Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
AI, JSAI-SAI, JSAI-DOCMAS, IPSJ-ICS, JSAI-KBS (Joint) |
2024-03-03 18:00 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Spatial Analysis for Road Traffic Accident Features in Aichi Prefecture Keisuke Ando, Takeshi Uchitane (AIT), Naoto Mukai (SJU), Kazunori Iwata (AU), Nobuhiro Ito (AIT) AI2023-46 |
Several methods have been proposed in traffic safety research to quantitatively estimate the risk of traffic accidents a... [more] |
AI2023-46 pp.12-17 |
EST |
2023-01-27 09:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Traffic volume survey system installed on utility poles using piezo sensor
-- Vehicle Passage Detection Technology -- Keisuke Kako, Akihiro Tsuno, Ichiru Miyahashi, Hideaki Kimura (Chubu Univ.) EST2022-89 |
Conventionally, traffic volume surveys conducted by the Ministry of Land, Infrastructure, Transport and Tourism (MLIT) a... [more] |
EST2022-89 pp.78-83 |
ICM |
2022-07-08 10:55 |
Hokkaido |
Tokachi Plaza (Primary: On-site, Secondary: Online) |
Data Contamination Determination Methods in Topology Estimation Technology Using Traffic Data Mizuto Nakamura, Yusuke Makino, Atsushi Takada, Kyoko Yamagoe (NTT) ICM2022-19 |
Telecommunication carriers operate their networks. When a failure occurs, they use the network configuration information... [more] |
ICM2022-19 pp.48-53 |
SeMI, IPSJ-DPS, IPSJ-MBL, IPSJ-ITS |
2022-05-27 11:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Performance study of congestion mitigation on expressways by velocity control with short-term velocity forecasting using vehicular communication Tetsuya Fukumaru, Hiroaki Morino (SIT) SeMI2022-13 |
Natural traffic jam on highways on sags is known to be mainly caused by temporal slow-down of some vehicles at a gentle ... [more] |
SeMI2022-13 pp.59-64 |
AI, JSAI-SAI, JSAI-KBS, JSAI-DOCMAS, IPSJ-ICS (Joint) |
2022-03-12 09:45 |
Hokkaido |
WSSIT2022 (Primary: On-site, Secondary: Online) |
Analysis of Traffic Accident Factors Using Geospatial Data Keisuke Ando, Yusuke Kuniyoshi, Kazuhiko Shimizu, Nobuhiro Ito (AIT), Kazunori Iwata (AU), Takeshi Uchitane (AIT), Naoto Mukai (SJU), Yong Jiang (AU) AI2021-29 |
Aichi Prefecture has one of the most traffic accidents in Japanese prefectures. In this study, we found the significant ... [more] |
AI2021-29 pp.19-24 |
NS, ICM, CQ, NV (Joint) |
2020-11-27 10:45 |
Online |
Online |
Relation between Location Information Error and Warning Error in Vehicle-to-Pedestrian Warning System Takahiro Suzuki (Waseda Univ.), Kyoko Yamori (Asahi Univ.), Takumi Miyoshi (Shibaura Inst. of Tech.), Yoshiaki Tanaka (Waseda Univ.) CQ2020-56 |
In order to prevent traffic accidents between pedestrians and vehicles, it will be effective to introduce a vehicle-to-p... [more] |
CQ2020-56 pp.50-55 |
SANE |
2020-04-22 10:10 |
Online |
Online |
Countermeasure Against GPS Outage and Evaluation Methodology in Wide Area Multilateration for Aeronautical Surveillance Junichi Naganawa, Hirohisa Taijma, Hiromi Miyazaki (ENRI) SANE2020-2 |
Wide Area Multilateration (WAM) is a modern aeronautical surveillance system for air traffic control.
WAM consists of m... [more] |
SANE2020-2 pp.7-12 |
RISING (2nd) |
2019-11-26 14:10 |
Tokyo |
Fukutake Learning Theater, Hongo Campus, Univ. Tokyo |
|
Due to the sophistication and diversification of information infrastructure in recent years, the risk due to connections... [more] |
|
MIKA (2nd) |
2019-10-03 11:15 |
Hokkaido |
Hokkaido Univ. |
[Poster Presentation]
Traffic jam mitigation by lane change restriction control through V2I communication in environments where autonomous cars and manual driving cars coexist Yuki Shibuya, Hiroaki Morino (SIT) |
It is known that traffic congestions of bottlenecks such as sag section in highways get worse affected by lane changes o... [more] |
|
CQ |
2018-07-19 14:25 |
Miyagi |
Tohoku Univ. |
Cascading Failure Analysis Considering Interaction between Two Networks Hiroshi Yamashita, Masahiro Hayashi (TCU) CQ2018-32 |
We propose a new approach to evaluate the impact caused by cascading failures for interdependent networks, where cascadi... [more] |
CQ2018-32 pp.7-12 |
ASN, NS, RCS, SR, RCC (Joint) |
2018-07-13 10:20 |
Hokkaido |
Hakodate Arena |
Network Selection Scheme Using Positioning Information for Heterogeneous Wireless System
-- Evaluation of Large-Size Data Transmission Delay Time of Traffic Relay -- Ono Kento, Ono Takahiro, Akimoto Kouhei, Kameda Suguru, Suematsu Noriharu (Tohoku Univ.) SR2018-52 |
We have proposed Traffic Relay as a method to realize load balancing in heterogeneous networks. In this method, user equ... [more] |
SR2018-52 pp.145-150 |
PRMU |
2017-10-13 15:50 |
Kumamoto |
|
A Study on Traffic Sign Detection and Classification with Single Shot Detection Janet Mardjuki (Simon Fraser Univ.), Yongqing Sun, Shingo Ando, Kinebuchi Tetsuya (NTT) PRMU2017-96 |
For this paper, we would be presenting our basic investigation on real life traffic-sign detection and classification in... [more] |
PRMU2017-96 pp.187-191 |
SSS |
2017-06-20 13:00 |
Tokyo |
|
Characterization of ship traffic flow by Principal Component Analysis and its application to ship traffic risk assessment Sonoko Kawashima (NMRI), Yasumi Kawamura (YNU), Hiroko Itoh, Junji Fukuto (NMRI) SSS2017-7 |
Analysis and assessment of ship traffic have been conducted for safe navigation environment, and AIS data is used for an... [more] |
SSS2017-7 pp.1-4 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 15:50 |
Yamaguchi |
|
Evaluation of Clustering Analysis Based on Malware Traffic Model Mitsuhiro Hatada (Waseda Univ./NTT Communications), Tatsuya Mori (Waseda Univ.) ISEC2016-24 SITE2016-18 ICSS2016-24 EMM2016-32 |
A vast number of new malware samples have been developed for decades, and antivirus software may fail to detect evasive ... [more] |
ISEC2016-24 SITE2016-18 ICSS2016-24 EMM2016-32 pp.59-64 |
ICM |
2016-07-07 14:25 |
Hokkaido |
|
A study for detection of packet discard in unmanaged network Shinji Furuya, Fumio Ohmatsu (Mitsubishi Electric Corp.) ICM2016-11 |
Generally, SIer(System Integrator)s and NIer(Network Integrator)s build a WAN(wide area network) as a solution of LAN-to... [more] |
ICM2016-11 pp.15-20 |
MICT, ASN, MoNA (Joint) |
2016-01-29 16:35 |
Kanagawa |
Hotel Okada |
Design and initial evaluation of vehicle counting system using road-side microphone array Kohei Mimura, Song Liu, Shigemi Ishida (Kyushu Univ.), Shigeaki Tagashira (Kansai Univ.), Akira Fukuda (Kyushu Univ.) ASN2015-98 |
We present a vehicle counting system using a road-side microphone array. Our system uses two microphones on one side of ... [more] |
ASN2015-98 pp.111-116 |
IN, IA (Joint) |
2015-12-17 17:35 |
Hiroshima |
Hiroshima City University |
Spacial Distribution of Imbalanced Traffic based on Two-dimensional Flow Reallocation Chaining Model and its Performance Evaluation Toshio Kawakami (Tokyo Tech), Hiroyuki Koga (Univ. of Kitakyushu), Katsuyoshi Iida (Tokyo Tech) IA2015-77 |
A countermeasure is required to deal with explosive growth of mobile traffic, which is frequently spacial imbalanced, wi... [more] |
IA2015-77 pp.49-52 |
SANE |
2015-01-23 15:10 |
Nagasaki |
Nagasaki Prefectural Art Museum |
Extending a Proximity-based Air Traffic Control Difficulty Index to Three-Dimensional Airspace Sakae Nagaoka, Mark Brown (ENRI) SANE2014-124 |
Future Air Traffic Management (ATM) will be conducted based on aircraft trajectory information, and trajectory-related i... [more] |
SANE2014-124 pp.107-112 |
SANE |
2014-07-25 13:25 |
Tokyo |
Electric Navigation Research Institute |
Mapping Trajectory Information onto Proximity Parameters for Building a Difficulty Index of Aircraft Encounters Sakae Nagaoka, Mark Brown (ENRI) SANE2014-44 |
Trajectory information will be a basis of the future air traffic management. Indices associated with thecomplexity and s... [more] |
SANE2014-44 pp.7-12 |
IA |
2013-10-10 14:00 |
Overseas |
Konkuk Univ., Seoul |
Proposal of a Network Control System to Detect, Analyze and Mitigate Targeted Cyber Attacks Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2013-26 |
Recently, targeted cyber attacks have been so sophisticated that we cannot detect them at early stage of intrusion.
The... [more] |
IA2013-26 pp.1-6 |