CANDAR21 Pre-recorded presentation videos


CANDAR Track1

3: PZLAST: an ultra-fast sequence similarity search tool implemented on a MIMD processor
Hitoshi Ishikawa


34: Hip to Be (Latin) Square: Maximal Period Sequences from Orthogonal Cellular Automata
Luca Mariot


43: An asynchronous P system with a DPLL algorithm for solving a satisfiability problem
Takuya Noguchi and Akihiro Fujiwara


46: Solving the sparse QUBO on multiple GPUs for Simulating a Quantum Annealer
Tomohiro Imanaga, Koji Nakano, Ryota Yasudo, Yasuaki Ito, Yuya Kawamata, Ryota Katsuki, Shiro Ozaki, Takashi Yazane and Kenichiro Hamano


75: Semi-Uniform Deployment of Mobile Robots in Perfect \ell-ary Trees
Masahiro Shibata and Sebastien Tixeuil


86: A State Transfer Method That Adapts to Network Bandwidth Variations in Geographic State Machine Replication
Tairi Chiba, Ren Ohmura and Junya Nakamura



CANDAR Track2

19: Cost-Performance Evaluation of Heterogeneous Tierless Storage Management in a Public Cloud
Reika Kinoshita, Satoshi Imamura, Lukas Vogel, Satoshi Kazama and Eiji Yoshida


28: Evaluation of an HLS-based heterogeneous redundant design approach for functional safety systems on FPGAs
Taichi Saikai, Kotoko Miyata, Taito Manabe and Yuichiro Shibata


67: M-KUBOS/PYNQ Cluster for multi-access edge computing
Takumi Inage, Kazuei Hironaka, Kensuke Iizuka, Kohei Ito, Yasuyu Fukushima, Mitaro Namiki and Hideharu Amano


69: Area-efficient Binary and Ternary CNN Accelerator using Random-forest-based Approximation
Kaisei Kimura, Sho Yatabe, Sora Isobe, Yoichi Tomioka, Hiroshi Saito, Yukihide Kohira and Qiangfu Zhao


82: Low-Latency High-Bandwidth Interconnection Networks by Selective Packet Compression
Naoya Niwa, Hideharu Amano and Michihiro Koibuchi



CANDAR Track3

23: Dementia Sign Detection System Using Digital Twin
Toru Kobayashi, Kazuki Fukae, Tetsuo Imai and Kenichi Arai


80: On the Performance of Hidden Markov Model Spectrum Opportunity Forecast on Limited Observed Channel Activity
Rodrigo Feitosa Bezerra, Jacir Bordim, Marcos Fagundes Caetano and Marcus Vinicius Lamar



CANDAR Track4

20: Efficient and Large Scale Pre-training Techniques for Japanese Natural Language Processing
Akihiko Kasagi, Akihiro Tabuchi, Yosuke Oyama, Masahiro Asaoka, Takumi Honda, Yasufumi Sakai, Tsuguchika Tabaru and Thang Dang


24: A Proposal of Code Modification Problem for Web Client Programming Using JavaScript
Khaing Hsu Wai, Nobuo Funabiki, Khin Thet Mon, San Hay Mar Shwe, Htoo Htoo Sandi Kyaw and Khin Sandar Lin


31: Browser-Based Manipulation of Virtual Objects Through MVVM Architecture with Data Binding
Kentaro Nagaki and Satoshi Fujita


40: Accelerate CNN Models via Filter Pruning and Sparse Tensor Core
An-Tai Chen, Pangfeng Liu, Ding-Yong Hong and Jan-Jan Wu


45: Visual Studio Code Extension and Auto-completion for Mizar Language
Hiroto Taniguchi and Kazuhisa Nakasho


70: Trajectory Anonymization through Laplace Noise Addition in Latent Space
Yuiko Sakuma, Thai P. Tran, Tomomu Iwai, Akihito Nishikawa and Hiroaki Nishi



CANDAR Track5

6: Template Protected Fingerprint Verification using Set Similarity-based Minutia Cylinder Code and MinHash
Yoshiko Yasumura, Masakazu Fujio, Wataru Nakamura, Yosuke Kaga and Kenta Takahashi


21: A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees
Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka and Yasuyuki Nogami


22: Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS
Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka and Yasuyuki Nogami


27: A Strongly Unlinkable Group Signature Scheme with Matching-Based Verifier-Local Revocation for Privacy-Enhancing Crowdsensing
Yuto Nakazawa and Toru Nakanishi


29: Implementation and Evaluation of a Ring Oscillator-based True Random Number Generator
Naoya Torii, Ryuichi Minagawa, Hideaki Kevin Omae and Koutarou Hayashi


35: Group Signatures with Designated Traceability
Hiroaki Anada, Masayuki Fukumitsu and Shingo Hasegawa


36: Reducing Revocation Lists in CS-Based Revocable Group Signature Scheme Using Vector Commitment
Kouhei Sugimoto and Toru Nakanishi


61: An Intrusion Detection system for imbalanced dataset based on Deep Learning
Mariama Mbow, Hiroshi Koide and Kouichi Sakurai


66: Efficient Multi-Party Contact Tracing
Mathieu De Goyon, Atsuko Miyaji and Tian Yangguang



ASON

5: An Enhancement of Physical Web with Stateful BLE Beacons
Kakeru Kobayashi and Satoshi Fujita


57: A Lightweight Interactive Graph Processing Library for Edge Computing in Smart Society
Jun Zhou and Masaaki Kondo


89: Porting Caching Functions to Named Data Networking Forwarding Daemon (NFD)
Takuya Mizushiro and Teruaki Kitasuka


100: Switching Method of Media Access Control for Improving Fairness of Throughput between WLAN systems under Adjacent Channel Interference
Hiroyasu Obata and Chisa Takano


101: Performance Evaluation of Information Floating with Limited Expiration Time in Terms of Information Reception Time and Error Diffusion Rate
Yuko Ikeda, Hiroyasu Obata and Kenji Ishida


107: A Link State Routing Method for CCN with Blockchain
Shuichi Tokunaga, Satoshi Ohzahata and Ryo Yamamoto


112: Building a Sensor Network to Measure Drivers' Emotions
Kazuki Sakai, Haruka Yosimoto, Atsushi Ito and Yuko Hiamatsu


120: A Performance Evaluation of Vehicular Swarm Intelligence for Seamless Route Guidance using Opportunistic Networking
Shougo Amita and Akihiro Fujihara


121: Adaptive Network Coding Broadcasting based on Node Mobility in Mobile Ad-hoc Networks
Masami Yoshida, Alberto Gallegos Ramonet and Taku Noguchi


127: Feasibility Investigations of Access-Point Transmission Power Optimization Method under Co-use of Channel Bonding and Non Channel Bonding in Wireless Local-Area Network
Fatema Akhter, Sun Yuanshuai, Nobuo Funabiki, Hendy Briantoro, Kwenga Ismael Munene and Md. Mahbubur Rahman


129: Improvement of Sound Classification Method on Smartphone for Hammering Test Using 5G Network
Tsubasa Fukumura, Hayato Aratame, Atsushi Ito, Masafumi Koike, Katsuhiko Hibino and Yoshihisa Kawamura


136: Efficient RPL Tree Construction Using Passive Link Quality Estimation
Hiroto Fujita, Yasuyuki Tanaka, Kosuke Mori and Fumio Teraoka


140: On the Suppression of Loops with Long Hops During Scatternet Configuration in Bluetooth MANETs
Haruki Ishizaki, Eitaro Kohno and Yoshiaki Kakuda


168: Analysis of Reward Function for Incentive-based Participation Promotion Method
Kaito Tanino and Teruaki Kitasuka



CSA

72: Performance Study of Kotlin and Java Program Considering Bytecode Instructions and JVM JIT Compiler
Atsuya Sonoyama, Takeshi Kamiyama, Masato Oguchi and Saneyasu Yamaguchi


81: Mitigating Process Variations with Cooperative Tuning for Performance and Power through a Simple DSL
Yunjiao Ma, Yuan He, Yasutaka Wada, Wenchao Luo, Ryuichi Sakamoto and Masaaki Kondo


124: Automatic executable code generation for DNN accelerator ReNA
Yuta Masuda, Yasuhiro Nakahara, Motoki Amagasaki and Masahiro Iida


143: A simulation of a memory subsystem using a highly energy-efficient but erroneous MRAM
Daiki Saito, Takahiro Hirofuchi, Hiroko Arai and Yukinori Sato


144: Parallelizing Compiler Translation Validation Using Happens-Before and Task-Set
Jixin Han, Tomofumi Yuki, Michelle Strout, Dan Umeda, Hironori Kasahara and Keiji Kimura


146: Data Rearrange Unit for Efficient Data Computation in Embedded Systems
Akiyuki Mamiya and Nobuyuki Yamasaki


148: Preliminary Evaluation for Multi-domain Spike Coding on Memcapacitive Neuromorphic Circuit
Reon Oshio, Atsushi Sawada, Mutsumi Kimura, Renyuan Zhang and Yasuhiko Nakashima


150: A Python-based evaluation framework for stochastic computing circuits on FPGA SoC
Naoki Fujieda


151: Analysis of Fully-Pipelined CNN Implementation on FPGA and HBM2
Van Cam Nguyen and Yasuhiko Nakashima



GCA

8: Augmented Triplet Network for Individual Organism and Unique Object Classification for Reliable Monitoring of Ezaoshika Deer
Yojiro Harie, Sangam Neupane and Gautam Bishnu


49: Instillation Checking Using Long Short-Term Memories for Ophthalmology Patients
Tomohiro Ishigami, Teijiro Isokawa, Naotake Kamiura, Hiroki Masumoto and Hitoshi Tabuchi


51: Detecting DDoS Attacks on SDN Data Plane with Machine Learning
Ranyelson Carvalho, Lucas Costa, Eduardo Alchieri and Jacir Bordim


73: Acceleration of Deflate Encoding and Decoding with GPU implementations
Daisuke Takafuji, Koji Nakano, Yasuaki Ito and Akihiko Kasagi


74: GANs with Suppressed Mode Collapse Using Intrinsic Rewards
Toi Tsuneda, Taro Kiriyama, Kosuke Shintani and Satoshi Yamane


104: Hierarchical Multi-Building And Multi-Floor Indoor Localization Based On Recurrent Neural Networks
Abdalla Elesawi and Kyeong Soo Kim


115: Adversarial attack detection on node classification by autoencoder-based analysis of hidden layers in graph convolutional networks
Kenta Shimada and Tomonobu Ozaki


122: Heuristic extraction of co-occurrence patterns for effective construction of graph-based interpretable decision sets
Kota Matsuyama and Tomonobu Ozaki


141: An Externally-Constrained Ising Clustering Method for Material Informatics
Kazuhiko Komatsu, Masahito Kumagai, Ji Qi, Masayuki Sato and Hiroaki Kobayashi


142: A GPU Implementation of Watercolor Painting Image Generation
Jiamian Huang, Yasuaki Ito and Koji Nakano


147: Acceleration and higher precision by discrete wavelet transform for single image super-resolution using convolutional neural networks
Manh Tuan Nguyen, Keisuke Iwai, Takashi Matsubara and Takakazu Kurokawa


166: Conditions Based Generative Adversarial Networks with attention module for Image Generation
Kaixu Chen, Zhengxuan Zhao and Satoshi Yamane


170: Anime-style Image Generation using GAN
Zhen Cui, Yasuaki Ito and Koji Nakano


172: Decision Making in American Football under State Uncertainty by Stochastic Inverse Reinforcement Leaning
Risa Takayanagi, Keita Takahashi, Masaya Watabe, Kazunori Ohkawara and Tomah Sogabe



LHAM

113: Empirical parameter tuning of task-based tiled QR factorization using quantum annealing
Tomohiro Suzuki


138: A memory bank conflict prevention mechanism for SYCL on SX-Aurora TSUBASA
Wenbin Wang, Jiahao Li, Yoichi Shimomura and Hiroyuki Takizawa


139: Cross-Reference Simulation by Code-To-Code Adapter (CoToCoA) Library for the Study of Multi-Scale Physics in Planetary Magnetospheres
Yuto Katoh, Keiichiro Fukazawa, Takeshi Nanri and Yohei Miyake


157: Out-of-GPU FFT: A case study in GPU prefetching
Peter Pirgov, Lenore Mullin and Rishi Khan



PDAA

10: Hybrid Interconnection Networks for Reducing Hardware Cost and Improving Path Diversity Based on Fat-Trees and Hypercubes
Yaodong Wang and Yamin Li


33: Tip the Balance: Improving Exploration of Balanced Crossover Operators by Adaptive Bias
Luca Manzoni, Luca Mariot and Eva Tuba


38: Classification Models in Genetic Algorithms for Commonality Optimization in Passive Crash Safety
Burak Çetinkaya, Johannes Stadler and Nguyen Anh Vu Doan


56: Commutativity of Composition of some Elementary Cellular Automata with Essentially 2-Neighborhood Local Functions on Monoids
Toshikazu Ishida and Shuichi Inokuchi


64: Petri Net based Mathematical Programming for Optimal Resource Assignment Problems with Multiple Resource Requirements
Tomoya Uchihira and Morikazu Nakamura


92: An asynchronous P system with branch and bound for solving the subset sum problem
Kosei Nagao and Akihiro Fujiwara


98: A Proposal of Dynamic Job Scheduling Algorithm Considering CPU Core Utilization for User-PC Computing System
Ariel Kamoyedji, Nobuo Funabiki, Hein Htet and Minoru Kuribayashi



SUSCW

11: A Distributed Multi-group Mutual Exclusion Algorithm for Intersection Traffic Control
Hirotsugu Kakugawa and Sayaka Kamei


68: Speeding Up of CGRAs by Reshaping and Stochastic FMA
Tomoya Akabe, Renyuan Zhang and Yasuhiko Nakashima


87: Evaluation of the effect of ICT in education on the academic literacy of high school students
Yoshiomi Otsuka


102: Speech Signal Processing Using Consonant-Vowel Location Detection
Shusuke Nakazato and Nobuhiko Nakano


118: Weight Least Square Filter For Improving the Quality of Depth Map on FPGA
Renzhi Mao, Kaijie Wei, Hideharu Amano, Yuki Kuno and Masatoshi Arai


119: An Implementation of a World Grid Square Codes Generator on a RISC-V Processor
Rei Watanabe, Jubee Tada and Keiichi Sato


123: Analysis of Resistance Distribution and Voltage Drop in Chips with Inductive Coupling Wireless Communication Interface
Hideto Kayashima and Hideharu Amano


155: Recognizing HPC Workloads Based on Power Draw Signatures
Sven Köhler, Lukas Wenzel, Max Plauth, Pawel Böning, Philipp Gampe, Leonard Geier and Andreas Polze



WICS

2: A machine learning-based NIDS that collects training data from within the organization and updates the discriminator periodically and automatically
Hideya Sato and Ryotaro Kobayashi


12: Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC
Shuntaro Ema, Yuta Sato, Keita Emura and Toshihiro Ohigashi


17: Verification of the Effectiveness to Monitor Darknet across Multiple Organizations
Katsuya Nishijima, Takao Kondo, Tatsumi Hosokawa, Tomohiro Shigemoto, Nobutaka Kawaguchi, Hiroyuki Hasegawa, Hideyuki Honda, Yasuhito Suzuki, Tadashi Kaji and Osamu Nakamura


18: Effects of Data Sampling Interval on Accuracy of Authentication Using Wi-Fi Information Captured by Smartphone
Ryosuke Kobayashi and Rie Yamaguchi


26: Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches
Mirang Park, Kentaro Aburada and Naonobu Okazaki


30: Consideration of the side-channel attack to SIMON implemented on Arduino Uno
Harunobu Enami, Yuta Kodera, Takuya Kusaka and Yasuyuki Nogami


37: Applying The Attacks Tracer on Advanced Persistent Threats to Real Networks
Yuya Tajima and Hiroshi Koide


42: Consideration of the side-channel attack to SPECK implemented on Arduino Uno
Masaki Nakanose, Yuta Kodera, Takuya Kusaka and Yasuyuki Nogami


48: A Practical Parallel Computation in a Scalable Multiparty Private Set Intersection
Seitaro Mishima, Kazuhisa Nakasho, Yuuki Takano and Atsuko Miyaji


60: Cheating Detectable Secret Sharing Scheme from Multiplicative Homomorphic Authentication Function
Kaichi Sato and Satoshi Obana


65: KAKOI: A New Tool to Make Simple and Secure Build Cyber Ranges Using Public Cloud
Tomoya Terashima, Masahiro Nakayama, Teruaki Yokoyama and Hiroshi Koide


90: Improvement of Hybrid NIDS Using Deep Learning for Practical Use
Kentaro Takeshita and Michiko Harayama


99: FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices
Moeka Yamamoto, Shohei Kakei and Shoichi Saito


105: Evaluation of implementability in a malware detection mechanism using processor information
Mutsuki Deghuchi, Masahiko Katoh and Ryotaro Kobayashi


128: A New Higher Order Differential of Enocoro-128v2
Naoki Shibayama and Yasutaka Igarashi


130: Data augmentation of JavaScript dataset using DCGAN and random seed
Phung Minh Ngoc and Mimura Mamoru


132: Single-Round Lattice-based Multisignatures
Kittiphon Phalakarn, Vorapong Suppakitpaisarn and Anwar Hasan


134: Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM
Kohei Otani, Toshiki Okazaki, Toshihiro Yamauchi, Hideaki Moriyama, Masaya Sato and Hideo Taniguchi


164: A Survey of the Offensive and Defensive in Industrial Control System
Kuan-Chu Lu, I-Hsien Liu and Jung-Shian Li



WANC

25: An FPGA-based Power-saving Particle Filter Using Dynamic Reconfiguration
Yuta Imamura, Shota Fukui, Taito Manabe and Yuichiro Shibata


32: Recognition of Multiple Rectangular Stickers for Construction Machines
Yuki Nakagawa, Shuichi Ohno and Shohei Yamamoto


39: Arranging resource amount after automatic GPU offloading
Yoji Yamato


71: Distributed Rewarding for Browser-Based P2P Video Streaming with Ethereum Blockchain
Yunqi Ma and Satoshi Fujita


78: Real-time execution based on fluid scheduling by using IPC control scheme
Atsushi Santo and Nobuyuki Yamasaki


85: Development of the Estimation Model for Intentions to Move Based on Gaze and Face Information with 1DCNN-LSTM and Evaluation of Electric Wheelchair Driving
Sho Higa, Koji Yamada and Shihoko Kamisato


96: Single and Ensemble CNN Models with Out-Category Penalty in Cifar10
Yuta Suzuki, Daiki Kuyoshi and Satoshi Yamane


106: Detection for Transient Patterns with Unpredictable Duration using Chebyshev Inequality and Dynamic Binning
Thanapol Phungtua-Eng, Yoshitaka Yamamoto and Shigeyuki Sako


108: Supporting Music Arrangement, Ringer Assignment, and Score Preparation for Musicbell Ensembles
Shumpei Miyake and Keita Ushida


110: Transparent Relational Database Caching Based on Storage Engines Using In-memory Database
Motoshi Miyamoto, Ryota Kawashima and Hiroshi Matsuo


117: Loss Function of GAN to Make a Clear Judgment
Kuniyasu Imade, Toi Tsuneda, Satoshi Yamane, Kousuke Shintani and Taro Kiriyama


133: Observation of Method Invocation in Application Runtime in Android for CPU Clock Rate Adjustment
Kota Kumakura, Atsuya Sonoyama, Takeshi Kamiyama, Masato Oguchi and Saneyasu Yamaguchi


152: Aggressiveness Controlable Block Level Cache
Riku Hirabayashi, Jose Fortes and Saneyasu Yamaguchi


153: Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum
Siqi Zeng, Kosuke Kaneko, Yan Ke, Haowen Tan and Kouichi Sakurai


154: Thread-Aware Cache Simulator for HPC Application Tuning
Kazuki Chugo and Yukinori Sato


167: Learnability and expressibility of variational quantum circuit: VC and PAC-Bayesian theory
Chih-Chieh Chen, Masaya Watabe, Kodai Shiba, Masaru Sogabe, Katsuyoshi Sakamoto and Tomah Sogabe