Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SR |
2021-05-20 15:20 |
Online |
Online |
[Invited Lecture]
A case study on software defined radio technology in NTT's wireless system Yu Ono, Tatsuya Nakatani, Toshifumi Miyagi (NTT) |
(To be available after the conference date) [more] |
|
EMM, IT |
2021-05-21 14:25 |
Online |
Online |
A reversible data hiding method with high flexibility in compressive encrypted images Ryota Motomura, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) |
(To be available after the conference date) [more] |
|
SANE |
2021-05-13 13:40 |
Tokyo |
Sogo Electronics Inc. (Primary: On-site, Secondary: Online) |
A study on specific emitter identification method using modified Allan variance and correlation coefficients ZHU YAN, Sei Arima, Ryo Hirayama (Ritsumeikan), Masaaki Kobayashi (AOC), Takeshi Kumaki (Ritsumeikan) |
(To be available after the conference date) [more] |
|
WPT, MW |
2021-04-16 13:05 |
Online |
Online |
Study on Uncertainty of Reflection Measurement Using a Six Port-Correlator Masahiro Hanazawa (UL Japan), Makoto Yoshida (CDEX), Toshiyuki Yakabe (MPL LLP.) WPT2021-1 MW2021-1 |
A six-port-correlator consisting only of power receiving elements can measure complex reflection and transmission coeffi... [more] |
WPT2021-1 MW2021-1 pp.1-5 |
WPT, MW |
2021-04-16 14:20 |
Online |
Online |
Improvement of wireless power transmission efficiency by inserting relay coil with optimized load impedance Tamami Maruyama, Tai Kimura, Masashi Nakatsugawa (NIT, Hakodate College) WPT2021-4 MW2021-4 |
In previous work, we investigated on the improvement of wireless power transmission efficiency by inserting a non-feedin... [more] |
WPT2021-4 MW2021-4 pp.16-20 |
NS |
2021-04-16 13:00 |
Online |
Online |
[Encouragement Talk]
A Study on D-Plane Architecture and Configuration method of a Data Network Slice Constituting an E2E slice Takayuki Nakamura, Takamitsu Narumi, Mitsuo Amasaka, Sato Takuya (NTT) NS2021-12 |
In recent years, in order to support various network services assumed in the 5G era, network slice is being studied that... [more] |
NS2021-12 pp.65-70 |
CCS |
2021-03-29 13:00 |
Online |
Online |
Construction of Nonlinear Large-Scale Network Simulator aiming for Emergence of Reservoir function Kento Igarashi, Tetsuya Asai, Megumi Akai (Hokkaido Univ.) CCS2020-21 |
A large-scale network simulator consisting of non-linear elements has been constructed for the physical implementation o... [more] |
CCS2020-21 pp.1-6 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2021-03-26 11:00 |
Online |
Online |
An Estimation Method of a Defect Types for Suspected Fault Lines in Logical Faulty VLSI Using Neural Networks Natsuki Ota, Toshinori Hosokawa (Nihon Univ.), Koji Yamazaki (Meiji Univ.), Yukari Yamauchi, Masayuki Arai (Nihon Univ.) CPSY2020-61 DC2020-91 |
Since fault diagnosis methods for specified fault models might cause misprediction and non-prediction, a fault diagnosis... [more] |
CPSY2020-61 DC2020-91 pp.67-72 |
HCS |
2021-03-15 10:00 |
Online |
Online |
Predicting Smartphone Addiction Risks from Smartphone Usage Behavior in the COVID-19 Pandemic. Nao Kobayashi, Yuka Miyake, Yasuyuki Hatakawa (KDDI CORPORATION), Toshitaka Hamamura, Masaru Honjo (KDDI Research, Inc.), Taiki Oka, Toshinori Chiba (ATR) HCS2020-67 |
Amid the COVID-19 pandemic, people are becoming more and more dependent on smartphones.
As such dependence on smartphon... [more] |
HCS2020-67 pp.1-5 |
NLP, MSS (Joint) |
2021-03-15 13:25 |
Online |
Online |
Graph Structure Optimization Using Genetic Algorithms Hiroki Tajiri, Tsuyoshi Migita, Norikazu Takahashi (Okayama Univ.) NLP2020-59 |
There are many large and complex networks in the real world. These networks are modeled as graphs and analyzed using a v... [more] |
NLP2020-59 pp.23-28 |
HCS |
2021-03-15 14:20 |
Online |
Online |
A case study: Characteristics of discussions in video conferences where face-to-face and remote participants are mixed Nozomi Nakano, Hiroko Tokunaga, Naoki Mukawa (Tokyo Denki Univ.) HCS2020-72 |
With the spread of coronavirus infections, it is expected that more discussions will be conducted in remote video confer... [more] |
HCS2020-72 pp.27-32 |
EMD |
2021-03-08 16:35 |
Online |
Online |
Effect of Contact Oil on Contact Resistance and Friction Hiroki Ikezaki, Yusuke Aoki, Kazuo Iida (Mie Univ) EMD2020-38 |
Currently, it is necessary to decrease the insertion force to the automobile connector. Contact oil is one of the means ... [more] |
EMD2020-38 pp.44-49 |
WPT |
2021-03-04 14:10 |
Online |
Online |
Optimum Beam Synthesis for An Arbitrary Receiving Plane in Radiating Near Field Seishiro Kojima, Tomohiko Mitani, Naoki Shinohara (Kyoto Univ.) WPT2020-38 |
This report proposes an optimum beam synthesis method to maximize the beam collection efficiency (BCE) for an arbitrary ... [more] |
WPT2020-38 pp.26-31 |
WBS, IT, ISEC |
2021-03-04 09:25 |
Online |
Online |
Four-Block Type-2 Feistel Cipher from Tweakable Block Ciphers Kazuki Nakaya, Tetsu Iwata (Nagoya Univ.) IT2020-118 ISEC2020-48 WBS2020-37 |
A secure block cipher can be obtained from tweakable block ciphers (TBCs). In this paper, by using a TBC with $n$-bit bl... [more] |
IT2020-118 ISEC2020-48 WBS2020-37 pp.37-44 |
SIS |
2021-03-04 15:50 |
Online |
Online |
[Invited Talk]
A Proposal in Order to use AI Safely for Control Nobuyasu Kanekawa (Hitachi) SIS2020-50 |
The research of the deep learning which developed the "neural Network" proposed by the second AI (artificial intelligenc... [more] |
SIS2020-50 pp.83-87 |
PRMU, IPSJ-CVIM |
2021-03-05 14:10 |
Online |
Online |
A Consideration on Suspicious Object Detection by Mixup and Improved U-Net Naruki Kanno, Wataru Kameyama, Toshio Sato, Yutaka Katsuyama, Takuro Sato (Waseda Univ.) PRMU2020-90 |
In this paper, on suspicious object detection by using semantic segmentation, we study the effectiveness of Mixup data a... [more] |
PRMU2020-90 pp.121-126 |
WBS, IT, ISEC |
2021-03-05 14:45 |
Online |
Online |
Consideration of embedding methods and machine learning models for detecting malicious URLs Qisheng Chen, Kazumasa omote (Univ. of Tsukuba) IT2020-157 ISEC2020-87 WBS2020-76 |
Nowadays, Internet access is becoming more and more popular, which makes the harm of malicious websites more and more se... [more] |
IT2020-157 ISEC2020-87 WBS2020-76 pp.281-287 |
IN, NS (Joint) |
2021-03-04 09:50 |
Online |
Online |
Virtual Network Function Placement Method for Multiple Slice Expansion based on Salience Takahiro Hirayama, Masahiro Jibiki, Ved P. Kafle (NICT) IN2020-56 |
Network slicing enables us to install multiple virtualized network functions (slices) dedicated for multiple services in... [more] |
IN2020-56 pp.13-18 |
IN, NS (Joint) |
2021-03-05 13:00 |
Online |
Online |
Dynamic and Cooperative Architecture of CNF/WBS toward High-performance Network Slicing Koki Fukushima, Ryota Kawashima, Hiroshi Matsuo (NITech) NS2020-160 |
Cloud Native Network Functions (CNFs) are essential building blocks of network slicing.
While they can be typically pr... [more] |
NS2020-160 pp.220-225 |
RCS, SR, SRW (Joint) |
2021-03-03 09:45 |
Online |
Online |
Wireless Resource Reuse Employing Fog Nodes with Interference Cancellation for D2D Communications Hiroyuki Kyoshima, Yuyuan Chang, Kazuhiko Fukawa (Tokyo Tech) RCS2020-209 |
In the next generation mobile communication system, the M2M (machine-to-machine) communication is required to meet high ... [more] |
RCS2020-209 pp.37-42 |