The search functionality is under construction.

Keyword Search Result

[Keyword] ACK(2391hit)

81-100hit(2391hit)

  • Time-Multiplexed Coded Aperture and Coded Focal Stack -Comparative Study on Snapshot Compressive Light Field Imaging Open Access

    Kohei TATEISHI  Chihiro TSUTAKE  Keita TAKAHASHI  Toshiaki FUJII  

     
    PAPER

      Pubricized:
    2022/05/26
      Vol:
    E105-D No:10
      Page(s):
    1679-1690

    A light field (LF), which is represented as a set of dense, multi-view images, has been used in various 3D applications. To make LF acquisition more efficient, researchers have investigated compressive sensing methods by incorporating certain coding functionalities into a camera. In this paper, we focus on a challenging case called snapshot compressive LF imaging, in which an entire LF is reconstructed from only a single acquired image. To embed a large amount of LF information in a single image, we consider two promising methods based on rapid optical control during a single exposure: time-multiplexed coded aperture (TMCA) and coded focal stack (CFS), which were proposed individually in previous works. Both TMCA and CFS can be interpreted in a unified manner as extensions of the coded aperture (CA) and focal stack (FS) methods, respectively. By developing a unified algorithm pipeline for TMCA and CFS, based on deep neural networks, we evaluated their performance with respect to other possible imaging methods. We found that both TMCA and CFS can achieve better reconstruction quality than the other snapshot methods, and they also perform reasonably well compared to methods using multiple acquired images. To our knowledge, we are the first to present an overall discussion of TMCA and CFS and to compare and validate their effectiveness in the context of compressive LF imaging.

  • Strengthening Network-Based Moving Target Defense with Disposable Identifiers

    Taekeun PARK  Keewon KIM  

     
    LETTER-Information Network

      Pubricized:
    2022/07/08
      Vol:
    E105-D No:10
      Page(s):
    1799-1802

    In this paper, we propose a scheme to strengthen network-based moving target defense with disposable identifiers. The main idea is to change disposable identifiers for each packet to maximize unpredictability with large hopping space and substantially high hopping frequency. It allows network-based moving target defense to defeat active scanning, passive scanning, and passive host profiling attacks. Experimental results show that the proposed scheme changes disposable identifiers for each packet while requiring low overhead.

  • Interpretation Method of Inversion Phenomena on Backward Transient Scattered Field Components by a Coated Metal Cylinder

    Toru KAWANO  Keiji GOTO  

     
    PAPER-Electromagnetic Theory

      Pubricized:
    2022/02/24
      Vol:
    E105-C No:9
      Page(s):
    389-397

    An interpretation method of inversion phenomena is newly proposed for backward transient scattered field components for both E- and H-polarizations when an ultra-wideband (UWB) pulse wave radiated from a line source is incident on a two-dimensional metal cylinder covered with a lossless dielectric medium layer (coated metal cylinder). A time-domain (TD) asymptotic solution, which is referred to as a TD saddle point technique (TD-SPT), is derived by applying the SPT in evaluating a backward transient scattered field which is expressed by an integral form. The TD-SPT is represented by a combination of a direct geometric optical ray (DGO) and a reflected GO (RGO) series, thereby being able to extract and calculate any backward transient scattered field component from a response waveform. The TD-SPT is useful in understanding the response waveform of a backward transient scattered field by a coated metal cylinder because it can give us the peak value and arrival time of any field component, namely DGO and RGO components, and interpret analytically inversion phenomenon of any field component. The accuracy, validity, and practicality of the TD-SPT are clarified by comparing it with two kinds of reference solutions.

  • Online Removable Knapsack Problem for Integer-Sized Unweighted Items Open Access

    Hiroshi FUJIWARA  Kanaho HANJI  Hiroaki YAMAMOTO  

     
    PAPER-Algorithms and Data Structures

      Pubricized:
    2022/03/08
      Vol:
    E105-A No:9
      Page(s):
    1195-1202

    In the online removable knapsack problem, a sequence of items, each labeled with its value and its size, is given one by one. At each arrival of an item, a player has to decide whether to put it into a knapsack or to discard it. The player is also allowed to discard some of the items that are already in the knapsack. The objective is to maximize the total value of the knapsack. Iwama and Taketomi gave an optimal algorithm for the case where the value of each item is equal to its size. In this paper we consider a case with an additional constraint that the capacity of the knapsack is a positive integer N and that the sizes of items are all integral. For each positive integer N, we design an algorithm and prove its optimality. It is revealed that the competitive ratio is not monotonic with respect to N.

  • Joint User Association and Spectrum Allocation in Satellite-Terrestrial Integrated Networks

    Wenjing QIU  Aijun LIU  Chen HAN  Aihong LU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2022/03/15
      Vol:
    E105-B No:9
      Page(s):
    1063-1077

    This paper investigates the joint problem of user association and spectrum allocation in satellite-terrestrial integrated networks (STINs), where a low earth orbit (LEO) satellite access network cooperating with terrestrial networks constitutes a heterogeneous network, which is beneficial in terms of both providing seamless coverage as well as improving the backhaul capacity for the dense network scenario. However, the orbital movement of satellites results in the dynamic change of accessible satellites and the backhaul capacities. Moreover, spectrum sharing may be faced with severe co-channel interferences (CCIs) caused by overlapping coverage of multiple access points (APs). This paper aims to maximize the total sum rate considering the influences of the dynamic feature of STIN, backhaul capacity limitation and interference management. The optimization problem is then decomposed into two subproblems: resource allocation for terrestrial communications and satellite communications, which are both solved by matching algorithms. Finally, simulation results show the effectiveness of our proposed scheme in terms of STIN's sum rate and spectrum efficiency.

  • Multiple Hypothesis Tracking with Merged Bounding Box Measurements Considering Occlusion

    Tetsutaro YAMADA  Masato GOCHO  Kei AKAMA  Ryoma YATAKA  Hiroshi KAMEDA  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2022/05/09
      Vol:
    E105-D No:8
      Page(s):
    1456-1463

    A new approach for multi-target tracking in an occlusion environment is presented. In pedestrian tracking using a video camera, pedestrains must be tracked accurately and continuously in the images. However, in a crowded environment, the conventional tracking algorithm has a problem in that tracks do not continue when pedestrians are hidden behind the foreground object. In this study, we propose a robust tracking method for occlusion that introduces a degeneration hypothesis that relaxes the track hypothesis which has one measurement to one track constraint. The proposed method relaxes the hypothesis that one measurement and multiple trajectories are associated based on the endpoints of the bounding box when the predicted trajectory is approaching, therefore the continuation of the tracking is improved using the measurement in the foreground. A numerical evaluation using MOT (Multiple Object Tracking) image data sets is performed to demonstrate the effectiveness of the proposed algorithm.

  • Convolutional Neural Networks Based Dictionary Pair Learning for Visual Tracking

    Chenchen MENG  Jun WANG  Chengzhi DENG  Yuanyun WANG  Shengqian WANG  

     
    PAPER-Vision

      Pubricized:
    2022/02/21
      Vol:
    E105-A No:8
      Page(s):
    1147-1156

    Feature representation is a key component of most visual tracking algorithms. It is difficult to deal with complex appearance changes with low-level hand-crafted features due to weak representation capacities of such features. In this paper, we propose a novel tracking algorithm through combining a joint dictionary pair learning with convolutional neural networks (CNN). We utilize CNN model that is trained on ImageNet-Vid to extract target features. The CNN includes three convolutional layers and two fully connected layers. A dictionary pair learning follows the second fully connected layer. The joint dictionary pair is learned upon extracted deep features by the trained CNN model. The temporal variations of target appearances are learned in the dictionary learning. We use the learned dictionaries to encode target candidates. A linear combination of atoms in the learned dictionary is used to represent target candidates. Extensive experimental evaluations on OTB2015 demonstrate the superior performances against SOTA trackers.

  • Backup Resource Allocation of Virtual Machines for Probabilistic Protection under Capacity Uncertainty

    Mitsuki ITO  Fujun HE  Eiji OKI  

     
    PAPER-Network

      Pubricized:
    2022/01/17
      Vol:
    E105-B No:7
      Page(s):
    814-832

    This paper presents robust optimization models for minimizing the required backup capacity while providing probabilistic protection against multiple simultaneous failures of physical machines under uncertain virtual machine capacities in a cloud provider. If random failures occur, the required capacities for virtual machines are allocated to the dedicated backup physical machines, which are determined in advance. We consider two uncertainties: failure event and virtual machine capacity. By adopting a robust optimization technique, we formulate six mixed integer linear programming problems. Numerical results show that for a small size problem, our presented models are applicable to the case that virtual machine capacities are uncertain, and by using these models, we can obtain the optimal solution of the allocation of virtual machines under the uncertainty. A simulated annealing heuristic is presented to solve large size problems. By using this heuristic, an approximate solution is obtained for a large size problem.

  • Performance Evaluation of a Hash-Based Countermeasure against Fake Message Attacks in Sparse Mobile Ad Hoc Networks

    Yuki SHIMIZU  Tomotaka KIMURA  Jun CHENG  

     
    PAPER-Network

      Pubricized:
    2021/12/24
      Vol:
    E105-B No:7
      Page(s):
    833-847

    In this study, we consider fake message attacks in sparse mobile ad hoc networks, in which nodes are chronically isolated. In these networks, messages are delivered to their destination nodes using store-carry-forward routing, where they are relayed by some nodes. Therefore, when a node has messages in its buffer, it can falsify the messages easily. When malicious nodes exist in the network, they alter messages to create fake messages, and then they launch fake message attacks, that is, the fake messages are spread over the network. To analyze the negative effects of a fake message attack, we model the system dynamics without attack countermeasures using a Markov chain, and then formalize some performance metrics (i.e., the delivery probability, mean delivery delay, and mean number of forwarded messages). This analysis is useful for designing countermeasures. Moreover, we consider a hash-based countermeasure against fake message attacks using a hash of the message. Whenever a node that has a message and its hash encounters another node, it probabilistically forwards only one of them to the encountered node. By doing this, the message and the hash value can be delivered to the destination node via different relay nodes. Therefore, even if the destination node receives a fake message, it can verify the legitimacy of the received message. Through simulation experiments, we evaluate the effectiveness of the hash-based countermeasure.

  • Detection and Tracking Method for Dynamic Barcodes Based on a Siamese Network

    Menglong WU  Cuizhu QIN  Hongxia DONG  Wenkai LIU  Xiaodong NIE  Xichang CAI  Yundong LI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2022/01/13
      Vol:
    E105-B No:7
      Page(s):
    866-875

    In many screen to camera communication (S2C) systems, the barcode preprocessing method is a significant prerequisite because barcodes may be deformed due to various environmental factors. However, previous studies have focused on barcode detection under static conditions; to date, few studies have been carried out on dynamic conditions (for example, the barcode video stream or the transmitter and receiver are moving). Therefore, we present a detection and tracking method for dynamic barcodes based on a Siamese network. The backbone of the CNN in the Siamese network is improved by SE-ResNet. The detection accuracy achieved 89.5%, which stands out from other classical detection networks. The EAO reaches 0.384, which is better than previous tracking methods. It is also superior to other methods in terms of accuracy and robustness. The SE-ResNet in this paper improved the EAO by 1.3% compared with ResNet in SiamMask. Also, our method is not only applicable to static barcodes but also allows real-time tracking and segmentation of barcodes captured in dynamic situations.

  • Parameter Selection for Radar Systems in Roadside Units

    Chia-Hsing YANG  Ming-Chun LEE  Ta-Sung LEE  Hsiu-Chi CHANG  

     
    PAPER-Sensing

      Pubricized:
    2022/01/13
      Vol:
    E105-B No:7
      Page(s):
    885-892

    Intelligent transportation systems (ITSs) have been extensively studied in recent years to improve the safety and efficiency of transportation. The use of a radar system to enable the ITSs monitor the environment is robust to weather conditions and is less invasive to user privacy. Moreover, equipping the roadside units (RSUs) with radar modules has been deemed an economical and efficient option for ITS operators. However, because the detection and tracking parameters can significantly influence the radar system performance and the best parameters for different scenarios are different, the selection of appropriate parameters for the radar systems is critical. In this study, we investigated radar parameter selection and consequently proposes a parameter selection approach capable of automatically choosing the appropriate detection and tracking parameters for radar systems. The experimental results indicate that the proposed method realizes appropriate selection of parameters, thereby significantly improving the detection and tracking performance of radar systems.

  • Synchronous Sharing of Lecture Slides and Photo Messaging during Real-Time Online Classes

    Haeyoung LEE  

     
    LETTER-Educational Technology

      Pubricized:
    2022/04/21
      Vol:
    E105-D No:7
      Page(s):
    1348-1351

    This letter presents an innovative solution for real-time interaction during online classes. Synchronous sharing enables instructors to provide real-time feedback to students. This encourages students to stay focused and feel engaged during class. Consequently, students evaluated anonymously that this solution significantly enhanced their learning experience during real-time online classes.

  • Sensor Scheduling-Based Detection of False Data Injection Attacks in Power System State Estimation

    Sho OBATA  Koichi KOBAYASHI  Yuh YAMASHITA  

     
    LETTER-Mathematical Systems Science

      Pubricized:
    2021/12/13
      Vol:
    E105-A No:6
      Page(s):
    1015-1019

    In the state estimation of steady-state power networks, a cyber attack that cannot be detected from the residual (i.e., the estimation error) is called a false data injection (FDI) attack. In this letter, to enforce the security of power networks, we propose a method of detecting an FDI attack. In the proposed method, an FDI attack is detected by randomly choosing sensors used in the state estimation. The effectiveness of the proposed method is presented by two examples including the IEEE 14-bus system.

  • Reinforced Tracker Based on Hierarchical Convolutional Features

    Xin ZENG  Lin ZHANG  Zhongqiang LUO  Xingzhong XIONG  Chengjie LI  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2022/03/10
      Vol:
    E105-D No:6
      Page(s):
    1225-1233

    In recent years, the development of visual tracking is getting better and better, but some methods cannot overcome the problem of low accuracy and success rate of tracking. Although there are some trackers will be more accurate, they will cost more time. In order to solve the problem, we propose a reinforced tracker based on Hierarchical Convolutional Features (HCF for short). HOG, color-naming and grayscale features are used with different weights to supplement the convolution features, which can enhance the tracking robustness. At the same time, we improved the model update strategy to save the time costs. This tracker is called RHCF and the code is published on https://github.com/z15846/RHCF. Experiments on the OTB2013 dataset show that our tracker can validly achieve the promotion of the accuracy and success rate.

  • Detection of Trust Shilling Attacks in Recommender Systems

    Xian CHEN  Xi DENG  Chensen HUANG  Hyoseop SHIN  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2022/03/02
      Vol:
    E105-D No:6
      Page(s):
    1239-1242

    Most research on detecting shilling attacks focuses on users' rating behavior but does not consider that attackers may also attack the users' trusting behavior. For example, attackers may give a low score to other users' ratings so that people would think the ratings from the users are not helpful. In this paper, we define the trust shilling attack, propose the behavior features of trust attacks, and present an effective detection method using machine learning methods. The experimental results demonstrate that, based on our proposed behavior features of trust attacks, we can detect trust shilling attacks as well as traditional shilling attacks accurately.

  • Automatic Planning Algorithms for 300GHz Wireless Backhaul Links Open Access

    Bo Kum JUNG  Thomas KÜRNER  

     
    INVITED PAPER

      Pubricized:
    2021/12/03
      Vol:
    E105-B No:6
      Page(s):
    685-693

    With the increasing densification of 5G and future 6G networks high-capacity backhaul links to connect the numerous base stations become an issue. Since not all base stations can be connected via fibre links for either technical or economic reasons wireless connections at 300GHz, which may provide data rates comparable to fibre links, are an alternative. This paper deals with the planning of 300GHz backhaul links and describes two novel automatic planning approaches for backhaul links arranged in ring and star topology. The two planning approaches are applied to various scenarios and the corresponding planning results are evaluated by comparing signal to interference plus noise ratio under various simulation conditions including weather impacts showing the feasibility of wireless backhaul links.

  • Toward Realization of Scalable Packaging and Wiring for Large-Scale Superconducting Quantum Computers Open Access

    Shuhei TAMATE  Yutaka TABUCHI  Yasunobu NAKAMURA  

     
    INVITED PAPER

      Pubricized:
    2021/12/03
      Vol:
    E105-C No:6
      Page(s):
    290-295

    In this paper, we review the basic components of superconducting quantum computers. We mainly focus on the packaging and wiring technologies required to realize large-scalable superconducting quantum computers.

  • A Semantic-Based Dual Location Privacy-Preserving Approach

    Xudong YANG  Ling GAO  Yan LI  Jipeng XU  Jie ZHENG  Hai WANG  Quanli GAO  

     
    PAPER-Information Network

      Pubricized:
    2022/02/16
      Vol:
    E105-D No:5
      Page(s):
    982-995

    With the popularity and development of Location-Based Services (LBS), location privacy-preservation has become a hot research topic in recent years, especially research on k-anonymity. Although previous studies have done a lot of work on anonymity-based privacy protection, there are still several challenges far from being perfectly solved, such as the negative impact on the security of anonymity by the semantic information, which from anonymous locations and query content. To address these semantic challenges, we propose a dual privacy preservation scheme based on the architecture of multi-anonymizers in this paper. Different from existing approaches, our method enhanced location privacy by integrating location anonymity and the encrypted query. First, the query encryption method that combines improved shamir mechanism and multi-anonymizers is proposed to enhance query safety. Second, we design an anonymity method that enhances semantic location privacy through anonymous locations that satisfy personal semantic diversity and replace sensitive semantic locations. Finally, the experiment on the real dataset shows that our algorithms provide much better privacy and use than previous solutions.

  • LMI-Based Design of Output Feedback Controllers with Decentralized Event-Triggering

    Koichi KITAMURA  Koichi KOBAYASHI  Yuh YAMASHITA  

     
    PAPER

      Pubricized:
    2021/09/15
      Vol:
    E105-A No:5
      Page(s):
    816-822

    In this paper, event-triggered control over a sensor network is studied as one of the control methods of cyber-physical systems. Event-triggered control is a method that communications occur only when the measured value is widely changed. In the proposed method, by solving an LMI (Linear Matrix Inequality) feasibility problem, an event-triggered output feedback controller such that the closed-loop system is asymptotically stable is derived. First, the problem formulation is given. Next, the control problem is reduced to an LMI feasibility problem. Finally, the proposed method is demonstrated by a numerical example.

  • High Temporal Resolution-Based Temporal Iterative Tracking for High Framerate and Ultra-Low Delay Dynamic Tracking System

    Tingting HU  Ryuji FUCHIKAMI  Takeshi IKENAGA  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2022/02/22
      Vol:
    E105-D No:5
      Page(s):
    1064-1074

    High frame rate and ultra-low delay vision system, which can finish reading and processing of 1000fps sequence within 1ms/frame, draws increasing attention in the field of robotics that requires immediate feedback from image process core. Meanwhile, tracking task plays an important role in many computer vision applications. Among various tracking algorithms, Lucas Kanade (LK)-based template tracking, which tracks targets with high accuracy over the sub-pixel level, is one of the keys for robotic applications, such as factory automation (FA). However, the substantial spatial iterative processing and complex computation in the LK algorithm, make it difficult to achieve a high frame rate and ultra-low delay tracking with limited resources. Aiming at an LK-based template tracking system that reads and processes 1000fps sequences within 1ms/frame with small resource costs, this paper proposes: 1) High temporal resolution-based temporal iterative tracking, which maps the spatial iterations into the temporal domain, efficiently reduces resource cost and delay caused by spatial iterative processing. 2) Label scanner-based multi-stream spatial processing, which maps the local spatial processing into the labeled input pixel stream and aggregates them with a label scanner, makes the local spatial processing in the LK algorithm possible be implemented with a small resource cost. Algorithm evaluation shows that the proposed temporal iterative tracking performs dynamic tracking, which tracks object with coarse accuracy when it's moving fast and achieves higher accuracy when it slows down. Hardware evaluation shows that the proposed label scanner-based multi-stream architecture makes the system implemented on FPGA (zcu102) with resource cost less than 20%, and the designed tracking system supports to read and process 1000fps sequence within 1ms/frame.

81-100hit(2391hit)