Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
PN |
2024-03-15 13:20 |
Kagoshima |
(Primary: On-site, Secondary: Online) |
Requirements and applicability of network element emulators for development of APN controller supporting IOWN Kyota Hattori, Akihiro Shimoda, Hidenari Oowada, Yu Miyoshi (NTT) PN2023-84 |
In the future, it will be important for communication infrastructure to respond to the surge in traffic caused by the CO... [more] |
PN2023-84 pp.79-83 |
NS, RCS (Joint) |
2023-12-15 14:25 |
Fukuoka |
Kyushu Institute of Technology Tobata campus, and Online (Primary: On-site, Secondary: Online) |
Development of a Sensor Network MAC Protocol Verification System using Wireless Modems Kenta Asahi, David Asano, Yasushi Fuwa (Shinshu Univ.) NS2023-147 |
Wireless sensor network systems have different specifications required depending on the environment and applications in ... [more] |
NS2023-147 pp.120-125 |
NS, RCS (Joint) |
2023-12-15 14:50 |
Fukuoka |
Kyushu Institute of Technology Tobata campus, and Online (Primary: On-site, Secondary: Online) |
Development of a Transition Diagram-Based MAC Protocol Design Environment for Sensor Network Verification Systems Ryo Kobayashi, Asano David, Yasushi Fuwa (Shinshu Univ.) NS2023-148 |
Our wireless sensor network requires new communication protocols to be designed for each specific scenario. We have eval... [more] |
NS2023-148 pp.126-131 |
ICM, NS, CQ, NV (Joint) |
2023-11-21 17:15 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
Generalization of Intent extraction techniques based on multiple use case application demonstrations Hiroaki Kikushima, Chao Wu, Shingo Horiuchi, Kennichi Tayama, Tomoko Shibata (NTT) ICM2023-24 |
NTT Laboratories aims at automatically deriving the quantified Intent for input to the system by the interaction with th... [more] |
ICM2023-24 pp.8-13 |
LOIS, SITE, ISEC |
2023-11-10 10:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
NTP Tunneling Threat Model Verification and Countermeasure Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22 |
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] |
ISEC2023-64 SITE2023-58 LOIS2023-22 pp.66-71 |
PN |
2023-08-29 10:30 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Polarization and IQ multiplexing 4ASK downlink transmission experiment of P-to-MP system using phase shift symbol preserved encryption Yuika Mori, Reika Suketomo, Hodaka Amano, Keiji Shimada (Kagawa Univ.), Ryosuke Matsumoto (AIST), Takahiro Kodama (Kagawa Univ.) PN2023-17 |
We have already reported downlink transmission using adaptive IQ imbalanced 4ASK signal for groups of ONUs with differen... [more] |
PN2023-17 pp.6-10 |
SeMI, RCS, RCC, NS, SR (Joint) |
2023-07-13 11:30 |
Osaka |
Osaka University Nakanoshima Center + Online (Primary: On-site, Secondary: Online) |
[Invited Lecture]
Investigation on Network Digital Replica to Optimize Network Design for External Environmental Changes kyota hattori, tomohiro korikawa, chikako takasaki, hidenari oowada (NTT) RCC2023-17 NS2023-39 RCS2023-90 SR2023-34 SeMI2023-28 |
Future network infrastructures will need to provide network services safely and rapidly under complex conditions such as... [more] |
RCC2023-17 NS2023-39 RCS2023-90 SR2023-34 SeMI2023-28 pp.10-15(RCC), pp.33-38(NS), pp.52-57(RCS), pp.34-39(SR), pp.28-33(SeMI) |
SeMI, RCS, RCC, NS, SR (Joint) |
2023-07-14 15:25 |
Osaka |
Osaka University Nakanoshima Center + Online (Primary: On-site, Secondary: Online) |
Initial Design and Evaluation of the Monitoring System for the CYPHONIC Cloud Yoshiya Suzuki, Kazushige Matama, Ren Goto, Guilherme Seidy Ujiie, Katsuhiro Naito (AIT), Hidekazu Suzuki (Meijo Univ.) SeMI2023-39 |
The authors have proposed CYber PHysical Overlay Network over Internet Communication (CYPHONIC) as a technology to achie... [more] |
SeMI2023-39 pp.82-87 |
MSS, CAS, SIP, VLD |
2023-07-07 15:20 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Verification of effectiveness of the greedy algorithm for the influence maximization problem focusing on the authenticity in OSN Jodai Yoshiue, Atsushi Wakamatsu, Masaaki Miyasita, Norihiko Shinomiya (Soka Univ.) CAS2023-28 VLD2023-28 SIP2023-44 MSS2023-28 |
In recent years, social media has become increasingly popular. While it has advantages such as high advertising effectiv... [more] |
CAS2023-28 VLD2023-28 SIP2023-44 MSS2023-28 pp.143-146 |
RCS, IN, NV (Joint) |
2023-05-25 10:50 |
Kanagawa |
Keio University (Hiyoshi Campus), and online (Primary: On-site, Secondary: Online) |
Performance Evaluation of Digital Self-Interference Cancellers for In-Band Full-Duplex Systems with High-Power Amplifiers Motoshi Tawada, Yuki Takagi, Yoshichika Ohta (SoftBank) RCS2023-16 |
In-band full-duplex communication (IBFD), which performs transmission and reception in the same frequency band at the sa... [more] |
RCS2023-16 pp.13-17 |
HWS, VLD |
2023-03-04 11:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Cloud Based Evaluation of Communication Bandwidth and Tracking Time of Traceable Aggregate Signature Protocols Koudai Aoyama, Riku Anzai, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (Yokohama National Univ.) VLD2022-119 HWS2022-90 |
Traceable Aggregate Signature is a scheme that has the ability to identify the source of an illegal signature if it is i... [more] |
VLD2022-119 HWS2022-90 pp.257-260 |
CNR, BioX |
2023-03-02 10:00 |
Oita |
(Primary: On-site, Secondary: Online) |
Using hiragana and katakana Writer's verification by Siamese Network Daichi Kaku, Akira Kubota (Chuo Univ) BioX2022-70 CNR2022-36 |
Due to the measures against infectious diseases of the new coronavirus, the online processing of documents has progresse... [more] |
BioX2022-70 CNR2022-36 pp.47-52 |
CQ, CBE (Joint) |
2023-01-27 10:40 |
Ibaraki |
Epochal Tsukuba International Congress Center (Primary: On-site, Secondary: Online) |
Verification of effectiveness of the greedy algorithm for the influence maximization problem focusing on the authenticity in OSN Jodai Yoshiue, Atsushi Wakamatsu, Msaaki Miyashita, Norihiko Shinomiya (Soka Univ.) CQ2022-73 |
In recent years, social media has become increasingly popular. While it has advantages such as high advertising effectiv... [more] |
CQ2022-73 pp.69-72 |
LOIS, ICM |
2023-01-19 14:15 |
Fukuoka |
Kitakyushu International Conference Center (Primary: On-site, Secondary: Online) |
A Study of Automatic Network Operation based on User's Intents
-- Practice in Operation DX -- Takamichi Nishijima, Atsushi Kitada, Yuta Sugiyama, Satoru Umezaki, Hiroshi Tomonaga (Fujitsu) ICM2022-34 LOIS2022-34 |
In the DX era, to quickly service in is required as business needs change. The current network design and operation reli... [more] |
ICM2022-34 LOIS2022-34 pp.19-24 |
IN, IA (Joint) |
2022-12-13 15:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66 |
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] |
IA2022-66 pp.91-98 |
EMCJ, IEE-EMC, IEE-SPC |
2022-12-07 13:50 |
Aichi |
|
A Study on Measurement Method for Mode Conversion of Differential Communication Line Termination Structures Masahiro Yoshida, Yusuke Yano, Jianqing Wang (NIT), Takeshi Ishida (NoiseKen) EMCJ2022-68 |
In recent years, the number of systems that combine multiple electronic devices has been increasing, and the importance ... [more] |
EMCJ2022-68 pp.29-34 |
MBE, NC |
2022-12-03 15:50 |
Osaka |
Osaka Electro-Communication University |
A RISC-V Soft-core Processor with Custom VLIW Extension for Spiking Neural Network Accelerator Mingyang Li, Yuki Hayashida (Mie Univ.) MBE2022-40 NC2022-62 |
We aim to develop an embedded accelerator for spiking neural networks (SNN). In order to develop prototypes of various S... [more] |
MBE2022-40 NC2022-62 pp.86-91 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-15 10:55 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
Study on the utilization of Public 5G for Railway Operations using Local 5G Kazuki Nakamura, Takayasu Kitano, Shogo Ogawa, Keiichi Takeuchi, Satoko Ryuo, Kunihiro Kawasaki (RTRI) RCS2022-95 |
The wireless communication systems used to communicate between train crews and despatchers are necessary for railway ope... [more] |
RCS2022-95 pp.128-133 |
RCS |
2022-04-21 - 2022-04-22 |
Osaka |
Osaka University, and online (Primary: On-site, Secondary: Online) |
Verification of the use of 5G in railway operations Kazuki Nakamura, Takayasu Kitano, Shogo Ogawa, Keiichi Takeuchi, Satoko Ryuo, Kunihiro Kawasaki (RTRI), Taishi Ohmi, Yoshinori Ohkura, Taichi Okumura, Shun Ichikawa (Hitachi) |
The wireless communication systems used to communicate between train crews and despatchers are necessary for railway ope... [more] |
|
KBSE |
2022-03-09 16:20 |
Online |
Online (Zoom) |
Code review support and verification of effectiveness using deep learning with images of programs Kazuhiko Ogawa, Takako Nakatani (OUJ) KBSE2021-49 |
Code review is one of the ways to improve the quality of programs.
Code reviews cannot point out all faults, but if rev... [more] |
KBSE2021-49 pp.48-53 |