Journal: IEICE Transactions

Volume 101-D, Issue 1

1 -- 0Akinori Ito. Foreword
2 -- 12Isao Echizen, Tateo Ogane. BiometricJammer: Method to Prevent Acquisition of Biometric Information by Surreptitious Photography on Fingerprints
13 -- 19Kenta Iida, Hitoshi Kiya. Robust Image Identification without Visible Information for JPEG Images
20 -- 27Hong Yang, Linbo Qing, Xiaohai He, Shuhua Xiong. Scalable Distributed Video Coding for Wireless Video Sensor Networks
28 -- 36Huyen T. T. Tran, Cuong T. Pham, Nam Pham Ngoc, Anh T. Pham, Truong Cong Thang. A Study on Quality Metrics for 360 Video Communications
37 -- 44Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya. On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks
45 -- 52So Higashikawa, Tomoaki Kosugi, Shogo Kitajima, Masahiro Mambo. Shoulder-Surfing Resistant Authentication Using Pass Pattern of Pattern Lock
53 -- 63Ryouichi Nishimura, Seigo Enomoto, Hiroaki Kato. Speech Privacy for Sound Surveillance Using Super-Resolution Based on Maximum Likelihood and Bayesian Linear Regression
64 -- 67Jin S. Seo. A Local Feature Aggregation Method for Music Retrieval
68 -- 71Harumi Murata, Akio Ogihara, Shigetoshi Hayashi. Tolerance Evaluation of Audio Watermarking Method Based on Modification of Sound Pressure Level between Channels
72 -- 0Takahiro Kawamura. Foreword
73 -- 81Masatoshi Suzuki, Koji Matsuda, Satoshi Sekine, Naoaki Okazaki, Kentaro Inui. A Joint Neural Model for Fine-Grained Named Entity Classification of Wikipedia Articles
82 -- 89Thanyalak Rattanasawad, Marut Buranarach, Kanda Runapongsa Saikaew, Thepchai Supnithi. A Comparative Study of Rule-Based Inference Engines for the Semantic Web
90 -- 98Natthawut Kertkeidkachorn, Ryutaro Ichise. An Automatic Knowledge Graph Creation Framework from Natural Language Text
99 -- 107Semih Yumusak, Erdogan Dogdu, Halife Kodaz. Classification of Linked Data Sources Using Semantic Scoring
108 -- 115Kattiuscia Bitencourt, Frederico Araujo Durão, Manoel G. Mendonça, Lassion Laique Bomfim de Souza Santana. An Ontological Model for Fire Emergency Situations
116 -- 129Shusaku Egami, Takahiro Kawamura, Akihiko Ohsuga. Temporal and Spatial Expansion of Urban LOD for Solving Illegally Parked Bicycles in Tokyo
130 -- 141Reishi Yokomori, Norihiro Yoshida, Masami Noro, Katsuro Inoue. Changes of Evaluation Values on Component Rank Model by Taking Code Clones into Consideration
142 -- 151Yuki Yamagishi, Kazuo Aoyama, Kazumi Saito, Tetsuo Ikeda. Pivot Generation Algorithm with a Complete Binary Tree for Efficient Exact Similarity Search
152 -- 170Tomohiro Yoshihara, Dai Kobayashi, Haruo Yokota. Concurrency Control Protocol for Parallel B-Tree Structures That Improves the Efficiency of Request Transfers and SMOs within a Node
171 -- 180Daisuke Yamamoto, Masaki Murase, Naohisa Takahashi. Fisheye Map Using Stroke-Based Generalization for Web Map Services
181 -- 192Sheng Hu, Chuan Xiao, Yoshiharu Ishikawa. An Efficient Algorithm for Location-Aware Query Autocompletion
193 -- 204Xueting Wang, Kensho Hara, Yu Enokibori, Takatsugu Hirayama, Kenji Mase. Personal Viewpoint Navigation Based on Object Trajectory Distribution for Multi-View Videos
205 -- 214Michael Heck, Sakriani Sakti, Satoshi Nakamura 0001. Learning Supervised Feature Transformations on Zero Resources for Improved Acoustic Unit Discovery
215 -- 224Yuqiang Cao, Weiguo Gong, Bo Zhang, Fanxin Zeng, Sen Bai. Optimal Permutation Based Block Compressed Sensing for Image Compression Applications
225 -- 233Wenpeng Lu, Hao Wu, Ping Jian, Yonggang Huang, Heyan Huang. An Empirical Study of Classifier Combination Based Word Sense Disambiguation
234 -- 238Yi Gao, Jianxin Luo, HangPing Qiu, Bin Tang, Bo Wu, Weiwei Duan. A GPU-Based Rasterization Algorithm for Boolean Operations on Polygons
239 -- 243Young-Kyoon Suh. SEDONA: A Novel Protocol for Identifying Infrequent, Long-Running Daemons on a Linux System
244 -- 248Sang-Chul Lee, Sang-Wook Kim, Sunju Park, Dong-Kyu Chae. An Approach to Effective Recommendation Considering User Preference and Diversity Simultaneously
249 -- 252Seungkwang Lee. A White-Box Cryptographic Implementation for Protecting against Power Analysis
253 -- 256Seon-Ho Shin, HyunBong Kim, MyungKeun Yoon. q-Grams
257 -- 260Jun Wang, Guoqing Wang, Zaiyu Pan. Gender Attribute Mining with Hand-Dorsa Vein Image Based on Unsupervised Sparse Feature Learning
261 -- 264Li Wang, Xiaoan Tang, Junda Zhang, Dongdong Guan. Statistical Property Guided Feature Extraction for Volume Data
265 -- 268Ruisheng Ran, Bin Fang, Xue Gang Wu, Shougui Zhang. A Simple and Effective Generalization of Exponential Matrix Discriminant Analysis and Its Application to Face Recognition
269 -- 272Seong-Hyeon Shin, Woo-Jin Jang, Ho-Won Yun, Hochong Park. Encoding Detection and Bit Rate Classification of AMR-Coded Speech Based on Deep Neural Network
273 -- 276Nuo Xu, Chunlei Huo. Learning Deep Relationship for Object Detection