Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2023-03-15 15:10 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
Search by topic model to support research of ethnographic materials Junya Komatsu, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ) SITE2022-56 IA2022-79 |
In a text retrieval system, there are three types of retrieval methods: word retrieval, textual relationship retrieval, ... [more] |
SITE2022-56 IA2022-79 pp.15-20 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-16 15:35 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
Model compression by pruning of CNN based on perceptual hashes Shota Mishina, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2022-59 IA2022-82 |
Message digests that identify images are indispensable for secure and convenient copyright management of digital content... [more] |
SITE2022-59 IA2022-82 pp.28-34 |
SITE |
2019-12-06 13:00 |
Kanagawa |
|
Analysis of an intermediate layer for perceptual hashing using a convolutional neural network Ken Nakatani, Meng Zhaoxiong, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2019-80 |
This research aims to improve the digital watermark technology that embeds evidence information by using content redunda... [more] |
SITE2019-80 pp.1-6 |
SITE |
2019-12-06 14:15 |
Kanagawa |
|
A Scheme of Digital Copyright Management System Based on Blockchain and Digital Watermarking
-- Research on Improvement Method of Perceptual Hashing based on Machine Learning -- Zhaoxiong Meng, Tetsuya Morizumi (KU), Sumiko Miyata (SIT), Hirotsugu Kinoshita (KU) SITE2019-83 |
In this study, in order to search for a new digital content copyright management method that achieves both safety and co... [more] |
SITE2019-83 pp.21-27 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:30 |
Kochi |
Kochi University of Technology |
Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA
-- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis -- Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 |
In this paper we propose a method for machine learning similar chains of words (word chains) similar to "rules for infer... [more] |
ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 pp.243-249 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 12:10 |
Hokkaido |
Sapporo Convention Center |
About Access Control with the Deconstruction Device in Probability Measures on Metric Spaces Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2018-36 SITE2018-28 HWS2018-33 ICSS2018-39 EMM2018-35 |
The word of Socrates: "Not life, but good life, is to be chiefly valued" is the dichotomy between the two, if we see tha... [more] |
ISEC2018-36 SITE2018-28 HWS2018-33 ICSS2018-39 EMM2018-35 pp.281-287 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 15:45 |
Tokyo |
|
Proposal of the concept of connecting HIMOJI-ontologies by mutual information of texts, and its case study
-- In the case to see latent texts as random variables -- Xianbo Song, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) ISEC2017-26 SITE2017-18 ICSS2017-25 EMM2017-29 |
This paper is linked to the theme of database creation of "HIMOJI data" which has been studied at Kanagawa University. H... [more] |
ISEC2017-26 SITE2017-18 ICSS2017-25 EMM2017-29 pp.135-140 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 13:30 |
Fukushima |
|
Development of the folk implements database using the relational model and thesaurus for the digital archive Toshihide Hanyu, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo NetSI), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2014-77 IA2014-109 |
In recent years, digitization of museum material information has been promoted. Some museums provide digital material in... [more] |
SITE2014-77 IA2014-109 pp.215-220 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 13:55 |
Fukushima |
|
A search scheme considering the search process using ACO and search history Shun Koizumi (Kanagawa Univ.), Sumiko Miyata (Kanagawa Univ), Tetsuya Morizumi (ToyoNSI), Hirotsugu Kinoshita (Kanagawa Univ) SITE2014-78 IA2014-110 |
Recent years, the spread of Internet reveals that we can search information easily.
However, it is difficult to find ac... [more] |
SITE2014-78 IA2014-110 pp.221-226 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 14:45 |
Fukushima |
|
Management of information resources using the Swarm Intelligence expressing the attraction and repulsion by similarity Katsunori Ishida, Shun Koizumi, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (TNSi), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2014-80 IA2014-112 |
[more] |
SITE2014-80 IA2014-112 pp.233-238 |
CS |
2014-11-07 08:30 |
Hokkaido |
Shiretoko (Hokkaido) |
Derivation of the mean packet delay using M/G/1 model in LR-PON Sumiko Miyata (Kanagawa Univ), Ken-ichi Baba (Kogakuin Univ), Katsunori Yamaoka (Tokyo Tech), Hirotsugu Kinoshita (Kanagawa Univ) CS2014-63 |
Recently, LR-PON (Long Reach-Passive Optical Networks), in which the distance between OLT and ONUs is large, may become ... [more] |
CS2014-63 pp.55-60 |
CS, NS, IN (Joint) |
2014-09-12 15:25 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
EPON reservation interval allocation method for decreasing mean delay time Sumiko Miyata (Kanagawa Univ.), Ken-ichi Baba (Kogakuin Univ.), Katsunori Yamaoka (Tokyo Inst. of Tech.), Hirotsugu Kinoshita (Kanagawa Univ.) CS2014-52 |
The packet transmission of upstream in EPON can be divided into data interval and reservation interval. In reservation i... [more] |
CS2014-52 pp.67-72 |
SITE, IPSJ-EIP, IPSJ-DCC |
2014-05-14 15:15 |
Kanagawa |
Institute of Information Security |
Retrieval for the nonwritten-materials using Ontology Toshihide Hanyu, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration Co., Ltd.), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2014-4 |
In order to look for the material, we had to go to the museum directly. In recent years, Digitization
of the material i... [more] |
SITE2014-4 pp.53-58 |
NS, IN (Joint) |
2014-03-07 14:30 |
Miyazaki |
Miyazaki Seagia |
Optimal cost sharing for the mobile tethering and coalition condition Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) IN2013-204 |
A tethering function allows phones or tablets to share their Internet connections (bandwidth) with other devices such as... [more] |
IN2013-204 pp.355-360 |
SITE, IPSJ-CE, IPSJ-CLE |
2013-12-15 13:25 |
Okinawa |
Ryukyu Univ. |
Dynamic Hybrid System of Honeypot and IDS for Network Security Analysis Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-55 |
The development of information technology has come hand-in-hand with various security problems that are becoming increas... [more] |
SITE2013-55 pp.157-161 |
SITE, IPSJ-CE, IPSJ-CLE |
2013-12-15 13:50 |
Okinawa |
Ryukyu Univ. |
A self-organizing management system for the information resources with the swarm intelligence Katsunori Ishida, Shun Koizumi, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (TOYO NETWORKS & SYSTEM INTEGRATION), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-56 |
[more] |
SITE2013-56 pp.163-168 |
SITE, IPSJ-CE, IPSJ-CLE |
2013-12-15 14:15 |
Okinawa |
Ryukyu Univ. |
A search scheme with an emphasis on the search process using ACO Shun Koizumi, Katsunori Ishida, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-57 |
When somebody tries to search some objects on the Internet, some level of results are got easily. But the qualities of r... [more] |
SITE2013-57 pp.169-173 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 13:25 |
Nara |
Todaiji Total Cultural Center |
Game theoretic analysis of the value exchange system Yoshiaki Tajima, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-66 IA2012-104 |
Recently, a local currency has been attracting attention for the purpose of circulating a thing and service in local com... [more] |
SITE2012-66 IA2012-104 pp.201-206 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 15:40 |
Nara |
Todaiji Total Cultural Center |
A watermarking method for the Bezier curve Takafumi Kudo, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Faculty of Engineering, Toyo Networks and System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-70 IA2012-108 |
E-book that can read on your computer or mobile device began to come into wide use in the market. The comics have been d... [more] |
SITE2012-70 IA2012-108 pp.243-248 |
SITE |
2012-12-12 13:00 |
Osaka |
|
A value exchange system using the local currency value Yoshiaki Tajima, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-43 |
The value exchange systems-using the value of the local currency have been studied. A local currency has been attracting... [more] |
SITE2012-43 pp.1-6 |