Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2023-06-20 13:30 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
Development and evaluation of a micro-plastic collection network system utilizing underwater drones Shosei Mimoto, Hirosi Yamamoto (Ritsumeikan Univ) IA2023-1 ICSS2023-1 |
In recent years, there has been growing concern about the impact of microplastics on the marine ecosystem. Microplastics... [more] |
IA2023-1 ICSS2023-1 pp.1-6 |
IA, ICSS |
2023-06-20 13:55 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
Development and evaluation of NFT content utilization management platform across multiple devices and services Raiya Araki, Hiroshi Yamamoto (Ritsumeikan Univ.) IA2023-2 ICSS2023-2 |
In recent years, the demand and supply of NFT (Non-Fungible Token) have been expanding due to the growth of blockchain t... [more] |
IA2023-2 ICSS2023-2 pp.7-12 |
IA, ICSS |
2023-06-20 14:20 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
Development and evaluation of a dangerous behavior detection system at station platforms utilizing 3D LiDAR Yusuke Koyama, Hiroshi Yamamoto (Ritsumeikan Univ.) IA2023-3 ICSS2023-3 |
Many accidents occur on railroads although many railroad companies have proposed the measures against the accidents. For... [more] |
IA2023-3 ICSS2023-3 pp.13-18 |
IA, ICSS |
2023-06-20 14:55 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
Development and evaluation of an underwater environmental condition observation network system utilizing underwater drones Kenshin Iwaki, Hiroshi Yamamoto (Ritsumeikan) IA2023-4 ICSS2023-4 |
In recent years, the underwater environment of Lake Biwa has been experiencing prolonged hypoxic conditions during the s... [more] |
IA2023-4 ICSS2023-4 pp.19-24 |
IA, ICSS |
2023-06-20 15:20 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
Proposal of Packet Transfer Method that Suppresses Fluctuations of Communication Delays in In-Vehicle Networks with SOME/IP Kazuki Iehira, Inoue Hiroyuki (Kyoto Sangyo Univ.) IA2023-5 ICSS2023-5 |
The specifications of the AUTOSAR Adaptive Platform (AUTOSAR AP), which realizes a system that dynamically changes the s... [more] |
IA2023-5 ICSS2023-5 pp.25-30 |
IA, ICSS |
2023-06-20 16:00 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Cybersecurity education and the role of universities Hiroshi Koide (Kyushu Univ.) IA2023-6 ICSS2023-6 |
In this presentation, the speaker will first discuss his experiences in the cybersecurity human resource development pro... [more] |
IA2023-6 ICSS2023-6 p.31 |
IA, ICSS |
2023-06-21 09:30 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Precise Approach of Software Vulnerability Detection Using Set Similarity Calculation Algorithm Reika Arakawa, Yo Kanemoto, Eitaro Shioji, Mitsuaki Akiyama (NTT) IA2023-7 ICSS2023-7 |
(To be available after the conference date) [more] |
IA2023-7 ICSS2023-7 pp.32-39 |
IA, ICSS |
2023-06-21 09:55 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Proposal for Access Control Method based on File Relation Inference from Users Behavior Yuki Kodaka (SOKENDAI), Hirokazu Hasegawa, Hiroki Takakura (NII) IA2023-8 ICSS2023-8 |
File access control is an effective method for protecting information from unauthorized access both within and outside a... [more] |
IA2023-8 ICSS2023-8 pp.40-47 |
IA, ICSS |
2023-06-21 10:30 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Mobile Device Management Method in a M2M Architecture Utilizing MEC and Device Virtualization Haruto Takano, Rempei Sawada, Fumio Teraoka (Keio Univ.) IA2023-9 ICSS2023-9 |
In M2M (Machine-to-Machine) systems, communication via a cloud server does not meet the latency requirements for some ap... [more] |
IA2023-9 ICSS2023-9 pp.48-55 |
IA, ICSS |
2023-06-21 10:55 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Consideration of Privacy Preserved IoT Data Inquiry System using DoT Hayato Sagara (Hokkaido Univ.), Yong Jin (Tokyo Tech), Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) IA2023-10 ICSS2023-10 |
Recently, with the increase of Internet of Things (IoT) devices, the number of cyber-attacks against IoT devices has als... [more] |
IA2023-10 ICSS2023-10 pp.56-61 |