The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] CTI(8214hit)

301-320hit(8214hit)

  • Toward Selective Membership Inference Attack against Deep Learning Model

    Hyun KWON  Yongchul KIM  

     
    LETTER

      Pubricized:
    2022/07/26
      Vol:
    E105-D No:11
      Page(s):
    1911-1915

    In this paper, we propose a selective membership inference attack method that determines whether certain data corresponding to a specific class are being used as training data for a machine learning model or not. By using the proposed method, membership or non-membership can be inferred by generating a decision model from the prediction of the inference models and training the confidence values for the data corresponding to the selected class. We used MNIST as an experimental dataset and Tensorflow as a machine learning library. Experimental results show that the proposed method has a 92.4% success rate with 5 inference models for data corresponding to a specific class.

  • Loosening Bolts Detection of Bogie Box in Metro Vehicles Based on Deep Learning

    Weiwei QI  Shubin ZHENG  Liming LI  Zhenglong YANG  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2022/07/28
      Vol:
    E105-D No:11
      Page(s):
    1990-1993

    Bolts in the bogie box of metro vehicles are fasteners which are significant for bogie box structure. Effective loosening bolts detection in early stage can avoid the bolt loss and accident occurrence. Recently, detection methods based on machine vision are developed for bolt loosening. But traditional image processing and machine learning methods have high missed rate and false rate for bolts detection due to the small size and complex background. To address this problem, a loosening bolts defection method based on deep learning is proposed. The proposed method cascades two stages in a coarse-to-fine manner, including location stage based on the Single Shot Multibox Detector (SSD) and the improved SSD sequentially localizing the bogie box and bolts and a semantic segmentation stage with the U-shaped Network (U-Net) to detect the looseness of the bolts. The accuracy and effectiveness of the proposed method are verified with images captured from the Shanghai Metro Line 9. The results show that the proposed method has a higher accuracy in detecting the bolts loosening, which can guarantee the stable operation of the metro vehicles.

  • A KPI Anomaly Detection Method Based on Fast Clustering

    Yun WU  Yu SHI  Jieming YANG  Lishan BAO  Chunzhe LI  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1309-1317

    In the Artificial Intelligence for IT Operations scenarios, KPI (Key Performance Indicator) is a very important operation and maintenance monitoring indicator, and research on KPI anomaly detection has also become a hot spot in recent years. Aiming at the problems of low detection efficiency and insufficient representation learning of existing methods, this paper proposes a fast clustering-based KPI anomaly detection method HCE-DWL. This paper firstly adopts the combination of hierarchical agglomerative clustering (HAC) and deep assignment based on CNN-Embedding (CE) to perform cluster analysis (that is HCE) on KPI data, so as to improve the clustering efficiency of KPI data, and then separately the centroid of each KPI cluster and its Transformed Outlier Scores (TOS) are given weights, and finally they are put into the LightGBM model for detection (the Double Weight LightGBM model, referred to as DWL). Through comparative experimental analysis, it is proved that the algorithm can effectively improve the efficiency and accuracy of KPI anomaly detection.

  • Cost-Effective Service Chain Construction with VNF Sharing Model Based on Finite Capacity Queue

    Daisuke AMAYA  Takuji TACHIBANA  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1361-1371

    Service chaining is attracting attention as a promising technology for providing a variety of network services by applying virtual network functions (VNFs) that can be instantiated on commercial off-the-shelf servers. The data transmission for each service chain has to satisfy the quality of service (QoS) requirements in terms of the loss probability and transmission delay, and hence the amount of resources for each VNF is expected to be sufficient for satisfying the QoS. However, the increase in the amount of VNF resources results in a high cost for improving the QoS. To reduce the cost of utilizing a VNF, sharing VNF instances through multiple service chains is an effective approach. However, the number of packets arriving at the VNF instance is increased, resulting in a degradation of the QoS. It is therefore important to select VNF instances shared by multiple service chains and to determine the amount of resources for the selected VNFs. In this paper, we propose a cost-effective service chain construction with a VNF sharing model. In the proposed method, each VNF is modeled as an M/M/1/K queueing model to evaluate the relationship between the amount of resources and the loss probability. The proposed method determines the VNF sharing, the VNF placement, the amount of resources for each VNF, and the transmission route of each service chain. For the optimization problem, these are applied according to our proposed heuristic algorithm. We evaluate the performance of the proposed method through a simulation. From the numerical examples, we show the effectiveness of the proposed method under certain network topologies.

  • Secondary Ripple Suppression Strategy for a Single-Phase PWM Rectifier Based on Constant Frequency Current Predictive Control

    Hailan ZHOU  Longyun KANG  Xinwei DUAN  Ming ZHAO  

     
    PAPER

      Pubricized:
    2022/03/30
      Vol:
    E105-C No:11
      Page(s):
    667-674

    In the conventional single-phase PWM rectifier, the sinusoidal fluctuating current and voltage on the grid side will generate power ripple with a doubled grid frequency which leads to a secondary ripple in the DC output voltage, and the switching frequency of the conventional model predictive control strategy is not fixed. In order to solve the above two problems, a control strategy for suppressing the secondary ripple based on the three-vector fixed-frequency model predictive current control is proposed. Taking the capacitive energy storage type single-phase PWM rectifier as the research object, the principle of its active filtering is analyzed and a model predictive control strategy is proposed. Simulation and experimental results show that the proposed strategy can significantly reduce the secondary ripple of the DC output voltage, reduce the harmonic content of the input current, and achieve a constant switching frequency.

  • Evaluation and Extraction of Equivalent Circuit Parameters for GSG-Type Bonding Wires Using Electromagnetic Simulator Open Access

    Takuichi HIRANO  

     
    BRIEF PAPER

      Pubricized:
    2022/05/17
      Vol:
    E105-C No:11
      Page(s):
    692-695

    In this paper, the author performed an electromagnetic field simulation of a typical bonding wire structure that connects a chip and a package, and evaluated the signal transmission characteristics (S-parameters). In addition, the inductance per unit length was extracted by comparing with the equivalent circuit of the distributed constant line. It turns out that the distributed constant line model is not sufficient because there are frequencies where chip-package resonance occurs. Below the resonance frequency, the conventional low-frequency approximation model was effective, and it was found that the inductance was about 1nH/mm.

  • SOME/IP Intrusion Detection System Using Machine Learning

    Jaewoong HEO  Hyunghoon KIM  Hyo Jin JO  

     
    LETTER

      Pubricized:
    2022/07/13
      Vol:
    E105-D No:11
      Page(s):
    1923-1924

    With the development of in-vehicle network technologies, Automotive Ethernet is being applied to modern vehicles. Scalable service-Oriented MiddlewarE over IP (SOME/IP) is an automotive middleware solution that is used for communications of the infotainment domain as well as that of other domains in the vehicle. However, since SOME/IP lacks security, it is vulnerable to a variety of network-based attacks. In this paper, we introduce a new type of intrusion detection system (IDS) leveraging on SOME/IP packet's header information and packet reception time to deal with SOME/IP related network attacks.

  • SDOF-Tracker: Fast and Accurate Multiple Human Tracking by Skipped-Detection and Optical-Flow

    Hitoshi NISHIMURA  Satoshi KOMORITA  Yasutomo KAWANISHI  Hiroshi MURASE  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2022/08/01
      Vol:
    E105-D No:11
      Page(s):
    1938-1946

    Multiple human tracking is a fundamental problem in understanding the context of a visual scene. Although both accuracy and speed are required in real-world applications, recent tracking methods based on deep learning focus on accuracy and require a substantial amount of running time. We aim to improve tracking running speeds by performing human detections at certain frame intervals because it accounts for most of the running time. The question is how to maintain accuracy while skipping human detection. In this paper, we propose a method that interpolates the detection results by using an optical flow, which is based on the fact that someone's appearance does not change much between adjacent frames. To maintain the tracking accuracy, we introduce robust interest point detection within the human regions and a tracking termination metric defined by the distribution of the interest points. On the MOT17 and MOT20 datasets in the MOTChallenge, the proposed SDOF-Tracker achieved the best performance in terms of total running time while maintaining the MOTA metric. Our code is available at https://github.com/hitottiez/sdof-tracker.

  • Online Probabilistic Activation Control of Base Stations Utilizing Temporal System Throughput and Activation States of Neighbor Cells for Heterogeneous Networks Open Access

    Junya TANI  Kenichi HIGUCHI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2022/04/26
      Vol:
    E105-B No:11
      Page(s):
    1458-1466

    In this paper, we propose an online probabilistic activation/deactivation control method for base stations (BSs) in heterogeneous networks based on the temporal system throughput and activation states of neighbor BSs (cells). The conventional method iteratively updates the activation/deactivation states in a probabilistic manner at each BS based on the change in the observed system throughput and activation/deactivation states of that BS between past multiple consecutive discrete times. Since BS activation control increases the system throughput by improving the tradeoff between the reduction in inter-cell interference and the traffic off-loading effect, the activation of a BS whose neighbor BSs are deactivated is likely to result in improved system performance and vice versa. The proposed method newly introduces a metric, which represents the effective ratio of the activated neighbor BSs considering their transmission power and distance to the BS of interest, to the update control of the activation probability. This improves both the convergence rate of the iterative algorithm and throughput performance after convergence. Computer simulation results, in which the mobility of the user terminals is taken into account, show the effectiveness of the proposed method.

  • Penalized and Decentralized Contextual Bandit Learning for WLAN Channel Allocation with Contention-Driven Feature Extraction

    Kota YAMASHITA  Shotaro KAMIYA  Koji YAMAMOTO  Yusuke KODA  Takayuki NISHIO  Masahiro MORIKURA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2022/04/11
      Vol:
    E105-B No:10
      Page(s):
    1268-1279

    In this study, a contextual multi-armed bandit (CMAB)-based decentralized channel exploration framework disentangling a channel utility function (i.e., reward) with respect to contending neighboring access points (APs) is proposed. The proposed framework enables APs to evaluate observed rewards compositionally for contending APs, allowing both robustness against reward fluctuation due to neighboring APs' varying channels and assessment of even unexplored channels. To realize this framework, we propose contention-driven feature extraction (CDFE), which extracts the adjacency relation among APs under contention and forms the basis for expressing reward functions in disentangled form, that is, a linear combination of parameters associated with neighboring APs under contention). This allows the CMAB to be leveraged with a joint linear upper confidence bound (JLinUCB) exploration and to delve into the effectiveness of the proposed framework. Moreover, we address the problem of non-convergence — the channel exploration cycle — by proposing a penalized JLinUCB (P-JLinUCB) based on the key idea of introducing a discount parameter to the reward for exploiting a different channel before and after the learning round. Numerical evaluations confirm that the proposed method allows APs to assess the channel quality robustly against reward fluctuations by CDFE and achieves better convergence properties by P-JLinUCB.

  • User-Centric Design of Millimeter Wave Communications for Beyond 5G and 6G Open Access

    Koji ISHIBASHI  Takanori HARA  Sota UCHIMURA  Tetsuya IYE  Yoshimi FUJII  Takahide MURAKAMI  Hiroyuki SHINBO  

     
    INVITED PAPER

      Pubricized:
    2022/07/13
      Vol:
    E105-B No:10
      Page(s):
    1117-1129

    In this paper, we propose new radio access network (RAN) architecture for reliable millimeter-wave (mmWave) communications, which has the flexibility to meet users' diverse and fluctuating requirements in terms of communication quality. This architecture is composed of multiple radio units (RUs) connected to a common distributed unit (DU) via fronthaul links to virtually enlarge its coverage. We further present grant-free non-orthogonal multiple access (GF-NOMA) for low-latency uplink communications with a massive number of users and robust coordinated multi-point (CoMP) transmission using blockage prediction for uplink/downlink communications with a high data rate and a guaranteed minimum data rate as the technical pillars of the proposed RAN. The numerical results indicate that our proposed architecture can meet completely different user requirements and realize a user-centric design of the RAN for beyond 5G/6G.

  • A Multi-Modal Fusion Network Guided by Feature Co-Occurrence for Urban Region Function Recognition

    Nenghuan ZHANG  Yongbin WANG  Xiaoguang WANG  Peng YU  

     
    PAPER-Multimedia Pattern Processing

      Pubricized:
    2022/07/25
      Vol:
    E105-D No:10
      Page(s):
    1769-1779

    Recently, multi-modal fusion methods based on remote sensing data and social sensing data have been widely used in the field of urban region function recognition. However, due to the high complexity of noise problem, most of the existing methods are not robust enough when applied in real-world scenes, which seriously affect their application value in urban planning and management. In addition, how to extract valuable periodic feature from social sensing data still needs to be further study. To this end, we propose a multi-modal fusion network guided by feature co-occurrence for urban region function recognition, which leverages the co-occurrence relationship between multi-modal features to identify abnormal noise feature, so as to guide the fusion network to suppress noise feature and focus on clean feature. Furthermore, we employ a graph convolutional network that incorporates node weighting layer and interactive update layer to effectively extract valuable periodic feature from social sensing data. Lastly, experimental results on public available datasets indicate that our proposed method yeilds promising improvements of both accuracy and robustness over several state-of-the-art methods.

  • Output Power Characterization of Flexible Thermoelectric Power Generators

    Daiki KANSAKU  Nobuhiro KAWASE  Naoki FUJIWARA  Faizan KHAN  Arockiyasamy Periyanayaga KRISTY  Kuruvankatil Dharmajan NISHA  Toshitaka YAMAKAWA  Kazushi IKEDA  Yasuhiro HAYAKAWA  Kenji MURAKAMI  Masaru SHIMOMURA  Hiroya IKEDA  

     
    BRIEF PAPER

      Pubricized:
    2022/04/21
      Vol:
    E105-C No:10
      Page(s):
    639-642

    To facilitate the reuse of environmental waste heat in our society, we have developed high-efficiency flexible thermoelectric power generators (TEPGs). In this study, we investigated the thermoelectromotive force (TEMF) and output power of a prototype device with 50 pairs of Π-type structures using a homemade measurement system for flexible TEPGs in order to evaluate their characteristics along the thickness direction. The prototype device consisted of C fabrics (CAFs) used as p-type materials, NiCu fabrics (NCFs) used as n-type materials, and Ag fabrics (AGFs) used as metal electrodes. Applying a temperature difference of 5K, we obtained a TEMF of 150μV and maximum output power of 6.4pW. The obtained TEMF was smaller than that expected from the Seebeck coefficients of each fabric, which is considered to be mainly because of the influence of contact thermal resistance at the semiconductor-fabric/AGF interfaces.

  • Highly Efficient High-Power Rectenna with the Diode on Antenna (DoA) Topology Open Access

    Kenji ITOH  Naoki SAKAI  Keisuke NOGUCHI  

     
    INVITED PAPER

      Pubricized:
    2022/03/25
      Vol:
    E105-C No:10
      Page(s):
    483-491

    In this paper, a high-efficiency high-power rectenna with a bridge diode and the diode on antenna (DoA) topology is discussed. First, the topologies of rectifiers and rectennas are discussed to indicate the direction for obtaining highly efficient rectification. Rectifiers with well-matched diode pairs, as double voltage and bridge rectifiers, can reactively terminate even order harmonics, and is suitable for highly efficient operation. A rectenna with the DoA topology is suitable for a direct connection between the highly functional antenna and the rectifier diodes to remove lossy circuit portions. Next, the formulas for the rectification efficiency of the bridge rectifier are demonstrated with the behavioral model. The indicated formulas clarify the fundamental limitation on the rectification efficiency, which is the design goal in case of the DoA topology. Finally, we demonstrate a 5.8 GHz band 1 W rectenna with the bridge diode and the DoA topology. The bridge rectifier that is directly connected to the inductive high-impedance antenna achieved a rectification efficiency of 92.8% at an input power of 1 W. This is close to the fundamental limitation due to the diode performance.

  • A Characterization on Necessary Conditions of Realizability for Reactive System Specifications

    Takashi TOMITA  Shigeki HAGIHARA  Masaya SHIMAKAWA  Naoki YONEZAKI  

     
    PAPER

      Pubricized:
    2022/04/08
      Vol:
    E105-D No:10
      Page(s):
    1665-1677

    This paper focuses on verification for reactive system specifications. A reactive system is an open system that continuously interacts with an uncontrollable external environment, and it must often be highly safe and reliable. However, realizability checking for a given specification is very costly, so we need effective methods to detect and analyze defects in unrealizable specifications to refine them efficiently. We introduce a systematic characterization on necessary conditions of realizability. This characterization is based on quantifications for inputs and outputs in early and late behaviors and reveals four essential aspects of realizability: exhaustivity, strategizability, preservability and stability. Additionally, the characterization derives new necessary conditions, which enable us to classify unrealizable specifications systematically and hierarchically.

  • Antenna Array Self-Calibration Algorithm with Location Errors for MUSIC

    Jian BAI  Lin LIU  Xiaoyang ZHANG  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2022/04/20
      Vol:
    E105-A No:10
      Page(s):
    1421-1424

    The characteristics of antenna array, like sensor location, gain and phase response are rarely perfectly known in realistic situations. Location errors usually have a serious impact on the DOA (direction of arrival) estimation. In this paper, a novel array location calibration method of MUSIC (multiple signal classification) algorithm based on the virtual interpolated array is proposed. First, the paper introduces the antenna array positioning scheme. Then, the self-calibration algorithm of FIR-Winner filter based on virtual interpolation array is derived, and its application restriction are also analyzed. Finally, by simulating the different location errors of antenna array, the effectiveness of the proposed method is validated.

  • Sample Selection Approach with Number of False Predictions for Learning with Noisy Labels

    Yuichiro NOMURA  Takio KURITA  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2022/07/21
      Vol:
    E105-D No:10
      Page(s):
    1759-1768

    In recent years, deep neural networks (DNNs) have made a significant impact on a variety of research fields and applications. One drawback of DNNs is that it requires a huge amount of dataset for training. Since it is very expensive to ask experts to label the data, many non-expert data collection methods such as web crawling have been proposed. However, dataset created by non-experts often contain corrupted labels, and DNNs trained on such dataset are unreliable. Since DNNs have an enormous number of parameters, it tends to overfit to noisy labels, resulting in poor generalization performance. This problem is called Learning with Noisy labels (LNL). Recent studies showed that DNNs are robust to the noisy labels in the early stage of learning before over-fitting to noisy labels because DNNs learn the simple patterns first. Therefore DNNs tend to output true labels for samples with noisy labels in the early stage of learning, and the number of false predictions for samples with noisy labels is higher than for samples with clean labels. Based on these observations, we propose a new sample selection approach for LNL using the number of false predictions. Our method periodically collects the records of false predictions during training, and select samples with a low number of false predictions from the recent records. Then our method iteratively performs sample selection and training a DNNs model using the updated dataset. Since the model is trained with more clean samples and records more accurate false predictions for sample selection, the generalization performance of the model gradually increases. We evaluated our method on two benchmark datasets, CIFAR-10 and CIFAR-100 with synthetically generated noisy labels, and the obtained results which are better than or comparative to the-state-of-the-art approaches.

  • An 8.5-dB Insertion Loss and 0.8° RMS Phase Error Ka-Band CMOS Hybrid Phase Shifter Featuring Nonuniform Matching for Satellite Communication

    Xi FU  Yun WANG  Xiaolin WANG  Xiaofan GU  Xueting LUO  Zheng LI  Jian PANG  Atsushi SHIRANE  Kenichi OKADA  

     
    PAPER

      Pubricized:
    2022/04/11
      Vol:
    E105-C No:10
      Page(s):
    552-560

    This paper presents a high-resolution and low-insertion-loss CMOS hybrid phase shifter with a nonuniform matching technique for satellite communication (SATCOM). The proposed hybrid phase shifter includes three 45° coarse phase-shifting stages and one 45° fine phase-tuning stage. The coarse stages are realized by bridged-T switch-type phase shifters (STPS) with 45° phase steps. The fine-tuning stage is based on a reflective-type phase shifter (RTPS) with two identical LC load tanks for phase tuning. A 0.8° phase resolution is realized by this work to support fine beam steering for the SATCOM. To further reduce the chain insertion loss, a nonuniform matching technique is utilized at the coarse stages. For the coarse and fine stages, the measured RMS gain errors at 29GHz are 0.7dB and 0.3dB, respectively. The measured RMS phase errors are 0.8° and 0.4°, respectively. The proposed hybrid phase shifter maintains return losses of all phase states less than -12dB from 24GHz to 34GHz. The presented hybrid phase shifter is fabricated in a standard 65-nm CMOS technology with a 0.14mm2 active area.

  • Heterogeneous Graph Contrastive Learning for Stance Prediction

    Yang LI  Rui QI  

     
    PAPER-Natural Language Processing

      Pubricized:
    2022/07/25
      Vol:
    E105-D No:10
      Page(s):
    1790-1798

    Stance prediction on social media aims to infer the stances of users towards a specific topic or event, which are not expressed explicitly. It is of great significance for public opinion analysis to extract and determine users' stances using user-generated content on social media. Existing research makes use of various signals, ranging from text content to online network connections of users on these platforms. However, it lacks joint modeling of the heterogeneous information for stance prediction. In this paper, we propose a self-supervised heterogeneous graph contrastive learning framework for stance prediction in online debate forums. Firstly, we perform data augmentation on the original heterogeneous information network to generate an augmented view. The original view and augmented view are learned from a meta-path based graph encoder respectively. Then, the contrastive learning among the two views is conducted to obtain high-quality representations of users and issues. Finally, the stance prediction is accomplished by matrix factorization between users and issues. The experimental results on an online debate forum dataset show that our model outperforms other competitive baseline methods significantly.

  • End-to-End Object Separation for Threat Detection in Large-Scale X-Ray Security Images

    Joanna Kazzandra DUMAGPI  Yong-Jin JEONG  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2022/07/25
      Vol:
    E105-D No:10
      Page(s):
    1807-1811

    Fine-grained image analysis, such as pixel-level approaches, improves threat detection in x-ray security images. In the practical setting, the cost of obtaining complete pixel-level annotations increases significantly, which can be reduced by partially labeling the dataset. However, handling partially labeled datasets can lead to training complicated multi-stage networks. In this paper, we propose a new end-to-end object separation framework that trains a single network on a partially labeled dataset while also alleviating the inherent class imbalance at the data and object proposal level. Empirical results demonstrate significant improvement over existing approaches.

301-320hit(8214hit)