Manifold learning based image clustering models are usually employed at local level to deal with images sampled from nonlinear manifold. Multimode patterns in image data matrices can vary from nominal to significant due to images with different expressions, pose, illumination, or occlusion variations. We show that manifold learning based image clustering models are unable to achieve well separated images at local level for image datasets with significant multimode data patterns. Because gray level image features used in these clustering models are not able to capture the local neighborhood structure effectively for multimode image datasets. In this study, we use nearest neighborhood quality (NNQ) measure based criterion to improve local neighborhood structure in terms of correct nearest neighbors of images locally. We found Gist as the optimal image descriptor among HOG, Gist, SUN, SURF, and TED image descriptors based on an overall maximum NNQ measure on 10 benchmark image datasets. We observed significant performance improvement for recently reported clustering models such as Spectral Embedded Clustering (SEC) and Nonnegative Spectral Clustering with Discriminative Regularization (NSDR) using proposed approach. Experimentally, significant overall performance improvement of 10.5% (clustering accuracy) and 9.2% (normalized mutual information) on 13 benchmark image datasets is observed for SEC and NSDR clustering models. Further, overall computational cost of SEC model is reduced to 19% and clustering performance for challenging outdoor natural image databases is significantly improved by using proposed NNQ measure based optimal image representations.
Samuli TIIRO Kenta UMEBAYASHI Janne LEHTOMÄKI Yasuo SUZUKI
Cognitive radio (CR) systems aim for more efficient spectrum utilization by having so called secondary users (SUs) transmit on a frequency band reserved for licensed primary users (PUs). The secondary transmissions are allowed provided that no harmful interference will be caused to the PUs. SU terminals with multiple antennas can employ transmit power control with transmit precoding in order to control the interference levels. In most of the existing works, perfect channel state information (CSI) is assumed to be available for the SUs. However, in practical systems where perfect CSI is not available, the SUs are not able to guarantee that the interference constraints are sufficiently satisfied. In this paper, we investigate the problem of spectrum sharing for multiantenna CR systems using estimated CSI. Due to the random nature of the estimation error, we set a probabilistic interference constraint and, in order to satisfy it, provide a density function for the interference power. In addition, we present a power control framework for the SU to meet the probabilistic interference constraint.
Shuji ISOBE Eisuke KOIZUMI Yuji NISHIGAKI Hiroki SHIZUYA
This paper studies the complexity of computing discrete logarithms over algebraic tori. We show that the order certified version of the discrete logarithm problem over general finite fields (OCDL, in symbols) reduces to the discrete logarithm problem over algebraic tori (TDL, in symbols) with respect to the polynomial-time Turing reducibility. This reduction means that if the prime factorization can be computed in polynomial time, then TDL is equivalent to the discrete logarithm problem over general finite fields with respect to the Turing reducibility.
Hyun-Tae KIM Jinung AN Chang Wook AHN
In this paper, a new evolutionary approach to recommender systems is presented. The aim of this work is to develop a new recommendation method that effectively adapts and immediately responds to the user's preference. To this end, content-based filtering is judiciously utilized in conjunction with interactive evolutionary computation (IEC). Specifically, a fitness-based truncation selection and a feature-wise crossover are devised to make full use of desirable properties of promising items within the IEC framework. Moreover, to efficiently search for proper items, the content-based filtering is modified in cooperation with data grouping. The experimental results demonstrate the effectiveness of the proposed approach, compared with existing methods.
The problem of resource allocation to minimize the outage probability for the secondary user (SU) groups in a cognitive radio (CR) multicast network is investigated. We propose a joint power and rate allocation scheme that provides significant improvement over the conventional scheme in terms of outage probability.
Zhao-xin XIONG Min CAI Xiao-Yong HE Yun YANG
A digital background calibration technique using signal-dependent dithering is proposed, to correct the nonlinear errors which results from capacitor mismatches and finite opamp gain in pipelined analog-to-digital converter (ADC). Large magnitude dithers are used to measure and correct both errors simultaneously in background. In the proposed calibration system, the 2.5-bit capacitor-flip-over multiplying digital-to-analog converter (MDAC) stage is modified for the injection of large magnitude dithering by adding six additional comparators, and thus only three correction parameters in every stage subjected to correction were measured and extracted by a simple calibration algorithm with multibit first stage. Behavioral simulation results show that, using the proposed calibration technique, the signal-to-noise-and-distortion ratio improves from 63.3 to 79.3dB and the spurious-free dynamic range is increased from 63.9 to 96.4dB after calibrating the first two stages, in a 14-bit 100-MS/s pipelined ADC with σ=0.2% capacitor mismatches and 60dB nonideal opamp gain. The time of calibrating the first two stages is around 1.34 seconds for the modeled ADC.
A self-powered urinary-incontinence sensor with a flexible wire-type urine-activated battery has been developed as an application for wireless biosensor networks. It is disposable and can be embedded in a diaper. The battery consists of two long film-type line electrodes printed on a flexible plastic sheet that abuts the absorbent material of the diaper. It conforms to the shape of the diaper when the diaper is worn. The stress produced by the curvature of the diaper presses the electrodes firmly against the diaper material, providing greater contact with any urine present. Thus, the battery generates more power than when it is flat, as in an unworn diaper. To verify the effectiveness of the battery, we fabricated a battery and a prototype sensor, which consists of an intermittent-power-supply circuit and a wireless transmitter, and embedded the battery in a diaper. The anode of the battery also acts as a wide ground plane for the antenna of the wireless transmitter, which radiates a large amount of power. When 80cc of urine is poured onto the diaper, the battery outputs a voltage of around 1V, which allows the sensor to transmit an ID signal over a distance of 5m every 40 seconds or so.
Shenchuan LIU Wannida SAE-TANG Masaaki FUJIYOSHI Hitoshi KIYA
This letter proposes an efficient compression scheme for the copyright- and privacy-protected image trading system. The proposed scheme multiplies pseudo random signs to amplitude components of discrete cosine transformed coefficients before the inverse transformation is applied. The proposed scheme efficiently compresses amplitude-only image which is the inversely transformed amplitude components, and the scheme simultaneously improves the compression efficiency of phase-only image which is the inversely transformed phase components, in comparison with the conventional systems.
Jungang XU Hui LI Yan ZHAO Ben HE
Even with the recent development of new types of social networking services such as microblogs, Bulletin Board Systems (BBS) remains popular for local communities and vertical discussions. These BBS sites have high volume of traffic everyday with user discussions on a variety of topics. Therefore it is difficult for BBS visitors to find the posts that they are interested in from the large amount of discussion threads. We attempt to explore several main characteristics of BBS, including organizational flexibility of BBS texts, high data volume and aging characteristic of BBS topics. Based on these characteristics, we propose a novel method of Online Topic Detection (OTD) on BBS, which mainly includes a representative post selection procedure based on Markov chain model and an efficient topic clustering algorithm with candidate topic set generation based on Aging Theory. Experimental results show that our method improves the performance of OTD in BBS environment in both detection accuracy and time efficiency. In addition, analysis on the aging characteristic of discussion topics shows that the generation and aging of topics on BBS is very fast, so it is wise to introduce candidate topic set generation strategy based on Aging Theory into the topic clustering algorithm.
Nhan NGUYEN-THANH Anh T. PHAM Van-Tam NGUYEN
Designing a medium access control (MAC) protocol is a key for implementing any practical wireless network. In general, a MAC protocol is responsible for coordinating users in accessing spectrum resources. Given that a user in cognitive radio(CR) networks do not have priority in accessing spectrum resources, MAC protocols have to perform dynamic spectrum access (DSA) functions, including spectrum sensing, spectrum access, spectrum allocation, spectrum sharing and spectrum mobility, beside conventional control procedure. As a result, designing MAC protocols for CR networks requires more complicated consideration than that needed for conventional/primary wireless network. In this paper, we focus on two major perspectives related to the design of a CR-MAC protocol: dynamic spectrum access functions and network infrastructure. Five DSA functions are reviewed from the point of view of MAC protocol design. In addition, some important factors related to the infrastructure of a CR network including network architecture, control channel management, the number of radios in the CR device and the number of transmission data channels are also discussed. The remaining challenges and open research issues are addressed for future research to aim at obtaining practical CR-MAC protocols.
Sang-Uk PARK Jung-Hyun PARK Dong-Jo PARK
This letter deals with a new cell clustering problem subject to signal-to-interference-plus-noise-ratio (SINR) constraints in uplink network MIMO systems, where multiple base stations (BSs) cooperate for joint processing as forming a cluster. We first prove that the SINRs of users in a certain cluster always increase monotonically as the cluster size increases when the receiver filter that maximizes the SINR is used. Using this result, we propose an efficient clustering algorithm to minimize the maximum number of cooperative BSs in a cluster. Simulation results show that the maximum number of cooperative BSs minimized by the proposed method is close to that minimized by the exhaustive search and the proposed scheme outperforms the conventional one in terms of the outage probability.
Weicun XU Qingjie ZHAO Yuxia WANG Xuanya LI
Soccer player tracking and labeling suffer from the similar appearance of the players in the same team, especially in long-shot scenes where the faces and the numbers of the players are too blurry to identify. In this paper, we propose an efficient multi-player tracking system. The tracking system takes the detection responses of a human detector as inputs. To realize real-time player detection, we generate a spatial proposal to minimize the scanning scope of the detector. The tracking system utilizes the discriminative appearance models trained using the online Boosting method to reduce data-association ambiguity caused by the appearance similarity of the players. We also propose to build an online learned player recognition model which can be embedded in the tracking system to approach online player recognition and labeling in tracking applications for long-shot scenes by two stages. At the first stage, to build the model, we utilize the fast k-means clustering method instead of classic k-means clustering to build and update a visual word vocabulary in an efficient online manner, using the informative descriptors extracted from the training samples drawn at each time step of multi-player tracking. The first stage finishes when the vocabulary is ready. At the second stage, given the obtained visual word vocabulary, an incremental vector quantization strategy is used to recognize and label each tracked player. We also perform importance recognition validation to avoid mistakenly recognizing an outlier, namely, people we do not need to recognize, as a player. Both quantitative and qualitative experimental results on the long-shot video clips of a real soccer game video demonstrate that, the proposed player recognition model performs much better than some state-of-the-art online learned models, and our tracking system also performs quite effectively even under very complicated situations.
Hideaki WAKABAYASHI Masamitsu ASAI Keiji MATSUMOTO Jiro YAMAKITA
In the shadow theory, a new description and a physical mean at a low grazing limit of incidence on gratings in the two dimensional scattering problem have been discussed. In this paper, by applying the shadow theory to the three dimensional problem of multilayered dielectric periodic gratings, we formulate the oblique primary excitation and introduce the scattering factors through our analytical method, by use of the matrix eigenvalues. In terms of the scattering factors, the diffraction efficiencies are defined for propagating and evanescent waves with linearly and circularly polarized incident waves. Numerical examples show that when an incident angle becomes low grazing, only specular reflection occurs with the reflection coefficient -1, regardless of the incident polarization. It is newly found that in a circularly polarized incidence case, the same circularly polarized wave as the incident wave is specularly reflected at a low grazing limit.
Takeshi YAGI Junichi MURAYAMA Takeo HARIU Sho TSUGAWA Hiroyuki OHSAKI Masayuki MURATA
We proposes a method for determining the frequency for monitoring the activities of a malware download site used for malware attacks on websites. In recent years, there has been an increase in attacks exploiting vulnerabilities in web applications for infecting websites with malware and maliciously using those websites as attack platforms. One scheme for countering such attacks is to blacklist malware download sites and filter out access to them from user websites. However, a malware download site is often constructed through the use of an ordinary website that has been maliciously manipulated by an attacker. Once the malware has been deleted from the malware download site, this scheme must be able to unblacklist that site to prevent normal user websites from being falsely detected as malware download sites. However, if a malware download site is frequently monitored for the presence of malware, the attacker may sense this monitoring and relocate that malware on a different site. This means that an attack will not be detected until the newly generated malware download site is discovered. In response to these problems, we clarify the change in attack-detection accuracy caused by attacker behavior. This is done by modeling attacker behavior, specifying a state-transition model with respect to the blacklisting of a malware download site, and analyzing these models with synthetically generated attack patterns and measured attack patterns in an operation network. From this analysis, we derive the optimal monitoring frequency that maximizes the true detection rate while minimizing the false detection rate.
Sun-Mi PARK Ku-Young CHANG Dowon HONG Changho SEO
We propose a parallel pth powering method over an arbitrary finite field GF(pm). Using the proposed method, we present the explicit formulae for the computation of cubing over a ternary field GF(3m) which is defined by irreducible trinomials. We show that the field cubing computation for irreducible trinomials, which plays an important role in calculating pairing, can be implemented very efficiently.
Naoyuki SHINOHARA Takeshi SHIMOYAMA Takuya HAYASHI Tsuyoshi TAKAGI
The security of pairing-based cryptosystems is determined by the difficulty of solving the discrete logarithm problem (DLP) over certain types of finite fields. One of the most efficient algorithms for computing a pairing is the ηT pairing over supersingular curves on finite fields of characteristic 3. Indeed many high-speed implementations of this pairing have been reported, and it is an attractive candidate for practical deployment of pairing-based cryptosystems. Since the embedding degree of the ηT pairing is 6, we deal with the difficulty of solving a DLP over the finite field GF(36n), where the function field sieve (FFS) is known as the asymptotically fastest algorithm of solving it. Moreover, several efficient algorithms are employed for implementation of the FFS, such as the large prime variation. In this paper, we estimate the time complexity of solving the DLP for the extension degrees n=97, 163, 193, 239, 313, 353, and 509, when we use the improved FFS. To accomplish our aim, we present several new computable estimation formulas to compute the explicit number of special polynomials used in the improved FFS. Our estimation contributes to the evaluation for the key length of pairing-based cryptosystems using the ηT pairing.
Takanori YASUDA Tsuyoshi TAKAGI Kouichi SAKURAI
Multivariate Public Key Cryptosystems (MPKC) are candidates for post-quantum cryptography. Rainbow is a digital signature scheme in MPKC, whose signature generation and verification are relatively efficient. However, the security of MPKC depends on the difficulty in solving a system of multivariate polynomials, and the key length of MPKC becomes substantially large compared with that of RSA cryptosystems for the same level of security. The size of the secret and public keys in MPKC has been reduced in previous research. The NC-Rainbow is a signature scheme in MPKC, which was proposed in order to reduce the size of secret key of Rainbow. So far, several attacks against NC-Rainbow have been proposed. In this paper, we summarize attacks against NC-Rainbow, containing attacks against the original Rainbow, and analyze the total security of NC-Rainbow. Based on the cryptanalysis, we estimate the security parameter of NC-Rainbow at the several security level.
We first find simple characterizations of $rac{1}{N} mathbb{Z}$-invariance of arbitrary principal shift-invariant space $V(phi)$. Then we find several equivalent conditions for $V(phi)$ to admit periodic oversampling for a class of continuous frame generators $phi$. In particular, when $phi$ is band-limited and $hat{phi}$ is piecewise continuous, we find very simple and general sufficient conditions for $V(phi)$ to admit periodic oversampling, which involve the extra invariance of $V(phi)$, together with an illustrating example.
Nan WU Hua WANG Hongjie ZHAO Jingming KUANG
This paper studies the performance of code-aided (CA) soft-information based carrier phase recovery, which iteratively exploits the extrinsic information from channel decoder to improve the accuracy of phase synchronization. To tackle the problem of strong coupling between phase recovery and decoding, a semi-analytical model is proposed to express the distribution of extrinsic information as a function of phase offset. Piecewise approximation of the hyperbolic tangent function is employed to linearize the expression of soft symbol decision. Building on this model, open-loop characteristic and closed-loop performance of CA iterative soft decision-directed (ISDD) carrier phase synchronizer are derived in closed-form. Monte Carlo simulation results corroborate that the proposed expressions are able to characterize the performance of CA ISDD carrier phase recovery for systems with different channel codes.
In this letter, we present a novel interference-aware clustering scheme for cell broadcasting service. The proposed approach is based on a genetic algorithm for re-clustering. Using the genetic algorithm, the suggested method efficiently re-clusters the user nodes when the relays fail in receiving the cell broadcasting message from the base station. The simulation results exhibit that the proposed clustering scheme can maintain much higher capacity than the conventional clustering scheme in the cases of relay outage. The re-clustering method based on genetic algorithm also shows lower complexity than the re-clustering approach based on exhaustive search.