-
LLM-jp: A Cross-organizational Project for the Research and Development of Fully Open Japanese LLMs
Authors:
LLM-jp,
:,
Akiko Aizawa,
Eiji Aramaki,
Bowen Chen,
Fei Cheng,
Hiroyuki Deguchi,
Rintaro Enomoto,
Kazuki Fujii,
Kensuke Fukumoto,
Takuya Fukushima,
Namgi Han,
Yuto Harada,
Chikara Hashimoto,
Tatsuya Hiraoka,
Shohei Hisada,
Sosuke Hosokawa,
Lu Jie,
Keisuke Kamata,
Teruhito Kanazawa,
Hiroki Kanezashi,
Hiroshi Kataoka,
Satoru Katsumata,
Daisuke Kawahara,
Seiya Kawano
, et al. (57 additional authors not shown)
Abstract:
This paper introduces LLM-jp, a cross-organizational project for the research and development of Japanese large language models (LLMs). LLM-jp aims to develop open-source and strong Japanese LLMs, and as of this writing, more than 1,500 participants from academia and industry are working together for this purpose. This paper presents the background of the establishment of LLM-jp, summaries of its…
▽ More
This paper introduces LLM-jp, a cross-organizational project for the research and development of Japanese large language models (LLMs). LLM-jp aims to develop open-source and strong Japanese LLMs, and as of this writing, more than 1,500 participants from academia and industry are working together for this purpose. This paper presents the background of the establishment of LLM-jp, summaries of its activities, and technical reports on the LLMs developed by LLM-jp. For the latest activities, visit https://llm-jp.nii.ac.jp/en/.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Rapport-Driven Virtual Agent: Rapport Building Dialogue Strategy for Improving User Experience at First Meeting
Authors:
Muhammad Yeza Baihaqi,
Angel García Contreras,
Seiya Kawano,
Koichiro Yoshino
Abstract:
Rapport is known as a conversational aspect focusing on relationship building, which influences outcomes in collaborative tasks. This study aims to establish human-agent rapport through small talk by using a rapport-building strategy. We implemented this strategy for the virtual agents based on dialogue strategies by prompting a large language model (LLM). In particular, we utilized two dialogue s…
▽ More
Rapport is known as a conversational aspect focusing on relationship building, which influences outcomes in collaborative tasks. This study aims to establish human-agent rapport through small talk by using a rapport-building strategy. We implemented this strategy for the virtual agents based on dialogue strategies by prompting a large language model (LLM). In particular, we utilized two dialogue strategies-predefined sequence and free-form-to guide the dialogue generation framework. We conducted analyses based on human evaluations, examining correlations between total turn, utterance characters, rapport score, and user experience variables: naturalness, satisfaction, interest, engagement, and usability. We investigated correlations between rapport score and naturalness, satisfaction, engagement, and conversation flow. Our experimental results also indicated that using free-form to prompt the rapport-building strategy performed the best in subjective scores.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
J-CRe3: A Japanese Conversation Dataset for Real-world Reference Resolution
Authors:
Nobuhiro Ueda,
Hideko Habe,
Yoko Matsui,
Akishige Yuguchi,
Seiya Kawano,
Yasutomo Kawanishi,
Sadao Kurohashi,
Koichiro Yoshino
Abstract:
Understanding expressions that refer to the physical world is crucial for such human-assisting systems in the real world, as robots that must perform actions that are expected by users. In real-world reference resolution, a system must ground the verbal information that appears in user interactions to the visual information observed in egocentric views. To this end, we propose a multimodal referen…
▽ More
Understanding expressions that refer to the physical world is crucial for such human-assisting systems in the real world, as robots that must perform actions that are expected by users. In real-world reference resolution, a system must ground the verbal information that appears in user interactions to the visual information observed in egocentric views. To this end, we propose a multimodal reference resolution task and construct a Japanese Conversation dataset for Real-world Reference Resolution (J-CRe3). Our dataset contains egocentric video and dialogue audio of real-world conversations between two people acting as a master and an assistant robot at home. The dataset is annotated with crossmodal tags between phrases in the utterances and the object bounding boxes in the video frames. These tags include indirect reference relations, such as predicate-argument structures and bridging references as well as direct reference relations. We also constructed an experimental model and clarified the challenges in multimodal reference resolution tasks.
△ Less
Submitted 28 March, 2024;
originally announced March 2024.
-
A Gaze-grounded Visual Question Answering Dataset for Clarifying Ambiguous Japanese Questions
Authors:
Shun Inadumi,
Seiya Kawano,
Akishige Yuguchi,
Yasutomo Kawanishi,
Koichiro Yoshino
Abstract:
Situated conversations, which refer to visual information as visual question answering (VQA), often contain ambiguities caused by reliance on directive information. This problem is exacerbated because some languages, such as Japanese, often omit subjective or objective terms. Such ambiguities in questions are often clarified by the contexts in conversational situations, such as joint attention wit…
▽ More
Situated conversations, which refer to visual information as visual question answering (VQA), often contain ambiguities caused by reliance on directive information. This problem is exacerbated because some languages, such as Japanese, often omit subjective or objective terms. Such ambiguities in questions are often clarified by the contexts in conversational situations, such as joint attention with a user or user gaze information. In this study, we propose the Gaze-grounded VQA dataset (GazeVQA) that clarifies ambiguous questions using gaze information by focusing on a clarification process complemented by gaze information. We also propose a method that utilizes gaze target estimation results to improve the accuracy of GazeVQA tasks. Our experimental results showed that the proposed method improved the performance in some cases of a VQA system on GazeVQA and identified some typical problems of GazeVQA tasks that need to be improved.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Symmetry of graphs and perfect state transfer in Grover walks
Authors:
Sho Kubota,
Kiyoto Yoshino
Abstract:
We study relationships between symmetry of graphs and perfect state transfer in Grover walks. Symmetry of graphs mathematically refers to automorphisms of graphs. When perfect state transfer occurs between two vertices, the following two statements hold. One is that automorphisms preserve the occurrence of perfect state transfer. The other is that the stabilizer subgroups of the automorphism group…
▽ More
We study relationships between symmetry of graphs and perfect state transfer in Grover walks. Symmetry of graphs mathematically refers to automorphisms of graphs. When perfect state transfer occurs between two vertices, the following two statements hold. One is that automorphisms preserve the occurrence of perfect state transfer. The other is that the stabilizer subgroups of the automorphism groups with respect to those two vertices coincide. Using these results, we completely characterize circulant graphs up to valency $4$ that admit perfect state transfer. Its proof uses also algebraic number theory.
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
Enumeration of sets of equiangular lines with common angle $\arccos(1/3)$
Authors:
Kiyoto Yoshino
Abstract:
In 2018, Szöllősi and Östergård enumerated some sets of equiangular lines with common angle $\arccos(1/3)$ with a computer. Furthermore, they verified that the numbers $ω(n)$ of sets of $n$ equiangular lines with common angle $\arccos(1/3)$ in dimension $7$ are almost symmetric around $n=14$. In this paper, we construct the other sets of equiangular lines with common angle $\arccos(1/3)$ from root…
▽ More
In 2018, Szöllősi and Östergård enumerated some sets of equiangular lines with common angle $\arccos(1/3)$ with a computer. Furthermore, they verified that the numbers $ω(n)$ of sets of $n$ equiangular lines with common angle $\arccos(1/3)$ in dimension $7$ are almost symmetric around $n=14$. In this paper, we construct the other sets of equiangular lines with common angle $\arccos(1/3)$ from root lattices of type $A$ or $D$ with the aid of switching roots. In addition, we prove that the numbers $ω(n)$ are almost symmetric without a computer.
△ Less
Submitted 16 December, 2023;
originally announced December 2023.
-
Regular graphs to induce even periodic Grover walks
Authors:
Sho Kubota,
Hiroto Sekido,
Kiyoto Yoshino
Abstract:
The interest of this paper is a characterization of graphs that induce periodic Grover walks with given periods. In previous studies, Yoshie has shown that the only graphs that induce odd periodic Grover walks are cycle graphs. However, this problem is largely unsolved for even periods. In this study, we show that regular graphs that induce $2l$-periodic Grover walks are also cycle graphs in most…
▽ More
The interest of this paper is a characterization of graphs that induce periodic Grover walks with given periods. In previous studies, Yoshie has shown that the only graphs that induce odd periodic Grover walks are cycle graphs. However, this problem is largely unsolved for even periods. In this study, we show that regular graphs that induce $2l$-periodic Grover walks are also cycle graphs in most cases, where $l$ is an odd integer. The proof uses Galois theory.
△ Less
Submitted 24 July, 2023;
originally announced July 2023.
-
Whats New? Identifying the Unfolding of New Events in Narratives
Authors:
Seyed Mahed Mousavi,
Shohei Tanaka,
Gabriel Roccabruna,
Koichiro Yoshino,
Satoshi Nakamura,
Giuseppe Riccardi
Abstract:
Narratives include a rich source of events unfolding over time and context. Automatic understanding of these events provides a summarised comprehension of the narrative for further computation (such as reasoning). In this paper, we study the Information Status (IS) of the events and propose a novel challenging task: the automatic identification of new events in a narrative. We define an event as a…
▽ More
Narratives include a rich source of events unfolding over time and context. Automatic understanding of these events provides a summarised comprehension of the narrative for further computation (such as reasoning). In this paper, we study the Information Status (IS) of the events and propose a novel challenging task: the automatic identification of new events in a narrative. We define an event as a triplet of subject, predicate, and object. The event is categorized as new with respect to the discourse context and whether it can be inferred through commonsense reasoning. We annotated a publicly available corpus of narratives with the new events at sentence level using human annotators. We present the annotation protocol and study the quality of the annotation and the difficulty of the task. We publish the annotated dataset, annotation materials, and machine learning baseline models for the task of new event extraction for narrative understanding.
△ Less
Submitted 8 August, 2023; v1 submitted 15 February, 2023;
originally announced February 2023.
-
Best-Answer Prediction in Q&A Sites Using User Information
Authors:
Rafik Hadfi,
Ahmed Moustafa,
Kai Yoshino,
Takayuki Ito
Abstract:
Community Question Answering (CQA) sites have spread and multiplied significantly in recent years. Sites like Reddit, Quora, and Stack Exchange are becoming popular amongst people interested in finding answers to diverse questions. One practical way of finding such answers is automatically predicting the best candidate given existing answers and comments. Many studies were conducted on answer pred…
▽ More
Community Question Answering (CQA) sites have spread and multiplied significantly in recent years. Sites like Reddit, Quora, and Stack Exchange are becoming popular amongst people interested in finding answers to diverse questions. One practical way of finding such answers is automatically predicting the best candidate given existing answers and comments. Many studies were conducted on answer prediction in CQA but with limited focus on using the background information of the questionnaires. We address this limitation using a novel method for predicting the best answers using the questioner's background information and other features, such as the textual content or the relationships with other participants. Our answer classification model was trained using the Stack Exchange dataset and validated using the Area Under the Curve (AUC) metric. The experimental results show that the proposed method complements previous methods by pointing out the importance of the relationships between users, particularly throughout the level of involvement in different communities on Stack Exchange. Furthermore, we point out that there is little overlap between user-relation information and the information represented by the shallow text features and the meta-features, such as time differences.
△ Less
Submitted 14 December, 2022;
originally announced December 2022.
-
What Should the System Do Next?: Operative Action Captioning for Estimating System Actions
Authors:
Taiki Nakamura,
Seiya Kawano,
Akishige Yuguchi,
Yasutomo Kawanishi,
Koichiro Yoshino
Abstract:
Such human-assisting systems as robots need to correctly understand the surrounding situation based on observations and output the required support actions for humans. Language is one of the important channels to communicate with humans, and the robots are required to have the ability to express their understanding and action planning results. In this study, we propose a new task of operative acti…
▽ More
Such human-assisting systems as robots need to correctly understand the surrounding situation based on observations and output the required support actions for humans. Language is one of the important channels to communicate with humans, and the robots are required to have the ability to express their understanding and action planning results. In this study, we propose a new task of operative action captioning that estimates and verbalizes the actions to be taken by the system in a human-assisting domain. We constructed a system that outputs a verbal description of a possible operative action that changes the current state to the given target state. We collected a dataset consisting of two images as observations, which express the current state and the state changed by actions, and a caption that describes the actions that change the current state to the target state, by crowdsourcing in daily life situations. Then we constructed a system that estimates operative action by a caption. Since the operative action's caption is expected to contain some state-changing actions, we use scene-graph prediction as an auxiliary task because the events written in the scene graphs correspond to the state changes. Experimental results showed that our system successfully described the operative actions that should be conducted between the current and target states. The auxiliary tasks that predict the scene graphs improved the quality of the estimation results.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
The Lemmens-Seidel conjecture for base size $5$
Authors:
Kiyoto Yoshino
Abstract:
In 2020, Lin and Yu claimed to prove the so-called Lemmens-Seidel conjecture for base size $5$. However, their proof has a gap, and in fact, some set of equiangular lines found by Greaves et al. in 2021 is a counterexample to one of their claims. In this paper, we give a proof of the conjecture for base size $5$. Also, we answer in the negative a question of Greaves et al. in 2021 whether some set…
▽ More
In 2020, Lin and Yu claimed to prove the so-called Lemmens-Seidel conjecture for base size $5$. However, their proof has a gap, and in fact, some set of equiangular lines found by Greaves et al. in 2021 is a counterexample to one of their claims. In this paper, we give a proof of the conjecture for base size $5$. Also, we answer in the negative a question of Greaves et al. in 2021 whether some sets of $57$ equiangular lines with common angle $\arccos(1/5)$ in dimension $18$ are contained in a unique set of $276$ equiangular lines with common angle $\arccos(1/5)$ in dimension $23$. In addition, we answer in the negative a question of Cao et al. in 2021 whether a strongly maximal set of equiangular lines with common angle $\arccos(1/5)$ exists except the set of $276$ equiangular lines with common angle $\arccos(1/5)$ in dimension $23$.
△ Less
Submitted 17 September, 2022;
originally announced September 2022.
-
Observation of the bands with $d_{xy}$ orbital character near the Fermi level in NdFeAs$_{1-x}$P$_{x}$O$_{0.9}$F$_{0.1}$ using angle-resolved photoemission spectroscopy
Authors:
Z. H. Tin,
T. Adachi,
A. Takemori,
K. Yoshino,
N. Katayama,
S. Miyasaka,
S. Ideta,
K. Tanaka,
S. Tajima
Abstract:
We studied the band structure of NdFeAs$_{1-x}$P$_{x}$O$_{0.9}$F$_{0.1}$ ($x$ = 0, 0.2, 0.4 and 0.6) using angle-resolved photoemission spectroscopy (ARPES) measurements. Two of the hole bands, $α_1$ $(d_{xz})$ and $α_3$ $(d_{z^2})$, were observed at the Brillouin zone center in the $P$-polarized light configuration, while the other two hole bands, $α_2$ $(d_{yz})$ and $γ$ $(d_{xy})$, were observe…
▽ More
We studied the band structure of NdFeAs$_{1-x}$P$_{x}$O$_{0.9}$F$_{0.1}$ ($x$ = 0, 0.2, 0.4 and 0.6) using angle-resolved photoemission spectroscopy (ARPES) measurements. Two of the hole bands, $α_1$ $(d_{xz})$ and $α_3$ $(d_{z^2})$, were observed at the Brillouin zone center in the $P$-polarized light configuration, while the other two hole bands, $α_2$ $(d_{yz})$ and $γ$ $(d_{xy})$, were observed in the $S$-polarized alternative. The observed $γ$ band shifts downwards as $x$ increases, which is consistent with the theoretical prediction for the change in bond angle of As/P-Fe-As/P. Furthermore, a small amount of the $d_{xy}$ orbital component was observed at the same binding energy as that of the top of the $α_1$ band, thus indicating the band reconstruction of the originally degenerate $α_1$ and $α_2$ $(d_{xz}/d_{yz})$ bands by the unoccupied $d_{xy}$ band. The change in the energy level of the $α_1$ band top with $d_{xy}$ orbital character is accompanied by a $T_{c}$ upturn at $0.2 < x < 0.4$. The $T_{c}$ continues to increase as the $α_1$ band shifts downward, crossing the Fermi level. The incipient band with the $d_{xy}$ orbital character on its top could be an important ingredient for high $T_{c}$ 1111-type iron-based superconductors.
△ Less
Submitted 3 May, 2022;
originally announced May 2022.
-
A quantum searching model finding one of the edges of a subgraph in a complete graph
Authors:
Yusuke Yoshie,
Kiyoto Yoshino
Abstract:
Some of the quantum searching models have been given by perturbed quantum walks. Driving some perturbed quantum walks, we may quickly find one of the targets with high probability. In this paper, we construct a quantum searching model finding one of the edges of a given subgraph in a complete graph. How to construct our model is that we label the arcs by $+1$ or $-1$, and define a perturbed quantu…
▽ More
Some of the quantum searching models have been given by perturbed quantum walks. Driving some perturbed quantum walks, we may quickly find one of the targets with high probability. In this paper, we construct a quantum searching model finding one of the edges of a given subgraph in a complete graph. How to construct our model is that we label the arcs by $+1$ or $-1$, and define a perturbed quantum walk by the sign function on the set of arcs. After that, we detect one of the edges labeled $-1$ by the induced sign function as fast as possible. This idea was firstly proposed by Segawa et al. in 2021. They only addressed the case where the subgraph forms a matching, and obtained by a combinatorial argument that the time of finding one of the edges of the subgraph is quadratically faster than a classical searching model. In this paper, we show that the model is valid for any subgraph, i.e., we obtain by spectral analysis a quadratic speed-up for finding one of the edges of the subgraph in a complete graph.
△ Less
Submitted 4 June, 2022; v1 submitted 3 February, 2022;
originally announced February 2022.
-
ARTA: Collection and Classification of Ambiguous Requests and Thoughtful Actions
Authors:
Shohei Tanaka,
Koichiro Yoshino,
Katsuhito Sudoh,
Satoshi Nakamura
Abstract:
Human-assisting systems such as dialogue systems must take thoughtful, appropriate actions not only for clear and unambiguous user requests, but also for ambiguous user requests, even if the users themselves are not aware of their potential requirements. To construct such a dialogue agent, we collected a corpus and developed a model that classifies ambiguous user requests into corresponding system…
▽ More
Human-assisting systems such as dialogue systems must take thoughtful, appropriate actions not only for clear and unambiguous user requests, but also for ambiguous user requests, even if the users themselves are not aware of their potential requirements. To construct such a dialogue agent, we collected a corpus and developed a model that classifies ambiguous user requests into corresponding system actions. In order to collect a high-quality corpus, we asked workers to input antecedent user requests whose pre-defined actions could be regarded as thoughtful. Although multiple actions could be identified as thoughtful for a single user request, annotating all combinations of user requests and system actions is impractical. For this reason, we fully annotated only the test data and left the annotation of the training data incomplete. In order to train the classification model on such training data, we applied the positive/unlabeled (PU) learning method, which assumes that only a part of the data is labeled with positive examples. The experimental results show that the PU learning method achieved better performance than the general positive/negative (PN) learning method to classify thoughtful actions given an ambiguous user request.
△ Less
Submitted 15 June, 2021;
originally announced June 2021.
-
Linear Regression by Quantum Amplitude Estimation and its Extension to Convex Optimization
Authors:
Kazuya Kaneko,
Koichi Miyamoto,
Naoyuki Takeda,
Kazuyoshi Yoshino
Abstract:
Linear regression is a basic and widely-used methodology in data analysis. It is known that some quantum algorithms efficiently perform least squares linear regression of an exponentially large data set. However, if we obtain values of the regression coefficients as classical data, the complexity of the existing quantum algorithms can be larger than the classical method. This is because it depends…
▽ More
Linear regression is a basic and widely-used methodology in data analysis. It is known that some quantum algorithms efficiently perform least squares linear regression of an exponentially large data set. However, if we obtain values of the regression coefficients as classical data, the complexity of the existing quantum algorithms can be larger than the classical method. This is because it depends strongly on the tolerance error $ε$: the best one among the existing proposals is $O(ε^{-2})$. In this paper, we propose the new quantum algorithm for linear regression, which has the complexity of $O(ε^{-1})$ and keeps the logarithmic dependence on the number of data points $N_D$. In this method, we overcome bottleneck parts in the calculation, which take the form of the sum over data points and therefore have the complexity proportional to $N_D$, using quantum amplitude estimation, and other parts classically. Additionally, we generalize our method to some class of convex optimization problems.
△ Less
Submitted 25 August, 2021; v1 submitted 27 May, 2021;
originally announced May 2021.
-
Embedding theory of lattices and its application for $2$-integrable lattices
Authors:
Qianqian Yang,
Kiyoto Yoshino
Abstract:
For a positive integer $s$, a lattice $L$ is said to be $s$-integrable if $\sqrt{s}\cdot L$ is isometric to a sublattice of $\mathbb{Z}^n$ for some integer $n$. Conway and Sloane found two minimal non $2$-integrable lattices of rank $12$ and determinant $7$ in 1989. We find two more ones of rank $12$ and determinant $15$. Then we introduce a method of embedding a given lattice into a unimodular la…
▽ More
For a positive integer $s$, a lattice $L$ is said to be $s$-integrable if $\sqrt{s}\cdot L$ is isometric to a sublattice of $\mathbb{Z}^n$ for some integer $n$. Conway and Sloane found two minimal non $2$-integrable lattices of rank $12$ and determinant $7$ in 1989. We find two more ones of rank $12$ and determinant $15$. Then we introduce a method of embedding a given lattice into a unimodular lattice, which plays a key role in proving minimality of non $2$-integrable lattices and finding candidates for non $2$-integrable lattices.
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
Maximality of Seidel matrices and switching roots of graphs
Authors:
Meng-Yue Cao,
Jack H. Koolen,
Akihiro Munemasa,
Kiyoto Yoshino
Abstract:
In this paper, we discuss maximality of Seidel matrices with a fixed largest eigenvalue. We present a classification of maximal Seidel matrices of largest eigenvalue $3$, which gives a classification of maximal equiangular lines in a Euclidean space with angle $\arccos1/3$. Motivated by the maximality of the exceptional root system $E_8$, we define strong maximality of a Seidel matrix, and show th…
▽ More
In this paper, we discuss maximality of Seidel matrices with a fixed largest eigenvalue. We present a classification of maximal Seidel matrices of largest eigenvalue $3$, which gives a classification of maximal equiangular lines in a Euclidean space with angle $\arccos1/3$. Motivated by the maximality of the exceptional root system $E_8$, we define strong maximality of a Seidel matrix, and show that every Seidel matrix achieving the absolute bound is strongly maximal.
△ Less
Submitted 23 February, 2021;
originally announced February 2021.
-
Constellations in prime elements of number fields
Authors:
Wataru Kai,
Masato Mimura,
Akihiro Munemasa,
Shin-ichiro Seki,
Kiyoto Yoshino
Abstract:
Given any number field, we prove that there exist arbitrarily shaped constellations consisting of pairwise non-associate prime elements of the ring of integers. This result extends the celebrated Green-Tao theorem on arithmetic progressions of rational primes and Tao's theorem on constellations of Gaussian primes. Furthermore, we prove a constellation theorem on prime representations of binary qua…
▽ More
Given any number field, we prove that there exist arbitrarily shaped constellations consisting of pairwise non-associate prime elements of the ring of integers. This result extends the celebrated Green-Tao theorem on arithmetic progressions of rational primes and Tao's theorem on constellations of Gaussian primes. Furthermore, we prove a constellation theorem on prime representations of binary quadratic forms with integer coefficients. More precisely, for a non-degenerate primitive binary quadratic form $F$ which is not negative definite, there exist arbitrarily shaped constellations consisting of pairs of integers $(x,y)$ for which $F(x,y)$ is a rational prime. The latter theorem is obtained by extending the framework from the ring of integers to the pair of an order and its invertible fractional ideal.
△ Less
Submitted 4 April, 2022; v1 submitted 31 December, 2020;
originally announced December 2020.
-
Quantum Speedup of Monte Carlo Integration with respect to the Number of Dimensions and its Application to Finance
Authors:
Kazuya Kaneko,
Koichi Miyamoto,
Naoyuki Takeda,
Kazuyoshi Yoshino
Abstract:
Monte Carlo integration using quantum computers has been widely investigated, including applications to concrete problems. It is known that quantum algorithms based on quantum amplitude estimation (QAE) can compute an integral with a smaller number of iterative calls of the quantum circuit which calculates the integrand, than classical methods call the integrand subroutine. However, the issues abo…
▽ More
Monte Carlo integration using quantum computers has been widely investigated, including applications to concrete problems. It is known that quantum algorithms based on quantum amplitude estimation (QAE) can compute an integral with a smaller number of iterative calls of the quantum circuit which calculates the integrand, than classical methods call the integrand subroutine. However, the issues about the iterative operations in the integrand circuit have not been discussed so much. That is, in the high-dimensional integration, many random numbers are used for calculation of the integrand and in some cases similar calculations are repeated to obtain one sample value of the integrand. In this paper, we point out that we can reduce the number of such repeated operations by a combination of the nested QAE and the use of pseudorandom numbers (PRNs), if the integrand has the separable form with respect to contributions from distinct random numbers. The use of PRNs, which the authors originally proposed in the context of the quantum algorithm for Monte Carlo, is the key factor also in this paper, since it enables parallel computation of the separable terms in the integrand. Furthermore, we pick up one use case of this method in finance, the credit portfolio risk measurement, and estimate to what extent the complexity is reduced.
△ Less
Submitted 23 May, 2021; v1 submitted 4 November, 2020;
originally announced November 2020.
-
Reflection-based Word Attribute Transfer
Authors:
Yoichi Ishibashi,
Katsuhito Sudoh,
Koichiro Yoshino,
Satoshi Nakamura
Abstract:
Word embeddings, which often represent such analogic relations as king - man + woman = queen, can be used to change a word's attribute, including its gender. For transferring king into queen in this analogy-based manner, we subtract a difference vector man - woman based on the knowledge that king is male. However, developing such knowledge is very costly for words and attributes. In this work, we…
▽ More
Word embeddings, which often represent such analogic relations as king - man + woman = queen, can be used to change a word's attribute, including its gender. For transferring king into queen in this analogy-based manner, we subtract a difference vector man - woman based on the knowledge that king is male. However, developing such knowledge is very costly for words and attributes. In this work, we propose a novel method for word attribute transfer based on reflection mappings without such an analogy operation. Experimental results show that our proposed method can transfer the word attributes of the given words without changing the words that do not have the target attributes.
△ Less
Submitted 7 July, 2020; v1 submitted 6 July, 2020;
originally announced July 2020.
-
Quantum Pricing with a Smile: Implementation of Local Volatility Model on Quantum Computer
Authors:
Kazuya Kaneko,
Koichi Miyamoto,
Naoyuki Takeda,
Kazuyoshi Yoshino
Abstract:
Applications of the quantum algorithm for Monte Carlo simulation to pricing of financial derivatives have been discussed in previous papers. However, up to now, the pricing model discussed in such papers is Black-Scholes model, which is important but simple. Therefore, it is motivating to consider how to implement more complex models used in practice in financial institutions. In this paper, we th…
▽ More
Applications of the quantum algorithm for Monte Carlo simulation to pricing of financial derivatives have been discussed in previous papers. However, up to now, the pricing model discussed in such papers is Black-Scholes model, which is important but simple. Therefore, it is motivating to consider how to implement more complex models used in practice in financial institutions. In this paper, we then consider the local volatility (LV) model, in which the volatility of the underlying asset price depends on the price and time. We present two types of implementation. One is the register-per-RN way, which is adopted in most of previous papers. In this way, each of random numbers (RNs) required to generate a path of the asset price is generated on a separated register, so the required qubit number increases in proportion to the number of RNs. The other is the PRN-on-a-register way, which is proposed in the author's previous work. In this way, a sequence of pseudo-random numbers (PRNs) generated on a register is used to generate paths of the asset price, so the required qubit number is reduced with a trade-off against circuit depth. We present circuit diagrams for these two implementations in detail and estimate required resources: qubit number and T-count.
△ Less
Submitted 2 July, 2020;
originally announced July 2020.
-
Caption Generation of Robot Behaviors based on Unsupervised Learning of Action Segments
Authors:
Koichiro Yoshino,
Kohei Wakimoto,
Yuta Nishimura,
Satoshi Nakamura
Abstract:
Bridging robot action sequences and their natural language captions is an important task to increase explainability of human assisting robots in their recently evolving field. In this paper, we propose a system for generating natural language captions that describe behaviors of human assisting robots. The system describes robot actions by using robot observations; histories from actuator systems a…
▽ More
Bridging robot action sequences and their natural language captions is an important task to increase explainability of human assisting robots in their recently evolving field. In this paper, we propose a system for generating natural language captions that describe behaviors of human assisting robots. The system describes robot actions by using robot observations; histories from actuator systems and cameras, toward end-to-end bridging between robot actions and natural language captions. Two reasons make it challenging to apply existing sequence-to-sequence models to this mapping: 1) it is hard to prepare a large-scale dataset for any kind of robots and their environment, and 2) there is a gap between the number of samples obtained from robot action observations and generated word sequences of captions. We introduced unsupervised segmentation based on K-means clustering to unify typical robot observation patterns into a class. This method makes it possible for the network to learn the relationship from a small amount of data. Moreover, we utilized a chunking method based on byte-pair encoding (BPE) to fill in the gap between the number of samples of robot action observations and words in a caption. We also applied an attention mechanism to the segmentation task. Experimental results show that the proposed model based on unsupervised learning can generate better descriptions than other methods. We also show that the attention mechanism did not work well in our low-resource setting.
△ Less
Submitted 22 March, 2020;
originally announced March 2020.
-
The uniqueness of covers for widely generalized line graphs
Authors:
Michitaka Furuya,
Sho Kubota,
Tetsuji Taniguchi,
Kiyoto Yoshino
Abstract:
As a natural generalization of line graphs, Hoffman line graphs were defined by Woo and Neumaier. Especially, Hoffman line graphs are closely related to the smallest eigenvalue of graphs, and the uniqueness of strict covers of a Hoffman line graph plays a key role in such a study. In this paper, we prove a theorem for the uniqueness of strict covers under a condition which can be checked in finite…
▽ More
As a natural generalization of line graphs, Hoffman line graphs were defined by Woo and Neumaier. Especially, Hoffman line graphs are closely related to the smallest eigenvalue of graphs, and the uniqueness of strict covers of a Hoffman line graph plays a key role in such a study. In this paper, we prove a theorem for the uniqueness of strict covers under a condition which can be checked in finite time. Our result gives a generalization and a short proof for the main part of [Ars Math.~Contemp. \textbf{1} (2008) 81--98].
△ Less
Submitted 19 February, 2020;
originally announced February 2020.
-
Conversational Response Re-ranking Based on Event Causality and Role Factored Tensor Event Embedding
Authors:
Shohei Tanaka,
Koichiro Yoshino,
Katsuhito Sudoh,
Satoshi Nakamura
Abstract:
We propose a novel method for selecting coherent and diverse responses for a given dialogue context. The proposed method re-ranks response candidates generated from conversational models by using event causality relations between events in a dialogue history and response candidates (e.g., ``be stressed out'' precedes ``relieve stress''). We use distributed event representation based on the Role Fa…
▽ More
We propose a novel method for selecting coherent and diverse responses for a given dialogue context. The proposed method re-ranks response candidates generated from conversational models by using event causality relations between events in a dialogue history and response candidates (e.g., ``be stressed out'' precedes ``relieve stress''). We use distributed event representation based on the Role Factored Tensor Model for a robust matching of event causality relations due to limited event causality knowledge of the system. Experimental results showed that the proposed method improved coherency and dialogue continuity of system responses.
△ Less
Submitted 24 June, 2019;
originally announced June 2019.
-
An Incremental Turn-Taking Model For Task-Oriented Dialog Systems
Authors:
Andrei C. Coman,
Koichiro Yoshino,
Yukitoshi Murase,
Satoshi Nakamura,
Giuseppe Riccardi
Abstract:
In a human-machine dialog scenario, deciding the appropriate time for the machine to take the turn is an open research problem. In contrast, humans engaged in conversations are able to timely decide when to interrupt the speaker for competitive or non-competitive reasons. In state-of-the-art turn-by-turn dialog systems the decision on the next dialog action is taken at the end of the utterance. In…
▽ More
In a human-machine dialog scenario, deciding the appropriate time for the machine to take the turn is an open research problem. In contrast, humans engaged in conversations are able to timely decide when to interrupt the speaker for competitive or non-competitive reasons. In state-of-the-art turn-by-turn dialog systems the decision on the next dialog action is taken at the end of the utterance. In this paper, we propose a token-by-token prediction of the dialog state from incremental transcriptions of the user utterance. To identify the point of maximal understanding in an ongoing utterance, we a) implement an incremental Dialog State Tracker which is updated on a token basis (iDST) b) re-label the Dialog State Tracking Challenge 2 (DSTC2) dataset and c) adapt it to the incremental turn-taking experimental scenario. The re-labeling consists of assigning a binary value to each token in the user utterance that allows to identify the appropriate point for taking the turn. Finally, we implement an incremental Turn Taking Decider (iTTD) that is trained on these new labels for the turn-taking decision. We show that the proposed model can achieve a better performance compared to a deterministic handcrafted turn-taking algorithm.
△ Less
Submitted 11 July, 2019; v1 submitted 28 May, 2019;
originally announced May 2019.
-
Dialog System Technology Challenge 7
Authors:
Koichiro Yoshino,
Chiori Hori,
Julien Perez,
Luis Fernando D'Haro,
Lazaros Polymenakos,
Chulaka Gunasekara,
Walter S. Lasecki,
Jonathan K. Kummerfeld,
Michel Galley,
Chris Brockett,
Jianfeng Gao,
Bill Dolan,
Xiang Gao,
Huda Alamari,
Tim K. Marks,
Devi Parikh,
Dhruv Batra
Abstract:
This paper introduces the Seventh Dialog System Technology Challenges (DSTC), which use shared datasets to explore the problem of building dialog systems. Recently, end-to-end dialog modeling approaches have been applied to various dialog tasks. The seventh DSTC (DSTC7) focuses on developing technologies related to end-to-end dialog systems for (1) sentence selection, (2) sentence generation and (…
▽ More
This paper introduces the Seventh Dialog System Technology Challenges (DSTC), which use shared datasets to explore the problem of building dialog systems. Recently, end-to-end dialog modeling approaches have been applied to various dialog tasks. The seventh DSTC (DSTC7) focuses on developing technologies related to end-to-end dialog systems for (1) sentence selection, (2) sentence generation and (3) audio visual scene aware dialog. This paper summarizes the overall setup and results of DSTC7, including detailed descriptions of the different tracks and provided datasets. We also describe overall trends in the submitted systems and the key results. Each track introduced new datasets and participants achieved impressive results using state-of-the-art end-to-end technologies.
△ Less
Submitted 10 January, 2019;
originally announced January 2019.
-
Optimization of Information-Seeking Dialogue Strategy for Argumentation-Based Dialogue System
Authors:
Hisao Katsumi,
Takuya Hiraoka,
Koichiro Yoshino,
Kazeto Yamamoto,
Shota Motoura,
Kunihiko Sadamasa,
Satoshi Nakamura
Abstract:
Argumentation-based dialogue systems, which can handle and exchange arguments through dialogue, have been widely researched. It is required that these systems have sufficient supporting information to argue their claims rationally; however, the systems often do not have enough of such information in realistic situations. One way to fill in the gap is acquiring such missing information from dialogu…
▽ More
Argumentation-based dialogue systems, which can handle and exchange arguments through dialogue, have been widely researched. It is required that these systems have sufficient supporting information to argue their claims rationally; however, the systems often do not have enough of such information in realistic situations. One way to fill in the gap is acquiring such missing information from dialogue partners (information-seeking dialogue). Existing information-seeking dialogue systems are based on handcrafted dialogue strategies that exhaustively examine missing information. However, the proposed strategies are not specialized in collecting information for constructing rational arguments. Moreover, the number of system's inquiry candidates grows in accordance with the size of the argument set that the system deal with. In this paper, we formalize the process of information-seeking dialogue as Markov decision processes (MDPs) and apply deep reinforcement learning (DRL) for automatically optimizing a dialogue strategy. By utilizing DRL, our dialogue strategy can successfully minimize objective functions, the number of turns it takes for our system to collect necessary information in a dialogue. We conducted dialogue experiments using two datasets from different domains of argumentative dialogue. Experimental results show that the proposed formalization based on MDP works well, and the policy optimized by DRL outperformed existing heuristic dialogue strategies.
△ Less
Submitted 26 November, 2018;
originally announced November 2018.
-
Another Diversity-Promoting Objective Function for Neural Dialogue Generation
Authors:
Ryo Nakamura,
Katsuhito Sudoh,
Koichiro Yoshino,
Satoshi Nakamura
Abstract:
Although generation-based dialogue systems have been widely researched, the response generations by most existing systems have very low diversities. The most likely reason for this problem is Maximum Likelihood Estimation (MLE) with Softmax Cross-Entropy (SCE) loss. MLE trains models to generate the most frequent responses from enormous generation candidates, although in actual dialogues there are…
▽ More
Although generation-based dialogue systems have been widely researched, the response generations by most existing systems have very low diversities. The most likely reason for this problem is Maximum Likelihood Estimation (MLE) with Softmax Cross-Entropy (SCE) loss. MLE trains models to generate the most frequent responses from enormous generation candidates, although in actual dialogues there are various responses based on the context. In this paper, we propose a new objective function called Inverse Token Frequency (ITF) loss, which individually scales smaller loss for frequent token classes and larger loss for rare token classes. This function encourages the model to generate rare tokens rather than frequent tokens. It does not complicate the model and its training is stable because we only replace the objective function. On the OpenSubtitles dialogue dataset, our loss model establishes a state-of-the-art DIST-1 of 7.56, which is the unigram diversity score, while maintaining a good BLEU-1 score. On a Japanese Twitter replies dataset, our loss model achieves a DIST-1 score comparable to the ground truth.
△ Less
Submitted 20 November, 2018; v1 submitted 20 November, 2018;
originally announced November 2018.
-
Coexistence of Continuous Variable Quantum Key Distribution and 7 $\times$ 12.5 Gbit/s Classical Channels
Authors:
Tobias A. Eriksson,
Takuya Hirano,
Motoharu Ono,
Mikio Fujiwara,
Ryo Namiki,
Ken-ichiro Yoshino,
Akio Tajima,
Masahiro Takeoka,
Masahide Sasaki
Abstract:
We study coexistence of CV-QKD and 7 classical 12.5 Gbit/s on-off keying channels in WDM transmission over the C-band. We demonstrate key generation with a distilled secret key rate between 20 to 50 kbit/s in experiments running continuously over 24 hours.
We study coexistence of CV-QKD and 7 classical 12.5 Gbit/s on-off keying channels in WDM transmission over the C-band. We demonstrate key generation with a distilled secret key rate between 20 to 50 kbit/s in experiments running continuously over 24 hours.
△ Less
Submitted 4 September, 2018;
originally announced September 2018.
-
Interactive Image Manipulation with Natural Language Instruction Commands
Authors:
Seitaro Shinagawa,
Koichiro Yoshino,
Sakriani Sakti,
Yu Suzuki,
Satoshi Nakamura
Abstract:
We propose an interactive image-manipulation system with natural language instruction, which can generate a target image from a source image and an instruction that describes the difference between the source and the target image. The system makes it possible to modify a generated image interactively and make natural language conditioned image generation more controllable. We construct a neural ne…
▽ More
We propose an interactive image-manipulation system with natural language instruction, which can generate a target image from a source image and an instruction that describes the difference between the source and the target image. The system makes it possible to modify a generated image interactively and make natural language conditioned image generation more controllable. We construct a neural network that handles image vectors in latent space to transform the source vector to the target vector by using the vector of instruction. The experimental results indicate that the proposed framework successfully generates the target image by using a source image and an instruction on manipulation in our dataset.
△ Less
Submitted 23 February, 2018;
originally announced February 2018.
-
Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses
Authors:
Ken-ichiro Yoshino,
Mikio Fujiwara,
Kensuke Nakata,
Tatsuya Sumiya,
Toshihiko Sasaki,
Masahiro Takeoka,
Masahide Sasaki,
Akio Tajima,
Masato Koashi,
Akihisa Tomita
Abstract:
Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a secur…
▽ More
Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a security loophole at the transmitter of the GHz-clock QKD, which is a common problem in high-speed QKD systems using practical band-width limited devices. We experimentally observe the inter-pulse intensity correlation and modulation-pattern dependent intensity deviation in a practical high-speed QKD system. Such correlation violates the assumption of most security theories. We also provide its countermeasure which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Our countermeasure is simple, effective and applicable to wide range of high-speed QKD systems, and thus paves the way to realize ultrafast and security-certified commercial QKD systems.
△ Less
Submitted 19 February, 2018;
originally announced February 2018.
-
An Empirical Study of Mini-Batch Creation Strategies for Neural Machine Translation
Authors:
Makoto Morishita,
Yusuke Oda,
Graham Neubig,
Koichiro Yoshino,
Katsuhito Sudoh,
Satoshi Nakamura
Abstract:
Training of neural machine translation (NMT) models usually uses mini-batches for efficiency purposes. During the mini-batched training process, it is necessary to pad shorter sentences in a mini-batch to be equal in length to the longest sentence therein for efficient computation. Previous work has noted that sorting the corpus based on the sentence length before making mini-batches reduces the a…
▽ More
Training of neural machine translation (NMT) models usually uses mini-batches for efficiency purposes. During the mini-batched training process, it is necessary to pad shorter sentences in a mini-batch to be equal in length to the longest sentence therein for efficient computation. Previous work has noted that sorting the corpus based on the sentence length before making mini-batches reduces the amount of padding and increases the processing speed. However, despite the fact that mini-batch creation is an essential step in NMT training, widely used NMT toolkits implement disparate strategies for doing so, which have not been empirically validated or compared. This work investigates mini-batch creation strategies with experiments over two different datasets. Our results suggest that the choice of a mini-batch creation strategy has a large effect on NMT training and some length-based sorting strategies do not always work well compared with simple shuffling.
△ Less
Submitted 18 June, 2017;
originally announced June 2017.
-
Analysis of the Effect of Dependency Information on Predicate-Argument Structure Analysis and Zero Anaphora Resolution
Authors:
Koichiro Yoshino,
Shinsuke Mori,
Satoshi Nakamura
Abstract:
This paper investigates and analyzes the effect of dependency information on predicate-argument structure analysis (PASA) and zero anaphora resolution (ZAR) for Japanese, and shows that a straightforward approach of PASA and ZAR works effectively even if dependency information was not available. We constructed an analyzer that directly predicts relationships of predicates and arguments with their…
▽ More
This paper investigates and analyzes the effect of dependency information on predicate-argument structure analysis (PASA) and zero anaphora resolution (ZAR) for Japanese, and shows that a straightforward approach of PASA and ZAR works effectively even if dependency information was not available. We constructed an analyzer that directly predicts relationships of predicates and arguments with their semantic roles from a POS-tagged corpus. The features of the system are designed to compensate for the absence of syntactic information by using features used in dependency parsing as a reference. We also constructed analyzers that use the oracle dependency and the real dependency parsing results, and compared with the system that does not use any syntactic information to verify that the improvement provided by dependencies is not crucial.
△ Less
Submitted 31 May, 2017;
originally announced May 2017.
-
Neural Machine Translation via Binary Code Prediction
Authors:
Yusuke Oda,
Philip Arthur,
Graham Neubig,
Koichiro Yoshino,
Satoshi Nakamura
Abstract:
In this paper, we propose a new method for calculating the output layer in neural machine translation systems. The method is based on predicting a binary code for each word and can reduce computation time/memory requirements of the output layer to be logarithmic in vocabulary size in the best case. In addition, we also introduce two advanced approaches to improve the robustness of the proposed mod…
▽ More
In this paper, we propose a new method for calculating the output layer in neural machine translation systems. The method is based on predicting a binary code for each word and can reduce computation time/memory requirements of the output layer to be logarithmic in vocabulary size in the best case. In addition, we also introduce two advanced approaches to improve the robustness of the proposed model: using error-correcting codes and combining softmax and binary codes. Experiments on two English-Japanese bidirectional translation tasks show proposed models achieve BLEU scores that approach the softmax, while reducing memory usage to the order of less than 1/10 and improving decoding speed on CPUs by x5 to x10.
△ Less
Submitted 23 April, 2017;
originally announced April 2017.
-
Time-bin entangled photon pair generation from Si micro-ring resonator
Authors:
Ryota Wakabayashi,
Mikio Fujiwara,
Ken-ichiro Yoshino,
Yoshihiro Nambu,
Masahide Sasaki,
Takao Aoki
Abstract:
We demonstrate time-bin entanglement generation in telecom wavelength using a 7 μm radius Si micro-ring resonator pumped by a continuous wave laser. The resonator structure can enhance spontaneous four wave mixing, leading to a photon pair generation rate of about 90-100 Hz with a laser pump power of as low as -3.92 dBm (0.41 mW). We succeed in observing time-bin entanglement with the visibility o…
▽ More
We demonstrate time-bin entanglement generation in telecom wavelength using a 7 μm radius Si micro-ring resonator pumped by a continuous wave laser. The resonator structure can enhance spontaneous four wave mixing, leading to a photon pair generation rate of about 90-100 Hz with a laser pump power of as low as -3.92 dBm (0.41 mW). We succeed in observing time-bin entanglement with the visibility over 92%. Moreover, wavelength-tunability of the entangled photon pair is demonstrated by changing the operation temperature.
△ Less
Submitted 22 January, 2015;
originally announced January 2015.
-
Modified E91 protocol demonstration with hybrid entanglement photon source
Authors:
Mikio Fujiwara,
Ken-ichiro Yoshino,
Yoshihiro Nambu,
Taro Yamashita,
Shigehito Miki,
Hirotaka Terai,
Zhen Wang,
Morio Toyoshima,
Akihisa Tomita,
Masahide Sasaki
Abstract:
We report on an experimental demonstration of the modified Ekert 91 protocol of quantum key distribution using a hybrid entanglement source with two different degrees of freedoms, a 1550 nm time-bin qubit and 810 nm polarization qubit. The violation of the Clauser-Horne-Shimony-Holt inequality could be demonstrated for the entanglement between the polarization qubit in free space and the time-bin…
▽ More
We report on an experimental demonstration of the modified Ekert 91 protocol of quantum key distribution using a hybrid entanglement source with two different degrees of freedoms, a 1550 nm time-bin qubit and 810 nm polarization qubit. The violation of the Clauser-Horne-Shimony-Holt inequality could be demonstrated for the entanglement between the polarization qubit in free space and the time-bin qubit through 20 km fiber transmission. The secure key rate in our system is estimated 70-150 bps.
△ Less
Submitted 22 January, 2015;
originally announced January 2015.
-
Maintenance-free Operation of WDM Quantum Key Distribution System through a Field Fiber over 30 Days
Authors:
Ken-ichiro Yoshino,
Takao Ochi,
Mikio Fujiwara,
Masahide Sasaki,
Akio Tajima
Abstract:
Maintenance-free wavelength-division-multiplexing quantum key distribution for 30 days was achieved through a 22-km field fiber. Using polarization-independent interferometers and stabilization techniques, we attained a quantum bit error rate as low as 1.70% and a key rate as high as 229.8 kbps, making the record of total secure key of 595.6 Gbits accumulated over an uninterrupted operation period…
▽ More
Maintenance-free wavelength-division-multiplexing quantum key distribution for 30 days was achieved through a 22-km field fiber. Using polarization-independent interferometers and stabilization techniques, we attained a quantum bit error rate as low as 1.70% and a key rate as high as 229.8 kbps, making the record of total secure key of 595.6 Gbits accumulated over an uninterrupted operation period.
△ Less
Submitted 5 August, 2013;
originally announced August 2013.
-
Domain wall and isocurvature perturbation problems in axion models
Authors:
Masahiro Kawasaki,
Tsutomu T. Yanagida,
Kazuyoshi Yoshino
Abstract:
Axion models have two serious cosmological problems, domain wall and isocurvature perturbation problems. In order to solve these problems we investigate the Linde's model in which the field value of the Peccei-Quinn (PQ) scalar is large during inflation. In this model the fluctuations of the PQ field grow after inflation through the parametric resonance and stable axionic strings may be produced,…
▽ More
Axion models have two serious cosmological problems, domain wall and isocurvature perturbation problems. In order to solve these problems we investigate the Linde's model in which the field value of the Peccei-Quinn (PQ) scalar is large during inflation. In this model the fluctuations of the PQ field grow after inflation through the parametric resonance and stable axionic strings may be produced, which results in the domain wall problem. We study formation of axionic strings using lattice simulations. It is found that in chaotic inflation the axion model is free from both the domain wall and the isocurvature perturbation problems if the initial misalignment angle θ_a is smaller than O(10^{-2}). Furthermore, axions can also account for the dark matter for the breaking scale v \simeq 10^{12-16} GeV and the Hubble parameter during inflation H_{inf} \lesssim 10^{11-12} GeV in general inflation models.
△ Less
Submitted 12 November, 2013; v1 submitted 23 May, 2013;
originally announced May 2013.
-
Field test of quantum key distribution in the Tokyo QKD Network
Authors:
M. Sasaki,
M. Fujiwara,
H. Ishizuka,
W. Klaus,
K. Wakui,
M. Takeoka,
A. Tanaka,
K. Yoshino,
Y. Nambu,
S. Takahashi,
A. Tajima,
A. Tomita,
T. Domeki,
T. Hasegawa,
Y. Sakai,
H. Kobayashi,
T. Asai,
K. Shimizu,
T. Tokura,
T. Tsurumaru,
M. Matsui,
T. Honjo,
K. Tamaki,
H. Takesue,
Y. Tokura
, et al. (18 additional authors not shown)
Abstract:
A novel secure communication network with quantum key distribution in a metropolitan area is reported. Different QKD schemes are integrated to demonstrate secure TV conferencing over a distance of 45km, stable long-term operation, and application to secure mobile phones.
A novel secure communication network with quantum key distribution in a metropolitan area is reported. Different QKD schemes are integrated to demonstrate secure TV conferencing over a distance of 45km, stable long-term operation, and application to secure mobile phones.
△ Less
Submitted 18 March, 2011;
originally announced March 2011.
-
Performance of hybrid entanglement photon pair source for quantum key distribution
Authors:
M. Fujiwara,
M. Toyoshima,
M. Sasaki,
K. Yoshino,
Y. Nambu,
A. Tomita
Abstract:
We report on the experimental demonstration of a source of hybrid entanglement pairs between two different degrees of freedom, a 1550 nm time-bin qubit and an 810 nm polarization qubit. The polarization qubit at 810 nm is transformed by an asymmetric Mach-Zehnder interferometer consisted of a Glan laser prism and a polarization-maintaining fiber. We obtained visibilities of 95.8% and 88% along Z…
▽ More
We report on the experimental demonstration of a source of hybrid entanglement pairs between two different degrees of freedom, a 1550 nm time-bin qubit and an 810 nm polarization qubit. The polarization qubit at 810 nm is transformed by an asymmetric Mach-Zehnder interferometer consisted of a Glan laser prism and a polarization-maintaining fiber. We obtained visibilities of 95.8% and 88% along Z-Z and X-X axes on the Poincare sphere, respectively with a coincidence count rate of more than 800 c/s after entanglement format transformation. These values are well above the threshold of 70.7% needed to violate a Bell inequality and allow distilling a secure key in the quantum key distribution.
△ Less
Submitted 22 February, 2010;
originally announced February 2010.
-
Ultrasound study of the solid-liquid transition and solid-liquid interface of $^4$He in aerogels
Authors:
Koichi Matsumoto,
Hiroyuki Tsuboya,
Keiichi Yoshino,
Satoshi Abe,
Hiroyuki Tsujii,
Haruhiko Suzuki
Abstract:
The freezing and melting of $^{4}$He in various aerogels with porosities ranging from 92 to 97% was studied using longitudinal ultrasound. The freezing pressure, detected by a change in velocity and attenuation, was elevated from that of bulk by about 0.3 MPa, and showed little dependence on aerogel porosity. We report measurements of the transmission of sound through the solid-liquid interface…
▽ More
The freezing and melting of $^{4}$He in various aerogels with porosities ranging from 92 to 97% was studied using longitudinal ultrasound. The freezing pressure, detected by a change in velocity and attenuation, was elevated from that of bulk by about 0.3 MPa, and showed little dependence on aerogel porosity. We report measurements of the transmission of sound through the solid-liquid interface in aerogel, for the first time, which was independent of temperature and unaffected by a small addition of $^3$He, unlike the bulk interface. This indicates that crystal growth was suppressed by disorder, originating from silica strands. However, small amounts of $^3$He in the solid significantly decreased the attenuation, because the resultant pinning of dislocations by $^3$He suppressed phonon scattering, as is observed in bulk solid $^4$He.
△ Less
Submitted 3 March, 2009; v1 submitted 24 June, 2008;
originally announced June 2008.
-
Ultra fast quantum key distribution over a 97 km installed telecom fiber with wavelength-division multiplexing clock synchronization
Authors:
Akihiro Tanaka,
Mikio Fujiwara,
Sae Woo Nam,
Yoshihiro Nambu,
Seigo Takahashi,
Wakako Maeda,
Ken-ichiro Yoshino,
Shigehito Miki,
Burm Baek,
Zhen Wang,
Akio Tajima,
Masahide Sasaki,
Akihisa Tomita
Abstract:
We demonstrated ultra fast BB84 quantum key distribution (QKD) transmission at 625 MHz clock rate through a 97 km field-installed fiber using practical clock synchronization based on wavelength-division multiplexing (WDM). We succeeded in over-one-hour stable key generation at a high sifted key rate of 2.4 kbps and a low quantum bit error rate (QBER) of 2.9%. The asymptotic secure key rate was e…
▽ More
We demonstrated ultra fast BB84 quantum key distribution (QKD) transmission at 625 MHz clock rate through a 97 km field-installed fiber using practical clock synchronization based on wavelength-division multiplexing (WDM). We succeeded in over-one-hour stable key generation at a high sifted key rate of 2.4 kbps and a low quantum bit error rate (QBER) of 2.9%. The asymptotic secure key rate was estimated to be 0.78-0.82 kbps from the transmission data with the decoy method of average photon numbers 0, 0.15, and 0.4 photons/pulse.
△ Less
Submitted 23 June, 2008; v1 submitted 14 May, 2008;
originally announced May 2008.
-
Compensation of the Crossing Angle with Crab Cavities at KEKB
Authors:
T. Abe,
K. Akai,
M. Akemoto,
A. Akiyama,
M. Arinaga,
K. Ebihara,
K. Egawa,
A. Enomoto,
J. Flanagan,
S. Fukuda,
H. Fukuma,
Y. Funakoshi,
K. Furukawa,
T. Furuya,
K. Hara,
T. Higo,
S. Hiramatsu,
H. Hisamatsu,
H. Honma,
T. Honma,
K. Hosoyama,
T. Ieiri,
N. Iida,
H. Ikeda,
M. Ikeda
, et al. (90 additional authors not shown)
Abstract:
Crab cavities have been installed in the KEKB B--Factory rings to compensate the crossing angle at the collision point and thus increase luminosity. The beam operation with crab crossing has been done since February 2007. This is the first experience with such cavities in colliders or storage rings. The crab cavities have been working without serious issues. While higher specific luminosity than…
▽ More
Crab cavities have been installed in the KEKB B--Factory rings to compensate the crossing angle at the collision point and thus increase luminosity. The beam operation with crab crossing has been done since February 2007. This is the first experience with such cavities in colliders or storage rings. The crab cavities have been working without serious issues. While higher specific luminosity than the geometrical gain has been achieved, further study is necessary and under way to reach the prediction of simulation.
△ Less
Submitted 21 June, 2007;
originally announced June 2007.
-
Absorption spectrum in the wings of the potassium second resonance doublet broadened by helium
Authors:
François Shindo,
James F. Babb,
Kate Kirby,
Kouichi Yoshino
Abstract:
We have measured the reduced absorption coefficients occurring in the wings of the potassium 4S-5P doublet lines at 404.414 nm and at 404.720 nm broadened by helium gas at pressures of several hundred Torr. At the experimental temperature of 900 K, we have detected a shoulder-like broadening feature on the blue wing of the doublet which is relatively flat between 401.8 nm and 402.8 nm and which…
▽ More
We have measured the reduced absorption coefficients occurring in the wings of the potassium 4S-5P doublet lines at 404.414 nm and at 404.720 nm broadened by helium gas at pressures of several hundred Torr. At the experimental temperature of 900 K, we have detected a shoulder-like broadening feature on the blue wing of the doublet which is relatively flat between 401.8 nm and 402.8 nm and which drops off rapidly for shorter wavelengths, corresponding to absorption from the X doublet Sigma+ state to the C doublet Sigma+ state of the K-He quasimolecule. The accurate measurements of the line profiles in the present work will sharply constrain future calculations of potential energy surfaces and transition dipole moments correlating to the asymptotes He-K(5p), He-K(5s), and He-K(3d).
△ Less
Submitted 11 June, 2007;
originally announced June 2007.
-
Jet-fluid string formation and decay in high-energy heavy-ion collisions
Authors:
M. Isse,
T. Hirano,
R. Mizukawa,
A. Ohnishi,
K. Yoshino,
Y. Nara
Abstract:
We propose a new hadronization mechanism, jet-fluid string (JFS) formation and decay, to understand observables in intermediate to high-$p_{T}$ regions comprehensively. In the JFS model, hard partons produced in jet lose their energy in traversing the QGP fluid, which is described by fully three-dimensional hydrodynamic simulations. When a jet parton escapes from the QGP fluid, it picks up a par…
▽ More
We propose a new hadronization mechanism, jet-fluid string (JFS) formation and decay, to understand observables in intermediate to high-$p_{T}$ regions comprehensively. In the JFS model, hard partons produced in jet lose their energy in traversing the QGP fluid, which is described by fully three-dimensional hydrodynamic simulations. When a jet parton escapes from the QGP fluid, it picks up a partner parton from a fluid and forms a color singlet string, then it decays to hadrons. We find that high-$p_T$ $v_2$ values in JFS are about two times larger than in the independent fragmentation model.
△ Less
Submitted 22 February, 2007;
originally announced February 2007.
-
Generation of continuous-wave broadband Einstein-Podolsky-Rosen beams using periodically-poled lithium niobate waveguides
Authors:
Ken-ichiroh Yoshino,
Takao Aoki,
Akira Furusawa
Abstract:
Continuous-wave light beams with broadband Einstein-Podolsky-Rosen correlation (Einstein-Podolsky-Rosen beams) are created with two independent squeezed vacua generated by two periodically-poled lithium niobate waveguides and a half beam splitter.
Continuous-wave light beams with broadband Einstein-Podolsky-Rosen correlation (Einstein-Podolsky-Rosen beams) are created with two independent squeezed vacua generated by two periodically-poled lithium niobate waveguides and a half beam splitter.
△ Less
Submitted 15 September, 2006;
originally announced September 2006.
-
One-way Quantum Key Distribution System based on Planar Lightwave Circuits
Authors:
Yoshihiro Nambu,
Ken'ichiro Yoshino,
Akihisa Tomita
Abstract:
We developed a one-way quantum key distribution (QKD) system based upon a planar lightwave circuit (PLC) interferometer. This interferometer is expected to be free from the backscattering inherent in commercially available two-way QKD systems and phase drift without active compensation. A key distribution experiment with spools of standard telecom fiber showed that the bit error rate was as low…
▽ More
We developed a one-way quantum key distribution (QKD) system based upon a planar lightwave circuit (PLC) interferometer. This interferometer is expected to be free from the backscattering inherent in commercially available two-way QKD systems and phase drift without active compensation. A key distribution experiment with spools of standard telecom fiber showed that the bit error rate was as low as 6% for a 100-km key distribution using an attenuated laser pulse with a mean photon number of 0.1 and was determined solely by the detector noise. This clearly demonstrates the advantages of our PLC-based one-way QKD system over two-way QKD systems for long distance key distribution.
△ Less
Submitted 14 June, 2006; v1 submitted 6 March, 2006;
originally announced March 2006.
-
Hadron-string cascade versus hydrodynamics in Cu+Cu collisions at $\sqrt{s_{NN}}=200$ GeV
Authors:
T. Hirano,
M. Isse,
Y. Nara,
A. Ohnishi,
K. Yoshino
Abstract:
Single particle spectra as well as elliptic flow in Cu+Cu collisions at $\sqrt{s_{NN}}=200$ GeV are investigated within a hadronic cascade model and an ideal hydrodynamic model. Pseudorapidity distribution and transverse momentum spectra for charged hadrons are surprisingly comparable between these two models. However, a large deviation is predicted for the elliptic flow. The forthcoming experim…
▽ More
Single particle spectra as well as elliptic flow in Cu+Cu collisions at $\sqrt{s_{NN}}=200$ GeV are investigated within a hadronic cascade model and an ideal hydrodynamic model. Pseudorapidity distribution and transverse momentum spectra for charged hadrons are surprisingly comparable between these two models. However, a large deviation is predicted for the elliptic flow. The forthcoming experimental data will clarify the transport and thermalization aspects of matter produced in Cu+Cu collisions.
△ Less
Submitted 3 October, 2005; v1 submitted 17 June, 2005;
originally announced June 2005.
-
Experimental demonstration of quantum teleportation of a squeezed state
Authors:
Nobuyuki Takei,
Takao Aoki,
Satoshi Koike,
Kenichiro Yoshino,
Kentaro Wakui,
Hidehiro Yonezawa,
Takuji Hiraoka,
Jun Mizuno,
Masahiro Takeoka,
Masashi Ban,
Akira Furusawa
Abstract:
Quantum teleportation of a squeezed state is demonstrated experimentally. Due to some inevitable losses in experiments, a squeezed vacuum necessarily becomes a mixed state which is no longer a minimum uncertainty state. We establish an operational method of evaluation for quantum teleportation of such a state using fidelity, and discuss the classical limit for the state. The measured fidelity fo…
▽ More
Quantum teleportation of a squeezed state is demonstrated experimentally. Due to some inevitable losses in experiments, a squeezed vacuum necessarily becomes a mixed state which is no longer a minimum uncertainty state. We establish an operational method of evaluation for quantum teleportation of such a state using fidelity, and discuss the classical limit for the state. The measured fidelity for the input state is 0.85$\pm$ 0.05 which is higher than the classical case of 0.73$\pm$0.04. We also verify that the teleportation process operates properly for the nonclassical state input and its squeezed variance is certainly transferred through the process. We observe the smaller variance of the teleported squeezed state than that for the vacuum state input.
△ Less
Submitted 19 April, 2005; v1 submitted 10 November, 2003;
originally announced November 2003.
-
Development of a DTL Quadrupole Magnet with a New Electroformed Hollow Coil for the Jaeri/Kek Joint Project
Authors:
K. Yoshino,
E. Takasaki,
F. Naito,
T. Kato,
Y. Yamazaki,
K. Tajiri,
T. Kawasumi,
Y. Imoto,
Z. Kabeya
Abstract:
Quadrupole electromagnets have been developed with a hollow coil produced using an improved periodic reverse electroforming. These will be installed in each of the drift tubes of the DTL (324 MHz) as part of the JAERI/KEK Joint Project at the high-intensity proton accelerator facility. Measurements of the magnets' properties were found to be consistent with computer-calculated estimated. The det…
▽ More
Quadrupole electromagnets have been developed with a hollow coil produced using an improved periodic reverse electroforming. These will be installed in each of the drift tubes of the DTL (324 MHz) as part of the JAERI/KEK Joint Project at the high-intensity proton accelerator facility. Measurements of the magnets' properties were found to be consistent with computer-calculated estimated. The details of the design, the fabrication process, and the measurement results for the quadrupole magnet are described.
△ Less
Submitted 19 August, 2000;
originally announced August 2000.