


default search action
IEICE Transactions on Information & Systems, Volume 103
Volume 103-D, Number 1, January 2020
- Keiichi Iwamura:

Foreword. 1 - KokSheik Wong

, ChuanSheng Chan, MaungMaung AprilPyone:
Lightweight Authentication for MP4 Format Container Using Subtitle Track. 2-10 - Mariko Fujii, Tomoharu Shibuya:

Improvement of the Quality of Visual Secret Sharing Schemes with Constraints on the Usage of Shares. 11-24 - Kenta Iida, Hitoshi Kiya:

Image Identification of Encrypted JPEG Images for Privacy-Preserving Photo Sharing Services. 25-32 - Ippei Hamamoto, Masaki Kawamura

:
Neural Watermarking Method Including an Attack Simulator against Rotation and Compression Attacks. 33-41 - Ryota Kaminishi, Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya:

Blind Bandwidth Extension with a Non-Linear Function and Its Evaluation on Automatic Speaker Verification. 42-49 - Takayuki Nakachi, Yukihiro Bandoh, Hitoshi Kiya:

Secure Overcomplete Dictionary Learning for Sparse Representation. 50-58 - Jin S. Seo:

Multi-Scale Chroma n-Gram Indexing for Cover Song Identification. 59-62 - Reiya Namikawa, Masashi Unoki

:
Non-Blind Speech Watermarking Method Based on Spread-Spectrum Using Linear Prediction Residue. 63-66 - Huyen T. T. Tran, Trang H. Hoang

, Phu N. Minh, Nam Pham Ngoc, Truong Cong Thang:
A Weighted Viewport Quality Metric for Omnidirectional Images. 67-70
- Sufen Zhao, Rong Peng, Meng Zhang, Liansheng Tan:

HeteroRWR: A Novel Algorithm for Top-k Co-Author Recommendation with Fusion of Citation Networks. 71-84 - Shanshan Jiao, Zhisong Pan, Yutian Chen, Yunbo Li:

Cloud Annealing: A Novel Simulated Annealing Algorithm Based on Cloud Model. 85-92 - Keiichi Kaneko

:
Node-Disjoint Paths Problems in Directed Bijective Connection Graphs. 93-100 - Ryuta Kawano

, Ryota Yasudo
, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano:
A Generalized Theory Based on the Turn Model for Deadlock-Free Irregular Networks. 101-110 - Takashi Yokota, Kanemitsu Ootsu, Takeshi Ohkawa:

Genetic Node-Mapping Methods for Rapid Collective Communications. 111-129 - Shun Imai, Akihiro Inokuchi:

Efficient Supergraph Search Using Graph Coding. 130-141 - Rei Takami, Yasufumi Takama:

Proposal and Evaluation of Visual Analytics Interface for Time-Series Data Based on Trajectory Representation. 142-151 - Weiqing Tong, Haisheng Li, Guoyue Chen:

Blob Detection Based on Soft Morphological Filter. 152-162 - Jianyong Duan, Yuwei Wu, Mingli Wu, Hao Wang:

Measuring Semantic Similarity between Words Based on Multiple Relational Information. 163-169 - Sooyong Jeong, Ajay Kumar Jha, Youngsul Shin, Woo Jin Lee:

A Log-Based Testing Approach for Detecting Faults Caused by Incorrect Assumptions About the Environment. 170-173 - Shaojie Zhu, Lei Zhang, Bailong Liu, Shumin Cui, Changxing Shao, Yun Li:

Mode Normalization Enhanced Recurrent Model for Multi-Modal Semantic Trajectory Prediction. 174-176 - Huaizhe Zhou, Haihe Ba, Yongjun Wang, Tie Hong:

On the Detection of Malicious Behaviors against Introspection Using Hardware Architectural Events. 177-180 - Pengyu Wang

, Hongqing Zhu, Ning Chen:
UMMS: Efficient Superpixel Segmentation Driven by a Mixture of Spatially Constrained Uniform Distribution. 181-185
Volume 103-D, Number 2, February 2020
- Guojun Wang:

Foreword. 186-187 - Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang

, Kim-Kwang Raymond Choo
, Jing Wang:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. 188-195 - Wenjuan Li

, Weizhi Meng
, Zhiqiang Liu, Man Ho Au:
Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions. 196-203 - Vasileios Kouliaridis

, Konstantia Barmpatsalou, Georgios Kambourakis, Shuhong Chen:
A Survey on Mobile Malware Detection Techniques. 204-211 - Yuya Senzaki

, Satsuya Ohata, Kanta Matsuura
:
Simple Black-Box Adversarial Examples Generation with Very Few Queries. 212-221 - Huiyao Zheng, Jian Shen

, Youngju Cho, Chunhua Su, Sangman Moh:
A Novel Structure-Based Data Sharing Scheme in Cloud Computing. 222-229 - Qiuhua Wang, Mingyang Kang, Guohua Wu, Yizhi Ren, Chunhua Su:

A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks. 230-238 - Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori

:
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel. 239-255 - Na Ruan, Chunhua Su, Chi Xie:

Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication. 256-264 - Mitsuhiro Hatada, Tatsuya Mori

:
CLAP: Classification of Android PUAs by Similarity of DNS Queries. 265-275 - Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori

:
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library. 276-291 - Hiroshi Nomaguchi, Chunhua Su, Atsuko Miyaji

:
New Pseudo-Random Number Generator for EPC Gen2. 292-298 - Tomoaki Mimoto, Seira Hidano, Shinsaku Kiyomoto, Atsuko Miyaji

:
Anonymization Technique Based on SGD Matrix Factorization. 299-308
- Jae Young Hur:

Virtual Address Remapping with Configurable Tiles in Image Processing Applications. 309-320 - Yudai Sakamoto, Shigeru Yamashita

:
Efficient Methods to Generate Constant SNs with Considering Trade-Off between Error and Overhead and Its Evaluation. 321-328 - Takashi Nakada, Hiroyuki Yanagihashi

, Kunimaro Imai, Hiroshi Ueki, Takashi Tsuchiya, Masanori Hayashikoshi, Hiroshi Nakamura
:
An Energy-Efficient Task Scheduling for Near Real-Time Systems on Heterogeneous Multicore Processors. 329-338 - Apinporn Methawachananont, Marut Buranarach

, Pakaimart Amsuriya, Sompol Chaimongkhon, Kamthorn Krairaksa, Thepchai Supnithi:
Software Process Capability Self-Assessment Support System Based on Task and Work Product Characteristics: A Case Study of ISO/IEC 29110 Standard. 339-347 - Yutaro Kashiwa, Masao Ohira:

A Release-Aware Bug Triaging Method Considering Developers' Bug-Fixing Loads. 348-362 - Naoto Sato, Hironobu Kuruma, Yuichiroh Nakagawa, Hideto Ogawa:

Formal Verification of a Decision-Tree Ensemble Model and Detection of Its Violation Ranges. 363-378 - Hiroya Kato, Shuichiro Haruta, Iwao Sasase:

Android Malware Detection Scheme Based on Level of SSL Server Certificate. 379-389 - Chihiro Watanabe, Kaoru Hiramatsu, Kunio Kashino:

Knowledge Discovery from Layered Neural Networks Based on Non-negative Task Matrix Decomposition. 390-397 - Naoki Kato, Toshihiko Yamasaki, Kiyoharu Aizawa, Takemi Ohama:

Users' Preference Prediction of Real Estate Properties Based on Floor Plan Analysis. 398-405 - Jeong-Uk Bang, Mu-Yeol Choi, Sang-Hun Kim, Oh-Wook Kwon:

Automatic Construction of a Large-Scale Speech Recognition Database Using Multi-Genre Broadcast Data with Inaccurate Subtitle Timestamps. 406-415 - Ming Dai, Zhiheng Zhou, Tianlei Wang, Yongfan Guo:

Nonparametric Distribution Prior Model for Image Segmentation. 416-423 - Kazuki Sakai, Ryuichiro Higashinaka, Yuichiro Yoshikawa, Hiroshi Ishiguro, Junji Tomita:

Hierarchical Argumentation Structure for Persuasive Argumentative Dialogue Generation. 424-434 - Andros Tjandra, Sakriani Sakti, Satoshi Nakamura:

Recurrent Neural Network Compression Based on Low-Rank Tensor Representation. 435-449 - Guizhong Zhang, Baoxian Wang, Zhaobo Yan, Yiqiang Li, Huaizhi Yang:

Rust Detection of Steel Structure via One-Class Classification and L2 Sparse Representation with Decision Fusion. 450-453 - Joanna Kazzandra Dumagpi

, Woo-Young Jung, Yong-Jin Jeong:
A New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray Security Images. 454-458 - Jiateng Liu, Wenming Zheng, Yuan Zong, Cheng Lu, Chuangao Tang

:
Cross-Corpus Speech Emotion Recognition Based on Deep Domain-Adaptive Convolutional Neural Network. 459-463 - Jichen Yang, Longting Xu, Bo Ren:

Constant-Q Deep Coefficients for Playback Attack Detection. 464-468 - Yong-Uk Yoon

, Dohyeon Park, Jae-Gon Kim:
Enhanced Derivation of Model Parameters for Cross-Component Linear Model (CCLM) in VVC. 469-471 - Dohyeon Park, Jinho Lee, Jung-Won Kang, Jae-Gon Kim:

Simplified Triangular Partitioning Mode in Versatile Video Coding. 472-475 - Chunhua Qian, Mingyang Li, Yi Ren:

Tea Sprouts Segmentation via Improved Deep Convolutional Encoder-Decoder Network. 476-479
Volume 103-D, Number 3, March 2020
- Kohei Hatano:

Foreword. 480 - Hiroshi Fujiwara, Kei Shibusawa, Kouki Yamamoto, Hiroaki Yamamoto:

Bounds for the Multislope Ski-Rental Problem. 481-488 - Yuichi Sudo, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa:

Loosely Stabilizing Leader Election on Arbitrary Graphs in Population Protocols without Identifiers or Random Numbers. 489-499 - Chuzo Iwamoto, Tatsuaki Ibusuki:

Polynomial-Time Reductions from 3SAT to Kurotto and Juosan Puzzles. 500-505 - Kazuyuki Amano, Shin-Ichi Nakano:

An Approximation Algorithm for the 2-Dispersion Problem. 506-508 - Takashi Harada, Ken Tanaka, Kenji Mikawa

:
Simulated Annealing Method for Relaxed Optimal Rule Ordering. 509-515 - Ryohei Banno, Kazuyuki Shudo:

An Efficient Routing Method for Range Queries in Skip Graph. 516-525 - Satoshi Matsumoto, Tomoyuki Uchida, Takayoshi Shoudai, Yusuke Suzuki, Tetsuhiro Miyahara:

An Efficient Learning Algorithm for Regular Pattern Languages Using One Positive Example and a Linear Number of Membership Queries. 526-539 - Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki:

Generalized Register Context-Free Grammars. 540-548 - Keehang Kwon:

A Heuristic Proof Procedure for First-Order Logic. 549-552
- Yuanbang Li, Rong Peng, Bangchao Wang

:
Survey on Challenges and Achievements in Context-Aware Requirement Modeling. 553-565 - Yoshiyuki Mihara, Shuichi Miyazaki, Yasuo Okabe, Tetsuya Yamaguchi, Manabu Okamoto:

Identifying Link Layer Home Network Topologies Using HTIP. 566-577 - Jun Iwamoto, Yuma Kikutani, Renyuan Zhang, Yasuhiko Nakashima:

Daisy-Chained Systolic Array and Reconfigurable Memory Space for Narrow Memory Bandwidth. 578-589 - Hisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, Tsutomu Matsumoto:

An ATM Security Measure to Prevent Unauthorized Deposit with a Smart Card. 590-601 - Rui Chen, Ying Tong, Ruiyu Liang:

Real-Time Generic Object Tracking via Recurrent Regression Network. 602-611 - Chunting Wan, Dongyi Chen, Juan Yang, Miao Huang:

Combining Parallel Adaptive Filtering and Wavelet Threshold Denoising for Photoplethysmography-Based Pulse Rate Monitoring during Intensive Physical Exercise. 612-620 - Yan Li

, Zhijie Chu, Yizhong Xin
:
Posture Recognition Technology Based on Kinect. 621-630 - Keisuke Imoto

:
Graph Cepstrum: Spatial Feature Extracted from Partially Connected Microphones. 631-638 - Hiroki Tamaru, Yuki Saito

, Shinnosuke Takamichi, Tomoki Koriyama
, Hiroshi Saruwatari:
Generative Moment Matching Network-Based Neural Double-Tracking for Synthesized and Natural Singing Voices. 639-647 - Xinyu Zhu, Jun Zhang, Gengsheng Chen:

ASAN: Self-Attending and Semantic Activating Network towards Better Object Detection. 648-659 - Yuki Fujimura, Motoharu Sonogashira, Masaaki Iiyama:

Simultaneous Estimation of Object Region and Depth in Participating Media Using a ToF Camera. 660-673 - Johanes Effendi, Sakriani Sakti, Katsuhito Sudoh

, Satoshi Nakamura:
Leveraging Neural Caption Translation with Visually Grounded Paraphrase Augmentation. 674-683 - Mingming Yang

, Min Zhang, Kehai Chen, Rui Wang
, Tiejun Zhao:
Neural Machine Translation with Target-Attention Model. 684-694 - Huan Tang, Ning Chen:

Combining CNN and Broad Learning for Music Classification. 695-701 - Nao Igawa, Tomoyuki Yokogawa, Sousuke Amasaki, Masafumi Kondo, Yoichiro Sato, Kazutami Arimoto:

Symbolic Representation of Time Petri Nets for Efficient Bounded Model Checking. 702-705 - Ji-Hoon Shin, Tae-Hwan Kim:

Fast Inference of Binarized Convolutional Neural Networks Exploiting Max Pooling with Modified Block Structure. 706-710 - Xinxin Hu

, Caixia Liu, Shuxin Liu, Xiaotao Cheng:
A Security Enhanced 5G Authentication Scheme for Insecure Channel. 711-713 - Yoonhee Kim, Deokgyu Yun, Hannah Lee, Seung Ho Choi:

A Non-Intrusive Speech Intelligibility Estimation Method Based on Deep Learning Using Autoencoder Features. 714-715 - Bing Luo, Junkai Xiong, Li Xu, Zheng Pei:

Superpixel Segmentation Based on Global Similarity and Contour Region Transform. 716-719 - Weiwei Jiang, Le Zhang:

Edge-SiamNet and Edge-TripleNet: New Deep Learning Models for Handwritten Numeral Recognition. 720-723 - Toru Hiraoka:

A High-Speed Method for Generating Edge-Preserving Bubble Images. 724-727
Volume 103-D, Number 4, April 2020
- Susumu Kunifuji, Thanaruk Theeramunkong, Takayuki Ito

:
Foreword. 728-729 - Takafumi Higashi, Hideaki Kanai

:
Improvement in the Effectiveness of Cutting Skill Practice for Paper-Cutting Creations Based on the Steering Law. 730-738 - Tachanun Kangwantrakool, Kobkrit Viriyayudhakorn, Thanaruk Theeramunkong:

Software Development Effort Estimation from Unstructured Software Project Description by Sequence Models. 739-747 - Uraiwan Buatoom

, Waree Kongprawechnon, Thanaruk Theeramunkong:
Improving Seeded k-Means Clustering with Deviation- and Entropy-Based Term Weightings. 748-758 - Shun Okuhara, Takayuki Ito

:
Compromising Strategies for Agents in Multiple Interdependent Issues Negotiation. 759-770 - Konlakorn Wongaptikaseree, Panida Yomaboot, Kantinee Katchapakirin, Yongyos Kaewpitakkun:

Social Behavior Analysis and Thai Mental Health Questionnaire (TMHQ) Optimization for Depression Detection System. 771-778 - Rachasak Somyanonthanakul

, Thanaruk Theeramunkong:
Characterization of Interestingness Measures Using Correlation Analysis and Association Rule Mining. 779-788 - Kedir Mamo Besher, Juan Ivan Nieto-Hipólito, Juan De Dios Sánchez-López, Mabel Vázquez-Briseno, Raymundo Buenrostro-Mariscal

:
Cognition-Based Delay Analysis to Determine the Average Minimum Time Limit for Wireless Sensor Communications. 789-795 - Jun Munemori, Kohei Komori, Junko Itou:

GUNGEN-Heartbeat: A Support System for High Quality Idea Generation Using Heartbeat Variance. 796-799
- Yajun Wu, Satoshi Yamane:

Model Checking of Real-Time Properties for Embedded Assembly Program Using Real-Time Temporal Logic RTCTL and Its Application to Real Microcontroller Software. 800-812 - Xinxin Han, Jian Ye, Jia Luo

, Haiying Zhou:
The Effect of Axis-Wise Triaxial Acceleration Data Fusion in CNN-Based Human Activity Recognition. 813-824 - Ye Peng, Wentao Zhao, Wei Cai

, Jinshu Su, Biao Han
, Qiang Liu:
Evaluating Deep Learning for Image Classification in Adversarial Environment. 825-837 - Shota Shiratori, Yuichiro Fujimoto, Kinya Fujita

:
Predicting Uninterruptible Durations of Office Workers by Using Probabilistic Work Continuance Model. 838-849 - Shi-Chei Hung, Da-Chun Wu, Wen-Hsiang Tsai:

Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection. 850-865 - Van-Hai Vu, Quang-Phuoc Nguyen, Kiem-Hieu Nguyen, Joon-Choul Shin, Cheol-Young Ock:

Korean-Vietnamese Neural Machine Translation with Named Entity Recognition and Part-of-Speech Tags. 866-873 - Dong Kwan Kim:

A Deep Neural Network-Based Approach to Finding Similar Code Segments. 874-878 - Hyun Kwon

, Hyunsoo Yoon, Ki-Woong Park:
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods. 879-882 - Hyun Kwon

, Hyunsoo Yoon, Ki-Woong Park:
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks. 883-887 - Minhae Jang, Yeonseung Ryu, Jik-Soo Kim, Minkyoung Cho:

Against Insider Threats with Hybrid Anomaly Detection with Local-Feature Autoencoder and Global Statistics (LAGS). 888-891 - Kazuteru Namba:

Master-Slave FF Using DICE Capable of Tolerating Soft Errors Occurring Around Clock Edge. 892-895 - Minkyoung Cho, Jik-Soo Kim, Jongho Shin, Incheol Shin:

Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black and White Binary Image. 896-900 - Taisuke Kawamata

, Takako Akakura:
Sequential Authentication Using Handwriting Biometrics for Free Response e-Testing. 901-904 - Siyang Yu, Kazuaki Kondo, Yuichi Nakamura, Takayuki Nakajima, Masatake Dantsuji:

Investigation on e-Learning Status Estimation for New Learners - Classifier Selection on Representative Sample Selection. 905-909 - Cheng Xu, Wei Han, Dongzhen Wang, Daqing Huang:

Salient Region Detection with Multi-Feature Fusion and Edge Constraint. 910-913
Volume 103-D, Number 5, May 2020
- Shingo Otsuka, Jun Miyazaki:

Foreword. 914-915 - Che-Wen Chen, Shih-Pang Tseng, Pin-Chieh Chen, Jhing-Fa Wang:

On the Design of a Happiness Cups System: A Smart Device for Health Care and Happiness Improvement Using LSTM. 916-927 - Yiling Dai

, Masatoshi Yoshikawa, Yasuhito Asano:
Estimating Knowledge Category Coverage by Courses Based on Centrality in Taxonomy. 928-938 - Hideaki Ohashi, Yasuhito Asano, Toshiyuki Shimizu, Masatoshi Yoshikawa:

Adaptive Balanced Allocation for Peer Assessments. 939-948 - Hironori Ito, Yasuhito Asano:

Composition Proposal Generation for Manga Creation Support. 949-957 - Md. Mostafizur Rahman, Atsuhiro Takasu:

Leveraging Entity-Type Properties in the Relational Context for Knowledge Graph Embedding. 958-968 - Kosetsu Tsukuda, Masahiro Hamasaki, Masataka Goto

:
Modeling N-th Order Derivative Creation Based on Content Attractiveness and Time-Dependent Popularity. 969-981 - Kento Sugiura

, Yoshiharu Ishikawa
:
Multiple Regular Expression Pattern Monitoring over Probabilistic Event Streams. 982-991 - Kaoru Katayama, Takashi Hirashima:

A Retrieval Method for 3D CAD Assembly Models Using 3D Radon Transform and Spherical Harmonic Transform. 992-1001 - Shize Kang, Lixin Ji, Zhenglian Li, Xindi Hao, Yuehang Ding:

Iterative Cross-Lingual Entity Alignment Based on TransC. 1002-1005
- Junwei Bao, Dazhuan Xu, Hao Luo, Ruidan Zhang, Fei Wang:

Design and SNR Optimization for Multi-Relay Compress-and-Forward System Based on CEO Theory. 1006-1012 - Wei Ge, Shenghua Chen, Benyu Liu, Min Zhu, Bo Liu:

A Power Analysis Attack Countermeasure Based on Random Data Path Execution For CGRA. 1013-1022 - Hideo Fujiwara, Katsuya Fujiwara, Toshinori Hosokawa:

Universal Testing for Linear Feed-Forward/Feedback Shift Registers. 1023-1030 - Hiroaki Akutsu, Takahiro Naruko:

End-to-End Deep ROI Image Compression. 1031-1038 - Masaya Okada, Yasutaka Kuroki, Masahiro Tada:

Multimodal Analytics to Understand Self-Regulation Process of Cognitive and Behavioral Strategies in Real-World Learning. 1039-1054 - Makio Ishihara, Ryo Kawashima:

Multi-Distance Function Trilateration over k-NN Fingerprinting for Indoor Positioning and Its Evaluation. 1055-1066 - Teruhiro Mizumoto, Yasuhiro Otoda, Chihiro Nakajima, Mitsuhiro Kohana, Motohiro Uenishi, Keiichi Yasumoto

, Yutaka Arakawa:
Design and Implementation of Sensor-Embedded Chair for Continuous Sitting Posture Recognition. 1067-1077 - Sila Chunwijitra, Phondanai Khanti, Supphachoke Suntiwichaya, Kamthorn Krairaksa, Pornchai Tummarattananont, Marut Buranarach

, Chai Wutiwiwatchai:
Development of MOOC Service Framework for Life Long Learning: A Case Study of Thai MOOC. 1078-1087 - Hiroshi Shimanuki, Toyohide Watanabe, Koichi Asakura, Hideki Sato, Taketoshi Ushiama:

Anomaly Detection of Folding Operations for Origami Instruction with Single Camera. 1088-1098 - Mohammed Salah Al-Radhi

, Tamás Gábor Csapó, Géza Németh
:
Continuous Noise Masking Based Vocoder for Statistical Parametric Speech Synthesis. 1099-1107 - Thuan Van Ngo, Rieko Kubo, Masato Akagi:

Mimicking Lombard Effect: An Analysis and Reconstruction. 1108-1117 - Bin Chen:

Air Quality Index Forecasting via Deep Dictionary Learning. 1118-1125 - Nobuhiko Wagatsuma, Mika Urabe, Kô Sakai:

Perception and Saccades during Figure-Ground Segregation and Border-Ownership Discrimination in Natural Contours. 1126-1134 - Koji Kamma, Yuki Isoda, Sarimu Inoue, Toshikazu Wada:

Neural Behavior-Based Approach for Neural Network Pruning. 1135-1143 - Osama Ouda, Slim Chaoui, Norimichi Tsumura:

Security Evaluation of Negative Iris Recognition. 1144-1152 - Jiaquan Wu, Feiteng Li, Zhijian Chen, Xiaoyan Xiang, Yu Pu:

Patient-Specific ECG Classification with Integrated Long Short-Term Memory and Convolutional Neural Networks. 1153-1163 - Jin-Taek Seong

:
A New Upper Bound for Finding Defective Samples in Group Testing. 1164-1167 - Takahiro Hirofuchi, Ryousei Takano:

A Prompt Report on the Performance of Intel Optane DC Persistent Memory Module. 1168-1172 - Young-Su Jang:

Detection of SQL Injection Vulnerability in Embedded SQL. 1173-1176 - Jing Sun, Yi-mu Ji, Shangdong Liu, Fei Wu:

Cost-Sensitive and Sparse Ladder Network for Software Defect Prediction. 1177-1180 - Sheng-Hong Lin, Jin-Yuan Wang, Ying Xu, Jianxin Dai:

Enhanced Secure Transmission for Indoor Visible Light Communications. 1181-1184 - Linjun Sun, Weijun Li, Xin Ning

, Liping Zhang
, Xiaoli Dong, Wei He:
Gradient-Enhanced Softmax for Face Recognition. 1185-1189 - Xin Long, Xiangrong Zeng, Chen Chen, Huaxin Xiao, Maojun Zhang:

Loss-Driven Channel Pruning of Convolutional Neural Networks. 1190-1194 - Chao-Yuan Kao, Sangwook Park, Alzahra Badi, David K. Han, Hanseok Ko

:
Orthogonal Gradient Penalty for Fast Training of Wasserstein GAN Based Multi-Task Autoencoder toward Robust Speech Recognition. 1195-1198 - Shinya Horiike, Masanori Morise:

Voice Conversion for Improving Perceived Likability of Uttered Speech. 1199-1202 - Yuki Kurosawa, Shinya Mochiduki, Yuko Hoshino, Mitsuho Yamada:

Measurement of Fatigue Based on Changes in Eye Movement during Gaze. 1203-1207
Volume 103-D, Number 6, June 2020
- Atsuto Maki:

Foreword. 1208 - Kohei Sendo, Norimichi Ukita:

Heatmapping of Group People Involved in the Group Activity. 1209-1216 - Kazuki Kawamura, Takashi Matsubara, Kuniaki Uehara:

Deep State-Space Model for Noise Tolerant Skeleton-Based Action Recognition. 1217-1225 - Songlin Du, Yuan Li, Takeshi Ikenaga:

Temporally Forward Nonlinear Scale Space for High Frame Rate and Ultra-Low Delay A-KAZE Matching System. 1226-1235 - Songlin Du, Zhe Wang, Takeshi Ikenaga:

Temporal Constraints and Block Weighting Judgement Based High Frame Rate and Ultra-Low Delay Mismatch Removal System. 1236-1246 - Takeru Oba, Norimichi Ukita:

Instance Segmentation by Semi-Supervised Learning and Image Synthesis. 1247-1256 - Takuya Matsumoto, Kodai Shimosato, Takahiro Maeda, Tatsuya Murakami, Koji Murakoso, Kazuhiko Mino, Norimichi Ukita:

Human Pose Annotation Using a Motion Capture System for Loose-Fitting Clothes. 1257-1264 - Hitoshi Nishimura, Naoya Makibuchi, Kazuyuki Tasaka, Yasutomo Kawanishi

, Hiroshi Murase:
Multiple Human Tracking Using an Omnidirectional Camera with Local Rectification and World Coordinates Representation. 1265-1275 - Kenta Nishiyuki, Jia-Yau Shiau, Shigenori Nagae, Tomohiro Yabuuchi, Koichi Kinoshita, Yuki Hasegawa, Takayoshi Yamashita, Hironobu Fujiyoshi:

Driver Drowsiness Estimation by Parallel Linked Time-Domain CNN with Novel Temporal Measures on Eye States. 1276-1286
- Fumihiro Kumeno:

Foreword. 1287 - Mondheera Pituxcoosuvarn, Takao Nakaguchi, Donghui Lin, Toru Ishida:

Privacy-Aware Best-Balanced Multilingual Communication. 1288-1296 - Yutaka Matsuno, Toshinori Takai, Shuichiro Yamamoto:

Facilitating Use of Assurance Cases in Industries by Workshops with an Agent-Based Method. 1297-1308 - Hiroyuki Nakagawa

, Hironori Shimada, Tatsuhiro Tsuchiya
:
Interactive Goal Model Construction Based on a Flow of Questions. 1309-1318 - Yukasa Murakami, Masateru Tsunoda, Koji Toda:

Evaluation of Software Fault Prediction Models Considering Faultless Cases. 1319-1327
- Rongcun Wang, Shujuan Jiang, Kun Zhang, Qiao Yu:

Improving the Accuracy of Spectrum-Based Fault Localization Using Multiple Rules. 1328-1338 - Yoshihiko Omori, Takao Yamashita:

Extended Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Equality Verification Using Homomorphic Encryption. 1339-1354 - Tian Xie, Hongchang Chen, Tuosiyu Ming, Jianpeng Zhang, Chao Gao, Shaomei Li, Yuehang Ding:

Partial Label Metric Learning Based on Statistical Inference. 1355-1361 - Zizheng Ji, Zhengchao Lei, Tingting Shen, Jing Zhang:

Joint Representations of Knowledge Graphs and Textual Information via Reference Sentences. 1362-1370 - Chen Chen, Huaxin Xiao, Yu Liu, Maojun Zhang:

Dual-Task Integrated Network for Fast Pedestrian Detection in Crowded Scenes. 1371-1379 - Haoran Li, Binyu Wang, Jisheng Dai, Tianhong Pan:

Ridge-Adding Homotopy Approach for l1-norm Minimization Problems. 1380-1387 - Ruilin Pan

, Chuanming Ge, Li Zhang, Wei Zhao, Xun Shao:
A New Similarity Model Based on Collaborative Filtering for New User Cold Start Recommendation. 1388-1394 - Daisuke Saito, Nobuaki Minematsu, Keikichi Hirose:

Tensor Factor Analysis for Arbitrary Speaker Conversion. 1395-1405 - Yi-Ze Le, Yong Feng

, Dajiang Liu, Baohua Qiang:
Adversarial Metric Learning with Naive Similarity Discriminator. 1406-1413 - Guangyuan Liu, Daokun Chen:

Survivable Virtual Network Topology Protection Method Based on Particle Swarm Optimization. 1414-1418 - Fengli Shen, Zhe-Ming Lu:

A Semantic Similarity Supervised Autoencoder for Zero-Shot Learning. 1419-1422 - Zaiyu Pan, Jun Wang:

Hand-Dorsa Vein Recognition Based on Selective Deep Convolutional Feature. 1423-1426 - Danyang Liu, Ji Xu, Pengyuan Zhang:

End-to-End Multilingual Speech Recognition System with Language Supervision Training. 1427-1430
Volume 103-D, Number 7, July 2020
- Kazuomi Oishi:

Foreword. 1431-1432 - Kwangjo Kim:

Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network. 1433-1447 - Heung Youl Youm:

An Overview of De-Identification Techniques and Their Standardization Directions. 1448-1461 - Hiroki Kuzuno, Toshihiro Yamauchi

:
Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism. 1462-1475 - Toshinori Usui, Tomonori Ikuse, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura

:
ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets. 1476-1492 - Daiki Chiba

, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:
DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names. 1493-1511 - Fumihiro Kanei, Daiki Chiba

, Kunio Hato, Katsunari Yoshioka, Tsutomu Matsumoto, Mitsuaki Akiyama:
Detecting and Understanding Online Advertising Fraud in the Wild. 1512-1523 - Asuka Nakajima, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Maverick Woo:

1-day, 2 Countries - A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States. 1524-1540 - Keika Mori, Takuya Watanabe, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori:

Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits? 1541-1555 - Pratish Datta

, Tatsuaki Okamoto, Katsuyuki Takashima:
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption. 1556-1597 - Katsunari Shishido, Atsuko Miyaji

:
Online-Efficient Interval Test via Secure Empty-Set Check. 1598-1607 - Han-Yan Wu, Ling-Hwei Chen, Yu-Tai Ching:

A Multilayer Steganography Method with High Embedding Efficiency for Palette Images. 1608-1617 - Kento Hasegawa, Masao Yanagisawa, Nozomu Togawa

:
Trojan-Net Classification for Gate-Level Hardware Design Utilizing Boundary Net Structures. 1618-1622
- Kokoro Kobayashi, Tsuyoshi Oguni, Masaki Nakagawa:

A Series of PIN/Password Input Methods Resilient to Shoulder Hacking Based on Cognitive Difficulty of Tracing Multiple Key Movements. 1623-1632 - Takafumi Kubota, Naohiro Aota, Kenji Kono:

Logging Inter-Thread Data Dependencies in Linux Kernel. 1633-1646 - Sanghun Choi, Shuichiro Haruta, Yichen An, Iwao Sasase:

A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration. 1647-1659 - Kenta Ishiguro, Kenji Kono:

Instruction Filters for Mitigating Attacks on Instruction Emulation in Hypervisors. 1660-1671 - Masashi Tsuchida, Fukuhito Ooshita, Michiko Inoue:

Byzantine-Tolerant Gathering of Mobile Agents in Asynchronous Arbitrary Networks with Authenticated Whiteboards. 1672-1682 - Taewhan Kim, Kangsoo Jung, Seog Park:

Sparsity Reduction Technique Using Grouping Method for Matrix Factorization in Differentially Private Recommendation Systems. 1683-1692 - Kota Kudo, Yuichi Takano, Ryo Nomura

:
Stochastic Discrete First-Order Algorithm for Feature Subset Selection. 1693-1702 - Yizhong Xin

, Ruonan Liu, Yan Li
:
Strategy for Improving Target Selection Accuracy in Indirect Touch Input. 1703-1709 - Ayumi Yamazaki, Yuki Hayashi, Kazuhisa Seta:

Model-Based Development of Spatial Movement Skill Training System and Its Evaluation. 1710-1721 - Lia Sadita

, Pedro Gabriel Fonteles Furtado, Tsukasa Hirashima, Yusuke Hayashi:
Analysis of The Similarity of Individual Knowledge and The Comprehension of Partner's Representation during Collaborative Concept Mapping with Reciprocal Kit Build Approach. 1722-1731 - Lu Yin, Junfeng Li, Yonghong Yan, Masato Akagi:

A Two-Stage Phase-Aware Approach for Monaural Multi-Talker Speech Separation. 1732-1743 - Yun Hu, Changwen Zheng:

A Double Adversarial Network Model for Multi-Domain and Multi-Task Chinese Named Entity Recognition. 1744-1752 - Keiichiro Inagaki, Takayuki Kannon, Yoshimi Kamiyama, Shiro Usui:

Effect of Fixational Eye Movement on Signal Processing of Retinal Photoreceptor: A Computational Study. 1753-1759 - Yong Yang, Junwei Lu, Baoxian Wang, Weigang Zhao:

Analysis on Wave-Velocity Inverse Imaging for the Supporting Layer in Ballastless Track. 1760-1764 - Jingyu Li, Dandan Xiao, Yue Zhang:

A 10.4-Gs/s High-Resolution Wideband Radar Sampling System Based on TIADC Technique. 1765-1768 - Hae Young Lee

, Jin Myoung Kim:
Systematic Detection of State Variable Corruptions in Discrete Event System Specification Based Simulation. 1769-1772 - He Li, Yanna Liu, XuHua Wang, Liangcai Su, Hang Yuan, Jae Soo Yoo:

An Efficient Method for Graph Repartitioning in Distributed Environments. 1773-1776 - Minseong Kim, Hyun-Chul Choi:

Improving Faster R-CNN Framework for Multiscale Chinese Character Detection and Localization. 1777-1781
Volume 103-D, Number 8, August 2020
- Ken Mano:

Foreword. 1782 - Ryuichi Takahashi:

Evaluation the Redundancy of the IoT System Based on Individual Sensing Probability. 1783-1793 - Masahiro Matsubara, Tatsuhiro Tsuchiya:

Model Checking of Automotive Control Software: An Industrial Approach. 1794-1805 - Xinxin Hu

, Caixia Liu, Shuxin Liu, Jinsong Li, Xiaotao Cheng:
A Vulnerability in 5G Authentication Protocols and Its Countermeasure. 1806-1809 - Marika Izawa, Toshiyuki Miyamoto:

A Study on Re-Constructibility of Event Structures. 1810-1813
- Shin Morishima, Hiroki Matsutani:

In-GPU Cache for Acceleration of Anomaly Detection in Blockchain. 1814-1824 - Hatoon S. AlSagri, Mourad Ykhlef

:
Machine Learning-Based Approach for Depression Detection in Twitter Using Content and Activity Features. 1825-1832 - Kyohei Atarashi, Satoshi Oyama, Masahito Kurihara:

Link Prediction Using Higher-Order Feature Combinations across Objects. 1833-1842 - Saung Hnin Pwint Oo, Nguyen Duy Hung, Thanaruk Theeramunkong:

Knowledge Integration by Probabilistic Argumentation. 1843-1855 - Takafumi Higashi, Hideaki Kanai

:
Improvement of Pressure Control Skill with Knife Device for Paper-Cutting. 1856-1864 - Zeynep Yücel

, Parisa Supitayakul, Akito Monden
, Pattara Leelaprute:
An Algorithm for Automatic Collation of Vocabulary Decks Based on Word Frequency. 1865-1874 - Ki-Seung Lee:

Silent Speech Interface Using Ultrasonic Doppler Sonar. 1875-1887 - Jianmei Zhang, Pengyu Wang, Feiyang Gong, Hongqing Zhu, Ning Chen:

Content-Based Superpixel Segmentation and Matching Using Its Region Feature Descriptors. 1888-1900 - Hwanhee Kim, Teasung Hahn, Sookyun Kim

, Shinjin Kang:
Graph Based Wave Function Collapse Algorithm for Procedural Content Generation in Games. 1901-1910 - Sangwon Seo, Sangbae Yun, Jaehong Kim, Inkyo Kim, Seongwook Jin, Seungryoul Maeng:

H-TLA: Hybrid-Based and Two-Level Addressing Architecture for IoT Devices and Services. 1911-1915 - Yixi Xie, Lixin Ji, Xiaotao Cheng:

An Attention-Based GRU Network for Anomaly Detection from System Logs. 1916-1919 - JiYeoun Lee, Hee-Jin Choi:

Deep Learning Approaches for Pathological Voice Detection Using Heterogeneous Parameters. 1920-1923 - Yao Ge, Rui Chen, Ying Tong, Xuehong Cao, Ruiyu Liang:

Combining Siamese Network and Regression Network for Visual Tracking. 1924-1927
Volume 103-D, Number 9, September 2020
- Daichi Teruya, Hironori Nakajo:

A Ruby-Based Hardware/Software Co-Design Environment with Functional Reactive Programming: Mulvery. 1929-1938 - ChangCheng Wu, Min Wang, Junjie Wang, Weiming Luo, Jiafeng Hua, Xitao Chen, Wei Geng, Yu Lu, Wei Sun:

Improved Neighborhood Based Switching Filter for Protecting the Thin Curves in Arbitrary Direction in Color Images. 1939-1948 - Yuechao Lu, Yasuyuki Matsushita

, Fumihiko Ino:
Block Randomized Singular Value Decomposition on GPUs. 1949-1959 - Rousslan Fernand Julien Dossa, Xinyu Lian, Hirokazu Nomoto, Takashi Matsubara, Kuniaki Uehara:

Hybrid of Reinforcement and Imitation Learning for Human-Like Agents. 1960-1970 - Keisuke Imoto, Seisuke Kyochi:

Sound Event Detection Utilizing Graph Laplacian Regularization with Event Co-Occurrence. 1971-1977 - Yuki Saito

, Kei Akuzawa, Kentaro Tachibana:
Joint Adversarial Training of Speech Recognition and Synthesis Models for Many-to-One Voice Conversion Using Phonetic Posteriorgrams. 1978-1987 - Takayuki Nakachi, Hitoshi Kiya:

Secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems. 1988-1997 - Jiang Wu

, Jianjun Xu, Xiankai Meng, Yan Lei:
A Highly Reliable Compilation Optimization Passes Sequence Generation Framework. 1998-2002 - Ying Sun, Xiao-Yuan Jing, Fei Wu, Yanfei Sun:

Selective Pseudo-Labeling Based Subspace Learning for Cross-Project Defect Prediction. 2003-2006 - Jin Myoung Kim, Hae Young Lee

:
Node Density Loss Resilient Report Generation Method for the Statistical Filtering Based Sensor Networks. 2007-2010 - Jianfei Chen, Xiaowei Zhu, Yuehua Li:

Super-Resolution Imaging Method for Millimeter Wave Synthetic Aperture Interferometric Radiometer. 2011-2014 - Feng Yang, Zheng Ma, Mei Xie:

Visual Recognition Method Based on Hybrid KPCA Network. 2015-2018 - Bin Chen, Jili Yan:

Fresh Tea Shoot Maturity Estimation via Multispectral Imaging and Deep Label Distribution Learning. 2019-2022 - Vantruong Nguyen, Jueping Cai, Linyu Wei, Jie Chu:

Neural Networks Probability-Based PWL Sigmoid Function Approximation. 2023-2026 - Yoshitaka Nozaki, Takashi Watanabe:

Development of Artificial Neural Network Based Automatic Stride Length Estimation Method Using IMU: Validation Test with Healthy Subjects. 2027-2031 - Keiichiro Inagaki, Tatsuya Maruno, Kota Yamamoto:

Evaluation of EEG Activation Pattern on the Experience of Visual Perception in the Driving. 2032-2034
Volume 103-D, Number 10, October 2020
- Toshiaki Fujii

:
Foreword. 2035 - Shoichiro Takeda, Megumi Isogai, Shinya Shimizu, Hideaki Kimata:

Local Riesz Pyramid for Faster Phase-Based Video Magnification. 2036-2046 - Hao Xiao, Yanming Fan, Fen Ge, Zhang Zhang, Xin Cheng:

Algorithm-Hardware Co-Design of Real-Time Edge Detection for Deep-Space Autonomous Optical Navigation. 2047-2058 - Yasuhiro Mochida, Takayuki Nakachi, Takahiro Yamaguchi:

An MMT-Based Hierarchical Transmission Module for 4K/120fps Temporally Scalable Video. 2059-2066 - Masahito Shimamoto, Yusuke Kameda

, Takayuki Hamamoto
:
HDR Imaging Based on Image Interpolation and Motion Blur Suppression in Multiple-Exposure-Time Image Sensor. 2067-2071
- Ryuta Shingai, Yuria Hiraga, Hisakazu Fukuoka, Takamasa Mitani, Takashi Nakada, Yasuhiko Nakashima:

Construction of an Efficient Divided/Distributed Neural Network Model Using Edge Computing. 2072-2082 - Makoto Nakagami, José A. B. Fortes, Saneyasu Yamaguchi:

Job-Aware File-Storage Optimization for Improved Hadoop I/O Performance. 2083-2093 - Maohua Gan, Zeynep Yücel

, Akito Monden, Kentaro Sasaki:
Empirical Evaluation of Mimic Software Project Data Sets for Software Effort Estimation. 2094-2103 - Fahd N. Al-Wesabi:

Proposing High-Smart Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet. 2104-2112 - Chansu Han

, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Jun'ichi Takeuchi, Koji Nakao:
Real-Time Detection of Global Cyberthreat Based on Darknet by Estimating Anomalous Synchronization Using Graphical Lasso. 2113-2124 - Yuta Yamamoto, Kazuteru Namba:

Complete Double Node Upset Tolerant Latch Using C-Element. 2125-2132 - Junjun Zheng

, Hiroyuki Okamura, Tadashi Dohi:
Optimal Rejuvenation Policies for Non-Markovian Availability Models with Aperiodic Checkpointing. 2133-2142 - Nicolas Bougie, Ryutaro Ichise:

Towards Interpretable Reinforcement Learning with State Abstraction Driven by External Knowledge. 2143-2153 - Jonathan Mojoo, Yu Zhao, Muthu Subash Kavitha

, Jun'ichi Miyao, Takio Kurita
:
Completion of Missing Labels for Multi-Label Annotation by a Unified Graph Laplacian Regularization. 2154-2161 - Zhongjian Ma, Dongzhen Huang, Baoqing Li, Xiaobing Yuan:

Asymmetric Learning for Stereo Matching Cost Computation. 2162-2167 - Tomohiro Mashita, Koichi Shintani, Kiyoshi Kiyokawa:

Improving Pointing Direction Estimation by Considering Hand- and Ocular-Dominance. 2168-2177 - Yanfei Liu, Junhua Chen, Yu Qiu:

Joint Multi-Patch and Multi-Task CNNs for Robust Face Recognition. 2178-2187 - Junxing Zhang, Shuo Yang, Chunjuan Bo, Huimin Lu:

Single Stage Vehicle Logo Detector Based on Multi-Scale Prediction. 2188-2198 - Fei Guo, Yuan Yang, Yong Gao, Ningmei Yu:

Efficient Salient Object Detection Model with Dilated Convolutional Networks. 2199-2207 - Jianwei Liu, Hongli Liu, Xuefeng Ni, Ziji Ma, Chao Wang, Xun Shao:

A Visual Inspection System for Accurate Positioning of Railway Fastener. 2208-2215 - Degen Huang, Anil Ahmed

, Syed Yasser Arafat
, Khawaja Iftekhar Rashid
, Qasim Abbas, Fuji Ren:
Sentence-Embedding and Similarity via Hybrid Bidirectional-LSTM and CNN Utilizing Weighted-Pooling Attention. 2216-2227 - Jianyong Duan, Zheng Tan, Mei Zhang, Hao Wang:

New Word Detection Using BiLSTM+CRF Model with Features. 2228-2236 - Danlei Xing, Fei Wu, Ying Sun, Xiao-Yuan Jing:

Cross-Project Defect Prediction via Semi-Supervised Discriminative Feature Learning. 2237-2240 - Dongliang Chen

, Peng Song, Wenjing Zhang, Weijian Zhang, Bingui Xu, Xuan Zhou:
Robust Transferable Subspace Learning for Cross-Corpus Facial Expression Recognition. 2241-2245 - Chong Wu

, Le Zhang, Houwang Zhang
, Hong Yan:
Superpixel Based Hierarchical Segmentation for Color Image. 2246-2249
Volume 103-D, Number 11, November 2020
- Hiroshi Matsuura:

Tree Node Switching Algorithm for Minimum Energy Cost Aggregation Tree Problem in Wireless Sensor Networks. 2250-2261 - Katsuhisa Maruyama, Shinpei Hayashi

, Takayuki Omori:
ChangeMacroRecorder: Accurate Recording of Fine-Grained Textual Changes of Source Code. 2262-2277 - Yasunori Ishihara, Takashi Hayata, Toru Fujiwara:

The Absolute Consistency Problem for Relational Schema Mappings with Functional Dependencies. 2278-2288 - Hanan T. Al-Awadhi, Tomoki Aono, Senling Wang, Yoshinobu Higami, Hiroshi Takahashi, Hiroyuki Iwata, Yoichi Maeda, Jun Matsushima:

FF-Control Point Insertion (FF-CPI) to Overcome the Degradation of Fault Detection under Multi-Cycle Test for POST. 2289-2301 - Kazuaki Kondo, Takuto Fujiwara, Yuichi Nakamura:

Non-Linear Distance Filter for Modeling Effect of a Large Pointer Used in a Gesture-Based Pointing Interface. 2302-2313 - Takahide Ito, Yuichi Nakamura, Kazuaki Kondo, Espen Knoop, Jonathan Rossiter:

Design and Performance Analysis of a Skin-Stretcher Device for Urging Head Rotation. 2314-2322 - Yoshihiro Hirohashi, Tsuyoshi Kato:

Corrected Stochastic Dual Coordinate Ascent for Top-k SVM. 2323-2331 - Norihide Kitaoka, Eichi Seto, Ryota Nishimura:

Example Phrase Adaptation Method for Customized, Example-Based Dialog System Using User Data and Distributed Word Representations. 2332-2339 - Takuya Kishida, Toru Nakashika:

Speech Chain VC: Linking Linguistic and Acoustic Levels via Latent Distinctive Features for RBM-Based Voice Conversion. 2340-2350 - Takayuki Nakata, Isao Nishihara:

Dynamic Image Adjustment Method and Evaluation for Glassless 3D Viewing Systems. 2351-2361 - Kento Terao, Toru Tamaki

, Bisser Raytchev, Kazufumi Kaneda, Shin'ichi Satoh:
Rephrasing Visual Questions by Specifying the Entropy of the Answer Distribution. 2362-2370 - Hyun-Young Lee, Seung-Shik Kang:

Contextualized Character Embedding with Multi-Sequence LSTM for Automatic Word Segmentation. 2371-2378 - Lisha Liu, Dongjin Yu, Dongjing Wang, Fumiyo Fukumoto:

Citation Count Prediction Based on Neural Hawkes Model. 2379-2388 - Hiroyuki Nishimuta, Daiki Nobayashi, Takeshi Ikenaga:

Adaptive Server and Path Switching for Content Delivery Networks. 2389-2393 - Yujian Feng

, Fei Wu, Yimu Ji, Xiao-Yuan Jing, Jian Yu:
Deep Metric Learning with Triplet-Margin-Center Loss for Sketch Face Recognition. 2394-2397 - Sung-Woon Jung, Hyuk-Ju Kwon, Dong-Min Son, Sung-Hak Lee:

Generative Adversarial Network Using Weighted Loss Map and Regional Fusion Training for LDR-to-HDR Image Conversion. 2398-2402 - Ying Tong, Rui Chen, Ruiyu Liang:

Unconstrained Facial Expression Recognition Based on Feature Enhanced CNN and Cross-Layer LSTM. 2403-2406 - Toru Hiraoka:

Generation of Checkered Pattern Images by Iterative Calculation Using Prewitt Filter with Expanded Window Size. 2407-2410
Volume 103-D, Number 12, December 2020
- Fukuhito Ooshita:

Foreword. 2411 - Lucas Saad Nogueira Nunes, Jacir Luiz Bordim, Yasuaki Ito, Koji Nakano

:
A Rabin-Karp Implementation for Handling Multiple Pattern-Matching on the GPU. 2412-2420 - Jingcheng Shen, Fumihiko Ino, Albert Farrés, Mauricio Hanzich:

A Data-Centric Directive-Based Framework to Accelerate Out-of-Core Stencil Computation on a GPU. 2421-2434 - Ke Cui

, Michihiro Koibuchi:
Efficient Two-Opt Collective-Communication Operations on Low-Latency Random Network Topologies. 2435-2443 - Chenxu Wang, Yutong Lu, Zhiguang Chen, Junnan Li:

An Efficient Method for Training Deep Learning Networks Distributed. 2444-2456 - Yuxi Sun, Hideharu Amano:

FiC-RNN: A Multi-FPGA Acceleration Framework for Deep Recurrent Neural Networks. 2457-2462 - Masayuki Shimoda

, Youki Sada, Ryosuke Kuramochi, Shimpei Sato, Hiroki Nakahara
:
SENTEI: Filter-Wise Pruning with Distillation towards Efficient Sparse Convolutional Neural Network Accelerators. 2463-2470 - Ryuta Kawano

, Ryota Yasudo
, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano:
Traffic-Independent Multi-Path Routing for High-Throughput Data Center Networks. 2471-2479 - Yao Hu, Michihiro Koibuchi:

Application Mapping and Scheduling of Uncertain Communication Patterns onto Non-Random and Random Network Topologies. 2480-2493 - Hiromu Miyazaki, Takuto Kanamori, Md. Ashraful Islam, Kenji Kise:

RVCoreP: An Optimized RISC-V Soft Processor of Five-Stage Pipelining. 2494-2503 - Elsayed A. Elsayed, Kenji Kise:

High-Performance and Hardware-Efficient Odd-Even Based Merge Sorter. 2504-2517 - Shougo Inoue, Satoshi Fujita:

Collaborative Illustrator with Android Tablets Communicating through WebRTC. 2518-2524 - Seokhwan Kong, Saikia Dipjyoti, Jaiyong Lee:

Programmable Chip Based High Performance MEC Router for Ultra-Low Latency and High Bandwidth Services in Distributed Computing Environment. 2525-2527 - Yasuhiro Nakahara, Masato Kiyama, Motoki Amagasaki, Masahiro Iida:

Relationship between Recognition Accuracy and Numerical Precision in Convolutional Neural Network Models. 2528-2529
- Yuichi Sei

:
Foreword. 2530 - Yuta Hosokawa, Katsuhide Fujita:

Opponent's Preference Estimation Considering Their Offer Transition in Multi-Issue Closed Negotiations. 2531-2539 - Ryohei Kawata, Katsuhide Fujita:

Meta-Strategy Based on Multi-Armed Bandit Approach for Multi-Time Negotiation. 2540-2548
- Xiaoxuan Guo, Renxi Gong, Haibo Bao, Zhenkun Lu:

A Multiobjective Optimization Dispatch Method of Wind-Thermal Power System. 2549-2558 - Ho-Young Kim, Seong-Won Lee:

Lifespan Extension of an IoT System with a Fixed Lithium Battery. 2559-2567 - Akkharawoot Takhom

, Sasiporn Usanavasin, Thepchai Supnithi, Prachya Boonkwan:
A Collaborative Framework Supporting Ontology Development Based on Agile and Scrum Model. 2568-2577 - Ying Ji

, Yu Wang, Jien Kato, Kensaku Mori:
Predicting Violence Rating Based on Pairwise Comparison. 2578-2589 - Hayato Yamaki, Hiroaki Nishi

, Shinobu Miwa, Hiroki Honda:
RPC: An Approach for Reducing Compulsory Misses in Packet Processing Cache. 2590-2599 - Sanghun Choi, Yichen An, Iwao Sasase:

A Lightweight Detection Using Bloom Filter against Flooding DDoS Attack. 2600-2610 - Haitao Xie, Qingtao Fan, Qian Xiao:

A Social Collaborative Filtering Method to Alleviate Data Sparsity Based on Graph Convolutional Networks. 2611-2619 - Kazuki Seshimo, Akira Ota, Daichi Nishio, Satoshi Yamane:

Practical Evaluation of Online Heterogeneous Machine Learning. 2620-2631 - Hiroyuki Okuda, Nobuto Sugie, Tatsuya Suzuki, Kentaro Haraguchi, Zibo Kang:

Simultaneous Realization of Decision, Planning and Control for Lane-Changing Behavior Using Nonlinear Model Predictive Control. 2632-2642 - Liyang Zhang, Hiroyuki Suzuki, Akio Koyama:

Smart Tableware-Based Meal Information Recognition by Comparing Supervised Learning and Multi-Instance Learning. 2643-2648 - Kazunori Iwata

:
Revisiting a Nearest Neighbor Method for Shape Classification. 2649-2658 - Noriyuki Matsunaga, Yamato Ohtani, Tatsuya Hirahara:

Loss Function Considering Multiple Attributes of a Temporal Sequence for Feed-Forward Neural Networks. 2659-2672 - Junya Koguchi, Shinnosuke Takamichi, Masanori Morise, Hiroshi Saruwatari, Shigeki Sagayama:

DNN-Based Full-Band Speech Synthesis Using GMM Approximation of Spectral Envelope. 2673-2681 - Tomohiro Takahashi

, Katsumi Konishi, Kazunori Uruma, Toshihiro Furukawa:
Multiple Subspace Model and Image-Inpainting Algorithm Based on Multiple Matrix Rank Minimization. 2682-2692 - Kangbo Sun, Jie Zhu:

A Two-Stage Approach for Fine-Grained Visual Recognition via Confidence Ranking and Fusion. 2693-2700 - Manabu Okawa

:
Online Signature Verification Using Single-Template Matching Through Locally and Globally Weighted Dynamic Time Warping. 2701-2708 - Shi Qiu, Daniel M. Germán, Katsuro Inoue:

A Machine Learning Method for Automatic Copyright Notice Identification of Source Files. 2709-2712 - Guangyuan Liu, Daokun Chen:

DVNR: A Distributed Method for Virtual Network Recovery. 2713-2716 - Mengmeng Li, Xiaoguang Ren, Yanzhen Wang, Wei Qin, Yi Liu:

Advanced Antlion Optimizer with Discrete Ant Behavior for Feature Selection. 2717-2720 - Farzin Matin, Yoosoo Jeong, Hanhoon Park:

Retinex-Based Image Enhancement with Particle Swarm Optimization and Multi-Objective Function. 2721-2724 - Yubo Liu, Yangting Lai, Jianyong Chen, Lingyu Liang, Qiaoming Deng:

SCUT-AutoALP: A Diverse Benchmark Dataset for Automatic Architectural Layout Parsing. 2725-2729

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














