The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] FA(3430hit)

301-320hit(3430hit)

  • Combining 3D Convolutional Neural Networks with Transfer Learning by Supervised Pre-Training for Facial Micro-Expression Recognition

    Ruicong ZHI  Hairui XU  Ming WAN  Tingting LI  

     
    PAPER-Pattern Recognition

      Pubricized:
    2019/01/29
      Vol:
    E102-D No:5
      Page(s):
    1054-1064

    Facial micro-expression is momentary and subtle facial reactions, and it is still challenging to automatically recognize facial micro-expression with high accuracy in practical applications. Extracting spatiotemporal features from facial image sequences is essential for facial micro-expression recognition. In this paper, we employed 3D Convolutional Neural Networks (3D-CNNs) for self-learning feature extraction to represent facial micro-expression effectively, since the 3D-CNNs could well extract the spatiotemporal features from facial image sequences. Moreover, transfer learning was utilized to deal with the problem of insufficient samples in the facial micro-expression database. We primarily pre-trained the 3D-CNNs on normal facial expression database Oulu-CASIA by supervised learning, then the pre-trained model was effectively transferred to the target domain, which was the facial micro-expression recognition task. The proposed method was evaluated on two available facial micro-expression datasets, i.e. CASME II and SMIC-HS. We obtained the overall accuracy of 97.6% on CASME II, and 97.4% on SMIC, which were 3.4% and 1.6% higher than the 3D-CNNs model without transfer learning, respectively. And the experimental results demonstrated that our method achieved superior performance compared to state-of-the-art methods.

  • A Sequential Classifiers Combination Method to Reduce False Negative for Intrusion Detection System

    Sornxayya PHETLASY  Satoshi OHZAHATA  Celimuge WU  Toshihito KATO  

     
    PAPER

      Pubricized:
    2019/02/27
      Vol:
    E102-D No:5
      Page(s):
    888-897

    Intrusion detection system (IDS) is a device or software to monitor a network system for malicious activity. In terms of detection results, there could be two types of false, namely, the false positive (FP) which incorrectly detects normal traffic as abnormal, and the false negative (FN) which incorrectly judges malicious traffic as normal. To protect the network system, we expect that FN should be minimized as low as possible. However, since there is a trade-off between FP and FN when IDS detects malicious traffic, it is difficult to reduce the both metrics simultaneously. In this paper, we propose a sequential classifiers combination method to reduce the effect of the trade-off. The single classifier suffers a high FN rate in general, therefore additional classifiers are sequentially combined in order to detect more positives (reduce more FN). Since each classifier can reduce FN and does not generate much FP in our approach, we can achieve a reduction of FN at the final output. In evaluations, we use NSL-KDD dataset, which is an updated version of KDD Cup'99 dataset. WEKA is utilized as a classification tool in experiment, and the results show that the proposed approach can reduce FN while improving the sensitivity and accuracy.

  • Wide-Sense Nonblocking W-S-W Node Architectures for Elastic Optical Networks

    Wojciech KABACIŃSKI  Mustafa ABDULSAHIB  Marek MICHALSKI  

     
    PAPER

      Pubricized:
    2018/11/22
      Vol:
    E102-B No:5
      Page(s):
    978-991

    This paper considers wide-sense nonblocking operation of the Wavelength-Space-Wavelength elastic optical switch. Six control algorithms, based on functional spectrum decomposition in interstage links and functional decomposition of center stage switches, are proposed for two switching fabric architectures. For these algorithms we derived wide-sense nonblocking conditions and compared them with strict-sense nonblocking ones. The results show that the proposed algorithm reduces the required number of frequency slot units (FSUs) or center stage switches, depending on the switching fabric architecture. Savings occur even when connections use small number of frequency slot units.

  • Multimodal Interface for Drawing Diagrams that Does not Interfere with Natural Talking and Drawing

    Xingya XU  Hirohito SHIBATA  

     
    PAPER-Electronic Displays

      Vol:
    E102-C No:5
      Page(s):
    408-415

    The aim of this research is to support real-time drawingin talking by using multimodal user interface technologies. In this situation, if talking and drawing are considered as commands by mistake during presentation, it will disturb users' natural talking and drawing. To prevent this problem, we introduce two modes of a command mode and a free mode, and explore smooth mode switching techniques that does not interfere with users' natural talking and drawing. We evaluate four techniques. Among them, a technique that specifies the command mode after actions using a pen gesture was the most effective. In this technique, users could quickly draw diagrams, and specifying mode switching didn't interfere with users' natural talk.

  • Spectrum-Based Fault Localization Framework to Support Fault Understanding Open Access

    Yong WANG  Zhiqiu HUANG  Yong LI  RongCun WANG  Qiao YU  

     
    LETTER-Software Engineering

      Pubricized:
    2019/01/15
      Vol:
    E102-D No:4
      Page(s):
    863-866

    A spectrum-based fault localization technique (SBFL), which identifies fault location(s) in a buggy program by comparing the execution statistics of the program spectra of passed executions and failed executions, is a popular automatic debugging technique. However, the usefulness of SBFL is mainly affected by the following two factors: accuracy and fault understanding in reality. To solve this issue, we propose a SBFL framework to support fault understanding. In the framework, we firstly localize a suspicious fault module to start debugging and then generate a weighted fault propagation graph (WFPG) for the hypothesis fault module, which weights the suspiciousness for the nodes to further perform block-level fault localization. In order to evaluate the proposed framework, we conduct a controlled experiment to compare two different module-level SBFL approaches and validate the effectiveness of WFPG. According to our preliminary experiments, the results are promising.

  • Simultaneous Reproduction of Reflectance and Transmittance of Ink Paintings

    Shigenobu ASADA  Hiroyuki KUBO  Takuya FUNATOMI  Yasuhiro MUKAIGAWA  

     
    INVITED PAPER

      Pubricized:
    2019/01/29
      Vol:
    E102-D No:4
      Page(s):
    691-701

    The purpose of our research is to reproduce the appearance of frangible historical ink paintings for preserving frangible historical documents and illustrations. We, then, propose a method to reproduce both reflectance and transmittance of ink paintings simultaneously by stacking multiple sheets of printed paper. First, we acquire the relationship between printed ink patterns and the optical properties. Then, stacking printed multiple papers with acquired ink pattern according to the measurement, we realize to fabricate a photo-realistic duplication.

  • Detecting Communities and Correlated Attribute Clusters on Multi-Attributed Graphs

    Hiroyoshi ITO  Takahiro KOMAMIZU  Toshiyuki AMAGASA  Hiroyuki KITAGAWA  

     
    PAPER

      Pubricized:
    2019/02/04
      Vol:
    E102-D No:4
      Page(s):
    810-820

    Multi-attributed graphs, in which each node is characterized by multiple types of attributes, are ubiquitous in the real world. Detection and characterization of communities of nodes could have a significant impact on various applications. Although previous studies have attempted to tackle this task, it is still challenging due to difficulties in the integration of graph structures with multiple attributes and the presence of noises in the graphs. Therefore, in this study, we have focused on clusters of attribute values and strong correlations between communities and attribute-value clusters. The graph clustering methodology adopted in the proposed study involves Community detection, Attribute-value clustering, and deriving Relationships between communities and attribute-value clusters (CAR for short). Based on these concepts, the proposed multi-attributed graph clustering is modeled as CAR-clustering. To achieve CAR-clustering, a novel algorithm named CARNMF is developed based on non-negative matrix factorization (NMF) that can detect CAR in a cooperative manner. Results obtained from experiments using real-world datasets show that the CARNMF can detect communities and attribute-value clusters more accurately than existing comparable methods. Furthermore, clustering results obtained using the CARNMF indicate that CARNMF can successfully detect informative communities with meaningful semantic descriptions through correlations between communities and attribute-value clusters.

  • Learning of Nonnegative Matrix Factorization Models for Inconsistent Resolution Dataset Analysis

    Masahiro KOHJIMA  Tatsushi MATSUBAYASHI  Hiroshi SAWADA  

     
    INVITED PAPER

      Pubricized:
    2019/02/04
      Vol:
    E102-D No:4
      Page(s):
    715-723

    Due to the need to protect personal information and the impracticality of exhaustive data collection, there is increasing need to deal with datasets with various levels of granularity, such as user-individual data and user-group data. In this study, we propose a new method for jointly analyzing multiple datasets with different granularity. The proposed method is a probabilistic model based on nonnegative matrix factorization, which is derived by introducing latent variables that indicate the high-resolution data underlying the low-resolution data. Experiments on purchase logs show that the proposed method has a better performance than the existing methods. Furthermore, by deriving an extension of the proposed method, we show that the proposed method is a new fundamental approach for analyzing datasets with different granularity.

  • NFRR: A Novel Family Relationship Recognition Algorithm Based on Telecom Social Network Spectrum

    Kun NIU  Haizhen JIAO  Cheng CHENG  Huiyang ZHANG  Xiao XU  

     
    PAPER

      Pubricized:
    2019/01/11
      Vol:
    E102-D No:4
      Page(s):
    759-767

    There are different types of social ties among people, and recognizing specialized types of relationship, such as family or friend, has important significance. It can be applied to personal credit, criminal investigation, anti-terrorism and many other business scenarios. So far, some machine learning algorithms have been used to establish social relationship inferencing models, such as Decision Tree, Support Vector Machine, Naive Bayesian and so on. Although these algorithms discover family members in some context, they still suffer from low accuracy, parameter sensitive, and weak robustness. In this work, we develop a Novel Family Relationship Recognition (NFRR) algorithm on telecom dataset for identifying one's family members from its contact list. In telecom dataset, all attributes are divided into three series, temporal, spatial and behavioral. First, we discover the most probable places of residence and workplace by statistical models, then we aggregate data and select the top-ranked contacts as the user's intimate contacts. Next, we establish Relational Spectrum Matrix (RSM) of each user and its intimate contacts to form communication feature. Then we search the user's nearest neighbors in labelled training set and generate its Specialized Family Spectrum (SFS). Finally, we decide family relationship by comparing the similarity between RSM of intimate contacts and the SFS. We conduct complete experiments to exhibit effectiveness of the proposed algorithm, and experimental results also show that it has a lower complexity.

  • Security Performance Analysis for Relay Selection in Cooperative Communication System under Nakagami-m Fading Channel

    Guangna ZHANG  Yuanyuan GAO  Huadong LUO  Nan SHA  Shijie WANG  Kui XU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/09/14
      Vol:
    E102-B No:3
      Page(s):
    603-612

    In this paper, we investigate a cooperative communication system comprised of a source, a destination, and multiple decode-and-forward (DF) relays in the presence of a potential malicious eavesdropper is within or without the coverage area of the source. Based on the more general Nakagami-m fading channels, we analyze the security performance of the single-relay selection and multi-relay selection schemes for protecting the source against eavesdropping. In the single-relay selection scheme, only the best relay is chosen to assist in the source transmission. Differing from the single-relay selection, multi-relay selection scheme allows multiple relays to forward the source to the destination. We also consider the classic direct transmission as a benchmark scheme to compare with the two relay selection schemes. We derive the exact closed-form expressions of outage probability (OP) and intercept probability (IP) for the direct transmission, the single-relay selection as well as the multi-relay selection scheme over Nakagami-m fading channel when the eavesdropper is within and without the coverage area of the source. Moreover, the security-reliability tradeoff (SRT) of these three schemes are also analyzed. It is verified that the SRT of the multi-relay selection consistently outperforms the single-relay selection, which of both the single-relay and multi-relay selection schemes outperform the direct transmission when the number of relays is large, no matter the eavesdropper is within or without the coverage of the source. In addition, as the number of DF relays increases, the SRT of relay selection schemes improve notably. However, the SRT of both two relay selection approaches become worse when the eavesdropper is within the coverage area of the source.

  • Link Adaptation of Two-Way AF Relaying Network with Channel Estimation Error over Nakagami-m Fading Channel

    Kyu-Sung HWANG  Chang Kyung SUNG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/09/14
      Vol:
    E102-B No:3
      Page(s):
    581-591

    In this paper, we analyze the impact of channel estimation errors in an amplify-and-forward (AF)-based two-way relaying network (TWRN) where adaptive modulation (AM) is employed in individual relaying path. In particular, the performance degradation caused by channel estimation error is investigated over Nakagami-m fading channels. We first derive an end-to-end signal-to-noise ratio (SNR), a cumulative distribution function, and a probability density function in the presence of channel estimation error for the AF-based TWRN with adaptive modulation (TWRN-AM). By utilizing the derived SNR statistics, we present accurate expressions of the average spectral efficiency and bit error rates with an outage-constraint in which transmission does not take place during outage events of bidirectional communications. Based on our derived analytical results, an optimal power allocation scheme for TWRN-AM is proposed to improve the average spectral efficiency by minimizing system outages.

  • Bandwidth-Efficient Blind Nonlinear Compensation of RF Receiver Employing Folded-Spectrum Sub-Nyquist Sampling Technique Open Access

    Kan KIMURA  Yasushi YAMAO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/09/14
      Vol:
    E102-B No:3
      Page(s):
    632-640

    Blind nonlinear compensation for RF receivers is an important research topic in 5G mobile communication, in which higher level modulation schemes are employed more often to achieve high capacity and ultra-broadband services. Since nonlinear compensation circuits must handle intermodulation bandwidths that are more than three times the signal bandwidth, reducing the sampling frequency is essential for saving power consumption. This paper proposes a novel blind nonlinear compensation technique that employs sub-Nyquist sampling analog-to-digital conversion. Although outband distortion spectrum is folded in the proposed sub-Nyquist sampling technique, determination of compensator coefficients is still possible by using the distortion power. Proposed technique achieves almost same compensation performance in EVM as the conventional compensation scheme, while reducing sampling speed of analog to digital convertor (ADC) to less than half the normal sampling frequency. The proposed technique can be applied in concurrent dual-band communication systems and adapt to flat Rayleigh fading environments.

  • Designing Distributed SDN C-Plane Considering Large-Scale Disruption and Restoration Open Access

    Takahiro HIRAYAMA  Masahiro JIBIKI  Hiroaki HARAI  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    452-463

    Software-defined networking (SDN) technology enables us to flexibly configure switches in a network. Previously, distributed SDN control methods have been discussed to improve their scalability and robustness. Distributed placement of controllers and backing up each other enhance robustness. However, these techniques do not include an emergency measure against large-scale failures such as network separation induced by disasters. In this study, we first propose a network partitioning method to create a robust control plane (C-Plane) against large-scale failures. In our approach, networks are partitioned into multiple sub-networks based on robust topology coefficient (RTC). RTC denotes the probability that nodes in a sub-network isolate from controllers when a large-scale failure occurs. By placing a local controller onto each sub-network, 6%-10% of larger controller-switch connections will be retained after failure as compared to other approaches. Furthermore, we discuss reactive emergency reconstruction of a distributed SDN C-plane. Each node detects a disconnection to its controller. Then, C-plane will be reconstructed by isolated switches and managed by the other substitute controller. Meanwhile, our approach reconstructs C-plane when network connectivity recovers. The main and substitute controllers detect network restoration and merge their C-planes without conflict. Simulation results reveal that our proposed method recovers C-plane logical connectivity with a probability of approximately 90% when failure occurs in 100 node networks. Furthermore, we demonstrate that the convergence time of our reconstruction mechanism is proportional to the network size.

  • Fast Intra Prediction and CU Partition Algorithm for Virtual Reality 360 Degree Video Coding

    Zhi LIU  Cai XU  Mengmeng ZHANG  Wen YUE  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2018/12/18
      Vol:
    E102-D No:3
      Page(s):
    666-669

    Virtual Reality (VR) 360 degree video has ultra-high definition. Reducing the coding complexity becomes a key consideration in coding algorithm design. In this paper, a novel candidate mode pruning process is introduced between Rough Mode Decision and Most Probable Mode based on the statistical analysis of the intra-coding parameters used in VR 360 degree video coding under Cubemap projection (CMP) format. In addition, updated coding bits thresholds for VR 360 degree video are designed in the proposed algorithm. The experimental results show that the proposed algorithm brings 38.73% and 23.70% saving in average coding time at the cost of only 1.4% and 2.1% Bjontegaard delta rate increase in All-Intra mode and Randomaccess mode, respectively.

  • Camera Selection in Far-Field Video Surveillance Networks

    Kaimin CHEN  Wei LI  Zhaohuan ZHAN  Binbin LIANG  Songchen HAN  

     
    PAPER-Network

      Pubricized:
    2018/08/29
      Vol:
    E102-B No:3
      Page(s):
    528-536

    Since camera networks for surveillance are becoming extremely dense, finding the most informative and desirable views from different cameras are of increasing importance. In this paper, we propose a camera selection method to achieve the goal of providing the clearest visibility possible and selecting the cameras which exactly capture targets for the far-field surveillance. We design a benefit function that takes into account image visibility and the degree of target matching between different cameras. Here, visibility is defined using the entropy of intensity histogram distribution, and the target correspondence is based on activity features rather than photometric features. The proposed solution is tested in both artificial and real environments. A performance evaluation shows that our target correspondence method well suits far-field surveillance, and our proposed selection method is more effective at identifying the cameras that exactly capture the surveillance target than existing methods.

  • Incorporation of Faulty Prior Knowledge in Multi-Target Device-Free Localization

    Dongping YU  Yan GUO  Ning LI  Qiao SU  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E102-A No:3
      Page(s):
    608-612

    As an emerging and promising technique, device-free localization (DFL) has drawn considerable attention in recent years. By exploiting the inherent spatial sparsity of target localization, the compressive sensing (CS) theory has been applied in DFL to reduce the number of measurements. In practical scenarios, a prior knowledge about target locations is usually available, which can be obtained by coarse localization or tracking techniques. Among existing CS-based DFL approaches, however, few works consider the utilization of prior knowledge. To make use of the prior knowledge that is partly or erroneous, this paper proposes a novel faulty prior knowledge aided multi-target device-free localization (FPK-DFL) method. It first incorporates the faulty prior knowledge into a three-layer hierarchical prior model. Then, it estimates location vector and learns model parameters under a variational Bayesian inference (VBI) framework. Simulation results show that the proposed method can improve the localization accuracy by taking advantage of the faulty prior knowledge.

  • Independent Low-Rank Matrix Analysis Based on Generalized Kullback-Leibler Divergence Open Access

    Shinichi MOGAMI  Yoshiki MITSUI  Norihiro TAKAMUNE  Daichi KITAMURA  Hiroshi SARUWATARI  Yu TAKAHASHI  Kazunobu KONDO  Hiroaki NAKAJIMA  Hirokazu KAMEOKA  

     
    LETTER-Engineering Acoustics

      Vol:
    E102-A No:2
      Page(s):
    458-463

    In this letter, we propose a new blind source separation method, independent low-rank matrix analysis based on generalized Kullback-Leibler divergence. This method assumes a time-frequency-varying complex Poisson distribution as the source generative model, which yields convex optimization in the spectrogram estimation. The experimental evaluation confirms the proposed method's efficacy.

  • Probabilistic Analysis of Differential Fault Attack on MIBS

    Yang GAO  Yong-juan WANG  Qing-jun YUAN  Tao WANG  Xiang-bin WANG  

     
    PAPER-Information Network

      Pubricized:
    2018/11/16
      Vol:
    E102-D No:2
      Page(s):
    299-306

    We propose a new method of differential fault attack, which is based on the nibble-group differential diffusion property of the lightweight block cipher MIBS. On the basis of the statistical regularity of differential distribution of the S-box, we establish a statistical model and then analyze the relationship between the number of faults injections, the probability of attack success, and key recovering bits. Theoretically, time complexity of recovering the main key reduces to 22 when injecting 3 groups of faults (12 nibbles in total) in 30,31 and 32 rounds, which is the optimal condition. Furthermore, we calculate the expectation of the number of fault injection groups needed to recover 62 bits in main key, which is 3.87. Finally, experimental data verifies the correctness of the theoretical model.

  • FSCRank: A Failure-Sensitive Structure-Based Component Ranking Approach for Cloud Applications

    Na WU  Decheng ZUO  Zhan ZHANG  Peng ZHOU  Yan ZHAO  

     
    PAPER-Dependable Computing

      Pubricized:
    2018/11/13
      Vol:
    E102-D No:2
      Page(s):
    307-318

    Cloud computing has attracted a growing number of enterprises to move their business to the cloud because of the associated operational and cost benefits. Improving availability is one of the major concerns of cloud application owners because modern applications generally comprise a large number of components and failures are common at scale. Fault tolerance enables an application to continue operating properly when failure occurs, but fault tolerance strategy is typically employed for the most important components because of financial concerns. Therefore, identifying important components has become a critical research issue. To address this problem, we propose a failure-sensitive structure-based component ranking approach (FSCRank), which integrates component failure impact and application structure information into component importance evaluation. An iterative ranking algorithm is developed according to the structural characteristics of cloud applications. The experimental results show that FSCRank outperforms the other two structure-based ranking algorithms for cloud applications. In addition, factors that affect application availability optimization are analyzed and summarized. The experimental results suggest that the availability of cloud applications can be greatly improved by implementing fault tolerance strategy for the important components identified by FSCRank.

  • Robust Face Sketch Recognition Using Locality Sensitive Histograms

    Hanhoon PARK  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2018/10/29
      Vol:
    E102-D No:2
      Page(s):
    406-409

    This letter proposes a new face sketch recognition method. Given a query sketch and face photos in a database, the proposed method first synthesizes pseudo sketches by computing the locality sensitive histogram and dense illumination invariant features from the resized face photos, then extracts discriminative features by computing histogram of averaged oriented gradients on the query sketch and pseudo sketches, and finally find a match with the shortest cosine distance in the feature space. It achieves accuracy comparable to the state-of-the-art while showing much more robustness than the existing face sketch recognition methods.

301-320hit(3430hit)