26 Feature Extraction with Randomness for an Application to Machine Learning from Text Data
|
|
- おきみち まきい
- 5 years ago
- Views:
Transcription
1 26 Feature Extraction with Randomness for an Application to Machine Learning from Text Data
2 Random Forest Random Forest SPAM SPAM600 SPAM1000 SPAM Random Forest i
3 % Random Forest Mersenne Twister Low-Discrepancy ii
4 Abstract Feature Extraction with Randomness for an Application to Machine Learning from Text Data Natsuki Fujimori In text processing, a word vector, which is converted from text document data, is usually used as a feature vector. A word vector is a histogram of word frequency or occurrence of a document. It is a numerical data, however it is not a quantitative data such as ratio scale. It is originally a qualitative data such as ordinal or nominal scale. Some methods for data mining using machine learning employ numeric calculation which can discriminate quantitative data that able to define the distance or inner product of feature vectors, but random forests employing decision trees is machine learning technique which is suitable for qualitative text data because it constructs various shapes of decision trees by choosing predictor values randomly. When choosing predictor values, the random sampling is performed using pseudo-random sequence. However, if the number of tree depth to construct, the number of decision trees to use discriminate, or the number of features predictor values of decision trees are small values, the bias may appear because of non-uniformness of pseudo-random numbers. In order to solve this problem, in this study, we propose an application of quasi-random number generator. quasi-random sequence generates uniform sequence of points. When the number of tree of depth, the number of trees using for discrimination, or the number of features constructing tree are small, the proposed method is able to achieve higher performance than pseudo-random. By using the original Japanese SPAM dataset (600: SPAM, iii
5 1000: non-spam), we perform the experiment of conventional and proposed methods. As a result, under the condition that the maximum number of tree is 2, and that the number of feature is under 10, the proposed method improves 2 or 3 percent of the precision. key words Random Forest, Pseudo-Random Sequence, Mersenne Twister, Low- Discrepancy Sequence, Quasi-Random Sequence iv
6 Bagging Random Forest Random Forest Random Forest Random Forest Python Random Forest v
7 D max = D max = D max = 3 D max = D max = A D max 46 B 6 48 vi
8 Bagging Random Forest Mersenne Twister 1000* Mersenne Twister 10000* SOBOL 1000* SOBOL 10000* Random Forest D max = D max = D max = D max = D max = D max = D max = D max = D max = D max = D max = 2 F max = N max = vii
9 5.14 D max = 2 F max = N max = D max = 2 F max = 1 10 N max = D max = 2 F max = 1 10 N max = D max = 2 F max = N max = D max = 2 F max = N max = rand int SOBOL B B B viii
10 Random Forest A.1 D max = A.2 D max = ix
11 Web Web Weblog Twitter Random Forest Random Forest 1
12 Bagging Random Forest Random Forest Low Discrepancy Sequence Random Forest Random Forest [1],[2] SPAM SPAM Random Forest SPAM [1],[2] Random Forest SPAM Random Forest 2 2
13 3 2 Random Forest 4 Random Forest 5 6 3
14 2 Bagging Random Forest [4]
15 2.1 無料 1 0 出会い 0 1 女性 1 0 HAM SPAM 秘密 HAM 1 0 SPAM HAM 2.1 f f 2 5
16 {x i 1 i N} X Bagging Random Forest Bagging Bagging Leo Breiman 1996 [6] Bagging Bootstrap Aggregating Bagging 6
17 2.2 T 1 T m f 1 (x) f m (x) 2.2 Bagging 学習データ ブートストラップサンプリング ブートストラップサンプル 1 ブートストラップサンプル 2 ブートストラップサンプル m 識別識別識別 弱学習器 T 1 T 2 T m f 1 (x) f 2 (x) f m x 弱識別結果弱識別結果弱識別結果 多数決 識別結果 2.2 Bagging 7
18 2.2 Random Forest Random Forest Random Forest Leo Breiman 2001 [7] Bagging Random Forest d Breiman [5] Bagging 2.3 Random Forest Bagging Random Forest [5] 8
19 2.2 学習データ ブートストラップサンプリング 多様な決定木が並列に並ぶ森 ( 弱学習器群 ) ブートストラップサンプル 1 ブートストラップサンプル 2 ブートストラップサンプル m 識別 識別 ノードに利用する特徴をランダムサンプリングで d 個選択する 識別 T 1 T 2 T m f 1 (x) f 2 (x) f m x 弱識別結果弱識別結果弱識別結果 多数決 識別結果 2.3 Random Forest 9
20 3 k-means Random Forest 3.1 pseudorandom sequence [9] X n+1 = (A X n + B) mod M (3.1) C 10
21 3.2 M M M Mersenne Twister 1998 [8] M Mersenne Twister [10] Mersenne Twister 1000* * Marsaglia Xorshift [12] XOR scikit-learn Xorshift 3.2 Quasi random numbers Quasi-Monte Carlo method I := {0 x < 1} I n N x i (1 i N) S (f) 1 S N (f) = 1 N 1 i N f (x i ) (3.2) {x i 1 i N} n I n N P N D (P N ) = O ( N 1 (log N) n) 2 1 f 2 D 11
22 3.2 n Low Discrepancy Sequence [9] quasirandom 1 SOBOL SOBOL 1967 I.M. Sobol [11] 3.3 SOBOL 1000* SOBOL 10000*
23 x 3.1 Mersenne Twister 1000* x 3.2 Mersenne Twister 10000*
24 random[,1] 3.3 SOBOL 1000* a[,1] 3.4 SOBOL 10000*
25 4 Random Forest Random Forest Python scikit-learn Random Forest 4.1 Random Forest Random Forest Random Forest 1 Random Forest 15
26 4.2 Random Forest 4.2 Random Forest Xorshift Random Forest Random Forest Random Forest Random Forest 16
27 4.3 Python Random Forest 4.3 Python Random Forest Python scikitlearn Random Forest forest.py Random Forest fit() Random Forest... for i in range(self.n estimators): # (1) seed seed = np.random.randint(max INT) tree = self. make estimator(append=false) # (2) [j, seed] = i4 uniform(0, MAX INT, seed) # (3) tree.set params(random state=j) # tree.set params(random state=random state.randint(max INT)) trees.append(tree)... i4 uniform() sobol seq forest.py 17
28 4.3 Python Random Forest from sobol seq import * (3) rf RandomForestClassifier rf = RandomForestClassifier(n_estimator =num, max_features=feat, max_depth=2) rf.fit(traindata, trainlabel) result = rf.predict(testdata) 実行プログラム RandomForest Classifier 関数を rf に代入 訓練データで決定木の森を作成 変更点 forest.py 中の fit 関数 for i in range(self.n_estimators): seed = np.random.randint(max_int) tree = self._make_estimator(append=false) # 追加部分 [ j, seed ] = i4_uniform(0, MAX_INT, seed) # j に準乱数生成 # 以下 2 文のどちらかをコメントアウトして乱数を決定 tree.set_params(random_state=j) # 準乱数をセット tree.set_params(random_state= random_state.randint(max_int)) # 疑似乱数をセット テストデータで識別 木の深さ : 2 木の深さ :2 識別精度 ( % ) 特徴数 MT? Quasi? 72 識 70 別精 68 度 ( % 66 ) 決定木の数 MT? Quasi? 4.1 Random Forest n estimator max features max depth fit 18
29 4.3 Python Random Forest Random Forest fit Mersenne Twister SOBOL result predict fit scikit-learn Random Forest sklearn/tree Python C Cython tree.so UNIX tree.pyd Windows tree.pyx tree.pxd Cython C tree.c setup.py install.so.pyd tree.pyx rand int rand int xorshift [12] SOBOL SOBOL 19
30 5 Random Forest SPAM 1600 SPAM 600 SPAM 1000 Random Forest ?? Python NumPy scikit-learn SOBOL sobol seq.py SPAM 600 SPAM
31 5.1 OS CPU 5.1 Windows 7 Enterprise 4.00 GB Intel(R) Core(TM) i5-2400s 2.50GHz Python scikit-learn NumPy sobol seq SPAM SPAM 600 SPAM Random Forest Random Forest D max 1, 2, 3, 4, 5 F max 1,2,3,...,10 N max 1,2,3,...,10 D max F max N max
32 5.1 深さ :1 深さ :2 深さ :3 深さ :4 深さ :
33 F max N max 10 D max =
34 5.2 精度が他方より向上した回数 各乱数列を適用した際に識別 MT Quasi 決定木の最大深度 D max = D max = 2 D max = 5 24
35 木の深さ :1 識別精度 ( % ) 特徴数 MT Quasi 5.3 D max = 1 木の深さ :1 識別精度 ( % ) 決定木の数 MT Quasi 5.4 D max = 1 25
36 D max = D max = N max %, F max = 8 4.6% %, 4.6% SPAM SPAM D max = D max = N max 1 10 D max = F max = 9 1.8% F max = 3 2.0% 5.6 N max = 2 N max = 9 2.0% N max = % 26
37 5.2 木の深さ : 2 識別精度 ( % ) 特徴数 MT Quasi 5.5 D max = 2 識別精度 ( % ) 木の深さ : 決定木の数 MT Quasi 5.6 D max = 2 27
38 5.2 N max = D max = 3 D max = 4 76 木の深さ :3 識別精度 ( % ) MT Quasi 特徴数 5.7 D max = D max = D max = N max % 1.5% % 3.6% D max = % 1.2% % 1.0% D max =
39 5.2 木の深さ :3 識別精度 ( % ) 決定木の数 MT Quasi 5.8 D max = 3 D max = 4 D max = 4 29
40 木の深さ :4 識別精度 ( % ) 特徴数 MT Quasi 5.9 D max = 4 識別精度 ( % ) 木の深さ : 決定木の数 MT Quasi 5.10 D max = 4 30
41 D max = 1 木の深さ :5 識別精度 ( % ) 特徴数 MT Quasi 5.11 D max = 5 識別精度 ( % ) 木の深さ : 決定木の数 MT Quasi 5.12 D max = 5 31
42 D max = N max % 5.7% % 8.2% D max = 5 D max = F max = Random Forest 10 SPAM A D max =
43 5.2 木の深さ :2, 決定木の数 11~20 識別精度 ( % ) 特徴数 MT Quasi 5.13 D max = 2 F max = N max = 木の深さ :2, 特徴数 :11~20 識別精度 ( % ) 決定木の数 MT Quasi 5.14 D max = 2 F max = N max =
44 木の深さ :2, 決定木の数 :11~20 86 識別精度 ( % ) MT Quasi 特徴数 5.15 D max = 2 F max = 1 10 N max = 木の深さ :2, 特徴数 1~10 識別精度 ( % ) 決定木の数 MT Quasi 5.16 D max = 2 F max = 1 10 N max =
45 5.2 F max N max
46 木の深さ :2, 特徴数 :11~20 識別精度 ( % ) MT Quasi 決定木の数 5.17 D max = 2 F max = N max = 木の深さ :2, 決定木の数 :1~10 識別精度 ( % ) 特徴数 MT Quasi 5.18 D max = 2 F max = N max =
47 rand_int 関数による特徴選択 rand int SOBOL 列による特徴選択 SOBOL 5.19 rand int
48 5.3 SOBOL 0 51 F max = 5, N max = 5, D max = 2 SOBOL SOBOL rand int rand int SOBOL Random Forest 38
49 6 Random Forest Random Forest D max 1 5 F max 1 10 N max 1 10 SPAM 600 SPAM 1000 SPAM D max = 2 F max = 1 9 N max = % 39
50 D max D max = 2 F max = 1 9 N max = 2 10 D max = 2 2 F max N max 1 20 D max = 2 UCI Spambase dataset UCI Machine Learning Repository Spambase dataset % 3% D max = % 3.2% D max = 2, F max = 1 10, N max = 1 10 SOBOL SOBOL Random Forest Random Forest 40
51 Random Forest 41
52
53
54 [1] Natsuki Fujimori and Shinichi Yoshida, Comparison of Machine Learning Algorithms for English and Japanese SPAM mail discrimination, The 3rd International Workshop on Advanced Computational Intelligence and Intelligent Informatics, IWACIII 2013, Shanghai, China, October 18-21, ss1-10, [2] Natsuki Fujimori and Shinichi Yoshida, Machine Learning Algorithms applied to SPAM Filtering for English and Japanese , The 14th International Symposium on Advanced Intelligent Systems, ISIS2013, Daejeon, Korea, November 13-16, F3a-1, [3] 2013 [4] 2010 [5] R p [6] Leo Breiman, Bagging Predictors, Machine Learning, 24, pp , [7] Leo Breiman, Random Forests, Machine Learning, 45, pp.5-23, [8] Makoto Matsumoto and Takuji Nishimura, Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Transactions on Modeling and Computer Simulation (TOMACS) 8.1 (1998), pp [9] 4 p [10] number generation/node6.html. [11] IM Sobol, On the distribution of points in a cube and the approximate evaluation of integrals, USSR Computational mathematics and mathematical physics 7, pp ,
55 [12] George Marsaglia, Xorshift RNGs, Journal of Statistical Software 8(14), pp.1-6,
56 A D max A.1 D max = 1 F max N max
57 A.2 D max = 2 F max N max
58 B 6 精度が他方より向上した回数 各乱数列を適用した際に識別 MT Quasi 決定木の最大深度 B.1 48
59 識別精度 ( % ) 木の深さ : 特徴数 MT Quasi B
60 木の深さ :6 識別精度 ( % ) 決定木の数 MT Quasi B
24 SPAM Performance Comparison of Machine Learning Algorithms for SPAM Discrimination
24 SPAM Performance Comparison of Machine Learning Algorithms for SPAM Discrimination 1130378 2013 3 9 SPAM SPAM SPAM SPAM SVM AdaBoost RandomForest SPAM SPAM UCI Machine Learning Repository Spambase 4601
More information..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i
25 Feature Selection for Prediction of Stock Price Time Series 1140357 2014 2 28 ..,,,,. 2013 1 1 12 31, ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i Abstract Feature Selection for Prediction of Stock Price Time
More information3. ( 1 ) Linear Congruential Generator:LCG 6) (Mersenne Twister:MT ), L 1 ( 2 ) 4 4 G (i,j) < G > < G 2 > < G > 2 g (ij) i= L j= N
RMT 1 1 1 N L Q=L/N (RMT), RMT,,,., Box-Muller, 3.,. Testing Randomness by Means of RMT Formula Xin Yang, 1 Ryota Itoi 1 and Mieko Tanaka-Yamawaki 1 Random matrix theory derives, at the limit of both dimension
More information28 TCG SURF Card recognition using SURF in TCG play video
28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More informationSobel Canny i
21 Edge Feature for Monochrome Image Retrieval 1100311 2010 3 1 3 3 2 2 7 200 Sobel Canny i Abstract Edge Feature for Monochrome Image Retrieval Naoto Suzue Content based image retrieval (CBIR) has been
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More information24 Region-Based Image Retrieval using Fuzzy Clustering
24 Region-Based Image Retrieval using Fuzzy Clustering 1130323 2013 3 9 Visual-key Image Retrieval(VKIR) k-means Fuzzy C-means 2 200 2 2 20 VKIR 5 18% 54% 7 30 Fuzzy C-means i Abstract Region-Based Image
More informationkut-paper-template.dvi
26 Discrimination of abnormal breath sound by using the features of breath sound 1150313 ,,,,,,,,,,,,, i Abstract Discrimination of abnormal breath sound by using the features of breath sound SATO Ryo
More informationQ-Learning Support-Vector-Machine NIKKEI NET Infoseek MSN 10 1 12 22 170 121 10 9 15 12 22 85 2 85 10 i
21 Stock price forecast using text mining 1100323 2010 3 1 Q-Learning Support-Vector-Machine NIKKEI NET Infoseek MSN 10 1 12 22 170 121 10 9 15 12 22 85 2 85 10 i Abstract Stock price forecast using text
More information[1] SBS [2] SBS Random Forests[3] Random Forests ii
Random Forests 2013 3 A Graduation Thesis of College of Engineering, Chubu University Proposal of an efficient feature selection using the contribution rate of Random Forests Katsuya Shimazaki [1] SBS
More information2017 (413812)
2017 (413812) Deep Learning ( NN) 2012 Google ASIC(Application Specific Integrated Circuit: IC) 10 ASIC Deep Learning TPU(Tensor Processing Unit) NN 12 20 30 Abstract Multi-layered neural network(nn) has
More information2 ( ) i
25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More informationVirtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking
23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual
More information25 Removal of the fricative sounds that occur in the electronic stethoscope
25 Removal of the fricative sounds that occur in the electronic stethoscope 1140311 2014 3 7 ,.,.,.,.,.,.,.,,.,.,.,.,,. i Abstract Removal of the fricative sounds that occur in the electronic stethoscope
More information4.1 % 7.5 %
2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel
More information23 The Study of support narrowing down goods on electronic commerce sites
23 The Study of support narrowing down goods on electronic commerce sites 1120256 2012 3 15 i Abstract The Study of support narrowing down goods on electronic commerce sites Masaki HASHIMURA Recently,
More information28 Horizontal angle correction using straight line detection in an equirectangular image
28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image
More informationGPGPU
GPGPU 2013 1008 2015 1 23 Abstract In recent years, with the advance of microscope technology, the alive cells have been able to observe. On the other hand, from the standpoint of image processing, the
More information23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones
23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones 1120220 2012 3 1 iphone..,. 2 (, ) 3 (,, ),,,.,..,. HCI i Abstract A Comparison of Flick and Ring Document Scrolling in
More informationjohnny-paper2nd.dvi
13 The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro 14 2 26 ( ) : : : The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro abstract: Recently Artificial Markets on which
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More information1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [
Vol.2, No.x, April 2015, pp.xx-xx ISSN xxxx-xxxx 2015 4 30 2015 5 25 253-8550 1100 Tel 0467-53-2111( ) Fax 0467-54-3734 http://www.bunkyo.ac.jp/faculty/business/ 1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The
More informationSC-85X2取説
I II III IV V VI .................. VII VIII IX X 1-1 1-2 1-3 1-4 ( ) 1-5 1-6 2-1 2-2 3-1 3-2 3-3 8 3-4 3-5 3-6 3-7 ) ) - - 3-8 3-9 4-1 4-2 4-3 4-4 4-5 4-6 5-1 5-2 5-3 5-4 5-5 5-6 5-7 5-8 5-9 5-10 5-11
More information<4D6963726F736F667420506F776572506F696E74202D208376838C835B83938365815B835683878393312E707074205B8CDD8AB78382815B83685D>
i i vi ii iii iv v vi vii viii ix 2 3 4 5 6 7 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
More information1 1 tf-idf tf-idf i
14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles
More information浜松医科大学紀要
On the Statistical Bias Found in the Horse Racing Data (1) Akio NODA Mathematics Abstract: The purpose of the present paper is to report what type of statistical bias the author has found in the horse
More informationA Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi
A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi ODA Department of Human and Mechanical Systems Engineering,
More information29 Short-time prediction of time series data for binary option trade
29 Short-time prediction of time series data for binary option trade 1180365 2018 2 28 RSI(Relative Strength Index) 3 USD/JPY 1 2001 1 2 4 10 2017 12 29 17 00 1 high low i Abstract Short-time prediction
More informationn 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i
15 Comparison and Evaluation of Dynamic Programming and Genetic Algorithm for a Knapsack Problem 1040277 2004 2 25 n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i Abstract Comparison and
More informationSURF,,., 55%,.,., SURF(Speeded Up Robust Features), 4 (,,, ), SURF.,, 84%, 96%, 28%, 32%.,,,. SURF, i
24 SURF Recognition of Facial Expression Based on SURF 1130402 2013 3 1 SURF,,., 55%,.,., SURF(Speeded Up Robust Features), 4 (,,, ), SURF.,, 84%, 96%, 28%, 32%.,,,. SURF, i Abstract Recognition of Facial
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More information(MIRU2008) HOG Histograms of Oriented Gradients (HOG)
(MIRU2008) 2008 7 HOG - - E-mail: katsu0920@me.cs.scitec.kobe-u.ac.jp, {takigu,ariki}@kobe-u.ac.jp Histograms of Oriented Gradients (HOG) HOG Shape Contexts HOG 5.5 Histograms of Oriented Gradients D Human
More information卒業論文2.dvi
15 GUI A study on the system to transfer a GUI sub-picture to the enlarging viewer for operational support 1040270 2004 2 27 GUI PC PC GUI Graphical User Interface PC GUI GUI PC GUI PC PC GUI i Abstract
More information第62巻 第1号 平成24年4月/石こうを用いた木材ペレット
Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting
More informationIT,, i
22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki
More information活用ガイド (ソフトウェア編)
(Windows 95 ) ii iii iv NEC Corporation 1999 v P A R T 1 vi P A R T 2 vii P A R T 3 P A R T 4 viii P A R T 5 ix x P A R T 1 2 3 1 1 2 4 1 2 3 4 5 1 1 2 3 4 6 5 6 7 7 1 1 2 8 1 9 1 1 2 3 4 5 6 1 2 3 4
More information58 10
57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have
More information1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325
社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL
More information22 Google Trends Estimation of Stock Dealing Timing using Google Trends
22 Google Trends Estimation of Stock Dealing Timing using Google Trends 1135064 3 1 Google Trends Google Trends Google Google Google Trends Google Trends 2006 Google Google Trend i Abstract Estimation
More informationIT i
27 The automatic extract of know-how search tag using a thesaurus 1160374 2016 2 26 IT i Abstract The automatic extract of know-how search tag using a thesaurus In recent years, a number of organizational
More informationIII
III 1 1 2 1 2 3 1 3 4 1 3 1 4 1 3 2 4 1 3 3 6 1 4 6 1 4 1 6 1 4 2 8 1 4 3 9 1 5 10 1 5 1 10 1 5 2 12 1 5 3 12 1 5 4 13 1 6 15 2 1 18 2 1 1 18 2 1 2 19 2 2 20 2 3 22 2 3 1 22 2 3 2 24 2 4 25 2 4 1 25 2
More informationiii iv v vi vii viii ix 1 1-1 1-2 1-3 2 2-1 3 3-1 3-2 3-3 3-4 4 4-1 4-2 5 5-1 5-2 5-3 5-4 5-5 5-6 5-7 6 6-1 6-2 6-3 6-4 6-5 6 6-1 6-2 6-3 6-4 6-5 7 7-1 7-2 7-3 7-4 7-5 7-6 7-7 7-8 7-9 7-10 7-11 8 8-1
More information[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing
1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November
More information1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2
CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for
More informationこれわかWord2010_第1部_100710.indd
i 1 1 2 3 6 6 7 8 10 10 11 12 12 12 13 2 15 15 16 17 17 18 19 20 20 21 ii CONTENTS 25 26 26 28 28 29 30 30 31 32 35 35 35 36 37 40 42 44 44 45 46 49 50 50 51 iii 52 52 52 53 55 56 56 57 58 58 60 60 iv
More informationパワポカバー入稿用.indd
i 1 1 2 2 3 3 4 4 4 5 7 8 8 9 9 10 11 13 14 15 16 17 19 ii CONTENTS 2 21 21 22 25 26 32 37 38 39 39 41 41 43 43 43 44 45 46 47 47 49 52 54 56 56 iii 57 59 62 64 64 66 67 68 71 72 72 73 74 74 77 79 81 84
More informationこれでわかるAccess2010
i 1 1 1 2 2 2 3 4 4 5 6 7 7 9 10 11 12 13 14 15 17 ii CONTENTS 2 19 19 20 23 24 25 25 26 29 29 31 31 33 35 36 36 39 39 41 44 45 46 48 iii 50 50 52 54 55 57 57 59 61 63 64 66 66 67 70 70 73 74 74 77 77
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationWeb Web Web Web i
28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In
More information24 Perceived depth position of autostereoscopic stimulus
24 Perceived depth position of autostereoscopic stimulus 1130382 2013 3 1 i Abstract Perceived depth position of autostereoscopic stimulus Kazuki HOJI The glassless stereogram which is known as autostereogram
More informationuntitled
i ii iii iv v 43 43 vi 43 vii T+1 T+2 1 viii 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 a) ( ) b) ( ) 51
More information2
1 2 3 4 5 6 7 8 9 10 I II III 11 IV 12 V 13 VI VII 14 VIII. 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 _ 33 _ 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 VII 51 52 53 54 55 56 57 58 59
More informationkut-paper-template.dvi
14 Application of Automatic Text Summarization for Question Answering System 1030260 2003 2 12 Prassie Posum Prassie Prassie i Abstract Application of Automatic Text Summarization for Question Answering
More informationJOURNAL OF THE JAPANESE ASSOCIATION FOR PETROLEUM TECHNOLOGY VOL. 66, NO. 6 (Nov., 2001) (Received August 10, 2001; accepted November 9, 2001) Alterna
JOURNAL OF THE JAPANESE ASSOCIATION FOR PETROLEUM TECHNOLOGY VOL. 66, NO. 6 (Nov., 2001) (Received August 10, 2001; accepted November 9, 2001) Alternative approach using the Monte Carlo simulation to evaluate
More informationDEIM Forum 2009 E
DEIM Forum 2009 E5-3 464-8601 1 606-8501 464 8601 1 E-mail: lifushi@arch.itc.nagoya-u.ac.jp, mayumi@mm.media.kyoto-u.ac.jp, {hirano,kajita,mase}@itc.nagoya-u.ac.jp Abstract Study on a Recipe Recommendation
More information平成18年版 男女共同参画白書
i ii iii iv v vi vii viii ix 3 4 5 6 7 8 9 Column 10 11 12 13 14 15 Column 16 17 18 19 20 21 22 23 24 25 26 Column 27 28 29 30 Column 31 32 33 34 35 36 Column 37 Column 38 39 40 Column 41 42 43 44 45
More information活用ガイド (ソフトウェア編)
(Windows 98 ) ii iii iv v NEC Corporation 1999 vi P A R T 1 P A R T 2 vii P A R T 3 viii P A R T 4 ix P A R T 5 x P A R T 1 2 3 1 1 2 4 1 2 3 4 5 1 1 2 3 4 5 6 6 7 7 1 1 2 8 1 9 1 1 2 3 4 5 6 1 2 3 10
More informationWeb Web ID Web 16 Web Web i
24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro
More informationA Study on Practical Use of Artificial Intelligence. The purpose of this research paper is to demonstrate the ease of using artificial intelligence in
A Study on Practical Use of Artificial Intelligence. The purpose of this research paper is to demonstrate the ease of using artificial intelligence in the light of the recent popularity of tertiary artificial
More informationWeb Basic Web SAS-2 Web SAS-2 i
19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE
More informationStatistical inference for one-sample proportion
RAND 関数による擬似乱数の生成 魚住龍史 * 浜田知久馬東京理科大学大学院工学研究科経営工学専攻 Generating pseudo-random numbers using RAND function Ryuji Uozumi * and Chikuma Hamada Department of Management Science, Graduate School of Engineering,
More information27 VR Effects of the position of viewpoint on self body in VR environment
27 VR Effects of the position of viewpoint on self body in VR environment 1160298 2015 2 25 VR (HMD), HMD (VR). VR,.. HMD,., VR,.,.,,,,., VR,. HMD VR i Abstract Effects of the position of viewpoint on
More informationClustering in Time and Periodicity of Strong Earthquakes in Tokyo Masami OKADA Kobe Marine Observatory (Received on March 30, 1977) The clustering in time and periodicity of earthquake occurrence are investigated
More information1 Web Web 1,,,, Web, Web : - i -
2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.
More informationStudies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth
Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth and Foot Breadth Akiko Yamamoto Fukuoka Women's University,
More information情報処理学会研究報告 IPSJ SIG Technical Report Vol.2013-CVIM-186 No /3/15 EMD 1,a) SIFT. SIFT Bag-of-keypoints. SIFT SIFT.. Earth Mover s Distance
EMD 1,a) 1 1 1 SIFT. SIFT Bag-of-keypoints. SIFT SIFT.. Earth Mover s Distance (EMD), Bag-of-keypoints,. Bag-of-keypoints, SIFT, EMD, A method of similar image retrieval system using EMD and SIFT Hoshiga
More informationP2P P2P peer peer P2P peer P2P peer P2P i
26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose
More information25 D Effects of viewpoints of head mounted wearable 3D display on human task performance
25 D Effects of viewpoints of head mounted wearable 3D display on human task performance 1140322 2014 2 28 D HMD HMD HMD HMD 3D HMD HMD HMD HMD i Abstract Effects of viewpoints of head mounted wearable
More informationaca-mk23.dvi
E-Mail: matsu@nanzan-u.ac.jp [13] [13] 2 ( ) n-gram 1 100 ( ) (Google ) [13] (Breiman[3] ) [13] (Friedman[5, 6]) 2 2.1 [13] 10 20 200 11 10 110 6 10 60 [13] 1: (1892-1927) (1888-1948) (1867-1916) (1862-1922)
More informationkut-paper-template2.dvi
19 A Proposal of Text Classification using Formal Concept Analysis 1080418 2008 3 7 ( ) Hasse Web Reuters 21578 Concept Explorer 2 4 said i Abstract A Proposal of Text Classification using Formal Concept
More informationQ [4] 2. [3] [5] ϵ- Q Q CO CO [4] Q Q [1] i = X ln n i + C (1) n i i n n i i i n i = n X i i C exploration exploitation [4] Q Q Q ϵ 1 ϵ 3. [3] [5] [4]
1,a) 2,3,b) Q ϵ- 3 4 Q greedy 3 ϵ- 4 ϵ- Comparation of Methods for Choosing Actions in Werewolf Game Agents Tianhe Wang 1,a) Tomoyuki Kaneko 2,3,b) Abstract: Werewolf, also known as Mafia, is a kind of
More information, IT.,.,..,.. i
25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge
More information橡最新卒論
Research of improving of recognition ability in Face recognition system Abstract The age when baiometrics was used as a password came today. Because various baiometrics such as a voice, a fingerprint,
More information,,.,,., II,,,.,,.,.,,,.,,,.,, II i
12 Load Dispersion Methods in Thin Client Systems 1010405 2001 2 5 ,,.,,., II,,,.,,.,.,,,.,,,.,, II i Abstract Load Dispersion Methods in Thin Client Systems Noritaka TAKEUCHI Server Based Computing by
More information(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s
1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene
More informationIPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came
3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is
More informationStudy on Application of the cos a Method to Neutron Stress Measurement Toshihiko SASAKI*3 and Yukio HIROSE Department of Materials Science and Enginee
Study on Application of the cos a Method to Neutron Stress Measurement Toshihiko SASAKI*3 and Yukio HIROSE Department of Materials Science and Engineering, Kanazawa University, Kakuma-machi, Kanazawa-shi,
More information20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow
20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 1115084 2009 3 5 3.,,,.., HCI(Human Computer Interaction),.,,.,,.,.,,..,. i Abstract Method for Recognizing Expression Considering
More informationIPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple
1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa
More information<95DB8C9288E397C389C88A E696E6462>
2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,
More information3_23.dvi
Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems
More informationIPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for
1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu
More informationpaper.dvi
28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret
More informationpaper.dvi
23 Study on character extraction from a picture using a gradient-based feature 1120227 2012 3 1 Google Street View Google Street View SIFT 3 SIFT 3 y -80 80-50 30 SIFT i Abstract Study on character extraction
More informationWeb Stamps 96 KJ Stamps Web Vol 8, No 1, 2004
The Journal of the Japan Academy of Nursing Administration and Policies Vol 8, No 1, pp 43 _ 57, 2004 The Literature Review of the Japanese Nurses Job Satisfaction Research Which the Stamps-Ozaki Scale
More informationエクセルカバー入稿用.indd
i 1 1 2 3 5 5 6 7 7 8 9 9 10 11 11 11 12 2 13 13 14 15 15 16 17 17 ii CONTENTS 18 18 21 22 22 24 25 26 27 27 28 29 30 31 32 36 37 40 40 42 43 44 44 46 47 48 iii 48 50 51 52 54 55 59 61 62 64 65 66 67 68
More information( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst
情報処理学会インタラクション 2015 IPSJ Interaction 2015 15INT014 2015/3/7 1,a) 1,b) 1,c) Design and Implementation of a Piano Learning Support System Considering Motivation Fukuya Yuto 1,a) Takegawa Yoshinari 1,b) Yanagi
More information23 Study on Generation of Sudoku Problems with Fewer Clues
23 Study on Generation of Sudoku Problems with Fewer Clues 1120254 2012 3 1 9 9 21 18 i Abstract Study on Generation of Sudoku Problems with Fewer Clues Norimasa NASU Sudoku is puzzle a kind of pencil
More informationgengo.dvi
4 97.52% tri-gram 92.76% 98.49% : Japanese word segmentation by Adaboost using the decision list as the weak learner Hiroyuki Shinnou In this paper, we propose the new method of Japanese word segmentation
More informationInput image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L
1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More information01_.g.r..
I II III IV V VI VII VIII IX X XI I II III IV V I I I II II II I I YS-1 I YS-2 I YS-3 I YS-4 I YS-5 I YS-6 I YS-7 II II YS-1 II YS-2 II YS-3 II YS-4 II YS-5 II YS-6 II YS-7 III III YS-1 III YS-2
More information