The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] RP(993hit)

181-200hit(993hit)

  • Privacy-Enhanced Similarity Search Scheme for Cloud Image Databases

    Hao LIU  Hideaki GOTO  

     
    LETTER-Information Network

      Pubricized:
    2016/09/12
      Vol:
    E99-D No:12
      Page(s):
    3188-3191

    The privacy of users' data has become a big issue for cloud service. This research focuses on image cloud database and the function of similarity search. To enhance security for such database, we propose a framework of privacy-enhanced search scheme, while all the images in the database are encrypted, and similarity image search is still supported.

  • A Morpheme-Based Weighting for Chinese-Mongolian Statistical Machine Translation

    Zhenxin YANG  Miao LI  Lei CHEN  Kai SUN  

     
    LETTER-Natural Language Processing

      Pubricized:
    2016/08/18
      Vol:
    E99-D No:11
      Page(s):
    2843-2846

    In this paper, a morpheme-based weighting and its integration method are proposed as a smoothing method to alleviate the data sparseness in Chinese-Mongolian statistical machine translation (SMT). Besides, we present source-side reordering as the pre-processing model to verify the extensibility of our method. Experi-mental results show that the morpheme-based weighting can substantially improve the translation quality.

  • Sensitivity-Characterised Activity Neurogram (SCAN) for Visualising and Understanding the Inner Workings of Deep Neural Network Open Access

    Khe Chai SIM  

     
    INVITED PAPER

      Pubricized:
    2016/07/19
      Vol:
    E99-D No:10
      Page(s):
    2423-2430

    Deep Neural Network (DNN) is a powerful machine learning model that has been successfully applied to a wide range of pattern classification tasks. Due to the great ability of the DNNs in learning complex mapping functions, it has been possible to train and deploy DNNs pretty much as a black box without the need to have an in-depth understanding of the inner workings of the model. However, this often leads to solutions and systems that achieve great performance, but offer very little in terms of how and why they work. This paper introduces Sensitivity-characterised Activity Neorogram (SCAN), a novel approach for understanding the inner workings of a DNN by analysing and visualising the sensitivity patterns of the neuron activities. SCAN constructs a low-dimensional visualisation space for the neurons so that the neuron activities can be visualised in a meaningful and interpretable way. The embedding of the neurons within this visualisation space can be used to compare the neurons, both within the same DNN and across different DNNs trained for the same task. This paper will present the observations from using SCAN to analyse DNN acoustic models for automatic speech recognition.

  • Database Calibration for Outdoor Wi-Fi Positioning System

    Yuyang HUANG  Li-Ta HSU  Yanlei GU  Haitao WANG  Shunsuke KAMIJO  

     
    PAPER-Intelligent Transport System

      Vol:
    E99-A No:9
      Page(s):
    1683-1690

    The limitation of the GPS in urban canyon has led to the rapid development of Wi-Fi positioning system (WPS). The fingerprint-based WPS could be divided into calibration and positioning stages. In calibration stage, several grid points (GPs) are selected, and their position tags and featured access points (APs) are collected to build fingerprint database. In positioning stage, real time measurement of APs are compared with the feature of each GP in the database. The k weighted nearest neighbors (KWNN) algorithm is used as pattern matching algorithm to estimate the final positioning result. However, the performance of outdoor fingerprint-based WPS is not good enough for pedestrian navigation. The main challenge is to build a robust fingerprint database. The received number of APs in outdoor environments has large variation. In addition, positioning result estimated by GPS receiver is used as position tag of each GP to automatically build the fingerprint database. This paper studies the lifecycle of fingerprint database in outdoor environment. We also shows that using long time collected data to build database could improve the positioning accuracy. Moreover, a new 3D-GNSS (3D building models aided GNSS) positioning method is used to provide accurate position tags. In this paper, the fingerprint-based WPS has been developed in an outdoor environment near the center of Tokyo city. The proposed WPS can achieve around 17 meters positioning accuracy in urban canyon.

  • Incremental Semantic Construction Based on Combinatory Categorial Grammar

    Yoshihide KATO  Shigeki MATSUBARA  

     
    PAPER-Natural Language Processing

      Pubricized:
    2016/06/02
      Vol:
    E99-D No:9
      Page(s):
    2368-2376

    This paper proposes a method of incrementally constructing semantic representations. Our method is based on Steedman's Combinatory Categorial Grammar (CCG), which has a transparent correspondence between syntax and semantics. In our method, a derivation for a sentence is constructed in an incremental fashion and the corresponding semantic representation is derived synchronously. Our method uses normal form CCG derivation. This is the difference between our approach and previous ones. Previous approaches use most left-branching derivation called incremental derivation, but they cannot process coordinate structures incrementally. Our method overcomes this problem.

  • Business Recovery Conditions of Private Enterprises after the 2011 Great East Japan Earthquake and Issues on Business Continuity Measures for Large-Scale Disaster Management — A Case Study of Small and Medium-Sized Enterprises in Miyagi —

    Norimasa NAKATANI  Osamu MURAO  Kimiro MEGURO  Kiyomine TERUMOTO  

     
    PAPER

      Vol:
    E99-A No:8
      Page(s):
    1539-1550

    Forming Business Continuity Planning (BCP) is recognized as a significant counter-measure against future large-scale disasters by private enterprises after the 2011 Great East Japan Earthquake more than before. Based on a questionnaire survey, this paper reports business recovery conditions of private enterprises in Miyagi Prefecture affected by the disaster. Analyzing the results of questionnaire, it suggests some important points: (1) estimation of long-term internal/external factors that influence business continuity, (2) development of concrete pre-disaster framework, (3) multi-media-based advertising strategy, and (4) re-allocation of resources.

  • Challenges of Fully Homomorphic Encryptions for the Internet of Things Open Access

    Licheng WANG  Jing LI  Haseeb AHMAD  

     
    INVITED PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    1982-1990

    With the flourish of applications based on the Internet of Things (IoT), privacy issues have been attracting a lot of attentions. Although the concept of privacy homomorphism was proposed along with the birth of the well-known RSA cryptosystems, cryptographers over the world have spent about three decades for finding the first implementation of the so-called fully homomorphic encryption (FHE). Despite of, currently known FHE schemes, including the original Gentry's scheme and many subsequent improvements as well as the other alternatives, are not appropriate for IoT-oriented applications because most of them suffer from the problems of inefficient key size and noisy restraining. In addition, for providing fully support to IoT-oriented applications, symmetric fully homomorphic encryptions are also highly desirable. This survey presents an analysis on the challenges of designing secure and practical FHE for IoT, from the perspectives of lightweight requirements as well as the security requirements. In particular, some issues about designing noise-free FHE schemes would be addressed.

  • Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption

    Yoshinori AONO  Takuya HAYASHI  Le Trieu PHONG  Lihua WANG  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2079-2089

    Logistic regression is a powerful machine learning tool to classify data. When dealing with sensitive or private data, cares are necessary. In this paper, we propose a secure system for privacy-protecting both the training and predicting data in logistic regression via homomorphic encryption. Perhaps surprisingly, despite the non-polynomial tasks of training and predicting in logistic regression, we show that only additively homomorphic encryption is needed to build our system. Indeed, we instantiate our system with Paillier, LWE-based, and ring-LWE-based encryption schemes, highlighting the merits and demerits of each instantiation. Besides examining the costs of computation and communication, we carefully test our system over real datasets to demonstrate its utility.

  • The Novel Performance Evaluation Method of the Fingerprinting-Based Indoor Positioning

    Shutchon PREMCHAISAWATT  Nararat RUANGCHAIJATUPON  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2016/05/17
      Vol:
    E99-D No:8
      Page(s):
    2131-2139

    In this work, the novel fingerprinting evaluation parameter, which is called the punishment cost, is proposed. This parameter can be calculated from the designed matrix, the punishment matrix, and the confusion matrix. The punishment cost can describe how well the result of positioning is in the designated grid or not, by which the conventional parameter, the accuracy, cannot describe. The experiment is done with real measured data on weekdays and weekends. The results are considered in terms of accuracy and the punishment cost. Three well-known machine learning algorithms, i.e. Decision Tree, k-Nearest Neighbors, and Artificial Neural Network, are verified in fingerprinting positioning. In experimental environment, Decision Tree can perform well on the data from weekends whereas the performance is underrated on the data from weekdays. The k-Nearest Neighbors has proper punishment costs, even though it has lower accuracy than that of Artificial Neural Network, which has moderate accuracies but lower punishment costs. Therefore, other criteria should be considered in order to select the algorithm for indoor positioning. In addition, punishment cost can facilitate the conversion spot positioning to floor positioning without data modification.

  • Precise Location by Fingerprinting Road Segments with Variation of Broadcast Wave Reception

    Yuji KAMIYA  Toru NAGURA  Shigeki KAWAI  Tsuneo NAKATA  

     
    PAPER-Intelligent Transport System

      Vol:
    E99-A No:7
      Page(s):
    1465-1472

    In this paper, we propose an infrastructure-free precise positioning system by utilizing a variation of received radio broadcast signal strength against vehicle travel as fingerprints of road segments. Use of broadcast wave is considered advantageous in deployment cost and sample density that affects measurement reliability, compared to communication medium such as 802.11p-based V2X radio used in our previous paper. We also present preliminary experimental results that indicate potential of positioning at 20cm accuracy by using reception information of two FM radio channels broadcast from a station about 20km away from the test track

  • A Proof of Turyn's Conjecture: Nonexistence of Circulant Hadamard Matrices for Order Greater than Four

    Yoshimasa OH-HASHI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:7
      Page(s):
    1395-1407

    Biphase periodic sequences having elements +1 or -1 with the two-level autocorrelation function are desirable in communications and radars. However, in case of the biphase orthogonal periodic sequences, Turyn has conjectured that there exist only sequences with period 4, i.e., there exist the circulant Hadamard matrices for order 4 only. In this paper, it is described that the conjecture is proved to be true by means of the isomorphic mapping, the Chinese remainder theorem, the linear algebra, etc.

  • Interconnection-Delay and Clock-Skew Estimate Modelings for Floorplan-Driven High-Level Synthesis Targeting FPGA Designs

    Koichi FUJIWARA  Kazushi KAWAMURA  Masao YANAGISAWA  Nozomu TOGAWA  

     
    PAPER

      Vol:
    E99-A No:7
      Page(s):
    1294-1310

    Recently, high-level synthesis techniques for FPGA designs (FPGA-HLS techniques) are strongly required in various applications. Both interconnection delays and clock skews have a large impact on circuit performance implemented onto FPGA, which indicates the need for floorplan-driven FPGA-HLS algorithms considering them. To appropriately estimate interconnection delays and clock skews at HLS phase, a reasonable model to estimate them becomes essential. In this paper, we demonstrate several experiments to characterize interconnection delays and clock skews in FPGA and propose novel estimate models called “IDEF” and “CSEF”. In order to evaluate our models, we integrate them into a conventional floorplan-driven FPGA-HLS algorithm. Experimental results demonstrate that our algorithm can realize FPGA designs which reduce the latency by up to 22% compared with conventional approaches.

  • A Novel Time Delay Estimation Interpolation Algorithm Based on Second-Order Cone Programming

    Zhixin LIU  Dexiu HU  Yongjun ZHAO  Chengcheng LIU  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:6
      Page(s):
    1311-1317

    Considering the obvious bias of the traditional interpolation method, a novel time delay estimation (TDE) interpolation method with sub-sample accuracy is presented in this paper. The proposed method uses a generalized extended approximation method to obtain the objection function. Then the optimized interpolation curve is generated by Second-order Cone programming (SOCP). Finally the optimal TDE can be obtained by interpolation curve. The delay estimate of proposed method is not forced to lie on discrete samples and the sample points need not to be on the interpolation curve. In the condition of the acceptable computation complexity, computer simulation results clearly indicate that the proposed method is less biased and outperforms the other interpolation algorithms in terms of estimation accuracy.

  • Enhancing Event-Related Potentials Based on Maximum a Posteriori Estimation with a Spatial Correlation Prior

    Hayato MAKI  Tomoki TODA  Sakriani SAKTI  Graham NEUBIG  Satoshi NAKAMURA  

     
    PAPER

      Pubricized:
    2016/04/01
      Vol:
    E99-D No:6
      Page(s):
    1437-1446

    In this paper a new method for noise removal from single-trial event-related potentials recorded with a multi-channel electroencephalogram is addressed. An observed signal is separated into multiple signals with a multi-channel Wiener filter whose coefficients are estimated based on parameter estimation of a probabilistic generative model that locally models the amplitude of each separated signal in the time-frequency domain. Effectiveness of using prior information about covariance matrices to estimate model parameters and frequency dependent covariance matrices were shown through an experiment with a simulated event-related potential data set.

  • Non-Linear Extension of Generalized Hyperplane Approximation

    Hyun-Chul CHOI  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2016/02/29
      Vol:
    E99-D No:6
      Page(s):
    1707-1710

    A non-linear extension of generalized hyperplane approximation (GHA) method is introduced in this letter. Although GHA achieved a high-confidence result in motion parameter estimation by utilizing the supervised learning scheme in histogram of oriented gradient (HOG) feature space, it still has unstable convergence range because it approximates the non-linear function of regression from the feature space to the motion parameter space as a linear plane. To extend GHA into a non-linear regression for larger convergence range, we derive theoretical equations and verify this extension's effectiveness and efficiency over GHA by experimental results.

  • Generation of Oil-Film-Like Images by Bilateral Infra-Envelope Filter

    Toru HIRAOKA  Kiichi URAHAMA  

     
    LETTER-Computer Graphics

      Pubricized:
    2016/03/11
      Vol:
    E99-D No:6
      Page(s):
    1724-1728

    A non-photorealistic rendering method creates oil-film-like images, expressed with colorful, smooth curves similar to the oil films generated on the surface of glass or water, from color photo images. The proposed method generates oil-film-like images through iterative processing between a bilateral infra-envelope filter and an unsharp mask. In order to verify the effectiveness of the proposed method, tests using a Lena image were performed, and visual assessment of oil-film-like images was conducted for changes in appearance as the parameter values of the proposed method were varied. As a result of tests, the optimal value of parameters was found for generating oil-film patterns.

  • Sorting Method for Fully Homomorphic Encrypted Data Using the Cryptographic Single-Instruction Multiple-Data Operation

    Pyung KIM  Younho LEE  Hyunsoo YOON  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:5
      Page(s):
    1070-1086

    In this paper, we present a faster (wall-clock time) sorting method for numerical data subjected to fully homomorphic encryption (FHE). Owing to circuit-based construction and the FHE security property, most existing sorting methods cannot be applied to encrypted data without significantly compromising efficiency. The proposed algorithm utilizes the cryptographic single-instruction multiple-data (SIMD) operation, which is supported by most existing FHE algorithms, to reduce the computational overhead. We conducted a careful analysis of the number of required recryption operations, which are the computationally dominant operations in FHE. Accordingly, we verified that the proposed SIMD-based sorting algorithm completes the given task more quickly than existing sorting methods if the number of data items and (or) the maximum bit length of each data item exceed specific thresholds.

  • A Design of 0.7-V 400-MHz All-Digital Phase-Locked Loop for Implantable Biomedical Devices

    Jungnam BAE  Saichandrateja RADHAPURAM  Ikkyun JO  Weimin WANG  Takao KIHARA  Toshimasa MATSUOKA  

     
    PAPER

      Vol:
    E99-C No:4
      Page(s):
    431-439

    A low-voltage controller-based all-digital phase-locked loop (ADPLL) utilized in the medical implant communication service (MICS) frequency band was designed in this study. In the proposed design, controller-based loop topology is used to control the phase and frequency to ensure the reliable handling of the ADPLL output signal. A digitally-controlled oscillator with a delta-sigma modulator was employed to achieve high frequency resolution. The phase error was reduced by a phase selector with a 64-phase signal from the phase interpolator. Fabricated using a 130-nm CMOS process, the ADPLL has an active area of 0.64 mm2, consumes 840 µW from a 0.7-V supply voltage, and has a settling time of 80 µs. The phase noise was measured to be -114 dBc/Hz at an offset frequency of 200 kHz.

  • Uniformly Random Generation of Floorplans

    Katsuhisa YAMANAKA  Shin-ichi NAKANO  

     
    PAPER

      Pubricized:
    2015/12/16
      Vol:
    E99-D No:3
      Page(s):
    624-629

    In this paper, we consider the problem of generating uniformly random mosaic floorplans. We propose a polynomial-time algorithm that generates such floorplans with f faces. Two modified algorithms are created to meet additional criteria.

  • A Full-Flexibility-Guaranteed Pin-Count Reduction Design for General-Purpose Digital Microfluidic Biochips

    Trung Anh DINH  Shigeru YAMASHITA  Tsung-Yi HO  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E99-A No:2
      Page(s):
    570-578

    Different from application-specific digital microfluidic biochips, a general-purpose design has several advantages such as dynamic reconfigurability, and fast on-line evaluation for real-time applications. To achieve such superiority, this design typically activates each electrode in the chip using an individual control pin. However, as the design complexity increases substantially, an order-of-magnitude increase in the number of control pins will significantly affect the manufacturing cost. To tackle this problem, several methods adopting a pin-sharing mechanism for general-purpose designs have been proposed. Nevertheless, these approaches sacrifice the flexibility of droplet movement, and result in an increase of bioassay completion time. In this paper, we present a novel pin-count reduction design methodology for general-purpose microfluidic biochips. Distinguished from previous approaches, the proposed methodology not only reduces the number of control pins significantly but also guarantees the full flexibility of droplet movement to ensure the minimal bioassay completion time.

181-200hit(993hit)