default search action
Zensho Nakao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [j17]Shinya Nozaki, Yen-Wei Chen, Rumiko Azuma, Zensho Nakao, Yoshinori Namihira:
A Fourier Series Based Method of CT Image Reconstruction for Laser Fusion Research. Int. J. Adv. Comp. Techn. 2(3): 102-113 (2010)
2000 – 2009
- 2008
- [c53]Hanane H. Mirza, Hien D. Thai, Zensho Nakao:
Color Image Watermarking and Self-recovery Based on Independent Component Analysis. ICAISC 2008: 839-849 - [c52]Tomoko Tateyama, Zensho Nakao, Yen-Wei Chen:
Classification of Brain Matters in MRI by Kernel Independent Component Analysis. IIH-MSP 2008: 713-716 - [c51]Hanane H. Mirza, Hien D. Thai, Zensho Nakao:
A new intelligent digital right management technique for E-learning content. IJCNN 2008: 3577-3581 - [c50]Hanane H. Mirza, Hien D. Thai, Zensho Nakao:
Digital Video Watermarking Based on RGB Color Channels and Principal Component Analysis. KES (2) 2008: 125-132 - [c49]Alexander Adli, Hanane H. Mirza, Zensho Nakao:
A Watermarking Approach for MIDI File Based on Velocity and Duration Modulation. KES (2) 2008: 133-140 - 2007
- [c48]Tomoko Tateyama, Zensho Nakao, Yen-Wei Chen:
Brain Matters Emphasis in MRI by Kernel Independent Component Analysis. IIH-MSP 2007: 117-120 - [c47]Thai Duy Hien, Kazuyoshi Miyara, Ikeda Kei, Fath El Alem F. Ali, Yen-Wei Chen, Zensho Nakao:
Digital watermarking based on curvelet transform. ISSPA 2007: 1-4 - [c46]Alexander Adli, Zensho Nakao, Yasunori Nagata:
A Content Dependent Visualization System for Symbolic Representation of Piano Stream. KES (2) 2007: 287-294 - [c45]Hanane H. Mirza, Alexander Adli, Hien D. Thai, Yasunori Nagata, Zensho Nakao:
Audio Watermarking Based on the Psychoacoustic Model and Modulated Complex Lapped Transform. KES (2) 2007: 295-302 - [c44]Shinya Nozaki, Yen-Wei Chen, Zensho Nakao:
A New Optimization Algorithm of Kinoforms Based on Simulated Annealing. KES (2) 2007: 303-310 - [c43]Thai Duy Hien, Ikeda Kei, Hanane Harak, Yen-Wei Chen, Yasunori Nagata, Zensho Nakao:
Curvelet-Domain Image Watermarking Based on Edge-Embedding. KES (2) 2007: 311-317 - 2006
- [j16]Chikatoshi Yamada, Yasunori Nagata, Zensho Nakao:
An Efficient Specification for System Verification. J. Adv. Comput. Intell. Intell. Informatics 10(6): 931-938 (2006) - [j15]Thai Duy Hien, Zensho Nakao, Yen-Wei Chen:
Robust multi-logo watermarking by RDWT and ICA. Signal Process. 86(10): 2981-2993 (2006) - [j14]Thai Duy Hien, Zensho Nakao, Yen-Wei Chen:
Robust RDWT-ICA based information hiding. Soft Comput. 10(12): 1135-1144 (2006) - [c42]Thai Duy Hien, Zensho Nakao, Kazuyoshi Miyara, Yasunori Nagata, Yen-Wei Chen:
A New Chromatic Color Image Watermarking and Its PCA-Based Implementation. ICAISC 2006: 787-795 - [c41]Kazuyoshi Miyara, Thai Duy Hien, Hanane Harrak, Yasunori Nagata, Zensho Nakao:
Multichannel Color Image Watermarking Using PCA Eigenimages. Intelligent Information Systems 2006: 287-296 - [c40]Hanane Harrak, Thai Duy Hien, Yasunori Nagata, Zensho Nakao:
DCT Watermarking Optimization by Genetic Programming. Intelligent Information Systems 2006: 347-351 - [c39]Yen-Wei Chen, Kanami Kobayashi, Xinyin Huang, Zensho Nakao:
Genetic Algorithms for Optimization of Boids Model. KES (2) 2006: 55-62 - 2005
- [j13]Xian-Hua Han, Zensho Nakao, Yen-Wei Chen, Ryosuke Kodama:
An ICA-Domain Shrinkage Based Poisson-Noise Reduction Algorithm and Its Application to Penumbral Imaging. IEICE Trans. Inf. Syst. 88-D(4): 750-757 (2005) - [j12]Chikatoshi Yamada, Yasunori Nagata, Zensho Nakao:
Inductive Temporal Formula Specifications for System Verification. J. Adv. Comput. Intell. Intell. Informatics 9(3): 321-328 (2005) - [c38]Xiang-Yan Zeng, Yen-Wei Chen, Deborah van Alphen, Zensho Nakao:
Selection of ICA Features for Texture Classification. ISNN (2) 2005: 262-267 - 2004
- [j11]Xiang-Yan Zeng, Yen-Wei Chen, Zensho Nakao, Jian Cheng, Hanqing Lu:
Independent Component Analysis for Color Indexing. IEICE Trans. Inf. Syst. 87-D(4): 997-1003 (2004) - [j10]Xian-Hua Han, Yen-Wei Chen, Zensho Nakao:
Robust Edge Detection by Independent Component Analysis in Noisy Images. IEICE Trans. Inf. Syst. 87-D(9): 2204-2211 (2004) - [j9]Thai Duy Hien, Yen-Wei Chen, Zensho Nakao:
Robust Digital Watermarking Based On Principal Component Analysis. Int. J. Comput. Intell. Appl. 4(2): 183-192 (2004) - [j8]Xiang-Yan Zeng, Yen-Wei Chen, Zensho Nakao:
Classification of Remotely Sensed Images Using Independent Component Analysis and Spatial Consistency. J. Adv. Comput. Intell. Intell. Informatics 8(2): 216-222 (2004) - [j7]Thai Duy Hien, Zensho Nakao, Yen-Wei Chen:
Intelligent Logo Watermarking Based on Independent Component Analysis. J. Adv. Comput. Intell. Intell. Informatics 8(4): 390-396 (2004) - [j6]Xiang-Yan Zeng, Yen-Wei Chen, Zensho Nakao, Hanqing Lu:
Texture representation based on pattern map. Signal Process. 84(3): 589-599 (2004) - [c37]Tomoko Tateyama, Zensho Nakao, Xiang-Yan Zeng, Yen-Wei Chen:
Segmentation of High Resolution Satellite Images by Direction and Morphological Filters. HIS 2004: 482-487 - [c36]Yen-Wei Chen, Sulistiyo, Zensho Nakao:
Genetic Generation of High-Degree-of-Freedom Feed-Forward Neural Networks. ISNN (1) 2004: 186-192 - [c35]Thai Duy Hien, Zensho Nakao, Yen-Wei Chen:
An RDWT Based Logo Watermark Embedding Scheme with Independent Component Analysis Detection. KES 2004: 359-365 - [c34]Thai Duy Hien, Zensho Nakao, Yen-Wei Chen:
RDWT Domain Watermarking based on Independent Component Analysis Extraction. WSC 2004: 401-414 - [c33]Thai Duy Hien, Zensho Nakao, Yen-Wei Chen:
ICA-based robust logo image watermarking. Security, Steganography, and Watermarking of Multimedia Contents 2004: 162-172 - 2003
- [c32]Thai Duy Hien, Zensho Nakao, Yen-Wei Chen:
A Robust Logo Multiresolution Watermarking Based on Independent Component Analysis Extraction. IWDW 2003: 408-422 - [c31]Thai Duy Hien, Yen-Wei Chen, Zensho Nakao:
PCA Based Digital Watermarking. KES 2003: 1427-1434 - [c30]Xiang-Yan Zeng, Yen-Wei Chen, Zensho Nakao, Jian Cheng, Hanqing Lu:
Image Retrieval Based on Independent Components of Color Histograms. KES 2003: 1435-1442 - [c29]Xian-Hua Han, Yen-Wei Chen, Zensho Nakao:
An ICA-Based Method for Poisson Noise Reduction. KES 2003: 1449-1454 - 2002
- [j5]Yen-Wei Chen, Noel E. Mendoza, Zensho Nakao, Tatsuhiro Adachi:
Estimating wind speed in the lower atmosphere wind profiler based on a genetic algorithm. IEEE Trans. Instrum. Meas. 51(4): 593-597 (2002) - [c28]Xiang-Yan Zeng, Yen-Wei Chen, Zensho Nakao:
Image Feature Representation by the Subspace of Nonlinear PCA. ICPR (2) 2002: 228-231 - [c27]Shinya Nozaki, Yen-Wei Chen, Zensho Nakao, Hiroyuki Shiraga:
Reconstruction of x-ray penumbral images based on a heuristic method. Image Processing: Algorithms and Systems 2002: 303-311 - [c26]Yen-Wei Chen, Xiang-Yan Zeng, Zensho Nakao, Hanqing Lu:
An ICA-Based Illumination-Free Texture Model and Its Application to Image Retrieval. IEEE Pacific Rim Conference on Multimedia 2002: 167-174 - 2001
- [j4]Noel E. Mendoza, Yen-Wei Chen, Zensho Nakao, Tatsuhiro Adachi, Yoshihisa Masuda:
A real multi-parent tri-hybrid evolutionary optimization method and its application in wind velocity estimation from wind profiler data. Appl. Soft Comput. 1(3): 225-235 (2001) - 2000
- [j3]Fathelalem F. Ali, Kazunori Matsuo, Zensho Nakao, Yen-Wei Chen:
An Evolutionary Algorithm for CT Image Reconstruction. J. Robotics Mechatronics 12(4): 466-473 (2000) - [c25]F. F. Ali, Zensho Nakao, Yen-Wei Chen:
Playing the Rock-Paper-Scissors game with a genetic algorithm. CEC 2000: 741-745 - [c24]Yen-Wei Chen, Xiang-Yan Zeng, Zensho Nakao:
Blind Separation Based on an Evolutionary Neural Network. ICPR 2000: 2973-2976 - [c23]Yen-Wei Chen, Xiang-Yan Zeng, Zensho Nakao:
Blind signal separation by an evolutionary neural network with higher-order statistics. KES 2000: 566-571
1990 – 1999
- 1999
- [j2]Yen-Wei Chen, Zensho Nakao, Kouichi Arakaki, Xue Fang, Shinichi Tamura:
Restoration of gray images based on a genetic algorithm with Laplacian constraint. Fuzzy Sets Syst. 103(2): 285-293 (1999) - [j1]Fath El Alem F. Ali, Zensho Nakao, Yen-Wei Chen:
Two new neural network approaches to two-dimensional CT image reconstruction. Fuzzy Sets Syst. 103(2): 295-302 (1999) - [c22]Yen-Wei Chen, T. Enokura, Zensho Nakao:
A fast image restoration algorithm based on simulated annealing. KES 1999: 341-344 - [c21]Fath El Alem F. Ali, S. Yoyegawa, Zensho Nakao, Yen-Wei Chen:
CT image reconstruction by stochastic relaxation. KES 1999: 345-348 - 1998
- [c20]Yen-Wei Chen, Xiang-Yan Zeng, Zensho Nakao:
A Hybrid Neural Network Training Approach of Backpropagation and Genetic Algorithm for Classification of Remotely Sensed Images. ICONIP 1998: 1402-1405 - [c19]Yen-Wei Chen, T. Enokura, Zensho Nakao:
A hybrid GA/SA approach to blind deconvolution. KES (3) 1998: 144-149 - [c18]I. Ohkawa, S. Tobaru, Zensho Nakao, Yen-Wei Chen:
Reconstruction of CT images by the backpropagation algorithm. KES (3) 1998: 150-154 - [c17]Fath El Alem F. Ali, Zensho Nakao, Yen-Wei Chen:
Three new soft computing approaches to two-dimensional CT image reconstruction: a comparative study. KES (3) 1998: 210-219 - [c16]S. Yamauchi, Yen-Wei Chen, Zensho Nakao:
Optimization of computer-generated holograms by an artificial neural network. KES (3) 1998: 220-223 - [c15]Y. Kawano, Zensho Nakao, Yen-Wei Chen:
An application of automaton neural networks to artificial agents. KES (3) 1998: 224-228 - [c14]Yen-Wei Chen, T. Enokura, Zensho Nakao:
Blind deconvolution based on a hybrid GA/SA approach. SMC 1998: 2190-2195 - 1997
- [c13]Zensho Nakao, Midori Takashibu, Fath El Alem F. Ali, Yen-Wei Chen:
Evolutionary CT image reconstruction. ICNN 1997: 1608-1611 - [c12]Zensho Nakao, Fath El Alem F. Ali, Yen-Wei Chen:
CT image reconstruction by back-propagation. KES (2) 1997: 323-326 - [c11]Zensho Nakao, M. Noborikawa, Yen-Wei Chen, Yasuyuki Kina:
CT image reconstruction by the Boltzmann machine. KES (2) 1997: 327-330 - [c10]Zensho Nakao, Midori Takashibu, Yen-Wei Chen:
Evolutionary CT image reconstruction. KES (2) 1997: 451-454 - 1996
- [c9]Yen-Wei Chen, Zensho Nakao, Shinichi Tamura:
Blind deconvolution by genetic algorithms. Electronic Imaging: Nonlinear Image Processing 1996: 0000 - [c8]Yen-Wei Chen, Zensho Nakao, Kouichi Arakaki, Shinichi Tamura:
Evolutionary Reconstruction of Neutron Penumbral Images. International Conference on Evolutionary Computation 1996: 452-457 - [c7]Zensho Nakao, Yen-Wei Chen, Midori Takashibu, Yasuyuki Kina, Makoto Nakasone:
Evolutionary Reconstruction of Gray Images. International Conference on Evolutionary Computation 1996: 458-462 - [c6]Yen-Wei Chen, Zensho Nakao, Xue Fang:
Parallelization of a Genetic Algorithm for Image Restoration and Its Performance Analysis. International Conference on Evolutionary Computation 1996: 463-468 - [c5]Zensho Nakao, Yen-Wei Chen, Fath El Alem F. Ali:
GA-Based Reconstruction of Plane Binary Images. International Conference on Evolutionary Computation 1996: 587-591 - [c4]Yen-Wei Chen, Zensho Nakao, Kouichi Arakaki, Ikuo Nakamura, Shinichi Tamura:
Reconstruction of neutron penumbral images by a constrained genetic algorithm. ICPR 1996: 525-529 - [c3]Yen-Wei Chen, Zensho Nakao, Xue Fang, Shinichi Tamura:
A parallel genetic algorithm for image restoration. ICPR 1996: 694-698 - [c2]Zensho Nakao, Yen-Wei Chen, Fath El Alem F. Ali:
GA-Based Reconstruction of Plane Images from Projections. IEA/AIE 1996: 235-240 - [c1]Zensho Nakao, Midori Takashibu, Yen-Wei Chen:
Evolutionary CT Image Reconstruction by Image Partitioning. SEAL 1996: 81-88
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint