The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] AME(1195hit)

161-180hit(1195hit)

  • Recognition of Collocation Frames from Sentences

    Xiaoxia LIU  Degen HUANG  Zhangzhi YIN  Fuji REN  

     
    PAPER-Natural Language Processing

      Pubricized:
    2018/12/14
      Vol:
    E102-D No:3
      Page(s):
    620-627

    Collocation is a ubiquitous phenomenon in languages and accurate collocation recognition and extraction is of great significance to many natural language processing tasks. Collocations can be differentiated from simple bigram collocations to collocation frames (referring to distant multi-gram collocations). So far little focus is put on collocation frames. Oriented to translation and parsing, this study aims to recognize and extract the longest possible collocation frames from given sentences. We first extract bigram collocations with distributional semantics based method by introducing collocation patterns and integrating some state-of-the-art association measures. Based on bigram collocations extracted by the proposed method, we get the longest collocation frames according to recursive nature and linguistic rules of collocations. Compared with the baseline systems, the proposed method performs significantly better in bigram collocation extraction both in precision and recall. And in extracting collocation frames, the proposed method performs even better with the precision similar to its bigram collocation extraction results.

  • Camera Selection in Far-Field Video Surveillance Networks

    Kaimin CHEN  Wei LI  Zhaohuan ZHAN  Binbin LIANG  Songchen HAN  

     
    PAPER-Network

      Pubricized:
    2018/08/29
      Vol:
    E102-B No:3
      Page(s):
    528-536

    Since camera networks for surveillance are becoming extremely dense, finding the most informative and desirable views from different cameras are of increasing importance. In this paper, we propose a camera selection method to achieve the goal of providing the clearest visibility possible and selecting the cameras which exactly capture targets for the far-field surveillance. We design a benefit function that takes into account image visibility and the degree of target matching between different cameras. Here, visibility is defined using the entropy of intensity histogram distribution, and the target correspondence is based on activity features rather than photometric features. The proposed solution is tested in both artificial and real environments. A performance evaluation shows that our target correspondence method well suits far-field surveillance, and our proposed selection method is more effective at identifying the cameras that exactly capture the surveillance target than existing methods.

  • On Necessary Conditions for Dependence Parameters of Minimum and Maximum Value Distributions Based on n-Variate FGM Copula Open Access

    Shuhei OTA  Mitsuhiro KIMURA  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Vol:
    E102-A No:3
      Page(s):
    586-589

    This paper deals with the minimum and maximum value distributions based on the n-variate FGM copula with one dependence parameter. The ranges of dependence parameters are theoretically determined so that the probability density function always takes a non-negative value. However, the closed-form conditions of the ranges for the dependence parameters have not been known in the literature. In this paper, we newly provide the necessary conditions of the ranges of the dependence parameters for the minimum and maximum value distributions which are derived from FGM copula, and show the asymptotic properties of the ranges.

  • 5G Experimental Trials for Ultra-Reliable and Low Latency Communications Using New Frame Structure

    Masashi IWABUCHI  Anass BENJEBBOUR  Yoshihisa KISHIYAMA  Guangmei REN  Chen TANG  Tingjian TIAN  Liang GU  Yang CUI  Terufumi TAKADA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2018/08/20
      Vol:
    E102-B No:2
      Page(s):
    381-390

    The fifth generation mobile communications (5G) systems will need to support the ultra-reliable and low-latency communications (URLLC) to enable future mission-critical applications, e.g., self-driving cars and remote control. With the aim of verifying the feasibility of URLLC related 5G requirements in real environments, field trials of URLLC using a new frame structure are conducted in Yokohama, Japan. In this paper, we present the trial results and investigate the impact of the new frame structure and retransmission method on the URLLC performance. To reduce the user-plane latency and improve the packet success probability, a wider subcarrier spacing, self-contained frame structure, and acknowledgement/negative acknowledgement-less (ACK/NACK-less) retransmission are adopted. We verify the feasibility of URLLC in actual field tests using our prototype test-bed while implementing these techniques. The results show that for the packet size of 32 bytes the URLLC related requirements defined by the 3GPP are satisfied even at low signal-to-noise ratios or at non-line-of-sight transmission.

  • Preordering for Chinese-Vietnamese Statistical Machine Translation

    Huu-Anh TRAN  Heyan HUANG  Phuoc TRAN  Shumin SHI  Huu NGUYEN  

     
    PAPER-Natural Language Processing

      Pubricized:
    2018/11/12
      Vol:
    E102-D No:2
      Page(s):
    375-382

    Word order is one of the most significant differences between the Chinese and Vietnamese. In the phrase-based statistical machine translation, the reordering model will learn reordering rules from bilingual corpora. If the bilingual corpora are large and good enough, the reordering rules are exact and coverable. However, Chinese-Vietnamese is a low-resource language pair, the extraction of reordering rules is limited. This leads to the quality of reordering in Chinese-Vietnamese machine translation is not high. In this paper, we have combined Chinese dependency relation and Chinese-Vietnamese word alignment results in order to pre-order Chinese word order to be suitable to Vietnamese one. The experimental results show that our methodology has improved the machine translation performance compared to the translation system using only the reordering models of phrase-based statistical machine translation.

  • Personal Data Retrieval and Disambiguation in Web Person Search

    Yuliang WEI  Guodong XIN  Wei WANG  Fang LV  Bailing WANG  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2018/10/24
      Vol:
    E102-D No:2
      Page(s):
    392-395

    Web person search often return web pages related to several distinct namesakes. This paper proposes a new web page model for template-free person data extraction, and uses Dirichlet Process Mixture model to solve name disambiguation. The results show that our method works best on web pages with complex structure.

  • Specific Properties of the Computation Process by a Turing Machine on the Game of Life

    Shigeru NINAGAWA  

     
    PAPER-Nonlinear Problems

      Vol:
    E102-A No:2
      Page(s):
    415-422

    The Game of Life, a two-dimensional computationally universal cellular automaton, is known to exhibits 1/f noise in the evolutions starting from random configurations. In this paper we perform the spectral analysis on the computation process by a Turing machine constructed on the array of the Game of Life. As a result, the power spectrum averaged over the whole array has almost flat line at low frequencies and a lot of sharp peaks at high frequencies although some regions in which complicated behavior such as frequent memory rewriting occurs exhibit 1/f noise. This singular power spectrum is, however, easily turned into 1/f by slightly deforming the initial configuration of the Turing machine. These results emphasize the peculiarity of the computation process on the Game of Life that is never shared with the evolutions from random configurations. The Lyapunov exponents have positive values in three out of six trials and zero or negative values in other three trails. That means the computation process is essentially chaotic but it has capable of recovering a slight error in the configuration of the Turing machine.

  • Millimeter-Wave Radar Target Recognition Algorithm Based on Collaborative Auto-Encoder

    Yilu MA  Zhihui YE  Yuehua LI  

     
    LETTER-Pattern Recognition

      Pubricized:
    2018/10/03
      Vol:
    E102-D No:1
      Page(s):
    202-205

    Conventional target recognition methods usually suffer from information-loss and target-aspect sensitivity when applied to radar high resolution range profile (HRRP) recognition. Thus, Effective establishment of robust and discriminatory feature representation has a significant performance improvement of practical radar applications. In this work, we present a novel feature extraction method, based on modified collaborative auto-encoder, for millimeter-wave radar HRRP recognition. The latent frame-specific weight vector is trained for samples in a frame, which contributes to retaining local information for different targets. Experimental results demonstrate that the proposed algorithm obtains higher target recognition accuracy than conventional target recognition algorithms.

  • A Congestion Control Method for Named Data Networking with Hop-by-Hop Window-Based Approach

    Takahiko KATO  Masaki BANDAI  Miki YAMAMOTO  

     
    PAPER-Network System

      Pubricized:
    2018/06/28
      Vol:
    E102-B No:1
      Page(s):
    97-110

    Congestion control is a hot topic in named data networking (NDN). Congestion control methods for NDN are classified into two approaches: the rate-based approach and the window-based approach. In the window-based approach, the optimum window size cannot be determined due to the largely changing round-trip time. Therefore, the rate-based approach is considered to be suitable for NDN and has been studied actively. However, there is still room for improvement in the window-based approach because hop-by-hop control in this approach has not been explored. In this paper, we propose a hop-by-hop widow-based congestion control method for NDN (HWCC). The proposed method introduces a window-size control for per-hop Interest transmission using hop-by-hop acknowledgment. In addition, we extend HWCC so that it can support multipath forwarding (M-HWCC) in order to increase the network resources utilization. The simulation results show that both of HWCC and M-HWCC achieve high throughput performance, as well as the max-min fairness, while effectively avoiding congestion.

  • A Semantic Management Method of Simulation Models in GNSS Distributed Simulation Environment

    Guo-chao FAN  Chun-sheng HU  Xue-en ZHENG  Cheng-dong XU  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2018/10/09
      Vol:
    E102-D No:1
      Page(s):
    85-92

    In GNSS (Global Navigation Satellite System) Distributed Simulation Environment (GDSE), the simulation task could be designed with the sharing models on the Internet. However, too much information and relation of model need to be managed in GDSE. Especially if there is a large quantity of sharing models, the model retrieval would be an extremely complex project. For meeting management demand of GDSE and improving the model retrieval efficiency, the characteristics of service simulation model are analysed firstly. A semantic management method of simulation model is proposed, and a model management architecture is designed. Compared with traditional retrieval way, it takes less retrieval time and has a higher accuracy result. The simulation results show that retrieval in the semantic management module has a good ability on understanding user needs, and helps user obtain appropriate model rapidly. It improves the efficiency of simulation tasks design.

  • Random Access Control Scheme with Reservation Channel for Capacity Expansion of QZSS Safety Confirmation System Open Access

    Suguru KAMEDA  Kei OHYA  Tomohide TAKAHASHI  Hiroshi OGUMA  Noriharu SUEMATSU  

     
    PAPER

      Vol:
    E102-A No:1
      Page(s):
    186-194

    For capacity expansion of the Quasi-Zenith Satellite System (QZSS) safety confirmation system, frame slotted ALOHA with flag method has previously been proposed as an access control scheme. While it is always able to communicate in an optimum state, its maximum channel efficiency is only 36.8%. In this paper, we propose adding a reservation channel (R-Ch) to the frame slotted ALOHA with flag method to increase the upper limit of the channel efficiency. With an R-Ch, collision due to random channel selection is decreased by selecting channels in multiple steps, and the channel efficiency is improved up to 84.0%. The time required for accommodating 3 million mobile terminals, each sending one message, when using the flag method only and the flag method with an R-Ch are compared. It is shown that the accommodating time can be reduced to less than half by adding an R-Ch to the flag method.

  • Symmetric Decomposition of Convolution Kernels

    Jun OU  Yujian LI  

     
    LETTER-Biocybernetics, Neurocomputing

      Pubricized:
    2018/10/18
      Vol:
    E102-D No:1
      Page(s):
    219-222

    It is a hot issue that speeding up the network layers and decreasing the network parameters in convolutional neural networks (CNNs). In this paper, we propose a novel method, namely, symmetric decomposition of convolution kernels (SDKs). It symmetrically separates k×k convolution kernels into (k×1 and 1×k) or (1×k and k×1) kernels. We conduct the comparison experiments of the network models designed by SDKs on MNIST and CIFAR-10 datasets. Compared with the corresponding CNNs, we obtain good recognition performance, with 1.1×-1.5× speedup and more than 30% reduction of network parameters. The experimental results indicate our method is useful and effective for CNNs in practice, in terms of speedup performance and reduction of parameters.

  • Internet Anomaly Detection Based on Complex Network Path

    Jinfa WANG  Siyuan JIA  Hai ZHAO  Jiuqiang XU  Chuan LIN  

     
    PAPER-Internet

      Pubricized:
    2018/06/22
      Vol:
    E101-B No:12
      Page(s):
    2397-2408

    Detecting anomalies, such as network failure or intentional attack in Internet, is a vital but challenging task. Although numerous techniques have been developed based on Internet traffic, detecting anomalies from the perspective of Internet topology structure is going to be possible because the anomaly detection of structured datasets based on complex network theory has become a focus of attention recently. In this paper, an anomaly detection method for the large-scale Internet topology is proposed to detect local structure crashes caused by the cascading failure. In order to quantify the dynamic changes of Internet topology, the network path changes coefficient (NPCC) is put forward which highlights the Internet abnormal state after it is attacked continuously. Furthermore, inspired by Fibonacci Sequence, we proposed the decision function that can determine whether the Internet is abnormal or not. That is the current Internet is abnormal if its NPCC is out of the normal domain calculated using the previous k NPCCs of Internet topology. Finally the new Internet anomaly detection method is tested against the topology data of three Internet anomaly events. The results show that the detection accuracy of all events are over 97%, the detection precision for three events are 90.24%, 83.33% and 66.67%, when k=36. According to the experimental values of index F1, larger values of k offer better detection performance. Meanwhile, our method has better performance for the anomaly behaviors caused by network failure than those caused by intentional attack. Compared with traditional anomaly detection methods, our work is more simple and powerful for the government or organization in items of detecting large-scale abnormal events.

  • Extrinsic Camera Calibration of Display-Camera System with Cornea Reflections

    Kosuke TAKAHASHI  Dan MIKAMI  Mariko ISOGAWA  Akira KOJIMA  Hideaki KIMATA  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2018/09/26
      Vol:
    E101-D No:12
      Page(s):
    3199-3208

    In this paper, we propose a novel method to extrinsically calibrate a camera to a 3D reference object that is not directly visible from the camera. We use a human cornea as a spherical mirror and calibrate the extrinsic parameters from the reflections of the reference points. The main contribution of this paper is to present a cornea-reflection-based calibration algorithm with a simple configuration: five reference points on a single plane and one mirror pose. In this paper, we derive a linear equation and obtain a closed-form solution of extrinsic calibration by introducing two ideas. The first is to model the cornea as a virtual sphere, which enables us to estimate the center of the cornea sphere from its projection. The second is to use basis vectors to represent the position of the reference points, which enables us to deal with 3D information of reference points compactly. We demonstrate the performance of the proposed method with qualitative and quantitative evaluations using synthesized and real data.

  • Evaluating “Health Status” for DNS Resolvers

    Keyu LU  Zhaoxin ZHANG  

     
    PAPER-Internet

      Pubricized:
    2018/06/22
      Vol:
    E101-B No:12
      Page(s):
    2409-2424

    The Domain Name System (DNS) maps domain names to IP addresses. It is an important infrastructure in the Internet. Recently, DNS has experienced various security threats. DNS resolvers experience the security threats most frequently, since they interact with clients and they are the largest group of domain name servers. In order to eliminate security threats against DNS resolvers, it is essential to improve their “health status”. Since DNS resolvers' owners are not clear which DNS resolvers should be improved and how to improve “health status”, the evaluation of “health status” for DNS resolvers has become vital. In this paper, we emphasize five indicators describing “health status” for DNS resolvers, including security, integrity, availability, speed and stability. We also present nine metrics measuring the indicators. Based on the measurement of the metrics, we present a “health status” evaluation method with factor analysis. To validate our method, we measured and evaluated more than 30,000 DNS resolvers in China and Japan. The results showed that the proposed “health status” evaluation method could describe “health status” well. We also introduce instructions for evaluating a small number of DNS resolvers. And we discuss DNSSEC and its effects on resolution speed. At last, we make suggestions for inspecting and improving “health status” of DNS resolvers.

  • New Context-Adaptive Arithmetic Coding Scheme for Lossless Bit Rate Reduction of Parametric Stereo in Enhanced aacPlus

    Hee-Suk PANG  Jun-seok LIM  Hyun-Young JIN  

     
    LETTER-Speech and Hearing

      Pubricized:
    2018/09/18
      Vol:
    E101-D No:12
      Page(s):
    3258-3262

    We propose a new context-adaptive arithmetic coding (CAAC) scheme for lossless bit rate reduction of parametric stereo (PS) in enhanced aacPlus. Based on the probability analysis of stereo parameters indexes in PS, we propose a stereo band-dependent CAAC scheme for PS. We also propose a new coding structure of the scheme which is simple but effective. The proposed scheme has normal and memory-reduced versions, which are superior to the original and conventional schemes and guarantees significant bit rate reduction of PS. The proposed scheme can be an alternative to the original PS coding scheme at low bit rate, where coding efficiency is very important.

  • Real-Time Frame-Rate Control for Energy-Efficient On-Line Object Tracking

    Yusuke INOUE  Takatsugu ONO  Koji INOUE  

     
    PAPER

      Vol:
    E101-A No:12
      Page(s):
    2297-2307

    On-line object tracking (OLOT) has been a core technology in computer vision, and its importance has been increasing rapidly. Because this technology is utilized for battery-operated products, energy consumption must be minimized. This paper describes a method of adaptive frame-rate optimization to satisfy that requirement. An energy trade-off occurs between image capturing and object tracking. Therefore, the method optimizes the frame-rate based on always changed object speed for minimizing the total energy while taking into account the trade-off. Simulation results show a maximum energy reduction of 50.0%, and an average reduction of 35.9% without serious tracking accuracy degradation.

  • Order Adjustment Approach Using Cayley Graphs for the Order/Degree Problem

    Teruaki KITASUKA  Takayuki MATSUZAKI  Masahiro IIDA  

     
    PAPER-Graph Algorithms

      Pubricized:
    2018/09/18
      Vol:
    E101-D No:12
      Page(s):
    2908-2915

    The order/degree problem consists of finding the smallest diameter graph for a given order and degree. Such a graph is beneficial for designing low-latency networks with high performance for massively parallel computers. The average shortest path length (ASPL) of a graph has an influence on latency. In this paper, we propose a novel order adjustment approach. In the proposed approach, we search for Cayley graphs of the given degree that are close to the given order. We then adjust the order of the best Cayley graph to meet the given order. For some order and degree pairs, we explain how to derive the smallest known graphs from the Graph Golf 2016 and 2017 competitions.

  • On the Optimal Configuration of Grouping-Based Framed Slotted ALOHA

    Young-Beom KIM  

     
    LETTER-Information Network

      Pubricized:
    2018/08/08
      Vol:
    E101-D No:11
      Page(s):
    2823-2826

    In this letter, we consider several optimization problems associated with the configuration of grouping-based framed slotted ALOHA protocols. Closed-form formulas for determining the optimal values of system parameters such as the process termination time and confidence levels for partitioned groups are presented. Further, we address the maximum group size required for meaningful grouping gain and the effectiveness of the grouping technique in light of signaling overhead.

  • Key Parameter Estimation for Pulse Radar Signal Intercepted by Non-Cooperative Nyquist Folding Receiver

    Zhaoyang QIU  Qi ZHANG  Jun ZHU  Bin TANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:11
      Page(s):
    1934-1939

    Nyquist folding receiver (NYFR) is a novel reconnaissance receiving architecture and it can realize wideband receiving with small amount of equipment. As a tradeoff of non-cooperative wideband receiving, the NYFR output will add an unknown key parameter that is called Nyquist zone (NZ) index. In this letter, we concentrate on the NZ index estimation of the NYFR output. Focusing on the basic pulse radar signals, the constant frequency signal, the binary phase coded signal and the linear frequency modulation signal are considered. The matching component function is proposed to estimate the NZ indexes of the NYFR outputs without the prior information of the signal modulation type. In addition, the relations between the matching component function and the parameters of the NYFR are discussed. Simulation results demonstrate the efficacy of the proposed method.

161-180hit(1195hit)