The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

3601-3620hit(20498hit)

  • Controllability Analysis of Aggregate Demand Response System in Multiple Price-Change Situation

    Kazuhiro SATO  Shun-ichi AZUMA  

     
    PAPER

      Vol:
    E100-A No:2
      Page(s):
    376-384

    The paper studies controllability of an aggregate demand response system, i.e., the amount of the change of the total electric consumption in response to the change of the electric price, for real-time pricing (RTP). In order to quantify the controllability, this paper defines the controllability index as the lowest occurrence probability of the total electric consumption when the best possible the electric price is chosen. Then the paper formulates the problem which finds the consumer group maximizing the controllability index. The controllability problem becomes hard to solve as the number of consumers increases. To give a solution of the controllability problem, the article approximates the controllability index by the generalized central limit theorem. Using the approximated controllability index, the controllability problem can be reduced to a problem for solving nonlinear equations. Since the number of variables of the equations is independent of the number of consumers, an approximate solution of the controllability problem is obtained by numerically solving the equations.

  • Automatically Extracting Parallel Sentences from Wikipedia Using Sequential Matching of Language Resources

    Juryong CHEON  Youngjoong KO  

     
    LETTER-Natural Language Processing

      Pubricized:
    2016/11/11
      Vol:
    E100-D No:2
      Page(s):
    405-408

    In this paper, we propose a method to find similar sentences based on language resources for building a parallel corpus between English and Korean from Wikipedia. We use a Wiki-dictionary consisted of document titles from the Wikipedia and bilingual example sentence pairs from Web dictionary instead of traditional machine readable dictionary. In this way, we perform similarity calculation between sentences using sequential matching of the language resources, and evaluate the extracted parallel sentences. In the experiments, the proposed parallel sentences extraction method finally shows 65.4% of F1-score.

  • Interference-Aware Dynamic Channel Assignment for Dense Small-Cell Networks

    ByungBog LEE  IlKwon CHO  Se-Jin KIM  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E100-A No:2
      Page(s):
    757-760

    An interference-aware dynamic channel assignment scheme is proposed with consideration of co-tier interference for the downlink of an OFDMA/FDD based dense small-cell network. The proposed scheme adaptively assigns subchannels to the small-cell user equipment (SUE) according to the given traffic load and interference effect from neighbor small-cell access points. The simulation results show that the proposed scheme outperforms the other schemes based on the graph coloring algorithm in terms of the mean SUE capacity.

  • On the Interference Alignment Designs for Secure Multiuser MIMO Systems

    Kha HOANG HA  Thanh TUNG VU  Trung QUANG DUONG  Nguyen-Son VO  

     
    PAPER-Communication Theory and Signals

      Vol:
    E100-A No:2
      Page(s):
    670-679

    In this paper, we propose two secure multiuser multiple-input multiple-output (MIMO) transmission approaches based on interference alignment (IA) in the presence of an eavesdropper. To deal with the information leakage to the eavesdropper as well as the interference signals from undesired transmitters (Txs) at desired receivers (Rxs), our approaches aim to design the transmit precoding and receive subspace matrices to minimize both the total inter-main-link interference and the wiretapped signals (WSs). The first proposed IA scheme focuses on aligning the WSs into proper subspaces while the second one imposes a new structure on the precoding matrices to force the WSs to zero. In each proposed IA scheme, the precoding matrices and the receive subspaces at the legitimate users are alternatively selected to minimize the cost function of a convex optimization problem for every iteration. We provide the feasible conditions and the proofs of convergence for both IA approaches. The simulation results indicate that our two IA approaches outperform the conventional IA algorithm in terms of the average secrecy sum rate.

  • Face Hallucination by Learning Local Distance Metric

    Yuanpeng ZOU  Fei ZHOU  Qingmin LIAO  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2016/11/07
      Vol:
    E100-D No:2
      Page(s):
    384-387

    In this letter, we propose a novel method for face hallucination by learning a new distance metric in the low-resolution (LR) patch space (source space). Local patch-based face hallucination methods usually assume that the two manifolds formed by LR and high-resolution (HR) image patches have similar local geometry. However, this assumption does not hold well in practice. Motivated by metric learning in machine learning, we propose to learn a new distance metric in the source space, under the supervision of the true local geometry in the target space (HR patch space). The learned new metric gives more freedom to the presentation of local geometry in the source space, and thus the local geometries of source and target space turn to be more consistent. Experiments conducted on two datasets demonstrate that the proposed method is superior to the state-of-the-art face hallucination and image super-resolution (SR) methods.

  • Multi-Channel Convolutional Neural Networks for Image Super-Resolution

    Shinya OHTANI  Yu KATO  Nobutaka KUROKI  Tetsuya HIROSE  Masahiro NUMA  

     
    PAPER-IMAGE PROCESSING

      Vol:
    E100-A No:2
      Page(s):
    572-580

    This paper proposes image super-resolution techniques with multi-channel convolutional neural networks. In the proposed method, output pixels are classified into K×K groups depending on their coordinates. Those groups are generated from separate channels of a convolutional neural network (CNN). Finally, they are synthesized into a K×K magnified image. This architecture can enlarge images directly without bicubic interpolation. Experimental results of 2×2, 3×3, and 4×4 magnifications have shown that the average PSNR for the proposed method is about 0.2dB higher than that for the conventional SRCNN.

  • Reduction of Max-Plus Algebraic Equations to Constraint Satisfaction Problems for Mixed Integer Programming

    Hiroyuki GOTO  

     
    LETTER

      Vol:
    E100-A No:2
      Page(s):
    427-430

    This letter presents a method for solving several linear equations in max-plus algebra. The essential part of these equations is reduced to constraint satisfaction problems compatible with mixed integer programming. This method is flexible, compared with optimization methods, and suitable for scheduling of certain discrete event systems.

  • The Computation Reduction in Object Detection via Composite Structure of Modified Integral Images

    Daeha LEE  Jaehong KIM  Ho-Hee KIM  Soon-Ja KIM  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2016/10/04
      Vol:
    E100-D No:1
      Page(s):
    229-233

    Object detection is the first step in the object recognition. According to the detection results, its following works are affected. However, object detection has a heavy resource requirement in terms of, computing power and memory. If an image is enlarged, the computational load required for object detection is also increased. An-integral-image-based method guarantees fast object detection. Once an integral image is generated, the speed of the object detection procedure remains fixed, regardless of the pattern region size. However, this becomes an even greater issue if the image is enlarged. In this paper, we propose the use of directional integral image based object detection. A directional integral image gives direction to an integral image, which can then be calculated from various directions. Furthermore, many unnecessary calculations, which typically occur when a partial integral image is used for object detection, can be avoided. Therefore, the amount of computation is reduced, compared with methods using integral images. In experiments comparing methods, the proposed method required 40% fewer computations.

  • Assessing the Bug-Prediction with Re-Usability Based Package Organization for Object Oriented Software Systems

    Mohsin SHAIKH  Ki-Seong LEE  Chan-Gun LEE  

     
    PAPER-Software Engineering

      Pubricized:
    2016/10/07
      Vol:
    E100-D No:1
      Page(s):
    107-117

    Packages are re-usable components for faster and effective software maintenance. To promote the re-use in object-oriented systems and maintenance tasks easier, packages should be organized to depict compact design. Therefore, understanding and assessing package organization is primordial for maintenance tasks like Re-usability and Changeability. We believe that additional investigations of prevalent basic design principles such as defined by R.C. Martin are required to explore different aspects of package organization. In this study, we propose package-organization framework based on reachable components that measures re-usability index. Package re-usability index measures common effect of change taking place over dependent elements of a package in an object-oriented design paradigm. A detailed quality assessment on different versions of open source software systems is presented which evaluates capability of the proposed package re-usability index and other traditional package-level metrics to predict fault-proneness in software. The experimental study shows that proposed index captures different aspects of package-design which can be practically integrated with best practices of software development. Furthermore, the results provide insights on organization of feasible software design to counter potential faults appearing due to complex package dependencies.

  • Oblivious Polynomial Evaluation in the Exponent, Revisited

    Naoto ITAKURA  Kaoru KUROSAWA  Kazuki YONEYAMA  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    26-33

    There are two extensions of oblivious polynomial evaluation (OPE), OPEE (oblivious polynomial evaluation in the exponent) and OPEE2. At TCC 2015, Hazay showed two OPEE2 protocols. In this paper, we first show that her first OPEE2 protocol does not run in polynomial time if the computational DH assumption holds. We next present a constant round OPEE protocol under the DDH assumption.

  • Evaluation of Spin-Coated Alumina Passivation Layer for Point-Contacted Rear Electrode Passivation of Silicon Solar Cells

    Ryosuke WATANABE  Tsubasa KOYAMA  Yoji SAITO  

     
    PAPER-Semiconductor Materials and Devices

      Vol:
    E100-C No:1
      Page(s):
    101-107

    We fabricated silicon solar cells with spin-coated sol-gel alumina passivation layers on the rear side. Spin-coated alumina passivation films have moderate passivation quality and are inferior to atomic layer deposited passivation films. However, low-cost and low temperature process of the sol-gel deposition is still beneficial for the cells using commercially available Cz silicon wafers. Thus, we consider an applicability of the spin-coated alumina passivation layer for rear side passivation. Dependence of cell efficiency on contact spacing and contact diameter of a rear electrode was investigated by both experiments and numerical calculation. The experimental results indicated that conversion efficiency of the cell is enhanced from 9.1% to 11.1% by optimizing an aperture ratio and contact spacing of the rear passivation layers. Numerical calculation indicated that small contact diameter with low aperture ratio of a rear passivation layer is preferable to achieve good cell performance in our experimental condition. We confirmed the effectivity of the spin-coated alumina passivation films for rear surface passivation of the low-cost silicon solar cells.

  • Two-Side Agreement Learning for Non-Parametric Template Matching

    Chao ZHANG  Takuya AKASHI  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2016/10/07
      Vol:
    E100-D No:1
      Page(s):
    140-149

    We address the problem of measuring matching similarity in terms of template matching. A novel method called two-side agreement learning (TAL) is proposed which learns the implicit correlation between two sets of multi-dimensional data points. TAL learns from a matching exemplar to construct a symmetric tree-structured model. Two points from source set and target set agree to form a two-side agreement (TA) pair if each point falls into the same leaf cluster of the model. In the training stage, unsupervised weak hyper-planes of each node are learned at first. After then, tree selection based on a cost function yields final model. In the test stage, points are propagated down to leaf nodes and TA pairs are observed to quantify the similarity. Using TAL can reduce the ambiguity in defining similarity which is hard to be objectively defined and lead to more convergent results. Experiments show the effectiveness against the state-of-the-art methods qualitatively and quantitatively.

  • General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA

    Atsushi TAKAYASU  Noboru KUNIHIRO  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    50-61

    In 1999, Boneh and Durfee introduced the small inverse problem, which solves the bivariate modular equation x(N+y)≡1(mod e. Absolute values of solutions for x and y are bounded above by X=Nδ and Y=Nβ, respectively. They solved the problem for β=1/2 in the context of small secret exponent attacks on RSA and proposed a polynomial time algorithm that works when δ<(7-2√7)/6≈0.284. In the same work, the bound was further improved to δ<1-1/≈2≈0.292. Thus far, the small inverse problem has also been analyzed for an arbitrary β. Generalizations of Boneh and Durfee's lattices to obtain the stronger bound yielded the bound δ<1-≈β. However, the algorithm works only when β≥1/4. When 0<β<1/4, there have been several works where the authors claimed their results are the best. In this paper, we revisit the problem for an arbitrary β. At first, we summarize the previous results for 0<β<1/4. We reveal that there are some results that are not valid and show that Weger's algorithms provide the best bounds. Next, we propose an improved algorithm to solve the problem for 0<β<1/4. Our algorithm works when δ<1-2(≈β(3+4β)-β)/3. Our algorithm construction is based on the combinations of Boneh and Durfee's two forms of lattices and it is more natural compared with previous works. For the cryptographic application, we introduce small secret exponent attacks on Multi-Prime RSA with small prime differences.

  • Digital Multiple Notch Filter Design with Nelder-Mead Simplex Method

    Qiusheng WANG  Xiaolan GU  Yingyi LIU  Haiwen YUAN  

     
    PAPER-Digital Signal Processing

      Vol:
    E100-A No:1
      Page(s):
    259-265

    Multiple notch filters are used to suppress narrow-band or sinusoidal interferences in digital signals. In this paper, we propose a novel optimization design technique of an infinite impulse response (IIR) multiple notch filter. It is based on the Nelder-Mead simplex method. Firstly, the system function of the desired notch filter is constructed to form the objective function of the optimization technique. Secondly, the design parameters of the desired notch filter are optimized by Nelder-Mead simplex method. A weight function is also introduced to improve amplitude response of the notch filter. Thirdly, the convergence and amplitude response of the proposed technique are compared with other Nelder-Mead based design methods and the cascade-based design method. Finally, the practicability of the proposed notch filter design technique is demonstrated by some practical applications.

  • Increase of Recognizable Label Number with Optical Passive Waveguide Circuits for Recognition of Encoded 4- and 8-Bit BPSK Labels

    Hiroki KISHIKAWA  Akito IHARA  Nobuo GOTO  Shin-ichiro YANAGIYA  

     
    PAPER-Optoelectronics

      Vol:
    E100-C No:1
      Page(s):
    84-93

    Optical label processing is expected to reduce power consumption in label switching network nodes. Previously, we proposed passive waveguide circuits for the recognition of BPSK labels with a theoretically infinite contrast ratio. The recognizable label number was limited to four and eight for 4-bit and 8-bit BPSK labels, respectively. In this paper, we propose methods to increase the recognizable label number. The proposed circuits can recognize eight and sixteen labels of 4-bit BPSK codes with a contrast ratio of 4.00 and 2.78, respectively. As 8-bit BSPK codes, 64, 128, and 256 labels can be recognized with a contrast ratio of 4.00, 2.78, and 1.65, respectively. In recognition of all encoded labels, that is, 16 and 256 labels for 4-bit and 8-bit BPSK labels, a reference signal is employed to identify the sign of the optical output signals. The effect of phase deviation and loss along the optical waveguides of the devices is also discussed.

  • Using a Single Dendritic Neuron to Forecast Tourist Arrivals to Japan

    Wei CHEN  Jian SUN  Shangce GAO  Jiu-Jun CHENG  Jiahai WANG  Yuki TODO  

     
    PAPER-Biocybernetics, Neurocomputing

      Pubricized:
    2016/10/18
      Vol:
    E100-D No:1
      Page(s):
    190-202

    With the fast growth of the international tourism industry, it has been a challenge to forecast the tourism demand in the international tourism market. Traditional forecasting methods usually suffer from the prediction accuracy problem due to the high volatility, irregular movements and non-stationarity of the tourist time series. In this study, a novel single dendritic neuron model (SDNM) is proposed to perform the tourism demand forecasting. First, we use a phase space reconstruction to analyze the characteristics of the tourism and reconstruct the time series into proper phase space points. Then, the maximum Lyapunov exponent is employed to identify the chaotic properties of time series which is used to determine the limit of prediction. Finally, we use SDNM to make a short-term prediction. Experimental results of the forecasting of the monthly foreign tourist arrivals to Japan indicate that the proposed SDNM is more efficient and accurate than other neural networks including the multi-layered perceptron, the neuro-fuzzy inference system, the Elman network, and the single multiplicative neuron model.

  • Improvement of Artificial Auscultation on Hemodialysis Stenosis by the Estimate of Stenosis Site and the Hierarchical Categorization of Learning Data

    Hatsuhiro KATO  Masakazu KIRYU  Yutaka SUZUKI  Osamu SAKATA  Mizuya FUKASAWA  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E100-D No:1
      Page(s):
    175-180

    Many hemodialysis patients undergo plasitc surgery to form the arterio-venous fistula (AVF) in their forearm to improve the vascular access by shunting blood flows. The issue of AVF is the stenosis caused by the disturbance of blood flows; therefore the auscultation system to assist the stenosis diagnosis has been developed. Although the system is intended to be used as a steady monitoring for stenosis assessment, its efficiency was not always high because it cannot estimate where the stenosis locates. In this study, for extracting and estimating the stenosis signal, the shunt murmurs captured by many microphones were decomposed by the principal component analysis (PCA). Furthermore, applying the hierarchical categorization of the recursive subdivision self-organizing map (rs-SOM), the modelling of the stenosis signal was proposed to realise the effective stenosis assessment. The false-positive rate of the stenosis assessment was significantly reduced by using the improved auscultation system.

  • Design, Fabrication, and Measurement of Constant Gain UWB Planar Antenna Using FSS-Based Reflectors

    Rabia YAHYA  Akira NAKAMURA  Makoto ITAMI  Tayeb A. DENIDNI  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    194-199

    In this paper, we propose a technique to improve the gain of ultra wide-band (UWB) planar antennas by using low profile reflectors based on frequency selective surfaces (FSS). This technique not only enhances the gain of the planar UWB antennas but also guarantees a constant gain with weak variation across the entire UWB while keeping their attractive merits such as planar structure and easy fabrication. An UWB coplanar waveguide (CPW) fed antenna is installed above the proposed reflectors, to prove the effectiveness of the proposed technique. As a result, a constant gain is achieved across a very large bandwidth.

  • Aesthetic QR Code Based on Modified Systematic Encoding Function

    Minoru KURIBAYASHI  Masakatu MORII  

     
    PAPER

      Pubricized:
    2016/10/07
      Vol:
    E100-D No:1
      Page(s):
    42-51

    Quick Response (QR) code is a two dimensional barcode widely used in many applications. A standard QR code consists of black and white square modules, and it appears randomized patterns. By modifying the modules using certain rule, it is possible to display a logo image on the QR code. Such a QR code is called an aesthetic QR code. In this paper, we change the encoding method of the Reed-Solomon (RS) code to produce an aesthetic QR code without sacrificing its error correcting capability. The proposed method randomly produces candidates of RS blocks and finds the best one during encoding. Considering an image to be displayed, we also introduce a weighting function during random selection that classifies the visually important regions in the image. We further investigate the shape of modules which represents the image and consider the trade-off between the visual quality and its readability. As a result, we can produce a beautiful aesthetic QR code, which still can be decoded by standard QR code reader.

  • On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks

    Hiraku MORITA  Jacob C.N. SCHULDT  Takahiro MATSUDA  Goichiro HANAOKA  Tetsu IWATA  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    73-90

    In the ordinary security model for signature schemes, we consider an adversary that tries to forge a signature on a new message using only his knowledge of other valid message and signature pairs. To take into account side channel attacks such as tampering or fault-injection attacks, Bellare and Kohno (Eurocrypt 2003) formalized related-key attacks (RKA), where stronger adversaries are considered. In the RKA security model for signature schemes, we consider an adversary that can also manipulate the signing key and obtain signatures computed under the modified key. RKA security is defined with respect to the related-key deriving functions which are used by an adversary to manipulate the signing key. This paper considers RKA security of three established signature schemes: the Schnorr signature scheme, a variant of DSA, and a variant of ElGamal signature scheme. First, we show that these signature schemes are secure against a weak notion of RKA with respect to polynomial functions. Second, we demonstrate that, on the other hand, none of the Schnorr signature scheme, DSA, nor the ElGamal signature scheme achieves the standard notion of RKA security with respect to linear functions, by showing concrete attacks on these. Lastly, we show that slight modifications of the Schnorr signature scheme, (the considered variant of) DSA, and the variant of ElGamal signature scheme yield fully RKA secure schemes with respect to polynomial functions.

3601-3620hit(20498hit)