IEICE Transactions on Information and Systems最新文献

筛选
英文 中文
A CNN-Based Multi-Scale Pooling Strategy for Acoustic Scene Classification 基于 CNN 的声学场景分类多尺度池化策略
IF 0.7 4区 计算机科学
IEICE Transactions on Information and Systems Pub Date : 2024-01-01 DOI: 10.1587/transinf.2023edl8048
Rong Huang, Yue Xie
{"title":"A CNN-Based Multi-Scale Pooling Strategy for Acoustic Scene Classification","authors":"Rong Huang, Yue Xie","doi":"10.1587/transinf.2023edl8048","DOIUrl":"https://doi.org/10.1587/transinf.2023edl8048","url":null,"abstract":"","PeriodicalId":55002,"journal":{"name":"IEICE Transactions on Information and Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139126347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Coded Aperture as a Key for Information Hiding Designed by Physics-in-the-Loop Optimization 通过环中物理优化设计的编码光圈作为信息隐藏的密钥
IF 0.7 4区 计算机科学
IEICE Transactions on Information and Systems Pub Date : 2024-01-01 DOI: 10.1587/transinf.2023mup0003
Tomoki Minamata, Hiroki Hamasaki, Hiroshi Kawasaki, H. Nagahara, Satoshi Ono
{"title":"A Coded Aperture as a Key for Information Hiding Designed by Physics-in-the-Loop Optimization","authors":"Tomoki Minamata, Hiroki Hamasaki, Hiroshi Kawasaki, H. Nagahara, Satoshi Ono","doi":"10.1587/transinf.2023mup0003","DOIUrl":"https://doi.org/10.1587/transinf.2023mup0003","url":null,"abstract":"","PeriodicalId":55002,"journal":{"name":"IEICE Transactions on Information and Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139126391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing and Delay-Monitoring for the High Reliability of Memory-Based Programmable Logic Device 测试和延迟监控,实现基于存储器的可编程逻辑器件的高可靠性
IF 0.7 4区 计算机科学
IEICE Transactions on Information and Systems Pub Date : 2024-01-01 DOI: 10.1587/transinf.2023edp7101
Xihong Zhou, Senling Wang, Y. Higami, Hiroshi Takahashi
{"title":"Testing and Delay-Monitoring for the High Reliability of Memory-Based Programmable Logic Device","authors":"Xihong Zhou, Senling Wang, Y. Higami, Hiroshi Takahashi","doi":"10.1587/transinf.2023edp7101","DOIUrl":"https://doi.org/10.1587/transinf.2023edp7101","url":null,"abstract":"","PeriodicalId":55002,"journal":{"name":"IEICE Transactions on Information and Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139125253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech Rhythm-Based Speaker Embeddings Extraction from Phonemes and Phoneme Duration for Multi-Speaker Speech Synthesis 从音素和音素时长中提取基于语音节奏的说话者嵌入,用于多说话者语音合成
IF 0.7 4区 计算机科学
IEICE Transactions on Information and Systems Pub Date : 2024-01-01 DOI: 10.1587/transinf.2023edp7039
Kenichi Fujita, Atsushi Ando, Yusuke Ijima
{"title":"Speech Rhythm-Based Speaker Embeddings Extraction from Phonemes and Phoneme Duration for Multi-Speaker Speech Synthesis","authors":"Kenichi Fujita, Atsushi Ando, Yusuke Ijima","doi":"10.1587/transinf.2023edp7039","DOIUrl":"https://doi.org/10.1587/transinf.2023edp7039","url":null,"abstract":"","PeriodicalId":55002,"journal":{"name":"IEICE Transactions on Information and Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139125324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CQTXNet: A Modified Xception Network with Attention Modules for Cover Song Identification CQTXNet:带有注意力模块的改进型 Xception 网络:用于识别翻唱歌曲
IF 0.7 4区 计算机科学
IEICE Transactions on Information and Systems Pub Date : 2024-01-01 DOI: 10.1587/transinf.2023mul0003
Jinsoo Seo, Junghyun Kim, Hyemi Kim
{"title":"CQTXNet: A Modified Xception Network with Attention Modules for Cover Song Identification","authors":"Jinsoo Seo, Junghyun Kim, Hyemi Kim","doi":"10.1587/transinf.2023mul0003","DOIUrl":"https://doi.org/10.1587/transinf.2023mul0003","url":null,"abstract":"","PeriodicalId":55002,"journal":{"name":"IEICE Transactions on Information and Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139128549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inference Discrepancy Based Curriculum Learning for Neural Machine Translation 基于推理差异的神经机器翻译课程学习
IF 0.7 4区 计算机科学
IEICE Transactions on Information and Systems Pub Date : 2024-01-01 DOI: 10.1587/transinf.2023edp7048
Lei Zhou, Ryohei Sasano, Koichi Takeda
{"title":"Inference Discrepancy Based Curriculum Learning for Neural Machine Translation","authors":"Lei Zhou, Ryohei Sasano, Koichi Takeda","doi":"10.1587/transinf.2023edp7048","DOIUrl":"https://doi.org/10.1587/transinf.2023edp7048","url":null,"abstract":"","PeriodicalId":55002,"journal":{"name":"IEICE Transactions on Information and Systems","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139129809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DFT and IWT-DCT Based Image Watermarking Scheme for Industry 一种基于DFT和IWT-DCT的工业图像水印方案
4区 计算机科学
IEICE Transactions on Information and Systems Pub Date : 2023-11-01 DOI: 10.1587/transinf.2022edl8108
Lei LI, Hong-Jun ZHANG, Hang-Yu FAN, Zhe-Ming LU
{"title":"A DFT and IWT-DCT Based Image Watermarking Scheme for Industry","authors":"Lei LI, Hong-Jun ZHANG, Hang-Yu FAN, Zhe-Ming LU","doi":"10.1587/transinf.2022edl8108","DOIUrl":"https://doi.org/10.1587/transinf.2022edl8108","url":null,"abstract":"Until today, digital image watermarking has not been large-scale used in the industry. The first reason is that the watermarking efficiency is low and the real-time performance cannot be satisfied. The second reason is that the watermarking scheme cannot cope with various attacks. To solve above problems, this paper presents a multi-domain based digital image watermarking scheme, where a fast DFT (Discrete Fourier Transform) based watermarking method is proposed for synchronization correction and an IWT-DCT (Integer Wavelet Transform-Discrete Cosine Transform) based watermarking method is proposed for information embedding. The proposed scheme has high efficiency during embedding and extraction. Compared with five existing schemes, the robustness of our scheme is very strong and our scheme can cope with many common attacks and compound attacks, and thus can be used in wide application scenarios.","PeriodicalId":55002,"journal":{"name":"IEICE Transactions on Information and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135161373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Techniques for Identifying the Mode of a Multi-Functional Radar with Varying Pulse Sequences 变脉冲序列多功能雷达模式识别的无监督技术
4区 计算机科学
IEICE Transactions on Information and Systems Pub Date : 2023-11-01 DOI: 10.1587/transinf.2023edp7007
Jayson ROOK, Chi-Hao CHENG
{"title":"Unsupervised Techniques for Identifying the Mode of a Multi-Functional Radar with Varying Pulse Sequences","authors":"Jayson ROOK, Chi-Hao CHENG","doi":"10.1587/transinf.2023edp7007","DOIUrl":"https://doi.org/10.1587/transinf.2023edp7007","url":null,"abstract":"A multifunctional radar (MFR) with varying pulse sequences can change its signal characteristics and/or pattern, based on the presence of targets and to avoid being jammed. To take a countermeasure against an MFR, it is crucial for an electronic warfare (EW) system to be able to identify and separate a MFR's modes via analyzing intercepted radar signals, without a priori knowledge. In this article, two correlation-based methods, one taking the signal's order into account and another one ignoring the signal's order, are proposed and investigated for this task. The results demonstrate their great potential.","PeriodicalId":55002,"journal":{"name":"IEICE Transactions on Information and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135162285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kiite Cafe: A Web Service Enabling Users to Listen to the Same Song at the Same Moment While Reacting to the Song Kiite Cafe:一种网络服务,允许用户在同一时刻听同一首歌,同时对这首歌做出反应
4区 计算机科学
IEICE Transactions on Information and Systems Pub Date : 2023-11-01 DOI: 10.1587/transinf.2023edp7001
Kosetsu TSUKUDA, Keisuke ISHIDA, Masahiro HAMASAKI, Masataka GOTO
{"title":"Kiite Cafe: A Web Service Enabling Users to Listen to the Same Song at the Same Moment While Reacting to the Song","authors":"Kosetsu TSUKUDA, Keisuke ISHIDA, Masahiro HAMASAKI, Masataka GOTO","doi":"10.1587/transinf.2023edp7001","DOIUrl":"https://doi.org/10.1587/transinf.2023edp7001","url":null,"abstract":"This paper describes a public web service called Kiite Cafe that lets users get together virtually to listen to music. When users listen to music on Kiite Cafe, their experiences are enhanced by two architectures: (i) visualization of each user's reactions, and (ii) selection of songs from users' favorite songs. These architectures enable users to feel social connection with others and the joy of introducing others to their favorite songs as if they were together listening to music in person. In addition, the architectures provide three user experiences: (1) motivation to react to played songs, (2) the opportunity to listen to a diverse range of songs, and (3) the opportunity to contribute as a curator. By analyzing the behavior logs of 2,399 Kiite Cafe users over a year, we quantitatively show that these user experiences can generate various effects (e.g., users react to a more diverse range of songs on Kiite Cafe than when listening alone). We also discuss how our proposed architectures can enrich music listening experiences with others.","PeriodicalId":55002,"journal":{"name":"IEICE Transactions on Information and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135161862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing Region-Based Segmentation for Hardware Trojan Detection in FPGAs Cell-Level Netlist 基于区域分割的fpga单元级网表硬件木马检测
4区 计算机科学
IEICE Transactions on Information and Systems Pub Date : 2023-11-01 DOI: 10.1587/transinf.2023edl8036
Ann Jelyn TIEMPO, Yong-Jin JEONG
{"title":"Implementing Region-Based Segmentation for Hardware Trojan Detection in FPGAs Cell-Level Netlist","authors":"Ann Jelyn TIEMPO, Yong-Jin JEONG","doi":"10.1587/transinf.2023edl8036","DOIUrl":"https://doi.org/10.1587/transinf.2023edl8036","url":null,"abstract":"Field Programmable Gate Array (FPGA) is gaining popularity because of their reconfigurability which brings in security concerns like inserting hardware trojan. Various detection methods to overcome this threat have been proposed but in the ASIC's supply chain and cannot directly apply to the FPGA application. In this paper, the authors aim to implement a structural feature-based detection method for detecting hardware trojan in a cell-level netlist, which is not well explored yet, where the nets are segmented into smaller groups based on their interconnection and further analyzed by looking at their structural similarities. Experiments show positive performance with an average detection rate of 95.41%, an average false alarm rate of 2.87% and average accuracy of 96.27%.","PeriodicalId":55002,"journal":{"name":"IEICE Transactions on Information and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135161556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信