IEICE Transactions on Information and Systems
Online ISSN : 1745-1361
Print ISSN : 0916-8532
Current issue
Displaying 1-15 of 15 articles from this issue
Special Section on Knowledge-Based Software Engineering
  • Takuya SARUWATARI
    2024 Volume E107.D Issue 5 Pages 588
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS
    Download PDF (191K)
  • Junko SHIROGANE, Daisuke SAYAMA, Hajime IWATA, Yoshiaki FUKAZAWA
    Article type: PAPER
    2024 Volume E107.D Issue 5 Pages 589-601
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    Webpage texts are often emphasized by decorations such as bold, italic, underline, and text color using HTML (HyperText Markup Language) tags and CSS (Cascading Style Sheets). However, users with visual impairment often struggle to recognize decorations appropriately because most screen readers do not read decorations appropriately. To overcome this limitation, we propose a method to read emphasized texts by changing the reading voice parameters of a screen reader and adding sound effects. First, the strong emphasis types and reading voices are investigated. Second, the intensity of the emphasis type is used to calculate a score. Then the score is used to assign the reading method for the emphasized text. Finally, the proposed method is evaluated by users with and without visual impairment. The proposed method can convey emphasized texts, but future improvements are necessary.

    Download PDF (2647K)
  • Shinpei HAYASHI, Teppei KATO, Motoshi SAEKI
    Article type: PAPER
    2024 Volume E107.D Issue 5 Pages 602-612
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    Use case descriptions describe features consisting of multiple concepts with following a procedural flow. Because existing feature location techniques lack a relation between concepts in such features, it is difficult to identify the concepts in the source code with high accuracy. This paper presents a technique to locate concepts in a feature described in a use case description consisting of multiple use case steps using dependency between them. We regard each use case step as a description of a concept and apply an existing concept location technique to the descriptions of concepts and obtain lists of modules. Also, three types of dependencies: time, call, and data dependencies among use case steps are extracted based on their textual description. Modules in the obtained lists failing to match the dependency between concepts are filtered out. Thus, we can obtain more precise lists of modules. We have applied our technique to use case descriptions in a benchmark. Results show that our technique outperformed baseline setting without applying the filtering.

    Download PDF (1466K)
Special Section on Data Engineering and Information Management
  • Yu SUZUKI
    2024 Volume E107.D Issue 5 Pages 613-614
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS
    Download PDF (306K)
  • Kota CHIN, Keita EMURA, Shingo SATO, Kazumasa OMOTE
    Article type: PAPER
    2024 Volume E107.D Issue 5 Pages 615-624
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    In an open-bid auction, a bidder can know the budgets of other bidders. Thus, a sealed-bid auction that hides bidding prices is desirable. However, in previous sealed-bid auction protocols, it has been difficult to provide a “fund binding” property, which would guarantee that a bidder has funds more than or equal to the bidding price and that the funds are forcibly withdrawn when the bidder wins. Thus, such protocols are vulnerable to a false bidding. As a solution, many protocols employ a simple deposit method in which each bidder sends a deposit to a smart contract, which is greater than or equal to the bidding price, before the bidding phase. However, this deposit reveals the maximum bidding price, and it is preferable to hide this information. In this paper, we propose a sealed-bid auction protocol that provides a fund binding property. Our protocol not only hides the bidding price and a maximum bidding price, but also provides a fund binding property, simultaneously. For hiding the maximum bidding price, we pay attention to the fact that usual Ethereum transactions and transactions for sending funds to a one-time address have the same transaction structure, and it seems that they are indistinguishable. We discuss how much bidding transactions are hidden. We also employ DECO (Zhang et al., CCS 2020) that proves the validity of the data to a verifier in which the data are taken from a source without showing the data itself. Finally, we give our implementation which shows transaction fees required and compare it to a sealed-bid auction protocol employing the simple deposit method.

    Download PDF (914K)
  • Savong BOU, Toshiyuki AMAGASA, Hiroyuki KITAGAWA
    Article type: PAPER
    2024 Volume E107.D Issue 5 Pages 625-637
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    Forecasting time-series data is useful in many fields, such as stock price predicting system, autonomous driving system, weather forecast, etc. Many existing forecasting models tend to work well when forecasting short-sequence time series. However, when working with long sequence time series, the performance suffers significantly. Recently, there has been more intense research in this direction, and Informer is currently the most efficient predicting model. Informer's main drawback is that it does not allow for incremental learning. In this paper, we propose a Fast Informer called Finformer, which addresses the above bottleneck by reducing the training/predicting time of Informer. Finformer can efficiently compute the positional/temporal/value embedding and Query/Key/Value of the self-attention incrementally. Theoretically, Finformer can improve the speed of both training and predicting over the state-of-the-art model Informer. Extensive experiments show that Finformer is about 26% faster than Informer for both short and long sequence time series prediction. In addition, Finformer is about 20% faster than InTrans for the general Conv1d, which is one of our previous works and is the predecessor of Finformer.

    Download PDF (7229K)
  • Yuma NAGI, Kazushi OKAMOTO
    Article type: PAPER
    2024 Volume E107.D Issue 5 Pages 638-649
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    The study proposes a personalised session-based recommender system that embeds items by using Word2Vec and sequentially updates the session and user embeddings with the hierarchicalization and aggregation of item embeddings. To process a recommendation request, the system constructs a real-time user embedding that considers users' general preferences and sequential behaviour to handle short-term changes in user preferences with a low computational cost. The system performance was experimentally evaluated in terms of the accuracy, diversity, and novelty of the ranking of recommended items and the training and prediction times of the system for three different datasets. The results of these evaluations were then compared with those of the five baseline systems. According to the evaluation experiment, the proposed system achieved a relatively high recommendation accuracy compared with baseline systems and the diversity and novelty scores of the proposed system did not fall below 90% for any dataset. Furthermore, the training times of the Word2Vec-based systems, including the proposed system, were shorter than those of FPMC and GRU4Rec. The evaluation results suggest that the proposed recommender system succeeds in keeping the computational cost for training low while maintaining high-level recommendation accuracy, diversity, and novelty.

    Download PDF (7390K)
  • Ayano OKOSO, Keisuke OTAKI, Yoshinao ISHII, Satoshi KOIDE
    Article type: PAPER
    2024 Volume E107.D Issue 5 Pages 650-658
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    Owing to the COVID-19 pandemic, many academic conferences are now being held online. Our study focuses on online video conferences, where participants can watch pre-recorded embedded videos on a conference website. In online video conferences, participants must efficiently find videos that match their interests among many candidates. There are few opportunities to encounter videos that they may not have planned to watch but may be of interest to them unless participants actively visit the conference. To alleviate these problems, the introduction of a recommender system seems promising. In this paper, we implemented typical recommender systems for the online video conference with 4,000 participants and analyzed users' behavior through A/B testing. Our results showed that users receiving recommendations based on collaborative filtering had a higher continuous video-viewing rate and spent longer on the website than those without recommendations. In addition, these users were exposed to broader videos and tended to view more from categories that are usually less likely to view together. Furthermore, the impact of the recommender system was most significant among users who spent less time on the site.

    Download PDF (2045K)
  • Satoshi ITO, Tomoaki KANAYA, Akihiro NAKAO, Masato OGUCHI, Saneyasu YA ...
    Article type: PAPER
    2024 Volume E107.D Issue 5 Pages 659-673
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    The concepts of programmable switches and software-defined networking (SDN) give developers flexible and deep control over the behavior of switches. We expect these concepts to dramatically improve the functionality of switches. In this paper, we focus on the concept of Deeply Programmable Networks (DPN), where data planes are programmable, and application switches based on DPN. We then propose a method to improve the performance of a key-value store (KVS) through an application switch. First, we explain the DPN and application switches. The DPN is a network that makes not only control planes but also data planes programmable. An application switch is a switch that implements some functions of network applications, such as database management system (DBMS). Second, we propose a method to improve the performance of Cassandra, one of the most popular key-value based DBMS, by implementing a caching function in a switch in a dedicated network such as a data center. The proposed method is expected to be effective even though it is a simple and traditional way because it is in the data path and the center of the network application. Third, we implement a switch with the caching function, which monitors the accessed data described in packets (Ethernet frames) and dynamically replaces the cached data in the switch, and then show that the proposed caching switch can significantly improve the KVS transaction performance with this implementation. In the case of our evaluation, our method improved the KVS transaction throughput by up to 47%.

    Download PDF (3322K)
  • Kensuke SUMOTO, Kenta KANAKOGI, Hironori WASHIZAKI, Naohiko TSUDA, Nob ...
    Article type: PAPER
    2024 Volume E107.D Issue 5 Pages 674-682
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    Security-related issues have become more significant due to the proliferation of IT. Collating security-related information in a database improves security. For example, Common Vulnerabilities and Exposures (CVE) is a security knowledge repository containing descriptions of vulnerabilities about software or source code. Although the descriptions include various entities, there is not a uniform entity structure, making security analysis difficult using individual entities. Developing a consistent entity structure will enhance the security field. Herein we propose a method to automatically label select entities from CVE descriptions by applying the Named Entity Recognition (NER) technique. We manually labeled 3287 CVE descriptions and conducted experiments using a machine learning model called BERT to compare the proposed method to labeling with regular expressions. Machine learning using the proposed method significantly improves the labeling accuracy. It has an f1 score of about 0.93, precision of about 0.91, and recall of about 0.95, demonstrating that our method has potential to automatically label select entities from CVE descriptions.

    Download PDF (11557K)
  • Keisuke KAWANO, Satoshi KOIDE, Hiroaki SHIOKAWA, Toshiyuki AMAGASA
    Article type: PAPER
    2024 Volume E107.D Issue 5 Pages 683-693
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    Graph dissimilarities provide a powerful and ubiquitous approach for applying machine learning algorithms to edge-attributed graphs. However, conventional optimal transport-based dissimilarities cannot handle edge-attributes. In this paper, we propose an optimal transport-based dissimilarity between graphs with edge-attributes. The proposed method, multi-dimensional fused Gromov-Wasserstein discrepancy (MFGW), naturally incorporates the mismatch of edge-attributes into the optimal transport theory. Unlike conventional optimal transport-based dissimilarities, MFGW can directly handle edge-attributes in addition to structural information of graphs. Furthermore, we propose an iterative algorithm, which can be computed on GPUs, to solve non-convex quadratic programming problems involved in MFGW. Experimentally, we demonstrate that MFGW outperforms the conventional optimal transport-based dissimilarity in several machine learning applications including supervised classification, subgraph matching, and graph barycenter calculation.

    Download PDF (4899K)
Regular Section
  • Haijun ZHOU, Weixiang LI, Ming CHENG, Yuan SUN
    Article type: PAPER
    Subject area: Fundamentals of Information Systems
    2024 Volume E107.D Issue 5 Pages 694-703
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    Traditional intuitionistic fuzzy sets and hesitant fuzzy sets will lose some information while representing vague information, to avoid this problem, this paper constructs weighted generalized hesitant fuzzy sets by remaining multiple intuitionistic fuzzy values and giving them corresponding weights. For weighted generalized hesitant fuzzy elements in weighted generalized hesitant fuzzy sets, the paper defines some basic operations and proves their operation properties. On this basis, the paper gives the comparison rules of weighted generalized hesitant fuzzy elements and presents two kinds of aggregation operators. As for weighted generalized hesitant fuzzy preference relation, this paper proposes its definition and computing method of its corresponding consistency index. Furthermore, the paper designs an ensemble learning algorithm based on weighted generalized hesitant fuzzy sets, carries out experiments on 6 datasets in UCI database and compares with various classification algorithms. The experiments show that the ensemble learning algorithm based on weighted generalized hesitant fuzzy sets has better performance in all indicators.

    Download PDF (1366K)
  • Qi WANG, Yicheng DI, Lipeng HUANG, Guowei WANG, Yuan LIU
    Article type: PAPER
    Subject area: Artificial Intelligence, Data Mining
    2024 Volume E107.D Issue 5 Pages 704-713
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    When new users join a recommender system, traditional approaches encounter challenges in accurately understanding their interests due to the absence of historical user behavior data, thus making it difficult to provide personalized recommendations. Currently, two main methods are employed to address this issue from different perspectives. One approach is centered on meta-learning, enabling models to adapt faster to new tasks by sharing knowledge and experiences across multiple tasks. However, these methods often overlook potential improvements based on cross-domain information. The other method involves cross-domain recommender systems, which transfer learned knowledge to different domains using shared models and transfer learning techniques. Nonetheless, this approach has certain limitations, as it necessitates a substantial amount of labeled data for training and may not accurately capture users' latent preferences when dealing with a limited number of samples. Therefore, a crucial need arises to devise a novel method that amalgamates cross-domain information and latent preference extraction to address this challenge. To accomplish this objective, we propose a Cross-domain Recommender System based on Domain Knowledge Transferor and Latent Preference Extractor (TECDR). In TECDR, we have designed a Latent Preference Extractor that transforms user behaviors into representations of their latent interests in items. Additionally, we have introduced a Domain Knowledge Transfer mechanism for transferring knowledge and patterns between domains. Moreover, we leverage meta-learning-based optimization methods to assist the model in adapting to new tasks. The experimental results from three cross-domain scenarios demonstrate that TECDR exhibits outstanding performance across various cross-domain recommender scenarios.

    Download PDF (1636K)
  • Nawras KHUDHUR, Aryo PINANDITO, Yusuke HAYASHI, Tsukasa HIRASHIMA
    Article type: PAPER
    Subject area: Educational Technology
    2024 Volume E107.D Issue 5 Pages 714-727
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    This study investigates the efficacy of a partial decomposition approach in concept map recomposition tasks to reduce cognitive load while maintaining the benefits of traditional recomposition approaches. Prior research has demonstrated that concept map recomposition, involving the rearrangement of unconnected concepts and links, can enhance reading comprehension. However, this task often imposes a significant burden on learners' working memory. To address this challenge, this study proposes a partial recomposition approach where learners are tasked with recomposing only a portion of the concept map, thereby reducing the problem space. The proposed approach aims at lowering the cognitive load while maintaining the benefits of traditional recomposition task, that is, learning effect and motivation. To investigate the differences in cognitive load, learning effect, and motivation between the full decomposition (the traditional approach) and partial decomposition (the proposed approach), we have conducted an experiment (N=78) where the participants were divided into two groups of “full decomposition” and “partial decomposition”. The full decomposition group was assigned the task of recomposing a concept map from a set of unconnected concept nodes and links, while the partial decomposition group worked with partially connected nodes and links. The experimental results show a significant reduction in the embedded cognitive load of concept map recomposition across different dimensions while learning effect and motivation remained similar between the conditions. On the basis of these findings, educators are recommended to incorporate partially disconnected concept maps in recomposition tasks to optimize time management and sustain learner motivation. By implementing this approach, instructors can conserve cognitive resources and allocate saved energy and time to other activities that enhance the overall learning process.

    Download PDF (1401K)
  • Chunhua QIAN, Xiaoyan QIN, Hequn QIANG, Changyou QIN, Minyang LI
    Article type: LETTER
    Subject area: Artificial Intelligence, Data Mining
    2024 Volume E107.D Issue 5 Pages 728-731
    Published: May 01, 2024
    Released on J-STAGE: May 01, 2024
    JOURNAL FREE ACCESS

    The segmentation performance of fresh tea sprouts is inadequate due to the uncontrollable posture. A novel method for Fresh Tea Sprouts Segmentation based on Capsule Network (FTS-SegCaps) is proposed in this paper. The spatial relationship between local parts and whole tea sprout is retained and effectively utilized by a deep encoder-decoder capsule network, which can reduce the effect of tea sprouts with uncontrollable posture. Meanwhile, a patch-based local dynamic routing algorithm is also proposed to solve the parameter explosion problem. The experimental results indicate that the segmented tea sprouts via FTS-SegCaps are almost coincident with the ground truth, and also show that the proposed method has a better performance than the state-of-the-art methods.

    Download PDF (1766K)
feedback
Top