Skip to main content

Showing 1–10 of 10 results for author: Kimura, Y

Searching in archive cs. Search in all archives.
.
  1. Accelerating Decision Diagram-based Multi-node Quantum Simulation with Ring Communication and Automatic SWAP Insertion

    Authors: Yusuke Kimura, Shaowen Li, Hiroyuki Sato, Masahiro Fujita

    Abstract: An N-bit quantum state requires a vector of length $2^N$, leading to an exponential increase in the required memory with N in conventional statevector-based quantum simulators. A proposed solution to this issue is the decision diagram-based quantum simulator, which can significantly decrease the necessary memory and is expected to operate faster for specific quantum circuits. However, decision dia… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: Accepted at IEEE QSW 2024

  2. Parallelizing quantum simulation with decision diagrams

    Authors: Shaowen Li, Yusuke Kimura, Hiroyuki Sato, Junwei Yu, Masahiro Fujita

    Abstract: Recent technological advancements show promise in leveraging quantum mechanical phenomena for computation. This brings substantial speed-ups to problems that are once considered to be intractable in the classical world. However, the physical realization of quantum computers is still far away from us, and a majority of research work is done using quantum simulators running on classical computers. C… ▽ More

    Submitted 3 December, 2023; originally announced December 2023.

  3. arXiv:2310.20279  [pdf, other

    cs.CV

    Machine learning refinement of in situ images acquired by low electron dose LC-TEM

    Authors: Hiroyasu Katsuno, Yuki Kimura, Tomoya Yamazaki, Ichigaku Takigawa

    Abstract: We study a machine learning (ML) technique for refining images acquired during in situ observation using liquid-cell transmission electron microscopy (LC-TEM). Our model is constructed using a U-Net architecture and a ResNet encoder. For training our ML model, we prepared an original image dataset that contained pairs of images of samples acquired with and without a solution present. The former im… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

    Comments: 33 pages, 9 figures

  4. arXiv:2212.02044  [pdf, other

    cs.CR

    First Demonstration Experiment for Energy Trading System EDISON-X Using the XRP Ledger

    Authors: Yuichi Ikeda, Yu Ohki, Zelda Marquardt, Yu Kimura, Sena Omura, Emi Yoshikawa

    Abstract: We develop an energy trading system, EDISON-X, that uses blockchain technology to manage the buying and selling of electricity usage rights, i.e., tokens. UPX and SPX tokens purchase electricity from the utility company's distribution lines and the photovoltaic panels. On July 1, 17 students in our school dormitory participated in an experiment to confirm the operation of the EDISON-X system. Base… ▽ More

    Submitted 5 December, 2022; originally announced December 2022.

  5. Q&A MAESTRO: Q&A Post Recommendation for Fixing Java Runtime Exceptions

    Authors: Yusuke Kimura, Takumi Akazaki, Shinji Kikuchi, Sonal Mahajan, Mukul R. Prasad

    Abstract: Programmers often use Q&A sites (e.g., Stack Overflow) to understand a root cause of program bugs. Runtime exceptions is one of such important class of bugs that is actively discussed on Stack Overflow. However, it may be difficult for beginner programmers to come up with appropriate keywords for search. Moreover, they need to switch their attentions between IDE and browser, and it is time-consumi… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

  6. Fast improvement of TEM image with low-dose electrons by deep learning

    Authors: Hiroyasu Katsuno, Yuki Kimura, Tomoya Yamazaki, Ichigaku Takigawa

    Abstract: Low-electron-dose observation is indispensable for observing various samples using a transmission electron microscope; consequently, image processing has been used to improve transmission electron microscopy (TEM) images. To apply such image processing to in situ observations, we here apply a convolutional neural network to TEM imaging. Using a dataset that includes short-exposure images and long-… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

    Comments: 8 pages, 7 figures, 3 tables

  7. arXiv:2104.08584  [pdf, other

    cs.NI

    Deep Learning in Beyond 5G Networks with Image-based Time-Series Representation

    Authors: Lucas Fernando Alvarenga e Silva, Bruno Yuji Lino Kimura, Jurandy Almeida

    Abstract: Towards the network innovation, the Beyond Five-Generation (B5G) networks envision the use of machine learning (ML) methods to predict the network conditions and performance indicators in order to best make decisions and allocate resources. In this paper, we propose a new ML approach to accomplish predictions in B5G networks. Instead of handling the time-series in the network domain of values, we… ▽ More

    Submitted 17 April, 2021; originally announced April 2021.

  8. arXiv:2102.04574  [pdf, other

    cs.NI eess.SY

    Prototyping Low-Cost Automatic Weather Stations for Natural Disaster Monitoring

    Authors: Gabriel Francisco Lorençon Ribeiro Bernardes, Rogério Ishibashi, André Aparecido de Souza Ivo, Valério Rosset, Bruno Yuji Lino Kimura

    Abstract: Weather events put human lives at risk mostly when people might reside in areas susceptible to natural disasters. Weather monitoring is a pivotal task that is accomplished in vulnerable areas with the support of reliable weather stations. Such stations are front-end equipment typically mounted on a fixed mast structure with a set of digital and magnetic weather sensors connected to a datalogger. W… ▽ More

    Submitted 3 May, 2021; v1 submitted 8 February, 2021; originally announced February 2021.

  9. arXiv:2003.00833  [pdf, other

    cs.CV

    CNN Hyperparameter tuning applied to Iris Liveness Detection

    Authors: Gabriela Y. Kimura, Diego R. Lucio, Alceu S. Britto Jr., David Menotti

    Abstract: The iris pattern has significantly improved the biometric recognition field due to its high level of stability and uniqueness. Such physical feature has played an important role in security and other related areas. However, presentation attacks, also known as spoofing techniques, can be used to bypass the biometric system with artifacts such as printed images, artificial eyes, and textured contact… ▽ More

    Submitted 12 February, 2020; originally announced March 2020.

    Comments: Accepted for presentation at the International Conference on Computer Vision Theory and Applications (VISAPP 2020)

  10. arXiv:1812.03210  [pdf, other

    cs.NI

    MPTCP Linux Kernel Congestion Controls

    Authors: Bruno Yuji Lino Kimura, Antonio Alfredo Frederico Loureiro

    Abstract: MultiPath TCP (MPTCP) is a promising protocol which brings new light to the TCP/IP protocol stack ossification problem by means of an impactful innovation of the transport layer. A MPTCP connection consists of a set of one or more subflows, where each subflow offers an alternative path to reach a target remote end-system. However, simply applying the standard TCP congestion control on each subflow… ▽ More

    Submitted 7 December, 2018; originally announced December 2018.

    Comments: Technical report