The search functionality is under construction.

Author Search Result

[Author] Lina(44hit)

1-20hit(44hit)

  • Towards mmWave V2X in 5G and Beyond to Support Automated Driving Open Access

    Kei SAKAGUCHI  Ryuichi FUKATSU  Tao YU  Eisuke FUKUDA  Kim MAHLER  Robert HEATH  Takeo FUJII  Kazuaki TAKAHASHI  Alexey KHORYAEV  Satoshi NAGATA  Takayuki SHIMIZU  

     
    INVITED SURVEY PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2020/11/26
      Vol:
    E104-B No:6
      Page(s):
    587-603

    Millimeter wave provides high data rates for Vehicle-to-Everything (V2X) communications. This paper motivates millimeter wave to support automated driving and begins by explaining V2X use cases that support automated driving with references to several standardization bodies. The paper gives a classification of existing V2X standards: IEEE802.11p and LTE V2X, along with the status of their commercial deployment. Then, the paper provides a detailed assessment on how millimeter wave V2X enables the use case of cooperative perception. The explanations provide detailed rate calculations for this use case and show that millimeter wave is the only technology able to achieve the requirements. Furthermore, specific challenges related to millimeter wave for V2X are described, including coverage enhancement and beam alignment. The paper concludes with some results from three studies, i.e. IEEE802.11ad (WiGig) based V2X, extension of 5G NR (New Radio) toward mmWave V2X, and prototypes of intelligent street with mmWave V2X.

  • Achieving High Data Utility K-Anonymization Using Similarity-Based Clustering Model

    Mohammad Rasool SARRAFI AGHDAM  Noboru SONEHARA  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2069-2078

    In data sharing privacy has become one of the main concerns particularly when sharing datasets involving individuals contain private sensitive information. A model that is widely used to protect the privacy of individuals in publishing micro-data is k-anonymity. It reduces the linking confidence between private sensitive information and specific individual by generalizing the identifier attributes of each individual into at least k-1 others in dataset. K-anonymity can also be defined as clustering with constrain of minimum k tuples in each group. However, the accuracy of the data in k-anonymous dataset decreases due to huge information loss through generalization and suppression. Also most of the current approaches are designed for numerical continuous attributes and for categorical attributes they do not perform efficiently and depend on attributes hierarchical taxonomies, which often do not exist. In this paper we propose a new model for k-anonymization, which is called Similarity-Based Clustering (SBC). It is based on clustering and it measures similarity and calculates distances between tuples containing numerical and categorical attributes without hierarchical taxonomies. Based on this model a bottom up greedy algorithm is proposed. Our extensive study on two real datasets shows that the proposed algorithm in comparison with existing well-known algorithms offers much higher data utility and reduces the information loss significantly. Data utility is maintained above 80% in a wide range of k values.

  • Integration of ATM and Satellite Networks: Traffic Management Issues

    Antonio IERA  Antonella MOLINARO  Salvatore MARANO  Domenico MIGNOLO  

     
    PAPER-Wireless ATM

      Vol:
    E83-B No:2
      Page(s):
    321-329

    The design of effective traffic and resource management policies is a key issue in the deployment of ATM-satellite systems. This paper proposes a technique of call admission control and dynamic resource management to support ATM traffic classes in satellite environments. The effectiveness of the strategy is assessed by referring to the EuroSkyWay multimedia satellite platform, based on Ka-band payload and on-board processing. The main advantage is the effective exploitation of the satellite bandwidth by means of the statistical multiplexing of traffic sources and the guarantee of QoS provisioning to both real-time and non real-time, constant and variable bit rate sources.

  • Construction of Appearance Manifold with Embedded View-Dependent Covariance Matrix for 3D Object Recognition

    Lina  Tomokazu TAKAHASHI  Ichiro IDE  Hiroshi MURASE  

     
    PAPER-Pattern Recognition

      Vol:
    E91-D No:4
      Page(s):
    1091-1100

    We propose the construction of an appearance manifold with embedded view-dependent covariance matrix to recognize 3D objects which are influenced by geometric distortions and quality degradation effects. The appearance manifold is used to capture the pose variability, while the covariance matrix is used to learn the distribution of samples for gaining noise-invariance. However, since the appearance of an object in the captured image is different for every different pose, the covariance matrix value is also different for every pose position. Therefore, it is important to embed view-dependent covariance matrices in the manifold of an object. We propose two models of constructing an appearance manifold with view-dependent covariance matrix, called the View-dependent Covariance matrix by training-Point Interpolation (VCPI) and View-dependent Covariance matrix by Eigenvector Interpolation (VCEI) methods. Here, the embedded view-dependent covariance matrix of the VCPI method is obtained by interpolating every training-points from one pose to other training-points in a consecutive pose. Meanwhile, in the VCEI method, the embedded view-dependent covariance matrix is obtained by interpolating only the eigenvectors and eigenvalues without considering the correspondences of each training image. As it embeds the covariance matrix in manifold, our view-dependent covariance matrix methods are robust to any pose changes and are also noise invariant. Our main goal is to construct a robust and efficient manifold with embedded view-dependent covariance matrix for recognizing objects from images which are influenced with various degradation effects.

  • Estimation Algorithm from Delayed Measurements with Correlation between Signal and Noise Using Covariance Information

    Seiichi NAKAMORI  Raquel CABALLERO-AGUILA  Aurora HERMOSO-CARAZO  Josefa LINARES-PEREZ  

     
    PAPER-Systems and Control

      Vol:
    E87-A No:5
      Page(s):
    1219-1225

    This paper considers the least-squares linear estimation problem of signals from randomly delayed observations when the additive white noise is correlated with the signal. The delay values are treated as unknown variables, modelled by a binary white noise with values zero or one; these values indicate that the measurements arrive in time or they are delayed by one sampling time. A recursive one-stage prediction and filtering algorithm is obtained by an innovation approach and do not use the state-space model of the signal. It is assumed that both, the autocovariance functions of the signal and the crosscovariance function between the signal and the observation noise are expressed in a semi-degenerate kernel form; using this information and the delay probabilities, the estimators are recursively obtained.

  • Enhancing Salt-and-Pepper Noise Removal in Binary Images of Engineering Drawing

    Hasan S. M. AL-KHAFFAF  Abdullah Z. TALIB  Rosalina Abdul SALAM  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E92-D No:4
      Page(s):
    689-704

    Noise removal in engineering drawing is an important operation performed before other image analysis tasks. Many algorithms have been developed to remove salt-and-pepper noise from document images. Cleaning algorithms should remove noise while keeping the real part of the image unchanged. Some algorithms have disadvantages in cleaning operation that leads to removing of weak features such as short thin lines. Others leave the image with hairy noise attached to image objects. In this article a noise removal procedure called TrackAndMayDel (TAMD) is developed to enhance the noise removal of salt-and-pepper noise in binary images of engineering drawings. The procedure could be integrated with third party algorithms' logic to enhance their ability to remove noise by investigating the structure of pixels that are part of weak features. It can be integrated with other algorithms as a post-processing step to remove noise remaining in the image such as hairy noise attached with graphical elements. An algorithm is proposed by incorporating TAMD in a third party algorithm. Real scanned images from GREC'03 contest are used in the experiment. The images are corrupted by salt-and-pepper noise at 10%, 15%, and 20% levels. An objective performance measure that correlates with human vision as well as MSE and PSNR are used in this experiment. Performance evaluation of the introduced algorithm shows better-quality images compared to other algorithms.

  • Image Restoration with Multiple Hard Constraints on Data-Fidelity to Blurred/Noisy Image Pair

    Saori TAKEYAMA  Shunsuke ONO  Itsuo KUMAZAWA  

     
    PAPER

      Pubricized:
    2017/06/14
      Vol:
    E100-D No:9
      Page(s):
    1953-1961

    Existing image deblurring methods with a blurred/noisy image pair take a two-step approach: blur kernel estimation and image restoration. They can achieve better and much more stable blur kernel estimation than single image deblurring methods. On the other hand, in the image restoration step, they do not exploit the information on the noisy image, or they require ad hoc tuning of interdependent parameters. This paper focuses on the image restoration step and proposes a new restoration method of using a blurred/noisy image pair. In our method, the image restoration problem is formulated as a constrained convex optimization problem, where data-fidelity to a blurred image and that to a noisy image is properly taken into account as multiple hard constraints. This offers (i) high quality restoration when the blurred image also contains noise; (ii) robustness to the estimation error of the blur kernel; and (iii) easy parameter setting. We also provide an efficient algorithm for solving our optimization problem based on the so-called alternating direction method of multipliers (ADMM). Experimental results support our claims.

  • A Novel Embedding Model for Relation Prediction in Recommendation Systems

    Yu ZHAO  Sheng GAO  Patrick GALLINARI  Jun GUO  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2017/03/14
      Vol:
    E100-D No:6
      Page(s):
    1242-1250

    It inevitably comes out information overload problem with the increasing available data on e-commence websites. Most existing approaches have been proposed to recommend the users personal significant and interesting items on e-commence websites, by estimating unknown rating which the user may rate the unrated item, i.e., rating prediction. However, the existing approaches are unable to perform user prediction and item prediction, since they just treat the ratings as real numbers and learn nothing about the ratings' embeddings in the training process. In this paper, motivated by relation prediction in multi-relational graph, we propose a novel embedding model, namely RPEM, to solve the problem including the tasks of rating prediction, user prediction and item prediction simultaneously for recommendation systems, by learning the latent semantic representation of the users, items and ratings. In addition, we apply the proposed model to cross-domain recommendation, which is able to realize recommendation generation in multiple domains. Empirical comparison on several real datasets validates the effectiveness of the proposed model. The data is available at https://github.com/yuzhaour/da.

  • Zero-Shot Embedding for Unseen Entities in Knowledge Graph

    Yu ZHAO  Sheng GAO  Patrick GALLINARI  Jun GUO  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2017/04/10
      Vol:
    E100-D No:7
      Page(s):
    1440-1447

    Knowledge graph (KG) embedding aims at learning the latent semantic representations for entities and relations. However, most existing approaches can only be applied to KG completion, so cannot identify relations including unseen entities (or Out-of-KG entities). In this paper, motivated by the zero-shot learning, we propose a novel model, namely JointE, jointly learning KG and entity descriptions embedding, to extend KG by adding new relations with Out-of-KG entities. The JointE model is evaluated on entity prediction for zero-shot embedding. Empirical comparisons on benchmark datasets show that the proposed JointE model outperforms state-of-the-art approaches. The source code of JointE is available at https://github.com/yzur/JointE.

  • Spectral Sensitivity of the NbN Single-Photon Superconducting Detector

    Roman SOBOLEWSKI  Ying XU  Xuemei ZHENG  Carlo WILLIAMS  Jin ZHANG  Aleksandr VEREVKIN  Galina CHULKOVA  Alexander KORNEEV  Andrey LIPATOV  Oleg OKUNEV  Konstantin SMIRNOV  Gregory N. GOL'TSMAN  

     
    INVITED PAPER-Novel Devices and Device Physics

      Vol:
    E85-C No:3
      Page(s):
    797-802

    We report our studies on the spectral sensitivity of superconducting NbN thin-film single-photon detectors (SPD's) capable of GHz counting rates of visible and near-infrared photons. In particular, it has been shown that a NbN SPD is sensitive to 1.55-µm wavelength radiation and can be used for quantum communication. Our SPD's exhibit experimentally measured intrinsic quantum efficiencies from 20% at 800 nm up to 1% at 1.55-µm wavelength. The devices demonstrate picosecond response time (<100 ps, limited by our readout system) and negligibly low dark counts. Spectral dependencies of photon counting of continuous-wave, 0.4-µm to 3.5-µm radiation, and 0.63-µm, 1.33-µm, and 1.55-µm laser-pulsed radiations are presented for the single-stripe-type and meander-type devices.

  • Empirical Performance Evaluation of Raster-to-Vector Conversion Methods: A Study on Multi-Level Interactions between Different Factors

    Hasan S.M. AL-KHAFFAF  Abdullah Z. TALIB  Rosalina ABDUL SALAM  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E94-D No:6
      Page(s):
    1278-1288

    Many factors, such as noise level in the original image and the noise-removal methods that clean the image prior to performing a vectorization, may play an important role in affecting the line detection of raster-to-vector conversion methods. In this paper, we propose an empirical performance evaluation methodology that is coupled with a robust statistical analysis method to study many factors that may affect the quality of line detection. Three factors are studied: noise level, noise-removal method, and the raster-to-vector conversion method. Eleven mechanical engineering drawings, three salt-and-pepper noise levels, six noise-removal methods, and three commercial vectorization methods were used in the experiment. The Vector Recovery Index (VRI) of the detected vectors was the criterion used for the quality of line detection. A repeated measure ANOVA analyzed the VRI scores. The statistical analysis shows that all the studied factors affected the quality of line detection. It also shows that two-way interactions between the studied factors affected line detection.

  • Hybrid Uniform Distribution of Particle Swarm Optimizer

    Junqi ZHANG  Ying TAN  Lina NI  Chen XIE  Zheng TANG  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E93-A No:10
      Page(s):
    1782-1791

    Particle swarm optimizer (PSO) is a stochastic global optimization technique based on a social interaction metaphor. Because of the complexity, dynamics and randomness involved in PSO, it is hard to theoretically analyze the mechanism on which PSO depends. Statistical results have shown that the probability distribution of PSO is a truncated triangle, with uniform probability across the middle that decreases on the sides. The "truncated triangle" is also called the "Maya pyramid" by Kennedy. However, very little is known regarding the sampling distribution of PSO in itself. In this paper, we theoretically analyze the "Maya pyramid" without any assumption and derive its computational formula, which is actually a hybrid uniform distribution that looks like a trapezoid and conforms with the statistical results. Based on the derived density function of the hybrid uniform distribution, the search strategy of PSO is defined and quantified to characterize the mechanism of the search strategy in PSO. In order to show the significance of these definitions based on the derived hybrid uniform distribution, the comparison between the defined search strategies of the classical linear decreasing weight based PSO and the canonical constricted PSO suggested by Clerc is illustrated and elaborated.

  • An Efficient Fault Syndromes Simulator for SRAM Memories

    Wan Zuha WAN HASAN  Izhal ABD HALIN  Roslina MOHD SIDEK  Masuri OTHMAN  

     
    PAPER

      Vol:
    E92-C No:5
      Page(s):
    639-646

    Testing and diagnosis techniques play a key role in the advance of semiconductor memory technology. The challenge of failure detection has created intensive investigation on efficient testing and diagnosis algorithm for better fault coverage and diagnostic resolution. At present, March test algorithm is used to detect and diagnose all faults related to Random Access Memories. However, the test and diagnosis process are mainly done manually. Due to this, a systematic approach for developing and evaluating memory test algorithm is required. This work is focused on incorporating the March based test algorithm using a software simulator tool for implementing a fast and systematic memory testing algorithm. The simulator allows a user through a GUI to select a March based test algorithm depending on the desired fault coverage and diagnostic resolution. Experimental results show that using the simulator for testing is more efficient than that of the traditional testing algorithm. This new simulator makes it possible for a detailed list of stuck-at faults, transition faults and coupling faults covered by each algorithm and its percentage to be displayed after a set of test algorithms has been chosen. The percentage of diagnostic resolution is also displayed. This proves that the simulator reduces the trade-off between test time, fault coverage and diagnostic resolution. Moreover, the chosen algorithm can be applied to incorporate with memory built-in self-test and diagnosis, to have a better fault coverage and diagnostic resolution. Universities and industry involved in memory Built-in-Self test, Built-in-Self repair and Built-in-Self diagnose will benefit by saving a few years on researching an efficient algorithm to be implemented in their designs.

  • Incremental Unsupervised-Learning of Appearance Manifold with View-Dependent Covariance Matrix for Face Recognition from Video Sequences

    Lina  Tomokazu TAKAHASHI  Ichiro IDE  Hiroshi MURASE  

     
    PAPER-Pattern Recognition

      Vol:
    E92-D No:4
      Page(s):
    642-652

    We propose an appearance manifold with view-dependent covariance matrix for face recognition from video sequences in two learning frameworks: the supervised-learning and the incremental unsupervised-learning. The advantages of this method are, first, the appearance manifold with view-dependent covariance matrix model is robust to pose changes and is also noise invariant, since the embedded covariance matrices are calculated based on their poses in order to learn the samples' distributions along the manifold. Moreover, the proposed incremental unsupervised-learning framework is more realistic for real-world face recognition applications. It is obvious that it is difficult to collect large amounts of face sequences under complete poses (from left sideview to right sideview) for training. Here, an incremental unsupervised-learning framework allows us to train the system with the available initial sequences, and later update the system's knowledge incrementally every time an unlabelled sequence is input. In addition, we also integrate the appearance manifold with view-dependent covariance matrix model with a pose estimation system for improving the classification accuracy and easily detecting sequences with overlapped poses for merging process in the incremental unsupervised-learning framework. The experimental results showed that, in both frameworks, the proposed appearance manifold with view-dependent covariance matrix method could recognize faces from video sequences accurately.

  • 2D Feature Space for Snow Particle Classification into Snowflake and Graupel

    Karolina NURZYNSKA  Mamoru KUBO  Ken-ichiro MURAMOTO  

     
    PAPER-Pattern Recognition

      Vol:
    E93-D No:12
      Page(s):
    3344-3351

    This study presents three image processing systems for snow particle classification into snowflake and graupel. All of them are based on feature classification, yet as a novelty in all cases multiple features are exploited. Additionally, each of them is characterized by a different data flow. In order to compare the performances, we not only consider various features, but also suggest different classifiers. The best achieved results are for the snowflake discrimination method applied before statistical classifier, as the correct classification ratio in this case reaches 94%. In other cases the best results are around 88%.

  • Fixed-Point, Fixed-Interval and Fixed-Lag Smoothing Algorithms from Uncertain Observations Based on Covariances

    Seiichi NAKAMORI  Raquel CABALLERO-AGUILA  Aurora HERMOSO-CARAZO  Josefa LINARES-PEREZ  

     
    PAPER-Digital Signal Processing

      Vol:
    E87-A No:12
      Page(s):
    3350-3359

    This paper treats the least-squares linear filtering and smoothing problems of discrete-time signals from uncertain observations when the random interruptions in the observation process are modelled by a sequence of independent Bernoulli random variables. Using an innovation approach we obtain the filtering algorithm and a general expression for the smoother which leads to fixed-point, fixed-interval and fixed-lag smoothing recursive algorithms. The proposed algorithms do not require the knowledge of the state-space model generating the signal, but only the covariance information of the signal and the observation noise, as well as the probability that the signal exists in the observed values.

  • LGCN: Learnable Gabor Convolution Network for Human Gender Recognition in the Wild Open Access

    Peng CHEN  Weijun LI  Linjun SUN  Xin NING  Lina YU  Liping ZHANG  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2019/06/13
      Vol:
    E102-D No:10
      Page(s):
    2067-2071

    Human gender recognition in the wild is a challenging task due to complex face variations, such as poses, lighting, occlusions, etc. In this letter, learnable Gabor convolutional network (LGCN), a new neural network computing framework for gender recognition was proposed. In LGCN, a learnable Gabor filter (LGF) is introduced and combined with the convolutional neural network (CNN). Specifically, the proposed framework is constructed by replacing some first layer convolutional kernels of a standard CNN with LGFs. Here, LGFs learn intrinsic parameters by using standard back propagation method, so that the values of those parameters are no longer fixed by experience as traditional methods, but can be modified by self-learning automatically. In addition, the performance of LGCN in gender recognition is further improved by applying a proposed feature combination strategy. The experimental results demonstrate that, compared to the standard CNNs with identical network architecture, our approach achieves better performance on three challenging public datasets without introducing any sacrifice in parameter size.

  • Determination of Base and Emitter Resistances in Bipolar Junction Transistors from Low Frequency Noise and Static Measurements

    Pierre LLINARES  Gerard GHIBAUDO  Yannick MOURIER  Nicolas GAMBETTA  Michel LAURENS  Jan A. CHROBOCZEK  

     
    PAPER

      Vol:
    E82-C No:4
      Page(s):
    607-611

    A novel method of extraction of emitter, Re, and base, Rb, resistances of bipolar junction transistors, BJTs, is proposed. Re and Rb are obtained from static characteristics and noise power spectral density of low frequency, 1/f, fluctuations, measured in the base and collector currents of the devices. Measurements carried out on quasi self-aligned silicon BJTs show that Re and Rb values obtained by the proposed method scale correctly with transistor dimensions and match the values estimated from the device layout.

  • Privacy Protection for Social Video via Background Estimation and CRF-Based Videographer's Intention Modeling

    Yuta NAKASHIMA  Noboru BABAGUCHI  Jianping FAN  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    1221-1233

    The recent popularization of social network services (SNSs), such as YouTube, Dailymotion, and Facebook, enables people to easily publish their personal videos taken with mobile cameras. However, at the same time, such popularity has raised a new problem: video privacy. In such social videos, the privacy of people, i.e., their appearances, must be protected, but naively obscuring all people might spoil the video content. To address this problem, we focus on videographers' capture intentions. In a social video, some persons are usually essential for the video content. They are intentionally captured by the videographers, called intentionally captured persons (ICPs), and the others are accidentally framed-in (non-ICPs). Videos containing the appearances of the non-ICPs might violate their privacy. In this paper, we developed a system called BEPS, which adopts a novel conditional random field (CRF)-based method for ICP detection, as well as a novel approach to obscure non-ICPs and preserve ICPs using background estimation. BEPS reduces the burden of manually obscuring the appearances of the non-ICPs before uploading the video to SNSs. Compared with conventional systems, the following are the main advantages of BEPS: (i) it maintains the video content, and (ii) it is immune to the failure of person detection; false positives in person detection do not violate privacy. Our experimental results successfully validated these two advantages.

  • Unsupervised Deep Domain Adaptation for Heterogeneous Defect Prediction

    Lina GONG  Shujuan JIANG  Qiao YU  Li JIANG  

     
    PAPER-Software Engineering

      Pubricized:
    2018/12/05
      Vol:
    E102-D No:3
      Page(s):
    537-549

    Heterogeneous defect prediction (HDP) is to detect the largest number of defective software modules in one project by using historical data collected from other projects with different metrics. However, these data can not be directly used because of different metrics set among projects. Meanwhile, software data have more non-defective instances than defective instances which may cause a significant bias towards defective instances. To completely solve these two restrictions, we propose unsupervised deep domain adaptation approach to build a HDP model. Specifically, we firstly map the data of source and target projects into a unified metric representation (UMR). Then, we design a simple neural network (SNN) model to deal with the heterogeneous and class-imbalanced problems in software defect prediction (SDP). In particular, our model introduces the Maximum Mean Discrepancy (MMD) as the distance between the source and target data to reduce the distribution mismatch, and use the cross-entropy loss function as the classification loss. Extensive experiments on 18 public projects from four datasets indicate that the proposed approach can build an effective prediction model for heterogeneous defect prediction (HDP) and outperforms the related competing approaches.

1-20hit(44hit)