Zobrazeno 1 - 10
of 543
pro vyhledávání: '"Kouichi Sakurai"'
Publikováno v:
Computers, Vol 13, Iss 10, p 269 (2024)
In recent years, with the development of the Internet of Things and distributed computing, the “server-edge device” architecture has been widely deployed. This study focuses on leveraging autoencoder technology to address the binary classificatio
Externí odkaz:
https://doaj.org/article/7d5d7f71552d4fde8e70ce18f36b6531
Autor:
Kenshi Matsuno, Hideaki Miyamoto, Hideki Kitada, Shinichi Yoshimatsu, Fumio Tamura, Kouichi Sakurai, Kotaro Fukubayashi, Takashi Shono, Hiroko Setoyama, Taichi Matsuyama, Shinichiro Suko, Rei Narita, Munenori Honda, Masakuni Tateyama, Hideaki Naoe, Jun Morinaga, Yasuhito Tanaka, Ryosuke Gushima
Publikováno v:
DEN Open, Vol 3, Iss 1, Pp n/a-n/a (2023)
Abstract Objectives Endoscopic submucosal resection with band ligation (ESMR‐L) and endoscopic submucosal dissection (ESD) are both standard endoscopic resection methods for rectal neuroendocrine tumors (NETs)
Externí odkaz:
https://doaj.org/article/11ff21f9f0f84bca8537b81da6250e2b
Publikováno v:
IEEE Access, Vol 10, Pp 121329-121339 (2022)
Neural networks based cryptography has seen a significant growth since the introduction of adversarial cryptography which makes use of Generative Adversarial Networks (GANs) to build neural networks that can learn encryption. The encryption has been
Externí odkaz:
https://doaj.org/article/ab91e362960346c2ba2472193bce3144
Publikováno v:
IEEE Access, Vol 10, Pp 2546-2563 (2022)
Polynomial multiplication is one of the heaviest operations for a lattice-based public key algorithm in Post-Quantum Cryptography (PQC). Many studies have been done to accelerate polynomial multiplication with newly developed hardware accelerators or
Externí odkaz:
https://doaj.org/article/76c0b2d6d71640a7a6f3f23ff0eb9e2b
Publikováno v:
Information, Vol 14, Iss 3, p 191 (2023)
Cyber attack detection technology plays a vital role today, since cyber attacks have been causing great harm and loss to organizations and individuals. Feature selection is a necessary step for many cyber-attack detection systems, because it can redu
Externí odkaz:
https://doaj.org/article/af400904627145ed988a608d3ff7fcf3
Autor:
Haibo Zhang, Kouichi Sakurai
Publikováno v:
IEEE Access, Vol 9, Pp 48157-48173 (2021)
For software engineering, if two code fragments are closely similar with minor modifications or even identical due to a copy-paste behavior, that is called software/code clone. Code clones can cause trouble in software maintenance and debugging proce
Externí odkaz:
https://doaj.org/article/05a971a60a134f708ee980da7f5837c8
Publikováno v:
IEEE Access, Vol 9, Pp 124727-124740 (2021)
A current trend of research focuses on artificial intelligence based cryptography which although proposed almost thirty years ago could not attract much attention. Abadi and Anderson’s work on adversarial cryptography in 2016 rejuvenated the resear
Externí odkaz:
https://doaj.org/article/bcb66f2eaa4145678ee28a26a077a85b
Autor:
Haibo Zhang, Kouichi Sakurai
Publikováno v:
IEEE Access, Vol 9, Pp 169031-169043 (2021)
Deep learning has become one of the most popular research topics today. Researchers have developed cutting-edge learning algorithms and frameworks around deep learning, applying them to a wide range of fields to solve real-world problems. However, we
Externí odkaz:
https://doaj.org/article/5e4e40997cc44ec688b2226d3fdeb6e6
Autor:
Munenori Honda, Hideaki Naoe, Ryosuke Gushima, Hideaki Miyamoto, Masakuni Tateyama, Kouichi Sakurai, Yasushi Oda, Yoshitaka Murakami, Yasuhito Tanaka
Publikováno v:
PLoS ONE, Vol 16, Iss 1, p e0245211 (2021)
Risk stratification by index colonoscopy is well established for first surveillance endoscopy, but whether the previous two colonoscopies affect the subsequent advanced neoplasias has not been established. Therefore, the subsequent risk based on the
Externí odkaz:
https://doaj.org/article/b497507c08da44a0bd086a12d36a89a6
Autor:
Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai
Publikováno v:
Cryptography, Vol 6, Iss 2, p 20 (2022)
Vehicular Ad-hoc NETworks (VANETs), a special kind of Mobile Ad-hoc NETworks (MANETs), play an important role in Intelligent Transportation Systems (ITS). Via wireless technology, vehicles exchange information related to road conditions and their sta
Externí odkaz:
https://doaj.org/article/4a0eb7c9a16947669aa095949e998ad4