Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 09:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Efficient Key-Value Commitments with batch update and verification Toshiyuki Mineta, Atsuko Miyaji (OU) IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94 |
As Blockchain grows in size, the resources to validate that a transaction is true increase linearly. Key-value commitme... [more] |
IT2023-112 ISEC2023-111 WBS2023-100 RCC2023-94 pp.241-248 |
PN |
2023-08-29 10:30 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Polarization and IQ multiplexing 4ASK downlink transmission experiment of P-to-MP system using phase shift symbol preserved encryption Yuika Mori, Reika Suketomo, Hodaka Amano, Keiji Shimada (Kagawa Univ.), Ryosuke Matsumoto (AIST), Takahiro Kodama (Kagawa Univ.) PN2023-17 |
We have already reported downlink transmission using adaptive IQ imbalanced 4ASK signal for groups of ONUs with differen... [more] |
PN2023-17 pp.6-10 |
NLC |
2022-09-13 13:45 |
Kanagawa |
Keio Univ. Yagami Campus. (Primary: On-site, Secondary: Online) |
A study on keyword extraction based on phrase-level context information acquisition Yumeto Inaoka (Faber Company), Mitsuo Yoshida (Univ. of Tsukuba) NLC2022-5 |
We study a method for extracting words and phrases that belong to the desired class (e.g. magazine name) as keywords fro... [more] |
NLC2022-5 pp.5-8 |
NS, IN (Joint) |
2020-03-05 11:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Virtual Node Allocation Algorithm for Key Value Stores and Applying to In-Memory OSS Takahiro Kadoguchi, Taiju Mikoshi, Tokunori Ooyama, Toshihiro Nishizono (Nihon Univ.) NS2019-202 |
This paper proposes a virtual node allocation algorithm to perform load balancing in distributed key-value stores. The d... [more] |
NS2019-202 pp.147-151 |
IN |
2020-01-23 13:50 |
Aichi |
WINC AICHI |
Manga Feature Tag Extraction from Reviews on the Web for e-Book Search Kazuya Murao, Komei Arasawa, Shun Hattori (Muroran Inst. of Tech.) IN2019-65 |
In recent years, the digitization of books has progressed, and the number of Web sites for selling e-book comics has inc... [more] |
IN2019-65 pp.1-6 |
RCS |
2019-06-21 09:30 |
Okinawa |
Miyakojima Hirara Port Terminal Building |
A study on high efficiency phase shift keying on 3-dimensional Euclidean space Sho Kakuwa, Masahiro Fujii (Utsunomiya Univ.), Takanori Iwamatsu (FTN) RCS2019-82 |
It is necessary to assign many symbols on In-phase and Quadrature-phase(IQ)-diagram for high speed transmission,but it c... [more] |
RCS2019-82 pp.261-266 |
WBS, MICT |
2018-07-06 13:55 |
Kanagawa |
Yokohama Mitsui Building |
BER Considering Synchronization Performance Optical Wireless CSK System Using DMPOMs Takashi Tokunaga, Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) WBS2018-17 MICT2018-37 |
The code-shift-keying (CSK) system using dual modified pseudo orthogonal M-sequence sets (DMPOMs) which are generated by... [more] |
WBS2018-17 MICT2018-37 pp.65-70 |
WBS, MICT |
2017-07-13 13:45 |
Shizuoka |
ACT CITY |
[Poster Presentation]
Influence of ambient light on VN-CSK illumination light communication Keisuke Osawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) WBS2017-13 MICT2017-15 |
The illumination light communications utilizing LED light that use illumination light for data transmission are received... [more] |
WBS2017-13 MICT2017-15 pp.29-34 |
WBS |
2016-10-06 13:00 |
Kanagawa |
National Defense Academy |
[Poster Presentation]
A Study of Color Deviation Mitigation Method for Digital Color Shift Keying using RGB-LED Array Yusuke Matsuda, Yusuke Kozawa, Yohtaro Umeda (TUS) WBS2016-39 |
Digital color shift keying (DCSK) is a visible light communication (VLC) intensity modulation method, which can fulfill ... [more] |
WBS2016-39 pp.41-46 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-03 11:05 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Proposal of Accelerating XL algorithm by Assigning Constants to Variables Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31 |
The Fixing strategy, which has been long used in XL algorithm is improved so that more variables can be fixed. This imp... [more] |
ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31 pp.137-142 |
WBS |
2014-10-03 15:35 |
Akita |
Akita Prefectural University |
A Study on Frame Synchronization Scheme of Optical MPPM-CNK Atsuhiro Takahashi, Hiromasa Habuchi (Ibaraki Univ.), Yusuke Kozawa (Tokyo Univ. of Science) WBS2014-37 |
The MPPM-CNK system using the generalized modified prime sequence code (GMPSC), which combines the code number keying (C... [more] |
WBS2014-37 pp.29-32 |
WBS |
2012-07-26 10:00 |
Aichi |
Nagoya Univ. |
[Poster Presentation]
Polarization Multiplexed CSK reducing influence from rotation between transmitter and receiver Chiharu Mukai, Kouji Ohuchi (Shizuoka Univ.) WBS2012-17 |
In this paper, the authors analyze Bit Error Rate (BER) performance of polarization multiplexed CSK. They consider apply... [more] |
WBS2012-17 pp.41-46 |
MBE, NC (Joint) |
2011-11-25 11:15 |
Miyagi |
ECEI Departments, Graduate School of Engineering, Tohoku University |
A BCI using FSK-modulated visual stimuli Yosuke Kimura, Hiroshi Higashi, Toshihisa Tanaka (Tokyo Univ. of Agriculture and Tech.) NC2011-80 |
A brain computer interface based on steady-state visual evoked potentials has some issues; the number of available frequ... [more] |
NC2011-80 pp.47-52 |
ICSS |
2010-03-26 13:55 |
Fukuoka |
The University of Kitakyushu |
An Efficient Key Establishment Scheme through Intermediaries for Sensor Networks Tomonori Kubo, Takashi Satoh (Univ. Kitakyushu) ICSS2009-63 |
Establishing shared keys is a fundamental issue to provide secure communications among nodes in sensor networks. We prop... [more] |
ICSS2009-63 pp.7-11 |
IE |
2010-03-15 13:20 |
Miyagi |
RIEC Bldg. #2, 4gh Floor, Tohoku Univ. |
Performance Improvement of Bag-of-Keypoints by using Graph Cuts Tetsuya Fujikawa, Motoaki Sato, Jiro Katto (Waseda Univ.) IE2009-185 |
In this paper, our goal is automatic segmentation of object regions which is processed before recognition in Bag- of-Key... [more] |
IE2009-185 pp.35-40 |
NS, IN (Joint) |
2010-03-05 13:00 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
Analysis of Text Data for Electronic Medical Record Network System (IZANAMI) Muneo Kushima (Univ. of Miyazaki), Kenji Araki, Muneou Suzuki, Sanae Araki, Terue Nikama (Univ. of Miyazaki Hospital) IN2009-208 |
It is an important research assignment of the medical information field to make an effective use of the treatment inform... [more] |
IN2009-208 pp.383-388 |
IT, ISEC, WBS |
2010-03-05 14:15 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol Sonny Lumbantoruan, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2009-139 ISEC2009-147 WBS2009-118 |
In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this p... [more] |
IT2009-139 ISEC2009-147 WBS2009-118 pp.433-438 |
RCS, AN, MoNA, SR (Joint) |
2010-03-05 09:40 |
Kanagawa |
YRP |
Improvement of Partial-Key DAD and its Performance Evaluation using a Testbed Takayuki Shida (Niigata Univ.), Hiraku Okada (Saitama Univ.), Kenichi Mase (Niigata Univ.) AN2009-78 |
IP address assignment and duplicate address detection (DAD) are important for ad hoc networks. In the DAD method, called... [more] |
AN2009-78 pp.53-58 |
WIT |
2009-03-23 14:30 |
Shimane |
Shimane Univ. |
Development of a wide use Braille Interface for Visually Impaired People Tadahiro Sakai, Takuya Handa, Osamu Asakawa (NHK Sci & Tech Research Lab.), Jun Ishikawa (Univ. of Shizuoka) WIT2008-70 |
We are aiming to create an information environment that can provide various applications such as digital broadcasting an... [more] |
WIT2008-70 pp.7-12 |
RCS, AN, MoNA, SR (Joint) |
2009-03-05 13:20 |
Kanagawa |
YRP |
A Study on Duplicate Address Detection Using Divided Keys Kazuki Akima, Hiraku Okada, Kenichi Mase (Niigata Univ.) AN2008-73 |
IP address assignment and duplicate address detection are important issues for MANET. Two MANETs may merge to form a sin... [more] |
AN2008-73 pp.53-58 |