![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Estimation of Unmasked Face Images Based on Voice and 3DMM
Facemasks have become common due to the COVID-19 pandemic. They have begun to affect security and identification systems because they cover almost half of the face. Current state-of-the-art methods have been a...
-
Chapter
A Scalable Middleware for IoT Vulnerability Detection
Cyberattacks targeting vulnerabilities in the internet of things (IoT) devices are increasing in number annually. Accordingly, various methods and analysis tools for IoT vulnerability detection have been propo...
-
Chapter
Data-Driven OCL Invariant Patterns-Based Process Model Exploration for Process Mining
Process mining has become an effective and efficient means to manage organisations’ processes. A commonly used type of process mining today is conformance checking, which compares event log data with a given p...
-
Chapter
Privacy-Preserving Data Collection and Analysis for Smart Cities
Smart cities leverage real-world data to digitally replicate city-related aspects such as disaster prevention, transportation, and pandemics, creating an encompassing virtual environment. The construction of t...
-
Chapter and Conference Paper
Proposal of a Middleware to Support Development of IoT Firmware Analysis Tools
Although Internet of Things (IoT) devices have made our lives increasingly convenient, there have been many reports of vulnerabilities, such as information leakage and use of these devices as springboards for ...
-
Chapter and Conference Paper
Anonymized Questionnaire Analysis with Differential Privacy for Large-Scale Crowdsourcing
Crowdsourcing, wherein requesters post tasks and workers conduct selected tasks on the Web system, can be used for various purposes. Questionnaires are one of the most popular tasks in crowdsourcing. Because s...
-
Article
An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services
The healthcare services industry has seen a huge transformation since the prominent rise of the Internet of Things (IoT). IoT in healthcare services includes a large number of unified and interconnected sensor...
-
Article
Open AccessPrivacy-preserving chi-squared test of independence for small samples
The importance of privacy protection in analyses of personal data, such as genome-wide association studies (GWAS), has grown in recent years. GWAS focuses on identifying single-nucleotide polymorphisms (SNPs) ...
-
Chapter
Self-Adaptation for Heterogeneous Client-Server Online Games
Online games have been widely spread due to the increase in Internet bandwidth. the development of an online game, we must consider the time lag problem caused by heterogeneous environments. In this paper, ...
-
Chapter
Mis.Config: Finding Misreferred Configuration Bugs in Web Application Using Thin Slicing
There are many web-based applications for multi-agent systems (MAS). However, develo** MAS is not easy, because agents have many different variables, and it is difficult to validate them. PHP is one of the...
-
Chapter
Multi-task Deep Reinforcement Learning with Evolutionary Algorithm and Policy Gradients Method in 3D Control Tasks
In learning, it is to converge the is insufficient or a reward is sparse. Besides, on specific tasks, the amount of exploration may be limited. Therefore, it is considered effective to learn on sourc...
-
Article
Open Access“Never fry carrots without chop**” Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process
Research on deep-training captioning models that modify the natural-language contents of images and moving images has produced considerable results and attracted attention in recent years. In this research, we...
-
Article
Open AccessDo You Like Sclera? Sclera-region Detection and Colorization for Anime Character Line Drawings
Colorizing line drawings requires special skill, experience, and knowledge. Artists also spend a great deal of time and effort creating art. Given this background, research on automated line drawing colorizati...
-
Chapter and Conference Paper
Text Classification and Transfer Learning Based on Character-Level Deep Convolutional Neural Networks
Temporal (one-dimensional) Convolutional Neural Network (Temporal CNN, ConvNet) is an emergent technology for text understanding. The input for the ConvNets could be either a sequence of words or a sequence of...
-
Chapter and Conference Paper
User Participatory Construction of Open Hazard Data for Preventing Bicycle Accidents
Recently, bicycle-related accidents, e.g., collision accidents at intersection increase and account for approximately 20% of all traffic accidents in Japan; thus, it is regarded as one of the serious social pr...
-
Chapter and Conference Paper
Linked Data Collection and Analysis Platform for Music Information Retrieval
There has been extensive research on music information retrieval (MIR), such as signal processing, pattern mining, and information retrieval. In such studies, audio features extracted from music are commonly u...
-
Chapter
Sake Selection Support Application for Countryside Tourism
For the upcoming Tokyo Olympic Paralympic Games in 2020, the number of foreign tourists coming to Japan is expected to rise. However, there has been a problem with tourists becoming less likely to visit places...
-
Chapter
A Solution to Visualize Open Urban Data for Illegally Parked Bicycles
The illegal parking of bicycles is becoming an urban problem in Japan and other countries. We believe the data publication of such urban problems on the Web as Open Data will contribute to solving the problems...
-
Chapter and Conference Paper
Towards the Elimination of the Miscommunication Between Users in Twitter
In recent years, a Twitter response from another user who does not share the intentions and expectations of the original poster may cause discomfort and stress, which is a social phenomenon known as SNS fatigu...
-
Chapter and Conference Paper
Decision Making Strategy Based on Time Series Data of Voting Behavior
In gambling such as horse racing, we are sometimes able to peep peculiar voting behavior by a punter with the advantageous information closely related to the results. The punter is often referred as an insider. I...