{"id":864,"date":"2025-03-01T16:24:42","date_gmt":"2025-03-01T07:24:42","guid":{"rendered":"https:\/\/wps.itc.kansai-u.ac.jp\/s-yos\/?p=864"},"modified":"2025-03-02T16:26:56","modified_gmt":"2025-03-02T07:26:56","slug":"ieice-transactions-on-fundamentals%e3%81%ab%e8%ab%96%e6%96%87%e3%81%8c%e6%8e%a1%e9%8c%b2%e3%81%95%e3%82%8c%e3%81%be%e3%81%97%e3%81%9f","status":"publish","type":"post","link":"https:\/\/wps.itc.kansai-u.ac.jp\/s-yos\/2025\/03\/864\/","title":{"rendered":"IEICE Transactions on Fundamentals\u306b\u8ad6\u6587\u304c\u63a1\u9332\u3055\u308c\u307e\u3057\u305f"},"content":{"rendered":"\n<p>\u5f53\u7814\u7a76\u5ba4\u306e\u8ad6\u6587\u304cIEICE Transactions on Fundamentals\u306b\u63a1\u9332\u3055\u308c\u307e\u3057\u305f\u3002<\/p>\n\n\n\n<p>R. Yoshida, S. Yoshida, and M. Muneyasu: Embedding Learning with Relational Heterogeneous Information in Social Network Posts to Detect Malicious Behavior, IEICE Trans. Fundamentals, vol. E108-A, no. 3, pp. 295-303, Mar. 2025 DOI: <a href=\"https:\/\/doi.org\/10.1587\/transfun.2024SMP0004\">10.1587\/transfun.2024SMP0004<\/a><\/p>\n\n\n\n<p><strong>\u6982\u8981<\/strong><\/p>\n\n\n\n<p>\u3053\u306e\u8ad6\u6587\u306f\u3001SNS\u4e0a\u306e\u60aa\u610f\u306e\u3042\u308b\u6295\u7a3f\u3092\u691c\u51fa\u3059\u308b\u305f\u3081\u306e\u65b0\u3057\u3044\u624b\u6cd5\u3092\u63d0\u6848\u3057\u3066\u3044\u307e\u3059\u3002\u73fe\u5728\u306eSNS\u3067\u306f\u81ea\u7531\u306a\u610f\u898b\u4ea4\u63db\u304c\u53ef\u80fd\u306b\u306a\u308b\u4e00\u65b9\u3067\u3001\u30d8\u30a4\u30c8\u30b9\u30d4\u30fc\u30c1\u3084\u653b\u6483\u7684\u767a\u8a00\u3001\u8aa4\u60c5\u5831\u306e\u62e1\u6563\u306a\u3069\u306e\u60aa\u610f\u3042\u308b\u6295\u7a3f\u304c\u554f\u984c\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n\n\n\n<p>\u5f93\u6765\u306e\u624b\u6cd5\u3067\u306f\u6295\u7a3f\u30c6\u30ad\u30b9\u30c8\u306e\u610f\u5473\u89e3\u6790\u304c\u4e2d\u5fc3\u3067\u3057\u305f\u304c\u3001\u672c\u7814\u7a76\u3067\u306f\u6295\u7a3f\u306e\u6587\u8108\u60c5\u5831\u3092\u5229\u7528\u3059\u308b\u305f\u3081\u3001\u30e6\u30fc\u30b6\u30fc\u3001\u6295\u7a3f\u3001\u30cf\u30c3\u30b7\u30e5\u30bf\u30b0\u3001\u30a8\u30f3\u30c6\u30a3\u30c6\u30a3\u306a\u3069\u306e\u591a\u69d8\u306a\u8981\u7d20\u3092\u542b\u3080\u62e1\u5f35\u7570\u7a2e\u30b0\u30e9\u30d5\u3092\u69cb\u7bc9\u3057\u307e\u3057\u305f\u3002\u3055\u3089\u306b\u3001\u7570\u7a2e\u30b0\u30e9\u30d5\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30de\u30fc\uff08HGT\uff09\u3092\u6d3b\u7528\u3057\u3066\u7570\u7a2e\u60c5\u5831\u306e\u95a2\u4fc2\u6027\u3092\u52b9\u679c\u7684\u306b\u5b66\u7fd2\u3059\u308b\u65b0\u3057\u3044\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3092\u958b\u767a\u3057\u307e\u3057\u305f\u3002<\/p>\n\n\n\n<p>COVID-19\u30ef\u30af\u30c1\u30f3\u306b\u95a2\u3059\u308b\u5b9f\u969b\u306eSNS\u30c7\u30fc\u30bf\u3092\u7528\u3044\u305f\u5b9f\u9a13\u306b\u3088\u308a\u3001\u63d0\u6848\u624b\u6cd5\u304c\u5f93\u6765\u624b\u6cd5\u3068\u6bd4\u8f03\u3057\u3066\u60aa\u610f\u3042\u308b\u6295\u7a3f\u306e\u691c\u51fa\u7cbe\u5ea6\u3092\u5927\u5e45\u306b\u5411\u4e0a\u3055\u305b\u308b\u3053\u3068\u3092\u793a\u3057\u307e\u3057\u305f\u3002\u3053\u306e\u7814\u7a76\u306f\u3001SNS\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306b\u304a\u3051\u308b\u5b89\u5168\u6027\u5411\u4e0a\u3068\u5065\u5168\u306a\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u74b0\u5883\u306e\u7dad\u6301\u306b\u8ca2\u732e\u3057\u307e\u3059\u3002<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>S. Yoshida, N. Yatoh, and M. Muneyasu: Aesthetic Evaluation of Chinese Calligraphy Using TabNet: Interpretability and Novel Features for Improved Accuracy, IEICE Trans. Fundamentals, vol. E108-A, no. 3, pp. 357-361, Mar. 2025 DOI: <a href=\"https:\/\/doi.org\/10.1587\/transfun.2024SML0003\">10.1587\/transfun.2024SML0003<\/a><\/p>\n\n\n\n<p><strong>\u6982\u8981<\/strong><\/p>\n\n\n\n<p>\u3053\u306e\u8ad6\u6587\u306f\u3001\u4e2d\u56fd\u66f8\u9053\u306e\u7f8e\u7684\u8a55\u4fa1\u306b\u304a\u3051\u308b\u4eba\u5de5\u77e5\u80fd\u306e\u5fdc\u7528\u306b\u95a2\u3059\u308b\u7814\u7a76\u3067\u3059\u3002\u4e2d\u56fd\u66f8\u9053\u306f\u6587\u5316\u7684\u306b\u91cd\u8981\u306a\u82b8\u8853\u5f62\u5f0f\u3067\u3059\u304c\u3001\u305d\u306e\u7f8e\u7684\u4fa1\u5024\u3092\u5ba2\u89b3\u7684\u304b\u3064\u89e3\u91c8\u53ef\u80fd\u306a\u65b9\u6cd5\u3067\u8a55\u4fa1\u3059\u308b\u3053\u3068\u306f\u96e3\u3057\u3044\u8ab2\u984c\u3067\u3059\u3002<\/p>\n\n\n\n<p>\u672c\u7814\u7a76\u3067\u306f\u3001\u6df1\u5c64\u5b66\u7fd2\u624b\u6cd5\u3067\u3042\u308bTabNet\u3092\u6d3b\u7528\u3057\u3001\u5f93\u6765\u306e22\u500b\u306e\u30b0\u30ed\u30fc\u30d0\u30eb\u5f62\u72b6\u7279\u5fb4\u306b10\u500b\u306e\u65b0\u3057\u3044\u7279\u5fb4\u3092\u8ffd\u52a0\u3057\u3066\u3001\u66f8\u9053\u4f5c\u54c1\u306e\u7f8e\u7684\u8a55\u4fa1\u306e\u7cbe\u5ea6\u3068\u89e3\u91c8\u53ef\u80fd\u6027\u3092\u5411\u4e0a\u3055\u305b\u307e\u3057\u305f\u3002TabNet\u306e\u7279\u5fb4\u9078\u629e\u6a5f\u80fd\u306b\u3088\u308a\u3001\u4e88\u6e2c\u306b\u5bc4\u4e0e\u3059\u308b\u91cd\u8981\u306a\u7279\u5fb4\u3092\u7279\u5b9a\u3067\u304d\u308b\u305f\u3081\u3001\u8a55\u4fa1\u7d50\u679c\u306e\u7406\u7531\u3092\u660e\u78ba\u306b\u8aac\u660e\u3059\u308b\u3053\u3068\u304c\u53ef\u80fd\u306b\u306a\u308a\u307e\u3057\u305f\u3002<\/p>\n\n\n\n<p>\u4e2d\u56fd\u66f8\u9053\u7f8e\u7684\u8a55\u4fa1\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\uff08CHAED\uff09\u3092\u7528\u3044\u305f\u5b9f\u9a13\u3067\u306f\u3001\u63d0\u6848\u624b\u6cd5\u304c\u5f93\u6765\u306e\u56de\u5e30\u30e2\u30c7\u30eb\u3068\u6bd4\u8f03\u3057\u3066\u512a\u308c\u305f\u7cbe\u5ea6\u3092\u9054\u6210\u3057\u307e\u3057\u305f\u3002\u3055\u3089\u306b\u3001TabNet\u306e\u89e3\u91c8\u53ef\u80fd\u6027\u306b\u3088\u308a\u3001\u66f8\u9053\u8a55\u4fa1\u306b\u304a\u3044\u3066\u91cd\u8981\u306a\u7279\u5fb4\uff08\u6587\u5b57\u306e\u30d0\u30e9\u30f3\u30b9\u3001\u30b9\u30c8\u30ed\u30fc\u30af\u306e\u5bc6\u5ea6\u306a\u3069\uff09\u3092\u7279\u5b9a\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3057\u305f\u3002\u3053\u306e\u7814\u7a76\u306f\u3001\u82b8\u8853\u8a55\u4fa1\u306b\u304a\u3051\u308b\u4eba\u5de5\u77e5\u80fd\u306e\u5fdc\u7528\u306b\u65b0\u305f\u306a\u8996\u70b9\u3092\u3082\u305f\u3089\u3057\u307e\u3059\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5f53\u7814\u7a76\u5ba4\u306e\u8ad6\u6587\u304cIEICE Transactions on Fundamentals\u306b\u63a1\u9332\u3055\u308c\u307e\u3057\u305f\u3002 R. Yoshida, S. Yoshida, and M. Muneyasu: Embedding Learnin [&hellip;]<\/p>\n","protected":false},"author":285,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-864","post","type-post","status-publish","format-standard","hentry","category-publications"],"_links":{"self":[{"href":"https:\/\/wps.itc.kansai-u.ac.jp\/s-yos\/wp-json\/wp\/v2\/posts\/864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wps.itc.kansai-u.ac.jp\/s-yos\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wps.itc.kansai-u.ac.jp\/s-yos\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wps.itc.kansai-u.ac.jp\/s-yos\/wp-json\/wp\/v2\/users\/285"}],"replies":[{"embeddable":true,"href":"https:\/\/wps.itc.kansai-u.ac.jp\/s-yos\/wp-json\/wp\/v2\/comments?post=864"}],"version-history":[{"count":1,"href":"https:\/\/wps.itc.kansai-u.ac.jp\/s-yos\/wp-json\/wp\/v2\/posts\/864\/revisions"}],"predecessor-version":[{"id":865,"href":"https:\/\/wps.itc.kansai-u.ac.jp\/s-yos\/wp-json\/wp\/v2\/posts\/864\/revisions\/865"}],"wp:attachment":[{"href":"https:\/\/wps.itc.kansai-u.ac.jp\/s-yos\/wp-json\/wp\/v2\/media?parent=864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wps.itc.kansai-u.ac.jp\/s-yos\/wp-json\/wp\/v2\/categories?post=864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wps.itc.kansai-u.ac.jp\/s-yos\/wp-json\/wp\/v2\/tags?post=864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}