Skip to main content

Showing 1–9 of 9 results for author: Hirano, H

.
  1. arXiv:2310.12352  [pdf, other

    cs.CL

    knn-seq: Efficient, Extensible kNN-MT Framework

    Authors: Hiroyuki Deguchi, Hayate Hirano, Tomoki Hoshino, Yuto Nishida, Justin Vasselli, Taro Watanabe

    Abstract: k-nearest-neighbor machine translation (kNN-MT) boosts the translation quality of a pre-trained neural machine translation (NMT) model by utilizing translation examples during decoding. Translation examples are stored in a vector database, called a datastore, which contains one entry for each target token from the parallel data it is made from. Due to its size, it is computationally expensive both… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

  2. arXiv:2106.02308  [pdf, ps, other

    math.NT math-ph math.GT

    On arithmetic Dijkgraaf-Witten theory

    Authors: Hikaru Hirano, Junhyeong Kim, Masanori Morishita

    Abstract: We present basic constructions and properties in arithmetic Chern-Simons theory with finite gauge group along the line of topological quantum field theory. For a finite set $S$ of finite primes of a number field $k$, we construct arithmetic analogues of the Chern-Simons 1-cocycle, the prequantization bundle for a surface and the Chern-Simons functional for a $3$-manifold. We then construct arithme… ▽ More

    Submitted 26 September, 2022; v1 submitted 4 June, 2021; originally announced June 2021.

    Comments: 59 pages. Corrected typos. To appear in Commun. Number Theory and Physics Vol 17, 2023

  3. arXiv:2103.17172  [pdf, other

    eess.IV cs.CV cs.LG

    Classification of Hematoma: Joint Learning of Semantic Segmentation and Classification

    Authors: Hokuto Hirano, Tsuyoshi Okita

    Abstract: Cerebral hematoma grows rapidly in 6-24 hours and misprediction of the growth can be fatal if it is not operated by a brain surgeon. There are two types of cerebral hematomas: one that grows rapidly and the other that does not grow rapidly. We are develo** the technique of artificial intelligence to determine whether the CT image includes the cerebral hematoma which leads to the rapid growth. Th… ▽ More

    Submitted 31 March, 2021; originally announced March 2021.

  4. arXiv:2005.11061  [pdf

    cs.CV cs.CR cs.LG eess.IV

    Vulnerability of deep neural networks for detecting COVID-19 cases from chest X-ray images to universal adversarial attacks

    Authors: Hokuto Hirano, Kazuki Koga, Kazuhiro Takemoto

    Abstract: Under the epidemic of the novel coronavirus disease 2019 (COVID-19), chest X-ray computed tomography imaging is being used for effectively screening COVID-19 patients. The development of computer-aided systems based on deep neural networks (DNNs) has been advanced, to rapidly and accurately detect COVID-19 cases, because the need for expert radiologists, who are limited in number, forms a bottlene… ▽ More

    Submitted 22 May, 2020; originally announced May 2020.

    Comments: 17 pages, 5 figures, 3 tables

    Journal ref: PLoS ONE 5(12), e0243963 (2020)

  5. arXiv:1911.12964  [pdf, ps, other

    math.NT math-ph math.GT

    On mod 2 arithmetic Dijkgraaf-Witten invariants for certain real quadratic number fields

    Authors: Hikaru Hirano

    Abstract: Minhyong Kim introduced arithmetic Chern-Simons invariants for totally imaginary number fields as arithmetic analogues of the Chern-Simons invariants for 3-manifolds. In this paper, we extend Kim's definition for any number field, by using the modified étale cohomology groups and fundamental groups which take real places into account. We then show explicit formulas of mod 2 arithmetic Dijkgraaf-Wi… ▽ More

    Submitted 1 December, 2019; v1 submitted 29 November, 2019; originally announced November 2019.

    Comments: 28 pages

  6. arXiv:1911.06502  [pdf, other

    cs.CV cs.CR cs.LG

    Simple iterative method for generating targeted universal adversarial perturbations

    Authors: Hokuto Hirano, Kazuhiro Takemoto

    Abstract: Deep neural networks (DNNs) are vulnerable to adversarial attacks. In particular, a single perturbation known as the universal adversarial perturbation (UAP) can foil most classification tasks conducted by DNNs. Thus, different methods for generating UAPs are required to fully evaluate the vulnerability of DNNs. A realistic evaluation would be with cases that consider targeted attacks; wherein the… ▽ More

    Submitted 18 November, 2019; v1 submitted 15 November, 2019; originally announced November 2019.

    Comments: 4 pages, 3 figures, 1 table

    Journal ref: Algorithms 13, 268 (2020)

  7. arXiv:1906.00627  [pdf, ps, other

    math.NT

    Arithmetic topology in Ihara theory II: Milnor invariants, dilogarithmic Heisenberg coverings and triple power residue symbols

    Authors: Hikaru Hirano, Masanori Morishita

    Abstract: We introduce mod $l$ Milnor invariants of a Galois element associated to Ihara's Galois representation on the pro-$l$ fundamental group of a punctured projective line ($l$ being a prime number), as arithmetic analogues of Milnor invariants of a pure braid. We then show that triple quadratic (resp. cubic) residue symbols of primes in the rational (resp. Eisenstein) number field are expressed by mod… ▽ More

    Submitted 3 June, 2019; originally announced June 2019.

    Comments: 33 pages, 1 figure

    MSC Class: 11F80; 19F15; 14H30; 20E18; 20F05; 20F36; 57M25

    Journal ref: J. Number Theory 198, 2019

  8. The Physics of the B Factories

    Authors: A. J. Bevan, B. Golob, Th. Mannel, S. Prell, B. D. Yabsley, K. Abe, H. Aihara, F. Anulli, N. Arnaud, T. Aushev, M. Beneke, J. Beringer, F. Bianchi, I. I. Bigi, M. Bona, N. Brambilla, J. B rodzicka, P. Chang, M. J. Charles, C. H. Cheng, H. -Y. Cheng, R. Chistov, P. Colangelo, J. P. Coleman, A. Drutskoy , et al. (2009 additional authors not shown)

    Abstract: This work is on the Physics of the B Factories. Part A of this book contains a brief description of the SLAC and KEK B Factories as well as their detectors, BaBar and Belle, and data taking related issues. Part B discusses tools and methods used by the experiments in order to obtain results. The results themselves can be found in Part C. Please note that version 3 on the archive is the auxiliary… ▽ More

    Submitted 31 October, 2015; v1 submitted 24 June, 2014; originally announced June 2014.

    Comments: 928 pages, version 3 (arXiv:1406.6311v3) corresponds to the alpha, beta, gamma version of the book, the other versions use the phi1, phi2, phi3 notation

    Report number: SLAC-PUB-15968, KEK Preprint 2014-3

    Journal ref: Eur. Phys. J. C74 (2014) 3026

  9. arXiv:math/0607135  [pdf, ps, other

    math.CA

    Existence of periodic solutions for the Lotka-Volterra type systems

    Authors: H. Hirano, S. Rybicki

    Abstract: In this paper we prove the existence of non-stationary periodic solutions of delay Lotka-Volterra equations. In the proofs we use the degree for $S^1$-equivariant maps.

    Submitted 5 July, 2006; originally announced July 2006.

    MSC Class: 34C25; 34l30