IEICE TRANSACTIONS on Information and Systems    (open access publishing)
Online ISSN : 1745-1361
[Whole issue]:PDF (27.8MB)
Previous | 
Top 10 downloads
To the Latest Issue

Advance publication (published online immediately after acceptance)


Food intake detection and classification using a necklace-type piezoelectric wearable sensor system
Ghulam HUSSAIN  Kamran JAVED  Jundong CHO  Juneho YI  
Summary | Full Text:PDF(1.5MB)


On the Optimal Configuration of Grouping-Based Framed Slotted ALOHA
Young-Beom KIM  
Summary | Full Text:PDF(124.7KB)


How are IF-Conditional Statements Fixed Through Peer CodeReview?
Yuki UEDA  Akinori IHARA  Takashi ISHIO  Toshiki HIRAO  Kenichi MATSUMOTO  
Summary | Full Text:PDF(275.7KB)


Studying the Cost and Effectiveness of OSS Quality Assessment Models: An Experience Report of Fujitsu QNET
Yasutaka KAMEI  Takahiro MATSUMOTO  Kazuhiro YAMASHITA  Naoyasu UBAYASHI  Takashi IWASAKI  Shuichi TAKAYAMA  
Summary | Full Text:PDF(649.1KB)


Adaptive Object Tracking with Complementary Models
Peng GAO  Yipeng MA  Chao LI  Ke SONG  Yan ZHANG  Fei WANG  Liyi XIAO  
Summary | Full Text:PDF(1.8MB)


Fostering Real-time Software Analysis by Leveraging Heterogeneous and Autonomous Software Repositories
Chaman WIJESIRIWARDANA  Prasad WIMALARATNE  
Summary | Full Text:PDF(746.3KB)


Speeding up Extreme Multi-label Classifier by Approximate Nearest Neighbor Search
Yukihiro TAGAMI  
Summary | Full Text:PDF(3.1MB)


Accelerating a Lloyd-Type k-Means Clustering Algorithm with Summable Lower Bounds in a Lower-Dimensional Space
Kazuo AOYAMA  Kazumi SAITO  Tetsuo IKEDA  
Summary | Full Text:PDF(651.6KB)


Deep Convolutional Neural Networks for Manga Show-Through Cancellation
Taku NAKAHARA  Kazunori URUMA  Tomohiro TAKAHASHI  Toshihiro FURUKAWA  
Summary | Full Text:PDF(1.1MB)


Lightweight Security Hardware Architecture using DWT and AES Algorithms
Ignacio ALGREDO-BADILLO  Francisco R. CASTILLO-SORIA  Kelsey A. RAMÍREZ-GUTIÉRREZ  Luis MORALES-ROSALES  Alejandro MEDINA-SANTIAGO  Claudia FEREGRINO-URIBE  
Summary | Full Text:PDF(1.8MB)


Efficient texture creation based on random patches in database and guided filter
Seok Bong Yoo  Mikyong Han  
Summary | Full Text:PDF(1.1MB)


Accurate Scale Adaptive and Real-Time Visual Tracking with Correlation Filters
Jiatian PI  Shaohua ZENG  Qing ZUO  Yan WEI  
Summary | Full Text:PDF(1.1MB)


Critical Nodes Identification of Power Grids Based on Network Efficiency
WenJie KANG  PeiDong ZHU  JieXin ZHANG  JunYang ZHANG  
Summary | Full Text:PDF(634.5KB)


Strip-Switched Deployment Method to Optimize Single Failure Recovery for Erasure Coded Storage Systems
Yingxun FU  Shilin WEN  Li MA  Jianyong DUAN  
Summary | Full Text:PDF(170.7KB)


High-speed spelling in virtual reality with sequential hybrid BCIs
Zhaolin YAO  Xinyao MA  Yijun WANG  Xu ZHANG  Ming LIU  Weihua PEI  Hongda CHEN  
Summary | Full Text:PDF(621.4KB)


TS-ICNN: Time Sequence-based Interval Convolutional Neural Networks for Human Action Detection and Recognition
Zhendong ZHUANG  Yang XUE  
Summary | Full Text:PDF(2.3MB)


Finding Important People in a Video Using Deep Neural Networks with Conditional Random Fields
Mayu OTANI  Atsushi NISHIDA  Yuta NAKASHIMA  Tomokazu SATO  Naokazu YOKOYA  
Summary | Full Text:PDF(1.8MB)


Individuality-preserving Gait Pattern Prediction based on Gait Feature Transitions
Tsuyoshi HIGASHIGUCHI  Norimichi UKITA  Masayuki KANBARA  Norihiro HAGITA  
Summary | Full Text:PDF(495.9KB)


Standard-Compliant Multiple Description Image Coding Based on Convolutional Neural Networks
Ting ZHANG  Huihui BAI  Mengmeng ZHANG  Yao ZHAO  
Summary | Full Text:PDF(1.1MB)


Improving Distantly Supervised Relation Extraction by Knowledge Base-driven Zero Subject Resolution
Eun-kyung KIM  KEY-SUN CHOI  
Summary | Full Text:PDF(1MB)


Uncertain Rule based Method for Determining Data Currency
Mohan LI  Jianzhong LI  Siyao CHENG  Yanbin SUN  
Summary | Full Text:PDF(480.8KB)


Twofold Correlation Filtering for Tracking Integration
Wei WANG  Weiguang Li  Zhaoming CHEN  Mingquan SHI  
Summary | Full Text:PDF(2.9MB)


Weighting Estimation Methods for Opponents' Utility Functions using Boosting in Multi-time Negotiations
Takaki MATSUNE  Katsuhide FUJITA  
Summary | Full Text:PDF(344.4KB)


RbWL: Recency-based static wear leveling for lifetime extension and overhead reduction in NAND flash memory systems
Sang-Ho HWANG  Jong Wook KWAK  
Summary | Full Text:PDF(3MB)


Improving Per-node Computing Efficiency by an Adaptive Lock-free Scheduling Model
Zhishuo ZHENG  Deyu QI  Naqin ZHOU  Xinyang WANG  Mincong YU  
Summary | Full Text:PDF(1.9MB)


Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers
Hyun KWON  Yongchul KIM  Ki-Woong PARK  Hyunsoo YOON  Daeseon CHOI  
Summary | Full Text:PDF(5.6MB)


Spectrum-based Fault Localization Using Fault Triggering Model to Refine Fault Ranking List
Yong WANG  Zhiqiu HUANG  Rongcun WANG  Qiao YU  
Summary | Full Text:PDF(347.4KB)


Search-based Concolic Execution for SW Vulnerability Discovery
Rustamov FAYOZBEK  Minjun CHOI  Joobeom YUN  
Summary | Full Text:PDF(606.4KB)


Impact of Viewing Distance on Task Performance and Its Properties
Makio ISHIHARA  Yukio ISHIHARA  
Summary | Full Text:PDF(386KB)


Client-side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames
Qian LU  Haipeng QU  Yuan ZHUANG  Xi-Jun LIN  Yuzhan OUYANG  
Summary | Full Text:PDF(2.7MB)


Low Bit-Rate Compression Image Restoration Through Subspace Joint Regression Learning
Zongliang GAN  
Summary | Full Text:PDF(1.4MB)


A Quantitative Analysis on Relationship between an Early-Closed Bug and its Amount of Clues: A Case Study of Apache Ant
Akito SUNOUCHI  Hirohisa AMAN  Minoru KAWAHARA  
Summary | Full Text:PDF(85.7KB)


Data recovery aware garbage collection mechanism in flash-based storage devices
Joon-Young PAIK  Rize JIN  Tae-Sun CHUNG  
Summary | Full Text:PDF(711.1KB)


Fast CU Termination Algorithm with AdaBoost Classifier in HEVC Encoder
Yitong LIU  Wang TIAN  Yuchen LI  Hongwen YANG  
Summary | Full Text:PDF(449.1KB)


Robust Index Code to distribute digital images and digital contents together
Minsu KIM  Kunwoo LEE  Katsuhiko GONDOW  Jun-ichi IMURA  
Summary | Full Text:PDF(784.6KB)


Designing Coded Aperture Camera Based on PCA and NMF for Light Field Acquisition
Yusuke YAGI  Keita TAKAHASHI  Toshiaki FUJII  Toshiki SONODA  Hajime NAGAHARA  
Summary | Full Text:PDF(3.5MB)


Video Saliency Detection Using Spatiotemporal Cues
Yu Chen  Jing Xiao  Liuyi Hu  Dan Chen  Zhongyuan Wang  Dengshi Li  
Summary | Full Text:PDF(1017.5KB)


Sparse Graph based Deep Learning Networks for Face Recognition
Renjie WU  Sei-ichiro KAMATA  
Summary | Full Text:PDF(1.1MB)


Formal Method for Security Analysis of Electronic Payment Protocols
Yi LIU  Qingkun MENG  Xingtong LIU  Jian WANG  Lei ZHANG  Chaojing TANG  
Summary | Full Text:PDF(707KB)


Entity Ranking for Queries with Modifiers based on Knowledge Bases and Web Search Results
Wiradee IMRATTANATRAI  Makoto P. KATO  Katsumi TANAKA  Masatoshi YOSHIKAWA  
Summary | Full Text:PDF(667.5KB)


Variational-Bayesian Single-Image Devignetting
Motoharu SONOGASHIRA  Masaaki IIYAMA  Michihiko MINOH  
Summary | Full Text:PDF(2.5MB)


Reward-Based Exploration: Adaptive Control for Deep Reinforcement Learning
Zhi-xiong Xu  Lei Cao  Xi-liang Chen  Chen-xi Li  
Summary | Full Text:PDF(465.7KB)


A Unified Neural Network for Quality Estimation of Machine Translation
Maoxi LI  Qingyu XIANG  Zhiming CHEN  Mingweng WANG  
Summary | Full Text:PDF(275.9KB)


Optimal Billboard Deformation via 3D Voxel for Free-viewpoint System
Keisuke NONAKA  Houari SABIRIN  Jun CHEN  Hiroshi SANKOH  Sei NAITO  
Summary | Full Text:PDF(7.8MB)


A linear-time algorithm for finding a spanning tree with non-terminal set VNT on interval graphs
Shin-ichi NAKAYAMA  Shigeru MASUYAMA  
Summary | Full Text:PDF(534.7KB)


Proxy Responses by FPGA-based Switch for MapReduce Stragglers
Koya MITSUZUKA  Michihiro KOIBUCHI  Hideharu AMANO  Hiroki MATSUTANI  
Summary | Full Text:PDF(635.6KB)


A Machine Learning-based Approach for Selecting SpMV Kernels and Matrix Storage Formats
Hang CUI  Shoichi HIRASAWA  Hiroaki KOBAYASHI  Hiroyuki TAKIZAWA  
Summary | Full Text:PDF(268.3KB)


Cross-Validation-Based Association Rule Prioritization Metric for Software Defect Characterization
Takashi WATANABE  Akito MONDEN  Zeynep YÜCEL  Yasutaka KAMEI  Shuji MORISAKI  
Summary | Full Text:PDF(1.9MB)


An edge detection method based on wavelet transform at arbitrary angles
Su Liu  Xingguang Geng  Yitao Zhang  Shaolong Zhang  Jun Zhang  Yanbin Xiao  Chengjun Huang  Haiying Zhang  
Summary | Full Text:PDF(2MB)


Evaluating Energy-Efficiency of DRAM Channel Interleaving Schemes for Multithreaded Programs
Satoshi IMAMURA  Yuichiro YASUI  Koji INOUE  Takatsugu ONO  Hiroshi SASAKI  Katsuki FUJISAWA  
Summary | Full Text:PDF(1.2MB)


Pattern-based Ontology Modeling and Reasoning for Emergency System
Yue Tan  Wei Liu  Zhenyu Yang  Xiaoni Du  Zongtian Liu  
Summary | Full Text:PDF(645.2KB)


Review Rating Prediction on Location-Based Social Networks Using Text, Social Links, and Geolocations
Yuehua WANG  Zhinong ZHONG  Anran YANG  Ning JING  
Summary | Full Text:PDF(8.7MB)


Trading-off Computing and Cooling Energies by VM Migration in Data Centers
Ying SONG  Xia ZHAO  Bo WANG  Yuzhong SUN  
Summary | Full Text:PDF(525KB)


Incremental Estimation of Natural Policy Gradient with Relative Importance Weighting
Ryo IWAKI  Hiroki YOKOYAMA  Minoru ASADA  
Summary | Full Text:PDF(2.1MB)


Reciprocal Kit-Build Concept Map: An Approach for Encouraging Pair Discussion to Share Each Other's Understanding
Warunya WUNNASRI  Jaruwat PAILAI  Yusuke HAYASHI  Tsukasa HIRASHIMA  
Summary | Full Text:PDF(995.7KB)


A Propagation Method for Multi Object Tracklet Repair
Nii L. SOWAH  Qingbo WU  Fanman MENG  Liangzhi TANG  Yinan LIU  Linfeng XU  
Summary | Full Text:PDF(834.3KB)


Waffle: A new photonic plasmonic router for optical network on chip
Chao TANG  Huaxi GU  Kun WANG  
Summary | Full Text:PDF(444.1KB)


An Application of Intuitionistic Fuzzy Sets to Improve Information Extraction from Thai Unstructured Text
Peerasak INTARAPAIBOON  Thanaruk THEERAMUNKONG  
Summary | Full Text:PDF(442.1KB)


Deep Reinforcement Learning with Sarsa and Q-Learning: A Hybrid Approach
Zhi-xiong Xu  Lei Cao  Xi-liang Chen  Chen-xi Li  Yong-liang Zhang  Jun Lai  
Summary | Full Text:PDF(924.8KB)


MinDoS: A Priority-Based SDN Safe-Guard Architecture for DoS Attacks
Tao Wang  Hongchang Chen  Chao Qi  
Summary | Full Text:PDF(735.2KB)

 Volume E101-D No.8  (Publication Date:2018/08/01)
Regular Section

pp.1982-1996  PAPER-Fundamentals of Information Systems
Design and Implementation of Deep Neural Network for Edge Computing
Junyang ZHANG  Yang GUO  Xiao HU  Rongzhen LI  
Summary | Full Text:PDF (3.1MB) >>Buy this Article

pp.1997-2004  PAPER-Fundamentals of Information Systems
Tighter Generalization Bounds for Matrix Completion Via Factorization Into Constrained Matrices
Ken-ichiro MORIDOMI  Kohei HATANO  Eiji TAKIMOTO  
Summary | Full Text:PDF (394.1KB) >>Buy this Article

pp.2005-2014  PAPER-Software Engineering
A Two-Layered Framework for the Discovery of Software Behavior: A Case Study
Cong LIU  Jianpeng ZHANG  Guangming LI  Shangce GAO  Qingtian ZENG  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.2015-2026  PAPER-Software Engineering
An Emotion Similarity Based Severity Prediction of Software Bugs: A Case Study of Open Source Projects
Geunseok YANG  Tao ZHANG  Byungjeong LEE  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.2027-2034  PAPER-Data Engineering, Web Information Systems
A Novel Recommendation Algorithm Incorporating Temporal Dynamics, Reviews and Item Correlation
Ting WU  Yong FENG  JiaXing SANG  BaoHua QIANG  YaNan WANG  
Summary | Full Text:PDF (460.8KB) >>Buy this Article

pp.2035-2043  PAPER-Data Engineering, Web Information Systems
Specificity-Aware Ontology Generation for Improving Web Service Clustering
Rupasingha A. H. M. RUPASINGHA  Incheon PAIK  Banage T. G. S. KUMARA  
Summary | Full Text:PDF (2.3MB) >>Buy this Article

pp.2044-2052  PAPER-Information Network
A Scalable SDN Architecture for Underwater Networks Security Authentication
Qiuli CHEN  Ming HE  Xiang ZHENG  Fei DAI  Yuntian FENG  
Summary | Full Text:PDF (781.7KB) >>Buy this Article

pp.2053-2063  PAPER-Dependable Computing
A Design for Testability of Open Defects at Interconnects in 3D Stacked ICs
Fara ASHIKIN  Masaki HASHIZUME  Hiroyuki YOTSUYANAGI  Shyue-Kung LU  Zvi ROTH  
Summary | Full Text:PDF (934.9KB) >>Buy this Article

pp.2064-2071  PAPER-Artificial Intelligence, Data Mining
Multilevel Thresholding Color Image Segmentation Using a Modified Artificial Bee Colony Algorithm
Sipeng ZHANG  Wei JIANG  Shin'ichi SATOH  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.2072-2081  PAPER-Educational Technology
Understanding Support of Causal Relationship between Events in Historical Learning
Tomoko KOJIRI  Fumito NATE  Keitaro TOKUTAKE  
Summary | Full Text:PDF (2.1MB) >>Buy this Article

pp.2082-2091  PAPER-Pattern Recognition
ECG Delineation with Randomly Selected Wavelet Feature and Random Forest Classifier
Dapeng FU  Zhourui XIA  Pengfei GAO  Haiqing WANG  Jianping LIN  Li SUN  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.2092-2100  PAPER-Speech and Hearing
Construction of Spontaneous Emotion Corpus from Indonesian TV Talk Shows and Its Application on Multimodal Emotion Recognition
Nurul LUBIS  Dessi LESTARI  Sakriani SAKTI  Ayu PURWARIANTI  Satoshi NAKAMURA  
Summary | Full Text:PDF (761.6KB) >>Buy this Article

pp.2101-2114  PAPER-Image Recognition, Computer Vision
Improved Radiometric Calibration by Brightness Transfer Function Based Noise & Outlier Removal and Weighted Least Square Minimization
Chanchai TECHAWATCHARAPAIKUL  Pradit MITTRAPIYANURUK  Pakorn KAEWTRAKULPONG  Supakorn SIDDHICHAI  Werapon CHIRACHARIT  
Summary | Full Text:PDF (3.4MB) >>Buy this Article

pp.2115-2122  PAPER-Image Recognition, Computer Vision
From Easy to Difficult: A Self-Paced Multi-Task Joint Sparse Representation Method
Lihua GUO  
Summary | Full Text:PDF (354.7KB) >>Buy this Article

pp.2123-2131  PAPER-Image Recognition, Computer Vision
An Efficient Misalignment Method for Visual Tracking Based on Sparse Representation
Shan JIANG  Cheng HAN  Xiaoqiang DI  
Summary | Full Text:PDF (1.9MB) >>Buy this Article

pp.2132-2135  LETTER-Computer System
In-Storage Anti-Virus System via On-Demand Inspection
Jaehwan LEE  Youngrang KIM  Ji Sun SHIN  
Summary | Full Text:PDF (159.2KB) >>Buy this Article

pp.2136-2140  LETTER-Software System
Proof and Evaluation of Improved Slack Reclamation for Response Time Analysis of Real-Time Multiprocessor Systems
Hyeongboo BAEK  Donghyouk LIM  Jinkyu LEE  
Summary | Full Text:PDF (216.3KB) >>Buy this Article

pp.2141-2144  LETTER-Data Engineering, Web Information Systems
Predicting Taxi Destination by Regularized RNN with SDZ
Lei ZHANG  Guoxing ZHANG  Zhizheng LIANG  Qingfu FAN  Yadong LI  
Summary | Full Text:PDF (560.4KB) >>Buy this Article

pp.2145-2149  LETTER-Information Network
A Routing Method for Fish Farm Monitoring Under Short Transmission Range Condition
Koichi ISHIDA  Yoshiaki TANIGUCHI  Nobukazu IGUCHI  
Summary | Full Text:PDF (661.4KB) >>Buy this Article

pp.2150-2153  LETTER-Dependable Computing
Detecting Unsafe Raw Pointer Dereferencing Behavior in Rust
Zhijian HUANG  Yong Jun WANG  Jing LIU  
Summary | Full Text:PDF (285.6KB) >>Buy this Article

pp.2154-2158  LETTER-Artificial Intelligence, Data Mining
Transform Electric Power Curve into Dynamometer Diagram Image Using Deep Recurrent Neural Network
Junfeng SHI  Wenming MA  Peng SONG  
Summary | Full Text:PDF (309.6KB) >>Buy this Article

pp.2159-2162  LETTER-Pattern Recognition
PCANet-II: When PCANet Meets the Second Order Pooling
Chunxiao FAN  Xiaopeng HONG  Lei TIAN  Yue MING  Matti PIETIKÄINEN  Guoying ZHAO  
Summary | Full Text:PDF (550.6KB) >>Buy this Article

pp.2163-2167  LETTER-Image Processing and Video Processing
Data Hiding in Spatial Color Images on Smartphones by Adaptive R-G-B LSB Replacement
Haeyoung LEE  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.2168-2172  LETTER-Image Recognition, Computer Vision
Robust 3D Surface Reconstruction in Real-Time with Localization Sensor
Wei LI  Yi WU  Chunlin SHEN  Huajun GONG  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.2173-2177  LETTER-Biocybernetics, Neurocomputing
Multi-Channels LSTM Networks for Fence Activity Classification
Kelu HU  Chunlei ZHENG  Wei HE  Xinghe BAO  Yingguan WANG  
Summary | Full Text:PDF (780.9KB) >>Buy this Article

Previous | 
go to Page Top