Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NLC |
2022-09-13 13:20 |
Kanagawa |
Keio Univ. Yagami Campus. (Primary: On-site, Secondary: Online) |
Estimation of related keywords based on distributed representation of words and semantic vector operations Osamu Segawa (Chubu Electric Power), Kazuhiko Murakami (Chuden CTI) NLC2022-4 |
Formerly, in a text-mining task, several methods based on distribution of words using co-occurrence in observation windo... [more] |
NLC2022-4 pp.1-4 |
EMCJ, IEE-EMC, IEE-SPC |
2021-12-08 10:55 |
Aichi |
(Primary: On-site, Secondary: Online) |
A study on extremely long channel development during winter thunderstorm season Takeshi Morimoto (KINDAI), Takahiro Tajiri (Chuden), Yoshitaka Nakamura (Kobe Kosen), Hideo Sakai (Toyama Univ.), Masahito Shimizu (Chuden) EMCJ2021-55 |
We have been observing LF electromagnetic waves associated with lightning around Toyama Bay in winter thunderstorm seaso... [more] |
EMCJ2021-55 pp.7-10 |
IN, CCS (Joint) |
2020-08-04 13:00 |
Online |
Online |
A Demonstration Experiment of a Wireless LAN Relay System Using Multicopters
-- Fundamental Evaluation -- Yuta Watanabe, Hiraku Okada (Nagoya Univ.), Hiroki Tanaka, Nobuo Matsui (Chuden), Masaaki Katayama (Nagoya Univ.) CCS2020-14 |
A wireless LAN relay system requires the extension of the transmission range,
while keeping stable communications. In ... [more] |
CCS2020-14 pp.11-16 |
AP |
2020-02-20 15:00 |
Shizuoka |
Shizuoka Univ. Hamamatsu Campus |
Development of Non Contact Detection and Visualization System for the Charged Conductor Kazuma Nogi, Yoshihiko Kuwahara (Shizuoka Univ.), Takuji Ushimoto (Chuden) AP2019-184 |
At the substation, the state of an applied voltage is checked using a bulky electroscope which is contact type. Although... [more] |
AP2019-184 pp.19-24 |
NLC |
2012-08-31 10:00 |
Kanagawa |
Fuji Xerox |
A study on extraction of related terms and their visualization from trouble incident reports Osamu Segawa (CEPCO), Kazuhiko Murakami, Munehiro Furusato (Chuden CTI) NLC2012-17 |
We have developed a analysis method for trouble incident reports on our intra-system using text mining technique. These ... [more] |
NLC2012-17 pp.41-44 |
NLC |
2011-07-07 15:00 |
Tokyo |
IBM Japan, Ltd. |
Visualization method for text classification to assist interpretation of the results Osamu Segawa (CEPCO), Kazuhiko Murakami, Masaki Mizuno, Munehiro Furusato (Chuden CTI) NLC2011-5 |
We have developed a visualization technique for text classification and clustering. First, in this paper, we propose a v... [more] |
NLC2011-5 pp.21-24 |
LOIS |
2009-03-05 13:00 |
Okinawa |
Okinawa-seinen-kaikan |
Efficiency of Authentication Network Construction on Organization LAN Takeshi Miyake (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-78 |
IEEE802.1X port base authentication is eective to an illegal connected prevention on the LAN, How-ever, when the system... [more] |
OIS2008-78 pp.19-24 |
LOIS |
2009-03-05 13:30 |
Okinawa |
Okinawa-seinen-kaikan |
Method of Logical Network Construction Focusing on Information Resources Kazutoshi Sakamoto (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-79 |
The necessity of the access control to information resources has risen.The method of setting the access control on the i... [more] |
OIS2008-79 pp.25-30 |
LOIS |
2009-03-05 14:00 |
Okinawa |
Okinawa-seinen-kaikan |
Anomaly Detection by monitoring information of ARP Tables Sho Saito (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-80 |
ARP is a protocol used for communication in the same sabnet.Information of ARP is stored in an ARP Table.ARP is normally... [more] |
OIS2008-80 pp.31-36 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:15 |
Hokkaido |
Future University-Hakodate |
A method of excluding disapproval connection on authentication network Takeshi Miyake (NIT), Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Akira Iwata (NIT) |
IEEE802.1X is a technology to construct the network authentication system on LAN. The IEEE802.1X authentication system w... [more] |
ISEC2007-32 SITE2007-26 pp.113-118 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:40 |
Hokkaido |
Future University-Hakodate |
An authentication network system using virtual authenticatior module Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Takeshi Miyake, Akira Iwata (NIT) |
The IEEE802.1X authentication network system is effective to an illegal, connected prevention to the LAN . However, the ... [more] |
ISEC2007-33 SITE2007-27 pp.119-124 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 15:45 |
Hokkaido |
Future University-Hakodate |
A composition method of network-independent dynamic authentication VLAN Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT) |
Virtual Private Network (VPN) is a technology that constructs a private network between bases geographically away. OpenV... [more] |
ISEC2007-40 SITE2007-34 pp.171-176 |