Abu Nowshed CHY Md Zia ULLAH Masaki AONO
Microblog, especially twitter, has become an integral part of our daily life for searching latest news and events information. Due to the short length characteristics of tweets and frequent use of unconventional abbreviations, content-relevance based search cannot satisfy user's information need. Recent research has shown that considering temporal and contextual aspects in this regard has improved the retrieval performance significantly. In this paper, we focus on microblog retrieval, emphasizing the alleviation of the vocabulary mismatch, and the leverage of the temporal (e.g., recency and burst nature) and contextual characteristics of tweets. To address the temporal and contextual aspect of tweets, we propose new features based on query-tweet time, word embedding, and query-tweet sentiment correlation. We also introduce some popularity features to estimate the importance of a tweet. A three-stage query expansion technique is applied to improve the relevancy of tweets. Moreover, to determine the temporal and sentiment sensitivity of a query, we introduce query type determination techniques. After supervised feature selection, we apply random forest as a feature ranking method to estimate the importance of selected features. Then, we make use of ensemble of learning to rank (L2R) framework to estimate the relevance of query-tweet pair. We conducted experiments on TREC Microblog 2011 and 2012 test collections over the TREC Tweets2011 corpus. Experimental results demonstrate the effectiveness of our method over the baseline and known related works in terms of precision at 30 (P@30), mean average precision (MAP), normalized discounted cumulative gain at 30 (NDCG@30), and R-precision (R-Prec) metrics.
Katsuhisa YAMANAKA Shin-ichi NAKANO
A ladder lottery, known as “Amidakuji” in Japan, is one of the most popular lotteries. In this paper, we consider the problems of enumeration, counting, and random generation of the ladder lotteries. For given two positive integers n and b, we give algorithms of enumeration, counting, and random generation of ladder lotteries with n lines and b bars. The running time of the enumeration algorithm is O(n + b) time for each. The running time of the counting algorithm is O(nb3) time. The random generation algorithm takes O(nb3) time for preprocess, and then it generates a ladder lottery in O(n + b) for each uniformly at random.
Huaning WU Yalong YAN Chao LIU Jing ZHANG
This paper introduces and uses spider monkey optimization (SMO) for synthesis sparse linear arrays, which are composed of a uniformly spaced core subarray and an extended sparse subarray. The amplitudes of all the elements and the locations of elements in the extended sparse subarray are optimized by the SMO algorithm to reduce the side lobe levels of the whole array, under a set of practical constraints. To show the efficiency of SMO, different examples are presented and solved. Simulation results of the sparse arrays designed by SMO are compared with published results to verify the effectiveness of the SMO method.
Given an undirected graph G, an edge dominating set is a subset F of edges such that each edge not in F is adjacent to some edge in F, and computing the minimum size of an edge dominating set is known to be NP-hard. Since the size of any edge dominating set is at least half of the maximum size µ(G) of a matching in G, we study the problem of testing whether a given graph G has an edge dominating set of size ⌈µ(G)/2⌉ or not. In this paper, we prove that the problem is NP-complete, whereas we design an O*(2.0801µ(G)/2)-time and polynomial-space algorithm to the problem.
Toshihiro AKAGI Shin-ichi NAKANO
In this paper we study a recently proposed variant of the facility location problem, called the r-gathering problem. Given an integer r, a set C of customers, a set F of facilities, and a connecting cost co(c, f) for each pair of c ∈ C and f ∈ F, an r-gathering of customers C to facilities F is an assignment A of C to open facilities F' ⊆ F such that at least r customers are assigned to each open facility. We give an algorithm to find an r-gathering with the minimum cost, where the cost is maxc ∈ C{co(c, A(c))}, when all C and F are on the real line.
Hidenori KUWAKADO Masazumi KURIHARA
This paper proposes secure regenerating codes that are composed of non-secure regenerating codes and a new all-or-nothing transform. Unlike the previous analysis of secure regenerating codes, the security of the proposed codes is analyzed in the sense of the indistinguishability. The advantage of the proposed codes is that the overhead caused by the security against eavesdropping is much less than that of previous secure regenerating codes. The security of the proposed codes against eavesdropping mainly depends on the new all-or-nothing transform.
Zhiqiang HU Dongju LI Tsuyoshi ISSHIKI Hiroaki KUNIEDA
Narrow swipe sensor based systems have drawn more and more attention in recent years. However, the size of captured image is significantly smaller than that obtained from the traditional area fingerprint sensor. Under this condition the available minutiae number is also limited. Therefore, only employing minutiae with the standard associated feature can hardly achieve high verification accuracy. To solve this problem, we present a novel Hybrid Minutiae Descriptor (HMD) which consists of two modules. The first one: Minutiae Ridge-Valley Orientation Descriptor captures the orientation information around minutia and also the trace points located at associated ridge and valley. The second one: Gabor Binary Code extracts and codes the image patch around minutiae. The proposed HMD enhances the representation capability of minutiae feature, and can be matched very efficiently. Experiments conducted over public databases and the database captured by the narrow swipe sensor show that this innovative method gives rise to significant improvements in reducing FRR (False Reject Rate) and EER (Equal Error Rate).
Yuan WANG Guangyi LU Yize WANG Xing ZHANG
This work reports a novel power-rail electrostatic discharge (ESD) clamp circuit with parasitic bipolar-junction-transistor (BJT) and channel parallel shunt paths. The parallel shunt paths are formed by delivering a tiny ratio of drain voltage to the gate terminal of the clamp device in ESD events. Under such a mechanism, the proposed circuit achieves enhanced robustness over those of both gate-grounded NMOS (ggNMOS) and the referenced gate-coupled NMOS (gcNMOS). Besides, the proposed circuit also achieves improved fast power-up immunity over that of the referenced gcNMOS. All investigated designs are fabricated in a 65-nm CMOS process. Transmission-line-pulsing (TLP) and human-body-model (HBM) test results have both confirmed the performance enhancements of the proposed circuit. Finally, the validity of the achieved performance enhancements on other trigger circuits is essentially revealed in this work.
Surapol TAN-A-RAM Watit BENJAPOLAKUL
In this paper, we propose to use a strategy for the two-user Gaussian X channel with limited receiver cooperation in the general case consisting of two parts: 1) the transmission scheme where the superposition coding is used and 2) the cooperative protocol where the two-round strategy based on quantize-map-and-forward (QMF) is employed. We image that a Gaussian X channel can be considered as a superposition of two Gaussian interference channels based on grouping of the sent messages from each transmitter to the corresponding receivers. Finally, we give an achievable rate region for the general case of this channel.
Duksoo KIM Byungjoon KIM Sangwook NAM
A wideband noise-cancelling receiver front-end is proposed in this brief. As a basic architecture, a low-noise transconductance amplifier, a passive mixer, and a transimpedance amplifier are employed to compose the wideband receiver. To achieve wideband input matching for the transconductor, a global feedback method is adopted. Since the wideband receiver has to minimize linearity degradation if a large blocker signal exists out-of-band, a linearization technique is applied for the transconductor circuit. The linearization cancels third-order intermodulation distortion components and increases linearity; however, the additional circuits used in linearization generate excessive noise. A noise-cancelling architecture that employs an auxiliary path cancels noise signals generated in the main path. The designed receiver front-end is fabricated using a 65-nm CMOS process. The receiver operates in the frequency range of 25 MHz-2 GHz with a gain of 49.7 dB. The in-band input-referred third-order intercept point is improved by 12.3 dB when the linearization is activated, demonstrating the effectiveness of the linearization technique.
Kyunghoon LEE Dong Hun LEE Wonjun HWANG Hyung-Jin CHOI
3GPP (3rd Generation Partnership Project) has started to discuss D2D (Device-to-Device)-aided OTDOA (Observed Time Difference Of Arrival) as one of the mobile positioning enhancement techniques for LTE (Long Term Evolution) systems. It is a kind of multi-node based OTDOA which directly receives D2D signals from adjacent multiple UEs (User Equipment) to measure RSTD (Reference Signal's Time Difference). D2D signals provide valuable advantages in terms of OTDOA positioning because it can guarantee more reference nodes and high SNR (Signal-to-Noise Ratio) of PRS (Positioning Reference Signal). Two typical methods for multi-node based OTDOA can be applied to D2D-aided OTDOA. Multiple OTDOA positioning is one of the multi-node based methods that averages multiple results from OTDOA; however, it cannot always guarantee high accuracy due to the non-uniform geometry of UEs. OTDOA positioning based on TSE (Taylor Series Expansion) algorithm may be one of the solutions; however, it has the initial value problem and high computational complexity due to its iterative procedure. Therefore, in this paper, we propose a novel D2D-aided OTDOA positioning method which utilizes UEs not as reference node of OTDOA but as assisting node for RSTD error reduction. The proposed method can reduce RSTD error of eNB based hyperbola by using multiple hyperbola bands. The hyperbola band indicates the possible range in which a hyperbola can occur due to RSTD error. Then, by using principal axes of hyperbolas, we estimate a modified hyperbola from the overlap area of hyperbola bands, which has less RSTD error. We verify that the proposed method can effectively reduce RSTD error and improve positioning performance with lower computational complexity.
Yulong XU Yang LI Jiabao WANG Zhuang MIAO Hang LI Yafei ZHANG
Feature extractor plays an important role in visual tracking, but most state-of-the-art methods employ the same feature representation in all scenes. Taking into account the diverseness, a tracker should choose different features according to the videos. In this work, we propose a novel feature adaptive correlation tracker, which decomposes the tracking task into translation and scale estimation. According to the luminance of the target, our approach automatically selects either hierarchical convolutional features or histogram of oriented gradient features in translation for varied scenarios. Furthermore, we employ a discriminative correlation filter to handle scale variations. Extensive experiments are performed on a large-scale benchmark challenging dataset. And the results show that the proposed algorithm outperforms state-of-the-art trackers in accuracy and robustness.
Xingge GUO Liping HUANG Ke GU Leida LI Zhili ZHOU Lu TANG
The quality assessment of screen content images (SCIs) has been attractive recently. Different from natural images, SCI is usually a mixture of picture and text. Traditional quality metrics are mainly designed for natural images, which do not fit well into the SCIs. Motivated by this, this letter presents a simple and effective method to naturalize SCIs, so that the traditional quality models can be applied for SCI quality prediction. Specifically, bicubic interpolation-based up-sampling is proposed to achieve this goal. Extensive experiments and comparisons demonstrate the effectiveness of the proposed method.
Jinwoo LEE Jae Woo SEO Kookrae CHO Pil Joong LEE Dae Hyun YUM
The Android pattern unlock is a widely adopted graphical password system that requires a user to draw a secret pattern connecting points arranged in a grid. The theoretical security of pattern unlock can be defined by the number of possible patterns. However, only upper bounds of the number of patterns have been known except for 3×3 and 4×4 grids for which the exact number of patterns was found by brute-force enumeration. In this letter, we present the first lower bound by computing the minimum number of visible points from each point in various subgrids.
Hanxu YOU Wei LI Lianqiang LI Jie ZHU
A text-dependent i-vector extraction scheme and a lexicon-based binary vector (L-vector) representation are proposed to improve the performance of text-dependent speaker verification. I-vector and L-vector are used to represent the utterances for enrollment and test. An improved cosine distance kernel is constructed by combining i-vector and L-vector together and is used to distinguish both speaker identity and lexical (or text) diversity with back-end support vector machine (SVM). Experiments are conducted on RSR 2015 Corpus part 1 and part 2, the results indicate that at most 30% improvement can be obtained compared with traditional i-vector baseline.
Thamarak KHAMPEERPAT Chaiporn JAIKAEO
Wireless sensor networks are being used in many disaster-related applications. Certain types of disasters are studied and modeled with different and dynamic risk estimations in different areas, hence requiring different levels of monitoring. Such nonuniform and dynamic coverage requirements pose a challenge to a sensor coverage problem. This work proposes the Mobile sensor Relocation using Delaunay triangulation And Shifting on Hill climbing (MR-DASH) approach, which calculates an appropriate location for each mobile sensor as an attempt to maximize coverage ratio. Based on a probabilistic sensing model, it constructs a Delaunay triangulation from static sensors' locations and vertices of interesting regions. The resulting triangles are then prioritized based on their sizes and corresponding levels of requirement so that mobile sensors can be relocated accordingly. The proposed method was both compared with an existing previous work and demonstrated with real-world disaster scenarios by simulation. The result showed that MR-DASH gives appropriate target locations that significantly improve the coverage ratio with relatively low total sensors' moving distance, while properly adapting to variations in coverage requirements.
We consider the problem of two-dimensional (2-D) angles of arrival estimation using a newly proposed structure of nonuniform linear array, referred to as nested coprime array with compressed inter-element spacing (CACIS). By constructing a cross-correlation matrix of the received signals, the nested CACIS exhibits a larger number of degrees of freedom. A two-step weighted l1-norm penalty strategy is proposed to fully utilize these degrees of freedom, where the weight matrices are constructed by MUSIC spectrum function and the threshold function, respectively. The proposed method has several salient advantages over the compared method, including increased resolution and accuracy, estimating many more number of sources and suppressing spurious peaks efficiently. Simulation results validate the superiority of the proposed method.
Hidekazu MURATA Makoto MIYAGOSHI Yuji OISHI
The end-to-end packet error rate (PER) performance of a multi-hop cooperative relaying system is discussed in this paper. In this system, the end-to-end PER performance improves with the number of hops under certain conditions. The PER performance of multi-hop cooperative networks is analyzed with the state transition technique. The theoretical analysis reveals that the PER performance can be kept almost constant, or even improved, as the number of hops is increased. Computer simulation results agree closely with the analysis results. Moreover, to confirm this performance characteristic in an actual setup, an in-lab experiment using a fading emulator was conducted. The experimental results confirm the theoretical end-to-end PER performance of this system.
Zedong XIE Xihong CHEN Xiaopeng LIU Lunsheng XUE Yu ZHAO
The impact of intersymbol interference (ISI) on single carrier frequency domain equalization with multiple input multiple output (MIMO-SCFDE) systems is severe. Most existing channel equalization methods fail to solve it completely. In this paper, given the disadvantages of the error propagation and the gap from matched filter bound (MFB), we creatively introduce a decision feedback equalizer with frequency-domain bidirectional noise prediction (DFE-FDBiNP) to tackle intersymbol interference (ISI) in MIMO-SCFDE systems. The equalizer has two-part equalizer, that is the normal mode and the time-reversal mode decision feedback equalization with noise prediction (DFE-NP). Equal-gain combining is used to realize a greatly simplified and low complexity diversity combining. Analysis and simulation results validate the improved performance of the proposed method in quasi-static frequency-selective fading MIMO channel for a typical urban environment.
Lei SUN Fang-Wei FU Xuan GUANG
Recent research has shown that the class of rotation symmetric Boolean functions is beneficial to cryptographics. In this paper, for an odd prime p, two sufficient conditions for p-variable rotation symmetric Boolean functions to be 1-resilient are obtained, and then several concrete constructions satisfying the conditions are presented. This is the first time that resilient rotation symmetric Boolean functions have been systematically constructed. In particular, we construct a class of 2-resilient rotation symmetric Boolean functions when p=2m+1 for m ≥ 4. Moreover, several classes of 1-order correlation immune rotation symmetric Boolean functions are also got.