Zhong ZHANG Shuang LIU Zhiwei ZHANG
Sparsity-based methods have been recently applied to abnormal event detection and have achieved impressive results. However, most such methods suffer from the problem of dimensionality curse; furthermore, they also take no consideration of the relationship among coefficient vectors. In this paper, we propose a novel method called consistent sparse representation (CSR) to overcome the drawbacks. We first reconstruct each feature in the space spanned by the clustering centers of training features so as to reduce the dimensionality of features and preserve the neighboring structure. Then, the consistent regularization is added to the sparse representation model, which explicitly considers the relationship of coefficient vectors. Our method is verified on two challenging databases (UCSD Ped1 database and Subway batabase), and the experimental results demonstrate that our method obtains better results than previous methods in abnormal event detection.
Zhenxiang GAO Yan SHI Shanzhi CHEN Qihan LI
Routing is a challenging issue in mobile social networks (MSNs) because of time-varying links and intermittent connectivity. In order to enable nodes to make right decisions while forwarding messages, exploiting social relationship has become an important method for designing efficient routing protocols in MSNs. In this paper, we first use the temporal evolution graph model to accurately capture the dynamic topology of the MSN. Based on the model, we introduce the social relationship metric for detecting the quality of human social relationship from contact history records. Utilizing this metric, we propose social relationship based betweenness centrality metric to identify influential nodes to ensure messages forwarded by the nodes with stronger social relationship and higher likelihood of contacting other nodes. Then, we present SRBet, a novel social-based forwarding algorithm, which utilizes the aforementioned metric to enhance routing performance. Simulations have been conducted on two real world data sets and results demonstrate that the proposed forwarding algorithm achieves better performances than the existing algorithms.
Changhong CHEN Hehe DOU Zongliang GAN
Collective activity recognition plays an important role in high-level video analysis. Most current feature representations look at contextual information extracted from the behaviour of nearby people. Every person needs to be detected and his pose should be estimated. After extracting the feature, hierarchical graphical models are always employed to model the spatio-temporal patterns of individuals and their interactions, and so can not avoid complex preprocessing and inference operations. To overcome these drawbacks, we present a new feature representation method, called attribute-based spatio-temporal (AST) descriptor. First, two types of information, spatio-temporal (ST) features and attribute features, are exploited. Attribute-based features are manually specified. An attribute classifier is trained to model the relationship between the ST features and attribute-based features, according to which the attribute features are refreshed. Then, the ST features, attribute features and the relationship between the attributes are combined to form the AST descriptor. An objective classifier can be specified on the AST descriptor and the weight parameters of the classifier are used for recognition. Experiments on standard collective activity benchmark sets show the effectiveness of the proposed descriptor.
Naoki OKUDA Nobuyuki TAMURA Tetsushi YUGE Shigeru YANAGI
In this paper, we study on an availability analysis for a multibase system with lateral resupply of spare items between bases. We construct a basic model that a spare item of a base is transported for operation to another base without spare upon occurrence of failure, and simultaneously, the base that supplies the spare item receives the failed item of the other base for repair. We propose an approximation method to obtain the availability of the system and show the accuracy of the solution through numerical experiments. Also, two modified models are constructed to show the efficiency of the basic model. The two models modify the assumption on the lateral resupply of spare items between bases in the basic model. We numerically illustrate that the basic model can increase the availability of the system compared with the two modified models through Monte Carlo simulation.
Hideo FUJIWARA Katsuya FUJIWARA
In our previous work [12], [13], we introduced generalized feed-forward shift registers (GF2SR, for short) to apply them to secure and testable scan design, where we considered the security problem from the viewpoint of the complexity of identifying the structure of GF2SRs. Although the proposed scan design is secure in the sense that the structure of a GF2SR cannot be identified only from the primary input/output relation, it may not be secure if part of the contents of the circuit leak out. In this paper, we introduce a more secure concept called strong security such that no internal state of strongly secure circuits leaks out, and present how to design such strongly secure GF2SRs.
By investigating the properties that the offsets should satisfy, this letter presents a brief proof of general QAM Golay complementary sequences (GCSs) in Cases I-III constructions. Our aim is to provide a brief, clear, and intelligible derivation so that it is easy for the reader to understand the known Cases I-III constructions of general QAM GCSs.
Let v=p1m1p2m2…ptmt be the canonical prime factorization of v. In this paper, we give a construction of optimal ((s+1)×v,s+1,1) two-dimensional optical orthogonal codes with both at most one-pulse per wavelength and at most one-pulse per time slot, where s | gcd(p1-1,p2-1,...,pt-1). The method is much simpler than that in [1]. Optimal (m×v,k,1) two-dimensional optical orthogonal codes are also constructed based on the Steiner system S[2,k,m].
Li BIN Deng ZHUN Xie LIANG Xiangliang JIN
A high energy-efficiency and area-reduction switching scheme for a low-power successive approximation register (SAR) analog-to-digital converter (ADC) is presented. Based on the sequence initialization, monotonic capacitor switching procedure and multiple reference voltages, the average switching energy and total capacitance of the proposed scheme are reduced by 99.4% and 87.5% respectively, compared to the conventional architecture.
In this letter, we present a meet-in-the-middle attack on the 5-round reduced Kuznyechik cipher which has been recently chosen to be standardized by the Russian federation. Our attack is based on the differential enumeration approach. However, the application of the exact approach is not successful on Kuznyechik due to its optimal round diffusion properties. Accordingly, we adopt an equivalent representation for the last round where we can efficiently filter ciphertext pairs and launch the attack in the chosen ciphertext setting. We also utilize partial sequence matching which further reduces the memory and time complexities. For the 5-round reduced cipher, the 256-bit master key is recovered with an online time complexity of 2140.3, a memory complexity of 2153.3, and a data complexity of 2113.
Yingxu LAI Wenwen ZHANG Zhen YANG
Current software behavior models lack the ability to conduct semantic analysis. We propose a new model to detect abnormal behaviors based on a function semantic tree. First, a software behavior model in terms of state graph and software function is developed. Next, anomaly detection based on the model is conducted in two main steps: calculating deviation density of suspicious behaviors by comparison with state graph and detecting function sequence by function semantic rules. Deviation density can well detect control flow attacks by a deviation factor and a period division. In addition, with the help of semantic analysis, function semantic rules can accurately detect application layer attacks that fail in traditional approaches. Finally, a case study of RSS software illustrates how our approach works. Case study and a contrast experiment have shown that our model has strong expressivity and detection ability, which outperforms traditional behavior models.
Atsuki NAGAO Kazuhisa SETO Junichi TERUYAMA
We propose efficient algorithms for Sorting k-Sets in Bins. The Sorting k-Sets in Bins problem can be described as follows. We are given numbered n bins with k balls in each bin. Balls in the i-th bin are numbered n-i+1. We can only swap balls between adjacent bins. Our task is to move all of the balls to the same numbered bins. For this problem, we give an efficient greedy algorithm with $rac{k+1}{4}n^2+O(k+n)$ swaps and provide a detailed analysis for k=3. In addition, we give a more efficient recursive algorithm using $rac{15}{16}n^2+O(n)$ swaps for k=3.
Hiroyuki MIYAZAKI Fumiyuki ADACHI
In this paper, we propose a transmit multi-block frequency-domain equalization (MB-FDE) for frequency-domain space-time block coded joint transmit/receive diversity (FD-STBC-JTRD). Noting that a STBC codeword consists of multiple coded blocks, the transmit MB-FDE uses the multiple transmit FDE weight matrices, each associated with each coded block. Both single-carrier (SC) transmission and orthogonal frequency-division multiplexing (OFDM) transmission are considered. For SC transmission, the transmit MB-FDE weight matrices are jointly optimized so as to minimize the mean square error (MSE) between the transmit signal before STBC encoding and the received signal after STBC decoding. For OFDM transmission, they are jointly optimized so as to maximize the received signal-to-noise power ratio (SNR) after STBC decoding. We show by theoretical analysis that the proposed transmit MB-FDE can achieve 1/RSTBC times higher received SNR than the conventional transmit single-block FDE (SB-FDE), where RSTBC represents the code rate of STBC. It is confirmed by computer simulation that, when more than 2 receive antennas are used, MB-FDE can always achieve better BER performance than SB-FDE irrespective of the number of transmit antennas, and the channel frequency-selectivity.
Riichi KUDO B. A. Hirantha Sithira ABEYSEKERA Yusuke ASAI Takeo ICHIKAWA Yasushi TAKATORI Masato MIZOGUCHI
Combining heterogeneous wireless networks that cross licensed and unlicensed spectra is a promising way of supporting the surge in mobile traffic. The unlicensed band is mostly used by wireless LAN (WLAN) nodes which employ carrier sense multiple access/collision avoidance (CSMA/CA). Since the number of WLAN devices and their traffic are increasing, the wireless resource of the unlicensed band is expected be more depleted in 2020s. In such a wireless environment, the throughput could be extremely low and unstable due to the hidden terminal problem and exposed terminal problem despite of the large resources of the allocated frequency band and high peak PHY rate. In this paper, we propose user equipment (UE) centric access in the unlicensed band, with support by licensed band access in the mobile network. The proposed access enables robust downlink transmission from the access point (AP) to the UEs by mitigating the hidden terminal problem. The licensed spectrum access passes information on the user data waiting at the AP to the UEs and triggers UE reception opportunity (RXOP) acquisition. Furthermore, the adaptive use of UE centric downlink access is presented by using the channel utilization measured at the AP. Computer simulations confirm that licensed access assistance enhances the robustness of the unlicensed band access against the hidden terminal problem.
Akihiro KADOHATA Atsushi WATANABE Akira HIRANO Hiroshi HASEGAWA Ken-ichi SATO
We propose a new extension to reconfiguration algorithms used to address wavelength defragmentation to enhance the path accommodation efficiency in optical transparent wavelength division multiplexing networks. The proposed algorithm suppresses the number of fibers employed to search for a reconfigurable wavelength channel by combining routes between the target path and the existing path in a reconfigured wavelength channel. This paper targets three main phases in reconfiguration: i) the reconfiguration trigger; ii) redesign of the wavelength path; and iii) migrating the wavelength paths. The proposed and conventional algorithms are analyzed from the viewpoints of the number of fibers, accommodation rate and the number of migrating sequences. Numerical evaluations show that the number of fibers is suppressed by 9%, and that the accommodation efficiency is increased by approximately 5%-8% compared to when reconfiguration is not performed.
Chung-Chien HSU Kah-Meng CHEONG Tai-Shih CHI Yu TSAO
This paper proposes a voice activity detection (VAD) algorithm based on an energy related feature of the frequency modulation of harmonics. A multi-resolution spectro-temporal analysis framework, which was developed to extract texture features of the audio signal from its Fourier spectrogram, is used to extract frequency modulation features of the speech signal. The proposed algorithm labels the voice active segments of the speech signal by comparing the energy related feature of the frequency modulation of harmonics with a threshold. Then, the proposed VAD is implemented on one of Texas Instruments (TI) digital signal processor (DSP) platforms for real-time operation. Simulations conducted on the DSP platform demonstrate the proposed VAD performs significantly better than three standard VADs, ITU-T G.729B, ETSI AMR1 and AMR2, in non-stationary noise in terms of the receiver operating characteristic (ROC) curves and the recognition rates from a practical distributed speech recognition (DSR) system.
Sangmin PARK Jinsung BYUN Byeongkwan KANG Daebeom JEONG Beomseok LEE Sehyun PARK
This letter introduces an Energy-Aware LED Light System (EA-LLS) that provides adequate illumination to users according to the analysis of the sun's position, the user's movement, and various environmental factors, without sun illumination detection sensors. This letter presents research using algorithms and scenarios. We propose an EA-LLS that offers not only On/Off and dimming control, but dimming control through daylight, space, and user behavior analysis.
Hayato KOBAYASHI Kazuhiko MINEMATSU Tetsu IWATA
An Authenticated Encryption scheme is used to guarantee both privacy and authenticity of digital data. At FSE 2014, an authenticated encryption scheme called CLOC was proposed. CLOC is designed to handle short input data efficiently without needing heavy precomputation nor large memory. This is achieved by making various cases of different treatments in the encryption process depending on the input data. Five tweak functions are used to handle the conditional branches, and they are designed to satisfy 55 differential probability constraints, which are used in the security proof of CLOC. In this paper, we show that all these 55 constraints are necessary. This shows the design optimality of the tweak functions in CLOC in that the constraints cannot be relaxed, and hence the specification of the tweak functions cannot be simplified.
Hiroyuki OKAMURA Jungang GUAN Chao LUO Tadashi DOHI
This paper considers how to evaluate the resiliency for virtualized system with software rejuvenation. The software rejuvenation is a proactive technique to prevent the failure caused by aging phenomenon such as resource exhaustion. In particular, according to Gohsh et al. (2010), we compute a quantitative criterion to evaluate resiliency of system by using continuous-time Markov chains (CTMC). In addition, in order to convert general state-based models to CTMCs, we employ PH (phase-type) expansion technique. In numerical examples, we investigate the resiliency of virtualized system with software rejuvenation under two different rejuvenation policies.
Recently, cameras are equipped on cars in order to assist their drivers. These cameras often have a severe radial distortion because of their wide view angle, and sometimes it is necessary to compensate it in a fully automatic way in the field. We have proposed such a method, which uses the entropy of the histogram of oriented gradient (HOG) to evaluate the goodness of the compensation. Its performance was satisfactory, but the computational burden was too heavy to be executed by drive assistance devices. In this report, we discuss a method to speed up the algorithm, and obtain a new light algorithm feasible for such devices. We also show more comprehensive performance evaluation results then those in the previous reports.
Yasuhide HIRAGA Jun-ichi NISHIDE Hajime NAKANOTANI Masaki AONUMA Chihaya ADACHI
A highly efficient sky-blue organic light-emitting diode (OLED) based on a thermally-activated delayed fluorescence (TADF) molecule, 1,2-bis(carbazol-9-yl)-4,5-dicyanobenzene (2CzPN), was studied. The sky-blue OLED exhibited a maximum external electroluminescence quantum efficiency (ηEQE) of over 24.0%. In addition, a white OLED using 2CzPN combined with green and orange TADF emitters showed a high ηEQE of 17.3% with a maximum power efficiency of 52.3 lm/W and Commission Internationale de l'Eclairage coordinates of (0.32, 0.43).