¥¼¥ß¥Ê¡¼¥ëȯɽ

Æü»þ: 1·î8Æü¡Ê²Ð¡Ë3¸Â (13:30-15:00)


²ñ¾ì: L1

»Ê²ñ: ÉðÉÙµ®»Ë
ÌÚ¼¡¡Ê⻿̾ 1251038: M, 1²óÌÜȯɽ ¥¤¥ó¥¿¥é¥¯¥Æ¥£¥Ö¥á¥Ç¥£¥¢À߷׳Ø
title: Development of the System Growing in Capability of Reading a Map by Supporting Aberration Detection
abstract: In recent years, the navigation system has permeated our life rapidly. But, we can't use the system when some sensors such as GPS, electronic compass don't work accurately in the city or the terminal what provided navigation is out of charge. In this case, the user who have trouble reading a map and depend on the navigation system will involve taking risk of getting lost. This problem is attributable to the system's purpose that is not so much removal of the underlying cause but getting to the destination. So we focus attention on aberration detection technique used in orienteering and propose the system that solve the problem about getting lost.
language of the presentation: Japanese
ȯɽÂêÌÜ: °ï渡½Ð»Ù±ç¤Ë¤è¤ëÃÏ¿ÞÆɤߵ»½Ñ¸þ¾å¥·¥¹¥Æ¥à¤Î³«È¯
ȯɽ³µÍ×: ¥Ê¥Ó¥²¡¼¥·¥ç¥ó¥·¥¹¥Æ¥à(°Ê²¼¥Ê¥Ó)¤Ï¶áǯ¤Ë¤Ê¤Ã¤ÆµÞ®¤Ë°ìÈ̤˿»Æ©¤·¤Æ¤­¤¿. ¤·¤«¤·GPS¤äÅŻҥ³¥ó¥Ñ¥¹¤Ê¤É¤Î¥»¥ó¥µ¤¬ÅÔ»ÔÉô¤Ë¼å¤¤ÌäÂê¤ä, ¥Ê¥Ó¤òÍøÍѤ¹¤ë¥¹¥Þ¡¼¥È¥Õ¥©¥ó¤Ê¤É¤ÎüËö¤¬Êú¤¨¤ë¥Ð¥Ã¥Æ¥ê¡¼¤ÎÌäÂê¤Ê¤É¤Ë¤è¤ê¥Ê¥Ó¤òÍøÍѤǤ­¤Ê¤¤´Ä¶­¡¦¾õ¶·¤Ï·è¤·¤Æ¾¯¤Ê¤¯¤Ê¤¤. ¤³¤Î¤è¤¦¤Ê¾õ¶·¤Ë¤ª¤¤¤Æ¸µ¡¹ÃÏ¿Þ¤òÆɤळ¤È¤ò¶ì¼ê¤È¤·¤Æ¥Ê¥Ó¤Ë°Í¸¤·¤Æ¤¤¤¿¥æ¡¼¥¶¤Ï¤¿¤Á¤Þ¤ÁÆ»¤Ë̤¦¥ê¥¹¥¯¤òÉ餦¤³¤È¤È¤Ê¤ë. ¤³¤ÎÌäÂê¤Ï¸½¾õ¤Î¥Ê¥Ó¤¬, ÌÜŪÃϤˤ¿¤É¤êÃ夯¤³¤È¤Î¤ß¤òÌÜŪ¤È¤·¤Æ¤ª¤êÆ»¤Ë̤¦¤³¤È¤Îº¬ËÜŪ¤Ê²ò·è¤òÌܻؤ¹¤â¤Î¤Ç¤Ï¤Ê¤¤¤³¤È¤ËͳÍ褹¤ë¤È¹Í¤¨¤é¤ì¤ë. ¤½¤³¤ÇËܸ¦µæ¤Ç¤Ï, ÃÏ¿ÞÆɤߤζ¥µ», ¥ª¥ê¥¨¥ó¥Æ¡¼¥ê¥ó¥°¤Ë¤ª¤±¤ëµ»½Ñ¤Î°ì¤Ä¤Ç¤¢¤ë¡Ø°ïæ¡Ù¤Î¸¡½Ð¤ËÃåÌܤ·¤Æ, ƻ̤¤ÌäÂê¤Îº¬ËÜŪ²ò·è¤ò¿Þ¤ë¥·¥¹¥Æ¥à¤òÄó°Æ¤¹¤ë.
 
¾¾ÅÄ¡¡¾¡»Ö 1251096: M, 1²óÌÜȯɽ ¥Í¥Ã¥È¥ï¡¼¥¯¥·¥¹¥Æ¥à³Ø
title: Thoracoscopic surgery support system using passive RFID marker
abstract:An RFID based thoracoscopic surgery support system, which is capable of marking a tumor inside organ tissue, has been proposed. In this system, first the marker composed of small RFID-tags is implanted in the vicinity of tumor found in the endoscopy test. Then, in the thoracoscopic surgery operation for removing the tumor, an RFID detector determines the accurate position of the implanted RFID-tag markers by measuring the strength of the signal emitted from the target tag. Due to limitation in the size of RFID-tag, this system employs a passive RFID. However, this system sometimes can't determine the position of the implanted RFID-tag markers because of the angle between a tag and a sensor antenna, so I propose a scheme which uses multiple sensor antennas to solve this problem.
language of the presentation: Japanese
 
ÀÖ·§¡¡¹â¹Ô 1251002: M, 1²óÌÜȯɽ »ë³Ð¾ðÊó¥á¥Ç¥£¥¢
title: Study on Geometric Consistency in Mobile Augmented Reality
abstract: Recently, a wide variety of applications have been proposed for augmented reality systems for mobile devices (mobile AR systems) such as providing tourist information. Large difference between a camera position and a user¡Çs viewpoint in mobile AR raises two problems of geometric consistency, i.e., (üñ) real-time alignment of virtual objects in a real scene, which is a conventional problem in the field of augmented reality, as well as (üò) a gap between a camera position and a user¡Çs viewpoint, which may affect the performance of mobile AR systems such as its usability and naturalness. In this study, we propose a high-speed geometric registration method for (üñ)', which focuses on a biased distribution of feature points, and verify effect of the gap between a camera position and a user¡Çs viewpoint by a user study. This presentation describes the progress of this work.
language of the presentation: Japanese
ȯɽÂêÌÜ: ¥â¥Ð¥¤¥ëüËö¤Ë¤ª¤±¤ë³ÈÄ¥¸½¼Â´¶¤Î¤¿¤á¤Î´ö²¿³ØŪÀ°¹çÀ­¤Ë´Ø¤¹¤ë¸¦µæ
ȯɽ³µÍ×: ¥â¥Ð¥¤¥ëüËö¾å¤Ç²¾ÁÛʪÂΤò½Å¾ö¤·¤¿±ÇÁü¤òɽ¼¨¤¹¤ë³ÈÄ¥¸½¼Â´¶¡ÊAugmented Reality; AR¡Ë¥·¥¹¥Æ¥à¤Ï¡¤´Ñ¸÷°ÆÆâ¤ò¤Ï¤¸¤á¤È¤·¤¿ÍÍ¡¹¤Ê±þÍѤ¬Äó°Æ¤µ¤ì¤Æ¤¤¤ë¡¥¥â¥Ð¥¤¥ëüËö¾å¤Ç¤ÎAR¥·¥¹¥Æ¥à¤Ï¡¤¥«¥á¥é¤Î°ÌÃ֤ȥ桼¥¶¤Î»ëÅÀ¤¬Â礭¤¯°Û¤Ê¤ë¤¿¤á¡¤(üñ) ²¾ÁÛʪÂΤȼ¥·¡¼¥ó¤Î´ö²¿³ØŪÀ°¹çÀ­¤Î¼Â»þ´Ö¤Ç¤Î²ò·è¤Ë²Ã¤¨¡¤(üò) ¥æ¡¼¥¶¤¬¥«¥á¥é¤òÄ̤·¤Æ¸«¤ë¼Â¥·¡¼¥ó¤È¥æ¡¼¥¶»ëÅÀ¤«¤é¤Î¼Â¥·¡¼¥ó¤Ç¥º¥ì¤¬À¸¤¸¡¤AR¥·¥¹¥Æ¥à¤Ë±Æ¶Á¤òÍ¿¤¨¤ë²ÄǽÀ­¤¬¤¢¤ë¡¥¤³¤ì¤é£²¤Ä¤Î´ö²¿³ØŪÀ°¹çÀ­¤ÎÌäÂ꤬¤¢¤ë¤¿¤á¡¤Ëܸ¦µæ¤Ç¤Ï¡¤(üñ)' ÆÃħÅÀ¤ÎʬÉÛ¤ÎÊФê¤ËÃåÌܤ·¤¿¹â®¤Ê°ÌÃÖ¹ç¤ï¤»¼êË¡¤ÎÄó°Æ¡¢µÚ¤Ó(üò)' ¥«¥á¥é¤Î°ÌÃ֤ȥ桼¥¶¤Î»ëÅÀ¤Ë¤è¤ë´ö²¿³ØŪÉÔÀ°¹ç¤Î±Æ¶Á¤ò¥æ¡¼¥¶¥¹¥¿¥Ç¥£¤Ë¤è¤Ã¤Æ¸¡¾Ú¤¹¤ë¡¥ËÜȯɽ¤Ç¤Ï¡¤¸½ºß¤Î¿ÊĽ¤òÊó¹ð¤¹¤ë¡¥
 
²¬ÅÄ¡¡°¡º»Èþ 1251023: M, 1²óÌÜȯɽ ´Ä¶­ÃÎǽ³Ø

title: People Groping by Spatio-Temporal Features of Trajectories

abstract: We proposes a method for detecting people groups from their trajectory data. This grouping is applied to each pair of people. The trajectories of the pair are featured by their spatio-temporal relationships such as a distance and velocities. The features are classified to either of ¡Ègroup¡É or ¡Ènon-group¡É by a discriminative classifier. In contrast to previous features, the proposed features are robust to unsteady behaviors of people and noise of their trajectories. Experimental results using a publicly-available dataset of trajectories demonstrate the effectiveness of the proposed method.

language of the presentation: Japanese

 

²ñ¾ì: L2

»Ê²ñ: ¾®Ä®¡¡¼é
Frances Pikyu Yung 1251126: M, 1²óÌÜȯɽ ¼«Á³¸À¸ì½èÍý³Ø
title: Learning Core Word Alignments for Statistical Machine Translation
abstract: Statistical machine translation systems learn translation rules from human translated sentences aligned to the word level. Typically, word alignments are carried out automatically basing on the how often each bilingual word pair occurs. When training data is limited, word alignments inferred by co-occurance statistics may undesirably include frequent grammatical words. It is also intuitively inappropriate to include contextually inferred words as core lexical translations, yet it is a usual practice for human translators to insert these words. This 'attached word' phenomenon is particularly common for translation between distant languages where many words do not have direct correspondence in the translation. In this presentation, I will describe our hypothesis, supported by preliminary experimental results, that removing attached words in the training data helps improve word alignments and acquiring these words at a later stage can improve statistical machine translation.
language of the presentation: English
 
ÅÄÃæ¡¡¹¨ 1251058: M, 1²óÌÜȯɽ ÃÎǽ¥³¥ß¥å¥Ë¥±¡¼¥·¥ç¥ó
title: electricity speech enhancement based on Noise suppression and Statistical speech production
abstract: Laryngectomees need some alternative methods of speaking to produce alaryngeal speech. Their common problem is that any type of alaryngeal speech suffers from lack of naturalness, speaker individuality and clearly. To address this problem, we have one approach. That is a hybrid method between spectrum subtraction and statistical voice conversion. In this presentation, I show you details of these methods.
language of the presentation: Japanese
 
µÜÆâ¡¡ÃÒ 1251103: M, 1²óÌÜȯɽ ²»¾ðÊó½èÍý³Ø
title: Perceptual Evaluation of Synthesized Sound Field with Separated Signals from Stereo Music Mixtures
abstract: Wave Field Synthesis (WFS) enables to reproduce highly realistic sounds. However, in conventional contents, primary source information needed in WFS has been degenerated. For this reason, the conventional contents cannot be apply to WFS. Therefore, automatic estimation method to recover spatial information of the primary source from conventional content is required. In this presentation, as a preliminary step of automatic estimation method, we report the results of a subjective evaluation experiment of distance perception in synthesized sound field using source separation based on audio objects and WFS. This evaluation was carried out to consider the problem of the possibility of distance perception in the sound field synthesis using separated signals from stereo music mixtures.
language of the presentation: Japanese
 
ÏÂÎÉÉÊ¡¡Í§Âç 1251121: M, 1²óÌÜȯɽ ¼«Á³¸À¸ì½èÍý³Ø
title: A Fast Approximate Simirarity Search with k-Nearest Neighbor Graph
abstract: A similarity search that finds valid objects similar to a given query object has been a fundamental technique for many applications. Some applications require to obtain a solution quickly, even if it is not always exact, rather than an exact solution after a long computation time, particularly when dealing wiht large-scale and high dimensional data. I will describe a fast approximate simirarity search method based on k-nearest neighbor graph for large-scale and high dimensinal data. A k-nearest neighbor graph has small-world properties, which is the tendency of an extremely small average shotest path length. Because of this property, our method has high search performance. However, the graph is difficult to construct with parallel processing. I will also introduce an alternative method. The method utilizes a graph similar to k-nearest neighbor graph, which is easy to construct with parallel processing.
language of the presentation: Japanese
 
À¶¿å¡¡¹¨¹¸ 1251051: M, 1²óÌÜȯɽ ÃÎǽ¥³¥ß¥å¥Ë¥±¡¼¥·¥ç¥ó
title: Hierarchical phrase-based model for real-time speech translation system
abstract: In recent years, there has been increasing to communicate across languages barriers. And the demand for speech translation system that can automatically translate a language into another language has also been increasing. However, when the speech translation system is used, there is a speech delay that is from the beginning of the utterance to the beginning of the speech synthesis. To shorten the speech delay can realize to communicate in real-time. So, it is difficult to communicate using the speech translation system, because a user have to wait during the delay. In this presentation, I proposed a real-time speech translation system that shortens the speech delay with keeping the translation accuracy.
language of the presentation: Japanese
 

²ñ¾ì: L3

»Ê²ñ: µÈÅħ͵
Æ£¸¶¡¡Íº²ð 1251090: M, 1²óÌÜȯɽ ¥½¥Õ¥È¥¦¥§¥¢À߷׳Ø
title: Support for Modification of Code Clone Cooperated with Version Control System
abstract: Code clones are identified as the sections of code (clone pieces) which are duplicated or similar to each other in a source code. It is generally believed that code clones prevent software developers to perform software maintenance tasks adequately. For example, when any of the clone pieces contained in code clone is modified, all other clone pieces need to be taken into consideration whether they should be consistently modified or not. If such consistent modifications are missed, they could become the cause of future bugs. There exist many methods and tools which detect code clones. However, in order to check consistent modifications, those tools need to be launched every time the source code is modified, making their use an extra burden for software developers. In this study, we propose an approach that automatically detects inconsistent modifications of code clones. So that, when a code clone is modified and committed to version control systems, inconsistent modifications are automatically noticed.
language of the presentation: Japanese
ȯɽÂêÌÜ: ¥Ð¡¼¥¸¥ç¥ó´ÉÍý¥·¥¹¥Æ¥à¤ÈÏ¢·È¤·¤¿¥³¡¼¥É¥¯¥í¡¼¥ó¤Î°ì´Ó¤·¤¿½¤Àµ»Ù±ç
 
Chu Bao Trung 1251123: M, 1²óÌÜȯɽ ·×»»¥á¥«¥Ë¥º¥à³Ø
title: An effective method for quantitative information flow analysis
abstract: Classical information flow analysis concerns non-interference, i.e., whether a high security level data never flows into a low security level output channel. However, non-interference is too restrictive notion for determining the secrecy of real-world programs. To overcome this disadvantage, researchers came up with quantitative information flow (QIF), which can be used to measure the amount of information flow through a program based on information theory. Though QIF is very useful, we still do not have an effective way to analyze it. In my talk, I would like to explain a new method proposed by Kopf & Rybalchenko, which uses approximation and randomization to effectively analyze the QIF. Also I will present my research plan to implement the method to analyze the QIF and to apply the method to automatic generation of access control.
language of the presentation: Japanese
ȯɽÂêÌÜ: ¸úΨŪ¤ÊÎÌŪ¾ðÊóή²òÀÏË¡
ȯɽ³µÍ×: ¸ÅŵŪ¤Ê¾ðÊóήʬÀÏË¡¤Ç¤Ï¡¢Èó´³¾ÄÀ­¡¢¤¹¤Ê¤ï¤Á¡¢¹â¤¤µ¡Ì©¥ì¥Ù¥ë¤Î¥Ç¡¼¥¿¤¬Ä㤤µ¡Ì©¥ì¥Ù¥ë¤Î½ÐÎϤ˷褷¤Æή¤ì¤Ê¤¤¤«¤É¤¦¤«¤ò¸¡ºº¤·¤Þ¤¹¡£¤·¤«¤·¼ÂºÝ¤Ë»È¤ï¤ì¤Æ¤¤¤ë¥×¥í¥°¥é¥à¤Ë¤È¤Ã¤ÆÈ󴳾ĤÏÀ©¸Â¤¬¶¯¤¹¤®¤Þ¤¹¡£¤³¤ÎÌäÂêÅÀ¤ò²ò·è¤¹¤ë¤¿¤á¡¢ÎÌŪ¾ðÊóή¤¬Æ³Æþ¤µ¤ì¤Þ¤·¤¿¡£ÎÌŪ¾ðÊóή²òÀϤǤϡ¢¾ðÊóÍýÏÀ¤Ë´ð¤Å¤­¥×¥í¥°¥é¥à¤òή¤ì¤ë¾ðÊóÎ̤òÄêÎÌŪ¤Ë·×»»¤·¤Þ¤¹¡£ ÎÌŪ¾ðÊóή¤Ï¤³¤Î¤è¤¦¤ËÌò¤ËΩ¤Ä¤â¤Î¤Î¡¢¸½ºß¤Ï¤Þ¤À¤½¤Î¸úΨŪ²òÀÏË¡¤ÏÃΤé¤ì¤Æ¤¤¤Þ¤»¤ó¡£º£²ó¤Îȯɽ¤Ç¤ÏKopf¤ÈRybalchenko¤¬Äó°Æ¤·¤¿¿·¤·¤¤²òÀÏË¡¤ò¾Ò²ð¤·¤Þ¤¹¡£¤³¤ì¤Ï¥×¥í¥°¥é¥à¤ÎÃê¾Ý²½¤Ë¤è¤ë¶á»÷¡¢µÚ¤Ó¥é¥ó¥À¥à²½¤ò»È¤Ã¤ÆÎÌŪ¾ðÊóή¤ò²òÀϤ¹¤ë¸úΨŪ¤ÊÊýË¡¤Ç¤¹¡£Â³¤¤¤Æȯɽ¼Ô¤Î¸¦µæ·×²è¤Ë¤Ä¤¤¤Æ¤â¤ªÏä·¤Þ¤¹¡£È¯É½¼Ô¤Ïº£²ó¾Ò²ð¤·¤¿²òÀÏË¡¤ò¼ÂÁõ¤·¡¢¤Þ¤¿¤½¤Î²òÀÏË¡¤ò¥¢¥¯¥»¥¹À©¸æ¤Î¼«Æ°ÅªÀ¸À®ÌäÂê¤Ë±þÍѤ¹¤ëͽÄê¤Ç¤¹¡£
 
Yussuf Ali 1251130: M, 1²óÌÜȯɽ ¥Ç¥£¥Ú¥ó¥À¥Ö¥ë¥·¥¹¥Æ¥à³Ø
title: Scan Test Power Simulation on GPGPUs
abstract: During Scan-Test the chip encounters a much higher switching activity compared to the normal functional mode. This high switching activity results in higher power consumption. Much research is done in order to optimize scan testing. The behavior of the chip during scan testing can be simulated with the help of a timing simulator. Depending on the size of the chip this simulation process can take many hours or even days. To accelerate the simulation process, the GPU can be used. Because during the scan test all input pattern are known in advance, all patterns can be simulated at the same time. In the presentation I will introduce a timing simulator, which uses the GPU, one of the key features of this simulator is the support for hazards.
language of the presentation: Japanese
 
¼ÅÄ¡¡ÂçÊå 1251106: M, 1²óÌÜȯɽ ¾ðÊó´ðÈ×¥·¥¹¥Æ¥à³Ø
title: Network security in a IPv4-IPv6 address mixed network
abstract: As new Internet Protocol version 6 (IPv6) emerged, many people believe this protocol can provide good protection against network worms due to its huge address space. However, IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. So, IPv4-IPv6 dual-stack network is more dangerous than pure IPv4 Internet. In this presentation, I will talk about malware behave differently on IPv6 from IPv4 network protocol on the dual-stack network and a lot of things that want to do.
language of the presentation: Japanese