Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS |
2022-04-21 14:05 |
Osaka |
Osaka University, and online (Primary: On-site, Secondary: Online) |
A Study on High-reliability Communication Platform using Public Mobile Networks for Railway Applications Masanori Ishino, Taku Suzuki, Yuichi Igarashi, Taishi Oomi, Kenzaburo Fujishima (Hitachi), Kazuki Nakamura, Takayasu Kitano (RTRI) RCS2022-1 |
Railway operators need to introduce DX applications that improve operational efficiency and need to reduce train operati... [more] |
RCS2022-1 pp.1-6 |
AI, JSAI-SAI, JSAI-KBS, JSAI-DOCMAS, IPSJ-ICS (Joint) |
2022-03-12 10:00 |
Hokkaido |
WSSIT2022 (Primary: On-site, Secondary: Online) |
A Method and Evaluation of Train Congestion Estimation Using BLE Signals Eigo Taya, Yuji Kanamitsu, Koki Tachibana (NAIST), Yugo Nakamura (QU), Matsuda Yuki (NAIST/RIKEN/JST PRESTO), Suwa Hirohiko, Keiichi Yasumoto (NAIST/RIKEN) AI2021-30 |
Trains play an essential role in transportation in supporting people's lives.
In recent years, it has become necessary ... [more] |
AI2021-30 pp.25-30 |
ITS, IEE-ITS |
2022-03-11 17:00 |
Online |
Online |
A proposal and performance evaluation of utilization methods for tourism of a demand-responsive at Aizumisato town. Shuhei Matsushita, Sakurako Yumita, Tomotaka Nagaosa (Kanto Gakuin Univ) ITS2021-75 |
This paper proposes two utilization methods for tourism of a demand-responsive transport system called as “Misato Ai-ai ... [more] |
ITS2021-75 pp.67-72 |
IT, ISEC, RCC, WBS |
2022-03-10 10:05 |
Online |
Online |
Towards Group Signature Scheme with Equality Test for Signers Kyoya Anzai, Hiroaki Anada (Univ. Nagasaki) IT2021-89 ISEC2021-54 WBS2021-57 RCC2021-64 |
In this technical report, we discuss a group signature scheme with equality test for signers. This scheme has a func... [more] |
IT2021-89 ISEC2021-54 WBS2021-57 RCC2021-64 pp.38-41 |
PN, MWP, EMT, PEM, IEE-EMT [detail] |
2022-01-28 09:25 |
Online |
Online |
Control of SDN optical networks using public cloud container services Hayato Kiwata, Koji Igarashi (Osaka Univ), Noboru Yoshikane (KDDI Research) PN2021-41 EMT2021-57 MWP2021-46 |
In this work, we propose a method for controlling SDN optical network using container virtualization in public cloud ser... [more] |
PN2021-41 EMT2021-57 MWP2021-46 pp.46-50 |
IN, IA (Joint) |
2021-12-17 13:25 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
[Short Paper]
A Study on Live Video Processing Time Reduction Methods for Privacy-oriented Video Management Satoru Matsumoto, Tomoki Yoshihisa (Osaka Univ.), Tomoya Kawakami (Fukui Univ.), Yuuichi Teranishi (NICT) IA2021-44 |
In recent years, public cameras have been installed everywhere. The videos taken are often set up for confirmation accor... [more] |
IA2021-44 pp.65-66 |
CQ, ICM, NS, NV (Joint) |
2021-11-25 17:10 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
Access Control with Individual Key Delivery in ICN Yuma Fukagawa (Fukuoka Univ.), Noriaki Kamiyama (Ritsumeikan Univ.) CQ2021-71 |
Information-Centric Networking (ICN), which transfers Interest by the name of content without using DNS (Domain Name Sys... [more] |
CQ2021-71 pp.35-40 |
ITS, IEE-ITS, IPSJ-ITS |
2021-09-07 14:35 |
Online |
Online |
Tour Planning and Navigation for effective use of waiting time Daiki Saito, Jeyeon Kim (NITTC), Tetsuya Manabe (Saitama Univ) ITS2021-7 |
Tourism is effective to solve region problem, e.g. depopulation, shopping district decline. This paper proposes tourism ... [more] |
ITS2021-7 pp.12-17 |
IN, NS (Joint) |
2021-03-05 11:40 |
Online |
Online |
Remote Communication for Enabling Realistic Tele-Presence Utilizing 5G Takafumi Morita, Akihiro Nakao (UTokyo) NS2020-150 |
In the wake of the COVID-19 epidemic, the use of remote control for various tasks is accelerating.
Under these circumst... [more] |
NS2020-150 pp.161-166 |
QIT (2nd) |
2020-12-10 09:00 |
Online |
Online |
[Invited Talk]
An Introduction to Provable Secure Post-Quantum Cryptography Bagus Santoso (UEC) |
Public key cryptographic schemes are essential to guarantee the security of network communication over an untrusted comm... [more] |
|
AI |
2020-12-10 15:50 |
Shizuoka |
Online and HAMAMATSU ACT CITY (Primary: On-site, Secondary: Online) |
What Affect Motivation to Participate in Online Mini-publics with Artificial Intelligence Technologies ?
-- Focusing on Social Attributes and Attitudes towards Politics and Information Technology -- Tomoyuki Tatsumi, Takashi Nakazawa, Naoki Fukuta (Shizuoka Univ.) AI2020-6 |
This paper examined how willingness to participate in deliberative polls was related with the use of ICT, societal attri... [more] |
AI2020-6 pp.28-33 |
IMQ, HIP |
2020-08-21 14:30 |
Online |
Online |
Development and accuracy verification of a simple bus passenger counting system using image processing Shina Takano, Takeshi Natsuno, Yuukou Horita (Univ. of Toyama) IMQ2020-1 HIP2020-21 |
In rural areas, although the environment surrounding public transportation is harsh, residents need regional public tran... [more] |
IMQ2020-1 HIP2020-21 pp.1-4 |
SRW |
2020-06-29 11:45 |
Online |
Online |
A Study on High-speed Reception Gain Control Method for Immediate Synchronization Signal Analysis of VHF-band Broadband Mobile Communication System Masayuki Ishizaki, Kiyoshi Yamamoto, Tatsuya Abe, Masahiro Asano (Hitachi Kokusai Electric Inc.), Keiichi Mizutani, Hiroshi Harada (Kyoto Univ.) SRW2020-6 |
In this report, we propose a high-speed reception gain control method for a real-time delay profile analysis using a syn... [more] |
SRW2020-6 p.15 |
ET |
2020-06-13 14:00 |
Online |
Online |
Development of Teaching Materials for Data Processing Exercises Using Public Data Katsumi Yoshine (Nanzan Univ.) ET2020-3 |
In data processing exercises, real data will bring out learners interest than fictitious data. In this paper, we introdu... [more] |
ET2020-3 pp.11-14 |
ISEC |
2020-05-20 13:10 |
Online |
Online |
[Invited Talk]
An Efficient F4-style Based Algorithm to Solve MQ Problems (from IWSEC 2019) Takuma Ito, Naoyuki shinohara (NICT), Shigenori Uchiyama (TMU) ISEC2020-5 |
We introduce “An Efficient F4-style Based Algorithm to Solve MQ Problems”we presented in IWSEC 2019. [more] |
ISEC2020-5 p.25 |
WIT, IPSJ-AAC |
2020-03-15 13:00 |
Ibaraki |
Tsukuba University of Technology (Cancelled but technical report was issued) |
A Survey of Loan Services to Groups by Public Libraries for the People with Disabilities
-- A Case in Kochi Prefecture -- Miki Inoue (Tsurumi Univ.), Akihiro Motoki (Tsurumi Univ./Tohoku Univ.) WIT2019-61 |
Recent enactment of the Act for Eliminating Discrimination against Persons with Disabilities and the Act for Improvement... [more] |
WIT2019-61 pp.147-150 |
EA |
2019-12-13 11:20 |
Fukuoka |
Kyushu Inst. Tech. |
Listening difficulty rating prediction model using STOI-type objective intelligibility index for outdoor public address speech Keita Noguchi, Yosuke Kobayashi, Jay Kishigami (Muroran-IT), Kiyohiro Kurisu (TOA) EA2019-76 |
An outdoor public address (PA) system is indispensable for emergency broadcasting during the occurrence of disasters, an... [more] |
EA2019-76 pp.71-78 |
QIT (2nd) |
2019-11-18 11:50 |
Tokyo |
Gakushuin University |
On Attacking Next-Generation Public-Key Cryptography by Using LASOLV Yasuhito Kawano (NTT), Hiroshi Sekigawa (TUS) |
This paper proposes a method for attacking the LWE cryptography (lattice-based next-generation public-key cryptography) ... [more] |
|
IE, EMM, LOIS, IEE-CMN, ITE-ME, IPSJ-AVM [detail] |
2019-09-20 11:10 |
Niigata |
Tokimeito, Niigata University |
[Invited Talk]
Challenges to Solve Regional Issues through Imaging Technologies Yoshito ABE (IRI Niigata) LOIS2019-16 IE2019-29 EMM2019-73 |
In this paper, some of the challenges for the solution of the regional problem by the utilization of image technology an... [more] |
LOIS2019-16 IE2019-29 EMM2019-73 pp.71-74 |
SIP |
2019-08-29 15:10 |
Tokyo |
|
Implementation of the Elliptic Curve Cryptography over Gaussian Integral Finite Group onto Excel Kazuki Naganuma, Takashi Suzuki, Hiroyuki Tsuji, Tomoaki Kimura (KAIT) SIP2019-42 |
The Elliptic Curve Cryptography is known as cryptography safer than the RSA Cryptography. Defining the
elliptic curve o... [more] |
SIP2019-42 pp.17-22 |