Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2021-02-18 14:50 |
Online |
Online |
A Note on Estimation of Deteriorated Regions Based on Anomaly Detection from Rubber Material Electron Microscope Images
-- Verification of Feature Representations Extracted from Deep Learning Models -- Masanao Matsumoto, Ren Togo, Takahiro Ogawa, Miki Haseyama (Hokkaido Univ) |
This paper presents an anomaly detection method for estimation of deteriorated regions from rubber material electron mic... [more] |
|
IN |
2021-01-19 10:30 |
Online |
Online |
Jerkiness Detection in Spoken Lines of Interactive Characters Using Text-based Speaker Recognition Kota Mori, Komei Arasawa, Shun Hattori (Muroran Inst. of Tech.) IN2020-50 |
In recent years, social-network games have become more and more popular
among young people due to the spread of smartph... [more] |
IN2020-50 pp.38-42 |
PRMU |
2020-12-18 14:40 |
Online |
Online |
Construction of SSD model applied Feature Contraction and Rand Augment by small training data Tomokazu Ozawa (UNICO), Yuki Matsumoto, Katsushi Miura (SEI), Takuya Okuno (SCE) PRMU2020-60 |
Appearance inspection is often performed to maintain quality in the industrial production. Until now, the appearance ins... [more] |
PRMU2020-60 pp.128-132 |
EA, ASJ-H, EMM |
2020-11-20 09:00 |
Online |
Online |
[Poster Presentation]
Sound detection for laughter by using features based on auditory attributes Soichiro Tanaka (JAIST), Shota Morita (Fukuyama Univ), Masashi Unoki (JAIST) EA2020-24 EMM2020-39 |
This paper proposes a laughter detection method based on auditory attributes to detect special laughter such as a fake l... [more] |
EA2020-24 EMM2020-39 pp.15-20 |
IA |
2020-10-01 11:15 |
Online |
Online |
Malicious URLs Detection Using an Integrated AI Framework Bo-Xiang Wang, Ren-Feng Deng, Yi-Wei Ma, Jiann-Liang Chen (NTUST) IA2020-1 |
Malicious attacks on computer networks are quite common, and the internet attacks are even more widespread, such as Malv... [more] |
IA2020-1 pp.1-5 |
ITE-HI, IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2020-02-27 11:15 |
Hokkaido |
Hokkaido Univ. (Cancelled but technical report was issued) |
Composition Presentation of Room Images with Composition Feature Taiki Akama (UEC), Masachika Suzuki, Hisao Kimura, Yoshio Asada, Keisuke Suzuki (AVANT), Hiroki Takahashi (UEC) |
Taking some real estate room images for searching site, detection composition features and presenting appropriate compos... [more] |
|
SeMI |
2020-01-31 09:25 |
Kagawa |
|
Initial Evaluation of a Compressive Measurement-Based Acoustic Vehicle Detection and Identification System Billy Dawton, Shigemi Ishida, Yuki Hori, Masato Uchino, Yutaka Arakawa, Akira Fukuda (Kyushu Univ.) SeMI2019-116 |
As society becomes increasingly interconnected, the need for sophisticated signal processing and data analysis technique... [more] |
SeMI2019-116 pp.69-74 |
MI |
2020-01-29 10:05 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
A study of generalized generation of image features for computer-aided detection systems based on unsupervised learning with normal datasets
-- Experimental evaluations of feature generation by small datasets -- Kazuyuki Ushifusa, Mitsutaka Nemoto(, Yuichi Kimura, Takashi Nagaoka, Takahiro Yamada, Atsuko Tanaka (Kindai Uni.), Naoto Hayashi (The Uni of Tokyo Hosp) MI2019-68 |
In a computer-aided detection system, image features are essential factors. In this study, we propose an image feature g... [more] |
MI2019-68 pp.15-18 |
EA, US (Joint) |
2020-01-22 14:00 |
Kyoto |
Doshisha Univ. |
[Poster Presentation]
Speech features obtained from similarities between the input and output of a DNN-based VAD. Nozomi Shigaraki, Kei Yamamori (Kanazawa Univ.), Suci Dwijayanti (Sriwijaya Univ.), Masato Miyoshi (Kanazawa Univ.) EA2019-95 |
We have been studying Voice activity detection (VAD) using a deep neural network (DNN). Log power spectra (LPS) and Spee... [more] |
EA2019-95 pp.67-72 |
IA |
2019-11-15 13:15 |
Tokyo |
Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) |
Malicious URL Classification using Machine Learning Techniques Yu-Chen Chen, Li-Dong Chen, Yan-Ju Chen, Jiann-Liang Chen (NTUST) IA2019-41 |
The Website security is an important research topic that must be pursued to protect internet users. Traditionally, black... [more] |
IA2019-41 pp.79-83 |
MBE, NC |
2019-10-11 15:00 |
Miyagi |
|
Analysis of diffuse lung disease shadows using Bolasso feature selection method Akihiro Endo (UEC), Kenji Nagata (NIMS), Shoji Kido (Osaka Univ.), Hayaru Shouno (UEC) MBE2019-33 NC2019-24 |
Diffuse lung disease is an intractable disease and abnormal shadows appear on lung X-ray CT images.
Since various patte... [more] |
MBE2019-33 NC2019-24 pp.23-27 |
NS, IN, CS, NV (Joint) |
2019-09-06 11:15 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Study on Features Derived from Cache Property for DNS Tunneling Detection Naotake Ishikura, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2019-93 |
A lot of enterprises are under threat of targeted attacks causing data exfiltration, and as a means of performing the at... [more] |
NS2019-93 pp.25-30 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
Traffic Feature-based Botnet Detection Scheme Emphasizing the Importance of Long Patterns Yichen An, Shuichiro Haruta, Sanghun Choi, Iwao Sasase (Keio Univ.) CS2019-18 |
The botnet detection is imperative. Among several detection schemes, the promising one uses the communication sequences.... [more] |
CS2019-18 pp.31-35 |
SIS, IPSJ-AVM, ITE-3DMT [detail] |
2019-06-13 13:55 |
Nagasaki |
Fukue Culture Center |
Accuracy Improvement of Depth Estimation from a Single Still Image Using Feature Pyramid Network Yudai Fukuda, Takuro Oki, Ryusuke Miyamoto (Meiji Univ.) SIS2019-5 |
Depth estimation from a single shot image have become accurate drastically after emergence of deep
neural networks that... [more] |
SIS2019-5 pp.23-28 |
EA, SIP, SP |
2019-03-15 13:30 |
Nagasaki |
i+Land nagasaki (Nagasaki-shi) |
[Poster Presentation]
Design and Evaluation of Ladder Denoising Autoencoder for Auditory Speech Feature Extraction of Overlapped Speech Separation Hiroshi Sekiguchi, Yoshiaki Narusue, Hiroyuki Morikawa (Univ. of Tokyo) EA2018-155 SIP2018-161 SP2018-117 |
Primates and mammalian distinguish overlapped speech sounds from one another by recognizing a single sound source whethe... [more] |
EA2018-155 SIP2018-161 SP2018-117 pp.329-333 |
SIS |
2019-03-06 13:00 |
Tokyo |
Tokyo Univ. Science, Katsushika Campus |
Evaluation of an FPGA Implementation of MRCoHOG Feature using High-Level Synthesis Yuya Nagamine, Kazuki Yoshihiro, Hakaru Tamukoh (Kyutech) SIS2018-37 |
In this report, we evaluate a Field Programmable Gate Array (FPGA) implementation of Multiresolution Co-occurrence Histo... [more] |
SIS2018-37 pp.1-4 |
DC |
2019-02-27 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Efficient Approach to Recycled FPGA Detection Using WID Variation Modeling Foisal Ahmed, Michihiro Shintani, Michiko Inoue (NAIST) DC2018-77 |
Recycled field programmable gate arrays (FPGAs) make a significant threat to mission critical systems due to their perfo... [more] |
DC2018-77 pp.37-42 |
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] |
2019-02-20 09:30 |
Hokkaido |
Hokkaido Univ. |
Detection of Improper Tactile Paving using Pedestrian Viewpoint video Kento Watanabe, Hiroki Takahashi (UEC) ITS2018-73 IE2018-94 |
Currently, there are 36 million blind people in the whole world. Furthermore, the number of blind people will be expecte... [more] |
ITS2018-73 IE2018-94 pp.141-146 |
MoNA |
2018-12-25 14:40 |
Tokyo |
|
Detection of Predator Animals Features using Machine Learning Fahad Alharbi, Eiji Kamioka (SIT) MoNA2018-49 |
In this paper, predator animals feature detection is discussed. Animals recognition is one of the areas in which a limit... [more] |
MoNA2018-49 pp.61-66 |
CS |
2018-11-02 10:10 |
Ehime |
The Shiki Museum |
Feature Selection Scheme for Android ICC-related Features Based on the Gap of the Appearance Ratio Kyohei Osuge, Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) CS2018-65 |
Android malwares are rapidly becoming a potential threat to users. Among several Android malware detection schemes, the ... [more] |
CS2018-65 pp.57-62 |