As one pillar of ntt’s IOWN (Innovative Optical and Wireless Network) vision, Digital Twin Computing aims to construct the world in a digital space. To this end, it is essential that data be obtained from people and ...
详细信息
We propose a meta-learning method for positive and unlabeled (PU) classification, which improves the performance of binary classifiers obtained from only PU data in unseen target tasks. PU learning is an important pro...
详细信息
This study investigates the talking face generation method to convert a speaker’s video to give a target impression, such as “favorable” or “considerate”. Such an impression conversion method needs to consider th...
This study investigates the talking face generation method to convert a speaker’s video to give a target impression, such as “favorable” or “considerate”. Such an impression conversion method needs to consider the input speech semantics because they affect the impression of a speaker’s video along with the facial expression. Conventional emotional talking face generation methods utilize speech information to synchronize the lip and speech of the output video. However, they cannot consider speech semantics because the speech representations contain only phonetic information. To solve this problem, we propose a facial expression conversion model that uses a semantic vector obtained from BERT embeddings of speech recognition results of input speech. We first constructed an audio-visual dataset with impression labels assigned to each utterance. The evaluation results based on the dataset showed that the proposed method could improve the estimation accuracy of the facial expressions of the target video.
With the spread of open-ear earphones that do not cover the ear, new listening experiences are being proposed that combines real ambient sounds with virtual sounds heard from earphones. At ntt, we call this merging of...
详细信息
While foundation models have been exploited for various expert tasks through fine-tuning, any foundation model will become outdated due to its old knowledge or limited capability. Thus the underlying foundation model ...
详细信息
One of the success factors of Business process outsourcing (BPO) is a comprehensive and in-depth understanding of the business processes outsourced. However, such business processes are often undocumented, and discove...
详细信息
ISBN:
(数字)9798350376968
ISBN:
(纸本)9798350376975
One of the success factors of Business process outsourcing (BPO) is a comprehensive and in-depth understanding of the business processes outsourced. However, such business processes are often undocumented, and discovering them is difficult and time-consuming for BPO service providers. Previously, we introduced an approach for business process discovery that uses swim lanes to recognize that different parts of the process may be performed by different parts of an organization. It generates the business process from an event log and user information extracted from an existing system. Herein, this paper examines whether the approach aids engineers and consultants in the providers who need to investigate business processes of organizations (i.e., their customers on which they do not have sufficient knowledge) discovering the implicit operational knowledge of the target business processes (e.g., undocumented local rules). To do so, we survey an industrial workflow system from which we collected data about 2,000 events and 269 users for a two-year period of the system's operation. We conducted a study on the case by means of document evaluation and expert interviews. The study suggested that the output of the approach is a valuable process visualization for identifying knowledge that is not documented nor recognized by even experts in organizations.
It is a higher priority for organizations to keep their source code secured. When a certain specific code includes a secret such as intellectual property, they need to pay special attention to prevent the secret code ...
详细信息
ISBN:
(纸本)9798350329964
It is a higher priority for organizations to keep their source code secured. When a certain specific code includes a secret such as intellectual property, they need to pay special attention to prevent the secret code from leaking outside. On the other hand, sometimes code leaks comes from acts by inside programmers. This industrial paper proposes a MORDEn (Micro Organized Remote Development Environment) toward preventing code leaks. MORDEn enables programmers capable of coding and debugging by physically separating secret code from their client. We also introduce a showcase that demonstrates the feasibility of MORDEn from a case study project using it.
While quantum computers have attracted much attention, dealing with computational errors due to noise effects caused by the interaction between quantum hardware and the external environment is a significant challenge....
详细信息
ISBN:
(数字)9798350367041
ISBN:
(纸本)9798350367058
While quantum computers have attracted much attention, dealing with computational errors due to noise effects caused by the interaction between quantum hardware and the external environment is a significant challenge. In this paper, we propose an approach to apply N-version programming (NVP) to quantum software to improve the reliability of the entire quantum software system. First, we define architecture patterns for N-version quantum software systems (NVQS) based on a combination of quantum libraries and devices. Next, given that the output of the quantum software system is a probability distribution, we came up with an evaluation strategy inspired by the concept of NVP for clustering and selecting multiple probability distributions output from NVQS. Finally, we outline our future experimental plan.
A visually equivalent light field 3D (VELF3D) display is a parallax-barrier-type autostereoscopic 3D display. Since stripes of the barrier and pixels are in parallel, moiré occurred, when the barrier is placed on...
详细信息
K-Multiple-Means is an extension of K-means for the clustering of multiple means used in many applications, such as image segmentation, load balancing, and blind-source separation. Since K-means uses only one mean to ...
详细信息
K-Multiple-Means is an extension of K-means for the clustering of multiple means used in many applications, such as image segmentation, load balancing, and blind-source separation. Since K-means uses only one mean to represent each cluster, it fails to capture non-spherical cluster structures of data points. However, since K-Multiple-Means represents the cluster by computing multiple means and grouping them into specified c clusters, it can effectively capture the non-spherical clusters of the data points. To obtain the clusters, K-Multiple-Means updates a similarity matrix of a bipartite graph between the data points and the multiple means by iteratively computing the leading c singular vectors of the matrix. K-Multiple-Means, however, incurs a high computation cost for large-scale data due to the iterative SVD computations. Our proposal, F-KMM, increases the efficiency of K-Multiple-Means by computing the singular vectors from a smaller similarity matrix between the multiple means obtained from the similarity matrix of the bipartite graph. To compute the similarity matrix of the bipartite graph efficiently, we skip unnecessary distance computations and estimate lower bounding distances between the data points and the multiple means. Theoretically, the proposed approach guarantees the same clustering results as K-Multiple-Means since it can exactly compute the singular vectors from the similarity matrix between the multiple means. Experiments show that our approach is several orders of magnitude faster than previous clustering approaches that use multiple means.
暂无评论