Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
AP, WPT (Joint) |
2024-01-17 16:25 |
Niigata |
Tokimate, Niigata University (Primary: On-site, Secondary: Online) |
[Invited Lecture]
Estimation of transmission loss in several types of window glass at 29GHz using optimization methods Masaya Takahashi, Shoma Tanaka, Sho Kimura, Ho-Yu Lin, Akihiro Sato (SoftBank) AP2023-166 |
With the commercialization of the 5th Generation mobile communication system (5G), there has been a need to study how to... [more] |
AP2023-166 pp.35-40 |
AP, SANE, SAT (Joint) |
2021-07-30 15:20 |
Online |
Online |
[Invited Lecture]
Vegetation loss model considering seasonal characteristics in HAPS communication Akihiro Sato, Sho Kimura, Lin Hoyu, Shoma Tanaka, Hideki Omote (Softbank Corp.) AP2021-47 |
HAPS, the High-Altitude Platform Station that provides communications services from altitudes of around 20 km via an Unm... [more] |
AP2021-47 pp.132-136 |
AP |
2021-03-26 14:00 |
Online |
Online |
[Tutorial Lecture]
International standardization status of HAPS propagation model Hideki Omote, Shoma Tanaka, Sho Kimura, Hoyu Lin, Akihiro Sato (Softbank) AP2020-140 |
HAPS (High-Altitude Platform Station) is a radio station installed on an Unmanned Aerial Vehicle (UAV), such as a balloo... [more] |
AP2020-140 pp.48-53 |
AP, WPT (Joint) |
2020-01-24 09:25 |
Kagawa |
Sunport Hall Takamatsu |
[Invited Lecture]
Measurement and Analysis of Clutter Loss at High Elevation Angles for HAPS Communications in urban environment Akihiro Sato, Sho Kimura, Hideki Omote (Softbank) AP2019-166 |
HAPS, the High-Altitude Platform Station that provides communications services from altitudes of around 20 km via an Unm... [more] |
AP2019-166 pp.87-92 |
IN, IA (Joint) |
2019-12-20 10:10 |
Hiroshima |
Satellite Campus Hiroshima |
An Approach for Identifying Dictionary-based DGA Bots by Word Relations in Domain Names Akihiro Satoh, Yutaka Fukuda, Sujiro Wada, Yutaka Nakamura (KIT) IA2019-55 |
[more] |
IA2019-55 pp.39-44 |
AP |
2019-10-18 12:35 |
Osaka |
Osaka Univ. |
Measurement and analysis of elevation arrival angle characteristics at MS in Mobile Communication Sho Kimura, Hideki Omote, Daigo Ogata, Akihiro Sato (Softbank) AP2019-101 |
Spatial processing techniques such as Adaptive Array Antenna (AAA) and Multi-Input-Multi-Output (MIMO) have been the foc... [more] |
AP2019-101 pp.113-118 |
AP, SANE, SAT (Joint) |
2019-07-17 14:35 |
Miyagi |
Tohoku Univ. |
[Invited Lecture]
Measurement and Analysis of elevation arrival angle characteristic at low base station Akihiro Sato, Hideki Omote (SoftBank) AP2019-27 |
Spatial processing techniques such as Adaptive Array Antenna (AAA) and Multi-Input-Multi-Output (MIMO) have been the foc... [more] |
AP2019-27 pp.33-38 |
IA, IN (Joint) |
2018-12-13 15:35 |
Hiroshima |
Hiroshima Univ. |
Clustering Malicious DNS Queries Detected by Using Blacklists Akihiro Satoh, Yutaka Nakamura, Mitsutaka Ogura, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2018-42 |
(To be available after the conference date) [more] |
IA2018-42 pp.17-22 |
HCGSYMPO (2nd) |
|
Mie |
Sinfonia Technology Hibiki Hall Ise |
Automatic measurement of infant's social behavior using AI technology
-- attachment-related approaching to caregiver, and attack, empathy, prosocial behavior to peers -- Kiri Nishida (CEDEP), Shinichiro Ichikawa, Akinori Sato, Tomohiro Nakano, Takeshi Baba, Nobuki Hayashi (TOYOTA), Shoko Nozawa (CEDEP), Yuri Koyama, Toshihiko Endo (The University of Tokyo) |
“If only there were an efficient way for me to see my child’s moments of growth while they’re at nursery school…” Many p... [more] |
|
IA, SITE, IPSJ-IOT [detail] |
2017-03-03 15:15 |
Okinawa |
Culture Resort Festone (Okinawa) |
Analyzing and Detecting Domain-Flux Botnets Akihiro Satoh, Yutaka Nakamura, Daiki Nobayashi, Takeshi Ikenaga (KIT) SITE2016-69 IA2016-99 |
[more] |
SITE2016-69 IA2016-99 pp.47-50 |
IA |
2016-10-14 14:50 |
Tokyo |
Univ. of Tokyo, Koshiba Hall |
Domain-Flux Botnet Detection based on DNS Traffic Analysis Akihiro Satoh, Yutaka Nakamura, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2016-24 |
[more] |
IA2016-24 pp.13-16 |
ICM, LOIS |
2015-01-16 13:20 |
Fukuoka |
Kanmon Straits & Mojiko Retro |
A Study of Slow Policy Introduction in Information Security Management System Kenichirou Hata, Akira Sato, Shoichi Yoneda, Shigeaki Tanimoto (CIT), Hiroyuki Sato (The University of Tokyo), Atsushi Kanai (Hosei University) ICM2014-48 LOIS2014-55 |
(To be available after the conference date) [more] |
ICM2014-48 LOIS2014-55 pp.91-96 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 10:00 |
Nara |
Todaiji Total Cultural Center |
Identifying User Authentication Methods on SSH Sessions Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (Kyushu Inst. of Tech.) SITE2012-61 IA2012-99 |
A dictionary attack against SSH services is a common security threat. Traditional ways for detecting the attacks rely on... [more] |
SITE2012-61 IA2012-99 pp.151-156 |
NLP |
2013-03-15 16:50 |
Chiba |
Nishi-Chiba campus, Chiba Univ. |
Chaotic Method for Generating q-Gaussian Random Variables Ken Umeno, Aki-Hiro Sato (Kyoto Univ.) NLP2012-176 |
This study proposes a pseudo random number generator of $q$-Gaussian
random variables for a range of $q$ values, $-\inf... [more] |
NLP2012-176 pp.171-176 |
EMCJ |
2013-01-10 10:05 |
Nagasaki |
Nagasaki Univ. |
Improvement of Spatial Resolution of a Magnetic Field Measurement System for Intermedium Frequency Range Akinori Sato (Aoyama Gakuin Univ.), Katsumi Fujii, Kanako Wake, Soichi Watanabe, Yasushi Matsumoto (NICT), Osamu Hashimoto (Aoyama Gakuin Univ.) EMCJ2012-102 |
(To be available after the conference date) [more] |
EMCJ2012-102 pp.1-6 |
IN, NS, CS (Joint) |
2012-09-20 09:50 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Proposal of Damage Estimation of Dos Attack by the Characteristics of Flows Monitored at the Upper Router Hiroaki Izu (Tohoku Univ), Akihiro Satoh (Kyutech), Kazuto Sasai, Hideyuki Takahashi, Gen Kitagata, Tetsuo Kinoshita (Tohoku Univ) IN2012-51 |
[more] |
IN2012-51 pp.13-16 |
IN, IA (Joint) |
2011-12-16 15:10 |
Hiroshima |
Hiroshima City University |
SSH Brute Force Attack Detection based on Flow Features Analysis Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (KIT) IN2011-119 |
SSH brute force attack has become more seriously, so administrators are desired to implement its countermeasures. In the... [more] |
IN2011-119 pp.73-78 |
SANE |
2011-01-28 10:40 |
Nagasaki |
Nagasaki Prefectural Art Museum |
A study on Model-based Target Classification using Extended Volume Scattering Model Akinobu Sato, Yoshio Yamaguchi, Hiroyoshi Yamada (Niigata Univ.) SANE2010-149 |
In the POLSAR image analysis, polarimetric scattering property of the target is used for target classification and detec... [more] |
SANE2010-149 pp.65-70 |
NS, CS, IN (Joint) |
2010-09-02 10:25 |
Miyagi |
Tohoku University |
Knowledge Based Network Monitoring and Analysis Method Ryo Arima, Akihiro Sato, Kazuto Sasai, Gen Kitagata, Tetsuo Kinoshita (Tohoku Univ.) IN2010-47 |
[more] |
IN2010-47 pp.21-24 |
ET |
2009-12-11 14:30 |
Okinawa |
Univ. of the Ryukyus |
A CAI System to Generate Questions Automatically in Accordance with the Course of Learning Marie Hashidate, Kazuhiro Uenosono, Akinori Sato, Seiichi Komiya (Shibaura Inst. of Tech.) ET2009-59 |
The authors propose a CAI System to weak parts of a student by a system grasp where the learner's weak parts automatical... [more] |
ET2009-59 pp.49-54 |