Loading [MathJax]/extensions/MathZoom.js
Tsuyoshi Isshiki - IEEE Xplore Author Profile

Showing 1-25 of 73 results

Filter Results

Show

Results

Plant segmentation is an important task for the smart agricultural field. This paper proposes a deep learning architecture that integrates image features and mask features for improved segmentation accuracy. The proposed model leverages attention mechanisms to effectively combine information from time-lapse images and masks, resulting in more precise segmentation. The experimental results demonstr...Show More
You Look Only Once (YOLO) is a highly popular object detection framework known for achieving an optimal balance between speed and accuracy. It has gained widespread adoption across diverse domains due to its exceptional performance. In this paper, we present an end-to-end runtime-configurable DNN accelerator based on the RISC-V architecture targeting at YOLOv8s model with Int8 precision. Additiona...Show More
Air pollution has become a big issue in the Northern part of Thailand due to forest fires, human activities, and seasonal climate. The air pollutant particulate matter (PM10) measurements from the Pollution Control Department (PCD) stations contain some missing values, which limit the capability in time-series prediction of future pollutant quantity. This research performs a preliminary study of P...Show More
Biometric authentication, especially in speaker verification, has seen significant advancements recently. Despite these significant strides, compelling evidence highlights the ongoing vulnerability to spoofing attacks, requiring specialized countermeasures to detect various attack types. This paper specifically focuses on detecting replay, speech synthesis, and voice conversion attacks. In our spo...Show More
The convolution neural network (CNN) is widely used in many aspects, such as Speech Recognition, Face Detection, and Image Classification. Utilizing a GPU is the traditional way of implementing CNN, which is fast but inefficient. In pursuit of lower power consumption and higher efficiency, we prefer application-specific hardware computing. This paper proposes a run-time reconfigurable CNN accelera...Show More
High-valued products require an authentication method to provide the customers with a way to verify the product's genuineness. As the product's authenticity dramatically increases its value, the authentication method has to be reliable and secure. High-valued melon, a popular gift in Japan, is a suitable product for applying rind pattern identification, providing a new means of authenticity verifi...Show More
Even though agriculture practices have been continuously developed with the support of modern technologies, many more improvements can be made to enhance agricultural technologies and businesses. One such technology is the use of specific light color combinations to optimize the growth rate of plants. One obvious drawback is that plants’ color will change according to the light color combinations....Show More
Visual simultaneous localization and mapping (VS-LAM) is the useful algorithm for localizing and mapping especially for the indoor mobile robot application. The VSLAM works based on features extracted from surrounding images. The limitation of VSLAM is that a speed of its relocalization algorithm is slow due to a large number of candidates. This research aims to improve the relocalization of VSLAM...Show More
This paper proposes the use of relative barometric pressure sensors for enhancing the accuracy of fall detection based on a tri-axial accelerometer. In this study, a device consisting of a tri-axial accelerometer and a barometric pressure sensor was placed on a subject's waist and another reference barometric pressure sensor is placed on the wall. The data is collected while the subject is perform...Show More
In this paper, we propose a method to directly describe the RTL structure of a pipelined RISC- V processor with cache, memory management unit (MMD) and AXI bus interface using C++ language. This processor C++ model serves as a near cycle-accurate simulation model of the RISC- V core, while our C2RTL framework translates the processor C++ model into cycle-accurate RTL description in Verilog-HDL and...Show More
Poverty is rampant and very crucial issue in developing countries. Therefore, in this paper, we explore the implementation of machine learning on the estimation of poverty by training input data from widely available and accessible open-source, including nighttime lights (NTL) and OpenStreetMap (OSM) data. We propose this approach as a straightforward, cost-effective and alternative option for pre...Show More
This paper proposes the use of relative barometric pressure sensors for enhancing the accuracy of human activity detection based on a tri-axial accelerometer. In our experiment, we employ a device consisting of a tri-axial accelerometer and a barometric pressure sensor on 12 subjects' waists while they are performing different sequences of activities of sitting, standing, walking, and lying. We al...Show More
The deployment of Wireless Sensor Nodes which often deploy in large number, are required to be self-sustainable by utilizing Energy Harvesters for harvesting ambient energy as the node's power source. Several energy managements schemes have been proposed, dealing with the intermittent power generation problem introduced by the harvester. However, reliability and transmission consistency of the nod...Show More
This paper presents a solution for a small area (partial-to-partial) fingerprint verification, which is suitable for mobile devices with small fingerprint sensors. Since images captured from the fingerprint sensor contain very limited minutiae features and less image overlapping areas between the input image and the template image, the minutiae-based method is hardly used. We propose a new approac...Show More
Speaker recognition is a task of identifying/verifying individual identity with the help of input voice sample. Speaker recognition is further classified into speaker identification (SI) and speaker verification (SV). Unlike other approaches using ELSDSR speech database, which only focuses on speaker identification performance, proposed work also focuses on speaker verification performance results...Show More
Gradient Boosted Tree is most effective and standard machine learning algorithm in many fields especially with various type of tabular dataset. Besides, recent industry field and robotics field require high-speed, power efficient and real-time training with enormous data. FPGA is effective device which enable custom domain specific approach to give acceleration as well as power efficiency. We intr...Show More
The 2-D Forward-looking Sonar (2D-FLS) is a new technology of sonar signals that increases the performance of underwater exploration of an Autonomous Underwater Vehicle (AUV). Because the AUV is a fully automatic robot that can handle various missions and does not require humans to control its operation, FLS is the best tool for underwater navigation in poor visibility conditions. In this paper, w...Show More
Autonomous underwater vehicles (AUVs), unmanned underwater vehicles, provide lower operation costs in underwater pipeline inspection than remotely operated vehicles (ROVs), since there is no need for a human operator. However, the navigation algorithm is an important part of the successful deployment of AUVs. In this work, we propose an algorithm that extracts the direction of a pipeline based on ...Show More
Autonomous underwater vehicles (AUVs), unmanned underwater vehicles, are cheaper to operate than remotely operated vehicles (ROVs), since an AUV does not require a trained human operator to control. As a result, in this paper, we propose the pipeline tracking algorithm using sequences of the forward-looking sonar (FLS) images installed on a preprogram AUV. The FLS is more suitable to be used in th...Show More
Speaker recognition is a biometric technique which uses individual speakers voice samples as a input for recognition purpose. Main goal of this work is to obtain better accuracy for speaker recognition system for large number of voice database. In this paper, a comparative study is made between various combinations of features for speaker identification system with feedforward artificial neural ne...Show More
This paper presents a pose planning method for ROS-based mobile robot equipped with an onboard computer. The system aims for archiving a remote 3D reconstruction using an onboard RGB-D camera and mobile robots autonomously. To plan a robot pose with a good view point for fixed position of an onboard camera configuration is a task we are addressing in this work. The proposed method is just a part o...Show More
The Aerial Patrol System using helicopter is an effective method to inspect power transmission line in complicated geographical terrains. However, it uses a large number of man-hour to manually process the video sequence to a useful database. This paper proposes a procedure to automate the analysis using Canny Edge Detection and Hough Transform to detect the object then using Geometry Information ...Show More
The uncontrollable weather conditions can cause a serious problem to remote sensing imaginary. One of the weather conditions is a resulting from cloud contamination. As a result, this paper proposed the use of the convolutional autoencoder neural networks to remove clouds from cloud-contaminated images by training on a multi-temporal remote sensing dataset. Here, the observations from different sp...Show More
A mixed pixel in remote sensed images is a major problem, and the super-resolution mapping is one of the approach to deal with this problem. In this paper, we address the problem of super-resolution mapping by combining a set of random forests with a Markov random field (MRF) model. Here, a random forest is trained to estimate a class proportion of only one land cover class. Thus, there are equal ...Show More