35 results on '"Shun Hattori"'
Search Results
2. Microbiota profile is different for early and invasive colorectal cancer and is consistent throughout the colon
- Author
-
Takashi Honda, Rajvinder Singh, Shun Hattori, Leonardo Zorron Cheng Tao Pu, Alastair D. Burt, Takeshi Yamamura, Masanao Nakamura, Kenta Yamamoto, Yoshiki Hirooka, and Mitsuhiro Fujishiro
- Subjects
Male ,medicine.medical_specialty ,Colorectal cancer ,Colonoscopy ,Gastroenterology ,03 medical and health sciences ,0302 clinical medicine ,Internal medicine ,Submucosa ,Lactobacillus ,medicine ,Prevotella ,Humans ,Neoplasm Invasiveness ,Aged ,Hepatology ,biology ,medicine.diagnostic_test ,business.industry ,Clostridiales ,Fusobacterium ,Middle Aged ,biology.organism_classification ,medicine.disease ,Gastrointestinal Microbiome ,medicine.anatomical_structure ,030220 oncology & carcinogenesis ,Female ,030211 gastroenterology & hepatology ,Fusobacterium nucleatum ,Colorectal Neoplasms ,business ,Enterococcus - Abstract
BACKGROUND AND AIM Microbiota have been associated with several diseases including colorectal cancer (CRC). This study aimed to evaluate the microbiota in early/invasive CRC utilizing stool and cytological brushes to determine differences in relative abundance (RA). METHODS Colonoscopy patients referred for endoscopic submucosal dissection or previous to CRC surgery were prospectively enrolled. Stool was collected pre-bowel preparation; and brush samples were taken during colonoscopy (three regions). DNA extraction, 16S rRNA next generation sequencing, and biostatistics (qiime and stamp software packages) followed. Primary outcome was the difference in RA of the Fusobacterium genus between the groups. Secondary outcomes included analyses of other microbiota. RESULTS Twenty-five patients were included, of which 14 had invasive cancer (≥ 1000 mm into the submucosa). The three major genera for invasive cancer were Bacterioides, Oribacterium, and Fusobacterium, whereas for early cancer were Oribacterium, Bacterioides, and Prevotella (decreasing order of RA). There was a significantly higher RA of Fusobacterium in the invasive cancer group (9.65% vs 0.95%, respectively, P
- Published
- 2019
- Full Text
- View/download PDF
3. Automatic Baseball Video Tagging Based on Voice Pattern Prioritization and Recursive Model Localization
- Author
-
Komei Arasawa and Shun Hattori
- Subjects
Human-Computer Interaction ,Prioritization ,Artificial Intelligence ,Computer science ,020204 information systems ,Speech recognition ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Recursive model ,02 engineering and technology ,Computer Vision and Pattern Recognition - Abstract
To enable us to select only the specific scenes that we want to watch in a baseball video and personalize its highlights sub-video, we require an Automatic Baseball Video Tagging system that can divide a baseball video into multiple sub-videos per at-bat scene automatically and append tag information relevant to at-bat scenes. Towards developing the system, the previous papers proposed several Tagging algorithms using ball-by-ball textual reports and voice recognition, and tried to refine models for baseball games. To improve its robustness, this paper proposes a novel Tagging method that utilizes multiple kinds of play-by-play comment patterns for voice recognition which represent the situation of at-bat scenes and take their “Priority” into account. In addition, to search for a voice-recognized play-by-play comment on the start/end of at-bat scenes, this paper proposes a novel modelling method called as “Local Modelling,” as well as Global Modelling used by the previous papers.
- Published
- 2017
- Full Text
- View/download PDF
4. The microbiome can predict mucosal healing in small intestine in patients with Crohn's disease
- Author
-
Takuya Ishikawa, Eizaburo Ohno, Kenta Yamamoto, Yasuyuki Mizutani, Takashi Honda, Masanao Nakamura, Shun Hattori, Takeshi Yamamura, Masatoshi Ishigami, Tsunaki Sawada, Keiko Maeda, Mitsuhiro Fujishiro, Hiroki Kawashima, Kazuhiro Furukawa, and Yoshiki Hirooka
- Subjects
Adult ,Male ,medicine.medical_specialty ,Disease ,Gut flora ,Gastroenterology ,Capsule Endoscopy ,Sensitivity and Specificity ,03 medical and health sciences ,Feces ,Young Adult ,0302 clinical medicine ,Crohn Disease ,Predictive Value of Tests ,Internal medicine ,Intestine, Small ,Medicine ,Humans ,Microbiome ,Prospective Studies ,Intestinal Mucosa ,Prospective cohort study ,Aged ,Double-Balloon Enteroscopy ,Crohn's disease ,Wound Healing ,biology ,business.industry ,Area under the curve ,Hepatology ,Middle Aged ,medicine.disease ,biology.organism_classification ,Small intestine ,Gastrointestinal Microbiome ,medicine.anatomical_structure ,030220 oncology & carcinogenesis ,030211 gastroenterology & hepatology ,Female ,business ,Biomarkers - Abstract
Mucosal healing is the main treatment goal for Crohn’s disease. In this situation, some patients have difficulty with endoscopic evaluation of the entire small intestine. Crohn’s disease is closely associated with the gut microbiota, but the relationship between the microbiome and disease activity in the small intestine remains unclear. We examined the association between the microbiome and endoscopic findings in the small intestine and determined whether the microbiome can predict mucosal healing. The patients with Crohn’s disease who were scheduled for capsule or balloon-assisted endoscopy were included in this prospective study. Patients whose entire small intestine was evaluated were divided into two groups based on ulcerative findings. The microbiomes in the fecal samples were analyzed using 16S rRNA sequencing. The 38 enrolled patients were divided into the ulcer group (24) and mucosal healing group (14). The ulcer group exhibited lower α diversity. Six genera, namely Faecalibacterium (P = 0.008), Lachnospira (P = 0.009), Paraprevotella (P = 0.01), Dialister (P = 0.012), Streptococcus (P = 0.025), and Clostridium (P = 0.028) were enriched in the mucosal healing group. A predictive score for mucosal healing was defined using these six genera. The area under the curve was 0.795 and the sensitivity and specificity for predicting mucosal healing were 0.643 and 0.917, respectively. Fecal microbiome is corelated with disease activity in the entire small intestine in Crohn’s disease patients. The predictive score proposed by microbiota characteristics was a potential biomarker for mucosal healing in the small intestine.
- Published
- 2019
5. Interpolating Lost Spatio-Temporal Data by Web Sensors
- Author
-
Shun Hattori
- Subjects
Computer science ,business.industry ,020204 information systems ,Big data ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Pattern recognition ,Regression analysis ,02 engineering and technology ,Artificial intelligence ,business ,Temporal database - Published
- 2018
- Full Text
- View/download PDF
6. A Practice for Training IT Engineers by Combining Two Different Types of PBL
- Author
-
Shun Hattori, Sato Saga, Hidetsugu Suto, Yosuke Kobayashi, Kazuhiko Sato, Takeshi Shibata, and Shinya Watanabe
- Subjects
Proactive learning ,Problem-based learning ,Computer science ,business.industry ,Engineering education ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,Autodidacticism ,Information technology ,business ,Project-based learning ,Training (civil) ,Curriculum - Abstract
PBLs signifies both problem-based learning and project-based learning; we clearly distinguish between the two types of PBLs. The former PBL involves finding ways to solve problems under unfavorable conditions. In the curriculum at our institute, problem-based learning has been conducted since 2006. By contrast, project-based learning involves a student team undertaking an actual project, devised by a company. We did not adopt project-based learning in our curriculum. In 2016, our institute joined the Education Network for Practical Information Technology project of Japan’s Ministry of Education, Culture, Sports, Science and Technology. In that project, around 40 universities are engaged in developing a cooperative network. Each university develops practical education using PBL; its knowledge and resources obtained are shared among other universities in the network. For our part of the project, we added 3 practical exercises based on project-based learning. By combining the two different types of PBL, our curriculum provides exercises that introduce better problem-solving skills, instill a challenging spirit, and provide practical experience for students. In this paper, we report our exercises and practical results for 2017.
- Published
- 2018
- Full Text
- View/download PDF
7. A case of mucinous cystic neoplasm of the pancreas misdiagnosed as a pancreatic pseudocyst at the initial exam and resected after a 2-year follow-up
- Author
-
Fumihiro Hayakawa, Takeo Yamaguchi, Kentarou Murate, Jun-ichi Haruta, Masao Doisaki, Kenta Yamada, Tsuyoki Yama, Takuya Ishikawa, Shun Hattori, and Jun Yashika
- Subjects
Adult ,medicine.medical_specialty ,Pancreatic pseudocyst ,Cholangiopancreatography, Magnetic Resonance ,Iron ,Contrast Media ,Neuroendocrine tumors ,Ferric Compounds ,Endosonography ,Diagnosis, Differential ,Lesion ,Cystadenoma, Mucinous ,Pancreatic Pseudocyst ,medicine ,Humans ,Radiology, Nuclear Medicine and imaging ,Cyst ,Diagnostic Errors ,Pancreas ,Pancreatic duct ,business.industry ,Oxides ,General Medicine ,medicine.disease ,Cystic Neoplasm ,Pancreatic Neoplasms ,Neuroendocrine Tumors ,medicine.anatomical_structure ,Female ,Radiology ,Differential diagnosis ,medicine.symptom ,Tomography, X-Ray Computed ,business ,Follow-Up Studies - Abstract
A 44-year-old woman was referred to our hospital because of a cystic lesion in the pancreatic body that was found by computed tomography (CT) as a result of a screening for impaired liver function after the patient presented with a high fever in 2011. Trans-abdominal ultrasonography (US) revealed a 33-mm unilocular cyst within the pancreatic body and a 5-mm hypoechoic mass in the pancreatic neck. Contrast-enhanced CT showed a slight enhancement around the cyst and a mild dilation of the main pancreatic duct, but neither septum nor nodule was detected inside. Contrast-enhanced endoscopic ultrasonography (CE-EUS) revealed a hyperechoic elevated lesion inside the cystic lesion without enhancement in the pancreatic body; CE-EUS also revealed a 5-mm homogeneous hypoechoic mass with a remarkable enhancement in the pancreatic neck with the use of Sonazoid(®) as a contrast medium. These lesions were diagnosed as a pancreatic pseudocyst and a neuroendocrine tumor (NET), respectively, and were followed up with periodic examinations. The cystic lesion showed contraction 6 months after the initial exam. However, US revealed an enlargement of the cystic lesion to 40 mm in diameter 2 years after the initial exam, and EUS showed irregular thickening of the wall with a cyst-in-cyst appearance. The diagnoses of a mucinous cystic neoplasm (MCN) and a concomitant small NET were made after a distal pancreatectomy. We herein report a rare case of MCN that showed various morphological changes over 2 years of observation.
- Published
- 2014
- Full Text
- View/download PDF
8. Mo1710 THE DIAGNOSTIC ABILITY AND PITFALL OF JNET(JAPAN NBI EXPERT TEAM)CLASSIFICATION IN TRAINEES
- Author
-
Genta Uchida, Y. Niwa, Tetsuya Ishida, Keisaku Yamada, Takuya Ishikawa, Hiroyuki Otsuka, Hiroto Suzuki, Eri Ishikawa, Hiroki Suhara, Yasuyuki Mizutani, Ryoji Miyahara, Go Kajikawa, Takahiro Nishikawa, Kohei Funasaka, Shun Hattori, Kazuhiro Furukawa, Hidemi Goto, Masanao Nakamura, Masanobu Matsushita, Tsunaki Sawada, Takeshi Yamamura, Yoshiki Hirooka, Osamu Watanabe, Eizaburo Ohno, Hiroki Kawashima, and Hiroki Hashiguchi
- Subjects
medicine.medical_specialty ,business.industry ,Gastroenterology ,Medicine ,Radiology, Nuclear Medicine and imaging ,Medical physics ,business - Published
- 2018
- Full Text
- View/download PDF
9. Spatio-Temporal Web Sensors Using Web Queries vs. Documents
- Author
-
Shun Hattori
- Subjects
Web standards ,medicine.medical_specialty ,Information retrieval ,Computer science ,Static web page ,computer.software_genre ,World Wide Web ,Web page ,medicine ,Web navigation ,Web mapping ,Web service ,Web modeling ,computer ,Data Web - Abstract
In the Web world, one user creates and uploads a Web document about a phenomenon or event in the physical world, while another user retrieves and consumes Web documents by submitting a Web query. There have been many researches to mine Web documents in the exploding Web world, especially User Generated Content such as weblogs and microblogs, for knowledge about various phenomena and events in the physical world, and also Web services with the Web-mined knowledge have been made available for the public. However, there are few detailed investigations on how accurately Web-mined data reflect physical-world data. It must be socially-problematic to immoderately utilize the Web-mined data in public Web services without ensuring their accuracy sufficiently. Therefore, the previous papers introduced various Web Sensors to extract spatiotemporal data about a target phenomenon from Web documents searched by keyword(s) representing the target phenomenon, and tried to validate the potential and reliability of the Web-sensed spatiotemporal data. Moreover, this paper compares spatio-temporal Web Sensors analyzing Web queries and/or Web documents.
- Published
- 2013
- Full Text
- View/download PDF
10. Comparative Experiments on Models for Automatic Baseball Video Tagging
- Author
-
Shun Hattori and Komei Arasawa
- Subjects
0209 industrial biotechnology ,020901 industrial engineering & automation ,Information retrieval ,Multimedia ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,computer.software_genre ,computer - Abstract
To enable us to select the only scenes that we want to watch in a baseball video and personalize its highlights subvideo, we require an Automatic Baseball Video Tagging system that divides a baseball video into multiple sub-videos per at-bat scene automatically and also appends tag information relevant to at-bat scenes. The previous paper proposed several Tagging algorithms using ball-by-ball textual report and voice recognition. To improve our system, this paper introduces a more refined model for baseball games, and performs comparative experiments on models with regard to their recall, precision, and F-measure.
- Published
- 2016
- Full Text
- View/download PDF
11. Protective role of Gipie, a Girdin family protein, in endoplasmic reticulum stress responses in endothelial cells
- Author
-
Yoshiyuki Kawamoto, Kengo Maeda, Atsushi Enomoto, Shinji Mii, Rei Shibata, Masahide Takahashi, Minako Hagikura, Shun Hattori, Etsushi Matsushita, Toyoaki Murohara, Masahiro Sokabe, Ken Takahashi, Yoshiki Murakumo, Takuya Kato, and Naoya Asai
- Subjects
Male ,Neointima ,Vesicular Transport Proteins ,Golgi Apparatus ,Apoptosis ,Protein Serine-Threonine Kinases ,Biology ,Endoplasmic Reticulum ,Chlorocebus aethiops ,Endoribonucleases ,medicine ,Animals ,Humans ,Rats, Wistar ,Endothelial dysfunction ,Endoplasmic Reticulum Chaperone BiP ,Molecular Biology ,Cells, Cultured ,Heat-Shock Proteins ,Kinase ,Endoplasmic reticulum ,Microfilament Proteins ,JNK Mitogen-Activated Protein Kinases ,Endothelial Cells ,Membrane Proteins ,Articles ,U937 Cells ,Cell Biology ,medicine.disease ,Rats ,Cell biology ,Enzyme Activation ,Cell Biology of Disease ,COS Cells ,Unfolded Protein Response ,Unfolded protein response ,RNA Interference ,Stress, Mechanical ,Signal transduction ,Carrier Proteins ,Homeostasis ,Signal Transduction - Abstract
The Gipie/GRP78 interaction serves as a molecular switch for the regulation of the apoptotic signaling pathway, which appears to contribute to the protection of endothelial cells from endoplasmic reticulum stress-induced apoptosis., Continued exposure of endothelial cells to mechanical/shear stress elicits the unfolded protein response (UPR), which enhances intracellular homeostasis and protect cells against the accumulation of improperly folded proteins. Cells commit to apoptosis when subjected to continuous and high endoplasmic reticulum (ER) stress unless homeostasis is maintained. It is unknown how endothelial cells differentially regulate the UPR. Here we show that a novel Girdin family protein, Gipie (78 kDa glucose-regulated protein [GRP78]-interacting protein induced by ER stress), is expressed in endothelial cells, where it interacts with GRP78, a master regulator of the UPR. Gipie stabilizes the interaction between GRP78 and the ER stress sensor inositol-requiring protein 1 (IRE1) at the ER, leading to the attenuation of IRE1-induced c-Jun N-terminal kinase (JNK) activation. Gipie expression is induced upon ER stress and suppresses the IRE1-JNK pathway and ER stress-induced apoptosis. Furthermore we found that Gipie expression is up-regulated in the neointima of carotid arteries after balloon injury in a rat model that is known to result in the induction of the UPR. Thus our data indicate that Gipie/GRP78 interaction controls the IRE1-JNK signaling pathway. That interaction appears to protect endothelial cells against ER stress-induced apoptosis in pathological contexts such as atherosclerosis and vascular endothelial dysfunction.
- Published
- 2011
- Full Text
- View/download PDF
12. Mo1686 EVALUATION OF LOCAL RECURRENCE AFTER COLD POLYPECTOMY COMPARED WITH CONVENTIONAL HOT POLYPECTOMY IN A PROSPECTIVE RANDOMIZED CONTROLLED TRIAL
- Author
-
Masanao Nakamura, Shun Hattori, Keisaku Yamada, Hidemi Goto, Takahiro Nishikawa, Genta Uchida, Tsunaki Sawada, Kohei Funasaka, Takeshi Kuno, Osamu Watanabe, Eizaburo Ohno, Y. Niwa, Masashi Saito, Hiroto Suzuki, Yasuyuki Mizutani, Hiroyuki Otsuka, Hiroki Suhara, Kazuhiro Furukawa, Hiroki Kawashima, Masanobu Matsushita, Ryoji Miyahara, Yoshiki Hirooka, Takeshi Yamamura, Tetsuya Ishida, Takuya Ishikawa, Eri Ishikawa, and Hiroki Hashiguchi
- Subjects
medicine.medical_specialty ,Randomized controlled trial ,law ,business.industry ,Gastroenterology ,medicine ,Hot polypectomy ,Radiology, Nuclear Medicine and imaging ,Cold polypectomy ,business ,law.invention ,Surgery - Published
- 2018
- Full Text
- View/download PDF
13. Towards Building Secure Smart Spaces for Information Security in the Physical World
- Author
-
Katsumi Tanaka and Shun Hattori
- Subjects
Cloud computing security ,Ubiquitous computing ,Computer science ,business.industry ,Smart spaces ,Access control ,Information security ,Computer security ,computer.software_genre ,Security information and event management ,Human-Computer Interaction ,World Wide Web ,Artificial Intelligence ,Context awareness ,Smart environment ,Computer Vision and Pattern Recognition ,business ,computer - Abstract
This paper introduces the concept of Secure Spaces, one step ahead of Smart Spaces, on information security. We define Secure Spaces as physically isolated environments in which any resource is completely protected from its unauthorized objects with respect to information security. In other words, only if inside them, any information resource is completely protected from being accessed by its unauthorized visitors, and any visitor is completely protected from being exposed to her unwanted information resources. To build such a secure Smart Space, we propose a formalized model and architecture for space entry control based on its dynamically changing contents such as its visitors, physical information resources, and virtual information resources via its embedded output devices.
- Published
- 2007
- Full Text
- View/download PDF
14. Spatio-temporal dependency analysis for temporally-shifted Web Sensors
- Author
-
Shun Hattori
- Subjects
Dependency (UML) ,Web mining ,Computer science ,Agency (philosophy) ,Web mapping ,Data mining ,Web service ,Web intelligence ,computer.software_genre ,computer ,Data Web ,Temporal shift - Abstract
We experience or forecast various phenomena (e.g., rain, snow, earthquake) in the physical world, while we carry out various actions (e.g., blogging, searching, e-shopping) in the Web world. There have been many researches to mine the exploding Web world for knowledge about various phenomena and events in the physical world, and also Web services with the Web-mined knowledge have been made available for the public. However, there are few detailed investigations on how accurately Web-mined data reflect physical-world data. It must be socially-problematic to idolatrously utilize the Web-mined data in public Web services without ensuring their accuracy sufficiently. This paper introduces temporally-shifted Web Sensors with a temporal shift parameter δ to extract spatiotemporal numerical value about a physical phenomenon from Web documents searched by linguistic keyword(s) representing the physical phenomenon, and analyzes the spatiotemporal dependency of the temporal shift parameter δ with respect to their coefficient correlation with Japan Meteorological Agency's spatiotemporal statistics.
- Published
- 2013
- Full Text
- View/download PDF
15. Web Self-Controller: A Filtering Browser for Self-Control
- Author
-
Kyohei Yoshida and Shun Hattori
- Subjects
Client-side scripting ,Multimedia ,Web development ,Computer science ,business.industry ,Static web page ,computer.software_genre ,Web API ,World Wide Web ,Web design ,Web page ,Web navigation ,Web service ,business ,computer - Abstract
Various Web contents exist on the Internet in recent years, and are used by many users. But some people are so fascinated by and absorbed in Web contents that their everyday life is affected. Such a person yields to the temptation because of her/his weak will, even if s/he tries to control her/his Web access by self-control. Moreover, it is difficult for such a person to overcome the temptation because there are few tools to help her/his self-control. Then, this paper proposes a method that applies the filtering technology conventionally used for access restriction to self-control over Web access, and allows users to control their own Web access. Specifically, we create a prototype Web browser that has four functions to filter Web pages: a filtering based on their content, a filtering based on their ID (URL), a filtering based on their actions (buttons) such as purchasing and playing, and a time-based filtering.
- Published
- 2013
- Full Text
- View/download PDF
16. [A case of type 2 autoimmune pancreatitis associated with Crohn disease]
- Author
-
Takuya, Ishikawa, Jun-ichi, Haruta, Takeo, Yamaguchi, Masao, Doisaki, Tsuyoki, Yama, Keiichirou, Kamei, Tsunaki, Sawada, Yasuyuki, Mizutani, Yoshirou, Murakami, and Shun, Hattori
- Subjects
Crohn Disease ,Pancreatitis ,Humans ,Female ,Middle Aged ,Autoimmune Diseases - Abstract
A 45-year-old woman visited our hospital due to upper left quadrant pain and melena. Colonoscopy revealed longitudinal ulcers in the transverse colon. The endoscopic findings and pathological examination of a biopsy specimen led to diagnosis of Crohn disease, and mesalazine was administered. Although the colorectal lesions showed improvement with mesalazine, a blood test revealed elevation of biliary enzymes. Endoscopic retrograde cholangiopancreatography showed diffuse narrowing of the main pancreatic duct and smooth stricture of the distal bile duct. Steroid therapy improved the pancreatic lesion, which was diagnosed as type 2 autoimmune pancreatitis.
- Published
- 2013
17. Ability-based expression control for secure spaces
- Author
-
Shun Hattori
- Subjects
Expression (architecture) ,Computer science ,Control (management) ,Information access ,Space (commercial competition) ,Computer security ,computer.software_genre ,computer - Abstract
In public spaces, there are a number of different contents such as visitors, physical information resources, and virtual information resources via their embedded output devices. Therefore, we might unexpectedly enter the public spaces that have our unauthorized contents and/or unwanted characteristics, i.e., they are not always secure and safe. To solve this problem, my previous work has introduced the concept of “Secure Spaces”, physical environments in which any visitor is protected from being pushed her unwanted information resources on and also any information resource is always protected from being accessed by its unauthorized visitors, and the model and architecture for space entry control and information access control based on their dynamically changing contents. Aiming to build more flexible Secure Spaces, this paper proposes an extended model for not only spatial entry control but also Ability-Based Expression Control according to how preferentially a virtual information resource should be outputted in a Secure Space where shared by visitors with perceptibility and understandability of the virtual information resource's content and expression.
- Published
- 2012
- Full Text
- View/download PDF
18. Spatio-Temporal Web Sensors by Social Network Analysis
- Author
-
Shun Hattori
- Subjects
World Wide Web ,Web standards ,Web development ,Web mining ,business.industry ,Computer science ,Web navigation ,Web mapping ,business ,Web intelligence ,Data Web ,Social Semantic Web - Abstract
Many researches on mining the Web, especially Social Networking Media such as web logs and microblogging sites which seem to store vast amounts of information about human societies, for knowledge about various phenomena and events in the physical world have been done actively, and Web applications with Web-mined knowledge have begun to be developed for the public. However, there is no detailed investigation on how accurately Web-mined data reflect real-world data. It must be problematic to idolatrously utilize the Web-mined data in public Web applications without ensuring their accuracy sufficiently. Therefore, this paper defines spatio-temporal Web Sensors by analyzing Twitter, Facebook, web logs, news sites, or the whole Web for a target natural phenomenon, and tries to validate the potential and reliability of the Web Sensors' spatio-temporal data by measuring the coefficient correlation with Japanese weather, earthquake, and influenza statistics per week by region as real-world data.
- Published
- 2012
- Full Text
- View/download PDF
19. Cross-Language Peculiar Image Search Using Translaion between Japanese and English
- Author
-
Shun Hattori
- Subjects
business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Computer vision ,Artificial intelligence ,Translation (geometry) ,Object (computer science) ,business ,Image retrieval ,Image (mathematics) - Abstract
As next steps of Image Retrieval, it is very important to discriminate between “Typical Images” and “Peculiar Images” in the acceptable images, and moreover, to collect many different kinds of peculiar images exhaustively. As a solution to the 1st next step, my previous work has proposed a novel method to more precisely search the Web for peculiar images of a target object by its peculiar appearance descriptions (e.g., color-names) extracted from the Web and/or its peculiar image features (e.g., color-features) converted from them. This paper proposes a refined method equipped with cross-language (translation between Japanese and English) functions and validates its retrieval precision.
- Published
- 2012
- Full Text
- View/download PDF
20. Linearly-Combined Web Sensors for Spatio-temporal Data Extraction from the Web
- Author
-
Shun Hattori
- Subjects
Web analytics ,Computer science ,business.industry ,Reliability (computer networking) ,computer.software_genre ,Temporal database ,World Wide Web ,Knowledge extraction ,Web mining ,Extraction (military) ,Web mapping ,Data mining ,Web service ,business ,computer - Abstract
Many researches on mining the Web, especially CGM (Consumer Generated Media) such as Web logs, for knowledge about various phenomena and events in the physical world have been done actively, and Web services with the Web-mined knowledge have begun to be developed for the public. However, there is no detailed investigation on how accurately Web-mined data reflect real-world data. It must be problematic to idolatrously utilize the Web-mined data in public Web services without ensuring their accuracy sufficiently. Therefore, this paper defines the basic Web log Sensor with a neutral, positive, or negative description for a target phenomenon, and their linearly-combined Web log Sensors, and tries to validate the potential and reliability of these Web log Sensors' spatio-temporal data by measuring the correlation with weather (precipitation) and earthquake (maximum seismic intensity and number of felt quakes) statistics per day by region of Japan Meteorological Agency as real-world data.
- Published
- 2011
- Full Text
- View/download PDF
21. Searching the Web for Peculiar Images based on hand-made concept hierarchies
- Author
-
Shun Hattori
- Subjects
World Wide Web ,Thesaurus (information retrieval) ,Query expansion ,Information retrieval ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Encyclopedia ,WordNet ,Look and feel ,Object (computer science) ,Semantics ,Image retrieval - Abstract
Most researches on Image Retrieval (IR) have aimed at clearing away noisy images and allowing users to search only acceptable images for a target object specified by its object-name. We have become able to get enough acceptable images of a target object just by submitting its object-name to a conventional keyword-based Web image search engine. However, because the search results rarely include its uncommon images, we can often get only its common images and cannot easily get exhaustive knowledge about its appearance (look and feel). As next steps of IR, it is very important to discriminate between “Typical Images” and “Peculiar Images” in the acceptable images, and moreover, to collect many different kinds of peculiar images exhaustively. This paper proposes a method to search the Web for peculiar images by expanding or modifying a target object-name (as an original query) with its hyponyms based on hand-made concept hierarchies such as WordNet and Wikipedia.
- Published
- 2011
- Full Text
- View/download PDF
22. Rethinking PBL as a holistic pedagogical method
- Author
-
Shun Hattori, Taichi Nakamura, Akio Takashima, and Hiroyuki Kameda
- Subjects
Software ,Holistic education ,business.industry ,Computer science ,Pedagogy ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,Project-based learning ,business ,Programming profession - Abstract
This paper discusses PBL for first year software education, paying attention to aspects of holistic learning, and also proposes a new PLB course based on the discussion. The PBL course was given to high school students to confirm fundamental validity. The questionnaire method suggested that PBL might be fundamentally useful to learn holistically.
- Published
- 2011
- Full Text
- View/download PDF
23. Peculiar image search by Web-extracted appearance descriptions
- Author
-
Shun Hattori
- Subjects
Computer science ,business.industry ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Object (computer science) ,Query expansion ,Knowledge extraction ,Web mining ,Histogram ,Look and feel ,Computer vision ,Artificial intelligence ,business ,Image retrieval - Abstract
We have become able to get enough approvable images of a target object just by submitting its object-name to a conventional keyword-based Web image search engine. However, because the search results rarely include its uncommon images, we can often get only its common images and cannot easily get exhaustive knowledge about its appearance (look and feel). As next steps of image searches in the Web, it is very important to discriminate between “Typical Images” and “Peculiar Images” in the approvable images, and moreover, to collect many different kinds of peculiar images as exhaustively as possible. This paper proposes a novel method to precisely retrieve peculiar images of a target object by its typical/peculiar appearance descriptions (e.g., color-names) extracted from the Web and/or its typical/peculiar image features (e.g., color-features) converted from them, as a solution to the 1st next step of image retrievals in the Web.
- Published
- 2010
- Full Text
- View/download PDF
24. Object-oriented Semantic and Sensory Knowledge Extraction from the Web
- Author
-
Shun Hattori
- Subjects
World Wide Web ,Knowledge extraction ,Computer science ,business.industry ,Semantic computing ,Semantic analytics ,Semantic memory ,Semantic Web Stack ,Object (computer science) ,business ,Meronymy ,Social Semantic Web - Abstract
Automatic knowledge extraction from such a very large document corpus as the Web is one of the hottest research topics in the domain of Artificial Intelligence and Database technologies. This chapter introduces my object-oriented and the existing methods to extract semantic (e.g., hyponymy and meronymy) and sensory (e.g., visual and aural) knowledge from the Web, and compares them by showing several experimental results. My object-oriented semantic knowledge extraction is based on property inheritance(s) and property aggregation, and repeatedly improves the extracted results of both hyponymy and meronymy relations. Meanwhile, my object-oriented sensory knowledge extraction is improved by utilizing the extracted hyponymy and meronymy relations. Finally, this chapter introduces my Sense-based Object-name Search (SOS) to enable users to identify the concrete name of a target object which they do not know only by inputting its hyponym (class-name) and some sensory descriptions, as an application system to utilize the Web-extracted semantic and sensory knowledge.
- Published
- 2010
- Full Text
- View/download PDF
25. Object-name search by visual appearance and spatio-temporal descriptions
- Author
-
Shun Hattori and Katsumi Tanaka
- Subjects
Information retrieval ,Computer science ,Web search engine ,Context awareness ,Context (language use) ,Precision and recall ,Object (computer science) ,Visual appearance - Abstract
When a user searches the Web for information about a target object by submitting a keyword-based query to such a conventional Web search engine as Google, the precision and recall of the search results depend a great deal on whether or not s/he has known exactly the concrete name of the target object. However, the user does not always know the concrete name of any target object that s/he has encountered in the real world and wanted information about. In this paper, we propose an application system of Object-Name Search that helps her/him to identify the concrete name of the target object by such ambiguous features as its class-name, visual appearance and spatio-temporal information. When the user inputs a class-name, visual appearance and/or real-world context descriptions, our system returns not only concrete object-names ranked by her/his specification but also their typical images, visual appearance and spatio-temporal descriptions. And then the user can also modify her/his original specification repeatedly by using their typical features as a useful reference.
- Published
- 2009
- Full Text
- View/download PDF
26. Extracting Concept Hierarchy Knowledge from the Web Based on Property Inheritance and Aggregation
- Author
-
Shun Hattori and Katsumi Tanaka
- Subjects
Vocabulary ,Hierarchy ,Information retrieval ,Property (philosophy) ,business.industry ,Computer science ,media_common.quotation_subject ,WordNet ,Ontology (information science) ,computer.software_genre ,Meronymy ,Knowledge acquisition ,World Wide Web ,Intelligent agent ,Text mining ,Artificial intelligence ,Computational linguistics ,business ,computer ,Natural language processing ,media_common - Abstract
Concept hierarchy knowledge, such as hyponymy and meronymy, is very important for various natural language processing systems. While WordNet and Wikipedia are being manually constructed and maintained as lexical ontologies, many researchers have tackled how to extract concept hierarchies from very large corpora of text documents such as the Web not manually but automatically. However, their methods are mostly based on lexico-syntactic patterns as not necessary but sufficient conditions of hyponymy and meronymy, so they can achieve high precision but low recall when using stricter patterns or they can achieve high recall but low precision when using looser patterns. Therefore, we need necessary conditions of hyponymy and meronymy to achieve high recall and not low precision. In this paper, not only "Property Inheritance'' from a target concept to its hyponyms but also "Property Aggregation'' from its hyponyms to the target concept is assumed to be necessary and sufficient conditions of hyponymy, and we propose a method to extract concept hierarchy knowledge from the Web based on property inheritance and property aggregation.
- Published
- 2008
- Full Text
- View/download PDF
27. Mining the Web for Hyponymy Relations Based on Property Inheritance
- Author
-
Katsumi Tanaka, Hiroaki Ohshima, Satoshi Oyama, and Shun Hattori
- Subjects
World Wide Web ,Recall ,Computer science ,business.industry ,Property inheritance ,Artificial intelligence ,computer.software_genre ,business ,Meronymy ,computer ,Noun phrase ,Natural language processing - Abstract
Concept hierarchies, such as hyponymy and meronymy relations, are very important for various natural language processing systems. Many researchers have tackled how to mine very large corpora of documents such as the Web for them not manually but automatically. However, their methods are mostly based on lexico-syntactic patterns as not necessary but sufficient conditions of concept hierarchies, so they can achieve high precision but low recall when using stricter patterns or they can achieve high recall but low precision when using looser patterns. In this paper, property inheritance from a concept to its hyponyms is assumed to be necessary and sufficient conditions of hyponymy relations to achieve high recall and not low precision, and we propose a method to acquire hyponymy relations from the Web based on property inheritance.
- Published
- 2008
- Full Text
- View/download PDF
28. ReCQ: Real-World Context-Aware Querying
- Author
-
Shun Hattori, Hiroaki Ohshima, Satoshi Oyama, Katsumi Tanaka, Keishi Tajima, Junpei Kawamoto, and Taro Tezuka
- Subjects
World Wide Web ,Query expansion ,Information retrieval ,Computer science ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,Tree generation ,Inference ,Vertical search ,Context (language use) ,Information demand - Abstract
This paper proposes a method of context-aware querying in mobile/ubiquitous Web searches, which provides mobile users with four capabilities: (1) context-aware keyphrase inference to help them input a keyphrase as a part of their keyword-based query, (2) context-aware subtopic tree generation to help them specify their information demand on one subtopic, (3) discovery of comparable keyphrases to their original query to help them make better decisions, and (4) meta vertical search focused on one subtopic to make the retrieval results more precise.
- Published
- 2007
- Full Text
- View/download PDF
29. Mining the Web for Appearance Description
- Author
-
Taro Tezuka, Katsumi Tanaka, and Shun Hattori
- Subjects
Set (abstract data type) ,World Wide Web ,Class (computer programming) ,Information retrieval ,Text mining ,Computer science ,business.industry ,Component (UML) ,Object (computer science) ,business - Abstract
This paper presents a method to extract appearance descriptions for a given set of objects. Conversion between an object name and its appearance descriptions is useful for various applications, such as searching for an unknown object, memory recall support, and car/walk navigation. The method is based on text mining applied to Web search results. Using a manually constructed dictionary of visual modifiers, our system obtains a set of pairs of a visual modifier and a component/class for a given name of object, which best describe its appearance. The experimental results have demonstrated the effectiveness of our method in discovering appearance descriptions of various types of objects.
- Published
- 2007
- Full Text
- View/download PDF
30. Secure Spaces: Protecting Freedom of Information Access in Public Places
- Author
-
Katsumi Tanaka and Shun Hattori
- Subjects
Ubiquitous computing ,business.industry ,Freedom of information ,Computer science ,Internet privacy ,Control (management) ,Information access ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Architecture ,Computer security ,computer.software_genre ,business ,computer - Abstract
In public places, information can be accessed by its unauthorized users, while we are sometimes forced to access our unwanted information unexpectedly. We have introduced the concept of Secure Spaces, physical environments where any information is always protected from its unauthorized users, and have proposed a content-based entry control model and an architecture for Secure Spaces which protect their contents' freedom of information delivery but do not protect their visitors' freedom of information access. This paper aims at building truly Secure Spaces which protect both freedoms and enhances our proposed model.
- Published
- 2007
- Full Text
- View/download PDF
31. Context-Aware Query Refinement for Mobile Web Search
- Author
-
Taro Tezuka, Katsumi Tanaka, and Shun Hattori
- Subjects
World Wide Web ,medicine.medical_specialty ,Query expansion ,Web search query ,Information retrieval ,Web query classification ,Computer science ,Web page ,Mobile database ,medicine ,Mobile search ,Mobile Web ,Web modeling - Abstract
Mobile Web search engines as well as fixed ones become much more important for our Web access in the near future. However, mobile computing environments have troublesome limitations, as compared with traditional desktop computing environments. In order to solve the so-called "mismatched query problem" due to more shortness and ambiguity of mobile users' original queries, this paper proposes a novel method for context-aware query refinement based on their current geographic location and real-world contexts which are inferred from the place-names representing the location and the Web as a knowledge database
- Published
- 2007
- Full Text
- View/download PDF
32. Automatic Generation of Multimedia Tour Guide from Local Blogs
- Author
-
Taro Tezuka, Hiroshi Kori, Katsumi Tanaka, and Shun Hattori
- Subjects
World Wide Web ,Multimedia ,Computer science ,Mobile computing ,User interface ,computer.software_genre ,computer ,Mobile device ,Tourism - Abstract
It has recently become a common practice for people to post their sightseeing experiences on weblogs (blogs). Their blog entries often contain valuable information for potential tourists, who can learn about various aspects not found on the official websites of sightseeing spots. Bloggers provide images, videos and texts regarding the places they visited. This implies that popular travel routes could be extracted according to the information available in blogs. In this paper, we describe a system that extracts typical visitor's travel routes based on blog entries and that presents multimedia content relevant to those routes. Typical travel routes are extracted by using a sequential pattern mining method. We also introduce a new user interface for presenting multimedia content along the route in a proactive manner. The system works as an automatically generated tour guide accessible from a PC or a mobile device.
- Published
- 2006
- Full Text
- View/download PDF
33. Activity-Based Query Refinement for Context-Aware Information Retrieval
- Author
-
Shun Hattori, Katsumi Tanaka, and Taro Tezuka
- Subjects
World Wide Web ,Search engine ,Query expansion ,Information retrieval ,Web search query ,Web query classification ,Computer science ,Mobile search ,Context (language use) ,Mobile Web - Abstract
Mobile Web search will gain more importance. This paper proposes a novel method for query refinement based on real-world contexts of a mobile user, such as his/her current geographic location and the typical activities at the location which are extracted by Blog mining. Our method enhances location-awareness and even further context-awareness to the existing location-free keyword-based Web search engines.
- Published
- 2006
- Full Text
- View/download PDF
34. Query Modification Based on Real-World Contexts for Mobile and Ubiquitous Computing Environments
- Author
-
Shun Hattori, Taro Tezuka, and Katsumi Tanaka
- Subjects
Query expansion ,Information retrieval ,Web search query ,Ubiquitous computing ,Web query classification ,Computer science ,Mobile database ,Mobile computing ,Mobile search ,Mobile Web - Abstract
With the growing amount of information on the WWW and the improvement of mobile computing environments, mobile Web search engines will increase significance or more in the future. Because mobile devices have the restriction of output performance and we have little time for browsing information slowly while moving or doing some activities in the real world, it is necessary to refine the retrieval results in mobile computing environments better than in fixed ones. However, since a mobile users query is often shorter and more ambiguous than a fixed users query which is not enough to guess his/her information demand accurately, too many results might be retrieved by commonly used Web search engines. This paper proposes two novel methods for query modification based on real-world contexts of a mobile user, such as his/her geographic location and the objects surrounding him/her, aiming to enhance location-awareness, and moreover, context-awareness, to the existing location-free information retrieval systems.
- Published
- 2006
- Full Text
- View/download PDF
35. Content-Based Entry Control for Secure Spaces
- Author
-
Shun Hattori, Taro Tezuka, and Katsumi Tanaka
- Subjects
Authentication ,Computer science ,business.industry ,Access control ,Space (commercial competition) ,Computer security ,computer.software_genre ,Resource (project management) ,Control system ,Resource management ,Architecture ,business ,computer ,Content management ,Computer network - Abstract
We define "Secure Space" as a physical space in which any resource is always protected from its unauthorized users in terms of enforcing its authorization policies assuredly. Aiming to build such secure spaces, this paper proposes an architecture and a model for space entry control based on its dynamically changing contents, such as users, physical resources and virtual resources outputted by some embedded devices. We first describe the architecture and then formalize the model and mechanism for secure spaces.
- Published
- 2006
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.