Abstract is missing.
- M2M-SCM: A Spatial Channel Model for Mobile-to-Mobile Communications in the VHF and UHF BandJörg Fischer, Gerald Ulbricht, Robert Koch 0003. 1-6 [doi]
- Causality-Aware Metadata Propagation Scheme for Federated Social Network ServersFukuyama Hiromi, Satoshi Fujita. 7-13 [doi]
- Evaluation of sightseeing application using BLE beacon in Oku-NikkoHaruto Kawakami, Yosei Sato, Haruka Nakayama, Yuko Hiramatsu, Madoka Hasegawa, Hiromu Niitsuma, Kazutaka Ueda, Yasunari Harada, Akira Sasaki, Atsushi Ito. 14-19 [doi]
- A Portable Time Synchronization Method using eBPFKazuto Kobori, Chunghan Lee, Toshio Hirotsu. 20-25 [doi]
- An Evacuation System Using Autonomous Clustering-Based MANET for Sharing Disaster InformationYuki Matsunaga, Tomoyuki Ohta. 26-32 [doi]
- ALR Switching and Routing Strategy for Multiple Sites Based on Traffic Splitting Method for Power SavingChao Zhang, Shigetomo Kimura. 33-39 [doi]
- Measurement of pH in the cow's rumen for high-quality dairy productRika Fukumori, Kaori Hara, Yuko Hiramatsu, Atsushi Ito, Kento Arai, Shiori Ashibe, Yoshikazu Nagao, Akira Sasaki, Hirotsugu Yamamoto, Yukitoshi Otani, Masaki Yasugi, Yasutoshi Yoshiura. 40-43 [doi]
- Delivery Routing to Reduce Calculation Load of Drones on Divided Logistics Areas for Drone Logistics NetworksKazuya Matsutani, Shigetomo Kimura. 44-47 [doi]
- Construction of Hierarchical Matrix on Distributed Memory Systems using a Task Parallel LanguageZhengyang Bai, Tasuku Hiraishi, Akihiro Ida, Masahiro Yasugi, Keiichiro Fukazawa. 48-54 [doi]
- Communication Size Reduction of Federated Learning based on Neural ODE ModelYuto Hoshino, Hiroki Kawakami, Hiroki Matsutani. 55-61 [doi]
- Accelerating Next Generation Genome Sequencing Leveraging High Bandwidth Memory on FPGAsTill Lehmann, Lukas Wenzel, Max Plauth, Sven Köhler 0004, Andreas Polze. 62-68 [doi]
- A Study of Reconfigurable Switch Architecture for Chiplets InterconnectionHui Meng, Qian Zhao 0001, Takaichi Yoshida. 69-75 [doi]
- A Packet Routing using Lightweight Reinforcement Learning Based on Online Sequential LearningKenji Nemoto, Hiroki Matsutani. 76-82 [doi]
- FPGA Implementation of Stream Cipher SOSEMANUKYuki Shibuya, Keisuke Iwai, Takashi Matsubara 0002, Takakazu Kurokawa. 83-89 [doi]
- Multi-Input Adaptive Activation Function for Binary Neural NetworksPeiqi Zhang, Shinya Takamaeda-Yamazaki. 90-96 [doi]
- Extraction of Preference and Classification Rules in Floor Plan Databases using Answer Set ProgrammingRyu Hashimoto, Tomonobu Ozaki. 97-102 [doi]
- A driver-based approach for DMA transfer between FPGA-GPUShun Kasai, Yasunori Osana. 103-108 [doi]
- Accelerating Convolution Neural Networks in Embedded Intel GPUsTaiki Kondo, Hiroyuki Sato. 109-113 [doi]
- Rule-based role estimation in werewolf games using probabilistic logic programmingRento Kurokochi, Tomonobu Ozaki. 114-119 [doi]
- Towards Massively Parallel GPU Assisted SATFilippos Pantekis, Phillip James. 120-126 [doi]
- ConvUNeXt: A Lightweight Convolutional Neural Network for Watercolor Image TranslationHao Su, Jiamian Huang, Yasuaki Ito, Koji Nakano. 127-133 [doi]
- Toward ensuring better learning performance in reinforcement learningMenglei Zhang, Yukikazu Nakamoto. 134-139 [doi]
- Influence of Time Integration Method on GPU Performance for Industry Relevant CFD SimulationsPaul Zehner, Atsushi Hashimoto. 140-146 [doi]
- Dialogue System to Make Humor by Tatoe-TsukkomiYosuke Seki. 147-150 [doi]
- Bicycle-based collision prevention system using pedestrian trajectory predictionNobuhiko Yamaguchi, Hiroki Tokumaru, Osamu Fukuda, Hiroshi Okumura, Wen Liang Yeoh. 151-153 [doi]
- Performances of Symmetric Loss for Private Data from Exponential MechanismJing Bi, Vorapong Suppakitpaisarn. 154-160 [doi]
- Gathering despite a linear number of weakly Byzantine agentsJion Hirose, Junya Nakamura 0001, Fukuhito Ooshita, Michiko Inoue. 161-167 [doi]
- A linear-time self-stabilizing distributed algorithm for the minimal minus ($L, K, Z$) -domination problem under the distance-2 modelHirotsugu Kakugawa, Sayaka Kamei. 168-173 [doi]
- Hybrid Model Convolutional Stage-Positive Definite Metric Operator-Infinity Laplacian Applied to Depth CompletionVanel A. Lazcano, Felipe Calderero. 174-179 [doi]
- Bit duplication technique to generate hard QUBO problemsXiaotian Li, Koji Nakano, Yasuaki Ito, Daisuke Takafuji, Takashi Yazane, Junko Yano, Shiro Ozaki, Ryota Katsuki, Rie Mori. 180-184 [doi]
- Design of Elixir-Based Edge Server for Responsive IoT ApplicationsYuShan Li, Satoshi Fujita. 185-191 [doi]
- Self-replication and Mutation of Polymeric Molecules Simulated by Simplified ChemistryTaisei Mori, Ibuki Kawamata, Satoshi Murata. 192-198 [doi]
- An asynchronous P system for solving the maximum clique problem with the Bron-Kerbosch algorithmTakuya Noguchi, Akihiro Fujiwara. 199-205 [doi]
- Image Generation from Text and SegmentationMasato Osugi, Danilo Vasconcellos Vargas. 206-211 [doi]
- QUBO Model Formulation for Flow-shop Scheduling Problems with Changeover based on Timed Colored Petri NetsTakuya Shinjo, Morikazu Nakamura, Norihiko Itani. 212-217 [doi]
- 3D Mesh Generation from a Defective Point Cloud using Style TransformationKenshiro Tamata, Tomohiro Mashita. 218-223 [doi]
- An extension of optimal fashion capsule wardrobe construction by considering visual dissimilarity and number of good coordinatesYuta Tanaka, Tomonobu Ozaki. 224-228 [doi]
- Toward a training of CNNs on a multi-FPGA systemAoi Hiruma, Kensuke Iizuka, Hideharu Amano. 229-235 [doi]
- An FPGA off-loading of HARK sound source localizationZhongyang Hou, Kaijie Wei, Hideharu Amano, Kazuhiro Nakadai. 236-240 [doi]
- Just-In-Time Compiler System in Aspect-Oriented Programming based Building Block Platform for constructing Domain-Specific Language for HPC ApplicationOsamu Ishimura, Yoshihide Yoshimoto. 241-247 [doi]
- Detecting DDoS Attacks in SDN using a Hybrid Method with Entropy and Machine LearningMarcos J. Santos-Neto, Jacir Luiz Bordim, Eduardo A. P. Alchieri, Edison Ishikawa, Leonardo S. Dourado. 248-254 [doi]
- Topic-Based Clustering of Japanese Sentences Using Sentence-BERTKenshin Tsumuraya, Miki Amano, Minoru Uehara, Yoshihiro Adachi. 255-260 [doi]
- Load-Balancing Routing Algorithms for Reducing Packet Latency and Avoiding Deadlock in Datacenter Interconnection NetworksYaodong Wang, Yamin Li. 261-267 [doi]
- Analysis of Modern and Ancient Chinese Literature Using a Chinese Emotional Expression Analysis SystemYonghui Huang, Cheng Siyuan, Zhao Xin, Minoru Uehara, Yoshihiro Adachi. 268-272 [doi]
- An Implementation of a Pattern Matching Accelerator on a RISC-V ProcessorRiku Takayama, Jubee Tada. 273-275 [doi]
- Group Signatures with Equality Test on SignersKyoya Anzai, Masayuki Fukumitsu, Hiroaki Anada, Shingo Hasegawa. 276-282 [doi]
- Covert Communication in NOMA Systems with Decision-Assisted Q-learningJiaqing Bai, Ji He, Xiaohong Jiang 0001. 283-287 [doi]
- Evaluation of Low-cost Operation of a Malware Detection Mechanism using Processor Information Targeting the IoTMutsuki Deguchi, Masahiko Katoh, Ryotaro Kobayashi. 288-294 [doi]
- On Multi-user Security of Schnorr Signature in Algebraic Group ModelMasayuki Fukumitsu, Shingo Hasegawa. 295-301 [doi]
- Side-channel attack on COSO-based TRNG to estimate output bitsKotaro Hayashi, Ryuichi Minagawa, Naoya Torii. 302-308 [doi]
- Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine CoordinatesTomohiro Iida, Kazuma Ikesaka, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami. 309-315 [doi]
- Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M0Tomoaki Kitahara, Ryota Hira, Yuko Hara-Azumi, Daiki Miyahara, Yang Li 0001, Kazuo Sakiyama. 316-322 [doi]
- Medical knowledge discovery by randomly sampled "patient characteristics" formatted dataKenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi. 323-329 [doi]
- Conformance Testing for 5G O-RAN Entities through MECYu-Xiang Lin, Bing-Kai Hong, Shin-Ming Cheng. 330-336 [doi]
- Privacy-Preserving Social Media with a DisclosureHideaki Miyaji, Po-Chu Hsu, Atsuko Miyaji. 337-343 [doi]
- Proposal and Evaluation of a Method for Secure Division Sum Using the Secret Sharing Scheme by Rounding Off Real NumbersYunosuke Noso, Keiichi Iwamura, Masaki Inamura. 344-350 [doi]
- Koga2022 Dataset: Comprehensive Dataset with Detailed Classification for Network Intrusion Detection SystemsHideya Sato, Ryotaro Kobayashi. 351-357 [doi]
- Hook Point Estimation for System Call Detection by Virtual Machine MonitorMasaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi. 358-362 [doi]
- A New Higher Order Differential of RAGHAVNaoki Shibayama, Yasutaka Igarashi. 363-369 [doi]
- How to implement non-committed card protocols to realize AND operations satisfying the three-valued logicsYuji Suga. 370-374 [doi]
- Threat Analysis of Cyber Security Exercise for Reservoir Testbed Based on Attack TreeSú-Goân Tân, I-Hsien Liu, Jung-Shian Li. 375-379 [doi]
- Analysis of Variance of Searching Time for Serial Concatenation of Graph-Clique based Cryptocurrency MiningIkebe Kei, Kouichi Sakurai. 380-383 [doi]
- On the Identity Match Rate in Web Browsing HistoryTakuya Kato, Hiroto Shiba, Masahiro Mambo. 384-387 [doi]
- Correlation Analysis of Features for Fusing in User Verification Using EEG Evoked by UltrasoundIsao Nakanishi, Yuta Ishikawa, Kotaro Mukai. 388-391 [doi]
- Square Table Lookup Multiparty Computation ProtocolZhongqi Wang, Keita Fuse, Takashi Nishide. 392-395 [doi]
- Load-Based Content Allocation for Mobile Cooperative CacheTaiki Akiba, Celimuge Wu, Tsutomu Yoshinaga. 396-400 [doi]
- Accuracy Improvement by Occurrence Probability of Service Identification based on SNIRyo Asaoka, Akihiro Nakao, Masato Oguchi, Saneyasu Yamaguchi. 401-405 [doi]
- Multi-board FPGA Implementation to Solve the Satisfiability Problem for Multi-Agent Path Finding in Smart FactoryPengyu Huang, Kaijie Wei, Hideharu Amano, Kaori Ohkoda, Masashi Aono. 406-410 [doi]
- FPGA implementation of contour detection based on Helmholtz principleShintaro Matsui, Taito Manabe, Yuichiro Shibata. 411-415 [doi]
- Fully Dynamic Algorithm for the Steiner Tree Problem in Planar GraphsHemraj Raikwar, Sushanta Karmakar. 416-420 [doi]
- Proposal for Optical Fiber Network Monitoring System Using IoT TechnologyKengo Shimizu, Hidekazu Suzuki. 421-425 [doi]
- A Study on Subjective Information in Deep Neural Network ModelsAtsuya Kobayashi, Yoshihaya Takahashi, Saneyasu Yamaguchi. 426-429 [doi]
- Robust optimization algorithms for multi-objective knapsack problemTakuya Miyamoto, Akihiro Fujiwara. 430-432 [doi]
- Weaving Heart Rate into the Authentication Based on Spatiotemporal Information and ActionsAkira Nishihara, Masateru Tsunoda. 433-435 [doi]
- Energy Consumption Reduction through Resource Allocation Using DockerEiji Sugahara, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama. 436-437 [doi]
- FPGA-Based Control of Remote Robotic Hands and ROS2 IntegrationLudi Wang, Takeshi Ohkawa. 438-440 [doi]