Page 7 - 2024F
P. 7

II.8 Implementation of ASCON Lightweight Cryptography for IoT Applications, Khai-Duy
                     NGUYEN, SESS Program, Pham Laboratory (I) . . . . . . . . . . . . . . . . . . . . .   53
                II.9 Optimized Graph Neural Network Approach for 3D Human Pose Estimation, Luis
                     ACEVEDO BRINGAS, SESS Program, Takahashi Laboratory (J) . . . . . . . . . . .         55
                II.10 Leap Motion and Hand Tracking Technologies: Air writing, Tiesheng YIN, JUSST
                     Program, Choo Laboratory (IEC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  57
                II.11 Estimation of ower Limb Muscle Activity During Walking in Elderly People Using
                     Markerless Motion Capture Technology, Theodore Reangpusri, JUSST Program, Okada
                     Laboratory (M) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  59
                II.12 EHD Technology applied to Soft Robotics, Ahmed Miguel ROMAN ABOLHOSEN,
                     AiQuSci Program, Shintake Laboratory (M) . . . . . . . . . . . . . . . . . . . . . . . .  61
                II.13 Prevention of Aspiration Pneumonia Using in Ear Audio, Pettersson Filip, JUSST
                     Program, Koike Laboratory (M) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  63
                II.14 An Adaptive Evolutionary Algorithm for Dynamic Multi-objective Optimization, Tasin
                     Mobin Mohtadi, JUSST Program, Sato Laboratory (J) . . . . . . . . . . . . . . . . . .  65
                II.15 Evolutionary Multy Objective Transfer Optimization, Fermin DEL VALLE, JUSST
                     Program, Sato Laboratory (J) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  67
                II.16 Recognition-based image authentication: A comparison of authentication methods,
                     Hugo NORDENSTROM, JUSST Program, Takada Laboratory (J) . . . . . . . . . . .          69
                II.17 BTDCGANet: An Advanced Deep Transfer Learning and Generative Adversarial Network-
                     Based Data Augmentation Approach for Brain Tumor Classification from Magnetic
                     Resonance Imaging (MRI) Scans , Shabnur Anonna Akhy, Shouno Laboratory (J)      . .   71
                II.18 Data Hiding Components for Solving Information Security Issues in DICOM Medical
                     Images, Juan MOSCO, JUSST Program, Shouno Laboratory (J) . . . . . . . . . . . .      73
                II.19 Bengali Diff: Di?usion Model for One-Shot Bengali Font Generation, Md Bilayet Hos-
                     sain, JUSST Program, Md Bilayet Hossain, JUSST Program, Yanai Laboratory (J) . .      75
                II.20 Deep Learning Based Japanese Sign Language Translation, Rattapoom KEDTIWERASAK,
                     SESS Program, Takahashi Laboratory (J) . . . . . . . . . . . . . . . . . . . . . . . . .  77
                II.21 The Influence of Virtual Non-creature Human-Like Avatars on the User and Their
                     Surroundings, Luca Malte BARRE, SESS/GECHA Program, Hirota Laboratory (J) .           79
                II.22 Non-Contact Heart Rate Monitoring of Anesthetized Laboratory Animals Using Doppler
                     Radar Technology, Ta Hoai Nam, MICH Program, Sun Laboratory (M) . . . . . . . .       81
                II.23 An evaluation of multi-core and V extension RISC-V processor, , , The-Binh NGUYEN,
                     SESS Program, Pham Laboratory (I) . . . . . . . . . . . . . . . . . . . . . . . . . . . .  83




























                                                            ii
   2   3   4   5   6   7   8   9   10   11   12