individuality of Time Series Centripetal Acceleration Data in Writing Marks on Smart Phone Yelim Kang, Takahiro Yoshida, Seiichiro Hangai (TUS) BioX2015-17 |
Sign authentication is one of behavioral biometrics. Advantages of the sign authentication are small load of users and u... [more] |
BioX2015-17 pp.21-26 |
BioX, ITE-ME, ITE-IST |
2015-06-29 13:30 |
Ishikawa |
Kanazawa University, Kakuma Campus |
A Study on Easy Owner Authentication using Hand-written Alphabets on Smart Phone Shingo Watanabe, Takahiro Yoshida, Seiichiro Hangai (TUS) BioX2015-5 |
In recently, multi-function mobile phones such as smart phone have been spread, online shopping with non-face to face by... [more] |
BioX2015-5 pp.33-38 |
BioX |
2014-10-16 14:55 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki) |
A Study on Fingerprint Authentication Using Camera Image and its Interoperability Yusuke Takahashi, Takahiro Yoshida, Seiichiro Hangai (TUS) BioX2014-31 |
In current fingerprint authentication, a requirement of a fingerprint scanner device limits the use of the fingerprint a... [more] |
BioX2014-31 pp.17-22 |
BioX |
2014-10-17 09:30 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki) |
A Study on Owner Authentication by Hand-written Sign on Smart Phone Yuki Tanaka, Takahiro Yoshida, Seiichiro Hangai (Tokyo Univ. of Science) BioX2014-34 |
With the spread of usersof portable smartphones and tablets, personal authentication based on handwritten characters/fig... [more] |
BioX2014-34 pp.31-36 |
MBE, BioX |
2014-09-12 13:55 |
Nagano |
Shinshu University |
A study on speaker authentication using LSP information of CELP encoder Naoki Nishizawa, Takahiro Yoshida, Seiichiro Hangai (Tokyo Univ. of Science) BioX2014-15 MBE2014-38 |
Analysis-synthesis coding method of speech called CELP in VoIP and cellular phones are used. It is believed to be able t... [more] |
BioX2014-15 MBE2014-38 pp.27-32 |
IT |
2013-07-25 15:30 |
Tokyo |
Nishi-Waseda campus, Waseda University |
A Consideration on Modeling and Optimality of Regenerating Codes Considering Security of Shares Takahiro Yoshida (Yokohama College of Commerce), Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.) IT2013-16 |
e consider regenerating codes. Regenerating codes are a class of codes for distributed storage systems that enable a dat... [more] |
IT2013-16 pp.27-32 |
BioX (2nd) |
2013-05-24 17:40 |
Toyama |
Toyama Prefectural University |
[Poster Presentation]
Application of Turning Points of Writing Pressure to Japanese Online Signature Verification Chihiro Koshiba, Takahiro Yoshida, Seiichiro Hangai (TUS) |
International standard for signature/sign processed data discussed in ISO/IEC JTC1 SC37 WG3 part11 has been issued. In t... [more] |
|
BioX (2nd) |
2013-05-24 17:40 |
Toyama |
Toyama Prefectural University |
[Poster Presentation]
A Study on the Block size for stable Minutiae Extraction in Fingerprint Authentication Yuki Higuchi, Takahiro Yoshida, Seiichiro Hangai (TUS) |
[more] |
|
IT, ISEC, WBS |
2013-03-07 14:30 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
A consideration on minimum storage regenerating codes for functions Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.) IT2012-78 ISEC2012-96 WBS2012-64 |
We consider regenerating codes for functions. Regenerating codes are a class of codes for distributed storage systems th... [more] |
IT2012-78 ISEC2012-96 WBS2012-64 pp.107-112 |
BioX (2nd) |
2012-08-27 16:00 |
Tokyo |
Waseda Univ. Nishiwaseda Campus |
A study on the Individuality Included in Dynamic Minutiae Change with Different Finger Pressure Levels Aya Hasegawa, Takahiro Yoshida, Kaichi Fujimura, Seiichiro Hangai (TUS) |
In Finger Authentication, Minutiae changes dynamically with different finger pressure even if the fingerprint is detecte... [more] |
|
IT |
2012-05-25 14:00 |
Fukuoka |
|
A consideration on characteristics of Huffman codes for binary memoryless sources Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.) IT2012-1 |
We consider characteristics of Huffman codes for extended binary memoryless sources. The construction of Huffman codes c... [more] |
IT2012-1 pp.1-6 |
IT |
2011-07-21 15:15 |
Okayama |
Okayama University |
A study of statistical modeling of authentication using PUF Satoru Ishii (Waseda Univ.), Takahiro Yoshida (Aoyama Univ.), Shunsuke Horii, Toshiyasu Matsushima (Waseda Univ.) IT2011-13 |
Nowadays, it is pointed out that storing the secret in nonvolatile memory of the device has a chance to leak the secret ... [more] |
IT2011-13 pp.19-24 |
ISEC, IT, WBS |
2011-03-04 13:50 |
Osaka |
Osaka University |
A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.) IT2010-112 ISEC2010-116 WBS2010-91 |
A key distribution scheme (KDS) is a method of distributing secret keys in the network. In the conventional KDS, the sec... [more] |
IT2010-112 ISEC2010-116 WBS2010-91 pp.289-294 |
EA, US (Joint) |
2011-01-21 11:00 |
Kyoto |
Doshisha Univ. |
Influences on Jitter Characteristics of Digital Audio Interface by the AC Power condition Hiroki Koyama, Atsushi Hata, Takahiro Yoshida, Noriaki Masui (TUS) US2010-105 EA2010-118 |
It is said that the sound quality and perceptible sound scape are different by the condition of AC power supplied to the... [more] |
US2010-105 EA2010-118 pp.77-82 |
EA, US (Joint) |
2011-01-21 11:30 |
Kyoto |
Doshisha Univ. |
A study on time domain audio signal analysis for measurement of nuance of sound Atsushi Hata, Hiroki Koyama, Takahiro Yoshida, Noriaki Masui (TUS) US2010-106 EA2010-119 |
Our goal is to develop measurement and analysis method of perceptible difference of sound quality and nuance. In this st... [more] |
US2010-106 EA2010-119 pp.83-88 |
IT |
2011-01-18 11:40 |
Nara |
|
Lower bounds on the memory size of entities for a ramp key distribution scheme and an optimal construction Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.) IT2010-57 |
The security notion of conventional ramp key distribution scheme (KDS) is that fraudulent centers and users can get part... [more] |
IT2010-57 pp.19-24 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2010-12-01 11:05 |
Fukuoka |
Kyushu University |
A study of the success rate of MIA under various probability density function estimations Yohei Hori (AIST), Takahiro Yoshida (Aoyama Univ.), Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-48 |
The pfrobability density function (PDF) of voltage of AES hardware
module is estimated in various ways and applied to ... [more] |
RECONF2010-48 pp.55-60 |