Interdisciplinary Information Sciences
Online ISSN : 1347-6157
Print ISSN : 1340-9050
ISSN-L : 1340-9050
Volume 22, Issue 1
Displaying 1-10 of 10 articles from this issue
Regular Papers
  • Yiming ZHOU, Chutokuro IMAIZUMI, Tatsuhito KONO, Dao-Zhi ZENG
    2016Volume 22Issue 1 Pages 1-15
    Published: January 13, 2016
    Released on J-STAGE: November 17, 2016
    Advance online publication: November 13, 2015
    JOURNAL FREE ACCESS
    We study a two-country two-factor model with free entry and monopolistic competition. There are two industries employing immobile labor as fixed input and mobile capital as marginal input. Firms cannot move across countries, but only move across industries within a country. The two industries can differ in three aspects: factor intensities, transport costs and demand elasticities. The two countries are identical except for size. The production specialization and trade pattern are the results of the interaction of two effects: the market access effect and the wage differential effect.
    Download PDF (578K)
  • Shimpei ENDO, Takako ENDO, Norio KONNO, Etsuo SEGAWA, Masato TAKEI
    2016Volume 22Issue 1 Pages 17-29
    Published: January 25, 2016
    Released on J-STAGE: November 17, 2016
    Advance online publication: March 25, 2016
    JOURNAL FREE ACCESS
    We attempt to analyze a one-dimensional space-inhomogeneous quantum walk (QW) with one defect at the origin, which has two different quantum coins in positive and negative parts. We call the QW ``the two-phase QW with one defect'', which we treated concerning localization theorems. The two-phase QW with one defect has been expected to be a mathematical model of topological insulator which is an intense issue both theoretically and experimentally. In this paper, we derive the weak limit theorem describing the ballistic spreading, and as a result, we obtain the mathematical expression of the whole picture of the asymptotic behavior. Our approach is based mainly on the generating function of the weight of the passages. We emphasize that the time-averaged limit measure is symmetric for the origin, however, the weak limit measure is asymmetric, which implies that the weak limit theorem represents the asymmetry of the probability distribution.
    Download PDF (697K)
  • Shingo HASEGAWA, Shuji ISOBE, Jun-ya IWAZAKI, Eisuke KOIZUMI, Hiroki S ...
    2016Volume 22Issue 1 Pages 31-55
    Published: January 09, 2016
    Released on J-STAGE: November 17, 2016
    Advance online publication: February 09, 2016
    JOURNAL FREE ACCESS
    The password-protected secret sharing (PPSS, for short) and its security notion, called in this paper the PPSS-security, were proposed by Bagherzandi, Jarecki, Saxena and Lu. However, another security notion for PPSS schemes, the pparam-security was proposed by Hasegawa, Isobe, Iwazaki, Koizumi and Shizuya, because they pointed out an attack which can break the original protocol proposed by Bagherzandi et al. Hasegawa et al. also showed how to enhance the protocol, and proved that the enhanced one is pparam-secure. In this paper, we prove that the enhanced one is PPSS-secure as well.
    Download PDF (302K)
  • Tsuyoshi SUGAWARA
    2016Volume 22Issue 1 Pages 57-79
    Published: January 10, 2016
    Released on J-STAGE: November 17, 2016
    Advance online publication: March 10, 2016
    JOURNAL FREE ACCESS
    This paper focuses on the Accusative with to-infinitive Constructions in English that denote causative meaning, exemplified by She persuaded me to go to the hospital. Based on the five diagnostics, the syntactic structures of such constructions are clarified, and on the basis of two semantic perspectives, the semantic structures of the causative verbs occurring therein are defined. Finally, the issue of how the syntactic structures are derived from the semantic structures is addressed by way of the Lexical Conceptual Structures and the Qualia Structures of four types of causative to-infinitive verbs.
    Download PDF (6552K)
  • Masaaki HARADA, Akihiro MUNEMASA
    2016Volume 22Issue 1 Pages 81-85
    Published: January 28, 2016
    Released on J-STAGE: November 17, 2016
    Advance online publication: October 28, 2015
    JOURNAL FREE ACCESS
    In this short note, we report the classification of self-dual \mathbb{Z}k-codes of length n for k ≤ 24 and n ≤ 9.
    Download PDF (80K)
  • Vahideh RESHADAT, Maryam HOORALI, Heshaam FAILI
    2016Volume 22Issue 1 Pages 87-100
    Published: 2016
    Released on J-STAGE: November 17, 2016
    JOURNAL FREE ACCESS
    Open Information Extraction is a relation-independent extraction paradigm that extracts assertions from massive and heterogeneous corpora such as the Web. Light relation extractors focus on efficiency by restricting analysis to some shallow linguistic tools such as part-of-speech tagging. Although these methods are fast and scalable, they are unable to deal with complex sentences (such as complicated and long distance relations) due to using only shallow syntactic features. This paper presents two novel hybrid methods, TextRunner-DepOE (TR-DOE) and ReVerb-DepOE (RV-DOE) which combine high-performance subset of shallow Open IE systems with the strengths of a deep Open IE system. We detect the best trade-off between precision and recall by tuning two combination parameters: sentence length and confidence measure. Since the focus is on using time efficiently, we used a fast and robust deep extractor. Experiments indicate that the proposed hybrid methods obtain significantly higher performance than their constituent systems. The best result was for TR-DOE which had an F-measure almost twice that of TextRunner.
    Download PDF (989K)
  • Minwon NA
    2016Volume 22Issue 1 Pages 101-109
    Published: January 08, 2016
    Released on J-STAGE: November 17, 2016
    Advance online publication: April 08, 2016
    JOURNAL FREE ACCESS
    We take an elementary approach to derive a generalization of Knuth's formula using Lassalle's explicit formula. In particular, we give a formula for the Kostka numbers of a shape μ├ n and weight (m,1n-m) for m=3,4.
    Download PDF (98K)
  • P C LAI
    2016Volume 22Issue 1 Pages 111-122
    Published: 2016
    Released on J-STAGE: November 17, 2016
    JOURNAL FREE ACCESS
    This paper summarizes an explorative study of the novel design and security that contribute to consumers' adoption of an integrated, single platform payment system encompassing card, Internet and mobile technologies in the ASEAN. The attempt to survey these areas in an integrated fashion is a novel approach that differs from existing studies that mainly focus on adoption factors of these technologies in isolation as well as focuses on the novel design and the security elements. The empirical results from the quantitative analysis suggest that design, security, perceived usefulness as well as perceived ease of use are significant factors that contribute to consumers' intention to utilize a single platform payment System. Organizations will be able to utilize the study information for developing products and services that meet the consumers' single platform E-payment system while also fulfil their objective of corporate social responsibility.
    Download PDF (455K)
  • Takahiro SOSHI, Hiroko HAGIWARA
    2016Volume 22Issue 1 Pages 123-141
    Published: 2016
    Released on J-STAGE: November 17, 2016
    JOURNAL FREE ACCESS
    Natural language demonstrates discontinuous relationships between related words. Neurophysiology has reported that two types of brain electrical activities are related to discontinuous dependency. Sustained anterior negative potentials (SAN) are considered to be short-term memory storage for dislocated words. A late positivity (P600) appears concurrently with SAN decay, and is interpreted as the integration cost of a discontinuous word with a related word. Discontinuous verbal processing through SAN and P600 is considered to be unfavorable because of redundant neural resource consumption. However, SAN and P600 may reflect a global prediction-based strategy, which rather actively consumes memory resources to comprehend an overall meaning. We thus prepared four types of sentences (noun 1/adverb/noun 2/verb), which were modulated by grammatical information (case marker) and word order factors, and recorded brain potentials from Japanese participants performing a sentence comprehension task. Consistently with our prediction, P600 appeared and SAN disappeared upon the presentation of second nouns, but only in the canonical order including first subject words without a case marker. Hence, discontinuous verbal processing and its neural correlates should be re-considered in the context of interactions between local memory costs and global prediction strategies.
    Download PDF (2046K)
Short Communication
feedback
Top