Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NLC, IPSJ-ICS |
2022-07-08 14:45 |
Online |
Online |
Examination of standard dictionary for text mining used for evaluation analysis of accommodation facilities
-- Estimating the number of required words to define in the dictionary -- Yutaka Shiraishi, Tatsumi Takeo (OUJ) |
[more] |
|
CQ, CS (Joint) |
2022-05-13 10:10 |
Fukui |
Fukui (Fuku Pref.) (Primary: On-site, Secondary: Online) |
Force adjustment control for carrying object between remote robot systems with force feedback Hiroya Kato, Yutaka Ishibashi (NITech), Hitoshi Ohnishi (OUJ), Pingguo Huang (Gifu-shi) |
[more] |
CQ2022-13 pp.68-73 |
KBSE |
2022-03-09 12:30 |
Online |
Online (Zoom) |
Extending Traverser for defining use cases from a conceptual model Takako Nakatani (OUJ), Kazuaki Sato (Nanohana Systems), Osamu Shigo (Tokyo Denki University) |
Software systems have become indispensable to our daily lives.
Thus, we have to consider the importance of UX (User eXp... [more] |
KBSE2021-41 pp.1-6 |
KBSE |
2022-03-09 16:20 |
Online |
Online (Zoom) |
Code review support and verification of effectiveness using deep learning with images of programs Kazuhiko Ogawa, Takako Nakatani (OUJ) |
Code review is one of the ways to improve the quality of programs.
Code reviews cannot point out all faults, but if rev... [more] |
KBSE2021-49 pp.48-53 |
HCGSYMPO (2nd) |
2021-12-15 - 2021-12-17 |
Online |
Online |
A Method for Detecting Factors Affecting Cognitive Function in Environmental Sounds Yasuhiro Kawahara (OUJ), Hiroshi Yoshida (NTT), Laurent Poittier, Pierre Maret (JM) |
The detection of environmental sounds that affect us in our daily life makes it possible to assess the suitability of th... [more] |
|
CQ, ICM, NS, NV (Joint) |
2021-11-25 16:20 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
Influences of network delay and movement velocity under adaptive viscoelasticity with prediction Lu Chen, Yutaka Ishibashi (Nitech), Pingguo Huang (Gsgu), Yuichiro Tateiwa (Nitech), Hitoshi Ohnishi (Touj) CQ2021-69 |
In a remote control system where a user operates a remote haptic interface device by using a local one while watching vi... [more] |
CQ2021-69 pp.23-28 |
KBSE, IPSJ-SE, SS [detail] |
2021-07-08 14:50 |
Online |
Online (Zoom) |
Research for using image analysis of program fault by deep learning for code review. Kazuhiko Ogawa, Takako Nakatani (OUJ) SS2021-6 KBSE2021-18 |
In order to predict the location of faults in a program, we imaged the source code of the defective program and verified... [more] |
SS2021-6 KBSE2021-18 pp.31-36 |
KBSE, IPSJ-SE, SS [detail] |
2021-07-09 11:50 |
Online |
Online (Zoom) |
Applying the D-OODA Loop to Enterprise Architecture Takehiko Akimoto, Takako Nakatani (OUJ) SS2021-10 KBSE2021-22 |
Enterprise architecture is a method of modeling what an enterprise should be today and in the future. In the digital era... [more] |
SS2021-10 KBSE2021-22 pp.52-56 |
KBSE |
2021-03-06 13:40 |
Online |
Online |
Research for finding faults in Programs using object detection algorithm by CNN-BI system Kazuhiko Ogawa, Takako Nakatani (OUJ) KBSE2020-45 |
In order to predict the location of program faults, we generated images the source code of a faulty program and trained ... [more] |
KBSE2020-45 pp.65-70 |
KBSE |
2021-03-06 14:25 |
Online |
Online |
KBSE2020-46 |
In recent years, the use of open source software (OSS) in product software has been increasing in the industrial world, ... [more] |
KBSE2020-46 pp.71-76 |
KBSE |
2021-03-06 15:10 |
Online |
Online |
Software Bug Severity Prediction with BERT
-- Case Study on a Large-scale Enterprise System -- Tomoki Yamada, Takako Nakatani (OUJ) KBSE2020-47 |
This paper aims to automatically assess the severity of software bug reports issued from a large-scale enterprise system... [more] |
KBSE2020-47 pp.77-82 |
NLC |
2021-02-18 10:55 |
Online |
Online |
Analyzing the behavior of university entrance examinees from social media
-- Research on Yahoo! chiebukuro -- Katsumi Akiyama (OUJ) NLC2020-23 |
(To be available after the conference date) [more] |
NLC2020-23 pp.13-18 |
KBSE |
2021-01-23 15:00 |
Online |
Online |
Consideration of evaluation datasets for DNS tunnel detection research Tetsuya Asakura, Takeo Tatsumi (OUJ) KBSE2020-32 |
In this research, we considered of evaluation datasets for dns tunnel detection research.
In this field, there are not ... [more] |
KBSE2020-32 pp.19-24 |
MVE, IPSJ-CVIM |
2021-01-21 16:05 |
Online |
Online |
VR Presentation System to Improve the Immersive Feeling for Online Presentation Yuta Kabayama, Anna Yokokubo (AGU), Yasuhiro Kawahara (OUJ), Lopez Guillaume (AGU) MVE2020-33 |
[more] |
MVE2020-33 pp.17-19 |
HCGSYMPO (2nd) |
2020-12-15 - 2020-12-17 |
Online |
Online |
Effects of PSF correction and TOF on image quality and quantification in brain PET images Yohei Kamikawa, Yasuhiro Kawahara (OUJ) |
It is known that point spread function (PSF) correction and time of flight (TOF) contribute to improve the image quality... [more] |
|
KBSE |
2020-09-19 10:45 |
Online |
Online |
Analysis of smishing messages focusing on delivery notices Tatsuo Fujii, Takako Nakatani (OUJ) KBSE2020-8 |
There are a lot of phishing scams using SMS. They are named "smishing." Though SMS fooling couriers have been sending me... [more] |
KBSE2020-8 pp.43-48 |
ICTSSL |
2020-05-28 16:15 |
Niigata |
(Cancelled but technical report was issued) |
Semi-autonomous Learning Leads to Higher Level of Reading Fluency through Extensive Reading Yoshikuni Onozato (OUJ), Barry Keith (UR), Shoichi Noguchi (SFAIS) ICTSSL2020-3 |
Learners of a foreign language who practice Extensive Reading (ER) will show various patterns in learning behavior. In ... [more] |
ICTSSL2020-3 pp.13-18 |
ISEC, IT, WBS |
2020-03-10 13:25 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Research on DNS tunnel detection by machine learning using appearance characters
-- Consideration of implementation of evaluation program -- Tetsuya Asakura, Takeo Tatsumi (OUJ) IT2019-103 ISEC2019-99 WBS2019-52 |
In this study, we considered an implementation a detection technique of DNS tunnel.
This detection techniqe is likely t... [more] |
IT2019-103 ISEC2019-99 WBS2019-52 pp.87-94 |
KBSE |
2020-03-06 15:30 |
Okinawa |
Tenbusu-Naha (Cancelled but technical report was issued) |
Fusion of information security games and introduction education to improve incident literacy Tsukasa Hirose, Tatsuo Fujii, Takako Nakatani (OUJ) KBSE2019-50 |
Recently, information security education has been emphasized due to the increase of personal information leakage cases. ... [more] |
KBSE2019-50 pp.25-30 |
KBSE |
2020-03-06 17:15 |
Okinawa |
Tenbusu-Naha (Cancelled but technical report was issued) |
Construction of Standard Costing Ontology by Analysis of Learning Text Masahiro Miyazaki, Takako Nakatani (OUJ) KBSE2019-52 |
(To be available after the conference date) [more] |
KBSE2019-52 pp.37-42 |