The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SEM(686hit)

121-140hit(686hit)

  • Efficient Query Dissemination Scheme for Wireless Heterogeneous Sensor Networks

    Sungjun KIM  Daehee KIM  Sunshin AN  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E101-A No:3
      Page(s):
    649-653

    In this paper, we define a wireless sensor network with multiple types of sensors as a wireless heterogeneous sensor network (WHSN), and propose an efficient query dissemination scheme (EDT) in the WHSN. The EDT based on total dominant pruning can forward queries to only the nodes with data requested by the user, thereby reducing unnecessary packet transmission. We show that the EDT is suitable for the WHSN environment through a variety of simulations.

  • The Declarative and Reusable Path Composition for Semantic Web-Driven SDN

    Xi CHEN  Tao WU  Lei XIE  

     
    PAPER-Network

      Pubricized:
    2017/08/29
      Vol:
    E101-B No:3
      Page(s):
    816-824

    The centralized controller of SDN enables a global topology view of the underlying network. It is possible for the SDN controller to achieve globally optimized resource composition and utilization, including optimized end-to-end paths. Currently, resource composition in SDN arena is usually conducted in an imperative manner where composition logics are explicitly specified in high level programming languages. It requires strong programming and OpenFlow backgrounds. This paper proposes declarative path composition, namely Compass, which offers a human-friendly user interface similar to natural language. Borrowing methodologies from Semantic Web, Compass models and stores SDN resources using OWL and RDF, respectively, to foster the virtualized and unified management of the network resources regardless of the concrete controller platform. Besides, path composition is conducted in a declarative manner where the user merely specifies the composition goal in the SPARQL query language instead of explicitly specifying concrete composition details in programming languages. Composed paths are also reused based on similarity matching, to reduce the chance of time-consuming path composition. The experiment results reflect the applicability of Compass in path composition and reuse.

  • Mobile Edge Computing Empowers Internet of Things Open Access

    Nirwan ANSARI  Xiang SUN  

     
    INVITED PAPER

      Pubricized:
    2017/09/19
      Vol:
    E101-B No:3
      Page(s):
    604-619

    In this paper, we propose a Mobile Edge Internet of Things (MEIoT) architecture by leveraging the fiber-wireless access technology, the cloudlet concept, and the software defined networking framework. The MEIoT architecture brings computing and storage resources close to Internet of Things (IoT) devices in order to speed up IoT data sharing and analytics. Specifically, the IoT devices (belonging to the same user) are associated to a specific proxy Virtual Machine (VM) in the nearby cloudlet. The proxy VM stores and analyzes the IoT data (generated by its IoT devices) in real-time. Moreover, we introduce the semantic and social IoT technology in the context of MEIoT to solve the interoperability and inefficient access control problem in the IoT system. In addition, we propose two dynamic proxy VM migration methods to minimize the end-to-end delay between proxy VMs and their IoT devices and to minimize the total on-grid energy consumption of the cloudlets, respectively. Performance of the proposed methods is validated via extensive simulations.

  • A Low-Power Pulse-Shaped Duobinary ASK Modulator for IEEE 802.11ad Compliant 60GHz Transmitter in 65nm CMOS

    Bangan LIU  Yun WANG  Jian PANG  Haosheng ZHANG  Dongsheng YANG  Aravind Tharayil NARAYANAN  Dae Young LEE  Sung Tae CHOI  Rui WU  Kenichi OKADA  Akira MATSUZAWA  

     
    PAPER-Electronic Circuits

      Vol:
    E101-C No:2
      Page(s):
    126-134

    An energy efficient modulator for an ultra-low-power (ULP) 60-GHz IEEE transmitter is presented in this paper. The modulator consists of a differential duobinary coder and a semi-digital finite-impulse-response (FIR) pulse-shaping filter. By virtue of differential duobinary coding and pulse shaping, the transceiver successfully solves the adjacent-channel-power-ratio (ACPR) issue of conventional on-off-keying (OOK) transceivers. The proposed differential duobinary code adopts an over-sampling precoder, which relaxes timing requirement and reduces power consumption. The semi-digital FIR eliminates the power hungry digital multipliers and accumulators, and improves the power efficiency through optimization of filter parameters. Fabricated in a 65nm CMOS process, this modulator occupies a core area of 0.12mm2. With a throughput of 1.7Gbps/2.6Gbps, power consumption of modulator is 24.3mW/42.8mW respectively, while satisfying the IEEE 802.11ad spectrum mask.

  • A Semidefinite Programming Approach for Doppler Frequency Shift Based Stationary Target Localization

    Li Juan DENG  Ping WEI  Yan Shen DU  Hua Guo ZHANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:2
      Page(s):
    507-511

    In this work, we address the stationary target localization problem by using Doppler frequency shift (DFS) measurements. Based on the measurement model, the maximum likelihood estimation (MLE) of the target position is reformulated as a constrained weighted least squares (CWLS) problem. However, due to its non-convex nature, it is difficult to solve the problem directly. Thus, in order to yield a semidefinite programming (SDP) problem, we perform a semidefinite relaxation (SDR) technique to relax the CWLS problem. Although the SDP is a relaxation of the original MLE, it can facilitate an accurate estimate without post processing. Simulations are provided to confirm the promising performance of the proposed method.

  • Robust Secure Transmit Design for SWIPT System with Many Types of Wireless Users and Passive Eavesdropper

    Pham-Viet TUAN  Insoo KOO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    441-450

    This paper studies a simultaneous wireless information and power transfer (SWIPT) system in which the transmitter not only sends data and energy to many types of wireless users, such as multiple information decoding users, multiple hybrid power-splitting users (i.e., users with a power-splitting structure to receive both information and energy), and multiple energy harvesting users, but also prevents information from being intercepted by a passive eavesdropper. The transmitter is equipped with multiple antennas, whereas all users and the eavesdropper are assumed to be equipped with a single antenna. Since the transmitter does not have any channel state information (CSI) about the eavesdropper, artificial noise (AN) power is maximized to mask information as well as to interfere with the eavesdropper as much as possible. The non-convex optimization problem is formulated to minimize the transmit power satisfying all signal-to-interference-plus-noise (SINR) and harvested energy requirements for all users so that the remaining power for generating AN is maximized. With perfect CSI, a semidefinite relaxation (SDR) technique is applied, and the optimal solution is proven to be tight. With imperfect CSI, SDR and a Gaussian randomization algorithm are proposed to find the suboptimal solution. Finally, numerical performance with respect to the maximum SINR at the eavesdropper is determined by a Monte-Carlo simulation to compare the proposed AN scenario with a no-AN scenario, as well as to compare perfect CSI with imperfect CSI.

  • Classification of Linked Data Sources Using Semantic Scoring

    Semih YUMUSAK  Erdogan DOGDU  Halife KODAZ  

     
    PAPER

      Pubricized:
    2017/09/15
      Vol:
    E101-D No:1
      Page(s):
    99-107

    Linked data sets are created using semantic Web technologies and they are usually big and the number of such datasets is growing. The query execution is therefore costly, and knowing the content of data in such datasets should help in targeted querying. Our aim in this paper is to classify linked data sets by their knowledge content. Earlier projects such as LOD Cloud, LODStats, and SPARQLES analyze linked data sources in terms of content, availability and infrastructure. In these projects, linked data sets are classified and tagged principally using VoID vocabulary and analyzed according to their content, availability and infrastructure. Although all linked data sources listed in these projects appear to be classified or tagged, there are a limited number of studies on automated tagging and classification of newly arriving linked data sets. Here, we focus on automated classification of linked data sets using semantic scoring methods. We have collected the SPARQL endpoints of 1,328 unique linked datasets from Datahub, LOD Cloud, LODStats, SPARQLES, and SpEnD projects. We have then queried textual descriptions of resources in these data sets using their rdfs:comment and rdfs:label property values. We analyzed these texts in a similar manner with document analysis techniques by assuming every SPARQL endpoint as a separate document. In this regard, we have used WordNet semantic relations library combined with an adapted term frequency-inverted document frequency (tfidf) analysis on the words and their semantic neighbours. In WordNet database, we have extracted information about comment/label objects in linked data sources by using hypernym, hyponym, homonym, meronym, region, topic and usage semantic relations. We obtained some significant results on hypernym and topic semantic relations; we can find words that identify data sets and this can be used in automatic classification and tagging of linked data sources. By using these words, we experimented different classifiers with different scoring methods, which results in better classification accuracy results.

  • Semantic Integration of Sensor Data with SSN Ontology in a Multi-Agent Architecture for Intelligent Transportation Systems

    Susel FERNANDEZ  Takayuki ITO  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2017/09/15
      Vol:
    E100-D No:12
      Page(s):
    2915-2922

    Intelligent transportation systems (ITS) are a set of technological solutions used to improve the performance and safety of road transportation. Since one of the most important information sources on ITS are sensors, the integration and sharing the sensor data become a big challenging problem in the application of sensor networks to these systems. In order to make full use of the sensor data, is crucial to convert the sensor data into semantic data, which can be understood by computers. In this work, we propose to use the SSN ontology to manage the sensor information in an intelligent transportation architecture. The system was tested in a traffic light settings application, allowing to predict and avoid traffic accidents, and also for the routing optimization.

  • Query Rewriting or Ontology Modification? Toward a Faster Approximate Reasoning on LOD Endpoints

    Naoki YAMADA  Yuji YAMAGATA  Naoki FUKUTA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2017/09/15
      Vol:
    E100-D No:12
      Page(s):
    2923-2930

    On an inference-enabled Linked Open Data (LOD) endpoint, usually a query execution takes longer than on an LOD endpoint without inference engine due to its processing of reasoning. Although there are two separate kind of approaches, query modification approaches, and ontology modifications have been investigated on the different contexts, there have been discussions about how they can be chosen or combined for various settings. In this paper, for reducing query execution time on an inference-enabled LOD endpoint, we compare these two promising methods: query rewriting and ontology modification, as well as trying to combine them into a cluster of such systems. We employ an evolutionary approach to make such rewriting and modification of queries and ontologies based on the past-processed queries and their results. We show how those two approaches work well on implementing an inference-enabled LOD endpoint by a cluster of SPARQL endpoints.

  • Off-Grid Frequency Estimation with Random Measurements

    Xushan CHEN  Jibin YANG  Meng SUN  Jianfeng LI  

     
    LETTER-Digital Signal Processing

      Vol:
    E100-A No:11
      Page(s):
    2493-2497

    In order to significantly reduce the time and space needed, compressive sensing builds upon the fundamental assumption of sparsity under a suitable discrete dictionary. However, in many signal processing applications there exists mismatch between the assumed and the true sparsity bases, so that the actual representative coefficients do not lie on the finite grid discretized by the assumed dictionary. Unlike previous work this paper introduces the unified compressive measurement operator into atomic norm denoising and investigates the problems of recovering the frequency support of a combination of multiple sinusoids from sub-Nyquist samples. We provide some useful properties to ensure the optimality of the unified framework via semidefinite programming (SDP). We also provide a sufficient condition to guarantee the uniqueness of the optimizer with high probability. Theoretical results demonstrate the proposed method can locate the nonzero coefficients on an infinitely dense grid over a wide range of SNR case.

  • Quantum Dot Light-Emitting Diode with Ligand-Exchanged ZnCuInS2 Quantum Dot Open Access

    Takeshi FUKUDA  Masatomo HISHINUMA  Junya MAKI  Hironao SASAKI  

     
    INVITED PAPER

      Vol:
    E100-C No:11
      Page(s):
    943-948

    Nowadays, semiconductor quantum dots have attracted intense attention as emissive materials for light-emitting diodes, due to their high photoluminescence quantum yield and the controllability of their photoluminescence spectrum by changing the core diameter. In general, semiconductor quantum dots contain large amounts of organic ligands around the core/shell structure to obtain dispersibility in solution, which leads to solution processability of the semiconductor quantum dot. Furthermore, organic ligands, such as straight alkyl chains, are generally insulating materials, which affects the carrier transport in thin-film light-emitting diodes. However, a detailed investigation has not been performed yet. In this paper, we investigated the luminance characteristics of quantum-dot light-emitting diodes containing ZnCuInS2 quantum dots with different carbon chain lengths of alkyl thiol ligands as emitting layers. By evaluating the CH2/CH3 ratio from Fourier-transform infrared spectra and thermal analysis, it was found that approximately half of the oleylamine ligands were converted to alkyl thiol ligands, and the evaporation temperature increased with increasing carbon chain length of the alkyl thiol ligands based on thermogravimetric analysis. However, the photoluminescence quantum yield and the spectral shape were almost the same, even after the ligand-exchange process from the oleylamine ligand to the alkyl thiol ligand. The peak wavelength of the photoluminescence spectra and the photoluminescence quantum yield were approximately 610 nm and 10%, respectively, for all samples. In addition, the surface morphology of spin coated ZnCuInS2 quantum-dot layers did not change after the ligand-exchange process, and the root-mean-square roughness was around 1 nm. Finally, the luminance efficiency of an inverted device structure increased with decreasing carbon chain length of the alkyl thiol ligands, which were connected around the ZnCuInS2 quantum dots. The maximum luminance and current efficiency were 86 cd/m2 and 0.083 cd/A, respectively.

  • Detecting Semantic Communities in Social Networks

    Zhen LI  Zhisong PAN  Guyu HU  Guopeng LI  Xingyu ZHOU  

     
    LETTER-Graphs and Networks

      Vol:
    E100-A No:11
      Page(s):
    2507-2512

    Community detection is an important task in the social network analysis field. Many detection methods have been developed; however, they provide little semantic interpretation for the discovered communities. We develop a framework based on joint matrix factorization to integrate network topology and node content information, such that the communities and their semantic labels are derived simultaneously. Moreover, to improve the detection accuracy, we attempt to make the community relationships derived from two types of information consistent. Experimental results on real-world networks show the superior performance of the proposed method and demonstrate its ability to semantically annotate communities.

  • READER: Robust Semi-Supervised Multi-Label Dimension Reduction

    Lu SUN  Mineichi KUDO  Keigo KIMURA  

     
    PAPER-Pattern Recognition

      Pubricized:
    2017/06/29
      Vol:
    E100-D No:10
      Page(s):
    2597-2604

    Multi-label classification is an appealing and challenging supervised learning problem, where multiple labels, rather than a single label, are associated with an unseen test instance. To remove possible noises in labels and features of high-dimensionality, multi-label dimension reduction has attracted more and more attentions in recent years. The existing methods usually suffer from several problems, such as ignoring label outliers and label correlations. In addition, most of them emphasize on conducting dimension reduction in an unsupervised or supervised way, therefore, unable to utilize the label information or a large amount of unlabeled data to improve the performance. In order to cope with these problems, we propose a novel method termed Robust sEmi-supervised multi-lAbel DimEnsion Reduction, shortly READER. From the viewpoint of empirical risk minimization, READER selects most discriminative features for all the labels in a semi-supervised way. Specifically, the ℓ2,1-norm induced loss function and regularization term make READER robust to the outliers in the data points. READER finds a feature subspace so as to keep originally neighbor instances close and embeds labels into a low-dimensional latent space nonlinearly. To optimize the objective function, an efficient algorithm is developed with convergence property. Extensive empirical studies on real-world datasets demonstrate the superior performance of the proposed method.

  • Advantages of SOA Assisted Extended Reach EADFB Laser (AXEL) for Operation at Low Power and with Extended Transmission Reach Open Access

    Wataru KOBAYASHI  Naoki FUJIWARA  Takahiko SHINDO  Yoshitaka OHISO  Shigeru KANAZAWA  Hiroyuki ISHII  Koichi HASEBE  Hideaki MATSUZAKI  Mikitaka ITOH  

     
    INVITED PAPER

      Vol:
    E100-C No:10
      Page(s):
    759-766

    We propose a novel structure that can reduce the power consumption and extend the transmission distance of an electro-absorption modulator integrated with a DFB (EADFB) laser. To overcome the trade-off relationship of the optical loss and chirp parameter of the EA modulator, we integrate a semiconductor optical amplifier (SOA) with an EADFB laser. With the proposed SOA assisted extended reach EADFB laser (AXEL) structure, the LD and SOA sections are operated by an electrically connected input port. We describe a design for AXEL that optimizes the LD and SOA length ratio when their total operation current is 80mA. By using the designed AXEL, the power consumption of a 10-Gbit/s, 1.55-µm EADFB laser is reduced by 1/2 and at the same time the transmission distance is extended from 80 to 100km.

  • Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks Open Access

    Liang-Chun CHEN  Chien-Lung HSU  Nai-Wei LO  Kuo-Hui YEH  Ping-Hsien LIN  

     
    INVITED PAPER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2267-2274

    With the successful development and rapid advancement of social networking technology, people tend to exchange and share information via online social networks, such as Facebook and LINE.Massive amounts of information are aggregated promptly and circulated quickly among people. However, with the enormous volume of human-interactions, various types of swindles via online social networks have been launched in recent years. Effectively detecting fraudulent activities on social networks has taken on increased importance, and is a topic of ongoing interest. In this paper, we develop a fraud analysis and detection system based on real-time messaging communications, which constitute one of the most common human-interacted services of online social networks. An integrated platform consisting of various text-mining techniques, such as natural language processing, matrix processing and content analysis via a latent semantic model, is proposed. In the system implementation, we first collect a series of fraud events, all of which happened in Taiwan, to construct analysis modules for detecting such fraud events. An Android-based application is then built for alert notification when dubious logs and fraud events happen.

  • Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data

    Yoshiaki SHIRAISHI  Kenta NOMURA  Masami MOHRI  Takeru NARUSE  Masakatu MORII  

     
    PAPER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2432-2439

    Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on cloud storage systems. In ABE, to revoke users' attributes, it is necessary to make them unable to decrypt ciphertexts. Some CP-ABE schemes for efficient attribute revocation have been proposed. However, they have not been given a formal security proof against a revoked user, that is, whether they satisfy forward secrecy has not been shown or they just do not achieve fine-grained access control of shared data. We propose an attribute revocable attribute-based encryption with the forward secrecy for fine-grained access control of shared data. The proposed scheme can use both “AND” and “OR” policy and is IND-CPA secure under the Decisional Parallel Bilinear Diffie-Hellman Exponent assumption in the standard model.

  • SOLS: An LOD Based Semantically Enhanced Open Learning Space Supporting Self-Directed Learning of History

    Corentin JOUAULT  Kazuhisa SETA  Yuki HAYASHI  

     
    PAPER-Educational Technology

      Pubricized:
    2017/07/11
      Vol:
    E100-D No:10
      Page(s):
    2556-2566

    The purpose of this research is to support learners in self-directed learning on the Internet using automatically generated support using the current state of the semantic web. The main issue of creating meaningful content-dependent questions automatically is that it requires the machine to understand the concepts in the learning domain. The originality of this work is that it uses Linked Open Data (LOD) to enable meaningful content-dependent support in open learning space. Learners are supported by a learning environment, the Semantic Open Learning Space (SOLS). Learners use the system to build a concept map representing their knowledge. SOLS supports learners following the principle of inquiry-based learning. Learners that request help are provided with automatically generated questions that give them learning objectives. To verify whether the current system can support learners with fully automatically generated support, we evaluated the system with three objectives: judge whether the LOD based support was feasible and useful, whether the question support improved the development of historical considerations in the learners' mind and whether the engagement of learners was improved by the question support. The results showed that LOD based support was feasible. Learners felt that the support provided was useful and helped them learn. The question support succeeded in improving the development of learners' deep historical considerations. In addition, the engagement and interest in history of learners was improved by the questions. The results are meaningful because they show that LOD based question support can be a viable tool to support self-directed learning in open learning space.

  • Modeling Content Structures of Domain-Specific Texts with RUP-HDP-HSMM and Its Applications

    Youwei LU  Shogo OKADA  Katsumi NITTA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2017/06/09
      Vol:
    E100-D No:9
      Page(s):
    2126-2137

    We propose a novel method, built upon the hierarchical Dirichlet process hidden semi-Markov model, to reveal the content structures of unstructured domain-specific texts. The content structures of texts consisting of sequential local contexts are useful for tasks, such as text retrieval, classification, and text mining. The prominent feature of our model is the use of the recursive uniform partitioning, a stochastic process taking a view different from existing HSMMs in modeling state duration. We show that the recursive uniform partitioning plays an important role in avoiding the rapid switching between hidden states. Remarkably, our method greatly outperforms others in terms of ranking performance in our text retrieval experiments, and provides more accurate features for SVM to achieve higher F1 scores in our text classification experiments. These experiment results suggest that our method can yield improved representations of domain-specific texts. Furthermore, we present a method of automatically discovering the local contexts that serve to account for why a text is classified as a positive instance, in the supervised learning settings.

  • A Formal Model to Enforce Trustworthiness Requirements in Service Composition

    Ning FU  Yingfeng ZHANG  Lijun SHAN  Zhiqiang LIU  Han PENG  

     
    PAPER-Software System

      Pubricized:
    2017/06/20
      Vol:
    E100-D No:9
      Page(s):
    2056-2067

    With the in-depth development of service computing, it has become clear that when constructing service applications in an open dynamic network environment, greater attention must be paid to trustworthiness under the premise of functions' realization. Trustworthy computing requires theories for business process modeling in terms of both behavior and trustworthiness. In this paper, a calculus for ensuring the satisfaction of trustworthiness requirements in service-oriented systems is proposed. We investigate a calculus called QPi, for representing both the behavior and the trustworthiness property of concurrent systems. QPi is the combination of pi-calculus and a constraint semiring, which has a feature when problems with multi-dimensional properties must be tackled. The concept of the quantified bisimulation of processes provides us a measure of the degree of equivalence of processes based on the bisimulation distance. The QPi related properties of bisimulation and bisimilarity are also discussed. A specific modeling example is given to illustrate the effectiveness of the algebraic method.

  • A Novel RNN-GBRBM Based Feature Decoder for Anomaly Detection Technology in Industrial Control Network

    Hua ZHANG  Shixiang ZHU  Xiao MA  Jun ZHAO  Zeng SHOU  

     
    PAPER-Industrial Control System Security

      Pubricized:
    2017/05/18
      Vol:
    E100-D No:8
      Page(s):
    1780-1789

    As advances in networking technology help to connect industrial control networks with the Internet, the threat from spammers, attackers and criminal enterprises has also grown accordingly. However, traditional Network Intrusion Detection System makes significant use of pattern matching to identify malicious behaviors and have bad performance on detecting zero-day exploits in which a new attack is employed. In this paper, a novel method of anomaly detection in industrial control network is proposed based on RNN-GBRBM feature decoder. The method employ network packets and extract high-quality features from raw features which is selected manually. A modified RNN-RBM is trained using the normal traffic in order to learn feature patterns of the normal network behaviors. Then the test traffic is analyzed against the learned normal feature pattern by using osPCA to measure the extent to which the test traffic resembles the learned feature pattern. Moreover, we design a semi-supervised incremental updating algorithm in order to improve the performance of the model continuously. Experiments show that our method is more efficient in anomaly detection than other traditional approaches for industrial control network.

121-140hit(686hit)