The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] OMP(3945hit)

421-440hit(3945hit)

  • Multi Model-Based Distillation for Sound Event Detection Open Access

    Yingwei FU  Kele XU  Haibo MI  Qiuqiang KONG  Dezhi WANG  Huaimin WANG  Tie HONG  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2019/07/08
      Vol:
    E102-D No:10
      Page(s):
    2055-2058

    Sound event detection is intended to identify the sound events in audio recordings, which has widespread applications in real life. Recently, convolutional recurrent neural network (CRNN) models have achieved state-of-the-art performance in this task due to their capabilities in learning the representative features. However, the CRNN models are of high complexities with millions of parameters to be trained, which limits their usage for the mobile and embedded devices with limited computation resource. Model distillation is effective to distill the knowledge of a complex model to a smaller one, which can be deployed on the devices with limited computational power. In this letter, we propose a novel multi model-based distillation approach for sound event detection by making use of the knowledge from models of multiple teachers which are complementary in detecting sound events. Extensive experimental results demonstrated that our approach achieves a compression ratio about 50 times. In addition, better performance is obtained for the sound event detection task.

  • Unconventional Jamming Scheme for Multiple Quadrature Amplitude Modulations Open Access

    Shaoshuai ZHUANSUN  Jun-an YANG  Cong TANG  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Pubricized:
    2019/04/05
      Vol:
    E102-B No:10
      Page(s):
    2036-2044

    It is generally believed that jamming signals similar to communication signals tend to demonstrate better jamming effects. We believe that the above conclusion only works in certain situations. To select the correct jamming scheme for a multi-level quadrature amplitude modulation (MQAM) signal in a complex environment, an optimal jamming method based on orthogonal decomposition (OD) is proposed. The method solves the jamming problem from the perspective of the in-phase dimension and quadrature dimension and exhibits a better jamming effect than normal methods. The method can construct various unconventional jamming schemes to cope with a complex environment and verify the existing jamming schemes. The Experimental results demonstrate that when the jammer ideally knows the received power at the receiver, the proposed method will always have the optimal jamming effects, and the constructed unconventional jamming scheme has an excellent jamming effect compared with normal schemes in the case of a constellation distortion.

  • Hardware-Based Principal Component Analysis for Hybrid Neural Network Trained by Particle Swarm Optimization on a Chip

    Tuan Linh DANG  Yukinobu HOSHINO  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E102-A No:10
      Page(s):
    1374-1382

    This paper presents a hybrid architecture for a neural network (NN) trained by a particle swarm optimization (PSO) algorithm. The NN is implemented on the hardware side while the PSO is executed by a processor on the software side. In addition, principal component analysis (PCA) is also applied to reduce correlated information. The PCA module is implemented in hardware by the SystemVerilog programming language to increase operating speed. Experimental results showed that the proposed architecture had been successfully implemented. In addition, the hardware-based NN trained by PSO (NN-PSO) program was faster than the software-based NN trained by the PSO program. The proposed NN-PSO with PCA also obtained better recognition rates than the NN-PSO without-PCA.

  • A Note on the Zero-Difference Balanced Functions with New Parameters

    Shanding XU  Xiwang CAO  Jian GAO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E102-A No:10
      Page(s):
    1402-1405

    As a generalization of perfect nonlinear (PN) functions, zero-difference balanced (ZDB) functions play an important role in coding theory, cryptography and communications engineering. Inspired by a foregoing work of Liu et al. [1], we present a class of ZDB functions with new parameters based on the cyclotomy in finite fields. Employing these ZDB functions, we obtain simultaneously optimal constant composition codes and perfect difference systems of sets.

  • Device-Free Targets Tracking with Sparse Sampling: A Kronecker Compressive Sensing Approach

    Sixing YANG  Yan GUO  Dongping YU  Peng QIAN  

     
    PAPER

      Pubricized:
    2019/04/26
      Vol:
    E102-B No:10
      Page(s):
    1951-1959

    We research device-free (DF) multi-target tracking scheme in this paper. The existing localization and tracking algorithms are always pay attention to the single target and need to collect a large amount of localization information. In this paper, we exploit the sparse property of multiple target locations to achieve target trace accurately with much less sampling both in the wireless links and the time slots. The proposed approach mainly includes the target localization part and target trace recovery part. In target localization part, by exploiting the inherent sparsity of the target number, Compressive Sensing (CS) is utilized to reduce the wireless links distributed. In the target trace recovery part, we exploit the compressive property of target trace, as well as designing the measurement matrix and the sparse matrix, to reduce the samplings in time domain. Additionally, Kronecker Compressive Sensing (KCS) theory is used to simultaneously recover the multiple traces both of the X label and the Y Label. Finally, simulations show that the proposed approach holds an effective recovery performance.

  • Adaptive Multi-Scale Tracking Target Algorithm through Drone

    Qiusheng HE  Xiuyan SHAO  Wei CHEN  Xiaoyun LI  Xiao YANG  Tongfeng SUN  

     
    PAPER

      Pubricized:
    2019/04/26
      Vol:
    E102-B No:10
      Page(s):
    1998-2005

    In order to solve the influence of scale change on target tracking using the drone, a multi-scale target tracking algorithm is proposed which based on the color feature tracking algorithm. The algorithm realized adaptive scale tracking by training position and scale correlation filters. It can first obtain the target center position of next frame by computing the maximum of the response, where the position correlation filter is learned by the least squares classifier and the dimensionality reduction for color features is analyzed by principal component analysis. The scale correlation filter is obtained by color characteristics at 33 rectangular areas which is set by the scale factor around the central location and is reduced dimensions by orthogonal triangle decomposition. Finally, the location and size of the target are updated by the maximum of the response. By testing 13 challenging video sequences taken by the drone, the results show that the algorithm has adaptability to the changes in the target scale and its robustness along with many other performance indicators are both better than the most state-of-the-art methods in illumination Variation, fast motion, motion blur and other complex situations.

  • Compressed Sensing-Based Multi-Abnormality Self-Detecting and Faults Location Method for UAV Swarms

    Fei XIONG  Hai WANG  Aijing LI  Dongping YU  Guodong WU  

     
    PAPER

      Pubricized:
    2019/04/26
      Vol:
    E102-B No:10
      Page(s):
    1975-1982

    The security of Unmanned Aerial Vehicle (UAV) swarms is threatened by the deployment of anti-UAV systems under complicated environments such as battlefield. Specifically, the faults caused by anti-UAV systems exhibit sparse and compressible characteristics. In this paper, in order to improve the survivability of UAV swarms under complicated environments, we propose a novel multi-abnormality self-detecting and faults location method, which is based on compressed sensing (CS) and takes account of the communication characteristics of UAV swarms. The method can locate the faults when UAV swarms are suffering physical damages or signal attacks. Simulations confirm that the proposed method performs well in terms of abnormalities detecting and faults location when the faults quantity is less than 17% of the quantity of UAVs.

  • A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions

    Nuttapong ATTRAPADUNG  Goichiro HANAOKA  Shinsaku KIYOMOTO  Tomoaki MIMOTO  Jacob C. N. SCHULDT  

     
    PAPER-Cryptography and Information Security

      Vol:
    E102-A No:9
      Page(s):
    1048-1060

    Secure two-party comparison plays a crucial role in many privacy-preserving applications, such as privacy-preserving data mining and machine learning. In particular, the available comparison protocols with the appropriate input/output configuration have a significant impact on the performance of these applications. In this paper, we firstly describe a taxonomy of secure two-party comparison protocols which allows us to describe the different configurations used for these protocols in a systematic manner. This taxonomy leads to a total of 216 types of comparison protocols. We then describe conversions among these types. While these conversions are based on known techniques and have explicitly or implicitly been considered previously, we show that a combination of these conversion techniques can be used to convert a perhaps less-known two-party comparison protocol by Nergiz et al. (IEEE SocialCom 2010) into a very efficient protocol in a configuration where the two parties hold shares of the values being compared, and obtain a share of the comparison result. This setting is often used in multi-party computation protocols, and hence in many privacy-preserving applications as well. We furthermore implement the protocol and measure its performance. Our measurement suggests that the protocol outperforms the previously proposed protocols for this input/output configuration, when off-line pre-computation is not permitted.

  • A Fully-Connected Ising Model Embedding Method and Its Evaluation for CMOS Annealing Machines

    Daisuke OKU  Kotaro TERADA  Masato HAYASHI  Masanao YAMAOKA  Shu TANAKA  Nozomu TOGAWA  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2019/06/10
      Vol:
    E102-D No:9
      Page(s):
    1696-1706

    Combinatorial optimization problems with a large solution space are difficult to solve just using von Neumann computers. Ising machines or annealing machines have been developed to tackle these problems as a promising Non-von Neumann computer. In order to use these annealing machines, every combinatorial optimization problem is mapped onto the physical Ising model, which consists of spins, interactions between them, and their external magnetic fields. Then the annealing machines operate so as to search the ground state of the physical Ising model, which corresponds to the optimal solution of the original combinatorial optimization problem. A combinatorial optimization problem can be firstly described by an ideal fully-connected Ising model but it is very hard to embed it onto the physical Ising model topology of a particular annealing machine, which causes one of the largest issues in annealing machines. In this paper, we propose a fully-connected Ising model embedding method targeting for CMOS annealing machine. The key idea is that the proposed method replicates every logical spin in a fully-connected Ising model and embeds each logical spin onto the physical spins with the same chain length. Experimental results through an actual combinatorial problem show that the proposed method obtains spin embeddings superior to the conventional de facto standard method, in terms of the embedding time and the probability of obtaining a feasible solution.

  • On the Competitive Analysis for the Multi-Objective Time Series Search Problem

    Toshiya ITOH  Yoshinori TAKEI  

     
    PAPER-Optimization

      Vol:
    E102-A No:9
      Page(s):
    1150-1158

    For the multi-objective time series search problem, Hasegawa and Itoh [Theoretical Computer Science, Vol.78, pp.58-66, 2018] presented the best possible online algorithm balanced price policy for any monotone function f:Rk→R. Specifically the competitive ratio with respect to the monotone function f(c1,...,ck)=(c1+…+ck)/k is referred to as the arithmetic mean component competitive ratio. Hasegawa and Itoh derived the explicit representation of the arithmetic mean component competitive ratio for k=2, but it has not been known for any integer k≥3. In this paper, we derive the explicit representations of the arithmetic mean component competitive ratio for k=3 and k=4, respectively. On the other hand, we show that it is computationally difficult to derive the explicit representation of the arithmetic mean component competitive ratio for arbitrary integer k in a way similar to the cases for k=2, 3, and 4.

  • Cefore: Software Platform Enabling Content-Centric Networking and Beyond Open Access

    Hitoshi ASAEDA  Atsushi OOKA  Kazuhisa MATSUZONO  Ruidong LI  

     
    INVITED PAPER

      Pubricized:
    2019/03/22
      Vol:
    E102-B No:9
      Page(s):
    1792-1803

    Information-Centric or Content-Centric Networking (ICN/CCN) is a promising novel network architecture that naturally integrates in-network caching, multicast, and multipath capabilities, without relying on centralized application-specific servers. Software platforms are vital for researching ICN/CCN; however, existing platforms lack a focus on extensibility and lightweight implementation. In this paper, we introduce a newly developed software platform enabling CCN, named Cefore. In brief, Cefore is lightweight, with the ability to run even on top of a resource-constrained device, but is also easily extensible with arbitrary plugin libraries or external software implementations. For large-scale experiments, a network emulator (Cefore-Emu) and network simulator (Cefore-Sim) have also been developed for this platform. Both Cefore-Emu and Cefore-Sim support hybrid experimental environments that incorporate physical networks into the emulated/simulated networks. In this paper, we describe the design, specification, and usage of Cefore as well as Cefore-Emu and Cefore-Sim. We show performance evaluations of in-network caching and streaming on Cefore-Emu and content fetching on Cefore-Sim, verifying the salient features of the Cefore software platform.

  • Differences among Summation Polynomials over Various Forms of Elliptic Curves

    Chen-Mou CHENG  Kenta KODERA  Atsuko MIYAJI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E102-A No:9
      Page(s):
    1061-1071

    The security of elliptic curve cryptography is closely related to the computational complexity of the elliptic curve discrete logarithm problem (ECDLP). Today, the best practical attacks against ECDLP are exponential-time generic discrete logarithm algorithms such as Pollard's rho method. A recent line of inquiry in index calculus for ECDLP started by Semaev, Gaudry, and Diem has shown that, under certain heuristic assumptions, such algorithms could lead to subexponential attacks to ECDLP. In this study, we investigate the computational complexity of ECDLP for elliptic curves in various forms — including Hessian, Montgomery, (twisted) Edwards, and Weierstrass representations — using index calculus. Using index calculus, we aim to determine whether there is any significant difference in the computational complexity of ECDLP for elliptic curves in various forms. We provide empirical evidence and insight showing an affirmative answer in this paper.

  • Generalized Shogi, Chess, and Xiangqi are Constant-Time Testable

    Hiro ITO  Atsuki NAGAO  Teagun PARK  

     
    PAPER-Puzzles

      Vol:
    E102-A No:9
      Page(s):
    1126-1133

    We present constant-time testing algorithms for generalized shogi (Japanese chess), chess, and xiangqi (Chinese chess). These problems are known or believed to be EXPTIME-complete. A testing algorithm (or a tester) for a property accepts an input if it has the property, and rejects it with high probability if it is far from having the property (e.g., at least 2/3) by reading only a constant part of the input. A property is said to be testable if a tester exists. Given any position on a ⌊√n⌋×⌊√n⌋ board with O(n) pieces, the generalized shogi, chess, and xiangqi problem are problems determining the property that “the player who moves first has a winning strategy.” We propose that this property is testable for shogi, chess, and xiangqi. The shogi tester and xiangqi tester have a one-sided-error, but surprisingly, the chess tester has no-error. Over the last decade, many problems have been revealed to be testable, but most of such problems belong to NP. This is the first result on the constant-time testability of EXPTIME-complete problems.

  • On Computational Complexity of Pipe Puzzles

    Takumu SHIRAYAMA  Takuto SHIGEMURA  Yota OTACHI  Shuichi MIYAZAKI  Ryuhei UEHARA  

     
    PAPER-Puzzles

      Vol:
    E102-A No:9
      Page(s):
    1134-1141

    In this paper, we investigate computational complexity of pipe puzzles. A pipe puzzle is a kind of tiling puzzle; the input is a set of cards, and a part of a pipe is drawn on each card. For a given set of cards, we arrange them and connect the pipes. We have to connect all pipes without creating any local loop. While ordinary tiling puzzles, like jigsaw puzzles, ask to arrange the tiles with local consistency, pipe puzzles ask to join all pipes. We first show that the pipe puzzle is NP-complete in general even if the goal shape is quite restricted. We also investigate restricted cases and show some polynomial-time algorithms.

  • Compressed Sensing in Magnetic Resonance Imaging Using Non-Randomly Under-Sampled Signal in Cartesian Coordinates

    Ryo KAZAMA  Kazuki SEKINE  Satoshi ITO  

     
    PAPER-Biological Engineering

      Pubricized:
    2019/05/31
      Vol:
    E102-D No:9
      Page(s):
    1851-1859

    Image quality depends on the randomness of the k-space signal under-sampling in compressed sensing MRI (CS-MRI), especially for two-dimensional image acquisition. We investigate the feasibility of non-random signal under-sampling CS-MRI to stabilize the quality of reconstructed images and avoid arbitrariness in sampling point selection. Regular signal under-sampling for the phase-encoding direction is adopted, in which sampling points are chosen at equal intervals for the phase-encoding direction while varying the sampling density. Curvelet transform was adopted to remove the aliasing artifacts due to regular signal under-sampling. To increase the incoherence between the measurement matrix and the sparsifying transform function, the scale of the curvelet transform was varied in each iterative image reconstruction step. We evaluated the obtained images by the peak-signal-to-noise ratio and root mean squared error in localized 3×3 pixel regions. Simulation studies and experiments showed that the signal-to-noise ratio and the structural similarity index of reconstructed images were comparable to standard random under-sampling CS. This study demonstrated the feasibility of non-random under-sampling based CS by using the multi-scale curvelet transform as a sparsifying transform function. The technique may help to stabilize the obtained image quality in CS-MRI.

  • Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing

    Kazuma OHARA  Yohei WATANABE  Mitsugu IWAMOTO  Kazuo OHTA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E102-A No:9
      Page(s):
    1079-1090

    In recent years, multi-party computation (MPC) frameworks based on replicated secret sharing schemes (RSSS) have attracted the attention as a method to achieve high efficiency among known MPCs. However, the RSSS-based MPCs are still inefficient for several heavy computations like algebraic operations, as they require a large amount and number of communication proportional to the number of multiplications in the operations (which is not the case with other secret sharing-based MPCs). In this paper, we propose RSSS-based three-party computation protocols for modular exponentiation, which is one of the most popular algebraic operations, on the case where the base is public and the exponent is private. Our proposed schemes are simple and efficient in both of the asymptotic and practical sense. On the asymptotic efficiency, the proposed schemes require O(n)-bit communication and O(1) rounds,where n is the secret-value size, in the best setting, whereas the previous scheme requires O(n2)-bit communication and O(n) rounds. On the practical efficiency, we show the performance of our protocol by experiments on the scenario for distributed signatures, which is useful for secure key management on the distributed environment (e.g., distributed ledgers). As one of the cases, our implementation performs a modular exponentiation on a 3,072-bit discrete-log group and 256-bit exponent with roughly 300ms, which is an acceptable parameter for 128-bit security, even in the WAN setting.

  • Computational Complexity of Herugolf and Makaro

    Chuzo IWAMOTO  Masato HARUISHI  Tatsuaki IBUSUKI  

     
    PAPER-Puzzles

      Vol:
    E102-A No:9
      Page(s):
    1118-1125

    Herugolf and Makaro are Nikoli's pencil puzzles. We study the computational complexity of Herugolf and Makaro puzzles. It is shown that deciding whether a given instance of each puzzle has a solution is NP-complete.

  • Graph Similarity Metric Using Graph Convolutional Network: Application to Malware Similarity Match

    Bing-lin ZHAO  Fu-dong LIU  Zheng SHAN  Yi-hang CHEN  Jian LIU  

     
    LETTER-Information Network

      Pubricized:
    2019/05/20
      Vol:
    E102-D No:8
      Page(s):
    1581-1585

    Nowadays, malware is a serious threat to the Internet. Traditional signature-based malware detection method can be easily evaded by code obfuscation. Therefore, many researchers use the high-level structure of malware like function call graph, which is impacted less from the obfuscation, to find the malware variants. However, existing graph match methods rely on approximate calculation, which are inefficient and the accuracy cannot be effectively guaranteed. Inspired by the successful application of graph convolutional network in node classification and graph classification, we propose a novel malware similarity metric method based on graph convolutional network. We use graph convolutional network to compute the graph embedding vectors, and then we calculate the similarity metric of two graph based on the distance between two graph embedding vectors. Experimental results on the Kaggle dataset show that our method can applied to the graph based malware similarity metric method, and the accuracy of clustering application with our method reaches to 97% with high time efficiency.

  • Comprehensive Performance Evaluation of Universal Time-Domain Windowed OFDM-Based LTE Downlink System Open Access

    Keiichi MIZUTANI  Takeshi MATSUMURA  Hiroshi HARADA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/02/22
      Vol:
    E102-B No:8
      Page(s):
    1728-1740

    A variety of all-new systems such as a massive machine type communication (mMTC) system will be supported in 5G and beyond. Although each mMTC device occupies quite narrow bandwidth, the massive number of devices expected will generate a vast array of traffic and consume enormous spectrum resources. Therefore, it is necessary to proactively gather up and exploit fractional spectrum resources including guard bands that are secured but unused by the existing Long Term Evolution (LTE) systems. The guard band is originally secured as a margin for high out-of-band emission (OOBE) caused by the discontinuity between successive symbols in the cyclic prefix-based orthogonal frequency division multiplexing (CP-OFDM), and new-waveforms enabling high OOBE suppression have been widely researched to efficiently allocate narrowband communication to the frequency gap. Time-domain windowing is a well-known signal processing technique for reducing OOBE with low complexity and a universal time-domain windowed OFDM (UTW-OFDM) with a long transition duration exceeding the CP length has demonstrated its ability in WLAN-based systems. In this paper, we apply UTW-OFDM to the LTE downlink system and comprehensively evaluate its performance under the channel models defined by 3GPP. Specifically, we evaluate OOBE reduction and block error rate (BLER) by computer simulation and clarify how far OOBE can be reduced without degrading communication quality. Furthermore, we estimate the implementation complexity of the proposed UTW-OFDM, the conventional CP-OFDM, and the universal filtered-OFDM (UF-OFDM) by calculating the number of required multiplications. These evaluation and estimation results demonstrate that the proposed UTW-OFDM is a practical new-waveform applicable to the 5G and beyond.

  • Sparse Random Block-Banded Toeplitz Matrix for Compressive Sensing

    Xiao XUE  Song XIAO  Hongping GAN  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2019/02/18
      Vol:
    E102-B No:8
      Page(s):
    1565-1578

    In compressive sensing theory (CS), the restricted isometry property (RIP) is commonly used for the measurement matrix to guarantee the reliable recovery of sparse signals from linear measurements. Although many works have indicated that random matrices with excellent recovery performance satisfy the RIP with high probability, Toeplitz-structured matrices arise naturally in real scenarios, such as applications of linear time-invariant systems. Thus, the corresponding measurement matrix can be modeled as a Toeplitz (partial) structured matrix instead of a completely random matrix. The structure characteristics introduce coherence and cause the performance degradation of the measurement matrix. To enhance the recovery performance of the Toeplitz structured measurement matrix in multichannel convolution source separation, an efficient construction of measurement matrix is presented, referred to as sparse random block-banded Toeplitz matrix (SRBT). The sparse signal is pre-randomized by locally scrambling its sample locations. Then, the signal is subsampled using the sparse random banded matrix. Finally, the mixing measurements are obtained. Based on the analysis of eigenvalues, the theoretical results indicate that the SRBT matrix satisfies the RIP with high probability. Simulation results show that the SRBT matrix almost matches the recovery performance of random matrices. Compared with the existing banded block Toeplitz matrix, SRBT significantly improves the probability of successful recovery. Additionally, SRBT has the advantages of low storage requirements and fast computation in reconstruction.

421-440hit(3945hit)