Akito Sakurai

Akito Sakurai
  • Keio University

About

75
Publications
12,510
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
638
Citations
Current institution
Keio University

Publications

Publications (75)
Article
Current image quality assessment (IQA) methods require the original images for evaluation. However, recently, IQA methods that use machine learning have been proposed. These methods learn the relationship between the distorted image and the image quality automatically. In this paper, we propose an IQA method based on deep learning that does not req...
Article
This research investigates vision‐based automated bridge component recognition, which is critical for automating visual inspection of bridges during initial response after earthquakes. Semantic segmentation algorithms with up to 45 convolutional layers are applied to recognize bridge components from images of complex scenes. One of the challenges i...
Article
Full-text available
This paper proposes a quality recovery network (QRNet) that recovers the image quality from distorted images and improves the classification accuracy for image classification using these recovered images as the classifier inputs, which are optimized for image quality loss and classification loss. In certain image classification tasks, classifiers b...
Article
Full-text available
Stagnant water on reinforced concrete (RC) decks shortens their fatigue life significantly compared to dry conditions. By using a multi-scale simulation together with the pseudo-cracking method, the remaining fatigue life of real RC bridge decks covered by stagnant water is estimated based upon their site-inspected surface crack's patterns. For qui...
Article
In the midst of the increasing Port Structures that have crossed the in-service period of 50 years from construction, there is also deterioration in the number of divers carrying out the underwater investigation. Hence it is indispensible to develop a technique capable of carrying out wider area investigation in a shorter time, as an alternative of...
Article
In this paper, we propose an image quality estimation method using deep learning. In the conventional image quality estimation method, image characteristics were analyzed for each distortion of the image, and a model was constructed. In recent years, image quality estimation method that learns automatically the relationship between distortion and i...
Data
Randomized Artificial Crack Patterns are introduced to compensate the biased data of the real crack patterns from site.
Article
Full-text available
By integrating a multi-scale simulation with the pseudo-cracking method, the remaining fatigue life of in-service reinforced concrete (RC) bridge decks can be estimated based upon their site-inspected crack patterns. But, it still takes time for computation. In order to achieve a quick deterioration-magnitude assessment of RC decks based upon their...
Article
The goal of semi-supervised learning is to utilize many unlabeled samples under a situation where a few labeled samples exist. Recently, researches of semi-supervised learning are evolving with deep learning technology development, because, in deep, models have powerful representation to make use of abundant unlabeled samples. In this paper, we pro...
Article
Full-text available
We generate a large number of predictive models by applying linear kernel SVR to historical currency rates’ bid data for three currency pairs obtained from high-frequency trading. The bid tick data are converted into equally spaced (1 min) data. Differences of price between the previous successive timeframes are used as features to predict the dire...
Article
Many questions are posted on community websites in the world. Some of these questions are actually asked in order to receive empathy for the feelings of questioners, instead of getting specific answers to the questions asked. However, it is difficult to receive answers for these questions compared with questions that are asked for seeking responses...
Conference Paper
We analyze the performance of various models constructed using linear kernel SVR and trained on historical bid data for high frequency currency trading. The bid tick data is converted into equally spaced (1 min) data. Different values for the number of training samples, number of features, and the length of the timeframes are used when conducting t...
Conference Paper
Many questions are posted on community websites in the world. Some of these questions are actually asked in order to receive empathy for the feelings of questioners, instead of getting specific answers to the questions asked. However, it is difficult to receive answers for these questions compared with questions that are asked for seeking responses...
Conference Paper
Widespread popularization of social networking services (SNSs) promoted, many studies about marketing activities using SNSs. But, there are a few studies focused on tendencies of consumer communities on SNSs. In this paper, we focus on a fashion brand and “Instagram”. And we study about tendencies of consumer communities on SNSs to present necessar...
Article
Full-text available
Efficient market hypothesis is widely accepted in financial market studies and entails the unpredictability of future stock prices. In this study, we show that a simple analysis can classify short-term stock price changes with an 82.9% accuracy. Our analysis uses the order book information of high-frequency trading. The volume of high-frequency tra...
Conference Paper
Widespread popularization of social networking services (SNSs) prompted, for example, a voluntary community such as an orchestra club of a university to use an SNS to support their activities. However, it is not all-purpose and lacks functions to improve members’ individual skills. Appropriate practice is a great help but we hardly find functions t...
Conference Paper
In this paper, we propose a method to visualize information regarding hobbies and interests of a person inferred from tweets on Twitter to support informal communication in the real world. Analysis of the current states and experiments on informal communication clarified that it is important and useful for a person to know information such as hobbi...
Article
This study targets social login registrants on an EC site and aims to clarify the difference between the purchasing tendency of social login registrants and general members by analyzing product purchasing history. We focused on the golf portal site that is the subject of this research. We analyzed the purchasing data comparing social login registra...
Conference Paper
Full-text available
地名辞書の整備は地理情報システムを構築する上で重要な課題であるが,既存の辞書や手法では,口語的な地名表現 を自動的に地名と判定することは難しい.本研究では Twitter 文書内の単語の並びや構造に着目し,口語的な地名表現 を判定するシステムを提案する.大規模Twitterデータから構築したニューラルネットワーク言語モデル(NNLM)を 用いて,ベクトル空間内での既存地名への近接性から,ある単語が地名であるか否かを判定することを目指す.評価実 験を通じてNNLMとクラスタリングを組み合わせることで,口語的な地名を抽出できる可能性を提示した.
Article
Full-text available
Recently, the number of voluntary communities such as local communities and university club activities are increasing. In these communities, since there are various types of members and there are no binding forces, it is usually difficult to maintain and im-prove member's motivation. To maintain and improve member's motivation, most of these commun...
Article
In this study, we conducted foreign exchange rate simulated trading based on a traditional Japanese technical indicator called Ichimoku Kinkohyo, which is well-known and widely used in Japan for technical analysis on various kinds of market prices. We designed two trading strategies based on the support/resistance level of the five elements of Ichi...
Article
Full-text available
Currency trading is an important area for individual investors, government policy decisions, and organization investments. In this study, we propose a hybrid approach referred to as MKL-DE, which combines multiple kernel learning (MKL) with differential evolution (DE) for trading a currency pair. MKL is used to learn a model that predicts changes i...
Conference Paper
In this research, we built a support system for improving motivation by utilizing gamification, targeting one university circle, the Senshu University Philharmonic Orchestra, as an example of voluntary communities. The purpose of this research was to maintain and improve the motives of each individual orchestra member for practice. Analysis of the...
Article
Full-text available
This study proposes a multiple kernel learning (MKL)-based regression model for crude oil spot price forecasting and trading. We used a well-known trend-following technical analysis indicator, the moving average convergence and divergence (MACD) indicator, for extracting features from original spot prices. Additionally, we factored in the possibili...
Article
Full-text available
Predicting stock price change rates for providing valuable information to investors is a challenging task. Individual participants may express their opinions in social network service (SNS) before or after their transactions in the market; we hypothesize that stock price change rate is better predicted by a function of social network service activi...
Article
In this paper, we propose a Laplacian minimax probability machine, which is a semi-supervised version of minimax probability machine based on the manifold regularization framework. We also show that the proposed method can be kernelized on the basis of a theorem similar to the representer theorem for non-linear cases. Experiments confirm that the p...
Conference Paper
Recently, social games have attracted considerable attention. Building a relationship with other players can heighten the enjoyment derived from these games. However, many users play social games only with their fixed friends. There are functions to assist users to find friends in social games and SNS, but the existing functions are not simple enou...
Conference Paper
This study applies a genetic algorithm (GA) to generate trading rules for currency trading based on a single technical indicator named the Relative Strength Index (RSI) as well as multiple timeframes from which we extract the feature. The target trading currency pair is EUR/USD and trading time horizon is one hour. Using more than one timeframe may...
Article
Our proposed prediction and learning method is a hybrid referred to as MKL-GA, which combines multiple kernel learning (MKL) for regression (MKR) and a genetic algorithm (GA) to construct the trading rules. In this study, we demonstrate that the evaluation criteria used to examine the effectiveness of a financial market price forecasting method sho...
Article
Full-text available
In trading in currency markets, reducing te mean of absolute or squared errors of predicted values is not valuable unless it results in profits. A trading rule is a set of conditions that describe when to buy or sell a currency or to close a position, which can be used for automated trading. To optimize the rule to obtain a profit in the future, a...
Conference Paper
To recognize technical term, term dictionaries or tagged corpora are required, but it will take much cost to compile them. Moreover, the terms may have several representations and new terms may be developed, which complicates the problem further, that is, a simple dictionary building can’t solve the problem. In this research, to reduce the cost of...
Conference Paper
This paper proposes a stock price prediction model, which extracts features from time series data and social networks for prediction of stock prices and evaluates its performance. In this research, we use the features such as numerical dynamics (frequency) of news and comments, overall sentiment analysis of news and comments, as well as technical a...
Article
This paper proposes a stock price prediction model, which extracts features from time series data, news, and comments on the news, for prediction of stock price and evaluates its performance. In this research, we do not take account of text contents of news and user comments, but just consider numerical features of news and communication dynamics a...
Article
This paper proposes a method to give an early warning of an abrupt change of price in a foreign exchange market. Volatility is a quantification of how much a value moves in a time series. It is now customary to assume that volatility of foreign exchange markets is time-varying. Intuitively we observe that there are at least two states or regimes: o...
Conference Paper
In this paper we propose Manifold-Regularized Minimax Probability Machine, called MRMPM. We show that Minimax Probability Machine can properly be extended to semi-supervised version in the manifold regularization framework and that its kernelized version is obtained for non-linear case. Our experiments show that the proposed methods achieve results...
Article
This paper proposes a hybrid model named MKL-GA, which combines Multiple Kernel Learning (MKL) and Genetic Algorithm (GA), for modeling and the prediction of FX (foreign exchange) rate on USDJPY currency pair by extracting features from three main FX pairs with three different short time horizons. Firstly, the MKL regression model predicts the chan...
Article
The sensitivity of the M-cones and L-cones of an anomalous trichromat is lower than that of normal trichromats. By intensifying the light to the cones with lower sensitivity, the output ratio from the cone approached the level of a normal trichromat, and it was presumed that achieving close to original color recognition was a possibility. In order...
Conference Paper
Naive Bayes (NB) is a simple Bayesian classifier that assumes the conditional independence and augmented NB (ANB) models are extensions of NB by relaxing the independence assumption. The averaged one-dependence estimators (AODE) is a classifier that averages ODEs, which are ANB models. However, the expressiveness of AODE is still limited by the res...
Conference Paper
This paper states the issues faced, and the role played by keyword dictionaries with regard to discussion based web sites which aim to achieve a ’collective knowledge’ through the voluntary participation of corporate employees, and proposes a corrective strategy. A keyword dictionary is valuable in that it helps to integrate fragmented accumulated...
Conference Paper
The sensitivity of the M-cones and L-cones of an anomalous trichromat is lower than that of normal trichromats. By intensifying the light to the cones with lower sensitivity, the output ratio from the cone approached the level of a normal trichromat, and it was presumed that achieving close to original color recognition was a possibility. In order...
Conference Paper
Full-text available
It is meaningful to investigate the know-how of experienced project managers on the side of vendors about the risk in offshore software outsourcing. A survey is conducted to find out the main risk factors from the vendor’s viewpoint. The questions asked include background information of vendor and respondent, suggestions to the client, and evaluati...
Article
Some of significant aspects associated with IT offshoring practices of several leading Japanese companies are discussed. Several companies, such as Toshiba, IBM-Japan, Hitachi, and Mitsubishi adopt IT offshore practices with their offshore vendors from countries, including China, Vietnam, India, Hungary, Romania, and Russia. Investigations reveal t...
Chapter
Productivity is the key property of a natural language. Learnability is an equally important property, since productivity without learnability will not help the transfer of a language beyond generations. Linguistic productivity is supported by recursiveness described in terms of phrasal categories and systamaticity described in terms of lexical cat...
Conference Paper
We propose a method of extracting named entities that are related to a single input word. Focusing on the syntactic dependency relation in sentences, it is reasonable to extract a case element that syntactically depends on the predicate that the input word depends on. In Japanese, though, a word which has appeared in a previous sentence is often om...
Article
We propose an automatic and adaptive method to detect relatively important parts in multimedia content. The important parts of content should characterize the whole content and also be regarded as its summary. By applying our method, users capture important screenshots of the content and extract a set of important parts of the content that contain...
Conference Paper
We give a necessary condition that a simple recurrent neural network with two sigmoidal hidden units to implement a recognizer of the formal language {a n b n | n > 0 } which is generated by a set of generating rules {S→aSb, S→ab } and show that by setting parameters so as to conform to the condition we get a recognizer of the language. The cond...
Article
We propose in this paper a SOM-like algorithm that accepts online, as inputs, starts and ends of viewing of a multimedia content by many users; a one-dimensional map is then self-organized, providing an approximation of density distribution showing how many users see a part of a multimedia content. In this way “viewing behavior of crowds” informati...
Conference Paper
As the volumes of software development increase and the cost reduction is required, most Japanese IT companies are interested in offshore software outsourcing. Although a lot of engineers have experienced the success and failure on their projects, their know-how still remains as tacit knowledge. This paper proposes a risk assessment scheme for new...
Chapter
Full-text available
Data mining is the efficient discovery of patterns in large databases, and classification rules are perhaps the most important type of patterns in data mining applications. However, the number of such classification rules is generally very big that selection of interesting ones among all discovered rules becomes an important task. In this paper, fa...
Article
Recent research hypothesizes that the capacity for syntactic recursions forms the computational core of a uniquely human language faculty. Contrary to this hypothesis, Gentner et al. claimed that the capacity to classify sequences from recursive, center-embedded grammar is not uniquely human. We show in this paper that the patterns Gentner used are...
Article
We propose a new multimedia viewing environment in which users can effectively share their histories of viewing digital content. A viewing history is a record of which parts of the content the user viewed and/or listened to (and how many times) and which parts the user skipped. Since the parts viewed more frequently should reflect their importance,...
Article
Full-text available
In this paper, we propose a method of extracting "action re- lations" between related topic words from Japanese weblogs (blogs). An action relation is a tuple of agent, target and predicate. Our method obtains blog articles that contain two keywords by AND search and outputs action relations con- structed from the predicate and the two keywords wit...
Article
We experimentally show that, in the grammar learning by recurrent neural networks, the networks can learn a word categorization that is consistent with the grammatical categories of words in exemplar sentences.
Chapter
We consider the problem of determining VC-dimension Ö{16( N \mathord/ \vphantom N logN logN )( 1 + o(1) ) + 4n2 } - 2n\sqrt {16\left( {{N \mathord{\left/{\vphantom {N {\log N}}} \right.\kern-\nulldelimiterspace} {\log N}}} \right)\left( {1 + o(1)} \right) + 4n^2 } - 2n and lower bounded by Ö{6( N \mathord/ \vphantom N logN logN )( 1 + o(1) )( 9...
Article
We propose a method to improve the performance of R-learning, a reinforcement learning algorithm, by using multiple state-action value tables. Unlike Q- or Sarsa learning, R-learning learns a policy to maximize undiscounted rewards. Multiple state-action value tables cause substantial explorations as needed and make R-learning work well. Efficiency...
Article
More sensors do not necessarily result in more appropriate state descriptions, so that a mobile robot has to select an appropriate set of sensors besides learning a state-action function in a reinforcement learning environment. We present a multi-armed bandit formulation of the problem and apply it to mobile robot navigation task. We modified the r...
Conference Paper
We propose a role sharing model of language areas in which Broca’s area is for categorizing symbols used to represent rules stored and retrieved in other language areas. For example, at the syntactical level, the other language areas store rules represented with terminal symbols and also rules represented with non-terminal symbols, whereas Broca ar...
Article
We propose a stochastic learning algorithm for multilayer perceptrons of linear-threshold function units, which theoretically converges with probability one and experimentally exhibits 100% convergence rate and remarkable speed on parity and classification problems with typical generalization accuracy. For learning the n bit parity function with n...
Article
Our concept of a digital library from a user's viewpoint is explained by using a three-layer model of information distribution: information provider, information broker, and information user. Our worldwide communication-hall prototype consists of the virtual personal library client, called Webshelf, an information publishing server, and a hypermedi...
Article
. We consider the VC-dimension of a set of the neural networks of depth s with w adjustable parameters that has h hidden units of activation functions of at most q segments of degree at most d polynomials. When d 2 and q 2, the VC-dimension is O(ws(s log d + log(qh=s))), O(ws((h=s) log q) + log d), andOmega ws log(dqh=s)). When d 2 and q = 1, it is...
Article
. W 2 h 2 is an asymptotic upper bound for the VC-dimension of a large class of neural networks including sigmoidal, radial basis functions, and sigma-pi networks, where h is the number of hidden units and W is the number of adjustable parameters, which extends Karpinski and Macintyre's resent results.* The class is characterized by polynomial inpu...
Conference Paper
0(ws(s log d+log(dqh/s))) and 0(ws((h/s) log q)+log[dqh/s)) are upper bounds for the VC-dimension of a set of neural networks of units with piecewise polynomial activation functions, where s is the depth of the network, h is the number of hidden units, w is the number of adjustable parameters, q is the maximum of the number of polynomial segments o...
Article
We consider the problem of determining the VC-dimension δ3(h) of depth four n-input 1-output threshold circuits with h elements. Best known asymptotic lower bounds and upper bounds are proved, that is, when h → ∞, δ3(h) is upper bounded by ((h23) + nh)(log h)(1 + o(1)) and lower bounded by (12)((h24) + nh)(log h)(1 − o(1)). We also consider the pro...
Conference Paper
The author shows that an n - h -1 artificial neural network with n real inputs, a single layer of h hidden units, and one binary output unit can store correctly at least n × h +1 examples in a general position. The proof is constructive so that weights are obtained deterministically from examples. The result is thought to be a generalization of the...
Conference Paper
We propose an algorithm to prove a definite clause is modeled by an intended minimal model of a set of definite clauses. In the algorithm, no induction scheme will be used explicitly, although in effect a mathematical induction is implied. This algorithm corresponds to an inductionless induction method using the Knuth-Bendix algorithm in an equatio...
Article
It has become popular to search the Internet or local databases for images. Meta information is commonly used in such image searches. It is, though, difficult and costly to annotate images with meta information that may describe their contents, which is also true in searching for paintings. As an important step for the content-based painting search...
Article
We consider the problem of language identification in the limit from positive data enumerated by primitive recursive functions. Conditions are described under which families of languages are identifiable. These conditions depend on the behavior of inference machines when they are presented with enumerations of elements of unknown languages. How the...

Network

Cited By