The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ATI(18690hit)

1161-1180hit(18690hit)

  • Differentially Private Neural Networks with Bounded Activation Function

    Kijung JUNG  Hyukki LEE  Yon Dohn CHUNG  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/03/18
      Vol:
    E104-D No:6
      Page(s):
    905-908

    Deep learning has shown outstanding performance in various fields, and it is increasingly deployed in privacy-critical domains. If sensitive data in the deep learning model are exposed, it can cause serious privacy threats. To protect individual privacy, we propose a novel activation function and stochastic gradient descent for applying differential privacy to deep learning. Through experiments, we show that the proposed method can effectively protect the privacy and the performance of proposed method is better than the previous approaches.

  • Upper Bounds and Constructions of Locating Arrays

    Ce SHI  Jianfeng FU  Chengmin WANG  Jie YAN  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Pubricized:
    2020/11/13
      Vol:
    E104-A No:5
      Page(s):
    827-833

    The use of locating arrays is motivated by the use of generating software test suites to locate interaction faults in component-based systems. In this paper, we introduce a new combinatorial configuration, with which a general combinatorial description of $(ar{1},t)$-locating arrays is presented. Based on this characterization, a number of locating arrays by means of SSOA and difference covering arrays with prescribed properties are constructed effectively. As a consequence, upper bounds on the size of locating arrays with small number of factors are then obtained.

  • Phase Stabilization by Open Stubs for Via-Less Waveguide to Microstrip Line Transition

    Takashi MARUYAMA  Shigeo UDAGAWA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2020/11/05
      Vol:
    E104-B No:5
      Page(s):
    530-538

    We have proposed a waveguide to microstrip line transition, which perpendicularly connects one waveguide into two microstrip lines. It consists of only a waveguide and a dielectric substrate with copper foils. A backshort waveguide for typical transitions is not needed. Additionally, the transition does not require via holes on the substrate. These innovations simplify the structure and the manufacturing process. We assume that our transition and antennas are co-located on the substrate. We reduced the undesirable radiation from the transition so as not to contaminate the desirable radiation pattern. In this paper, we address output phase of our transition. Since the transition has two MSL output ports connecting to different radiation elements, the phase error between two dividing signals leads to beam shift in the radiation pattern. Unfortunately, misalignment of etching pattern between copper layers of the substrate is unavoidable. The structural asymmetry causes the phase error. In order to tolerate the misalignment, we propose to add a pair of open stubs to the transition. We show that the structure drastically stabilizes the output phase. Though the stubs create some extra radiation, we confirm that the impact is not significant. Moreover, we fabricate and measure a prototype antenna that uses the transition. In the case of with stubs, the radiation pattern is unchanged even if the misalignment is severe.

  • Single-Letter Characterizations for Information Erasure under Restriction on the Output Distribution

    Naruaki AMADA  Hideki YAGI  

     
    PAPER-Information Theory

      Pubricized:
    2020/11/09
      Vol:
    E104-A No:5
      Page(s):
    805-813

    In order to erase data including confidential information stored in storage devices, an unrelated and random sequence is usually overwritten, which prevents the data from being restored. The problem of minimizing the cost for information erasure when the amount of information leakage of the confidential information should be less than or equal to a constant asymptotically has been introduced by T. Matsuta and T. Uyematsu. Whereas the minimum cost for overwriting has been given for general sources, a single-letter characterization for stationary memoryless sources is not easily derived. In this paper, we give single-letter characterizations for stationary memoryless sources under two types of restrictions: one requires the output distribution of the encoder to be independent and identically distributed (i.i.d.) and the other requires it to be memoryless but not necessarily i.i.d. asymptotically. The characterizations indicate the relation among the amount of information leakage, the minimum cost for information erasure and the rate of the size of uniformly distributed sequences. The obtained results show that the minimum costs are different between these restrictions.

  • ICN Performance Enhancing Proxies Intended to Mitigate Performance Degradation in Global Content Delivery

    Kazuaki UEDA  Atsushi TAGAMI  

     
    PAPER

      Pubricized:
    2021/02/22
      Vol:
    E104-D No:5
      Page(s):
    637-646

    A global content delivery plays an important role in the current Internet. Information-Centric Networking (ICN) is a future internet architecture which attempts to redesign the Internet with a focus on the content delivery. However, it has the potential performance degradation in the global content delivery. In this paper, we propose an ICN performance enhancing proxy (ICN-PEP) to mitigate this performance degradation. The key idea is to prefetch Data packets and to serve them to the consumer with the shorter round trip time. By utilizing ICN features, it can be developed as an offline and state-less proxy which has an advantage of scalability. We evaluate the performance of ICN-PEP in both simulation and experiment on global testbed and show that ICN-PEP improves the performance of global content delivery.

  • A Low-Complexity QR Decomposition with Novel Modified RVD for MIMO Systems

    Lu SUN  Bin WU  Tianchun YE  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2020/11/02
      Vol:
    E104-A No:5
      Page(s):
    814-817

    In this letter, a two-stage QR decomposition scheme based on Givens rotation with novel modified real-value decomposition (RVD) is presented. With the modified RVD applied to the result from complex Givens rotation at first stage, the number of non-zero terms needed to be eliminated by real Givens rotation at second stage decreases greatly and the computational complexity is thereby reduced significantly compared to the decomposition scheme with the conventional RVD. Besides, the proposed scheme is suitable for the hardware design of QR decomposition. Evaluation shows that the proposed QR decomposition scheme is superior to the related works in terms of computational complexity.

  • Simultaneous Attack on CNN-Based Monocular Depth Estimation and Optical Flow Estimation

    Koichiro YAMANAKA  Keita TAKAHASHI  Toshiaki FUJII  Ryuraroh MATSUMOTO  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2021/02/08
      Vol:
    E104-D No:5
      Page(s):
    785-788

    Thanks to the excellent learning capability of deep convolutional neural networks (CNNs), CNN-based methods have achieved great success in computer vision and image recognition tasks. However, it has turned out that these methods often have inherent vulnerabilities, which makes us cautious of the potential risks of using them for real-world applications such as autonomous driving. To reveal such vulnerabilities, we propose a method of simultaneously attacking monocular depth estimation and optical flow estimation, both of which are common artificial-intelligence-based tasks that are intensively investigated for autonomous driving scenarios. Our method can generate an adversarial patch that can fool CNN-based monocular depth estimation and optical flow estimation methods simultaneously by simply placing the patch in the input images. To the best of our knowledge, this is the first work to achieve simultaneous patch attacks on two or more CNNs developed for different tasks.

  • Non-Invasive Monitoring of Respiratory Rate and Respiratory Status during Sleep Using a Passive Radio-Frequency Identification System

    Kagome NAYA  Toshiaki MIYAZAKI  Peng LI  

     
    PAPER-Biological Engineering

      Pubricized:
    2021/02/22
      Vol:
    E104-D No:5
      Page(s):
    762-771

    In recent years, checking sleep quality has become essential from a healthcare perspective. In this paper, we propose a respiratory rate (RR) monitoring system that can be used in the bedroom without wearing any sensor devices directly. To develop the system, passive radio-frequency identification (RFID) tags are introduced and attached to a blanket, instead of attaching them to the human body. The received signal strength indicator (RSSI) and phase values of the passive RFID tags are continuously obtained using an RFID reader through antennas located at the bedside. The RSSI and phase values change depending on the respiration of the person wearing the blanket. Thus, we can estimate the RR using these values. After providing an overview of the proposed system, the RR estimation flow is explained in detail. The processing flow includes noise elimination and irregular breathing period estimation methods. The evaluation demonstrates that the proposed system can estimate the RR and respiratory status without considering the user's body posture, body type, gender, or change in the RR.

  • Parallel Peak Cancellation Signal-Based PAPR Reduction Method Using Null Space in MIMO Channel for MIMO-OFDM Transmission Open Access

    Taku SUZUKI  Mikihito SUZUKI  Kenichi HIGUCHI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/11/20
      Vol:
    E104-B No:5
      Page(s):
    539-549

    This paper proposes a parallel peak cancellation (PC) process for the computational complexity-efficient algorithm called PC with a channel-null constraint (PCCNC) in the adaptive peak-to-average power ratio (PAPR) reduction method using the null space in a multiple-input multiple-output (MIMO) channel for MIMO-orthogonal frequency division multiplexing (OFDM) signals. By simultaneously adding multiple PC signals to the time-domain transmission signal vector, the required number of iterations of the iterative algorithm is effectively reduced along with the PAPR. We implement a constraint in which the PC signal is transmitted only to the null space in the MIMO channel by beamforming (BF). By doing so the data streams do not experience interference from the PC signal on the receiver side. Since the fast Fourier transform (FFT) and inverse FFT (IFFT) operations at each iteration are not required unlike the previous algorithm and thanks to the newly introduced parallel processing approach, the enhanced PCCNC algorithm reduces the required total computational complexity and number of iterations compared to the previous algorithms while achieving the same throughput-vs.-PAPR performance.

  • Straight-Line Dual-Polarization PSK Transmitter with Polarization Differential Modulation

    Shota ISHIMURA  Kosuke NISHIMURA  Yoshiaki NAKANO  Takuo TANEMURA  

     
    PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2020/10/27
      Vol:
    E104-B No:5
      Page(s):
    490-496

    Coherent transceivers are now regarded as promising candidates for upgrading the current 400Gigabit Ethernet (400GbE) transceivers to 800G. However, due to the complicated structure of a dual-polarization IQ modulator (DP-IQM) with its bulky polarization-beam splitter/comber (PBS/PBC), the increase in the transmitter size and cost is inevitable. In this paper, we propose a compact PBS/PBC-free transmitter structure with a straight-line configuration. By using the concept of polarization differential modulation, the proposed transmitter is capable of generating a DP phase-shift-keyed (DP-PSK) signal, which makes it directly applicable to the current coherent systems. A detailed analysis of the system performance reveals that the imperfect equalization and the bandwidth limitation at the receiver are the dominant penalty factors. Although such a penalty is usually unacceptable in long-haul applications, the proposed transmitter can be attractive due to its significant simplicity and compactness for short-reach applications, where the cost and the footprint are the primary concerns.

  • Optimization of Hybrid Energy System Configuration for Marine Diesel Engine Open Access

    Guangmiao ZENG  Rongjie WANG  Ran HAN  

     
    PAPER-Algorithms and Data Structures

      Pubricized:
    2020/11/11
      Vol:
    E104-A No:5
      Page(s):
    786-796

    Because solar energy is intermittent and a ship's power-system load fluctuates and changes abruptly, in this work, the solar radiation parameters were adjusted according to the latitude and longitude of the ship and the change of the sea environment. An objective function was constructed that accounted for the cost and service life simultaneously to optimize the configuration of the marine diesel engine hybrid energy system. Finally, the improved artificial bee colony algorithm was used to optimize and obtain the optimal system configuration. The feasibility of the method was verified by ship navigation tests. This method exhibited better configuration performance optimization than the traditional methods.

  • NetworkAPI: An In-Band Signalling Application-Aware Traffic Engineering Using SRv6 and IP Anycast

    Takuya MIYASAKA  Yuichiro HEI  Takeshi KITAHARA  

     
    PAPER

      Pubricized:
    2021/02/22
      Vol:
    E104-D No:5
      Page(s):
    617-627

    Application-aware Traffic Engineering (TE) plays a crucial role in ensuring quality of services (QoS) for recently emerging applications such as AR, VR, cloud gaming, and connected vehicles. While a deterministic application-aware TE is required for these mission-critical applications, a negotiation procedure between applications and network operators needs to undergo major simplification to fulfill the scalability of the application based on emerging microservices and container-based architecture. In this paper, we propose a NetworkAPI framework which allows an application to indicate a desired TE behavior inside IP packets by leveraging Segment Routing over IPv6 (SRv6). In the NetworkAPI framework, the TE behavior provided by the network operator is expressed as an SRv6 Segment Identifier (SID) in the form of a 128-bit IPv6 address. Because the IPv6 address of an SRv6 SID is distributed using IP anycast, the application can utilize the unchanged SRv6 SID regardless of the application's location, as if the application controls an API on the transport network. We implement a prototype of the NetworkAPI framework on a Linux kernel. On the prototype implementation, a basic packet forwarding performance is evaluated to demonstrate the feasibility of our framework.

  • Collaborative Ontology Development and its Use for Video Annotation in Elderly Care Domain

    Satoshi NISHIMURA  Julio VIZCARRA  Yuichi OOTA  Ken FUKUDA  

     
    PAPER

      Pubricized:
    2021/02/04
      Vol:
    E104-D No:5
      Page(s):
    528-538

    Multimedia data and information management is an important task according to the development of media processing technology. Multimedia is a useful resource that people understand complex situations such as the elderly care domain. Appropriate annotation is beneficial in several tasks of information management, such as storing, retrieval, and summarization of data, from a semantic perspective. However, the metadata annotation for multimedia data remains problematic because metadata is obtained as a result of interpretation depending on domain-specific knowledge, and it needs well-controlled and comprehensive vocabulary for annotation. In this study, we proposed a collaborative methodology for developing ontologies and annotation with domain experts. The method includes (1) classification of knowledge types for collaborative construction of annotation data, (2) division of tasks among a team composed of domain experts, ontology engineers, and annotators, and (3) incremental approach to ontology development. We applied the proposed method to 11 videos on elderly care domain for the confirmation of its feasibility. We focused on annotation of actions occurring in these videos, thereby the annotated data is used as a support in evaluating staff skills. The application results show the content in the ontology during annotation increases monotonically. The number of “action concepts” is saturated and reused among the case studies. This demonstrates that the ontology is reusable and could represent various case studies by using a small number of “action concepts”. This study concludes by presenting lessons learnt from the case studies.

  • Joint Channel Allocation and Routing for ZigBee/Wi-Fi Coexistent Networks

    Yosuke TANIGAWA  Shu NISHIKORI  Kazuhiko KINOSHITA  Hideki TODE  Takashi WATANABE  

     
    PAPER

      Pubricized:
    2021/02/16
      Vol:
    E104-D No:5
      Page(s):
    575-584

    With the widespread diffusion of Internet of Things (IoT), the number of applications using wireless sensor devices are increasing, and Quality of Service (QoS) required for these applications is diversifying. Thus, it becomes difficult to satisfy a variety of QoS with a single wireless system, and many kinds of wireless systems are working in the same domains; time, frequency, and place. This paper considers coexistence environments of ZigBee and Wi-Fi networks, which use the same frequency band channels, in the same place. In such coexistence environments,ZigBee devices suffer radio interference from Wi-Fi networks, which results in severe ZigBee packet losses because the transmission power of Wi-Fi is much higher than that of ZigBee. Many existing methods to avoid interference from Wi-Fi networks focus on only one of time, frequency, or space domain. However, such avoidance in one domain is insufficient particularly in near future IoT environments where more ZigBee devices and Wi-Fi stations transfer more amount of data. Therefore, in this paper, we propose joint channel allocation and routing in both frequency and space domains. Finally, we show the effectiveness of the proposed method by computer simulation.

  • Sparse Regression Model-Based Relearning Architecture for Shortening Learning Time in Traffic Prediction

    Takahiro HIRAYAMA  Takaya MIYAZAWA  Masahiro JIBIKI  Ved P. KAFLE  

     
    PAPER

      Pubricized:
    2021/02/16
      Vol:
    E104-D No:5
      Page(s):
    606-616

    Network function virtualization (NFV) enables network operators to flexibly provide diverse virtualized functions for services such as Internet of things (IoT) and mobile applications. To meet multiple quality of service (QoS) requirements against time-varying network environments, infrastructure providers must dynamically adjust the amount of computational resources, such as CPU, assigned to virtual network functions (VNFs). To provide agile resource control and adaptiveness, predicting the virtual server load via machine learning technologies is an effective approach to the proactive control of network systems. In this paper, we propose an adjustment mechanism for regressors based on forgetting and dynamic ensemble executed in a shorter time than that of our previous work. The framework includes a reducing training data method based on sparse model regression. By making a short list of training data derived from the sparse regression model, the relearning time can be reduced to about 57% without degrading provisioning accuracy.

  • An Evaluation of the Effectiveness of ECN with Fallback on the Internet

    Linzhi ZOU  Kenichi NAGAOKA  Chun-Xiang CHEN  

     
    PAPER

      Pubricized:
    2021/02/24
      Vol:
    E104-D No:5
      Page(s):
    628-636

    In this paper, we used the data set of domain names Global Top 1M provided by Alexa to analyze the effectiveness of Fallback in ECN. For the same test server, we first negotiate a connection with Not-ECN-Capable, and then negotiate a connection with ECN-Capable, if the sender does not receive the response to ECN-Capable negotiation from the receiver by the end of retransmission timeout, it will enter the Fallback state, and switch to negotiating a connection with Not-ECN-Capable. By extracting the header fields of the TCP/IP packets, we confirmed that in most regions, connectivity will be slightly improved after Fallback is enabled and Fallback has a positive effect on the total time of the whole access process. Meanwhile, we provided the updated information about the characteristics related to ECN with Fallback in different regions by considering the geographical region distribution of all targeted servers.

  • HAIF: A Hierarchical Attention-Based Model of Filtering Invalid Webpage

    Chaoran ZHOU  Jianping ZHAO  Tai MA  Xin ZHOU  

     
    PAPER

      Pubricized:
    2021/02/25
      Vol:
    E104-D No:5
      Page(s):
    659-668

    In Internet applications, when users search for information, the search engines invariably return some invalid webpages that do not contain valid information. These invalid webpages interfere with the users' access to useful information, affect the efficiency of users' information query and occupy Internet resources. Accurate and fast filtering of invalid webpages can purify the Internet environment and provide convenience for netizens. This paper proposes an invalid webpage filtering model (HAIF) based on deep learning and hierarchical attention mechanism. HAIF improves the semantic and sequence information representation of webpage text by concatenating lexical-level embeddings and paragraph-level embeddings. HAIF introduces hierarchical attention mechanism to optimize the extraction of text sequence features and webpage tag features. Among them, the local-level attention layer optimizes the local information in the plain text. By concatenating the input embeddings and the feature matrix after local-level attention calculation, it enriches the representation of information. The tag-level attention layer introduces webpage structural feature information on the attention calculation of different HTML tags, so that HAIF is better applicable to the Internet resource field. In order to evaluate the effectiveness of HAIF in filtering invalid pages, we conducted various experiments. Experimental results demonstrate that, compared with other baseline models, HAIF has improved to various degrees on various evaluation criteria.

  • An Approach for Identifying Malicious Domain Names Generated by Dictionary-Based DGA Bots

    Akihiro SATOH  Yutaka NAKAMURA  Yutaka FUKUDA  Daiki NOBAYASHI  Takeshi IKENAGA  

     
    LETTER

      Pubricized:
    2021/02/17
      Vol:
    E104-D No:5
      Page(s):
    669-672

    Computer networks are facing serious threats from the emergence of sophisticated new DGA bots. These DGA bots have their own dictionary, from which they concatenate words to dynamically generate domain names that are difficult to distinguish from human-generated domain names. In this letter, we propose an approach for identifying the callback communications of DGA bots based on relations among the words that constitute the character string of each domain name. Our evaluation indicates high performance, with a recall of 0.9977 and a precision of 0.9869.

  • A Modified Whale Optimization Algorithm for Pattern Synthesis of Linear Antenna Array

    Wentao FENG  Dexiu HU  

     
    LETTER-Numerical Analysis and Optimization

      Pubricized:
    2020/11/09
      Vol:
    E104-A No:5
      Page(s):
    818-822

    A modified whale optimization algorithm (MWOA) with dynamic leader selection mechanism and novel population updating procedure is introduced for pattern synthesis of linear antenna array. The current best solution is dynamic changed for each whale agent to overcome premature with local optima in iteration. A hybrid crossover operator is embedded in original algorithm to improve the convergence accuracy of solution. Moreover, the flow of population updating is optimized to balance the exploitation and exploration ability. The modified algorithm is tested on a 28 elements uniform linear antenna array to reduce its side lobe lever and null depth lever. The simulation results show that MWOA algorithm can improve the performance of WOA obviously compared with other algorithms.

  • A New Structure of 2-State Number-Conserving Cellular Automata

    Gil-Tak KONG  Katsunobu IMAI  Toru NAKANISHI  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2021/02/02
      Vol:
    E104-D No:5
      Page(s):
    673-678

    Two-state number-conserving cellular automaton (NCCA) is a cellular automaton of which cell states are 0 or 1, and the total sum of all the states of cells is kept for any time step. It is a kind of particle-based modeling of physical systems. We introduce a new structure of its value-1 patterns, which we call a “bundle pair” and a “bundle quad”. By employing this structure, we show a relation between the neighborhood size n and n - 2 NCCAs.

1161-1180hit(18690hit)