The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

4421-4440hit(20498hit)

  • Consistent Sparse Representation for Abnormal Event Detection

    Zhong ZHANG  Shuang LIU  Zhiwei ZHANG  

     
    LETTER-Pattern Recognition

      Pubricized:
    2015/07/17
      Vol:
    E98-D No:10
      Page(s):
    1866-1870

    Sparsity-based methods have been recently applied to abnormal event detection and have achieved impressive results. However, most such methods suffer from the problem of dimensionality curse; furthermore, they also take no consideration of the relationship among coefficient vectors. In this paper, we propose a novel method called consistent sparse representation (CSR) to overcome the drawbacks. We first reconstruct each feature in the space spanned by the clustering centers of training features so as to reduce the dimensionality of features and preserve the neighboring structure. Then, the consistent regularization is added to the sparse representation model, which explicitly considers the relationship of coefficient vectors. Our method is verified on two challenging databases (UCSD Ped1 database and Subway batabase), and the experimental results demonstrate that our method obtains better results than previous methods in abnormal event detection.

  • Exploiting Social Relationship for Opportunistic Routing in Mobile Social Networks

    Zhenxiang GAO  Yan SHI  Shanzhi CHEN  Qihan LI  

     
    PAPER-Network

      Vol:
    E98-B No:10
      Page(s):
    2040-2048

    Routing is a challenging issue in mobile social networks (MSNs) because of time-varying links and intermittent connectivity. In order to enable nodes to make right decisions while forwarding messages, exploiting social relationship has become an important method for designing efficient routing protocols in MSNs. In this paper, we first use the temporal evolution graph model to accurately capture the dynamic topology of the MSN. Based on the model, we introduce the social relationship metric for detecting the quality of human social relationship from contact history records. Utilizing this metric, we propose social relationship based betweenness centrality metric to identify influential nodes to ensure messages forwarded by the nodes with stronger social relationship and higher likelihood of contacting other nodes. Then, we present SRBet, a novel social-based forwarding algorithm, which utilizes the aforementioned metric to enhance routing performance. Simulations have been conducted on two real world data sets and results demonstrate that the proposed forwarding algorithm achieves better performances than the existing algorithms.

  • Collective Activity Recognition by Attribute-Based Spatio-Temporal Descriptor

    Changhong CHEN  Hehe DOU  Zongliang GAN  

     
    LETTER-Pattern Recognition

      Pubricized:
    2015/07/22
      Vol:
    E98-D No:10
      Page(s):
    1875-1878

    Collective activity recognition plays an important role in high-level video analysis. Most current feature representations look at contextual information extracted from the behaviour of nearby people. Every person needs to be detected and his pose should be estimated. After extracting the feature, hierarchical graphical models are always employed to model the spatio-temporal patterns of individuals and their interactions, and so can not avoid complex preprocessing and inference operations. To overcome these drawbacks, we present a new feature representation method, called attribute-based spatio-temporal (AST) descriptor. First, two types of information, spatio-temporal (ST) features and attribute features, are exploited. Attribute-based features are manually specified. An attribute classifier is trained to model the relationship between the ST features and attribute-based features, according to which the attribute features are refreshed. Then, the ST features, attribute features and the relationship between the attributes are combined to form the AST descriptor. An objective classifier can be specified on the AST descriptor and the weight parameters of the classifier are used for recognition. Experiments on standard collective activity benchmark sets show the effectiveness of the proposed descriptor.

  • Availability Analysis of a Multibase System with Lateral Resupply between Bases

    Naoki OKUDA  Nobuyuki TAMURA  Tetsushi YUGE  Shigeru YANAGI  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2084-2090

    In this paper, we study on an availability analysis for a multibase system with lateral resupply of spare items between bases. We construct a basic model that a spare item of a base is transported for operation to another base without spare upon occurrence of failure, and simultaneously, the base that supplies the spare item receives the failed item of the other base for repair. We propose an approximation method to obtain the availability of the system and show the accuracy of the solution through numerical experiments. Also, two modified models are constructed to show the efficiency of the basic model. The two models modify the assumption on the lateral resupply of spare items between bases in the basic model. We numerically illustrate that the basic model can increase the availability of the system compared with the two modified models through Monte Carlo simulation.

  • Strongly Secure Scan Design Using Generalized Feed Forward Shift Registers

    Hideo FUJIWARA  Katsuya FUJIWARA  

     
    LETTER-Dependable Computing

      Pubricized:
    2015/06/24
      Vol:
    E98-D No:10
      Page(s):
    1852-1855

    In our previous work [12], [13], we introduced generalized feed-forward shift registers (GF2SR, for short) to apply them to secure and testable scan design, where we considered the security problem from the viewpoint of the complexity of identifying the structure of GF2SRs. Although the proposed scan design is secure in the sense that the structure of a GF2SR cannot be identified only from the primary input/output relation, it may not be secure if part of the contents of the circuit leak out. In this paper, we introduce a more secure concept called strong security such that no internal state of strongly secure circuits leaks out, and present how to design such strongly secure GF2SRs.

  • A Brief Proof of General QAM Golay Complementary Sequences in Cases I-III Constructions

    Fanxin ZENG  Zhenyu ZHANG  

     
    LETTER-Information Theory

      Vol:
    E98-A No:10
      Page(s):
    2203-2206

    By investigating the properties that the offsets should satisfy, this letter presents a brief proof of general QAM Golay complementary sequences (GCSs) in Cases I-III constructions. Our aim is to provide a brief, clear, and intelligible derivation so that it is easy for the reader to understand the known Cases I-III constructions of general QAM GCSs.

  • A Note on Two-Dimensional Optical Orthogonal Codes

    Lin-Zhi SHEN  Xuan GUANG  

     
    LETTER-Coding Theory

      Vol:
    E98-A No:10
      Page(s):
    2207-2208

    Let v=p1m1p2m2…ptmt be the canonical prime factorization of v. In this paper, we give a construction of optimal ((s+1)×v,s+1,1) two-dimensional optical orthogonal codes with both at most one-pulse per wavelength and at most one-pulse per time slot, where s | gcd(p1-1,p2-1,...,pt-1). The method is much simpler than that in [1]. Optimal (m×v,k,1) two-dimensional optical orthogonal codes are also constructed based on the Steiner system S[2,k,m].

  • 99.4% Switching Energy Saving and 87.5% Area Reduction Switching Scheme for SAR ADC

    Li BIN  Deng ZHUN  Xie LIANG  Xiangliang JIN  

     
    BRIEF PAPER-Electronic Circuits

      Vol:
    E98-C No:10
      Page(s):
    984-986

    A high energy-efficiency and area-reduction switching scheme for a low-power successive approximation register (SAR) analog-to-digital converter (ADC) is presented. Based on the sequence initialization, monotonic capacitor switching procedure and multiple reference voltages, the average switching energy and total capacitance of the proposed scheme are reduced by 99.4% and 87.5% respectively, compared to the conventional architecture.

  • A Meet in the Middle Attack on Reduced Round Kuznyechik

    Riham ALTAWY  Amr M. YOUSSEF  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:10
      Page(s):
    2194-2198

    In this letter, we present a meet-in-the-middle attack on the 5-round reduced Kuznyechik cipher which has been recently chosen to be standardized by the Russian federation. Our attack is based on the differential enumeration approach. However, the application of the exact approach is not successful on Kuznyechik due to its optimal round diffusion properties. Accordingly, we adopt an equivalent representation for the last round where we can efficiently filter ciphertext pairs and launch the attack in the chosen ciphertext setting. We also utilize partial sequence matching which further reduces the memory and time complexities. For the 5-round reduced cipher, the 256-bit master key is recovered with an online time complexity of 2140.3, a memory complexity of 2153.3, and a data complexity of 2113.

  • Software Abnormal Behavior Detection Based on Function Semantic Tree

    Yingxu LAI  Wenwen ZHANG  Zhen YANG  

     
    PAPER-Software System

      Pubricized:
    2015/07/03
      Vol:
    E98-D No:10
      Page(s):
    1777-1787

    Current software behavior models lack the ability to conduct semantic analysis. We propose a new model to detect abnormal behaviors based on a function semantic tree. First, a software behavior model in terms of state graph and software function is developed. Next, anomaly detection based on the model is conducted in two main steps: calculating deviation density of suspicious behaviors by comparison with state graph and detecting function sequence by function semantic rules. Deviation density can well detect control flow attacks by a deviation factor and a period division. In addition, with the help of semantic analysis, function semantic rules can accurately detect application layer attacks that fail in traditional approaches. Finally, a case study of RSS software illustrates how our approach works. Case study and a contrast experiment have shown that our model has strong expressivity and detection ability, which outperforms traditional behavior models.

  • Efficient Algorithms for Sorting k-Sets in Bins

    Atsuki NAGAO  Kazuhisa SETO  Junichi TERUYAMA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E98-D No:10
      Page(s):
    1736-1743

    We propose efficient algorithms for Sorting k-Sets in Bins. The Sorting k-Sets in Bins problem can be described as follows. We are given numbered n bins with k balls in each bin. Balls in the i-th bin are numbered n-i+1. We can only swap balls between adjacent bins. Our task is to move all of the balls to the same numbered bins. For this problem, we give an efficient greedy algorithm with $ rac{k+1}{4}n^2+O(k+n)$ swaps and provide a detailed analysis for k=3. In addition, we give a more efficient recursive algorithm using $ rac{15}{16}n^2+O(n)$ swaps for k=3.

  • Transmit Multi-Block FDE for Space-Time Block Coded Joint Transmit/Receive Diversity in a Quasi-Static Fading Channel

    Hiroyuki MIYAZAKI  Fumiyuki ADACHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E98-B No:10
      Page(s):
    2068-2078

    In this paper, we propose a transmit multi-block frequency-domain equalization (MB-FDE) for frequency-domain space-time block coded joint transmit/receive diversity (FD-STBC-JTRD). Noting that a STBC codeword consists of multiple coded blocks, the transmit MB-FDE uses the multiple transmit FDE weight matrices, each associated with each coded block. Both single-carrier (SC) transmission and orthogonal frequency-division multiplexing (OFDM) transmission are considered. For SC transmission, the transmit MB-FDE weight matrices are jointly optimized so as to minimize the mean square error (MSE) between the transmit signal before STBC encoding and the received signal after STBC decoding. For OFDM transmission, they are jointly optimized so as to maximize the received signal-to-noise power ratio (SNR) after STBC decoding. We show by theoretical analysis that the proposed transmit MB-FDE can achieve 1/RSTBC times higher received SNR than the conventional transmit single-block FDE (SB-FDE), where RSTBC represents the code rate of STBC. It is confirmed by computer simulation that, when more than 2 receive antennas are used, MB-FDE can always achieve better BER performance than SB-FDE irrespective of the number of transmit antennas, and the channel frequency-selectivity.

  • User Equipment Centric Downlink Access in Unlicensed Spectrum for Heterogeneous Mobile Network Open Access

    Riichi KUDO  B. A. Hirantha Sithira ABEYSEKERA  Yusuke ASAI  Takeo ICHIKAWA  Yasushi TAKATORI  Masato MIZOGUCHI  

     
    PAPER

      Vol:
    E98-B No:10
      Page(s):
    1969-1977

    Combining heterogeneous wireless networks that cross licensed and unlicensed spectra is a promising way of supporting the surge in mobile traffic. The unlicensed band is mostly used by wireless LAN (WLAN) nodes which employ carrier sense multiple access/collision avoidance (CSMA/CA). Since the number of WLAN devices and their traffic are increasing, the wireless resource of the unlicensed band is expected be more depleted in 2020s. In such a wireless environment, the throughput could be extremely low and unstable due to the hidden terminal problem and exposed terminal problem despite of the large resources of the allocated frequency band and high peak PHY rate. In this paper, we propose user equipment (UE) centric access in the unlicensed band, with support by licensed band access in the mobile network. The proposed access enables robust downlink transmission from the access point (AP) to the UEs by mitigating the hidden terminal problem. The licensed spectrum access passes information on the user data waiting at the AP to the UEs and triggers UE reception opportunity (RXOP) acquisition. Furthermore, the adaptive use of UE centric downlink access is presented by using the channel utilization measured at the AP. Computer simulations confirm that licensed access assistance enhances the robustness of the unlicensed band access against the hidden terminal problem.

  • Pre-Adjustment Rerouting for Wavelength Defragmentation in Optical Transparent WDM Networks

    Akihiro KADOHATA  Atsushi WATANABE  Akira HIRANO  Hiroshi HASEGAWA  Ken-ichi SATO  

     
    PAPER-Fiber-Optic Transmission for Communications

      Vol:
    E98-B No:10
      Page(s):
    2014-2021

    We propose a new extension to reconfiguration algorithms used to address wavelength defragmentation to enhance the path accommodation efficiency in optical transparent wavelength division multiplexing networks. The proposed algorithm suppresses the number of fibers employed to search for a reconfigurable wavelength channel by combining routes between the target path and the existing path in a reconfigured wavelength channel. This paper targets three main phases in reconfiguration: i) the reconfiguration trigger; ii) redesign of the wavelength path; and iii) migrating the wavelength paths. The proposed and conventional algorithms are analyzed from the viewpoints of the number of fibers, accommodation rate and the number of migrating sequences. Numerical evaluations show that the number of fibers is suppressed by 9%, and that the accommodation efficiency is increased by approximately 5%-8% compared to when reconfiguration is not performed.

  • Robust Voice Activity Detection Algorithm Based on Feature of Frequency Modulation of Harmonics and Its DSP Implementation

    Chung-Chien HSU  Kah-Meng CHEONG  Tai-Shih CHI  Yu TSAO  

     
    PAPER-Speech and Hearing

      Pubricized:
    2015/07/10
      Vol:
    E98-D No:10
      Page(s):
    1808-1817

    This paper proposes a voice activity detection (VAD) algorithm based on an energy related feature of the frequency modulation of harmonics. A multi-resolution spectro-temporal analysis framework, which was developed to extract texture features of the audio signal from its Fourier spectrogram, is used to extract frequency modulation features of the speech signal. The proposed algorithm labels the voice active segments of the speech signal by comparing the energy related feature of the frequency modulation of harmonics with a threshold. Then, the proposed VAD is implemented on one of Texas Instruments (TI) digital signal processor (DSP) platforms for real-time operation. Simulations conducted on the DSP platform demonstrate the proposed VAD performs significantly better than three standard VADs, ITU-T G.729B, ETSI AMR1 and AMR2, in non-stationary noise in terms of the receiver operating characteristic (ROC) curves and the recognition rates from a practical distributed speech recognition (DSR) system.

  • Design of an Energy-Aware LED Light System (EA-LLS) for Energy Saving and User Satisfaction through Daylight, Space and User Movement Analysis in Buildings

    Sangmin PARK  Jinsung BYUN  Byeongkwan KANG  Daebeom JEONG  Beomseok LEE  Sehyun PARK  

     
    LETTER-Office Information Systems, e-Business Modeling

      Pubricized:
    2015/07/17
      Vol:
    E98-D No:10
      Page(s):
    1861-1865

    This letter introduces an Energy-Aware LED Light System (EA-LLS) that provides adequate illumination to users according to the analysis of the sun's position, the user's movement, and various environmental factors, without sun illumination detection sensors. This letter presents research using algorithms and scenarios. We propose an EA-LLS that offers not only On/Off and dimming control, but dimming control through daylight, space, and user behavior analysis.

  • Optimality of Tweak Functions in CLOC

    Hayato KOBAYASHI  Kazuhiko MINEMATSU  Tetsu IWATA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:10
      Page(s):
    2152-2164

    An Authenticated Encryption scheme is used to guarantee both privacy and authenticity of digital data. At FSE 2014, an authenticated encryption scheme called CLOC was proposed. CLOC is designed to handle short input data efficiently without needing heavy precomputation nor large memory. This is achieved by making various cases of different treatments in the encryption process depending on the input data. Five tweak functions are used to handle the conditional branches, and they are designed to satisfy 55 differential probability constraints, which are used in the security proof of CLOC. In this paper, we show that all these 55 constraints are necessary. This shows the design optimality of the tweak functions in CLOC in that the constraints cannot be relaxed, and hence the specification of the tweak functions cannot be simplified.

  • Quantifying Resiliency of Virtualized System with Software Rejuvenation

    Hiroyuki OKAMURA  Jungang GUAN  Chao LUO  Tadashi DOHI  

     
    PAPER

      Vol:
    E98-A No:10
      Page(s):
    2051-2059

    This paper considers how to evaluate the resiliency for virtualized system with software rejuvenation. The software rejuvenation is a proactive technique to prevent the failure caused by aging phenomenon such as resource exhaustion. In particular, according to Gohsh et al. (2010), we compute a quantitative criterion to evaluate resiliency of system by using continuous-time Markov chains (CTMC). In addition, in order to convert general state-based models to CTMCs, we employ PH (phase-type) expansion technique. In numerical examples, we investigate the resiliency of virtualized system with software rejuvenation under two different rejuvenation policies.

  • Speeding Up and Performance Evaluation of a Fully Automatic Radial Distortion Compensation Algorithm for Driving Assistance Cameras

    Yuta KANUKI  Naoya OHTA  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2015/07/03
      Vol:
    E98-D No:10
      Page(s):
    1892-1895

    Recently, cameras are equipped on cars in order to assist their drivers. These cameras often have a severe radial distortion because of their wide view angle, and sometimes it is necessary to compensate it in a fully automatic way in the field. We have proposed such a method, which uses the entropy of the histogram of oriented gradient (HOG) to evaluate the goodness of the compensation. Its performance was satisfactory, but the computational burden was too heavy to be executed by drive assistance devices. In this report, we discuss a method to speed up the algorithm, and obtain a new light algorithm feasible for such devices. We also show more comprehensive performance evaluation results then those in the previous reports.

  • High-Efficiency Sky-Blue Organic Light-Emitting Diodes Utilizing Thermally-Activated Delayed Fluorescence

    Yasuhide HIRAGA  Jun-ichi NISHIDE  Hajime NAKANOTANI  Masaki AONUMA  Chihaya ADACHI  

     
    PAPER-Electronic Materials

      Vol:
    E98-C No:10
      Page(s):
    971-976

    A highly efficient sky-blue organic light-emitting diode (OLED) based on a thermally-activated delayed fluorescence (TADF) molecule, 1,2-bis(carbazol-9-yl)-4,5-dicyanobenzene (2CzPN), was studied. The sky-blue OLED exhibited a maximum external electroluminescence quantum efficiency (ηEQE) of over 24.0%. In addition, a white OLED using 2CzPN combined with green and orange TADF emitters showed a high ηEQE of 17.3% with a maximum power efficiency of 52.3 lm/W and Commission Internationale de l'Eclairage coordinates of (0.32, 0.43).

4421-4440hit(20498hit)