The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] PA(8249hit)

301-320hit(8249hit)

  • Dynamic Fault Tolerance for Multi-Node Query Processing

    Yutaro BESSHO  Yuto HAYAMIZU  Kazuo GODA  Masaru KITSUREGAWA  

     
    PAPER

      Pubricized:
    2022/02/03
      Vol:
    E105-D No:5
      Page(s):
    909-919

    Parallel processing is a typical approach to answer analytical queries on large database. As the size of the database increases, we often try to increase the parallelism by incorporating more processing nodes. However, this approach increases the possibility of node failure as well. According to the conventional practice, if a failure occurs during query processing, the database system restarts the query processing from the beginning. Such temporal cost may be unacceptable to the user. This paper proposes a fault-tolerant query processing mechanism, named PhoeniQ, for analytical parallel database systems. PhoeniQ continuously takes a checkpoint for every operator pipeline and replicates the output of each stateful operator among different processing nodes. If a single processing node fails during query processing, another can promptly take over the processing. Hence, PhoneniQ allows the database system to efficiently resume query processing after a partial failure event. This paper presents a key design of PhoeniQ and prototype-based experiments to demonstrate that PhoeniQ imposes negligible performance overhead and efficiently continues query processing in the face of node failure.

  • Research on Mongolian-Chinese Translation Model Based on Transformer with Soft Context Data Augmentation Technique

    Qing-dao-er-ji REN  Yuan LI  Shi BAO  Yong-chao LIU  Xiu-hong CHEN  

     
    PAPER-Neural Networks and Bioengineering

      Pubricized:
    2021/11/19
      Vol:
    E105-A No:5
      Page(s):
    871-876

    As the mainstream approach in the field of machine translation, neural machine translation (NMT) has achieved great improvements on many rich-source languages, but performance of NMT for low-resource languages ae not very good yet. This paper uses data enhancement technology to construct Mongolian-Chinese pseudo parallel corpus, so as to improve the translation ability of Mongolian-Chinese translation model. Experiments show that the above methods can improve the translation ability of the translation model. Finally, a translation model trained with large-scale pseudo parallel corpus and integrated with soft context data enhancement technology is obtained, and its BLEU value is 39.3.

  • Speaker-Independent Audio-Visual Speech Separation Based on Transformer in Multi-Talker Environments

    Jing WANG  Yiyu LUO  Weiming YI  Xiang XIE  

     
    PAPER-Speech and Hearing

      Pubricized:
    2022/01/11
      Vol:
    E105-D No:4
      Page(s):
    766-777

    Speech separation is the task of extracting target speech while suppressing background interference components. In applications like video telephones, visual information about the target speaker is available, which can be leveraged for multi-speaker speech separation. Most previous multi-speaker separation methods are mainly based on convolutional or recurrent neural networks. Recently, Transformer-based Seq2Seq models have achieved state-of-the-art performance in various tasks, such as neural machine translation (NMT), automatic speech recognition (ASR), etc. Transformer has showed an advantage in modeling audio-visual temporal context by multi-head attention blocks through explicitly assigning attention weights. Besides, Transformer doesn't have any recurrent sub-networks, thus supporting parallelization of sequence computation. In this paper, we propose a novel speaker-independent audio-visual speech separation method based on Transformer, which can be flexibly applied to unknown number and identity of speakers. The model receives both audio-visual streams, including noisy spectrogram and speaker lip embeddings, and predicts a complex time-frequency mask for the corresponding target speaker. The model is made up by three main components: audio encoder, visual encoder and Transformer-based mask generator. Two different structures of encoders are investigated and compared, including ResNet-based and Transformer-based. The performance of the proposed method is evaluated in terms of source separation and speech quality metrics. The experimental results on the benchmark GRID dataset show the effectiveness of the method on speaker-independent separation task in multi-talker environments. The model generalizes well to unseen identities of speakers and noise types. Though only trained on 2-speaker mixtures, the model achieves reasonable performance when tested on 2-speaker and 3-speaker mixtures. Besides, the model still shows an advantage compared with previous audio-visual speech separation works.

  • A Data Augmentation Method for Cow Behavior Estimation Systems Using 3-Axis Acceleration Data and Neural Network Technology

    Chao LI  Korkut Kaan TOKGOZ  Ayuka OKUMURA  Jim BARTELS  Kazuhiro TODA  Hiroaki MATSUSHIMA  Takumi OHASHI  Ken-ichi TAKEDA  Hiroyuki ITO  

     
    PAPER-Neural Networks and Bioengineering

      Pubricized:
    2021/09/30
      Vol:
    E105-A No:4
      Page(s):
    655-663

    Cow behavior monitoring is critical for understanding the current state of cow welfare and developing an effective planning strategy for pasture management, such as early detection of disease and estrus. One of the most powerful and cost-effective methods is a neural-network-based monitoring system that analyzes time series data from inertial sensors attached to cows. For this method, a significant challenge is to improve the quality and quantity of teaching data in the development of neural network models, which requires us to collect data that can cover various realistic conditions and assign labels to them. As a result, the cost of data collection is significantly high. This work proposes a data augmentation method to solve two major quality problems in the collection process of teaching data. One is the difficulty and randomicity of teaching data acquisition and the other is the sensor position changes during actual operation. The proposed method can computationally emulate different rotating states of the collar-type sensor device from the measured acceleration data. Furthermore, it generates data for actions that occur less frequently. The verification results showed significantly higher estimation performance with an average accuracy of over 98% for five main behaviors (feeding, walking, drinking, rumination, and resting) based on learning with long short-term memory (LSTM) network. Compared with the estimation performance without data augmentation, which was insufficient with a minimum of 60.48%, the recognition rate was improved by 2.52-37.05pt for various behaviors. In addition, comparison of different rotation intervals was investigated and a 30-degree increment was selected based on the accuracy performances analysis. In conclusion, the proposed data expansion method can improve the accuracy in cow behavior estimation by a neural network model. Moreover, it contributes to a significant reduction of the teaching data collection cost for machine learning and opens many opportunities for new research.

  • Design of Continuous Class-B/J Power Amplifier Based on Mirrored Lowpass Filter Matching Structure

    Guohua LIU  Huabang ZHONG  Cantianci GUO  Zhiqun CHENG  

     
    BRIEF PAPER-Electronic Circuits

      Pubricized:
    2021/10/21
      Vol:
    E105-C No:4
      Page(s):
    172-175

    This paper proposes a methodology for designing broadband class B/J power amplifier based on a mirrored lowpass filter matching structure. According to this filter theory, the impedance of this design method is mainly related to the cutoff frequency. Series inductors and shunt capacitors filter out high frequencies. The change of input impedance with frequency is small in the passband. Which can suppress higher harmonics and expand bandwidth. In order to confirm the validity of the design method, a broadband high-efficiency power amplifier in the 1.3 - 3.9GHz band is designed and fabricated. Measurement results show that the output power is greater than 40.5dBm, drain efficiency is 61.2% - 70.8% and the gain is greater than 10dB.

  • A Method for Generating Color Palettes with Deep Neural Networks Considering Human Perception

    Beiying LIU  Kaoru ARAKAWA  

     
    PAPER-Image, Vision, Neural Networks and Bioengineering

      Pubricized:
    2021/09/30
      Vol:
    E105-A No:4
      Page(s):
    639-646

    A method to generate color palettes from images is proposed. Here, deep neural networks (DNN) are utilized in order to consider human perception. Two aspects of human perception are considered; one is attention to image, and the other is human preference for colors. This method first extracts N regions with dominant color categories from the image considering human attention. Here, N is the number of colors in a color palette. Then, the representative color is obtained from each region considering the human preference for color. Two deep neural-net systems are adopted here, one is for estimating the image area which attracts human attention, and the other is for estimating human preferable colors from image regions to obtain representative colors. The former is trained with target images obtained by an eye tracker, and the latter is trained with dataset of color selection by human. Objective and subjective evaluation is performed to show high performance of the proposed system compared with conventional methods.

  • An Algorithm for Single Snapshot 2D-DOA Estimation Based on a Three-Parallel Linear Array Model Open Access

    Shiwen LIN  Yawen ZHOU  Weiqin ZOU  Huaguo ZHANG  Lin GAO  Hongshu LIAO  Wanchun LI  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2021/10/05
      Vol:
    E105-A No:4
      Page(s):
    673-681

    Estimating the spatial parameters of the signals by using the effective data of a single snapshot is essential in the field of reconnaissance and confrontation. Major drawback of existing algorithms is that its constructed covariance matrix has a great degree of rank loss. The performance of existing algorithms gets degraded with low signal-to-noise ratio. In this paper, a three-parallel linear array based algorithm is proposed to achieve two-dimensional direction of arrival estimates in a single snapshot scenario. The key points of the proposed algorithm are: 1) construct three pseudo matrices with full rank and no rank loss by using the single snapshot data from the received signal model; 2) by using the rotation relation between pseudo matrices, the matched 2D-DOA is obtained with an efficient parameter matching method. Main objective of this work is on improving the angle estimation accuracy and reducing the loss of degree of freedom in single snapshot 2D-DOA estimation.

  • Study on Cloud-Based GNSS Positioning Architecture with Satellite Selection Algorithm and Report of Field Experiments

    Seiji YOSHIDA  

     
    PAPER-Satellite Navigation

      Pubricized:
    2021/10/13
      Vol:
    E105-B No:4
      Page(s):
    388-398

    Cloud-based Global Navigation Satellite Systems (CB-GNSS) positioning architecture that offloads part of GNSS positioning computation to cloud/edge infrastructure has been studied as an architecture that adds valued functions via the network. The merits of CB-GNSS positioning are that it can take advantage of the abundant computing resources on the cloud/edge to add unique functions to the positioning calculation and reduce the cost of GNSS receiver terminals. An issue in GNSS positioning is the degradation in positioning accuracy in unideal reception environments where open space is limited and some satellite signals are blocked. To resolve this issue, we propose a satellite selection algorithm that effectively removes the multipath components of blocked satellite signals, which are the main cause of drop in positioning accuracy. We build a Proof of Concept (PoC) test environment of CB-GNSS positioning architecture implementing the proposed satellite selection algorithm and conduct experiments to verify its positioning performance in unideal static and dynamic conditions. For static long-term positioning in a multipath signal reception environment, we found that CB-GNSS positioning with the proposed algorithm enables a low-end GNSS receiver terminal to match the positioning performance comparable to high-end GNSS receiver terminals in terms of the FIX rate. In an autonomous tractor driving experiment on a farm road crossing a windbreak, we succeeded in controlling the tractor's autonomous movement by maintaining highly precise positioning even in the windbreak. These results indicates that the proposed satellite selection algorithm achieves high positioning performance even in poor satellite signal reception environments.

  • Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method

    Jinho CHOI  Taehwa LEE  Kwanwoo KIM  Minjae SEO  Jian CUI  Seungwon SHIN  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2022/01/11
      Vol:
    E105-D No:4
      Page(s):
    824-827

    Bitcoin is currently a hot issue worldwide, and it is expected to become a new legal tender that replaces the current currency started with El Salvador. Due to the nature of cryptocurrency, however, difficulties in tracking led to the arising of misuses and abuses. Consequently, the pain of innocent victims by exploiting these bitcoins abuse is also increasing. We propose a way to detect new signatures by applying two-fold NLP-based clustering techniques to text data of Bitcoin abuse reports received from actual victims. By clustering the reports of text data, we were able to cluster the message templates as the same campaigns. The new approach using the abuse massage template representing clustering as a signature for identifying abusers is much efficacious.

  • On the Asymptotic Evaluation of the Physical Optics Approximation for Plane Wave Scattering by Circular Conducting Cylinders

    Ngoc Quang TA  Hiroshi SHIRAI  

     
    PAPER

      Pubricized:
    2021/10/18
      Vol:
    E105-C No:4
      Page(s):
    128-136

    In this paper, the scattering far-field from a circular electric conducting cylinder has been analyzed by physical optics (PO) approximation for both H and E polarizations. The evaluation of radiation integrations due to the PO current is conducted numerically and analytically. While non-uniform and uniform asymptotic solutions have been derived by the saddle point method, a separate approximation has been made for forward scattering direction. Comparisons among our approximation, direct numerical integration and exact solution results yield a good agreement for electrically large cylinders.

  • Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering

    Xiang SHEN  Dezhi HAN  Chin-Chen CHANG  Liang ZONG  

     
    PAPER-Natural Language Processing

      Pubricized:
    2022/01/06
      Vol:
    E105-D No:4
      Page(s):
    785-796

    Visual Question Answering (VQA) is multi-task research that requires simultaneous processing of vision and text. Recent research on the VQA models employ a co-attention mechanism to build a model between the context and the image. However, the features of questions and the modeling of the image region force irrelevant information to be calculated in the model, thus affecting the performance. This paper proposes a novel dual self-guided attention with sparse question networks (DSSQN) to address this issue. The aim is to avoid having irrelevant information calculated into the model when modeling the internal dependencies on both the question and image. Simultaneously, it overcomes the coarse interaction between sparse question features and image features. First, the sparse question self-attention (SQSA) unit in the encoder calculates the feature with the highest weight. From the self-attention learning of question words, the question features of larger weights are reserved. Secondly, sparse question features are utilized to guide the focus on image features to obtain fine-grained image features, and to also prevent irrelevant information from being calculated into the model. A dual self-guided attention (DSGA) unit is designed to improve modal interaction between questions and images. Third, the sparse question self-attention of the parameter δ is optimized to select these question-related object regions. Our experiments with VQA 2.0 benchmark datasets demonstrate that DSSQN outperforms the state-of-the-art methods. For example, the accuracy of our proposed model on the test-dev and test-std is 71.03% and 71.37%, respectively. In addition, we show through visualization results that our model can pay more attention to important features than other advanced models. At the same time, we also hope that it can promote the development of VQA in the field of artificial intelligence (AI).

  • NFD.P4: NDN In-Networking Cache Implementation Scheme with P4

    Saifeng HOU  Yuxiang HU  Le TIAN  Zhiguang DANG  

     
    LETTER-Information Network

      Pubricized:
    2021/12/27
      Vol:
    E105-D No:4
      Page(s):
    820-823

    This work proposes NFD.P4, a cache implementation scheme in Named Data Networking (NDN), to solve the problem of insufficient cache space of prgrammable switch and realize the practical application of NDN. We transplant the cache function of NDN.P4 to the NDN Forwarding Daemon (NFD) cache server, which replace the memory space of programmable switch.

  • Five Cells and Tilepaint are NP-Complete

    Chuzo IWAMOTO  Tatsuya IDE  

     
    PAPER

      Pubricized:
    2021/10/18
      Vol:
    E105-D No:3
      Page(s):
    508-516

    Five Cells and Tilepaint are Nikoli's pencil puzzles. We study the computational complexity of Five Cells and Tilepaint puzzles. It is shown that deciding whether a given instance of each puzzle has a solution is NP-complete.

  • Sublinear Computation Paradigm: Constant-Time Algorithms and Sublinear Progressive Algorithms Open Access

    Kyohei CHIBA  Hiro ITO  

     
    INVITED PAPER-Algorithms and Data Structures

      Pubricized:
    2021/10/08
      Vol:
    E105-A No:3
      Page(s):
    131-141

    The challenges posed by big data in the 21st Century are complex: Under the previous common sense, we considered that polynomial-time algorithms are practical; however, when we handle big data, even a linear-time algorithm may be too slow. Thus, sublinear- and constant-time algorithms are required. The academic research project, “Foundations of Innovative Algorithms for Big Data,” which was started in 2014 and will finish in September 2021, aimed at developing various techniques and frameworks to design algorithms for big data. In this project, we introduce a “Sublinear Computation Paradigm.” Toward this purpose, we first provide a survey of constant-time algorithms, which are the most investigated framework of this area, and then present our recent results on sublinear progressive algorithms. A sublinear progressive algorithm first outputs a temporary approximate solution in constant time, and then suggests better solutions gradually in sublinear-time, finally finds the exact solution. We present Sublinear Progressive Algorithm Theory (SPA Theory, for short), which enables to make a sublinear progressive algorithm for any property if it has a constant-time algorithm and an exact algorithm (an exponential-time one is allowed) without losing any computation time in the big-O sense.

  • Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring and Field

    Hikaru TSUCHIDA  Takashi NISHIDE  Yusaku MAEDA  

     
    PAPER

      Pubricized:
    2021/09/14
      Vol:
    E105-A No:3
      Page(s):
    214-230

    Multiparty computation (MPC) is the technology that computes an arbitrary function represented as a circuit without revealing input values. Typical MPC uses secret sharing (SS) schemes, garbled circuit (GC), and homomorphic encryption (HE). These cryptographic technologies have a trade-off relationship for the computation cost, communication cost, and type of computable circuit. Hence, the optimal choice depends on the computing resources, communication environment, and function related to applications. The private decision tree evaluation (PDTE) is one of the important applications of secure computation. There exist several PDTE protocols with constant communication rounds using GC, HE, and SS-MPC over the field. However, to the best of our knowledge, PDTE protocols with constant communication rounds using MPC based on SS over the ring (requiring only lower computation costs and communication complexity) are non-trivial and still missing. In this paper, we propose a PDTE protocol based on a three-party computation (3PC) protocol over the ring with one corruption. We also propose another three-party PDTE protocol over the field with one corruption that is more efficient than the naive construction.

  • Efficient Zero-Knowledge Proofs of Graph Signature for Connectivity and Isolation Using Bilinear-Map Accumulator

    Toru NAKANISHI  Hiromi YOSHINO  Tomoki MURAKAMI  Guru-Vamsi POLICHARLA  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/09/08
      Vol:
    E105-A No:3
      Page(s):
    389-403

    To prove the graph relations such as the connectivity and isolation for a certified graph, a system of a graph signature and proofs has been proposed. In this system, an issuer generates a signature certifying the topology of an undirected graph, and issues the signature to a prover. The prover can prove the knowledge of the signature and the graph in the zero-knowledge, i.e., the signature and the signed graph are hidden. In addition, the prover can prove relations on the certified graph such as the connectivity and isolation between two vertexes. In the previous system, using integer commitments on RSA modulus, the graph relations are proved. However, the RSA modulus needs a longer size for each element. Furthermore, the proof size and verification cost depend on the total numbers of vertexes and edges. In this paper, we propose a graph signature and proof system, where these are computed on bilinear groups without the RSA modulus. Moreover, using a bilinear map accumulator, the prover can prove the connectivity and isolation on a graph, where the proof size and verification cost become independent from the total numbers of vertexes and edges.

  • Fault Injection Attacks Utilizing Waveform Pattern Matching against Neural Networks Processing on Microcontroller Open Access

    Yuta FUKUDA  Kota YOSHIDA  Takeshi FUJINO  

     
    PAPER

      Pubricized:
    2021/09/22
      Vol:
    E105-A No:3
      Page(s):
    300-310

    Deep learning applications have often been processed in the cloud or on servers. Still, for applications that require privacy protection and real-time processing, the execution environment is moved to edge devices. Edge devices that implement a neural network (NN) are physically accessible to an attacker. Therefore, physical attacks are a risk. Fault attacks on these devices are capable of misleading classification results and can lead to serious accidents. Therefore, we focus on the softmax function and evaluate a fault attack using a clock glitch against NN implemented in an 8-bit microcontroller. The clock glitch is used for fault injection, and the injection timing is controlled by monitoring the power waveform. The specific waveform is enrolled in advance, and the glitch timing pulse is generated by the sum of absolute difference (SAD) matching algorithm. Misclassification can be achieved by appropriately injecting glitches triggered by pattern detection. We propose a countermeasure against fault injection attacks that utilizes the randomization of power waveforms. The SAD matching is disabled by random number initialization on the summation register of the softmax function.

  • Private Decision Tree Evaluation by a Single Untrusted Server for Machine Learnig as a Service

    Yoshifumi SAITO  Wakaha OGATA  

     
    PAPER

      Pubricized:
    2021/09/17
      Vol:
    E105-A No:3
      Page(s):
    203-213

    In this paper, we propose the first private decision tree evaluation (PDTE) schemes which are suitable for use in Machine Learning as a Service (MLaaS) scenarios. In our schemes, a user and a model owner send the ciphertexts of a sample and a decision tree model, respectively, and a single server classifies the sample without knowing the sample nor the decision tree. Although many PDTE schemes have been proposed so far, most of them require to reveal the decision tree to the server. This is undesirable because the classification model is the intellectual property of the model owner, and/or it may include sensitive information used to train the model, and therefore the model also should be hidden from the server. In other PDTE schemes, multiple servers jointly conduct the classification process and the decision tree is kept secret from the servers under the assumption they do not collude. Unfortunately, this assumption may not hold because MLaaS is usually provided by a single company. In contrast, our schemes do not have such problems. In principle, fully homomorphic encryption allows us to classify an encrypted sample based on an encrypted decision tree, and in fact, the existing non-interactive PDTE scheme can be modified so that the server classifies only handling ciphertexts. However, the resulting scheme is less efficient than ours. We also show the experimental results for our schemes.

  • Discriminative Part CNN for Pedestrian Detection

    Yu WANG  Cong CAO  Jien KATO  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2021/12/06
      Vol:
    E105-D No:3
      Page(s):
    700-712

    Pedestrian detection is a significant task in computer vision. In recent years, it is widely used in applications such as intelligent surveillance systems and automated driving systems. Although it has been exhaustively studied in the last decade, the occlusion handling issue still remains unsolved. One convincing idea is to first detect human body parts, and then utilize the parts information to estimate the pedestrians' existence. Many parts-based pedestrian detection approaches have been proposed based on this idea. However, in most of these approaches, the low-quality parts mining and the clumsy part detector combination is a bottleneck that limits the detection performance. To eliminate the bottleneck, we propose Discriminative Part CNN (DP-CNN). Our approach has two main contributions: (1) We propose a high-quality body parts mining method based on both convolutional layer features and body part subclasses. The mined part clusters are not only discriminative but also representative, and can help to construct powerful pedestrian detectors. (2) We propose a novel method to combine multiple part detectors. We convert the part detectors to a middle layer of a CNN and optimize the whole detection pipeline by fine-tuning that CNN. In experiments, it shows astonishing effectiveness of optimization and robustness of occlusion handling.

  • A Localization Method Based on Partial Correlation Analysis for Dynamic Wireless Network Open Access

    Yuki HORIGUCHI  Yusuke ITO  Aohan LI  Mikio HASEGAWA  

     
    LETTER-Nonlinear Problems

      Pubricized:
    2021/09/08
      Vol:
    E105-A No:3
      Page(s):
    594-597

    Recent localization methods for wireless networks cannot be applied to dynamic networks with unknown topology. To solve this problem, we propose a localization method based on partial correlation analysis in this paper. We evaluate our proposed localization method in terms of accuracy, which shows that our proposed method can achieve high accuracy localization for dynamic networks with unknown topology.

301-320hit(8249hit)