IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E103-D No.4  (Publication Date:2020/04/01)
[Whole issue]:PDF (35.6MB)
Previous | 
Next
Special Section on Intelligent Information and Communication Technology and its Applications to Creative Activity Support

pp.728-729  FOREWORD  Open Access Paper
FOREWORD
Susumu KUNIFUJI  Thanaruk THEERAMUNKONG  Takayuki ITO  
Summary | FreeFull Text:PDF(191.8KB)

pp.730-738  PAPER
Improvement in the Effectiveness of Cutting Skill Practice for Paper-Cutting Creations Based on the Steering Law
Takafumi HIGASHI  Hideaki KANAI  
Summary | Full Text:PDF (2.8MB) >>
Buy this Article


pp.739-747  PAPER
Software Development Effort Estimation from Unstructured Software Project Description by Sequence Models
Tachanun KANGWANTRAKOOL  Kobkrit VIRIYAYUDHAKORN  Thanaruk THEERAMUNKONG  
Summary | Full Text:PDF (1.1MB) >>
Buy this Article


pp.748-758  PAPER
Improving Seeded k-Means Clustering with Deviation- and Entropy-Based Term Weightings
Uraiwan BUATOOM  Waree KONGPRAWECHNON  Thanaruk THEERAMUNKONG  
Summary | Full Text:PDF (1.1MB) >>
Buy this Article


pp.759-770  PAPER
Compromising Strategies for Agents in Multiple Interdependent Issues Negotiation
Shun OKUHARA  Takayuki ITO  
Summary | Full Text:PDF (3.7MB) >>
Buy this Article


pp.771-778  PAPER
Social Behavior Analysis and Thai Mental Health Questionnaire (TMHQ) Optimization for Depression Detection System
Konlakorn WONGAPTIKASEREE  Panida YOMABOOT  Kantinee KATCHAPAKIRIN  Yongyos KAEWPITAKKUN  
Summary | Full Text:PDF (1.7MB) >>
Buy this Article


pp.779-788  PAPER
Characterization of Interestingness Measures Using Correlation Analysis and Association Rule Mining
Rachasak SOMYANONTHANAKUL  Thanaruk THEERAMUNKONG  
Summary | Full Text:PDF (3.6MB) >>
Buy this Article


pp.789-795  PAPER
Cognition-Based Delay Analysis to Determine the Average Minimum Time Limit for Wireless Sensor Communications
Kedir MAMO BESHER  Juan-Ivan NIETO-HIPÓLITO  Juan de Dios SÁNCHEZ LÓPEZ  Mabel VAZQUEZ-BRISENO  Raymundo BUENROSTRO MARISCAL  
Summary | Full Text:PDF (1.3MB) >>
Buy this Article


pp.796-799  LETTER
GUNGEN-Heartbeat: A Support System for High Quality Idea Generation Using Heartbeat Variance
Jun MUNEMORI  Kohei KOMORI  Junko ITOU  
Summary | Full Text:PDF (651.5KB) >>
Buy this Article


Regular Section

pp.800-812  PAPER-Software System
Model Checking of Real-Time Properties for Embedded Assembly Program Using Real-Time Temporal Logic RTCTL and Its Application to Real Microcontroller Software
Yajun WU  Satoshi YAMANE  
Summary | Full Text:PDF (1.2MB) >>
Buy this Article


pp.813-824  PAPER-Artificial Intelligence, Data Mining
The Effect of Axis-Wise Triaxial Acceleration Data Fusion in CNN-Based Human Activity Recognition
Xinxin HAN  Jian YE  Jia LUO  Haiying ZHOU  
Summary | Full Text:PDF (2.2MB) >>
Buy this Article


pp.825-837  PAPER-Artificial Intelligence, Data Mining
Evaluating Deep Learning for Image Classification in Adversarial Environment
Ye PENG  Wentao ZHAO  Wei CAI  Jinshu SU  Biao HAN  Qiang LIU  
Summary | Full Text:PDF (4.2MB) >>
Buy this Article


pp.838-849  PAPER-Human-computer Interaction
Predicting Uninterruptible Durations of Office Workers by Using Probabilistic Work Continuance Model
Shota SHIRATORI  Yuichiro FUJIMOTO  Kinya FUJITA  
Summary | Full Text:PDF (2.1MB) >>
Buy this Article


pp.850-865  PAPER-Image Processing and Video Processing
Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection
Shi-Chei HUNG  Da-Chun WU  Wen-Hsiang TSAI  
Summary | Full Text:PDF (3.3MB) >>
Buy this Article


pp.866-873  PAPER-Natural Language Processing
Korean-Vietnamese Neural Machine Translation with Named Entity Recognition and Part-of-Speech Tags
Van-Hai VU  Quang-Phuoc NGUYEN  Kiem-Hieu NGUYEN  Joon-Choul SHIN  Cheol-Young OCK  
Summary | Full Text:PDF (1.1MB) >>
Buy this Article


pp.874-878  LETTER-Software Engineering
A Deep Neural Network-Based Approach to Finding Similar Code Segments
Dong Kwan KIM  
Summary | Full Text:PDF (607.7KB) >>
Buy this Article


pp.879-882  LETTER-Information Network
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods
Hyun KWON  Hyunsoo YOON  Ki-Woong PARK  
Summary | Full Text:PDF (709.9KB) >>
Buy this Article


pp.883-887  LETTER-Information Network
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks
Hyun KWON  Hyunsoo YOON  Ki-Woong PARK  
Summary | Full Text:PDF (858KB) >>
Buy this Article


pp.888-891  LETTER-Dependable Computing
Against Insider Threats with Hybrid Anomaly Detection with Local-Feature Autoencoder and Global Statistics (LAGS)
Minhae JANG  Yeonseung RYU  Jik-Soo KIM  Minkyoung CHO  
Summary | Full Text:PDF (447.6KB) >>
Buy this Article


pp.892-895  LETTER-Dependable Computing
Master-Slave FF Using DICE Capable of Tolerating Soft Errors Occurring Around Clock Edge
Kazuteru NAMBA  
Summary | Full Text:PDF (384.6KB) >>
Buy this Article


pp.896-900  LETTER-Artificial Intelligence, Data Mining
Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black and White Binary Image
Minkyoung CHO  Jik-Soo KIM  Jongho SHIN  Incheol SHIN  
Summary | Full Text:PDF (236KB) >>
Buy this Article


pp.901-904  LETTER-Educational Technology
Sequential Authentication Using Handwriting Biometrics for Free Response e-Testing
Taisuke KAWAMATA  Takako AKAKURA  
Summary | Full Text:PDF (1.2MB) >>
Buy this Article


pp.905-909  LETTER-Educational Technology
Investigation on e-Learning Status Estimation for New Learners — Classifier Selection on Representative Sample Selection
Siyang YU  Kazuaki KONDO  Yuichi NAKAMURA  Takayuki NAKAJIMA  Masatake DANTSUJI  
Summary | Full Text:PDF (657.1KB) >>
Buy this Article


pp.910-913  LETTER-Pattern Recognition
Salient Region Detection with Multi-Feature Fusion and Edge Constraint
Cheng XU  Wei HAN  Dongzhen WANG  Daqing HUANG  
Summary | Full Text:PDF (828.3KB) >>
Buy this Article


Previous | 
Next
go to Page Top