IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCS, SIP, IT 2019-02-01
14:45
Osaka Osaka University Device-to-Device Relaying Strategies using Clustering
Masanori Otsuka, Megumi Saito, Shigeru Shimamoto (Waseda Univ.) IT2018-67 SIP2018-97 RCS2018-274
There are many studies about device-to-device relays for cellular communication in order to reduce traffic and improve t... [more] IT2018-67 SIP2018-97 RCS2018-274
pp.185-190
CAS, CS 2017-02-24
16:00
Shiga   A Back-Off based Semi-Markovian Model for Flooding in Ad Hoc Networks
Pratikshya Shrestha, Megumi Saito, Zhenni Pan, Kang Kang, Shigeru Shimamoto (Waseda Univ.) CAS2016-135 CS2016-96
Reactive routing protocols in ad hoc networks do not maintain routes and keep the network silent when there is no traffi... [more] CAS2016-135 CS2016-96
pp.117-122
WPT 2016-03-07
15:20
Kyoto Kyoto Univ. Uji Campus The evaluation of the influences of antenna deformations and the compensation using phase control for WPT system on the Tethered-SPS
Shotaro Katano (SOKENDAI), Eri Saito (Toyo Univ.), Koji Takeda (TU Delft), Koji Tanaka (JAXA) WPT2015-81
The control technology of microwaves is one of important theme for realization of Tethered-SPS. Especially, the transmit... [more] WPT2015-81
pp.27-32
IE, IMQ, MVE, CQ
(Joint) [detail]
2016-03-08
13:35
Okinawa   Verification of the identity theft in the voice authentication using picture superiority effect and associative word
Hiroyuki Kawai, Kazuhiro Notomi (KAIT), Saito Keiichi (IUHW) IMQ2015-71 IE2015-170 MVE2015-98
These days, in the realm of computer security, biometrics attracts attention. In this paper, we describe extension of th... [more] IMQ2015-71 IE2015-170 MVE2015-98
pp.243-244
RCS, CCS, SR, SRW
(Joint)
2016-03-02
15:55
Tokyo Tokyo Institute of Technology A Study on Communicaiton Scheme of Public Safety Network in Wide-Area Disaster Situation
Megumi Kawabata, Megumi Saito, Shigeru Shimamoto (Waseda Univ.) RCS2015-346
 [more] RCS2015-346
pp.79-84
ET, SITE, IPSJ-CE, IPSJ-CLE [detail] 2015-12-04
16:25
Fukui Community Hall & AOSSA Mall, Fukui Picture superiority effect application to the voice authentication system
Hiroyuki Kawai, Kazuhiro Notomi (KAIT), Keiichi Saito (IUHW) SITE2015-51 ET2015-79
In this paper, we describe extension of the voice and picture authentication system. Since a picture has a feature calle... [more] SITE2015-51 ET2015-79
pp.59-64
RCS, SR, SRW
(Joint)
2014-03-03
15:50
Tokyo Waseda Univ. Energy-sensitive Handoff Scheme Employing RF Fingerprint For Cell Sizing Based Heterogeneous Cellular Networks
Zhenni Pan, Megumi Saito, Jiang Liu, Shigeru Shimamoto (Waseda Univ.) RCS2013-330
The energy optimization in small cell involved heterogeneous networks has been considered as an emerging topic which ena... [more] RCS2013-330
pp.145-150
HCGSYMPO
(2nd)
2013-12-18
- 2013-12-20
Ehime Matsuyama Multi-Purpose Community Cente Development of lecture support web system: Automatically combining text-fields with PDF document for note-taking
Yuki Hoshino, Yu Tanimura, Hiromitsu Nishimura, Hiroshi Shimeno, Kazuhiro Notomi (KAIT), Keiichi Saito (IUHW)
In this article, we describe development and utilization of a lecture support system. Recently, lecture slides like PDF ... [more]
HCGSYMPO
(2nd)
2012-12-10
- 2012-12-12
Kumamoto Kumamoto-Shintoshin-plaza Analysis of Key Operation like the Gamepad Style for Smartphone
Kenichiro Yamada, Atsuhiro Noguchi, Kazuhiro Notomi (Kanagawa Institute of Technology), Keiichi Saito (International University of Health and Welfare)
In this study, we have proposed, implemented and evaluated a keystroke authentication method using multi-touch-mode on s... [more]
HCGSYMPO
(2nd)
2012-12-10
- 2012-12-12
Kumamoto Kumamoto-Shintoshin-plaza A Rhythm Authentication Method for Smartphone
Ryota Ichimura, Atsuhiro Noguchi, Kazuhiro Notomi (Kanagawa Institute of Technology), Keiichi Saito (International University of Health and Welfare)
In this study, we have developed and proposed a secure and useful authentication method to resist 'shoulder surfing' att... [more]
HCGSYMPO
(2nd)
2011-12-07
- 2011-12-09
Kagawa Sun Port Hall Takamatsu Image authentication by hand shape recognition -- Stress comparison among biometric authentications --
Yoshiaki Nakamura, Kazuhiro Notomi (KAIT), Keiichi Saito (International University of Health and Welfare)
It is Important consideration at biometrics authentication to improve convenience and reduce burden on users. In this ar... [more]
HCGSYMPO
(2nd)
2011-12-07
- 2011-12-09
Kagawa Sun Port Hall Takamatsu Keystroke Authentication Method with Touch-Screen using Self-Organizing Maps -- Comparison and Evaluation of Keystroke Rhythm by Number of Six Digits --
Atsuhiro Noguchi (Kanagawa Institute of Technology), Masataka Takahashi, Kazuhiro Notomi (Graduate School of Engineering, Kanagawa Institute of Technology), Keiichi Saito (International University of Health and Welfare)
In recent years, foreign ATMs authenticate individuals by PIN(Personal Identification Number) of six digits, however, PI... [more]
HCGSYMPO
(2nd)
2011-12-07
- 2011-12-09
Kagawa Sun Port Hall Takamatsu Voice authentication using Self-Organizing Maps -- Examination of proper frequency band for female voices using variation compensation --
Tsubasa Hirasawa, Kazuhiro Notomi (KAIT), Keiichi Saito (International University of Health and Welfare)
In this paper, we proposed a method of improving authentication accuracy of the female voices, and we discussed an exami... [more]
HIP, HCS, MVE, WIT
(2nd)
2009-12-10
- 2009-12-12
Hokkaido Sappolo Convention Center Proposal of personal authentication method using acceleration sensors
Ryosuke Nakayama, Hideharu Ishida, Kazuhiro Notomi (KAIT), Keiichi Saito (TDU)
According to a spread of the Internet, we get used to authentication with ID and password. People will soon need suited ... [more]
HIP, HCS, MVE, WIT
(2nd)
2009-12-10
- 2009-12-12
Hokkaido Sappolo Convention Center Examination of reading support interface using horizontal scroll widget.
Kouta Kanaoka, Ryosuke Nakayama, Kazuhiro Notomi (Kanagawa Institute of Technology), Keiichi Saito (Tokyo Denki Univ.)
In general, the horizontal scrolling interface is often used for displaying text messages not only on electronic signboa... [more]
HIP, HCS, MVE, WIT
(2nd)
2009-12-10
- 2009-12-12
Hokkaido Sappolo Convention Center Proposal and evaluation of prediction method for readability of Web articles with Self-Organizing Maps
Chihiro Ariga, Kazuhiro Notomi (Kanagawa Institute of Technology), Keiichi Saito (Tokyo Denki Univ)
In this article, we proposed and evaluated a prediction method for readability of Web articles with Self-Organizing Maps... [more]
HIP, HCS, MVE, WIT
(2nd)
2009-12-10
- 2009-12-12
Hokkaido Sappolo Convention Center Analysis and evaluation of accessibility of mouse operation of web application designed by Adobe Flash -- Button design and alignment --
Motoki Hatanaka, Chihiro Ariga, Kazuhiro Notomi (Kanagawa Institute of Technology), Keiichi Saito (Tokyo Denki Univ.)
The spread of the Internet continues worldwide, spawning growth in an opportunity of transmission of information using W... [more]
HIP, HCS, MVE, WIT
(2nd)
2009-12-10
- 2009-12-12
Hokkaido Sappolo Convention Center Fundamental examination of authentication by pointing-device operation -- Analysis and evaluation by self-organizing maps --
Hiroki Kawamura, Ryosuke Nakayama, Kazuhiro Notomi (Kanagawa Institute of Technology), Keiichi Saito (Tokyo Denki Univ.)
Recently, an opportunity of biometrics authentication, such as vein authentication at automated teller machine, is incre... [more]
HIP, HCS, MVE, WIT
(2nd)
2009-12-10
- 2009-12-12
Hokkaido Sappolo Convention Center Comparison of learning-condition for voice authentication with self-organizing map
Subaru Yoshikawa, Hideharu Ishida, Kazuhiro Notomi (Kanagawa Institute of Technology), Keiichi Saito (Tokyo Denki Univ.)
Recently, scenes of personal authentication are increasing, so we are evaluating a variety of authentication methods wit... [more]
HIP 2008-03-22
- 2008-03-23
Fukuoka Kitakyushu Science and Research Park How do you feel the caricature interesting? Psychological analysis and Physiological brain analysis
Kenichiro Suzuki, Naoki Mukawa, Masahide Yuasa, Keiichi Saito, Takamasa Shimada (Tokyo Denki Univ.) HIP2007-164
This paper analyzes the mechanisum that the human feels the caricature interesting. We introduce two types of interest f... [more] HIP2007-164
pp.31-36
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan