Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP |
2022-08-26 11:24 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki Island) (Primary: On-site, Secondary: Online) |
Investigation of Spectro-Temporal Modulation analysis for predicting auditory saliency Soichiro Tanaka, Ryotaro Horiguchi, Shunsuke Kidani, Masashi Unoki (JAIST) |
[more] |
|
SIP |
2022-08-26 11:42 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki Island) (Primary: On-site, Secondary: Online) |
Study on Relationship Between Speakers' Physiological Structure and Acoustic Speech Signals: Data-Driven Study Based on Frequency-Wise Attentional Neural Network Li Kai (JAIST), Xugang Lu (NICT), Masato Akagi, Jianwu Dang (JAIST), Sheng Li (NICT), Unoki Masashi (JAIST) |
[more] |
|
SIP |
2022-08-26 14:08 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki Island) (Primary: On-site, Secondary: Online) |
Study on Bone-conducted Speech Enhancement Using Vector-quantized Variational Autoencoder and Gammachirp Filterbank Cepstral Coefficients Quoc-Huy Nguyen, Masashi Unoki (JAIST) |
[more] |
|
IT |
2022-07-21 12:55 |
Okayama |
Okayama University of Science (Primary: On-site, Secondary: Online) |
Lattice Decoding Based on Exhaustive Search over Scaling Factor Jiajie Xue, Kurkoski, Brian Michael (JAIST) |
[more] |
|
RECONF |
2022-06-07 14:50 |
Ibaraki |
CCS, Univ. of Tsukuba (Primary: On-site, Secondary: Online) |
Vector Register Sharing Mechanism for Hardware Acceleration Tomoaki Tanaka, Ryousuke Higashi (TUAT), Kiyofumi Tanaka (JAIST), Yasunori Osana (Univ. of the Ryukyus), Takefumi Miyoshi (Wasalabo), Jubee Tada (Yamagata Univ.), Hironori Nakajo (TUAT) RECONF2022-5 |
In this paper, we present a vector register sharing mechanism that directly shares vector registers inside the processor... [more] |
RECONF2022-5 pp.26-31 |
SDM, ED, CPM |
2022-05-27 17:05 |
Online |
Online |
Characterization method of semiconductors under Ohmic-metals by using multi-probe Hall devices Kazuya Uryu (JAIST/ATL), Shota Kiuchi (JAIST), Taku Sato (ATL), Toshi-kazu Suzuki (JAIST) ED2022-15 CPM2022-9 SDM2022-22 |
(To be available after the conference date) [more] |
ED2022-15 CPM2022-9 SDM2022-22 pp.35-38 |
IN, RCS, NV (Joint) |
2022-05-26 15:45 |
Kanagawa |
Keio University (Hiyoshi Campus) (Primary: On-site, Secondary: Online) |
[Tutorial Lecture]
Distributed Lossy Multi-terminal Communications over Fading MAC and Decision Making (This tutorial is funded by IoTAD-CEO project under CominLab) Tad Matsumoto (IMT-Atlantique, Brest, France, and Professor Emeritus, JAIST), Elsa Dupraz (IMT-Atlantique, Brest, France) RCS2022-18 |
Network Information Theory is an extension of Shannon’s Information Theory to Networks. We believe that the key to the s... [more] |
RCS2022-18 pp.26-27 |
RCC, WBS, SAT, MICT |
2022-05-27 15:00 |
Online |
Online |
[Invited Talk]
Novel MAC Design and Optimization for B5G Wireless Communications LIM Yuto (JAIST) WBS2022-16 RCC2022-16 SAT2022-16 MICT2022-16 |
With the development of society and the progress of technology, people put forward higher requirements for wireless data... [more] |
WBS2022-16 RCC2022-16 SAT2022-16 MICT2022-16 pp.75-80 |
MSS, NLP |
2022-03-28 13:50 |
Online |
Online |
Knowledge Extraction from Physical and Human Sensors in Smart Agriculture
-- Preliminary experiments with planter cultivation data -- Kenta Toya, Moritaro Inoue, Naoshi Uchihira (JAIST) MSS2021-63 NLP2021-134 |
One of the most promising approaches to increasing agricultural efficiency is the use of the agricultural Internet of Th... [more] |
MSS2021-63 NLP2021-134 pp.43-44 |
MSS, NLP |
2022-03-29 14:55 |
Online |
Online |
Verification of spacecraft operational scenario using Little-JIL Kazunori Someya (JAXA), Kunihiko Hiraishi (JAIST) MSS2021-78 NLP2021-149 |
Inadequate operational scenario leads to satellite loss in the case of the operational accident of the X-ray astronomy s... [more] |
MSS2021-78 NLP2021-149 pp.121-126 |
IT, ISEC, RCC, WBS |
2022-03-10 10:30 |
Online |
Online |
Threshold Signature Scheme Suitable for a Short Message Takuya Inomoto (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65 |
A threshold signature is a digital signature that is used for information generated by multiple people. In threshold sig... [more] |
IT2021-90 ISEC2021-55 WBS2021-58 RCC2021-65 pp.42-49 |
IT, ISEC, RCC, WBS |
2022-03-10 13:50 |
Online |
Online |
Reed-Muller Code Lattice Decoding with Weighted BP Decoder Ryoji Shimizu, Brian M. Kurkoski (JAIST) IT2021-100 ISEC2021-65 WBS2021-68 RCC2021-75 |
We construct $n=32$ Reed-Muller code lattice by applying binary RM codes to Construction D. We compare decoding performa... [more] |
IT2021-100 ISEC2021-65 WBS2021-68 RCC2021-75 pp.107-110 |
VLD, HWS [detail] |
2022-03-07 10:25 |
Online |
Online |
Datapath Synthesis Considering Temperature Dependent Timing Skew Mineo Kaneko (JAIST) VLD2021-79 HWS2021-56 |
[more] |
VLD2021-79 HWS2021-56 pp.19-24 |
SeMI, IPSJ-MBL, IPSJ-UBI |
2022-03-08 10:25 |
Online |
Online |
Multi-user Recognition and Identification System using Multiple Sensors in Indoor Environments Atsuki Tanaka, Yuto Lim, Yasuo Tan (JAIST) SeMI2021-89 |
With the proliferation of various sensor devices in the era of Internet of Things (IoT), there has been a lot of researc... [more] |
SeMI2021-89 pp.35-40 |
EMM |
2022-01-27 14:35 |
Online |
Online |
Auditory Representation of Speech Signals Using a Matching Pursuit Algorithm and Sparse Coding Dung Kim Tran, Masashi Unoki (JAIST) EMM2021-87 |
Speech signals are the natural carrier of information such as linguistic, speaker individuality, and emotions, etc. Ther... [more] |
EMM2021-87 pp.19-24 |
EMM |
2022-01-27 15:00 |
Online |
Online |
Speech Watermarking Approach for Securing Speaker Anonymization using McAdams Coefficients Candy Olivia Mawalim, Masashi Unoki (JAIST) EMM2021-88 |
Speaker anonymization aims to suppress speaker individuality to protect privacy in speech while preserving the other asp... [more] |
EMM2021-88 pp.25-30 |
SeMI |
2022-01-21 14:50 |
Nagano |
(Primary: On-site, Secondary: Online) |
MAC Protocol Design and Analysis of MCST Scheme in Full-duplex Wireless Networks Khun Aung Thura Phyo, Lim Yuto, Tan Yasuo (JAIST) SeMI2021-78 |
Full-duplex (FD) transmission is one of the key drivers for improving spectrum utilization and network capacity.
Many ... [more] |
SeMI2021-78 pp.103-108 |
IN |
2022-01-18 11:10 |
Online |
Online |
PSO-based Antenna Tilt Control Method for Cell Outage Compensation in Cellular Networks Masayoshi Iwamoto (NTT), Ryota Kusunoki (JAIST), Akito Suzuki, Masahiro Kobayashi (NTT) IN2021-24 |
Mobile networks are an essential public infrastructure providing multiple services and then necessary to maintain high a... [more] |
IN2021-24 pp.1-6 |
SS, MSS |
2022-01-12 11:35 |
Nagasaki |
Nagasakiken-Kensetsu-Sogo-Kaikan Bldg. (Primary: On-site, Secondary: Online) |
A Method for Mesoscopic Modeling Method of Large Volume Traffic Flow Applying Process Mining Techniques Kenji Uehara, Kunihiko Hiraishi (JAIST) MSS2021-51 SS2021-38 |
With the improvement of computing power and the widespread use of sensor technologies such as cameras and GNSS, highly a... [more] |
MSS2021-51 SS2021-38 pp.112-117 |
ET |
2021-12-11 13:40 |
Online |
Online |
A Proposal for Evaluation Indexes of Presentation Structure Corresponding to Laboratory Styles Kazuma Takahashi, Shinobu Hasegawa, Koichi Ota (JAIST) ET2021-35 |
The main topic addressed in this research is to develop a system to support making presentations focused on logical str... [more] |
ET2021-35 pp.35-40 |