Abstract is missing.
- A Generalization of Transmission Power Optimization Method for Concurrently Communicating Multiple Access-Points in Wireless Local-Area NetworkHendy Briantoro, Nobuo Funabiki, Kwenga Ismael Munene, Md. Mahbubur Rahman, Fatema Akhter, Wen-Chung Kao, Minoru Kuribayashi. 1-7 [doi]
- Evacuation Route Guidance Scheme for Building Evacuation Using Wireless Mesh Network SystemsHironori Fujinaka, Tomoyuki Ohta, Yoshiaki Kakuda. 8-13 [doi]
- Evaluation on Progressive Download Methods Based on Timer-Driven Requesting Schemes on Multiple Paths with Shared LinksJunichi Funasaka. 14-20 [doi]
- Realtime Congestion Forecasting of Remote Space Through BLE BeaconsTaiki Iwao, Satoshi Fujita. 21-27 [doi]
- A New Model of Flaming Phenomena in Online Social Networks that Considers Resonance Driven by External StimuliTomoya Kinoshita, Masaki Aida. 28-34 [doi]
- A Study on Adjacent Interference of LoRaJinshan Luo, Atsushi Ito, Akira Sasaki, Madoka Hasegawa, Yoshikazu Nagao, Yuko Hiramatsu, Kotaro Torii, Shiori Ashibe, Toru Aoki. 35-39 [doi]
- 3D maps distribution of self-driving vehicles using roadside edgesMasaya Mizutani, Manabu Tsukada, Yuki Iida, Hiroshi Esaki. 40-45 [doi]
- Throughput Characteristics Evaluation of Media Access Control SP-MAC in Multi-hop WLAN Environment Considering Capture EffectKazuki Nakamura, Hiroyasu Obata, Chisa Takano, Kenji Ishida. 46-52 [doi]
- Evaluation of Disaster Information-Sharing System in Various SituationsKaito Shibutani, Kentaro Mizunaga, Utsav Shrestha, Aki Kobayashi. 53-59 [doi]
- Blackhole Attack Cooperative Prevention Method in MANETsTakeru Terai, Masami Yoshida, Alberto Gallegos Ramonet, Taku Noguchi. 60-66 [doi]
- Adaptive Link Rate Switching Based on Traffic Splitting Method for Power SavingShingo Uchida, Shigetomo Kimura. 67-73 [doi]
- Parameter Optimization of Approximate Image Processing Algorithms in FPGAsNguyen Anh Vu Doan, Manu Manuel, Simon Conrady, Arne Kreddig, Walter Stechele. 74-80 [doi]
- FPGA Context-based Live Migration Maintaining Network ConsistencyAkihiro Fukuhara, Soichiro Shohata, Hiroaki Nishi. 81-86 [doi]
- A Translator from FDL to SystemVerilog for FPGA Implementation of Fuzzy InferenceYuichi Kamina, Keisuke Iwai, Takashi Matsubara 0002, Takakazu Kurokawa. 87-92 [doi]
- Layout-Oriented Low-Diameter Topology for HPC Interconnection NetworksRyuta Kawano, Hiroki Matsutani, Hideharu Amano. 93-99 [doi]
- Resource Utilization Prediction Model for SLAM Offload to EdgeKoki Nagahama, Yoichi Ishiwata, Midori Sugaya. 100-105 [doi]
- FPGA Acceleration of ROS2-Based Reinforcement Learning AgentsDaniel Pinheiro Leal, Midori Sugaya, Hideharu Amano, Takeshi Ohkawa. 106-112 [doi]
- Speeding Up VBGMM By Using Logsumexp With the Approximate Exp-functionTaku Honda, Hiroki Nishimoto, Yasuhiko Nakashima. 113-115 [doi]
- Netlist-based Measures for Hardware Obfuscation: A Preliminary StudyShotaro Yamada, Shuichi Ichikawa. 116-119 [doi]
- Predicting Smartphone Users' Future Locations through Deep Reinforcement LearningMhd Irvan, Tran Phuong Thao, Ryosuke Kobayashi, Toshiyuki Nakata 0001, Rie Shigetomi Yamaguchi. 120-124 [doi]
- Image Classification with Additional Non-decision Labels using Self-supervised learning and GANToshiki Hatano, Toi Tsuneda, Yuta Suzuki, Kousuke Shintani, Satoshi Yamane. 125-129 [doi]
- Distributed Deep Learning of ResNet50 and VGG16 with Pipeline ParallelismNaoki Takisawa, Syunji Yazaki, Hiroaki Ishihata. 130-136 [doi]
- Topic and Sentiment Analysis Matrix Factorization on Rating Prediction for RecommendationBen Wang, Guan-Shen Fang, Sayaka Kamei. 137-143 [doi]
- **Yuta Yajima, Akihiro Inokuchi. 144-150 [doi]
- Art Font Image Generation with Conditional Generative Adversarial NetworksYe Yuan, Yasuaki Ito, Koji Nakano. 151-156 [doi]
- Automated Test Input Generation for Convolutional Neural Networks by Implementing Multi-objective Evolutionary AlgorithmsLingFeng Zhang, Hiroyuki Sato. 157-163 [doi]
- An Efficient Skinny Matrix-Matrix Multiplication Method by Folding Input Matrices into Tensor Core OperationsHao Tang, Kazuhiko Komatsu, Masayuki Sato 0001, Hiroaki Kobayashi. 164-167 [doi]
- Model-based reinforcement learning with missing dataNobuhiko Yamaguchi, Osamu Fukuda, Hiroshi Okumura. 168-171 [doi]
- Improving the Accuracy in SpMV Implementation Selection with Machine LearningReo Furuhata, Minglu Zhao, Mulya Agung, Ryusuke Egawa, Hiroyuki Takizawa. 172-177 [doi]
- Performance Evaluation of Accurate Matrix-Matrix Multiplication on GPU Using Sparse Matrix MultiplicationsFumiya Ishiguro, Takahiro Katagiri, Satoshi Ohshima, Toru Nagai. 178-184 [doi]
- OpenFC: a portable toolkit for custom FPGA accelerators and clustersYasunori Osana, Taisei Imahigashi, Akinobu Tomori. 185-190 [doi]
- Modernising an Industrial CFD ApplicationIstván Z. Reguly, Gihan R. Mudalige. 191-196 [doi]
- Enhanced use of mixed-mode clock manager for coherent sampling-based true random number generatorNaoki Fujieda, Sogo Takashima. 197-203 [doi]
- Closed-Form Solutions of the Fundamental Equation That Describes User Dynamics in Online Social NetworksT. Ikeya, Masaki Aida. 204-210 [doi]
- Implementing a Multi-ejection Switch and Making the Use of Multiple Lanes in a Circuit-switched Multi-FPGA SystemKohei Ito, Kensuke Iizuka, Kazuei Hironaka, Yao Hu, Michihiro Koibuchi, Hideharu Amano. 211-217 [doi]
- A Diagonal Checksum Algorithm-Based Fault Tolerance for Parallel Matrix MultiplicationKe Cui, Michihiro Koibuchi. 218-223 [doi]
- Transparent Transaction Processing with A High-Performance Proxy for Distributed KVSRyuya Miwa, Motoshi Miyamoto, Ryota Kawashima, Hiroshi Matsuo. 224-229 [doi]
- An asynchronous P system with branch and bound for solving the knapsack problemYoshikata Nakano, Akihiro Fujiwara. 230-236 [doi]
- Link Fault Tolerant Routing Algorithms in Mirrored K-Ary N-Tree Interconnection NetworksYaodong Wang, Yamin Li. 237-241 [doi]
- A Parallel Volunteer Computing Based on Server Assisted CommunicationsYuto Watanabe, Masaru Fukushi. 242-247 [doi]
- Cluster analysis of Psychological Characteristics in Elite Level Rugby Players who Belong to CompaniesTakeru Hatachi, Chieko Kato, Yoshiomi Otsuka. 248-253 [doi]
- Noble Inheritance Mechanism of Digital Content for "Digital-Ji-in" toward Sustainable SocietyMasahiro Hiji, Yuichi Hashi, Kazuhiko Kikuchi, Shigeru Fujita, Yohtaro Miyanishi, Norio Shiratori. 254-259 [doi]
- Reducing the Effect of a Human Body for Position Estimation using iBeaconTakayuki Miyazaki, Takehiro Makita, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara. 260-266 [doi]
- Assessment of Consumers' Acceptability of Life Infrastructure Service Interruption and Their FactorsYoshiomi Otsuka. 267-271 [doi]
- Programming Learning by Creating ProblemsMinoru Uehara. 272-276 [doi]
- Horizontal division of deep learning applications with all-to-all communication on a multi-FPGA systemYugo Yamauchi, Akram Ben Ahmed, Kazuei Hironaka, Kensuke Iizuka, Hideharu Amano. 277-281 [doi]
- CLAHE implementation on a low-end FPGA board by high-level synthesisKoki Honda, Kaijie Wei, Masatoshi Arai, Hideharu Amano. 282-285 [doi]
- Fault Tolerance Evaluation of Small World Networks for VLSI ImplementationHideki Mori. 286-289 [doi]
- Toward autonomous adaptive embedded systems for sustainable services using reinforcement learning (WiP report)Yukikazu Nakamoto, Elhard Kumalija, Menglei Zhang. 290-293 [doi]
- An Implementation of a Grid Square Codes Generator on a RISC-V ProcessorJubee Tada, Keiichi Satoh. 294-297 [doi]
- Proposal of a Smart Bicycle Tourism Improving Tourability and Safety for Tourists by Mesh LPWA Communication SystemTomonari Uchim, Shinji Chiba. 298-301 [doi]
- Improvement of Bit Distribution of Binary Sequence Generated by Alternative Trace Map FunctionFatema Akhter, Tomoya Tatara, Yasuyuki Nogami, Takuya Kusaka, Nobuo Funabiki. 302-306 [doi]
- Quantum Security and Implementation Evaluation of Non-adaptive Group-Testing Aggregate Message Authentication CodesHiroaki Anada, Daiki Kamibayashi. 307-313 [doi]
- An Accumulator-Based Revocation in Delegatable Anonymous CredentialsNasima Begum, Toru Nakanishi 0001. 314-320 [doi]
- A Tightly Secure DDH-based Multisignature with Public-Key AggregationMasayuki Fukumitsu, Shingo Hasegawa. 321-327 [doi]
- Method of Generating a Blacklist for Mobile Devices by Searching Malicious WebsitesTakashi Ishihara, Masaya Sato, Toshihiro Yamauchi. 328-333 [doi]
- A New Feature to Secure Web ApplicationsKohei Kubota, Wai Kyi Kyi Oo, Hiroshi Koide. 334-340 [doi]
- Dataset Properties and Degradation of Machine Learning Accuracy with an Anonymized Training DatasetWakana Maeda, Toshiya Shimizu, Takeru Fukuoka, Ikuya Morikawa. 341-347 [doi]
- Specific Congruence Classes of Integer Parameters for Generating BLS Curves for Fast PairingsYuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami. 348-354 [doi]
- New Approach to Dishonest-Majority Secure Multiparty Computation for Malicious Adversaries when n < 2k - 1Shogo Ochiai, Keiichi Iwamura. 355-361 [doi]
- Information Security Fatigue Countermeasures Based on Cognitive Strategy ScaleMisato Ogawa, Shigeaki Tanimoto, Takashi Hatashima, Atsushi Kanai. 362-367 [doi]
- An Approach for Attacking Speck on Microcontroller with Correlation Power AnalysisJianjie Tang, Kengo Iokibe, Takuya Kusaka, Yasuyuki Nogami. 368-372 [doi]
- Towards a Secure Proxy-based Architecture for Collaborative AI EngineeringRoman-Valentyn Tkachuk, Dragos Ilie, Kurt Tutschku. 373-379 [doi]
- Enhanced Classification Method for Homograph Attack DetectionZicong Zhu, Tran Phuong Thao, Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi, Toshiyuki Nakata 0001. 380-386 [doi]
- SUESSA: Sustainable & Ultra-Elastic Stack Security Architecture for Securing IoT Networks of Future Smart CitiesBishnu Prasad Gautam, Norio Shiratori. 387-390 [doi]
- RNN-based Approach to TCP throughput predictionLuyao Bai, Hirotake Abe, Chunghan Lee. 391-395 [doi]
- A study of FPGA-based cluster computing by high-speed serial-link communicationRuochong Fan, Yoshiki Yamaguchi. 401-405 [doi]
- Tweet Classification Using Conversational RelationshipsToshiyuki Fujita, Kaito Shibutani, Aki Kobayashi. 406-410 [doi]
- Development of Soft-Core Processor with Efficient Array Data Transfer MechanismTomoya Kikuchi, Yoshiki Kimura, Kanemitsu Ootsu, Takashi Yokota. 411-415 [doi]
- A Conflict-Aware Capacity Control Mechanism for Last-Level CacheJiaheng Liu, Ryusuke Egawa, Mulya Agung, Hiroyuki Takizawa. 416-420 [doi]
- Cache Replacement Based on LSTM in the Second Cache in Virtualized EnvironmentTaisei Miura, Kenichi Kourai, Saneyasu Yamaguchi. 421-424 [doi]
- Prototype implementation of flat naming scheme ICN on Cefore as the CCN platformKentaro Mizunaga, Aki Kobayashi. 425-429 [doi]
- An asynchronous P system for counting sortKosei Nagao, Akihiro Fujiwara. 430-434 [doi]
- Transient Pattern Detection from Streaming Nature DataThanapol Phungtua-Eng, Yoshitaka Yamamoto, Shigeyuki Sako. 435-439 [doi]
- Category-oriented Sentiment Polarity Dictionary for Rating Prediction of Japanese HotelsAkito Shibata, Sayaka Kamei, Koji Nakano. 440-444 [doi]
- An FPGA Implementation of a Gaussian Process Based Predictor for Sequential Time Series DataHirokazu Suzuki, Seiji Tsutsumi, Yukinori Sato. 445-449 [doi]
- Device position estimation for Multi-tablet virtual display systemHiroto Suzuki, Gaichi Kawaai, Toshiyuki Fujita, Aki Kobayashi. 450-454 [doi]
- A Study of Value Trace Problems for Code Reading Study of C ProgrammingLu Xiqin, Nobuo Funabiki, Htoo Htoo Sandi Kyaw, Shune Lae Aung, Nem Khan Dim. 455-459 [doi]
- Proposal of Automatic Offloading Method in Mixed Offloading Destination EnvironmentYoji Yamato. 460-464 [doi]
- Efficient Exploration by Decision Making Considering Curiosity and Episodic Memory in Deep Reinforcement LearningDaiki Kuyoshi, Kuniyasu Imade, Satoshi Yamane. 465-467 [doi]
- Real-time Detection of Foreign Substance in Seaweed using Pushbroom Hyperspectral ImagingDonghoon Kwak, Guk-Jin Son, Youngduk Kim. 468-470 [doi]
- Generating and Analyzing Data Set of Workflow-NetsShohei Matsubara, Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon. 471-473 [doi]
- A Peak-Avoidance Scheme for Chasing Playback of Mobile Live StreamingHiroki Okada, Masato Yoshimi, Celimuge Wu, Tsutomu Yoshinaga. 474-476 [doi]
- Puyo Puyo AI using Monte Carlo tree searchKatsutoshi Soejima, Nobuhiko Yamaguchi, Osamu Fukuda, Hiroshi Okumura. 477-479 [doi]
- Detection of Foreign Objects overlapped to Green Onion FlakesGuk-Jin Son, Donghoon Kwak, Youngduk Kim. 480-482 [doi]
- An Image Classification Model that Learns MNIST Image Features and Numerical InformationYuta Suzuki, Toshiki Hatano, Toi Tsuneda, Satoshi Yamane. 483-485 [doi]
- Location estimation algorithm using UAV for real environmentsMasaya Tomiyama, Yuma Takeda, Takahiro Koita. 486-488 [doi]
- Q-learning in Continuous Action Space by Extending EVAToi Tsuneda, Daiki Kuyoshi, Satoshi Yamane. 489-491 [doi]