Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Estimation of Unmasked Face Images Based on Voice and 3DMM

    Facemasks have become common due to the COVID-19 pandemic. They have begun to affect security and identification systems because they cover almost half of the face. Current state-of-the-art methods have been a...

    Tetsumaru Akatsuka, Ryohei Orihara in AI 2023: Advances in Artificial Intelligen… (2024)

  2. No Access

    Chapter

    A Scalable Middleware for IoT Vulnerability Detection

    Cyberattacks targeting vulnerabilities in the internet of things (IoT) devices are increasing in number annually. Accordingly, various methods and analysis tools for IoT vulnerability detection have been propo...

    Minami Yoda, Shigeo Nakamura, Yuichi Sei in Networking and Parallel/Distributed Comput… (2024)

  3. No Access

    Chapter

    Data-Driven OCL Invariant Patterns-Based Process Model Exploration for Process Mining

    Process mining has become an effective and efficient means to manage organisations’ processes. A commonly used type of process mining today is conformance checking, which compares event log data with a given p...

    Duc-Hieu Nguyen, Yuichi Sei, Yasuyuki Tahara in Networking and Parallel/Distributed Comput… (2024)

  4. Chapter

    Privacy-Preserving Data Collection and Analysis for Smart Cities

    Smart cities leverage real-world data to digitally replicate city-related aspects such as disaster prevention, transportation, and pandemics, creating an encompassing virtual environment. The construction of t...

    Yuichi Sei in Human-Centered Services Computing for Smart Cities (2024)

  5. No Access

    Chapter and Conference Paper

    Proposal of a Middleware to Support Development of IoT Firmware Analysis Tools

    Although Internet of Things (IoT) devices have made our lives increasingly convenient, there have been many reports of vulnerabilities, such as information leakage and use of these devices as springboards for ...

    Minami Yoda, Shuji Sakuraba, Yuichi Sei in Knowledge-Based Software Engineering: 2022 (2023)

  6. No Access

    Chapter and Conference Paper

    Anonymized Questionnaire Analysis with Differential Privacy for Large-Scale Crowdsourcing

    Crowdsourcing, wherein requesters post tasks and workers conduct selected tasks on the Web system, can be used for various purposes. Questionnaires are one of the most popular tasks in crowdsourcing. Because s...

    Yuichi Sei, Akihiko Ohsuga in Disruptive Technologies for Big Data and Cloud Applications (2022)

  7. No Access

    Article

    An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services

    The healthcare services industry has seen a huge transformation since the prominent rise of the Internet of Things (IoT). IoT in healthcare services includes a large number of unified and interconnected sensor...

    J. Andrew Onesimu, J. Karthikeyan, Yuichi Sei in Peer-to-Peer Networking and Applications (2021)

  8. Article

    Open Access

    Privacy-preserving chi-squared test of independence for small samples

    The importance of privacy protection in analyses of personal data, such as genome-wide association studies (GWAS), has grown in recent years. GWAS focuses on identifying single-nucleotide polymorphisms (SNPs) ...

    Yuichi Sei, Akihiko Ohsuga in BioData Mining (2021)

  9. No Access

    Chapter

    Self-Adaptation for Heterogeneous Client-Server Online Games

    Online games have been widely spread due to the increase in Internet bandwidth. the development of an online game, we must consider the time lag problem caused by heterogeneous environments.  In this paper, ...

    Satoru Yamagata, Hiroyuki Nakagawa, Yuichi Sei in Computer and Information Science (2020)

  10. No Access

    Chapter

    Mis.Config: Finding Misreferred Configuration Bugs in Web Application Using Thin Slicing

    There are many web-based applications for multi-agent systems (MAS).  However, develo** MAS is not easy, because agents have many different variables, and it is difficult to validate them.  PHP is one of the...

    Minami Yoda, Yuichi Sei, Yasuyuki Tahara in Computer and Information Science (2020)

  11. No Access

    Chapter

    Multi-task Deep Reinforcement Learning with Evolutionary Algorithm and Policy Gradients Method in 3D Control Tasks

    In    learning, it is  to converge  the  is insufficient or a reward is sparse. Besides, on specific tasks, the amount of exploration may be limited. Therefore, it is considered effective to learn on sourc...

    Shota Imai, Yuichi Sei, Yasuyuki Tahara in Big Data, Cloud Computing, and Data Scienc… (2020)

  12. Article

    Open Access

    “Never fry carrots without chop**” Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process

    Research on deep-training captioning models that modify the natural-language contents of images and moving images has produced considerable results and attracted attention in recent years. In this research, we...

    Tatsuki Fujii, Yuichi Sei, Yasuyuki Tahara in International Journal of Networked and Dis… (2019)

  13. Article

    Open Access

    Do You Like Sclera? Sclera-region Detection and Colorization for Anime Character Line Drawings

    Colorizing line drawings requires special skill, experience, and knowledge. Artists also spend a great deal of time and effort creating art. Given this background, research on automated line drawing colorizati...

    Masashi Aizawa, Yuichi Sei, Yasuyuki Tahara in International Journal of Networked and Dis… (2019)

  14. No Access

    Chapter and Conference Paper

    Text Classification and Transfer Learning Based on Character-Level Deep Convolutional Neural Networks

    Temporal (one-dimensional) Convolutional Neural Network (Temporal CNN, ConvNet) is an emergent technology for text understanding. The input for the ConvNets could be either a sequence of words or a sequence of...

    Minato Sato, Ryohei Orihara, Yuichi Sei in Agents and Artificial Intelligence (2018)

  15. No Access

    Chapter and Conference Paper

    User Participatory Construction of Open Hazard Data for Preventing Bicycle Accidents

    Recently, bicycle-related accidents, e.g., collision accidents at intersection increase and account for approximately 20% of all traffic accidents in Japan; thus, it is regarded as one of the serious social pr...

    Ryohei Kozu, Takahiro Kawamura, Shusaku Egami, Yuichi Sei in Semantic Technology (2017)

  16. No Access

    Chapter and Conference Paper

    Linked Data Collection and Analysis Platform for Music Information Retrieval

    There has been extensive research on music information retrieval (MIR), such as signal processing, pattern mining, and information retrieval. In such studies, audio features extracted from music are commonly u...

    Yuri Uehara, Takahiro Kawamura, Shusaku Egami, Yuichi Sei in Semantic Technology (2016)

  17. No Access

    Chapter

    Sake Selection Support Application for Countryside Tourism

    For the upcoming Tokyo Olympic Paralympic Games in 2020, the number of foreign tourists coming to Japan is expected to rise. However, there has been a problem with tourists becoming less likely to visit places...

    Teruyuki Iijima, Takahiro Kawamura in Transactions on Large-Scale Data- and Know… (2016)

  18. No Access

    Chapter

    A Solution to Visualize Open Urban Data for Illegally Parked Bicycles

    The illegal parking of bicycles is becoming an urban problem in Japan and other countries. We believe the data publication of such urban problems on the Web as Open Data will contribute to solving the problems...

    Shusaku Egami, Takahiro Kawamura, Yuichi Sei in Transactions on Large-Scale Data- and Know… (2016)

  19. No Access

    Chapter and Conference Paper

    Towards the Elimination of the Miscommunication Between Users in Twitter

    In recent years, a Twitter response from another user who does not share the intentions and expectations of the original poster may cause discomfort and stress, which is a social phenomenon known as SNS fatigu...

    Tomoaki Ueda, Ryohei Orihara, Yuichi Sei in AI 2015: Advances in Artificial Intelligen… (2015)

  20. No Access

    Chapter and Conference Paper

    Decision Making Strategy Based on Time Series Data of Voting Behavior

    In gambling such as horse racing, we are sometimes able to peep peculiar voting behavior by a punter with the advantageous information closely related to the results. The punter is often referred as an insider. I...

    Shogo Higuchi, Ryohei Orihara, Yuichi Sei in AI 2015: Advances in Artificial Intelligen… (2015)

previous disabled Page of 2