Online ISSN : 1745-1361

IEICE TRANSACTIONS on Information and Systems
open access publishing via
0.70 1.4 [Whole issue]:PDF (66.1MB)
Volume E99-D No.4  (Publication Date:2016/04/01)
Previous | 
Special Section on Information and Communication System Security

pp.785-786  FOREWORD  Open Access Paper
Toshihiro YAMAUCHI  
Summary | FreeFull Text:PDF(74.9KB)

pp.787-795  INVITED PAPER  Open Access Paper
Cyber Physical Security for Industrial Control Systems and IoT
Kazukuni KOBARA  
(Publicized: 2016/01/13)  Summary | FreeFull Text:PDF(1.4MB)

pp.796-804  PAPER-Cryptography and cryptographic protocols
A New Scheme of Blockcipher Hash
Rashed MAZUMDER  Atsuko MIYAJI  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (531.7KB) >>
Buy this Article

pp.805-815  PAPER-Cryptography and cryptographic protocols
FPGA Implementation of Various Elliptic Curve Pairings over Odd Characteristic Field with Non Supersingular Curves
Yasuyuki NOGAMI  Hiroto KAGOTANI  Kengo IOKIBE  Hiroyuki MIYATAKE  Takashi NARITA  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (1MB) >>
Buy this Article

pp.816-829  PAPER-Cryptography and cryptographic protocols
D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability
Kazumasa OMOTE  Phuong-Thao TRAN  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (420.2KB) >>
Buy this Article

pp.830-838  PAPER-Network security
A Security Enhancement Technique for Wireless Communications Using Secret Sharing and Physical Layer Secrecy Transmission
Shoichiro YAMASAKI  Tomoko K. MATSUSHIMA  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (1.6MB) >>
Buy this Article

pp.839-849  PAPER-Network security
A Novel Protocol-Feature Attack against Tor's Hidden Service
Rui WANG  Qiaoyan WEN  Hua ZHANG  Xuelei LI  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (1.9MB) >>
Buy this Article

pp.850-859  PAPER-Network security
Defending DDoS Attacks in Software-Defined Networking Based on Legitimate Source and Destination IP Address Database
Xiulei WANG  Ming CHEN  Changyou XING  Tingting ZHANG  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (1.8MB) >>
Buy this Article

pp.860-872  PAPER-Web security
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks
Yuta TAKATA  Mitsuaki AKIYAMA  Takeshi YAGI  Takeo HARIU  Shigeki GOTO  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (912KB) >>
Buy this Article

pp.873-882  PAPER-Web security
Automating URL Blacklist Generation with Similarity Search Approach
Bo SUN  Mitsuaki AKIYAMA  Takeshi YAGI  Mitsuhiro HATADA  Tatsuya MORI  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (2MB) >>
Buy this Article

pp.883-890  PAPER-Privacy protection in information systems
A Healthcare Information System for Secure Delivery and Remote Management of Medical Records
Hyoung-Kee CHOI  Ki-Eun SHIN  Hyoungshick KIM  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (1MB) >>
Buy this Article

pp.891-894  LETTER-Privacy protection in information systems
Examining Privacy Leakage from Online Used Markets in Korea
Hyunsu MUN  Youngseok LEE  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (1.2MB) >>
Buy this Article

Special Section on Data Engineering and Information Management

pp.895-895  FOREWORD  Open Access Paper
Toshiyuki AMAGASA  
Summary | FreeFull Text:PDF(58.2KB)

pp.896-905  PAPER
BLM-Rank: A Bayesian Linear Method for Learning to Rank and Its GPU Implementation
Huifeng GUO  Dianhui CHU  Yunming YE  Xutao LI  Xixian FAN  
(Publicized: 2016/01/14)  Summary | Full Text:PDF (806.3KB) >>
Buy this Article

pp.906-917  PAPER
Named Entity Oriented Difference Analysis of News Articles and Its Application
Keisuke KIRITOSHI  Qiang MA  
(Publicized: 2016/01/14)  Summary | Full Text:PDF (2.2MB) >>
Buy this Article

pp.918-926  PAPER
The Efficient Algorithms for Constructing Enhanced Quadtrees Using MapReduce
Hongyeon KIM  Sungmin KANG  Seokjoo LEE  Jun-Ki MIN  
(Publicized: 2016/01/14)  Summary | Full Text:PDF (1.5MB) >>
Buy this Article

pp.927-935  PAPER
Modeling Joint Representation with Tri-Modal Deep Belief Networks for Query and Question Matching
Nan JIANG  Wenge RONG  Baolin PENG  Yifan NIE  Zhang XIONG  
(Publicized: 2016/01/14)  Summary | Full Text:PDF (731.3KB) >>
Buy this Article

pp.936-943  PAPER
A Sensor-Based Data Visualization System for Training Blood Pressure Measurement by Auscultatory Method
Chooi-Ling GOH  Shigetoshi NAKATAKE  
(Publicized: 2016/01/14)  Summary | Full Text:PDF (1.4MB) >>
Buy this Article

pp.944-958  PAPER
An Algorithm for All-Pairs Regular Path Problem on External Memory Graphs
Nobutaka SUZUKI  Kosetsu IKEDA  Yeondae KWON  
(Publicized: 2016/01/14)  Summary | Full Text:PDF (1.8MB) >>
Buy this Article

pp.959-968  PAPER
Incorporation of Target Specific Knowledge for Sentiment Analysis on Microblogging
(Publicized: 2016/01/14)  Summary | Full Text:PDF (374.1KB) >>
Buy this Article

pp.969-978  PAPER
Automatic Erroneous Data Detection over Type-Annotated Linked Data
Md-Mizanur RAHOMAN  Ryutaro ICHISE  
(Publicized: 2016/01/14)  Summary | Full Text:PDF (322.9KB) >>
Buy this Article

pp.979-988  PAPER
Efficient Algorithm for Math Formula Semantic Search
Shunsuke OHASHI  Giovanni Yoko KRISTIANTO  Goran TOPIC  Akiko AIZAWA  
(Publicized: 2016/01/14)  Summary | Full Text:PDF (485KB) >>
Buy this Article

pp.989-999  PAPER
History-Pattern Encoding for Large-Scale Dynamic Multidimensional Datasets and Its Evaluations
Masafumi MAKINO  Tatsuo TSUJI  Ken HIGUCHI  
(Publicized: 2016/01/14)  Summary | Full Text:PDF (1.7MB) >>
Buy this Article

pp.1000-1009  PAPER
A Scheme for Fast k-Concealment Anonymization
Ryosuke KOYANAGI  Ryo FURUKAWA  Tsubasa TAKAHASHI  Takuya MORI  Toshiyuki AMAGASA  Hiroyuki KITAGAWA  
(Publicized: 2016/01/14)  Summary | Full Text:PDF (1.4MB) >>
Buy this Article

pp.1010-1018  PAPER
Topic Representation of Researchers' Interests in a Large-Scale Academic Database and Its Application to Author Disambiguation
(Publicized: 2016/01/14)  Summary | Full Text:PDF (706KB) >>
Buy this Article

pp.1019-1022  LETTER
How to Combine Translation Probabilities and Question Expansion for Question Classification in cQA Services
Kyoungman BAE  Youngjoong KO  
(Publicized: 2016/01/14)  Summary | Full Text:PDF (383.1KB) >>
Buy this Article

Special Section on Cyberworlds

pp.1023-1023  FOREWORD  Open Access Paper
Masayuki NAKAJIMA  
Summary | FreeFull Text:PDF(76.7KB)

pp.1024-1031  PAPER
Body-Part Motion Synthesis System and Its Evaluation for Discovery Learning of Dance
(Publicized: 2016/01/28)  Summary | Full Text:PDF (1.8MB) >>
Buy this Article

pp.1032-1037  PAPER
A Kinect-Based System for Balance Rehabilitation of Stroke Patients
Chung-Liang LAI  Chien-Ming TSENG  D. ERDENETSOGT  Tzu-Kuan LIAO  Ya-Ling HUANG  Yung-Fu CHEN  
(Publicized: 2016/01/28)  Summary | Full Text:PDF (739.8KB) >>
Buy this Article

pp.1038-1051  PAPER
Dense Light Transport for Relighting Computation Using Orthogonal Illumination Based on Walsh-Hadamard Matrix
(Publicized: 2016/01/28)  Summary | Full Text:PDF (3.7MB) >>
Buy this Article

pp.1052-1061  PAPER
SSL Client Authentication with TPM
Shohei KAKEI  Masami MOHRI  Yoshiaki SHIRAISHI  Masakatu MORII  
(Publicized: 2016/01/28)  Summary | Full Text:PDF (1.8MB) >>
Buy this Article

pp.1062-1070  PAPER
Application of Feature Engineering for Phishing Detection
Wei ZHANG  Huan REN  Qingshan JIANG  
(Publicized: 2016/01/28)  Summary | Full Text:PDF (783.2KB) >>
Buy this Article

 | Errata[Uploaded on May 1,2016]

pp.1071-1080  PAPER
Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call
Hyun-Joo KIM  Jong-Hyun KIM  Jung-Tai KIM  Ik-Kyun KIM  Tai-Myung CHUNG  
(Publicized: 2016/01/28)  Summary | Full Text:PDF (2.3MB) >>
Buy this Article

pp.1081-1091  PAPER
Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense
Bumsoon JANG  Seokjoo DOO  Soojin LEE  Hyunsoo YOON  
(Publicized: 2016/01/29)  Summary | Full Text:PDF (2.9MB) >>
Buy this Article

Regular Section

pp.1092-1107  PAPER-Computer System
FXA: Executing Instructions in Front-End for Energy Efficiency
Ryota SHIOYA  Ryo TAKAMI  Masahiro GOSHIMA  Hideki ANDO  
(Publicized: 2016/01/06)  Summary | Full Text:PDF (1.3MB) >>
Buy this Article

pp.1108-1116  PAPER-Computer System
An Automatically Peak-Shift Control Design for Charging and Discharging of the Battery in an Ultrabook
Chun-Hung CHENG  Ying-Wen BAI  
(Publicized: 2016/01/08)  Summary | Full Text:PDF (1.5MB) >>
Buy this Article

pp.1117-1126  PAPER-Software Engineering
Dependency-Based Extraction of Conditional Statements for Understanding Business Rules
Tomomi HATANO  Takashi ISHIO  Joji OKADA  Yuji SAKATA  Katsuro INOUE  
(Publicized: 2016/01/08)  Summary | Full Text:PDF (613.7KB) >>
Buy this Article

pp.1127-1138  PAPER-Information Network
Elastic and Adaptive Resource Orchestration Architecture on 3-Tier Network Virtualization Model
Masayoshi SHIMAMURA  Hiroaki YAMANAKA  Akira NAGATA  Katsuyoshi IIDA  Eiji KAWAI  Masato TSURU  
(Publicized: 2016/01/18)  Summary | Full Text:PDF (1.9MB) >>
Buy this Article

pp.1139-1152  PAPER-Artificial Intelligence, Data Mining
The Relevance Dependent Infinite Relational Model for Discovering Co-Cluster Structure from Relationships with Structured Noise
Iku OHAMA  Hiromi IIDA  Takuya KIDA  Hiroki ARIMURA  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (2.9MB) >>
Buy this Article

pp.1153-1161  PAPER-Rehabilitation Engineering and Assistive Technology
Combining Human Action Sensing of Wheelchair Users and Machine Learning for Autonomous Accessibility Data Collection
(Publicized: 2016/01/22)  Summary | Full Text:PDF (1.5MB) >>
Buy this Article

pp.1162-1171  PAPER-Pattern Recognition
Automatic Recognition of Mycobacterium Tuberculosis Based on Active Shape Model
Chao XU  Dongxiang ZHOU  Tao GUAN  Yongping ZHAI  Yunhui LIU  
(Publicized: 2016/01/08)  Summary | Full Text:PDF (2MB) >>
Buy this Article

pp.1172-1181  PAPER-Pattern Recognition
Character-Position-Free On-Line Handwritten Japanese Text Recognition by Two Segmentation Methods
Jianjuan LIANG  Bilan ZHU  Taro KUMAGAI  Masaki NAKAGAWA  
[Paper on system development](Publicized: 2016/01/06)  Summary | Full Text:PDF (486.1KB) >>
Buy this Article

pp.1182-1192  PAPER-Speech and Hearing
Using Reversed Sequences and Grapheme Generation Rules to Extend the Feasibility of a Phoneme Transition Network-Based Grapheme-to-Phoneme Conversion
Seng KHEANG  Kouichi KATSURADA  Yurie IRIBE  Tsuneo NITTA  
(Publicized: 2016/01/06)  Summary | Full Text:PDF (674.6KB) >>
Buy this Article

pp.1193-1201  PAPER-Image Processing and Video Processing
Fast Mode Decision Technique for HEVC Intra Prediction Based on Reliability Metric for Motion Vectors
Chihiro TSUTAKE  Yutaka NAKANO  Toshiyuki YOSHIDA  
(Publicized: 2016/01/21)  Summary | Full Text:PDF (764KB) >>
Buy this Article

pp.1202-1211  PAPER-Image Processing and Video Processing
Distributed Compressed Video Sensing with Joint Optimization of Dictionary Learning and l1-Analysis Based Reconstruction
Fang TIAN  Jie GUO  Bin SONG  Haixiao LIU  Hao QIN  
(Publicized: 2016/01/21)  Summary | Full Text:PDF (1MB) >>
Buy this Article

pp.1212-1220  PAPER-Image Recognition, Computer Vision
Efficient Local Feature Encoding for Human Action Recognition with Approximate Sparse Coding
Yu WANG  Jien KATO  
(Publicized: 2016/01/06)  Summary | Full Text:PDF (615.1KB) >>
Buy this Article

pp.1221-1233  PAPER-Image Recognition, Computer Vision
Privacy Protection for Social Video via Background Estimation and CRF-Based Videographer's Intention Modeling
Yuta NAKASHIMA  Noboru BABAGUCHI  Jianping FAN  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (4MB) >>
Buy this Article

pp.1234-1241  PAPER-Music Information Processing
Continuous Music-Emotion Recognition Based on Electroencephalogram
Nattapong THAMMASAN  Koichi MORIYAMA  Ken-ichi FUKUI  Masayuki NUMAO  
(Publicized: 2016/01/22)  Summary | Full Text:PDF (1MB) >>
Buy this Article

pp.1242-1245  LETTER-Computer System
HaWL: Hidden Cold Block-Aware Wear Leveling Using Bit-Set Threshold for NAND Flash Memory
Seon Hwan KIM  Ju Hee CHOI  Jong Wook KWAK  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (495.9KB) >>
Buy this Article

pp.1246-1250  LETTER-Information Network
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
(Publicized: 2016/01/22)  Summary | Full Text:PDF (290.5KB) >>
Buy this Article

pp.1251-1254  LETTER-Information Network
Efficient Subversion of Symmetric Encryption with Random Initialization Vector
Joonsang BAEK  Ilsun YOU  
(Publicized: 2016/01/14)  Summary | Full Text:PDF (81.6KB) >>
Buy this Article

pp.1255-1258  LETTER-Dependable Computing
Properties of Generalized Feedback Shift Registers for Secure Scan Design
(Publicized: 2016/01/21)  Summary | Full Text:PDF (395.2KB) >>
Buy this Article

pp.1259-1263  LETTER-Pattern Recognition
Nonnegative Component Representation with Hierarchical Dictionary Learning Strategy for Action Recognition
Jianhong WANG  Pinzheng ZHANG  Linmin LUO  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (343KB) >>
Buy this Article

pp.1264-1267  LETTER-Image Recognition, Computer Vision
Feature-Based On-Line Object Tracking Combining Both Keypoints and Quasi-Keypoints Matching
Quan MIAO  Chun ZHANG  Long MENG  
(Publicized: 2016/01/21)  Summary | Full Text:PDF (1.2MB) >>
Buy this Article

pp.1268-1271  LETTER-Image Recognition, Computer Vision
Object Tracking with Embedded Deformable Parts in Dynamic Conditional Random Fields
Suofei ZHANG  Zhixin SUN  Xu CHENG  Lin ZHOU  
(Publicized: 2016/01/19)  Summary | Full Text:PDF (1.9MB) >>
Buy this Article

pp.1272-1274  LETTER-Biological Engineering
Spatial and Anatomical Regularization Based on Multiple Kernel Learning for Neuroimaging Classification
YingJiang WU  BenYong LIU  
(Publicized: 2016/01/13)  Summary | Full Text:PDF (209.3KB) >>
Buy this Article

Previous | 
go to Page Top