|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
MI |
2014-11-18 14:40 |
Hyogo |
|
Theoretical study of hyperpolarized molecule production by PHIP for NSI Kei Kuramoto, Shunyo Suzuki (Univ. of Hyogo) MI2014-48 |
Nuclear Spin Imaging (NSI) plays an important role of next generation MRI system and the theoretical study of molecule i... [more] |
MI2014-48 pp.31-32 |
MI |
2013-01-25 13:10 |
Okinawa |
Bunka Tenbusu Kan |
Improvement of three dimensional measurement by using moire pattern Kei Kuramoto, Motoshi Tanaka, Shunyo Suzuki, Syoji Kobashi, Yutaka Hata (UH) MI2012-112 |
[more] |
MI2012-112 pp.261-265 |
LOIS |
2009-03-05 13:00 |
Okinawa |
Okinawa-seinen-kaikan |
Efficiency of Authentication Network Construction on Organization LAN Takeshi Miyake (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-78 |
IEEE802.1X port base authentication is eective to an illegal connected prevention on the LAN, How-ever, when the system... [more] |
OIS2008-78 pp.19-24 |
LOIS |
2009-03-05 13:30 |
Okinawa |
Okinawa-seinen-kaikan |
Method of Logical Network Construction Focusing on Information Resources Kazutoshi Sakamoto (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-79 |
The necessity of the access control to information resources has risen.The method of setting the access control on the i... [more] |
OIS2008-79 pp.25-30 |
LOIS |
2009-03-05 14:00 |
Okinawa |
Okinawa-seinen-kaikan |
Anomaly Detection by monitoring information of ARP Tables Sho Saito (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-80 |
ARP is a protocol used for communication in the same sabnet.Information of ARP is stored in an ARP Table.ARP is normally... [more] |
OIS2008-80 pp.31-36 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:15 |
Hokkaido |
Future University-Hakodate |
A method of excluding disapproval connection on authentication network Takeshi Miyake (NIT), Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Akira Iwata (NIT) |
IEEE802.1X is a technology to construct the network authentication system on LAN. The IEEE802.1X authentication system w... [more] |
ISEC2007-32 SITE2007-26 pp.113-118 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:40 |
Hokkaido |
Future University-Hakodate |
An authentication network system using virtual authenticatior module Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Takeshi Miyake, Akira Iwata (NIT) |
The IEEE802.1X authentication network system is effective to an illegal, connected prevention to the LAN . However, the ... [more] |
ISEC2007-33 SITE2007-27 pp.119-124 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 15:45 |
Hokkaido |
Future University-Hakodate |
A composition method of network-independent dynamic authentication VLAN Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT) |
Virtual Private Network (VPN) is a technology that constructs a private network between bases geographically away. OpenV... [more] |
ISEC2007-40 SITE2007-34 pp.171-176 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|