The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

2441-2460hit(42807hit)

  • HAIF: A Hierarchical Attention-Based Model of Filtering Invalid Webpage

    Chaoran ZHOU  Jianping ZHAO  Tai MA  Xin ZHOU  

     
    PAPER

      Pubricized:
    2021/02/25
      Vol:
    E104-D No:5
      Page(s):
    659-668

    In Internet applications, when users search for information, the search engines invariably return some invalid webpages that do not contain valid information. These invalid webpages interfere with the users' access to useful information, affect the efficiency of users' information query and occupy Internet resources. Accurate and fast filtering of invalid webpages can purify the Internet environment and provide convenience for netizens. This paper proposes an invalid webpage filtering model (HAIF) based on deep learning and hierarchical attention mechanism. HAIF improves the semantic and sequence information representation of webpage text by concatenating lexical-level embeddings and paragraph-level embeddings. HAIF introduces hierarchical attention mechanism to optimize the extraction of text sequence features and webpage tag features. Among them, the local-level attention layer optimizes the local information in the plain text. By concatenating the input embeddings and the feature matrix after local-level attention calculation, it enriches the representation of information. The tag-level attention layer introduces webpage structural feature information on the attention calculation of different HTML tags, so that HAIF is better applicable to the Internet resource field. In order to evaluate the effectiveness of HAIF in filtering invalid pages, we conducted various experiments. Experimental results demonstrate that, compared with other baseline models, HAIF has improved to various degrees on various evaluation criteria.

  • An Approach for Identifying Malicious Domain Names Generated by Dictionary-Based DGA Bots

    Akihiro SATOH  Yutaka NAKAMURA  Yutaka FUKUDA  Daiki NOBAYASHI  Takeshi IKENAGA  

     
    LETTER

      Pubricized:
    2021/02/17
      Vol:
    E104-D No:5
      Page(s):
    669-672

    Computer networks are facing serious threats from the emergence of sophisticated new DGA bots. These DGA bots have their own dictionary, from which they concatenate words to dynamically generate domain names that are difficult to distinguish from human-generated domain names. In this letter, we propose an approach for identifying the callback communications of DGA bots based on relations among the words that constitute the character string of each domain name. Our evaluation indicates high performance, with a recall of 0.9977 and a precision of 0.9869.

  • A New Structure of 2-State Number-Conserving Cellular Automata

    Gil-Tak KONG  Katsunobu IMAI  Toru NAKANISHI  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2021/02/02
      Vol:
    E104-D No:5
      Page(s):
    673-678

    Two-state number-conserving cellular automaton (NCCA) is a cellular automaton of which cell states are 0 or 1, and the total sum of all the states of cells is kept for any time step. It is a kind of particle-based modeling of physical systems. We introduce a new structure of its value-1 patterns, which we call a “bundle pair” and a “bundle quad”. By employing this structure, we show a relation between the neighborhood size n and n - 2 NCCAs.

  • L1 Norm Minimal Mode-Based Methods for Listing Reaction Network Designs for Metabolite Production

    Takeyuki TAMURA  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2021/02/04
      Vol:
    E104-D No:5
      Page(s):
    679-687

    Metabolic networks represent the relationship between chemical reactions and compounds in cells. In useful metabolite production using microorganisms, it is often required to calculate reaction deletion strategies from the original network to result in growth coupling, which means the target metabolite production and cell growth are simultaneously achieved. Although simple elementary flux mode (EFM)-based methods are useful for listing such reaction deletions strategies, the number of cases to be considered is often proportional to the exponential function of the size of the network. Therefore, it is desirable to develop methods of narrowing down the number of reaction deletion strategy candidates. In this study, the author introduces the idea of L1 norm minimal modes to consider metabolic flows whose L1 norms are minimal to satisfy certain criteria on growth and production, and developed a fast metabolic design listing algorithm based on it (minL1-FMDL), which works in polynomial time. Computational experiments were conducted for (1) a relatively small network to compare the performance of minL1-FMDL with that of the simple EFM-based method and (2) a genome-scale network to verify the scalability of minL1-FMDL. In the computational experiments, it was seen that the average value of the target metabolite production rates of minL1-FMDL was higher than that of the simple EFM-based method, and the computation time of minL1-FMDL was fast enough even for genome-scale networks. The developed software, minL1-FMDL, implemented in MATLAB, is available on https://sunflower.kuicr.kyoto-u.ac.jp/~tamura/software, and can be used for genome-scale metabolic network design for metabolite production.

  • Acquisition of the Width of a Virtual Body through Collision Avoidance Trials

    Yoshiaki SAITO  Kazumasa KAWASHIMA  Masahito HIRAKAWA  

     
    PAPER-Human-computer Interaction

      Pubricized:
    2021/02/02
      Vol:
    E104-D No:5
      Page(s):
    741-751

    The progress of immersive technology enables researchers and developers to construct work spaces that are freed from real-world constraints. This has motivated us to investigate the role of the human body. In this research, we examine human cognitive behaviors in obtaining an understanding of the width of their virtual body through simple yet meaningful experiments using virtual reality (VR). In the experiments, participants were modeled as an invisible board, and a spherical object was thrown at the participants to provide information for exploring the width of their invisible body. Audio and visual feedback were provided when the object came into contact with the board (body). We first explored how precisely the participants perceived the virtual body width. Next, we examined how the body perception was generated and changed as the trial proceeded when the participants tried to move right or left actively for the avoidance of collision with approaching objects. The results of the experiments indicated that the participants could become successful in avoiding collision within a limited number of trials (14 at most) under the experimental conditions. It was also found that they postponed deciding how much they should move at the beginning and then started taking evasive action earlier as they become aware of the virtual body.

  • Curiosity Guided Fine-Tuning for Encoder-Decoder-Based Visual Forecasting

    Yuta KAMIKAWA  Atsushi HASHIMOTO  Motoharu SONOGASHIRA  Masaaki IIYAMA  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2021/02/02
      Vol:
    E104-D No:5
      Page(s):
    752-761

    An encoder-decoder (Enc-Dec) model is one of the fundamental architectures in many computer vision applications. One desired property of a trained Enc-Dec model is to feasibly encode (and decode) diverse input patterns. Aiming to obtain such a model, in this paper, we propose a simple method called curiosity-guided fine-tuning (CurioFT), which puts more weight on uncommon input patterns without explicitly knowing their frequency. In an experiment, we evaluated CurioFT in a task of future frame generation with the CUHK Avenue dataset and found that it reduced the mean square error by 7.4% for anomalous scenes, 4.8% for common scenes, and 6.6% in total. Some other experiments with the UCSD dataset further supported the reasonability of the proposed method.

  • Non-Invasive Monitoring of Respiratory Rate and Respiratory Status during Sleep Using a Passive Radio-Frequency Identification System

    Kagome NAYA  Toshiaki MIYAZAKI  Peng LI  

     
    PAPER-Biological Engineering

      Pubricized:
    2021/02/22
      Vol:
    E104-D No:5
      Page(s):
    762-771

    In recent years, checking sleep quality has become essential from a healthcare perspective. In this paper, we propose a respiratory rate (RR) monitoring system that can be used in the bedroom without wearing any sensor devices directly. To develop the system, passive radio-frequency identification (RFID) tags are introduced and attached to a blanket, instead of attaching them to the human body. The received signal strength indicator (RSSI) and phase values of the passive RFID tags are continuously obtained using an RFID reader through antennas located at the bedside. The RSSI and phase values change depending on the respiration of the person wearing the blanket. Thus, we can estimate the RR using these values. After providing an overview of the proposed system, the RR estimation flow is explained in detail. The processing flow includes noise elimination and irregular breathing period estimation methods. The evaluation demonstrates that the proposed system can estimate the RR and respiratory status without considering the user's body posture, body type, gender, or change in the RR.

  • A Fast Chroma Intra-Prediction Mode Decision Algorithm Based on Texture Characteristics for VVC

    Zhi LIU  Yifan SU  Shuzhong YANG  Mengmeng ZHANG  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2021/02/05
      Vol:
    E104-D No:5
      Page(s):
    781-784

    Cross-component linear model (CCLM) chromaticity prediction is a new technique introduced in Versatile Video Coding (VVC), which utilizes the reconstructed luminance component to predict the chromaticity parts, and can improve the coding performance. However, it increases the coding complexity. In this paper, how to accelerate the chroma intra-prediction process is studied based on texture characteristics. Firstly, two observations have been found through experimental statistics for the process. One is that the choice of the chroma intra-prediction candidate modes is closely related to the texture complexity of the coding unit (CU), and the other is that whether the direct mode (DM) is selected is closely related to the texture similarity between current chromaticity CU and the corresponding luminance CU. Secondly, a fast chroma intra-prediction mode decision algorithm is proposed based on these observations. A modified metric named sum modulus difference (SMD) is introduced to measure the texture complexity of CU and guide the filtering of the irrelevant candidate modes. Meanwhile, the structural similarity index measurement (SSIM) is adopted to help judging the selection of the DM mode. The experimental results show that compared with the reference model VTM8.0, the proposed algorithm can reduce the coding time by 12.92% on average, and increases the BD-rate of Y, U, and V components by only 0.05%, 0.32%, and 0.29% respectively.

  • Simultaneous Attack on CNN-Based Monocular Depth Estimation and Optical Flow Estimation

    Koichiro YAMANAKA  Keita TAKAHASHI  Toshiaki FUJII  Ryuraroh MATSUMOTO  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2021/02/08
      Vol:
    E104-D No:5
      Page(s):
    785-788

    Thanks to the excellent learning capability of deep convolutional neural networks (CNNs), CNN-based methods have achieved great success in computer vision and image recognition tasks. However, it has turned out that these methods often have inherent vulnerabilities, which makes us cautious of the potential risks of using them for real-world applications such as autonomous driving. To reveal such vulnerabilities, we propose a method of simultaneously attacking monocular depth estimation and optical flow estimation, both of which are common artificial-intelligence-based tasks that are intensively investigated for autonomous driving scenarios. Our method can generate an adversarial patch that can fool CNN-based monocular depth estimation and optical flow estimation methods simultaneously by simply placing the patch in the input images. To the best of our knowledge, this is the first work to achieve simultaneous patch attacks on two or more CNNs developed for different tasks.

  • DORR: A DOR-Based Non-Blocking Optical Router for 3D Photonic Network-on-Chips

    Meaad FADHEL  Huaxi GU  Wenting WEI  

     
    PAPER-Computer System

      Pubricized:
    2021/01/27
      Vol:
    E104-D No:5
      Page(s):
    688-696

    Recently, researchers paid more attention on designing optical routers, since they are essential building blocks of all photonic interconnection architectures. Thus, improving them could lead to a spontaneous improvement in the overall performance of the network. Optical routers suffer from the dilemma of increased insertion loss and crosstalk, which upraises the power consumed as the network scales. In this paper, we propose a new 7×7 non-blocking optical router based on the Dimension Order Routing (DOR) algorithm. Moreover, we develop a method that can ensure the least number of MicroRing Resonators (MRRs) in an optical router. Therefore, by reducing these optical devices, the optical router proposed can decrease the crosstalk and insertion loss of the network. This optical router is evaluated and compared to Ye's router and the optimized crossbar for 3D Mesh network that uses XYZ routing algorithm. Unlike many other proposed routers, this paper evaluates optical routers not only from router level prospective yet also consider the overall network level condition. The appraisals show that our optical router can reduce the worst-case network insertion loss by almost 8.7%, 46.39%, 39.3%, and 41.4% compared to Ye's router, optimized crossbar, optimized universal OR, and Optimized VOTEX, respectively. Moreover, it decreases the Optical Signal-to-Noise Ratio (OSNR) worst-case by almost 27.92%, 88%, 77%, and 69.6% compared to Ye's router, optimized crossbar, optimized universal OR, and Optimized VOTEX, respectively. It also reduces the power consumption by 3.22%, 23.99%, 19.12%, and 20.18% compared to Ye's router, optimized crossbar, optimized universal OR, and Optimized VOTEX, respectively.

  • Quinary Offset Carrier Modulations for Global Navigation Satellite System

    Wei LIU  Yuan HU  Tsung-Hsuan HSIEH  Jiansen ZHAO  Shengzheng WANG  

     
    PAPER-Navigation, Guidance and Control Systems

      Pubricized:
    2020/11/20
      Vol:
    E104-B No:5
      Page(s):
    563-569

    In order to improve tracking, interference and multipath mitigation performance from that possible with existing signals, a new Global Navigation Satellite System (GNSS) signal is needed that can offer additional degrees of freedom for shaping its pulse waveform and spectrum. In this paper, a new modulation scheme called Quinary Offset Carrier modulation (QOC) is proposed as a new GNSS signal design. The pulse waveforms of QOC modulation are divided into two types: convex and concave waveforms. QOC modulations can be easily constructed by selecting different modulation parameters. The spectra and autocorrelation characteristics of QOC modulations are investigated and discussed. Simulations and analyses show that QOC modulation can achieve similar performance to traditional BOC modulation in terms of code tracking, anti-multipath, and compatibility. QOC modulation can provide a new option for satellite navigation signal design.

  • MTGAN: Extending Test Case set for Deep Learning Image Classifier

    Erhu LIU  Song HUANG  Cheng ZONG  Changyou ZHENG  Yongming YAO  Jing ZHU  Shiqi TANG  Yanqiu WANG  

     
    PAPER-Software Engineering

      Pubricized:
    2021/02/05
      Vol:
    E104-D No:5
      Page(s):
    709-722

    During the recent several years, deep learning has achieved excellent results in image recognition, voice processing, and other research areas, which has set off a new upsurge of research and application. Internal defects and external malicious attacks may threaten the safe and reliable operation of a deep learning system and even cause unbearable consequences. The technology of testing deep learning systems is still in its infancy. Traditional software testing technology is not applicable to test deep learning systems. In addition, the characteristics of deep learning such as complex application scenarios, the high dimensionality of input data, and poor interpretability of operation logic bring new challenges to the testing work. This paper focuses on the problem of test case generation and points out that adversarial examples can be used as test cases. Then the paper proposes MTGAN which is a framework to generate test cases for deep learning image classifiers based on Generative Adversarial Network. Finally, this paper evaluates the effectiveness of MTGAN.

  • Study on Scalability in Scientific Research Data Transfer Networks: Energy Consumption Perspectives

    Chankyun LEE  

     
    PAPER-Network Management/Operation

      Pubricized:
    2020/10/23
      Vol:
    E104-B No:5
      Page(s):
    519-529

    Scalable networking for scientific research data transfer is a vital factor in the progress of data-intensive research, such as collaborative research on observation of black hole. In this paper, investigations of the nature of practical research traffic allow us to introduce optical flow switching (OFS) and contents delivery network (CDN) technologies into a wide area network (WAN) to realize highly scalable networking. To measure the scalability of networks, energy consumption in the WAN is evaluated by considering the practical networking equipment as well as reasonable assumptions on scientific research data transfer networks. In this study, we explore the energy consumption performance of diverse Japan and US topologies and reveal that the energy consumption of a routing and wavelength assignment algorithm in an OFS scheduler becomes the major hurdle when the number of nodes is high, for example, as high as that of the United States of America layer 1 topology. To provide computational scalability of a network dimensioning algorithm for the CDN based WAN, a simple heuristic algorithm for a surrogate location problem is proposed and compared with an optimal algorithm. This paper provides intuitions and design rules for highly scalable research data transfer networks, and thus, it can accelerate technology advancements against the encountering big-science problems.

  • Upper Bounds and Constructions of Locating Arrays

    Ce SHI  Jianfeng FU  Chengmin WANG  Jie YAN  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Pubricized:
    2020/11/13
      Vol:
    E104-A No:5
      Page(s):
    827-833

    The use of locating arrays is motivated by the use of generating software test suites to locate interaction faults in component-based systems. In this paper, we introduce a new combinatorial configuration, with which a general combinatorial description of $(ar{1},t)$-locating arrays is presented. Based on this characterization, a number of locating arrays by means of SSOA and difference covering arrays with prescribed properties are constructed effectively. As a consequence, upper bounds on the size of locating arrays with small number of factors are then obtained.

  • Multi-Cell Interference Mitigation for MIMO Non-Orthogonal Multiple Access Systems

    Changyong SHIN  Jiho HAN  

     
    LETTER-Communication Theory and Signals

      Pubricized:
    2020/11/16
      Vol:
    E104-A No:5
      Page(s):
    838-843

    This letter proposes a downlink multiple-input multiple-output (MIMO) non-orthogonal multiple access technique that mitigates multi-cell interference (MCI) at cell-edge users, regardless of the number of interfering cells, thereby improving the spectral efficiency. This technique employs specific receive beamforming vectors at the cell-edge users in clusters to minimize the MCI. Based on the receive beamforming vectors adopted by the cell-edge users, the transmit beamforming vectors for a base station (BS) and the receive beamforming vectors for cell-center users are designed to eliminate the inter-cluster interference and maximize the spectral efficiency. As each user can directly obtain its own receive beamforming vector, this technique does not require channel feedback from the users to a BS to design the receive beamforming vectors, thereby reducing the system overhead. We also derive the upper bound of the average sum rate achievable using the proposed technique. Finally, we demonstrate through simulations that the proposed technique achieves a better sum rate performance than the existing schemes and that the derived upper bound is valid.

  • Phase Stabilization by Open Stubs for Via-Less Waveguide to Microstrip Line Transition

    Takashi MARUYAMA  Shigeo UDAGAWA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2020/11/05
      Vol:
    E104-B No:5
      Page(s):
    530-538

    We have proposed a waveguide to microstrip line transition, which perpendicularly connects one waveguide into two microstrip lines. It consists of only a waveguide and a dielectric substrate with copper foils. A backshort waveguide for typical transitions is not needed. Additionally, the transition does not require via holes on the substrate. These innovations simplify the structure and the manufacturing process. We assume that our transition and antennas are co-located on the substrate. We reduced the undesirable radiation from the transition so as not to contaminate the desirable radiation pattern. In this paper, we address output phase of our transition. Since the transition has two MSL output ports connecting to different radiation elements, the phase error between two dividing signals leads to beam shift in the radiation pattern. Unfortunately, misalignment of etching pattern between copper layers of the substrate is unavoidable. The structural asymmetry causes the phase error. In order to tolerate the misalignment, we propose to add a pair of open stubs to the transition. We show that the structure drastically stabilizes the output phase. Though the stubs create some extra radiation, we confirm that the impact is not significant. Moreover, we fabricate and measure a prototype antenna that uses the transition. In the case of with stubs, the radiation pattern is unchanged even if the misalignment is severe.

  • Privacy-Preserving System for Enriched-Integrated Service

    Kaisei KAJITA  Go OHTAKE  Kazuto OGAWA  

     
    PAPER

      Pubricized:
    2021/02/24
      Vol:
    E104-D No:5
      Page(s):
    647-658

    In this study, we propose a secure data-providing system by using a verifiable attribute-based keyword search (VABKS), which also has the functions of privacy preservation and feedback to providers with IP anonymous server. We give both theoretic and experimental result, which show that our proposed system is a secure system with real-time property. One potential application of the system is to Integrated Broadcast-Broadband (IBB) services, which acquire information related to broadcast programs via broadband networks. One such service is a recommendation service that delivers recommendations matching user preferences (such as to TV programs) determined from the user's viewing history. We have developed a real-time system outsourcing data to the cloud and performing keyword searches on it by dividing the search process into two stages and performing heavy processing on the cloud side.

  • Exact Range of the Parameter of an n-Variate FGM Copula under Homogeneous Dependence Structure Open Access

    Shuhei OTA  Mitsuhiro KIMURA  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Pubricized:
    2020/10/27
      Vol:
    E104-A No:5
      Page(s):
    823-826

    An n-variate Farlie-Gumbel-Morgenstern (FGM) copula consists of 2n - n - 1 parameters that express multivariate dependence among random variables. Motivated by the dependence structure of the n-variate FGM copula, we derive the exact range of the n-variate FGM copula's parameter. The exact range of the parameter is given by a closed-form expression under the condition that all parameters take the same value. Moreover, under the same condition, we reveal that the n-variate FGM copula becomes the independence copula for n → ∞. This result contributes to the dependence modeling such as reliability analysis considering dependent failure occurrence.

  • Autonomous Relay Device Placement Algorithm for Avoiding Cascading Failure in D2D-Based Social Networking Service

    Hanami YOKOI  Takuji TACHIBANA  

     
    PAPER

      Pubricized:
    2021/02/17
      Vol:
    E104-D No:5
      Page(s):
    597-605

    In this paper, in order to avoid the cascading failure by increasing the number of links in the physical network in D2D-based SNS, we propose an autonomous device placement algorithm. In this method, some relay devices are placed so as to increase the number of links in the physical network. Here, relay devices can be used only for relaying data and those are not SNS users. For example, unmanned aerial vehicles (UAV) with D2D communication capability and base stations with D2D communication capability are used as the relay devices. In the proposed method, at first, an optimization problem for minimizing node resilience which is a performance metric in order to place relay devices. Then, we investigate how relay devices should be placed based on some approximate optimal solutions. From this investigation, we propose an autonomous relay device placement in the physical network. In our proposed algorithm, relay devices can be placed without the complete information on network topology. We evaluate the performance of the proposed method with simulation, and investigate the effectiveness of the proposed method. From numerical examples, we show the effectiveness of our proposed algorithm.

  • FOREWORD Open Access

    Kazuo GODA  

     
    FOREWORD

      Vol:
    E104-D No:5
      Page(s):
    526-527
2441-2460hit(42807hit)