Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2022-03-08 10:40 |
Online |
Online |
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 2) Kazuomi Oishi (SIST) ICSS2021-69 |
Taking into account CPU-level ROP (Return-Oriented Programming) defenses such as Intel CET, we study implementation feas... [more] |
ICSS2021-69 pp.61-65 |
SWIM |
2022-02-18 12:45 |
Online |
Online |
A Method of Assessment for Empowerment Arts Therapy Michi Komura (Osaka City Univ.), Akihiro Hayashi (SIST) SWIM2021-31 |
The author has been engaged in the interdisciplinary collaborative research on various types of arts therapy activities ... [more] |
SWIM2021-31 pp.1-7 |
SWIM |
2022-02-18 13:35 |
Online |
Online |
Proposal of Circulatory Data Model between Big Data and Fog Nodes Tsukasa Kudo, Takehiro Yamamoto, Tomoki Watanabe (SIST) SWIM2021-33 |
Currently, a large amount of data is published on the cloud as big data. However, since it is not fit for the individual... [more] |
SWIM2021-33 pp.15-22 |
SWIM |
2022-02-18 15:00 |
Online |
Online |
Shortening the Time to Calculate Parts Requirements in Small Manufacturing Companies Masami Muramatsu, Akihiro Hayashi (SIST) SWIM2021-36 |
CompanyA, a small manufacturing company, had been deciding the quantity of parts to be procured based on the experience ... [more] |
SWIM2021-36 pp.37-43 |
SWIM |
2022-02-18 15:25 |
Online |
Online |
Minutes creation using a web application Akira Shimada, Akihiro Hayashi (sist) SWIM2021-37 |
[more] |
SWIM2021-37 pp.44-50 |
SWIM |
2022-02-18 16:00 |
Online |
Online |
Training Data Generation Method for Object Recognition from Free Direction
-- Two Approaches Utilizing Video and CG -- Masatomo Ozeki, Ayaka Kumeta, Tsukasa Kudo (SIST) SWIM2021-38 |
Object recognition utilizing deep learning is widely applied in various fields. On the other hand, the preparation of tr... [more] |
SWIM2021-38 pp.51-58 |
MW |
2021-12-16 15:40 |
Kanagawa |
Kawasaki City Industrial Promotion Hall (Primary: On-site, Secondary: Online) |
Series-Series Feedback D-band CMOS Amplifier using a Radial Stub for Source Grounding Taiki Machii (Tohoku Univ.), Mizuki Motoyoshi (SIST), Suguru Kameda (Hiroshima Univ.), Noriharu Suematsu (Tohoku Univ.) MW2021-93 |
Positive feedback is effective to improve the gain since sufficient gain cannot be achieved with over-100 GHz CMOS ampli... [more] |
MW2021-93 pp.49-54 |
ICSS |
2021-11-29 13:25 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
A Study on Tamper Resistance of Trusted Execution Environment Kazuomi Oishi (SIST) ICSS2021-47 |
A Trusted Execution Environment (TEE) provides isolated execution inside a TEE from the outside. The outside environment... [more] |
ICSS2021-47 pp.7-12 |
SWIM |
2021-11-27 15:55 |
Online |
Online |
Contour Detection Method Using CycleGAN with CG Images as Ground Truth Tsukasa Kudo (SIST) SWIM2021-29 |
In object detection from images, contour detection methods with pixel by pixel manner by using GAN have been proposed. H... [more] |
SWIM2021-29 pp.23-28 |
MW |
2021-11-19 11:50 |
Kagoshima |
Kagoshima University (Primary: On-site, Secondary: Online) |
A 130 GHz CMOS Amplifier Using Radial Stubs as AC Grounds in Its Matching Circuit Taiki Machii (Tohoku Univ.), Mizuki Motoyoshi (SIST), Suguru Kameda (Hiroshima Univ.), Noriharu Suematsu (Tohoku Univ.) MW2021-79 |
Low-loss matching circuit is an important issue since sufficient gain cannot be achieved with over-100 GHz CMOS amplifie... [more] |
MW2021-79 pp.69-74 |
SWIM, SC |
2021-08-27 13:10 |
Online |
Online |
Process Improvement Activities To Improve Productivity
-- Continued process improvement activities after achieving CMMI Level 3 -- Akihiro Hayashi (SIST) SWIM2021-19 SC2021-17 |
The process improvement activity using the Capability Maturity models Integration, which has been
continuing since 2000... [more] |
SWIM2021-19 SC2021-17 pp.38-45 |
SWIM |
2021-02-19 13:10 |
Online |
Online |
Establishment of Marketing Research by using Twitter Kohei Takahashi, Akihiro Hayashi (SIST) SWIM2020-13 |
[more] |
SWIM2020-13 pp.1-7 |
SWIM |
2021-02-19 14:25 |
Online |
Online |
Establishment Method of Introduction Model of Green Tourism
-- Case Studies in Izu and Recommendations To Fukui -- Yuki Yoshinaga, Akihiro Hayashi (SIST) SWIM2020-16 |
[more] |
SWIM2020-16 pp.22-29 |
SWIM |
2021-02-19 15:00 |
Online |
Online |
Establishment of Introduction Model of Agritourism
-- Case Analysis of Izumi City and Recommendation to Fukuroi City -- Tatsuki Hoshino, Akihiro Hayashi (SIST) SWIM2020-17 |
[more] |
SWIM2020-17 pp.30-37 |
SWIM |
2020-11-28 16:05 |
Online |
Online |
Recognition of moving objects taken by a wearable camera Tsukasa Kudo (SIST) SWIM2020-12 |
For videos and images, the accuracy of image recognition has been improved by utilizing deep learning, and application f... [more] |
SWIM2020-12 pp.40-45 |
ICSS |
2020-11-26 16:25 |
Online |
Online |
A Study on Anonymous Identifiers and its Applications Kazuomi Oishi (SIST) ICSS2020-25 |
As computer network spreads, identifiers with anonymity is required for privacy protection. IPv6 temporary addresses are... [more] |
ICSS2020-25 pp.32-37 |
SWIM, SC |
2020-08-21 13:10 |
Online |
Online |
Process Improvement Method of Progress Management Akihiro Hayashi (SIST) SWIM2020-1 SC2020-7 |
[more] |
SWIM2020-1 SC2020-7 pp.1-8 |
ICSS, IPSJ-SPT |
2020-03-03 16:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Study on Implementation of Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ICSS2019-107 |
[more] |
ICSS2019-107 pp.341-344 |
SWIM |
2020-02-21 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal of sensor data management method for fog computing Tsukasa Kudo (SIST) SWIM2019-31 |
With the progress of IoT, a large number of sensors are being connected to the Internet. To transfer sensor data efficie... [more] |
SWIM2019-31 pp.39-45 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 14:10 |
Kochi |
Kochi University of Technology |
Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 |
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] |
ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 pp.347-352 |