The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] EE(4079hit)

561-580hit(4079hit)

  • Greedy-Based VNF Placement Algorithm for Dynamic Multipath Service Chaining

    Kohei TABOTA  Takuji TACHIBANA  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    429-438

    Softwarized networks are expected to be utilized as a core network for the 5th Generation (5G) mobile services. For the mobile core network architecture, service chaining is expected to be utilized for dynamically steering traffic across multiple network functions. In this paper, for dynamic multipath service chaining, we propose a greedy-based VNF placement algorithm. This method can provide multipath service chaining so as to utilize the node resources such as CPU effectively while decreasing the cost about bandwidth and transmission delay. The proposed algorithm consists of four difference algorithms, and VNFs are placed appropriately with those algorithm. Our proposed algorithm obtains near optimal solution for the formulated optimization problem with a greedy algorithm, and hence multipath service chains can be provided dynamically. We evaluate the performance of our proposed method with simulation and compare its performance with the performances of other methods. In numerical examples, it is shown that our proposed algorithm can provide multipath service chains appropriately so as to utilize the limited amount of node resources effectively. Moreover, it is shown that our proposed algorithm is effective for providing service chaining dynamically in large-scale network.

  • Network Embedding with Deep Metric Learning

    Xiaotao CHENG  Lixin JI  Ruiyang HUANG  Ruifei CUI  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/12/26
      Vol:
    E102-D No:3
      Page(s):
    568-578

    Network embedding has attracted an increasing amount of attention in recent years due to its wide-ranging applications in graph mining tasks such as vertex classification, community detection, and network visualization. Network embedding is an important method to learn low-dimensional representations of vertices in networks, aiming to capture and preserve the network structure. Almost all the existing network embedding methods adopt the so-called Skip-gram model in Word2vec. However, as a bag-of-words model, the skip-gram model mainly utilized the local structure information. The lack of information metrics for vertices in global network leads to the mix of vertices with different labels in the new embedding space. To solve this problem, in this paper we propose a Network Representation Learning method with Deep Metric Learning, namely DML-NRL. By setting the initialized anchor vertices and adding the similarity measure in the training progress, the distance information between different labels of vertices in the network is integrated into the vertex representation, which improves the accuracy of network embedding algorithm effectively. We compare our method with baselines by applying them to the tasks of multi-label classification and data visualization of vertices. The experimental results show that our method outperforms the baselines in all three datasets, and the method has proved to be effective and robust.

  • Fast Intra Prediction and CU Partition Algorithm for Virtual Reality 360 Degree Video Coding

    Zhi LIU  Cai XU  Mengmeng ZHANG  Wen YUE  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2018/12/18
      Vol:
    E102-D No:3
      Page(s):
    666-669

    Virtual Reality (VR) 360 degree video has ultra-high definition. Reducing the coding complexity becomes a key consideration in coding algorithm design. In this paper, a novel candidate mode pruning process is introduced between Rough Mode Decision and Most Probable Mode based on the statistical analysis of the intra-coding parameters used in VR 360 degree video coding under Cubemap projection (CMP) format. In addition, updated coding bits thresholds for VR 360 degree video are designed in the proposed algorithm. The experimental results show that the proposed algorithm brings 38.73% and 23.70% saving in average coding time at the cost of only 1.4% and 2.1% Bjontegaard delta rate increase in All-Intra mode and Randomaccess mode, respectively.

  • Accurate Library Recommendation Using Combining Collaborative Filtering and Topic Model for Mobile Development

    Xiaoqiong ZHAO  Shanping LI  Huan YU  Ye WANG  Weiwei QIU  

     
    PAPER-Software Engineering

      Pubricized:
    2018/12/18
      Vol:
    E102-D No:3
      Page(s):
    522-536

    Background: The applying of third-party libraries is an integral part of many applications. But the libraries choosing is time-consuming even for experienced developers. The automated recommendation system for libraries recommendation is widely researched to help developers to choose libraries. Aim: from software engineering aspect, our research aims to give developers a reliable recommended list of third-party libraries at the early phase of software development lifecycle to help them build their development environment faster; and from technical aspect, our research aims to build a generalizable recommendation system framework which combines collaborative filtering and topic modeling techniques, in order to improve the performance of libraries recommendation significantly. Our works on this research: 1) we design a hybrid methodology to combine collaborative filtering and LDA text mining technology; 2) we build a recommendation system framework successfully based on the above hybrid methodology; 3) we make a well-designed experiment to validate the methodology and framework which use the data of 1,013 mobile application projects; 4) we do the evaluation for the result of the experiment. Conclusions: 1) hybrid methodology with collaborative filtering and LDA can improve the performance of libraries recommendation significantly; 2) based on the hybrid methodology, the framework works very well on the libraries recommendation for helping developers' libraries choosing. Further research is necessary to improve the performance of the libraries recommendation including: 1) use more accurate NLP technologies improve the correlation analysis; 2) try other similarity calculation methodology for collaborative filtering to rise the accuracy; 3) on this research, we just bring the time-series approach to the framework and make an experiment as comparative trial, the result shows that the performance improves continuously, so in further research we plan to use time-series data-mining as the basic methodology to update the framework.

  • Design and Analysis of Approximate Multipliers with a Tree Compressor

    Tongxin YANG  Tomoaki UKEZONO  Toshinori SATO  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E102-A No:3
      Page(s):
    532-543

    Many applications, such as image signal processing, has an inherent tolerance for insignificant inaccuracies. Multiplication is a key arithmetic function for many applications. Approximate multipliers are considered an efficient technique to trade off energy relative to performance and accuracy for the error-tolerant applications. Here, we design and analyze four approximate multipliers that demonstrate lower power consumption and shorter critical path delay than the conventional multiplier. They employ an approximate tree compressor that halves the height of the partial product tree and generates a vector to compensate accuracy. Compared with the conventional Wallace tree multiplier, one of the evaluated 8-bit approximate multipliers reduces power consumption and critical path delay by 36.9% and 38.9%, respectively. With a 0.25% normalized mean error distance, the silicon area required to implement the multiplier is reduced by 50.3%. Our multipliers outperform the previously proposed approximate multipliers relative to power consumption, critical path delay, and design area. Results from two image processing applications also demonstrate that the qualities of the images processed by our multipliers are sufficiently accurate for such error-tolerant applications.

  • Rectifying Transformation Networks for Transformation-Invariant Representations with Power Law

    Chunxiao FAN  Yang LI  Lei TIAN  Yong LI  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2018/12/04
      Vol:
    E102-D No:3
      Page(s):
    675-679

    This letter proposes a representation learning framework of convolutional neural networks (Convnets) that aims to rectify and improve the feature representations learned by existing transformation-invariant methods. The existing methods usually encode feature representations invariant to a wide range of spatial transformations by augmenting input images or transforming intermediate layers. Unfortunately, simply transforming the intermediate feature maps may lead to unpredictable representations that are ineffective in describing the transformed features of the inputs. The reason is that the operations of convolution and geometric transformation are not exchangeable in most cases and so exchanging the two operations will yield the transformation error. The error may potentially harm the performance of the classification networks. Motivated by the fractal statistics of natural images, this letter proposes a rectifying transformation operator to minimize the error. The proposed method is differentiable and can be inserted into the convolutional architecture without making any modification to the optimization algorithm. We show that the rectified feature representations result in better classification performance on two benchmarks.

  • The Covering Radius of the Reed-Muller Code R(3, 7) in R(5, 7) Is 20

    Gui LI  Qichun WANG  Shi SHU  

     
    LETTER-Coding Theory

      Vol:
    E102-A No:3
      Page(s):
    594-597

    We propose a recursive algorithm to reduce the computational complexity of the r-order nonlinearity of n-variable Boolean functions. Applying the algorithm and using the sufficient and necessary condition put forward by [1] to cut the vast majority of useless search branches, we show that the covering radius of the Reed-Muller Code R(3, 7) in R(5, 7) is 20.

  • Recursive Nearest Neighbor Graph Partitioning for Extreme Multi-Label Learning

    Yukihiro TAGAMI  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/11/30
      Vol:
    E102-D No:3
      Page(s):
    579-587

    As the data size of Web-related multi-label classification problems continues to increase, the label space has also grown extremely large. For example, the number of labels appearing in Web page tagging and E-commerce recommendation tasks reaches hundreds of thousands or even millions. In this paper, we propose a graph partitioning tree (GPT), which is a novel approach for extreme multi-label learning. At an internal node of the tree, the GPT learns a linear separator to partition a feature space, considering approximate k-nearest neighbor graph of the label vectors. We also developed a simple sequential optimization procedure for learning the linear binary classifiers. Extensive experiments on large-scale real-world data sets showed that our method achieves better prediction accuracy than state-of-the-art tree-based methods, while maintaining fast prediction.

  • Fabrication and Evaluation of Integrated Photonic Array-Antenna System for RoF Based Remote Antenna Beam Forming

    Takayoshi HIRASAWA  Shigeyuki AKIBA  Jiro HIROKAWA  Makoto ANDO  

     
    PAPER-Lasers, Quantum Electronics

      Vol:
    E102-C No:3
      Page(s):
    235-242

    This paper studies the performance of the quantitative RF power variation in Radio-over-Fiber beam forming system utilizing a phased array-antenna integrating photo-diodes in downlink network for next generation millimeter wave band radio access. Firstly, we described details of fabrication of an integrated photonic array-antenna (IPA), where a 60GHz patch antenna 4×2 array and high-speed photo-diodes were integrated into a substrate. We evaluated RF transmission efficiency as an IPA system for Radio-over-Fiber (RoF)-based mobile front hall architecture with remote antenna beam forming capability. We clarified the characteristics of discrete and integrated devices such as an intensity modulator (IM), an optical fiber and the IPA and calculated RF power radiated from the IPA taking account of the measured data of the devices. Based on the experimental results on RF tone signal transmission by utilizing the IPA, attainable transmission distance of wireless communication by improvement and optimization of the used devices was discussed. We deduced that the antenna could output sufficient power when we consider that the cell size of the future mobile communication systems would be around 100 meters or smaller.

  • Scalable State Space Search with Structural-Bottleneck Heuristics for Declarative IT System Update Automation Open Access

    Takuya KUWAHARA  Takayuki KURODA  Manabu NAKANOYA  Yutaka YAKUWA  Hideyuki SHIMONISHI  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    439-451

    As IT systems, including network systems using SDN/NFV technologies, become large-scaled and complicated, the cost of system management also increases rapidly. Network operators have to maintain their workflow in constructing and consistently updating such complex systems, and thus these management tasks in generating system update plan are desired to be automated. Declarative system update with state space search is a promising approach to enable this automation, however, the current methods is not enough scalable to practical systems. In this paper, we propose a novel heuristic approach to greatly reduce computation time to solve system update procedure for practical systems. Our heuristics accounts for structural bottleneck of the system update and advance search to resolve bottlenecks of current system states. This paper includes the following contributions: (1) formal definition of a novel heuristic function specialized to system update for A* search algorithm, (2) proofs that our heuristic function is consistent, i.e., A* algorithm with our heuristics returns a correct optimal solution and can omit repeatedly expansion of nodes in search spaces, and (3) results of performance evaluation of our heuristics. We evaluate the proposed algorithm in two cases; upgrading running hypervisor and rolling update of running VMs. The results show that computation time to solve system update plan for a system with 100 VMs does not exceed several minutes, whereas the conventional algorithm is only applicable for a very small system.

  • Fast Lane Detection Based on Deep Convolutional Neural Network and Automatic Training Data Labeling

    Xun PAN  Harutoshi OGAI  

     
    PAPER-Image

      Vol:
    E102-A No:3
      Page(s):
    566-575

    Lane detection or road detection is one of the key features of autonomous driving. In computer vision area, it is still a very challenging target since there are various types of road scenarios which require a very high robustness of the algorithm. And considering the rather high speed of the vehicles, high efficiency is also a very important requirement for practicable application of autonomous driving. In this paper, we propose a deep convolution neural network based lane detection method, which consider the lane detection task as a pixel level segmentation of the lane markings. We also propose an automatic training data generating method, which can significantly reduce the effort of the training phase. Experiment proves that our method can achieve high accuracy for various road scenes in real-time.

  • An Energy Efficient Smart Crest Factor Reduction Scheme in Non-Contiguous Carrier Aggregated Signals

    Dongwan KIM  Kyung-Jae LEE  Daehee KIM  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E102-A No:3
      Page(s):
    604-607

    One of essential requirements for the next generation communications is to support higher spectral efficiency (SE) and energy efficiency (EE) than the existing communication system. For increasing the SE, carrier aggregation (CA) has received great attention. In this paper, we propose an energy efficient smart crest factor reduction (E2S-CFR) method for increasing the EE while satisfying the required SE when the CA is applied. The proposed E2S-CFR exploits different weights on each carrier according to the required error vector magnitude (EVM), and efficiently reduces the peak to average power ratio (PAR). Consequently, we can reduce the bias voltage of a power amplifier, and it leads to save total consumed energy. Through performance evaluation, we demonstrate that the proposed E2S-CFR improves the EE by 11.76% compared to the existing schemes.

  • Incorporation of Faulty Prior Knowledge in Multi-Target Device-Free Localization

    Dongping YU  Yan GUO  Ning LI  Qiao SU  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E102-A No:3
      Page(s):
    608-612

    As an emerging and promising technique, device-free localization (DFL) has drawn considerable attention in recent years. By exploiting the inherent spatial sparsity of target localization, the compressive sensing (CS) theory has been applied in DFL to reduce the number of measurements. In practical scenarios, a prior knowledge about target locations is usually available, which can be obtained by coarse localization or tracking techniques. Among existing CS-based DFL approaches, however, few works consider the utilization of prior knowledge. To make use of the prior knowledge that is partly or erroneous, this paper proposes a novel faulty prior knowledge aided multi-target device-free localization (FPK-DFL) method. It first incorporates the faulty prior knowledge into a three-layer hierarchical prior model. Then, it estimates location vector and learns model parameters under a variational Bayesian inference (VBI) framework. Simulation results show that the proposed method can improve the localization accuracy by taking advantage of the faulty prior knowledge.

  • Discriminative Learning of Filterbank Layer within Deep Neural Network Based Speech Recognition for Speaker Adaptation

    Hiroshi SEKI  Kazumasa YAMAMOTO  Tomoyosi AKIBA  Seiichi NAKAGAWA  

     
    PAPER-Speech and Hearing

      Pubricized:
    2018/11/07
      Vol:
    E102-D No:2
      Page(s):
    364-374

    Deep neural networks (DNNs) have achieved significant success in the field of automatic speech recognition. One main advantage of DNNs is automatic feature extraction without human intervention. However, adaptation under limited available data remains a major challenge for DNN-based systems because of their enormous free parameters. In this paper, we propose a filterbank-incorporated DNN that incorporates a filterbank layer that presents the filter shape/center frequency and a DNN-based acoustic model. The filterbank layer and the following networks of the proposed model are trained jointly by exploiting the advantages of the hierarchical feature extraction, while most systems use pre-defined mel-scale filterbank features as input acoustic features to DNNs. Filters in the filterbank layer are parameterized to represent speaker characteristics while minimizing a number of parameters. The optimization of one type of parameters corresponds to the Vocal Tract Length Normalization (VTLN), and another type corresponds to feature-space Maximum Linear Likelihood Regression (fMLLR) and feature-space Discriminative Linear Regression (fDLR). Since the filterbank layer consists of just a few parameters, it is advantageous in adaptation under limited available data. In the experiment, filterbank-incorporated DNNs showed effectiveness in speaker/gender adaptations under limited adaptation data. Experimental results on CSJ task demonstrate that the adaptation of proposed model showed 5.8% word error reduction ratio with 10 utterances against the un-adapted model.

  • Missing-Value Imputation of Continuous Missing Based on Deep Imputation Network Using Correlations among Multiple IoT Data Streams in a Smart Space

    Minseok LEE  Jihoon AN  Younghee LEE  

     
    PAPER-Information Network

      Pubricized:
    2018/11/01
      Vol:
    E102-D No:2
      Page(s):
    289-298

    Data generated from the Internet of Things (IoT) devices in smart spaces are utilized in a variety of fields such as context recognition, service recommendation, and anomaly detection. However, the missing values in the data streams of the IoT devices remain a challenging problem owing to various missing patterns and heterogeneous data types from many different data streams. In this regard, while we were analyzing the dataset collected from a smart space with multiple IoT devices, we found a continuous missing pattern that is quite different from the existing missing-value patterns. The pattern has blocks of consecutive missing values over a few seconds and up to a few hours. Therefore, the pattern is a vital factor to the availability and reliability of IoT applications; yet, it cannot be solved by the existing missing-value imputation methods. Therefore, a novel approach for missing-value imputation of the continuous missing pattern is required. We deliberate that even if the missing values of the continuous missing pattern occur in one data stream, missing-values imputation is possible through learning other data streams correlated with this data stream. To solve the missing values of the continuous missing pattern problem, we analyzed multiple IoT data streams in a smart space and figured out the correlations between them that are the interdependencies among the data streams of the IoT devices in a smart space. To impute missing values of the continuous missing pattern, we propose a deep learning-based missing-value imputation model exploiting correlation information, namely, the deep imputation network (DeepIN), in a smart space. The DeepIN uses that multiple long short-term memories are constructed according to the correlation information of each IoT data stream. We evaluated the DeepIN on a real dataset from our campus IoT testbed, and the experimental results show that our proposed approach improves the imputation performance by 57.36% over the state-of-the-art missing-value imputation algorithm. Thus, our approach can be a promising methodology that enables IoT applications and services with a reasonable missing-value imputation accuracy (80∼85%) on average, even if a long-term block of values is missing in IoT environments.

  • A Statistical Reputation Approach for Reliable Packet Routing in Ad-Hoc Sensor Networks

    Fang WANG  Zhe WEI  

     
    LETTER-Information Network

      Pubricized:
    2018/11/06
      Vol:
    E102-D No:2
      Page(s):
    396-401

    In this study, we propose a statistical reputation approach for constructing a reliable packet route in ad-hoc sensor networks. The proposed method uses reputation as a measurement for router node selection through which a reliable data route is constructed for packet delivery. To refine the reputation, a transaction density is defined here to showcase the influence of node transaction frequency over the reputation. And to balance the energy consumption and avoid choosing repetitively the same node with high reputation, node remaining energy is also considered as a reputation factor in the selection process. Further, a shortest-path-tree routing protocol is designed so that data packets can reach the base station through the minimum intermediate nodes. Simulation tests illustrate the improvements in the packet delivery ratio and the energy utilization.

  • Personal Data Retrieval and Disambiguation in Web Person Search

    Yuliang WEI  Guodong XIN  Wei WANG  Fang LV  Bailing WANG  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2018/10/24
      Vol:
    E102-D No:2
      Page(s):
    392-395

    Web person search often return web pages related to several distinct namesakes. This paper proposes a new web page model for template-free person data extraction, and uses Dirichlet Process Mixture model to solve name disambiguation. The results show that our method works best on web pages with complex structure.

  • Neural Oscillation-Based Classification of Japanese Spoken Sentences During Speech Perception

    Hiroki WATANABE  Hiroki TANAKA  Sakriani SAKTI  Satoshi NAKAMURA  

     
    PAPER-Biocybernetics, Neurocomputing

      Pubricized:
    2018/11/14
      Vol:
    E102-D No:2
      Page(s):
    383-391

    Brain-computer interfaces (BCIs) have been used by users to convey their intentions directly with brain signals. For example, a spelling system that uses EEGs allows letters on a display to be selected. In comparison, previous studies have investigated decoding speech information such as syllables, words from single-trial brain signals during speech comprehension, or articulatory imagination. Such decoding realizes speech recognition with a relatively short time-lag and without relying on a display. Previous magnetoencephalogram (MEG) research showed that a template matching method could be used to classify three English sentences by using phase patterns in theta oscillations. This method is based on the synchronization between speech rhythms and neural oscillations during speech processing, that is, theta oscillations synchronized with syllabic rhythms and low-gamma oscillations with phonemic rhythms. The present study aimed to approximate this classification method to a BCI application. To this end, (1) we investigated the performance of the EEG-based classification of three Japanese sentences and (2) evaluated the generalizability of our models to other different users. For the purpose of improving accuracy, (3) we investigated the performances of four classifiers: template matching (baseline), logistic regression, support vector machine, and random forest. In addition, (4) we propose using novel features including phase patterns in a higher frequency range. Our proposed features were constructed in order to capture synchronization in a low-gamma band, that is, (i) phases in EEG oscillations in the range of 2-50 Hz from all electrodes used for measuring EEG data (all) and (ii) phases selected on the basis of feature importance (selected). The classification results showed that, except for random forest, most classifiers perform similarly. Our proposed features improved the classification accuracy with statistical significance compared with a baseline feature, which is a phase pattern in neural oscillations in the range of 4-8 Hz from the right hemisphere. The best mean accuracy across folds was 55.9% using template matching trained by all features. We concluded that the use of phase information in a higher frequency band improves the performance of EEG-based sentence classification and that this model is applicable to other different users.

  • Coaxially Fed Antenna Composed of Monopole and Choke Structure Using Two Different Configurations of Composite Right/Left-Handed Coaxial Lines

    Takatsugu FUKUSHIMA  Naobumi MICHISHITA  Hisashi MORISHITA  Naoya FUJIMOTO  

     
    PAPER-Antennas

      Pubricized:
    2018/08/21
      Vol:
    E102-B No:2
      Page(s):
    205-215

    Two kinds of composite right/left-handed coaxial lines (CRLH CLs) are designed for an antenna element. The dispersion relations of the infinite periodic CRLH CLs are designed to occur -1st resonance at around 700 MHz, respectively. The designed CRLH CLs comprise a monopole and a choke structure for antenna elements. To verify the resonant modes and frequencies, the monopole structure, the choke structure, and the antenna element which is combined the monopole and the choke structures are simulated by eigenmode analysis. The resonant frequencies correspond to the dispersion relations. The monopole and the choke structures are applied to the coaxially fed antenna. The proposed antenna matches at 710 MHz and radiates. At the resonant frequency, the total length of the proposed antenna which is the length of the monopole structure plus the choke structure is 0.12 wavelength. The characteristics of the proposed antenna has been compared with that of the conventional coaxially fed monopole antenna without the choke structure and the sleeve antenna with the quarter-wavelength choke structure. The radiation pattern of the proposed antenna is omnidirectional, the total antenna efficiency is 0.73 at resonant frequencies, and leakage current is suppressed lesser than -10 dB at resonant frequency. The propose antenna is fabricated and measured. The measured |S11| characteristics, radiation patterns, and the total antenna efficiency are in good agreement with the simulated results.

  • A Low Cost Solution of Hand Gesture Recognition Using a Three-Dimensional Radar Array

    Shengchang LAN  Zonglong HE  Weichu CHEN  Kai YAO  

     
    PAPER-Sensing

      Pubricized:
    2018/08/21
      Vol:
    E102-B No:2
      Page(s):
    233-240

    In order to provide an alternative solution of human machine interfaces, this paper proposed to recognize 10 human hand gestures regularly used in the consumer electronics controlling scenarios based on a three-dimensional radar array. This radar array was composed of three low cost 24GHz K-band Doppler CW (Continuous Wave) miniature I/Q (In-phase and Quadrature) transceiver sensors perpendicularly mounted to each other. Temporal and spectral analysis was performed to extract magnitude and phase features from six channels of I/Q signals. Two classifiers were proposed to implement the recognition. Firstly, a decision tree classifier performed a fast responsive recognition by using the supervised thresholds. To improve the recognition robustness, this paper further studied the recognition using a two layer CNN (Convolutional Neural Network) classifier with the frequency spectra as the inputs. Finally, the paper demonstrated the experiments and analysed the performances of the radar array respectively. Results showed that the proposed system could reach a high recognition accurate rate higher than 92%.

561-580hit(4079hit)