Loading [a11y]/accessibility-menu.js
R. Yamamoto - IEEE Xplore Author Profile

Showing 1-25 of 35 results

Filter Results

Show

Results

Remote sensing scene knowledge graphs symbolically describe the concepts of scenes and reveal their interrelations, highlighting robust knowledge modeling and inference capabilities in zero-shot remote sensing scene classification tasks. However, current graphs rely heavily on expert manual interpretation, making them susceptible to human biases and difficult to expand. They also lack quantitative...Show More
In recent years, there have been significant advancements in hyperspectral image (HSI) classification methods using contrastive learning. However, these methods often fail to effectively screen and mine negative samples during the construction of contrastive learning pairs. This oversight introduces negative samples that belong to the same class as the positive samples, thereby limiting the effect...Show More
In this study, the extraction of sea ice drift from imagery captured by the 1-meter C-SAR 01 satellite (C-SAR/01) was facilitated utilizing the oriented fast and rotated brief algorithm within the feature tracking procedure, thus addressing the previously unexplored area of sea ice drift extraction using C-SAR/01 imagery. The retained keypoints and nearest neighbor distance ratio test for sea ice ...Show More
A new method, which integrates multivariable consisting of soil moisture (SM) active passive (SMAP)-derived SM and vegetation optical depth, the water seasonality, geolocation, digital elevation model (DEM), slope, and biomass as inputs and adopts the technique of bootstrap aggregation of regression trees (BARTs), is proposed for retrieving monthly surface water fraction (SWF) at a spatial resolut...Show More
Zero-shot remote sensing scene classification refers to making the model to have the ability to identify the unseen class scenes based on seen class scenes, and has become a research hotspot in the field of remote sensing. Contemporary approaches in zero-shot remote sensing scene classification primarily focus on extracting global information from scenes, neglecting nuanced local landscape feature...Show More
Monkey, a random testing tool from Google, has been popularly used in industrial practices for automatic test input generation for Android due to its applicability to a variety of application settings, e.g., ease of use and compatibility with different Android platforms. Recently, Monkey has been under the spotlight of the research community: recent studies found out that none of the studied tools...Show More
Unlike the Web where each web page has a global URL to reach, a specific "content page" inside a mobile app cannot be opened unless the user explores the app with several operations from the landing page. Recently, deep links have been advocated by major companies to enable targeting and opening a specific page of an app externally with an accessible uniform resource identifier (URI). In this pape...Show More
This paper investigates the advanced IGBT gate driving strategies which optimizes its switching behaviours and compares with the conventional driving method. The optimal IGBT performance not only relies on its advanced semiconductor design and fabrication techniques, but also the optimized local control and protection from intelligent gate drivers and global converter control strategy. An advanced...Show More
To realize high-resolution SAR imaging, the amount of the raw data required for imaging is very large. Compressed Sensing (CS) can sample the raw data at a frequency lower than Nyquist frequency and image without losing resolution . In this paper, we propose an improved CS algorithm and employ it in SAR imaging to reduce the amount of data required for imaging. This algorithm improve the reconstru...Show More
Pure polyvinylpyrrolidone (PVP) film, reduced graphene oxide (RGO) film and PVP/RGO composite film were coated on quartz crystal microbalance (QCM) for nitrogen oxide (NO2) sensing at room temperature. These films were characterized by Fourier transform infrared spectroscopy (FTIR) and scanning electron microscopy (SEM), respectively. Because only a few RGO were deposited on QCM, the sensor based ...Show More
The Camellia algorithm has four S boxes called as S1, S2, S3 and S4. Because the S1-box is the core of other S boxes, the avalanche property of S boxes can be studied through testing the avalanche property of S1-box. The test results show that the Camellia S-box basically meet the strict avalanche criterion.Show More
The avalanche effect is an important performance that any block cipher must have. With the AES algorithm program and experiments, we fully test and research the avalanche effect performance of the AES algorithm, and give the changed cipher bit numbers when respectively changing every bit of the plaintext and key in turn. The test results show that the AES algorithm has very good avalanche effect P...Show More
Based on the finite field theory, a common matrix equation on g-function of S1-box of Camellia algorithm is deduced, which is clear more than Camellia documents and very useful to understanding and using Camellia algorithm.Show More
NAND flash memory has been successfully employed in mobile devices like PDAs and laptops. With recent advances in capacity, bandwidth, and durability, NAND flash memory based Solid State Disk (SSD) is starting to replace hard disk drive (HDD) in desktop systems. Integrating SSD into enterprise storage systems, however, is much more challenging. One of the major challenges is that server applicatio...Show More
Wastewater treatment plants (WWTPs) emit greenhouse gas (GHG), which may lead to climate change and global warming effect. During recent years, the increase of the number of WWTPs in China has made the study of the GHG emissions from WWTPs extremely important. This paper presents a complete estimation procedure of GHG generation by considering direct GHG emissions, indirect emissions from energy c...Show More
With the rapid growth of web information, there is an increasing need to easily and efficiently acquire accurate information from the massive and heterogamous web. Web information extraction is such a research area to meet these needs. In this paper, we analyze the shortcomings of related researches and systems and find that when extracting accurate web information with complex structures, few sys...Show More
IP-XACT is a well accepted standard for the exchange of IP components at Electronic System and Register Transfer Level. Still, the creation and manipulation of these descriptions at the XML level can be time-consuming and error-prone. In this paper, we show that the UML can be consistently applied as an efficient and comprehensible frontend for IP-XACT-based IP description and integration. For thi...Show More
Unit testing is a technique of testing a single unit of a program in isolation. The testability of the unit under test can be reduced when the unit interacts with its environment. The construction of high-covering unit tests and their execution require appropriate interactions with the environment such as a file system or database. To help set up the required environment, developers can use mock o...Show More
Energy harvesting with the piezoelectric cantilever was studied under vibration environment. A theoretical model of piezoelectric cantilever was developed to determine the magnitude of power. The results predicted by the theoretical model were validated by the experimental data. Compared with the rectangular layer piezoelectric cantilever, the trapezoidal piezoelectric cantilever generated higher ...Show More
A linear ultrasonic motor using longitudinal and bending (L-B) vibration hybrid Langevin transducer was developed to achieve high output power. The motor consist two exponential shape horns intersected at tip ends where located a single driving foot. L-B vibrations were superimposed in the elastic body of the motor and generated elliptical trajectory at driving foot which can actuate linearly. The...Show More
Test-case prioritization is a typical scenario of regression testing, which plays an important role in software maintenance. With the popularity of Web services, integrating Web services to build service-centric systems (SCSs) has attracted attention of many researchers and practitioners. During regression testing, as SCSs may use up constituent Web servicespsila request quotas (e.g., the upper li...Show More
Mainstream energy conservation schemes for disk arrays inherently affect the reliability of disks. A thorough understanding of the relationship between energy saving techniques and disk reliability is still an open problem, which prevents effective design of new energy saving techniques and application of existing approaches in reliability-critical environments. As one step towards solving this pr...Show More
Applications like cluster-based Video-On-Demand (VOD) systems are inherently data-intensive because clients frequently retrieve data stored on a distributed storage subsystem interconnected by a high-speed local network. To meet the Quality-of-Service (QoS) imposed by the clients, quick responses to access requests are fundamental for these applications. Among the numerous ways to reduce response ...Show More
To ease the burden of implementing and maintaining access-control aspects in a system, a growing trend among developers is to write access-control policies in a specification language such as XACML and integrate the policies with applications through the use of a policy decision point (PDP). To assure that the specified polices reflect the expected ones, recent research has developed policy verifi...Show More
Security-sensitive applications that access and generate large data sets are emerging in various areas such as bioinformatics and high energy physics. Data grids provide data-intensive applications with a large virtual storage framework with unlimited power. However, conventional scheduling algorithms for data grids are inadequate to meet the security needs of dataintensive applications. To remedy...Show More