IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 27  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
09:05
Osaka Osaka Univ. (Suita Campus) Efficient Key-Value Commitments with batch update and verification
Toshiyuki Mineta, Atsuko Miyaji (OU) IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94
As Blockchain grows in size, the resources to validate that a transaction is true increase linearly. Key-value commitme... [more] IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94
pp.241-248
PN 2023-08-29
10:30
Hokkaido
(Primary: On-site, Secondary: Online)
Polarization and IQ multiplexing 4ASK downlink transmission experiment of P-to-MP system using phase shift symbol preserved encryption
Yuika Mori, Reika Suketomo, Hodaka Amano, Keiji Shimada (Kagawa Univ.), Ryosuke Matsumoto (AIST), Takahiro Kodama (Kagawa Univ.) PN2023-17
We have already reported downlink transmission using adaptive IQ imbalanced 4ASK signal for groups of ONUs with differen... [more] PN2023-17
pp.6-10
NLC 2022-09-13
13:45
Kanagawa Keio Univ. Yagami Campus.
(Primary: On-site, Secondary: Online)
A study on keyword extraction based on phrase-level context information acquisition
Yumeto Inaoka (Faber Company), Mitsuo Yoshida (Univ. of Tsukuba) NLC2022-5
We study a method for extracting words and phrases that belong to the desired class (e.g. magazine name) as keywords fro... [more] NLC2022-5
pp.5-8
NS, IN
(Joint)
2020-03-05
11:00
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
Virtual Node Allocation Algorithm for Key Value Stores and Applying to In-Memory OSS
Takahiro Kadoguchi, Taiju Mikoshi, Tokunori Ooyama, Toshihiro Nishizono (Nihon Univ.) NS2019-202
This paper proposes a virtual node allocation algorithm to perform load balancing in distributed key-value stores. The d... [more] NS2019-202
pp.147-151
IN 2020-01-23
13:50
Aichi WINC AICHI Manga Feature Tag Extraction from Reviews on the Web for e-Book Search
Kazuya Murao, Komei Arasawa, Shun Hattori (Muroran Inst. of Tech.) IN2019-65
In recent years, the digitization of books has progressed, and the number of Web sites for selling e-book comics has inc... [more] IN2019-65
pp.1-6
RCS 2019-06-21
09:30
Okinawa Miyakojima Hirara Port Terminal Building A study on high efficiency phase shift keying on 3-dimensional Euclidean space
Sho Kakuwa, Masahiro Fujii (Utsunomiya Univ.), Takanori Iwamatsu (FTN) RCS2019-82
It is necessary to assign many symbols on In-phase and Quadrature-phase(IQ)-diagram for high speed transmission,but it c... [more] RCS2019-82
pp.261-266
WBS, MICT 2018-07-06
13:55
Kanagawa Yokohama Mitsui Building BER Considering Synchronization Performance Optical Wireless CSK System Using DMPOMs
Takashi Tokunaga, Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) WBS2018-17 MICT2018-37
The code-shift-keying (CSK) system using dual modified pseudo orthogonal M-sequence sets (DMPOMs) which are generated by... [more] WBS2018-17 MICT2018-37
pp.65-70
WBS, MICT 2017-07-13
13:45
Shizuoka ACT CITY [Poster Presentation] Influence of ambient light on VN-CSK illumination light communication
Keisuke Osawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) WBS2017-13 MICT2017-15
The illumination light communications utilizing LED light that use illumination light for data transmission are received... [more] WBS2017-13 MICT2017-15
pp.29-34
WBS 2016-10-06
13:00
Kanagawa National Defense Academy [Poster Presentation] A Study of Color Deviation Mitigation Method for Digital Color Shift Keying using RGB-LED Array
Yusuke Matsuda, Yusuke Kozawa, Yohtaro Umeda (TUS) WBS2016-39
Digital color shift keying (DCSK) is a visible light communication (VLC) intensity modulation method, which can fulfill ... [more] WBS2016-39
pp.41-46
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-03
11:05
Aichi NAGOYA TRADE & INDUSTRY CENTER Proposal of Accelerating XL algorithm by Assigning Constants to Variables
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31
The Fixing strategy, which has been long used in XL algorithm is improved so that more variables can be fi xed. This imp... [more] ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31
pp.137-142
WBS 2014-10-03
15:35
Akita Akita Prefectural University A Study on Frame Synchronization Scheme of Optical MPPM-CNK
Atsuhiro Takahashi, Hiromasa Habuchi (Ibaraki Univ.), Yusuke Kozawa (Tokyo Univ. of Science) WBS2014-37
The MPPM-CNK system using the generalized modified prime sequence code (GMPSC), which combines the code number keying (C... [more] WBS2014-37
pp.29-32
WBS 2012-07-26
10:00
Aichi Nagoya Univ. [Poster Presentation] Polarization Multiplexed CSK reducing influence from rotation between transmitter and receiver
Chiharu Mukai, Kouji Ohuchi (Shizuoka Univ.) WBS2012-17
In this paper, the authors analyze Bit Error Rate (BER) performance of polarization multiplexed CSK. They consider apply... [more] WBS2012-17
pp.41-46
MBE, NC
(Joint)
2011-11-25
11:15
Miyagi ECEI Departments, Graduate School of Engineering, Tohoku University A BCI using FSK-modulated visual stimuli
Yosuke Kimura, Hiroshi Higashi, Toshihisa Tanaka (Tokyo Univ. of Agriculture and Tech.) NC2011-80
A brain computer interface based on steady-state visual evoked potentials has some issues; the number of available frequ... [more] NC2011-80
pp.47-52
ICSS 2010-03-26
13:55
Fukuoka The University of Kitakyushu An Efficient Key Establishment Scheme through Intermediaries for Sensor Networks
Tomonori Kubo, Takashi Satoh (Univ. Kitakyushu) ICSS2009-63
Establishing shared keys is a fundamental issue to provide secure communications among nodes in sensor networks. We prop... [more] ICSS2009-63
pp.7-11
IE 2010-03-15
13:20
Miyagi RIEC Bldg. #2, 4gh Floor, Tohoku Univ. Performance Improvement of Bag-of-Keypoints by using Graph Cuts
Tetsuya Fujikawa, Motoaki Sato, Jiro Katto (Waseda Univ.) IE2009-185
In this paper, our goal is automatic segmentation of object regions which is processed before recognition in Bag- of-Key... [more] IE2009-185
pp.35-40
NS, IN
(Joint)
2010-03-05
13:00
Miyazaki Miyazaki Phoenix Seagaia Resort (Miyazaki) Analysis of Text Data for Electronic Medical Record Network System (IZANAMI)
Muneo Kushima (Univ. of Miyazaki), Kenji Araki, Muneou Suzuki, Sanae Araki, Terue Nikama (Univ. of Miyazaki Hospital) IN2009-208
It is an important research assignment of the medical information field to make an effective use of the treatment inform... [more] IN2009-208
pp.383-388
IT, ISEC, WBS 2010-03-05
14:15
Nagano Nagano-Engineering Campus, Shinshu University Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol
Sonny Lumbantoruan, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2009-139 ISEC2009-147 WBS2009-118
In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this p... [more] IT2009-139 ISEC2009-147 WBS2009-118
pp.433-438
RCS, AN, MoNA, SR
(Joint)
2010-03-05
09:40
Kanagawa YRP Improvement of Partial-Key DAD and its Performance Evaluation using a Testbed
Takayuki Shida (Niigata Univ.), Hiraku Okada (Saitama Univ.), Kenichi Mase (Niigata Univ.) AN2009-78
IP address assignment and duplicate address detection (DAD) are important for ad hoc networks. In the DAD method, called... [more] AN2009-78
pp.53-58
WIT 2009-03-23
14:30
Shimane Shimane Univ. Development of a wide use Braille Interface for Visually Impaired People
Tadahiro Sakai, Takuya Handa, Osamu Asakawa (NHK Sci & Tech Research Lab.), Jun Ishikawa (Univ. of Shizuoka) WIT2008-70
We are aiming to create an information environment that can provide various applications such as digital broadcasting an... [more] WIT2008-70
pp.7-12
RCS, AN, MoNA, SR
(Joint)
2009-03-05
13:20
Kanagawa YRP A Study on Duplicate Address Detection Using Divided Keys
Kazuki Akima, Hiraku Okada, Kenichi Mase (Niigata Univ.) AN2008-73
IP address assignment and duplicate address detection are important issues for MANET. Two MANETs may merge to form a sin... [more] AN2008-73
pp.53-58
 Results 1 - 20 of 27  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan