D - Abstracts of IEICE TRANSACTIONS on Information and Systems (Japanese Edition)

Archive Index

Online ISSN : 1881-0225
Volume J97-D No.12  (Publication Date:2014/12/01)
Previous | 
Next
Special Section on Life Intelligence and Office Information Systems

pp.1680-1683  LETTER
Experiments for Emotion Exchange Using Experiences as Metaphors
Kazuto HAMANO  Masanobu ABE  Sunao HARA  
Summary | Full Text(in Japanese):PDF (371KB) >>Buy this Article

pp.1684-1688  LETTER
Estimation Method of User's Sense of Expectation for Future Events Focusing on Lifelogs and Vital Reaction
Yumiko NAGATAKE  Tomoyo KOMATSU  Akihisa KODATE  Manabu MOTEGI  Atsushi FUKAYAMA  Michio SHIMOMURA  
Summary | Full Text(in Japanese):PDF (251KB) >>Buy this Article

pp.1689-1692  LETTER
Latent Preference Estimation Method for Photo Viewers by Gaze Analysis
Tomoyo KOMATSU  Yumiko NAGATAKE  Akihisa KODATE  Manabu MOTEGI  Atsushi FUKAYAMA  Michio SHIMOMURA  
Summary | Full Text(in Japanese):PDF (261.8KB) >>Buy this Article

pp.1693-1695  LETTER
Ability Evaluation Method of Soccer Players Using Text Mining
Taichi TAKENAKA  Toshitaka MAKI  Toshihiko WAKAHARA  
Summary | Full Text(in Japanese):PDF (558.3KB) >>Buy this Article

pp.1696-1700  LETTER
An Input-Output Integrating Framework for Development of Evacuation Support System Applications Cooperating with Multiple SNSs
Ryosuke OKAZAKI  Masami MOHRI  Yoshiaki SHIRAISHI  
Summary | Full Text(in Japanese):PDF (651.8KB) >>Buy this Article

pp.1701-1704  LETTER
A Filesystem Based on Event/Action Control
Youji FUKUTA  Yoshiaki SHIRAISHI  Masami MOHRI  
Summary | Full Text(in Japanese):PDF (392.8KB) >>Buy this Article

pp.1705-1708  LETTER
Study on Similarity Evaluation of Papers Data Using Wikipedia Link API for Automatic Metadata Annotation
Toshitaka MAKI  Kazuki TAKAHASHI  Toshihiko WAKAHARA  
Summary | Full Text(in Japanese):PDF (866KB) >>Buy this Article

pp.1709-1713  LETTER
Risk Assessment of Information Leak in Twitter Use of Employee – Experience and Consciousness on Tweet about Business
Yoshiaki SEKI  Naoko CHIBA  Yoshiaki HASHIMOTO  
Summary | Full Text(in Japanese):PDF (561.1KB) >>Buy this Article

pp.1714-1718  LETTER
A Study of Information Leakage Risk Management Plans for the Employee's Twitter Use
Naoko CHIBA  Yoshiaki SEKI  Yoshiaki HASHIMOTO  
Summary | Full Text(in Japanese):PDF (1023.5KB) >>Buy this Article

pp.1719-1721  LETTER
Detection of Malicious PDF Files by Windows API Hook-based Network Monitoring
Yoshiaki SHIRAISHI  Masaki KAMIZONO  Masanori HIROTOMO  Masami MOHRI  
Summary | Full Text(in Japanese):PDF (389.6KB) >>Buy this Article

pp.1722-1724  LETTER
Virtual Stamp Rally System: Promoting Use of Exercise Bikes
Shoji MIZOBUCHI  Jun OTANI  Syuichi KIKAWA  
Summary | Full Text(in Japanese):PDF (1.4MB) >>Buy this Article

pp.1725-1728  LETTER
Analysis of Behaviors of Taking Notes by Students in e-Learning
Eiji WATANABE  Takashi OZEKI  Takeshi KOHAMA  
Summary | Full Text(in Japanese):PDF (984.9KB) >>Buy this Article

pp.1729-1732  LETTER
A Method for Log Archiving and Its Auditing in Considering Privacy Protection
Youji FUKUTA  Yoshiaki SHIRAISHI  Masami MOHRI  
Summary | Full Text(in Japanese):PDF (359.1KB) >>Buy this Article

pp.1733-1736  LETTER
Document Type Classification for Automatic Recording of Reading Activities
Yuki SHIGA  Yuzuko UTSUMI  Masakazu IWAMURA  Kai KUNZE  Koichi KISE  
Summary | Full Text(in Japanese):PDF (3.2MB) >>Buy this Article

pp.1737-1739  LETTER
Improving Object Tracking Method Based on Particle Filter by Detection of Similar Objects
Gaku WATANABE  Shinji FUKUI  Yuji IWAHORI  
Summary | Full Text(in Japanese):PDF (2MB) >>Buy this Article

Regular Section

pp.1740-1754  PAPER
Performance Prediction Framework for Design of Block Ciphers on GPUs
Naoki NISHIKAWA  Keisuke IWAI  Hidema TANAKA  Takakazu KUROKAWA  
Summary | Full Text(in Japanese):PDF (2.2MB) >>Buy this Article

pp.1755-1769  PAPER
Analysis of Initial-State Multitasking Server with Empty Disk Cache
Mamoru SUGIE  Toshiaki TARUI  Tsunehiko BABA  
Summary | Full Text(in Japanese):PDF (2.5MB) >>Buy this Article

pp.1770-1784  PAPER
Implementation and Evaluation of Shoulder-Surfing Attack Resistant Users
Yoshihiro KITA  Naonobu OKAZAKI  Hiromitsu NISHIMURA  Hideyuki TORII  Takeshi OKAMOTO  Mirang PARK  
Summary | Full Text(in Japanese):PDF (3MB) >>Buy this Article

pp.1785-1796  PAPER  Open Access Paper
Hashing with Locally Linear Projections
Go IRIE  Hiroyuki ARAI  Yukinobu TANIGUCHI  
Summary | FreeFull Text(in Japanese):PDF(2.4MB)

pp.1797-1808  PAPER
Template-free Form Recognition Using Hypothesis Testing Approach
Junichi HIRAYAMA  Hiroshi SHINJO  Toshikazu TAKAHASHI  Takeshi NAGASAKI  
Summary | Full Text(in Japanese):PDF (3.1MB) >>Buy this Article

pp.1809-1820  PAPER
Video Image Improvement Technique for Visual Testing of Nuclear Reactors
Atsushi MIYAMOTO  Kenji NAKAHIRA  Naoki HOSOYA  Kazuhiro KIMURA  Masahiro KOIKE  
Summary | Full Text(in Japanese):PDF (3.3MB) >>Buy this Article

pp.1821-1830  PAPER
Parallel Underdetermined System for Large-Scale Face Tracking and Recognition
Hisayoshi CHUGAN  Yuki OKA  Takeshi SHAKUNAGA  
Summary | Full Text(in Japanese):PDF (3.5MB) >>Buy this Article

pp.1831-1838  PAPER
A Sputum Detection System for Respiratory Section Using Lung Sound Adaptation in Real Environment
Tatsuya YAMASHITA  Satoshi TAMURA  Kenji HAYASHI  Yutaka NISHIMOTO  Satoru HAYAMIZU  
Summary | Full Text(in Japanese):PDF (831.5KB) >>Buy this Article

pp.1839-1842  LETTER
Development of Digital Signage Contents Using Microblogging Service
Masaki ONISHI  Masafumi MUTA  
Summary | Full Text(in Japanese):PDF (1.2MB) >>Buy this Article

pp.1843-1846  LETTER
A Proposal of Learning by Reading in Computer Programming and Development Learning Support System for Meaning Deduction
Haruki KANAMORI  Takahito TOMOTO  Yusuke KOMETANI  Takako AKAKURA  
Summary | Full Text(in Japanese):PDF (600.6KB) >>Buy this Article

Previous | 
Next
go to Page Top