The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

801-820hit(20498hit)

  • Bitstream-Quality-Estimation Model for Tile-Based VR Video Streaming Services Open Access

    Masanori KOIKE  Yuichiro URATA  Kazuhisa YAMAGISHI  

     
    PAPER-Multimedia Systems for Communications

      Pubricized:
    2022/02/18
      Vol:
    E105-B No:8
      Page(s):
    1002-1013

    Tile-based virtual reality (VR) video consists of high-resolution tiles that are displayed in accordance with the users' viewing directions and a low-resolution tile that is the entire VR video and displayed when users change their viewing directions. Whether users perceive quality degradation when watching tile-based VR video depends on high-resolution tile size, the quality of high- and low-resolution tiles, and network condition. The display time of low-resolution tile (hereafter delay) affects users' perceived quality because longer delay makes users watch the low-resolution tiles longer. Since these degradations of low-resolution tiles markedly affect users' perceived quality, these points have to be considered in the quality-estimation model. Therefore, we propose a bitstream-quality-estimation model for tile-based VR video streaming services and investigate the effect of bitstream parameters and delay on tile-based VR video quality. Subjective experiments on several videos of different qualities and a comparison between other video quality-estimation models were conducted. In this paper, we prove that the proposed model can improve the quality-estimation accuracy by using the high- and low-resolution tiles' quantization parameters, resolution, framerate, and delay. Subjective experimental results show that the proposed model can estimate the quality of tile-based VR video more accurately than other video quality-estimation models.

  • A Hybrid Genetic Service Mining Method Based on Trace Clustering Population

    Yahui TANG  Tong LI  Rui ZHU  Cong LIU  Shuaipeng ZHANG  

     
    PAPER-Office Information Systems, e-Business Modeling

      Pubricized:
    2022/04/28
      Vol:
    E105-D No:8
      Page(s):
    1443-1455

    Service mining aims to use process mining for the analysis of services, making it possible to discover, analyze, and improve service processes. In the context of Web services, the recording of all kinds of events related to activities is possible, which can be used to extract new information of service processes. However, the distributed nature of the services tends to generate large-scale service event logs, which complicates the discovery and analysis of service processes. To solve this problem, this research focus on the existing large-scale service event logs, a hybrid genetic service mining based on a trace clustering population method (HGSM) is proposed. By using trace clustering, the complex service system is divided into multiple functionally independent components, thereby simplifying the mining environment; And HGSM improves the mining efficiency of the genetic mining algorithm from the aspects of initial population quality improvement and genetic operation improvement, makes it better handle large service event logs. Experimental results demonstrate that compare with existing state-of-the-art mining methods, HGSM has better characteristics to handle large service event logs, in terms of both the mining efficiency and model quality.

  • Blind Signal Separation for Array Radar Measurement Using Mathematical Model of Pulse Wave Propagation Open Access

    Takuya SAKAMOTO  

     
    PAPER-Sensing

      Pubricized:
    2022/02/18
      Vol:
    E105-B No:8
      Page(s):
    981-989

    This paper presents a novel blind signal separation method for the measurement of pulse waves at multiple body positions using an array radar system. The proposed method is based on a mathematical model of pulse wave propagation. The model relies on three factors: (1) a small displacement approximation, (2) beam pattern orthogonality, and (3) an impulse response model of pulse waves. The separation of radar echoes is formulated as an optimization problem, and the associated objective function is established using the mathematical model. We evaluate the performance of the proposed method using measured radar data from participants lying in a prone position. The accuracy of the proposed method, in terms of estimating the body displacements, is measured using reference data taken from laser displacement sensors. The average estimation errors are found to be 10-21% smaller than those of conventional methods. These results indicate the effectiveness of the proposed method for achieving noncontact measurements of the displacements of multiple body positions.

  • Short-Term Stock Price Prediction by Supervised Learning of Rapid Volume Decrease Patterns

    Jangmin OH  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2022/05/20
      Vol:
    E105-D No:8
      Page(s):
    1431-1442

    Recently several researchers have proposed various methods to build intelligent stock trading and portfolio management systems using rapid advancements in artificial intelligence including machine learning techniques. However, existing technical analysis-based stock price prediction studies primarily depend on price change or price-related moving average patterns, and information related to trading volume is only used as an auxiliary indicator. This study focuses on the effect of changes in trading volume on stock prices and proposes a novel method for short-term stock price predictions based on trading volume patterns. Two rapid volume decrease patterns are defined based on the combinations of multiple volume moving averages. The dataset filtered using these patterns is learned through the supervised learning of neural networks. Experimental results based on the data from Korea Composite Stock Price Index and Korean Securities Dealers Automated Quotation, show that the proposed prediction system can achieve a trading performance that significantly exceeds the market average.

  • Minimal Paths in a Bicube

    Masaaki OKADA  Keiichi KANEKO  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2022/04/22
      Vol:
    E105-D No:8
      Page(s):
    1383-1392

    Nowadays, a rapid increase of demand on high-performance computation causes the enthusiastic research activities regarding massively parallel systems. An interconnection network in a massively parallel system interconnects a huge number of processing elements so that they can cooperate to process tasks by communicating among others. By regarding a processing element and a link between a pair of processing elements as a node and an edge, respectively, many problems with respect to communication and/or routing in an interconnection network are reducible to the problems in the graph theory. For interconnection networks of the massively parallel systems, many topologies have been proposed so far. The hypercube is a very popular topology and it has many variants. The bicube is a such topology and it can interconnect the same number of nodes with the same degree as the hypercube while its diameter is almost half of that of the hypercube. In addition, the bicube keeps the node-symmetric property. Hence, we focus on the bicube and propose an algorithm that gives a minimal or shortest path between an arbitrary pair of nodes. We give a proof of correctness of the algorithm and demonstrate its execution.

  • Linear Complexity of a Class of Quaternary Sequences with Optimal Autocorrelation

    Lu ZHAO  Bo XU  Tianqing CAO  Jiao DU  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2022/01/13
      Vol:
    E105-A No:7
      Page(s):
    1070-1081

    A unified construction for yielding optimal and balanced quaternary sequences from ideal/optimal balanced binary sequences was proposed by Zeng et al. In this paper, the linear complexity over finite field 𝔽2, 𝔽4 and Galois ring ℤ4 of the quaternary sequences are discussed, respectively. The exact values of linear complexity of sequences obtained by Legendre sequence pair, twin-prime sequence pair and Hall's sextic sequence pair are derived.

  • Backup Resource Allocation of Virtual Machines for Probabilistic Protection under Capacity Uncertainty

    Mitsuki ITO  Fujun HE  Eiji OKI  

     
    PAPER-Network

      Pubricized:
    2022/01/17
      Vol:
    E105-B No:7
      Page(s):
    814-832

    This paper presents robust optimization models for minimizing the required backup capacity while providing probabilistic protection against multiple simultaneous failures of physical machines under uncertain virtual machine capacities in a cloud provider. If random failures occur, the required capacities for virtual machines are allocated to the dedicated backup physical machines, which are determined in advance. We consider two uncertainties: failure event and virtual machine capacity. By adopting a robust optimization technique, we formulate six mixed integer linear programming problems. Numerical results show that for a small size problem, our presented models are applicable to the case that virtual machine capacities are uncertain, and by using these models, we can obtain the optimal solution of the allocation of virtual machines under the uncertainty. A simulated annealing heuristic is presented to solve large size problems. By using this heuristic, an approximate solution is obtained for a large size problem.

  • Performance Evaluation of a Hash-Based Countermeasure against Fake Message Attacks in Sparse Mobile Ad Hoc Networks

    Yuki SHIMIZU  Tomotaka KIMURA  Jun CHENG  

     
    PAPER-Network

      Pubricized:
    2021/12/24
      Vol:
    E105-B No:7
      Page(s):
    833-847

    In this study, we consider fake message attacks in sparse mobile ad hoc networks, in which nodes are chronically isolated. In these networks, messages are delivered to their destination nodes using store-carry-forward routing, where they are relayed by some nodes. Therefore, when a node has messages in its buffer, it can falsify the messages easily. When malicious nodes exist in the network, they alter messages to create fake messages, and then they launch fake message attacks, that is, the fake messages are spread over the network. To analyze the negative effects of a fake message attack, we model the system dynamics without attack countermeasures using a Markov chain, and then formalize some performance metrics (i.e., the delivery probability, mean delivery delay, and mean number of forwarded messages). This analysis is useful for designing countermeasures. Moreover, we consider a hash-based countermeasure against fake message attacks using a hash of the message. Whenever a node that has a message and its hash encounters another node, it probabilistically forwards only one of them to the encountered node. By doing this, the message and the hash value can be delivered to the destination node via different relay nodes. Therefore, even if the destination node receives a fake message, it can verify the legitimacy of the received message. Through simulation experiments, we evaluate the effectiveness of the hash-based countermeasure.

  • Improved Optimal Configuration for Reducing Mutual Coupling in a Two-Level Nested Array with an Even Number of Sensors

    Weichuang YU  Peiyu HE  Fan PAN  Ao CUI  Zili XU  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2021/12/29
      Vol:
    E105-B No:7
      Page(s):
    856-865

    To reduce mutual coupling of a two-level nested array (TLNA) with an even number of sensors, we propose an improved array configuration that exhibits all the good properties of the prototype optimal configuration under the constraint of a fixed number of sensors N and achieves reduction of mutual coupling. Compared with the prototype optimal TLNA (POTLNA), which inner level and outer level both have N/2 sensors, those of the improved optimal TLNA (IOTLNA) are N/2-1 and N/2+1. It is proved that the physical aperture and uniform degrees of freedom (uDOFs) of IOTLNA are the same as those of POTLNA, and the number of sensor pairs with small separations of IOTLNA is reduced. We also construct an improved optimal second-order super nested array (SNA) by using the IOTLNA as the parent nested array, termed IOTLNA-SNA, which has the same physical aperture and the same uDOFs, as well as the IOTLNA. Numerical simulations demonstrate the better performance of the improved array configurations.

  • Reconfiguring k-Path Vertex Covers

    Duc A. HOANG  Akira SUZUKI  Tsuyoshi YAGITA  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2022/04/12
      Vol:
    E105-D No:7
      Page(s):
    1258-1272

    A vertex subset I of a graph G is called a k-path vertex cover if every path on k vertices in G contains at least one vertex from I. The K-PATH VERTEX COVER RECONFIGURATION (K-PVCR) problem asks if one can transform one k-path vertex cover into another via a sequence of k-path vertex covers where each intermediate member is obtained from its predecessor by applying a given reconfiguration rule exactly once. We investigate the computational complexity of K-PVCR from the viewpoint of graph classes under the well-known reconfiguration rules: TS, TJ, and TAR. The problem for k=2, known as the VERTEX COVER RECONFIGURATION (VCR) problem, has been well-studied in the literature. We show that certain known hardness results for VCR on different graph classes can be extended for K-PVCR. In particular, we prove a complexity dichotomy for K-PVCR on general graphs: on those whose maximum degree is three (and even planar), the problem is PSPACE-complete, while on those whose maximum degree is two (i.e., paths and cycles), the problem can be solved in polynomial time. Additionally, we also design polynomial-time algorithms for K-PVCR on trees under each of TJ and TAR. Moreover, on paths, cycles, and trees, we describe how one can construct a reconfiguration sequence between two given k-path vertex covers in a yes-instance. In particular, on paths, our constructed reconfiguration sequence is shortest.

  • A Hybrid Bayesian-Convolutional Neural Network for Adversarial Robustness

    Thi Thu Thao KHONG  Takashi NAKADA  Yasuhiko NAKASHIMA  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2022/04/11
      Vol:
    E105-D No:7
      Page(s):
    1308-1319

    We introduce a hybrid Bayesian-convolutional neural network (hyBCNN) for improving the robustness against adversarial attacks and decreasing the computation time in the Bayesian inference phase. Our hyBCNN models are built from a part of BNN and CNN. Based on pre-trained CNNs, we only replace convolutional layers and activation function of the initial stage of CNNs with our Bayesian convolutional (BC) and Bayesian activation (BA) layers as a term of transfer learning. We keep the remainder of CNNs unchanged. We adopt the Bayes without Bayesian Learning (BwoBL) algorithm for hyBCNN networks to execute Bayesian inference towards adversarial robustness. Our proposal outperforms adversarial training and robust activation function, which are currently the outstanding defense methods of CNNs in the resistance to adversarial attacks such as PGD and C&W. Moreover, the proposed architecture with BwoBL can easily integrate into any pre-trained CNN, especially in scaling networks, e.g., ResNet and EfficientNet, with better performance on large-scale datasets. In particular, under l∞ norm PGD attack of pixel perturbation ε=4/255 with 100 iterations on ImageNet, our best hyBCNN EfficientNet reaches 93.92% top-5 accuracy without additional training.

  • On a Cup-Stacking Concept in Repetitive Collective Communication

    Takashi YOKOTA  Kanemitsu OOTSU  Shun KOJIMA  

     
    LETTER-Computer System

      Pubricized:
    2022/04/15
      Vol:
    E105-D No:7
      Page(s):
    1325-1329

    Parallel computing essentially consists of computation and communication and, in many cases, communication performance is vital. Many parallel applications use collective communications, which often dominate the performance of the parallel execution. This paper focuses on collective communication performance to speed-up the parallel execution. This paper firstly offers our experimental result that splitting a session of collective communication to small portions (slices) possibly enables efficient communication. Then, based on the results, this paper proposes a new concept cup-stacking with a genetic algorithm based methodology. The preliminary evaluation results reveal the effectiveness of the proposed method.

  • PRIGM: Partial-Regression-Integrated Generic Model for Synthetic Benchmarks Robust to Sensor Characteristics

    Kyungmin KIM  Jiung SONG  Jong Wook KWAK  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2022/04/04
      Vol:
    E105-D No:7
      Page(s):
    1330-1334

    We propose a novel synthetic-benchmarks generation model using partial time-series regression, called Partial-Regression-Integrated Generic Model (PRIGM). PRIGM abstracts the unique characteristics of the input sensor data into generic time-series data confirming the generation similarity and evaluating the correctness of the synthetic benchmarks. The experimental results obtained by the proposed model with its formula verify that PRIGM preserves the time-series characteristics of empirical data in complex time-series data within 10.4% on an average difference in terms of descriptive statistics accuracy.

  • Measurement of Complex Waveforms in Wide Wavelength Range by Using Wavelength-Swept Light Source and Linear Optical Sampling

    Sougo SHIMIZU  Chao ZHANG  Fumihiko ITO  

     
    PAPER-Fiber-Optic Transmission for Communications

      Pubricized:
    2021/12/28
      Vol:
    E105-B No:7
      Page(s):
    797-804

    This paper describes a method to evaluate the modulated waveforms output by a high-speed external phase modulator over a wide wavelength range by using linear optical sampling (LOS) and a wavelength-swept light source. The phase-modulated waveform is sampled by LOS together with the reference signal before modulation, and the modulation waveform is observed by removing the phase noise of the light source extracted from the reference signal. In this process, the frequency offset caused by the optical-path length difference between the measurement and reference interferometers is removed by digital signal processing. A pseudo-random binary-sequence modulated signal is observed with a temporal resolution of 10ps. We obtained a dynamic range of ∼40dB for the measurement bandwidth of 10 nm. When the measurement bandwidth is expanded to entire C-Band (∼35nm), the dynamic ranges of 37∼46dB were observed, depending on the wavelengths. The measurement time was sub-seconds throughout the experiment.

  • A Large-Scale SCMA Codebook Optimization and Codeword Allocation Method

    Shiqing QIAN  Wenping GE  Yongxing ZHANG  Pengju ZHANG  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2021/12/24
      Vol:
    E105-B No:7
      Page(s):
    788-796

    Sparse code division multiple access (SCMA) is a non-orthogonal multiple access (NOMA) technology that can improve frequency band utilization and allow many users to share quite a few resource elements (REs). This paper uses the modulation of lattice theory to develop a systematic construction procedure for the design of SCMA codebooks under Gaussian channel environments that can achieve near-optimal designs, especially for cases that consider large-scale SCMA parameters. However, under the condition of large-scale SCMA parameters, the mother constellation (MC) points will overlap, which can be solved by the method of the partial dimensions transformation (PDT). More importantly, we consider the upper bounded error probability of the signal transmission in the AWGN channels, and design a codeword allocation method to reduce the inter symbol interference (ISI) on the same RE. Simulation results show that under different codebook sizes and different overload rates, using two different message passing algorithms (MPA) to verify, the codebook proposed in this paper has a bit error rate (BER) significantly better than the reference codebooks, moreover the convergence time does not exceed that of the reference codebooks.

  • Event-Triggered Global Regulation of an Uncertain Chain of Integrators under Unknown Time-Varying Input Delay

    Sang-Young OH  Ho-Lim CHOI  

     
    LETTER-Systems and Control

      Pubricized:
    2021/12/24
      Vol:
    E105-A No:7
      Page(s):
    1091-1095

    We consider a regulation problem for an uncertain chain of integrators with an unknown time-varying delay in the input. To deal with uncertain parameters and unknown delay, we propose an adaptive event-triggered controller with a dynamic gain. We show that the system is globally regulated and interexecution times are lower bounded. Moreover, we show that these lower bounds can be enlarged by adjusting a control parameter. An example is given for clear illustration.

  • MFG-Based Decentralized Charging Control Design of Large-Scale PEVs with Consideration of Collective Consensus

    Qiaobin FU  Zhenhui XU  Kenichi TAKAI  Tielong SHEN  

     
    PAPER-Systems and Control

      Pubricized:
    2022/01/18
      Vol:
    E105-A No:7
      Page(s):
    1038-1048

    This paper investigates the charging control strategy design problem of a large-scale plug-in electric vehicle (PEV) group, where each PEV aims to find an optimal charging strategy to minimize its own cost function. It should be noted that the collective behavior of the group is coupled in the individual cost function, which complicates the design of decentralized charging strategies. To obtain the decentralized charging strategy, a mean-field game (MFG) formulation is proposed where a penalty on collective consensus is embedded and a class of mean-field coupled time-varying stochastic systems is targeted for solving the MFG which involves the charging model of PEVs as a special case. Then, an augmented system with dimension extension and the policy iteration algorithm are proposed to solve the mean-field game problem for the class of mean-field coupled time-varying stochastic systems. Moreover, analysis of the convergence of proposed approach has been studied. Last, simulation is conducted to illustrate the effectiveness of the proposed MFG-based charging control strategy and shows that the charging control strategy can achieve desired mean-field state and impact to the power grid can be buffered.

  • Position Estimation for the Capsule Endoscope Using High-Definition Numerical Human Body Model and Measurement Open Access

    Akihiro YOSHITAKE  Masaharu TAKAHASHI  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2022/01/11
      Vol:
    E105-B No:7
      Page(s):
    848-855

    Currently, wireless power transmission technology is being developed for capsule endoscopes. By removing the battery, the capsule endoscope is miniaturized, the number of images that can be taken increases, and the risk of harmful substances leaking from the battery when it is damaged inside the body is avoided. Furthermore, diagnostic accuracy is improved by adjusting the directivity of radio waves according to the position of the capsule endoscope to improve efficiency and adjusting the number of images to be taken according to position by real-time position estimation. In this study, we report the result of position estimation in a high-definition numerical human body model and in an experiment on an electromagnetic phantom.

  • Time-Based Current Source: A Highly Digital Robust Current Generator for Switched Capacitor Circuits

    Kentaro YOSHIOKA  

     
    PAPER

      Pubricized:
    2022/01/05
      Vol:
    E105-C No:7
      Page(s):
    324-333

    The resistor variation can severely affect current reference sources, which may vary up to ±40% in scaled CMOS processes. In addition, such variations make the opamp design challenging and increase the design margin, impacting power consumption. This paper proposes a Time-Based Current Source (TBCS): a robust and process-scalable reference current source suitable for switched-capacitor (SC) circuits. We construct a delay-locked-loop (DLL) to lock the current-starved inverter with the reference clock, enabling the use of the settled current directly as a reference current. Since the load capacitors determine the delay, the generated current is decoupled from resistor values and enables a robust reference current source. The prototype TBCS fabricated in 28nm CMOS achieved a minimal area of 1200um2. The current variation is suppressed to half compared to BGR based current sources, confirmed in extensive PVT variation simulations. Moreover, when used as the opamp's bias, TBCS achieves comparable opamp GBW to an ideal current source.

  • IEEE754 Binary32 Floating-Point Logarithmic Algorithms Based on Taylor-Series Expansion with Mantissa Region Conversion and Division

    Jianglin WEI  Anna KUWANA  Haruo KOBAYASHI  Kazuyoshi KUBO  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2022/01/17
      Vol:
    E105-A No:7
      Page(s):
    1020-1027

    In this paper, an algorithm based on Taylor series expansion is proposed to calculate the logarithm (log2x) of IEEE754 binary32 accuracy floating-point number by a multi-domain partitioning method. The general mantissa (1≤x<2) is multiplied by 2, 4, 8, … (or equivalently left-shifted by 1, 2, 3, … bits), the regions of (2≤x<4), (4≤x<8), (8≤x<16),… are considered, and Taylor-series expansion is applied. In those regions, the slope of f(x)=log2 x with respect to x is gentle compared to the region of (1≤x<2), which reduces the required number of terms. We also consider the trade-offs among the numbers of additions, subtractions, and multiplications and Look-Up Table (LUT) size in hardware to select the best algorithm for the engineer's design and build the best hardware device.

801-820hit(20498hit)