The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

4081-4100hit(42807hit)

  • A Generalized Construction of Codebook Asymptotically Meeting the Welch Bound

    Gang WANG  Min-Yao NIU  Jian GAO  Fang-Wei FU  

     
    LETTER-Coding Theory

      Vol:
    E102-A No:5
      Page(s):
    732-737

    In this letter, as a generalization of Luo et al.'s constructions, a construction of codebook, which meets the Welch bound asymptotically, is proposed. The parameters of codebook presented in this paper are new in some cases.

  • AI@ntiPhish — Machine Learning Mechanisms for Cyber-Phishing Attack

    Yu-Hung CHEN  Jiann-Liang CHEN  

     
    INVITED PAPER

      Pubricized:
    2019/02/18
      Vol:
    E102-D No:5
      Page(s):
    878-887

    This study proposes a novel machine learning architecture and various learning algorithms to build-in anti-phishing services for avoiding cyber-phishing attack. For the rapid develop of information technology, hackers engage in cyber-phishing attack to steal important personal information, which draws information security concerns. The prevention of phishing website involves in various aspect, for example, user training, public awareness, fraudulent phishing, etc. However, recent phishing research has mainly focused on preventing fraudulent phishing and relied on manual identification that is inefficient for real-time detection systems. In this study, we used methods such as ANOVA, X2, and information gain to evaluate features. Then, we filtered out the unrelated features and obtained the top 28 most related features as the features to use for the training and evaluation of traditional machine learning algorithms, such as Support Vector Machine (SVM) with linear or rbf kernels, Logistic Regression (LR), Decision tree, and K-Nearest Neighbor (KNN). This research also evaluated the above algorithms with the ensemble learning concept by combining multiple classifiers, such as Adaboost, bagging, and voting. Finally, the eXtreme Gradient Boosting (XGBoost) model exhibited the best performance of 99.2%, among the algorithms considered in this study.

  • FOREWORD Open Access

    Tomoki YOSHIHISA  

     
    FOREWORD

      Vol:
    E102-D No:5
      Page(s):
    877-877
  • Generation Efficiency of Fiber Four-Wave Mixing for Phase-Shift Keying Signal Light

    Kyo INOUE  Koji IGARASHI  

     
    PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2018/11/13
      Vol:
    E102-B No:5
      Page(s):
    1005-1009

    The efficiency of generating four-wave mixing (FWM) from phase-modulated (PM) optical signal is studied. An analysis, that takes bit shifts occurring during fiber propagation due to group velocity differences into account, indicates that the FWM efficiency from PM signals is smaller than that from continuous waves in fiber transmission lines whose distance is longer than the walk-off length between transmitted optical signals.

  • Distributed Search for Exchangeable Service Chain Based on In-Network Guidance

    Yutaro ODA  Yosuke TANIGAWA  Hideki TODE  

     
    PAPER

      Pubricized:
    2019/02/19
      Vol:
    E102-D No:5
      Page(s):
    963-973

    Network function virtualization (NFV) flexibly provides servoces by virtualizing network functions on a general-purpose server, and attracted research interest in recent years. In NFV environment, providing service chaining, which dynamically connects each network function (virtual network function: VNF), is critical issue. However, as it is challenging to select the optimal sequence of VNF services in the service chain in a decentralized manner, the distances between the VNFs tend to increase, leading to longer communication and processing delays. Furthermore, it has never considered that certain VNFs that can be exchange the order of services with one another. To address this problem, in this paper, we propose a distributed search method for ordered VNFs to reduce delays while considering the load on control server, by exploiting an in-network guidance technology, called Breadcrrmubs, for query messages.

  • 24GHz FMCW Radar Module for Pedestrian Detection in Crosswalks

    You-Sun WON  Dongseung SHIN  Miryong PARK  Sohee JUNG  Jaeho LEE  Cheolhyo LEE  Yunjeong SONG  

     
    BRIEF PAPER-Microwaves, Millimeter-Waves

      Vol:
    E102-C No:5
      Page(s):
    416-419

    This paper reports a 24GHz ISM band radar module for pedestrian detection in crosswalks. The radar module is composed of an RF transceiver board, a baseband board, and a microcontroller unit board. The radar signal is a sawtooth frequency-modulated continuous-wave signal with a center frequency of 24.15GHz, a bandwidth of 200MHz, a chirp length of 80µs, and a pulse repetition interval of 320µs. The radar module can detect a pedestrian on a crosswalk with a width of 4m and a length of 14m. The radar outputs the range, angle, and speed of the detected pedestrians every 50ms by radar signal processing and consumes 7.57W from 12V power supply. The size of the radar module is 110×70mm2.

  • Memory Saving Feature Descriptor Using Scale and Rotation Invariant Patches around the Feature Ppoints Open Access

    Masamichi KITAGAWA  Ikuko SHIMIZU  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2019/02/05
      Vol:
    E102-D No:5
      Page(s):
    1106-1110

    To expand the use of systems using a camera on portable devices such as tablets and smartphones, we have developed and propose a memory saving feature descriptor, the use of which is one of the essential techniques in computer vision. The proposed descriptor compares pixel values of pre-fixed positions in the small patch around the feature point and stores binary values. Like the conventional descriptors, it extracts the patch on the basis of the scale and orientation of the feature point. For memories of the same size, it achieves higher accuracy than ORB and BRISK in all cases and AKAZE for the images with textured regions.

  • Density of Pooling Matrices vs. Sparsity of Signals for Group Testing Problems

    Jin-Taek SEONG  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2019/02/04
      Vol:
    E102-D No:5
      Page(s):
    1081-1084

    In this paper, we consider a group testing (GT) problem. We derive a lower bound on the probability of error for successful decoding of defected binary signals. To this end, we exploit Fano's inequality theorem in the information theory. We show that the probability of error is bounded as an entropy function, a density of a pooling matrix and a sparsity of a binary signal. We evaluate that for decoding of highly sparse signals, the pooling matrix is required to be dense. Conversely, if dense signals are needed to decode, the sparse pooling matrix should be designed to achieve the small probability of error.

  • RNA: An Accurate Residual Network Accelerator for Quantized and Reconstructed Deep Neural Networks

    Cheng LUO  Wei CAO  Lingli WANG  Philip H. W. LEONG  

     
    PAPER-Applications

      Pubricized:
    2019/02/19
      Vol:
    E102-D No:5
      Page(s):
    1037-1045

    With the continuous refinement of Deep Neural Networks (DNNs), a series of deep and complex networks such as Residual Networks (ResNets) show impressive prediction accuracy in image classification tasks. Unfortunately, the structural complexity and computational cost of residual networks make hardware implementation difficult. In this paper, we present the quantized and reconstructed deep neural network (QR-DNN) technique, which first inserts batch normalization (BN) layers in the network during training, and later removes them to facilitate efficient hardware implementation. Moreover, an accurate and efficient residual network accelerator (RNA) is presented based on QR-DNN with batch-normalization-free structures and weights represented in a logarithmic number system. RNA employs a systolic array architecture to perform shift-and-accumulate operations instead of multiplication operations. QR-DNN is shown to achieve a 1∼2% improvement in accuracy over existing techniques, and RNA over previous best fixed-point accelerators. An FPGA implementation on a Xilinx Zynq XC7Z045 device achieves 804.03 GOPS, 104.15 FPS and 91.41% top-5 accuracy for the ResNet-50 benchmark, and state-of-the-art results are also reported for AlexNet and VGG.

  • An Optimized Low-Power Optical Memory Access Network for Kilocore Systems

    Tao LIU  Huaxi GU  Yue WANG  Wei ZOU  

     
    LETTER-Computer System

      Pubricized:
    2019/02/04
      Vol:
    E102-D No:5
      Page(s):
    1085-1088

    An optimized low-power optical memory access network is proposed to alleviate the cost of microring resonators (MRs) in kilocore systems, such as the pass-by loss and integration difficulty. Compared with traditional electronic bus interconnect, the proposed network reduces power consumption and latency by 80% to 89% and 21% to 24%. Moreover, the new network decreases the number of MRs by 90.6% without an increase in power consumption and latency when making a comparison with Optical Ring Network-on-Chip (ORNoC).

  • The Combination Effect of Cache Decision and Off-Path Cache Routing in Content Oriented Networks

    Yusaku HAYAMIZU  Akihisa SHIBUYA  Miki YAMAMOTO  

     
    PAPER-Network

      Pubricized:
    2018/10/29
      Vol:
    E102-B No:5
      Page(s):
    1010-1018

    In content oriented networks (CON), routers in a network are generally equipped with local cache storages and store incoming contents temporarily. Efficient utilization of total cache storage in networks is one of the most important technical issues in CON, as it can reduce content server load, content download latency and network traffic. Performance of networked cache is reported to strongly depend on both cache decision and content request routing. In this paper, we evaluate several combinations of these two strategies. Especially for routing, we take up off-path cache routing, Breadcrumbs, as one of the content request routing proposals. Our performance evaluation results show that off-path cache routing, Breadcrumbs, suffers low performance with cache decisions which generally has high performance with shortest path routing (SPR), and obtains excellent performance with TERC (Transparent En-Route Cache) which is well-known to have low performance with widely used SPR. Our detailed evaluation results in two network environments, emerging CONs and conventional IP, show these insights hold in both of these two network environments.

  • Wideband Design of a Short-Slot 2-Plane Coupler by the Mode Matching/FEM Hybrid Analysis Considering the Structural Symmetry

    Masahiro WAKASA  Dong-Hun KIM  Takashi TOMURA  Jiro HIROKAWA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/10/23
      Vol:
    E102-B No:5
      Page(s):
    1019-1026

    This paper presents the mode matching (MM)/finite element method (FEM) hybrid analysis for a short-slot 2-plane coupler, and an optimization process for a wideband design based on a genetic algorithm (GA). The method of the analysis combines a fast modal analysis of the MM which reduces the computation time, with the flexibility of an FEM which can be used with an arbitrary cross-section. In the analysis, the model is reduced into the one-eighth model by using the three-dimensional structural symmetry. The computed results agree well with those by the simulation and the computation time is reduced. The bandwidth is improved by the optimization based on the GA from 2.4% to 6.9% for the 2-plane hybrid coupler and from 5.4% to 7.5% for the 2-plane cross coupler. The measured results confirm the wideband design.

  • Optimized Power Allocation Scheme for Distributed Antenna Systems with D2D Communication

    Xingquan LI  Chunlong HE  Jihong ZHANG  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2018/11/21
      Vol:
    E102-B No:5
      Page(s):
    1061-1068

    In this paper, we investigate different power allocation optimization problems with interferences for distributed antenna systems (DAS) with and without D2D communication, respectively. The first objective problem is maximizing spectral efficiency (SE) of the DAS with D2D communication under the constraints of the minimum SE requirements of user equipment (UE) and D2D pair, maximum transmit power of each remote access unit (RAU) and maximum transmit power of D2D transmitter. We transform this non-convex objective function into a difference of convex functions (D.C.) then using the concave-convex procedure (CCCP) algorithm to solve the optimization problem. The second objective is maximizing energy efficiency (EE) of the DAS with D2D communication under the same constraints. We first exploit fractional programming theory to obtain the equivalent objective function of the second problem with subtract form, and then transform it into a D.C. problem and use CCCP algorithm to obtain the optimal power allocation. In each part, we summarize the corresponding optimal power allocation algorithms and also use similar method to obtain optimal solutions of the same optimization problems in DAS. Simulation results are provided to demonstrate the effectiveness of the designed power allocation algorithms and illustrate the SE and EE of the DAS by using D2D communication are much better than DAS without D2D communication.

  • A Part-Based Gaussian Reweighted Approach for Occluded Vehicle Detection

    Yu HUANG  Zhiheng ZHOU  Tianlei WANG  Qian CAO  Junchu HUANG  Zirong CHEN  

     
    LETTER-Pattern Recognition

      Pubricized:
    2019/02/18
      Vol:
    E102-D No:5
      Page(s):
    1097-1101

    Vehicle detection is challenging in natural traffic scenes because there exist a lot of occlusion. Because of occlusion, detector's training strategy may lead to mismatch between features and labels. As a result, some predicted bounding boxes may shift to surrounding vehicles and lead to lower confidences. These bounding boxes will lead to lower AP value. In this letter, we propose a new approach to address this problem. We calculate the center of visible part of current vehicle based on road information. Then a variable-radius Gaussian weight based method is applied to reweight each anchor box in loss function based on the center of visible part in training time of SSD. The reweighted method has ability to predict higher confidences and more accurate bounding boxes. Besides, the model also has high speed and can be trained end-to-end. Experimental results show that our proposed method outperforms some competitive methods in terms of speed and accuracy.

  • Dynamic Strain Measurement with Bandwidth Allocation by Using Random Accessibility of BOCDR

    Osamu FURUKAWA  Hideo SHIDA  Shin-ichiro TEZUKA  Satoshi MATSUURA  Shoji ADACHI  

     
    PAPER-Sensing

      Pubricized:
    2018/11/13
      Vol:
    E102-B No:5
      Page(s):
    1069-1076

    A Brillouin optical correlation domain reflectometry (BOCDR) system, which can set measuring point to arbitrary distance that is aligned in a random order along an optical fiber (i.e., random accessibility), is proposed to measure dynamic strain and experimentally evaluated. This random-access system can allocate measurement bandwidth to measuring point by assigning the measurement times at each measuring point of the total number of strain measurements. This assigned number is not always equally but as necessary for plural objects with different natural frequencies. To verify the system, strain of two vibrating objects with different natural frequencies was measured by one optical fiber which is attached to those objects. The system allocated appropriate measurement bandwidth to each object and simultaneously measured dynamic strain corresponding to the vibrating objects.

  • FOREWORD Open Access

    Piotr ZWIERZYKOWSKI  

     
    FOREWORD

      Vol:
    E102-B No:5
      Page(s):
    957-957
  • A Sequential Classifiers Combination Method to Reduce False Negative for Intrusion Detection System

    Sornxayya PHETLASY  Satoshi OHZAHATA  Celimuge WU  Toshihito KATO  

     
    PAPER

      Pubricized:
    2019/02/27
      Vol:
    E102-D No:5
      Page(s):
    888-897

    Intrusion detection system (IDS) is a device or software to monitor a network system for malicious activity. In terms of detection results, there could be two types of false, namely, the false positive (FP) which incorrectly detects normal traffic as abnormal, and the false negative (FN) which incorrectly judges malicious traffic as normal. To protect the network system, we expect that FN should be minimized as low as possible. However, since there is a trade-off between FP and FN when IDS detects malicious traffic, it is difficult to reduce the both metrics simultaneously. In this paper, we propose a sequential classifiers combination method to reduce the effect of the trade-off. The single classifier suffers a high FN rate in general, therefore additional classifiers are sequentially combined in order to detect more positives (reduce more FN). Since each classifier can reduce FN and does not generate much FP in our approach, we can achieve a reduction of FN at the final output. In evaluations, we use NSL-KDD dataset, which is an updated version of KDD Cup'99 dataset. WEKA is utilized as a classification tool in experiment, and the results show that the proposed approach can reduce FN while improving the sensitivity and accuracy.

  • A P2P Sensor Data Stream Delivery System That Guarantees the Specified Reachability under Churn Situations

    Tomoya KAWAKAMI  Tomoki YOSHIHISA  Yuuichi TERANISHI  

     
    PAPER

      Pubricized:
    2019/02/06
      Vol:
    E102-D No:5
      Page(s):
    932-941

    In this paper, we propose a method to construct a scalable sensor data stream delivery system that guarantees the specified delivery quality of service (i.e., total reachability to destinations), even when delivery server resources (nodes) are in a heterogeneous churn situation. A number of P2P-based methods have been proposed for constructing a scalable and efficient sensor data stream system that accommodates different delivery cycles by distributing communication loads of the nodes. However, no existing method can guarantee delivery quality of service when the nodes on the system have a heterogeneous churn rate. As an extension of existing methods, which assign relay nodes based on the distributed hashing of the time-to-deliver, our method specifies the number of replication nodes, based on the churn rate of each node and on the relevant delivery paths. Through simulations, we confirmed that our proposed method can guarantee the required reachability, while avoiding any increase in unnecessary resource assignment costs.

  • A Mathematical Model and Dynamic Programming Based Scheme for Service Function Chain Placement in NFV

    Yansen XU  Ved P. KAFLE  

     
    PAPER

      Pubricized:
    2019/02/27
      Vol:
    E102-D No:5
      Page(s):
    942-951

    Service function chain (SFC) is a series of ordered virtual network functions (VNFs) for processing traffic flows in the virtualized networking environment of future networks. In this paper, we present a mathematical model and dynamic programing based scheme for solving the problem of SFC placement on substrate networks equipped with network function virtualization (NFV) capability. In this paper, we first formulate the overall cost of SFC placement as the combination of setup cost and operation cost. We then formulate the SFC placement problem as an integer linear programing (ILP) model with the objective of minimizing the overall cost of setup and operation, and propose a delay aware dynamic programming based SFC placement scheme for large networks. We conduct numeric simulations to evaluate the proposed scheme. We analyze the cost and performance of network under different optimization objectives, with and without keeping the order of VNFs in SFC. We measure the success rate, resources utilization, and end to end delay of SFC on different topologies. The results show that the proposed scheme outperforms other related schemes in various scenarios.

  • A Portable Load Balancer with ECMP Redundancy for Container Clusters

    Kimitoshi TAKAHASHI  Kento AIDA  Tomoya TANJO  Jingtao SUN  Kazushige SAGA  

     
    PAPER

      Pubricized:
    2019/02/27
      Vol:
    E102-D No:5
      Page(s):
    974-987

    Linux container technology and clusters of the containers are expected to make web services consisting of multiple web servers and a load balancer portable, and thus realize easy migration of web services across the different cloud providers and on-premise datacenters. This prevents service to be locked-in a single cloud provider or a single location and enables users to meet their business needs, e.g., preparing for a natural disaster. However existing container management systems lack the generic implementation to route the traffic from the internet into the web service consisting of container clusters. For example, Kubernetes, which is one of the most popular container management systems, is heavily dependent on cloud load balancers. If users use unsupported cloud providers or on-premise datacenters, it is up to users to route the traffic into their cluster while keeping the redundancy and scalability. This means that users could easily be locked-in the major cloud providers including GCP, AWS, and Azure. In this paper, we propose an architecture for a group of containerized load balancers with ECMP redundancy. We containerize Linux ipvs and exabgp, and then implement an experimental system using standard Linux boxes and open source software. We also reveal that our proposed system properly route the traffics with redundancy. Our proposed load balancers are usable even if the infrastructure does not have supported load balancers by Kubernetes and thus free users from lock-ins.

4081-4100hit(42807hit)