Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Kazunori Imoto"'
Publikováno v:
ICMLA
Generative adversarial networks (GANs) have shown promise for various problems including anomaly detection. When anomaly detection is performed using GAN models that learn only the features of normal data samples, data that are not similar to normal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4db92fdb7fc371aba4f801c07871d99a
Publikováno v:
2018 International Symposium on Semiconductor Manufacturing (ISSM).
In this paper, we focus on a defect analysis task that requires engineers to identify the causes of yield reduction from defect classification results. We organize the analysis work into three phases: defect classification, defect trend monitoring an
Autor:
Kazunori Imoto, Izumi Fukunaga
Publikováno v:
The Proceedings of Mechanical Engineering Congress, Japan. 2018:J1630107
Publikováno v:
SIGGRAPH Posters
In maintenance of electric power control panels, a worker has to do a lot of manual work such as pushing buttons and turning on/off selector switches. Therefore, a hands-free gesture operating system is needed. Tsukada [Tsukada et al. 2002] proposed
Autor:
Taishii Shimomori, Yasuyuki Masai, Noriko Yamanaka, Munehiko Sasajima, Kazunori Imoto, Makoto Yajima
Publikováno v:
IUI
This paper introduces a new tool for supporting multilingual communication between speakers of different languages. Conventional tools such as electronic dictionaries enable users to communicate basic intentions to others, but are often insufficient
Publikováno v:
IEEE Transactions on Semiconductor Manufacturing; Nov2019, Vol. 32 Issue 4, p455-459, 5p
Publikováno v:
ReCALL; May2004, Vol. 16 Issue 1, p173-188, 16p
Autor:
Michael Harvey
Explore powerful SAS analytics and the Internet of Things! The world that we live in is more connected than ever before. The Internet of Things (IoT) consists of mechanical and electronic devices connected to one another and to software through the i
Autor:
Jamil Ammar, Songhua Xu
This book is designed to provide specialists, spectators, and students with a brief and engaging exploration of media usage by radical groups and the laws regulating these grey areas of Jihadi propaganda activities. The authors investigate the use o