The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

2061-2080hit(18690hit)

  • Recursive Nearest Neighbor Graph Partitioning for Extreme Multi-Label Learning

    Yukihiro TAGAMI  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/11/30
      Vol:
    E102-D No:3
      Page(s):
    579-587

    As the data size of Web-related multi-label classification problems continues to increase, the label space has also grown extremely large. For example, the number of labels appearing in Web page tagging and E-commerce recommendation tasks reaches hundreds of thousands or even millions. In this paper, we propose a graph partitioning tree (GPT), which is a novel approach for extreme multi-label learning. At an internal node of the tree, the GPT learns a linear separator to partition a feature space, considering approximate k-nearest neighbor graph of the label vectors. We also developed a simple sequential optimization procedure for learning the linear binary classifiers. Extensive experiments on large-scale real-world data sets showed that our method achieves better prediction accuracy than state-of-the-art tree-based methods, while maintaining fast prediction.

  • Fabrication and Evaluation of Integrated Photonic Array-Antenna System for RoF Based Remote Antenna Beam Forming

    Takayoshi HIRASAWA  Shigeyuki AKIBA  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Lasers, Quantum Electronics

      Vol:
    E102-C No:3
      Page(s):
    235-242

    This paper studies the performance of the quantitative RF power variation in Radio-over-Fiber beam forming system utilizing a phased array-antenna integrating photo-diodes in downlink network for next generation millimeter wave band radio access. Firstly, we described details of fabrication of an integrated photonic array-antenna (IPA), where a 60GHz patch antenna 4×2 array and high-speed photo-diodes were integrated into a substrate. We evaluated RF transmission efficiency as an IPA system for Radio-over-Fiber (RoF)-based mobile front hall architecture with remote antenna beam forming capability. We clarified the characteristics of discrete and integrated devices such as an intensity modulator (IM), an optical fiber and the IPA and calculated RF power radiated from the IPA taking account of the measured data of the devices. Based on the experimental results on RF tone signal transmission by utilizing the IPA, attainable transmission distance of wireless communication by improvement and optimization of the used devices was discussed. We deduced that the antenna could output sufficient power when we consider that the cell size of the future mobile communication systems would be around 100 meters or smaller.

  • Recognition of Collocation Frames from Sentences

    Xiaoxia LIU  Degen HUANG  Zhangzhi YIN  Fuji REN  

     
    PAPER-Natural Language Processing

      Pubricized:
    2018/12/14
      Vol:
    E102-D No:3
      Page(s):
    620-627

    Collocation is a ubiquitous phenomenon in languages and accurate collocation recognition and extraction is of great significance to many natural language processing tasks. Collocations can be differentiated from simple bigram collocations to collocation frames (referring to distant multi-gram collocations). So far little focus is put on collocation frames. Oriented to translation and parsing, this study aims to recognize and extract the longest possible collocation frames from given sentences. We first extract bigram collocations with distributional semantics based method by introducing collocation patterns and integrating some state-of-the-art association measures. Based on bigram collocations extracted by the proposed method, we get the longest collocation frames according to recursive nature and linguistic rules of collocations. Compared with the baseline systems, the proposed method performs significantly better in bigram collocation extraction both in precision and recall. And in extracting collocation frames, the proposed method performs even better with the precision similar to its bigram collocation extraction results.

  • Rectifying Transformation Networks for Transformation-Invariant Representations with Power Law

    Chunxiao FAN  Yang LI  Lei TIAN  Yong LI  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2018/12/04
      Vol:
    E102-D No:3
      Page(s):
    675-679

    This letter proposes a representation learning framework of convolutional neural networks (Convnets) that aims to rectify and improve the feature representations learned by existing transformation-invariant methods. The existing methods usually encode feature representations invariant to a wide range of spatial transformations by augmenting input images or transforming intermediate layers. Unfortunately, simply transforming the intermediate feature maps may lead to unpredictable representations that are ineffective in describing the transformed features of the inputs. The reason is that the operations of convolution and geometric transformation are not exchangeable in most cases and so exchanging the two operations will yield the transformation error. The error may potentially harm the performance of the classification networks. Motivated by the fractal statistics of natural images, this letter proposes a rectifying transformation operator to minimize the error. The proposed method is differentiable and can be inserted into the convolutional architecture without making any modification to the optimization algorithm. We show that the rectified feature representations result in better classification performance on two benchmarks.

  • Passive Localization Algorithm for Spaceborne SAR Using NYFR and Sparse Bayesian Learning

    Yifei LIU  Yuan ZHAO  Jun ZHU  Bin TANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E102-A No:3
      Page(s):
    581-585

    A novel Nyquist Folding Receiver (NYFR) based passive localization algorithm with Sparse Bayesian Learning (SBL) is proposed to estimate the position of a spaceborne Synthetic Aperture Radar (SAR).Taking the geometry and kinematics of a satellite into consideration, this paper presents a surveillance geometry model, which formulates the localization problem into a sparse vector recovery problem. A NYFR technology is utilized to intercept the SAR signal. Then, a convergence algorithm with SBL is introduced to recover the sparse vector. Furthermore, simulation results demonstrate the availability and performance of our algorithm.

  • Resilient Edge: A Scalable, Robust Network Function Backend

    Yutaro HAYAKAWA  Kenichi YASUKATA  Jin NAKAZAWA  Michio HONDA  

     
    PAPER-Information Network

      Pubricized:
    2018/12/04
      Vol:
    E102-D No:3
      Page(s):
    550-558

    Increasing hardware resources, such as multi-core and multi-socket CPUs, memory capacity and high-speed NICs, impose significant challenges on Network Function Virtualization (NFV) backends. They increase the potential numbers of per-server NFs or tenants, which requires a packet switching architecture that is not only scalable to large number of virtual ports, but also robust to attacks on the data plane. This is a real problem; a recent study has reported that Open vSwitch, a widely used software switch, had a buffer-overflow bug in its data plane that results the entire SDN domain to be hijacked by worms propagated in the network. In order to address this problem, we propose REdge. It scales to thousands of virtual ports or NFs (as opposed to hundreds in the current state-of-the art), and protect modular, flexible packet switching logic against various bugs, such as buffer overflow and other unexpected operations using static program checking. When 2048 NFs are active and packets are distributed to them based on the MAC or IP addresses, REdge achieves 3.16 Mpps or higher packet forwarding rates for 60 byte packets and achieves the wire rate for 1500 byte packets in the 25 Gbps link.

  • Shortcut Creation for MeNW in the Consideration of Topological Structure and Message Exchanged Open Access

    Masahiro JIBIKI  Suyong EUM  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    464-473

    This article proposes a method to improve the performance of Message Exchange Network (MeNW) which is modern data distribution network incorporating the search and obtain mechanism. We explore an idea of shortcut creation which can be widely adapted to a topological structure of various network applications. We first define a metric called Efficiency Coefficient (EC) that quantifies the performance enhancement by a shortcut creation. In the design of EC, we consider not only diameter of the topology but also the amount of messages exchanged in the network. Then, we theoretically analyze the creation of a single optimal shortcut in the system based on the performance metric. The simulation results show that the shortcut by the proposed method reduces the network resource to further 30% compared with conventional approaches.

  • Efficient Enumeration of Flat-Foldable Single Vertex Crease Patterns

    Koji OUCHI  Ryuhei UEHARA  

     
    PAPER

      Pubricized:
    2018/10/31
      Vol:
    E102-D No:3
      Page(s):
    416-422

    We investigate enumeration of distinct flat-foldable crease patterns under the following assumptions: positive integer n is given; every pattern is composed of n lines incident to the center of a sheet of paper; every angle between adjacent lines is equal to 2π/n; every line is assigned one of “mountain,” “valley,” and “flat (or consequently unfolded)”; crease patterns are considered to be equivalent if they are equal up to rotation and reflection. In this natural problem, we can use two well-known theorems for flat-foldability: the Kawasaki Theorem and the Maekawa Theorem in computational origami. Unfortunately, however, they are not enough to characterize all flat-foldable crease patterns. Therefore, so far, we have to enumerate and check flat-foldability one by one using computer. In this study, we develop the first algorithm for the above stated problem by combining these results in a nontrivial way and show its analysis of efficiency.

  • Incorporation of Faulty Prior Knowledge in Multi-Target Device-Free Localization

    Dongping YU  Yan GUO  Ning LI  Qiao SU  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E102-A No:3
      Page(s):
    608-612

    As an emerging and promising technique, device-free localization (DFL) has drawn considerable attention in recent years. By exploiting the inherent spatial sparsity of target localization, the compressive sensing (CS) theory has been applied in DFL to reduce the number of measurements. In practical scenarios, a prior knowledge about target locations is usually available, which can be obtained by coarse localization or tracking techniques. Among existing CS-based DFL approaches, however, few works consider the utilization of prior knowledge. To make use of the prior knowledge that is partly or erroneous, this paper proposes a novel faulty prior knowledge aided multi-target device-free localization (FPK-DFL) method. It first incorporates the faulty prior knowledge into a three-layer hierarchical prior model. Then, it estimates location vector and learns model parameters under a variational Bayesian inference (VBI) framework. Simulation results show that the proposed method can improve the localization accuracy by taking advantage of the faulty prior knowledge.

  • Security Performance Analysis for Relay Selection in Cooperative Communication System under Nakagami-m Fading Channel

    Guangna ZHANG  Yuanyuan GAO  Huadong LUO  Nan SHA  Shijie WANG  Kui XU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/09/14
      Vol:
    E102-B No:3
      Page(s):
    603-612

    In this paper, we investigate a cooperative communication system comprised of a source, a destination, and multiple decode-and-forward (DF) relays in the presence of a potential malicious eavesdropper is within or without the coverage area of the source. Based on the more general Nakagami-m fading channels, we analyze the security performance of the single-relay selection and multi-relay selection schemes for protecting the source against eavesdropping. In the single-relay selection scheme, only the best relay is chosen to assist in the source transmission. Differing from the single-relay selection, multi-relay selection scheme allows multiple relays to forward the source to the destination. We also consider the classic direct transmission as a benchmark scheme to compare with the two relay selection schemes. We derive the exact closed-form expressions of outage probability (OP) and intercept probability (IP) for the direct transmission, the single-relay selection as well as the multi-relay selection scheme over Nakagami-m fading channel when the eavesdropper is within and without the coverage area of the source. Moreover, the security-reliability tradeoff (SRT) of these three schemes are also analyzed. It is verified that the SRT of the multi-relay selection consistently outperforms the single-relay selection, which of both the single-relay and multi-relay selection schemes outperform the direct transmission when the number of relays is large, no matter the eavesdropper is within or without the coverage of the source. In addition, as the number of DF relays increases, the SRT of relay selection schemes improve notably. However, the SRT of both two relay selection approaches become worse when the eavesdropper is within the coverage area of the source.

  • Quantum Information Processing with Superconducting Nanowire Single-Photon Detectors Open Access

    Takashi YAMAMOTO  

     
    INVITED PAPER

      Vol:
    E102-C No:3
      Page(s):
    224-229

    Superconducting nanowire single-photon detector(SNSPD) has been one of the important ingredients for photonic quantum information processing (QIP). In order to see the potential of SNSPDs, I briefly review recent progresses of the photonic QIP with SNSPDs implemented for various purposes and present a possible direction for the development of SNSPDs.

  • A Foreground-Background-Based CTU λ Decision Algorithm for HEVC Rate Control of Surveillance Videos

    Zhenglong YANG  Guozhong WANG  GuoWei TENG  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2018/12/18
      Vol:
    E102-D No:3
      Page(s):
    670-674

    Although HEVC rate control can achieve high coding efficiency, it still does not fully utilize the special characteristics of surveillance videos, which typically have a moving foreground and relatively static background. For surveillance videos, it is usually necessary to provide a better coding quality of the moving foreground. In this paper, a foreground-background CTU λ separate decision scheme is proposed. First, low-complexity pixel-based segmentation is presented to obtain the foreground and the background. Second, the rate distortion (RD) characteristics of the foreground and the background are explored. With the rate distortion optimization (RDO) process, the average CTU λ value of the foreground or the background should be equal to the frame λ. Then, a separate optimal CTU λ decision is proposed with a separate λ clipping method. Finally, a separate updating process is used to obtain reasonable parameters for the foreground and the background. The experimental results show that the quality of the foreground is improved by 0.30 dB in the random access configuration and 0.45 dB in the low delay configuration without degradation of either the rate control accuracy or whole frame quality.

  • Faster-ADNet for Visual Tracking

    Tiansa ZHANG  Chunlei HUO  Zhiqiang ZHOU  Bo WANG  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2018/12/12
      Vol:
    E102-D No:3
      Page(s):
    684-687

    By taking advantages of deep learning and reinforcement learning, ADNet (Action Decision Network) outperforms other approaches. However, its speed and performance are still limited by factors such as unreliable confidence score estimation and redundant historical actions. To address the above limitations, a faster and more accurate approach named Faster-ADNet is proposed in this paper. By optimizing the tracking process via a status re-identification network, the proposed approach is more efficient and 6 times faster than ADNet. At the same time, the accuracy and stability are enhanced by historical actions removal. Experiments demonstrate the advantages of Faster-ADNet.

  • Congestion Avoidance Using Multiple Virtual Networks

    Tsuyoshi OGURA  Tatsuya FUJII  

     
    PAPER-Network

      Pubricized:
    2018/08/31
      Vol:
    E102-B No:3
      Page(s):
    557-570

    If a shared IP network is to deliver large-volume streaming media content, such as real-time videos, we need a technique for explicitly setting and dynamically changing the transmission paths used to respond to the congestion situation of the network, including multi-path transmission of a single-flow, to maximize network bandwidth utilization and stabilize transmission quality. However, current technologies cannot realize flexible multi-path transmission because they require complicated algorithms for route searching and the control load for route changing is excessive. This paper proposes a scheme that realizes routing control for multi-path transmission by combining multiple virtual networks on the same physical network. The proposed scheme lowers the control load incurred in creating a detour route because routing control is performed by combining existing routing planes. In addition, our scheme simplifies route searching procedure because congestion avoidance control of multi-path transmission can be realized by the control of a single path. An experiment on the JGN-X network virtualization platform finds that while the time taken to build an inter-slice link must be improved, the time required to inspect whether each slice has virtual nodes that can be connected to the original slice and be used as a detour destination can be as short as 40 microseconds per slice even with large slices having more than 100 virtual nodes.

  • The Explicit Formula of the Presumed Optimal Recurrence Relation for the Star Tower of Hanoi Open Access

    Akihiro MATSUURA  Yoshiaki SHOJI  

     
    PAPER

      Pubricized:
    2018/10/30
      Vol:
    E102-D No:3
      Page(s):
    492-498

    In this paper, we show the explicit formula of the recurrence relation for the Tower of Hanoi on the star graph with four vertices, where the perfect tower of disks on a leaf vertex is transferred to the central vertex. This gives the solution to the problem posed at the 17th International Conference on Fibonacci Numbers and Their Applications[11]. Then, the recurrence relation are generalized to include the ones for the original 4-peg Tower of Hanoi and the Star Tower of Hanoi of transferring the tower from a leaf to another.

  • Multi-View Synthesis and Analysis Dictionaries Learning for Classification

    Fei WU  Xiwei DONG  Lu HAN  Xiao-Yuan JING  Yi-mu JI  

     
    LETTER-Pattern Recognition

      Pubricized:
    2018/11/27
      Vol:
    E102-D No:3
      Page(s):
    659-662

    Recently, multi-view dictionary learning technique has attracted lots of research interest. Although several multi-view dictionary learning methods have been addressed, they can be further improved. Most of existing multi-view dictionary learning methods adopt the l0 or l1-norm sparsity constraint on the representation coefficients, which makes the training and testing phases time-consuming. In this paper, we propose a novel multi-view dictionary learning approach named multi-view synthesis and analysis dictionaries learning (MSADL), which jointly learns multiple discriminant dictionary pairs with each corresponding to one view and containing a structured synthesis dictionary and a structured analysis dictionary. MSADL utilizes synthesis dictionaries to achieve class-specific reconstruction and uses analysis dictionaries to generate discriminative code coefficients by linear projection. Furthermore, we design an uncorrelation term for multi-view dictionary learning, such that the redundancy among synthesis dictionaries learned from different views can be reduced. Two widely used datasets are employed as test data. Experimental results demonstrate the efficiency and effectiveness of the proposed approach.

  • Quantum Query Complexity of Unitary Operator Discrimination Open Access

    Akinori KAWACHI  Kenichi KAWANO  Francois LE GALL  Suguru TAMAKI  

     
    PAPER

      Pubricized:
    2018/11/08
      Vol:
    E102-D No:3
      Page(s):
    483-491

    Unitary operator discrimination is a fundamental problem in quantum information theory. The basic version of this problem can be described as follows: Given a black box implementing a unitary operator U∈S:={U1, U2} under some probability distribution over S, the goal is to decide whether U=U1 or U=U2. In this paper, we consider the query complexity of this problem. We show that there exists a quantum algorithm that solves this problem with bounded error probability using $lceil{sqrt{6} heta_{ m cover}^{-1}} ceil$ queries to the black box in the worst case, i.e., under any probability distribution over S, where the parameter θcover, which is determined by the eigenvalues of $U_1^dagger {U_2}$, represents the “closeness” between U1 and U2. We also show that this upper bound is essentially tight: we prove that for every θcover > 0 there exist operators U1 and U2 such that any quantum algorithm solving this problem with bounded error probability requires at least $lceil{ rac{2}{3 heta_{ m cover}}} ceil$ queries under uniform distribution over S.

  • Space-Optimal Population Protocols for Uniform Bipartition Under Global Fairness

    Hiroto YASUMI  Fukuhito OOSHITA  Ken'ichi YAMAGUCHI  Michiko INOUE  

     
    PAPER

      Pubricized:
    2018/10/30
      Vol:
    E102-D No:3
      Page(s):
    454-463

    In this paper, we consider a uniform bipartition problem in a population protocol model. The goal of the uniform bipartition problem is to divide a population into two groups of the same size. We study the problem under global fairness with various assumptions: 1) a population with or without a base station, 2) symmetric or asymmetric protocols, and 3) designated or arbitrary initial states. As a result, we completely clarify solvability of the uniform bipartition problem under global fairness and, if solvable, show the tight upper and lower bounds on the number of states.

  • Accurate Library Recommendation Using Combining Collaborative Filtering and Topic Model for Mobile Development

    Xiaoqiong ZHAO  Shanping LI  Huan YU  Ye WANG  Weiwei QIU  

     
    PAPER-Software Engineering

      Pubricized:
    2018/12/18
      Vol:
    E102-D No:3
      Page(s):
    522-536

    Background: The applying of third-party libraries is an integral part of many applications. But the libraries choosing is time-consuming even for experienced developers. The automated recommendation system for libraries recommendation is widely researched to help developers to choose libraries. Aim: from software engineering aspect, our research aims to give developers a reliable recommended list of third-party libraries at the early phase of software development lifecycle to help them build their development environment faster; and from technical aspect, our research aims to build a generalizable recommendation system framework which combines collaborative filtering and topic modeling techniques, in order to improve the performance of libraries recommendation significantly. Our works on this research: 1) we design a hybrid methodology to combine collaborative filtering and LDA text mining technology; 2) we build a recommendation system framework successfully based on the above hybrid methodology; 3) we make a well-designed experiment to validate the methodology and framework which use the data of 1,013 mobile application projects; 4) we do the evaluation for the result of the experiment. Conclusions: 1) hybrid methodology with collaborative filtering and LDA can improve the performance of libraries recommendation significantly; 2) based on the hybrid methodology, the framework works very well on the libraries recommendation for helping developers' libraries choosing. Further research is necessary to improve the performance of the libraries recommendation including: 1) use more accurate NLP technologies improve the correlation analysis; 2) try other similarity calculation methodology for collaborative filtering to rise the accuracy; 3) on this research, we just bring the time-series approach to the framework and make an experiment as comparative trial, the result shows that the performance improves continuously, so in further research we plan to use time-series data-mining as the basic methodology to update the framework.

  • Superconducting Digital Electronics for Controlling Quantum Computing Systems Open Access

    Nobuyuki YOSHIKAWA  

     
    INVITED PAPER

      Vol:
    E102-C No:3
      Page(s):
    217-223

    The recent rapid increase in the scale of superconducting quantum computing systems greatly increases the demand for qubit control by digital circuits operating at qubit temperatures. In this paper, superconducting digital circuits, such as single-flux quantum and adiabatic quantum flux parametron circuits are described, that are promising candidates for this purpose. After estimating their energy consumption and speed, a conceptual overview of the superconducting electronics for controlling a multiple-qubit system is provided, as well as some of its component circuits.

2061-2080hit(18690hit)