The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SI(16314hit)

2961-2980hit(16314hit)

  • Bayesian Exponential Inverse Document Frequency and Region-of-Interest Effect for Enhancing Instance Search Accuracy

    Masaya MURATA  Hidehisa NAGANO  Kaoru HIRAMATSU  Kunio KASHINO  Shin'ichi SATOH  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2016/06/03
      Vol:
    E99-D No:9
      Page(s):
    2320-2331

    In this paper, we first analyze the discriminative power in the Best Match (BM) 25 formula and provide its calculation method from the Bayesian point of view. The resulting, derived discriminative power is quite similar to the exponential inverse document frequency (EIDF) that we have previously proposed [1] but retains more preferable theoretical advantages. In our previous paper [1], we proposed the EIDF in the framework of the probabilistic information retrieval (IR) method BM25 to address the instance search task, which is a specific object search for videos using an image query. Although the effectiveness of our EIDF was experimentally demonstrated, we did not consider its theoretical justification and interpretation. We also did not describe the use of region-of-interest (ROI) information, which is supposed to be input to the instance search system together with the original image query showing the instance. Therefore, here, we justify the EIDF by calculating the discriminative power in the BM25 from the Bayesian viewpoint. We also investigate the effect of the ROI information for improving the instance search accuracy and propose two search methods incorporating the ROI effect into the BM25 video ranking function. We validated the proposed methods through a series of experiments using the TREC Video Retrieval Evaluation instance search task dataset.

  • Robust Non-Parametric Template Matching with Local Rigidity Constraints

    Chao ZHANG  Haitian SUN  Takuya AKASHI  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2016/06/03
      Vol:
    E99-D No:9
      Page(s):
    2332-2340

    In this paper, we address the problem of non-parametric template matching which does not assume any specific deformation models. In real-world matching scenarios, deformation between a template and a matching result usually appears to be non-rigid and non-linear. We propose a novel approach called local rigidity constraints (LRC). LRC is built based on an assumption that the local rigidity, which is referred to as structural persistence between image patches, can help the algorithm to achieve better performance. A spatial relation test is proposed to weight the rigidity between two image patches. When estimating visual similarity under an unconstrained environment, high-level similarity (e.g. with complex geometry transformations) can then be estimated by investigating the number of LRC. In the searching step, exhaustive matching is possible because of the simplicity of the algorithm. Global maximum is given out as the final matching result. To evaluate our method, we carry out a comprehensive comparison on a publicly available benchmark and show that our method can outperform the state-of-the-art method.

  • Vehicle Detection Using Local Size-Specific Classifiers

    SeungJong NOH  Moongu JEON  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2016/06/17
      Vol:
    E99-D No:9
      Page(s):
    2351-2359

    As the number of surveillance cameras keeps increasing, the demand for automated traffic-monitoring systems is growing. In this paper, we propose a practical vehicle detection method for such systems. In the last decade, vehicle detection mainly has been performed by employing an image scan strategy based on sliding windows whereby a pre-trained appearance model is applied to all image areas. In this approach, because the appearance models are built from vehicle sample images, the normalization of the scales and aspect ratios of samples can significantly influence the performance of vehicle detection. Thus, to successfully apply sliding window schemes to detection, it is crucial to select the normalization sizes very carefully in a wise manner. To address this, we present a novel vehicle detection technique. In contrast to conventional methods that determine the normalization sizes without considering given scene conditions, our technique first learns local region-specific size models based on scene-contextual clues, and then utilizes the obtained size models to normalize samples to construct more elaborate appearance models, namely local size-specific classifiers (LSCs). LSCs can provide advantages in terms of both accuracy and operational speed because they ignore unnecessary information on vehicles that are observable in faraway areas from each sliding window position. We conduct experiments on real highway traffic videos, and demonstrate that the proposed method achieves a 16% increased detection accuracy with at least 3 times faster operational speed compared with the state-of-the-art technique.

  • Acquiring 4D Light Fields of Self-Luminous Extended Light Sources Using Programmable Filter

    Motohiro NAKAMURA  Shinnosuke OYA  Takahiro OKABE  Hendrik P. A. LENSCH  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2016/06/17
      Vol:
    E99-D No:9
      Page(s):
    2360-2367

    Self-luminous light sources in the real world often have nonnegligible sizes and radiate light inhomogeneously. Acquiring the model of such a light source is highly important for accurate image synthesis and understanding. In this paper, we propose an approach to measuring 4D light fields of self-luminous extended light sources by using a liquid crystal (LC) panel, i.e. a programmable optical filter and a diffuse-reflection board. The proposed approach recovers the 4D light field from the images of the board illuminated by the light radiated from a light source and passing through the LC panel. We make use of the feature that the transmittance of the LC panel can be controlled both spatially and temporally. The approach enables multiplexed sensing and adaptive sensing, and therefore is able to acquire 4D light fields more efficiently and densely than the straightforward method. We implemented the prototype setup, and confirmed through a number of experiments that our approach is effective for modeling self-luminous extended light sources in the real world.

  • Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code

    Hongzhe LI  Jaesang OH  Heejo LEE  

     
    LETTER-Software System

      Pubricized:
    2016/06/13
      Vol:
    E99-D No:9
      Page(s):
    2385-2389

    Finding software vulnerabilities in source code before the program gets deployed is crucial to ensure the software quality. Existing source code auditing tools for vulnerability detection generate too many false positives, and only limited types of vulnerability can be detected automatically. In this paper, we propose an extendable mechanism to reveal vulnerabilities in source code with low false positives by specifying security requirements and detecting requirement violations of the potential vulnerable sinks. The experimental results show that the proposed mechanism can detect vulnerabilities with zero false positives and indicate the extendability of the mechanism to cover more types of vulnerabilities.

  • Weighted 4D-DCT Basis for Compressively Sampled Light Fields

    Yusuke MIYAGI  Keita TAKAHASHI  Toshiaki FUJII  

     
    PAPER

      Vol:
    E99-A No:9
      Page(s):
    1655-1664

    Light field data, which is composed of multi-view images, have various 3D applications. However, the cost of acquiring many images from slightly different viewpoints sometimes makes the use of light fields impractical. Here, compressive sensing is a new way to obtain the entire light field data from only a few camera shots instead of taking all the images individually. In paticular, the coded aperture/mask technique enables us to capture light field data in a compressive way through a single camera. A pixel value recorded by such a camera is a sum of the light rays that pass though different positions on the coded aperture/mask. The target light field can be reconstructed from the recorded pixel values by using prior information on the light field signal. As prior information, the current state of the art uses a dictionary (light field atoms) learned from training datasets. Meanwhile, it was reported that general bases such as those of the discrete cosine transform (DCT) are not suitable for efficiently representing prior information. In this study, however, we demonstrate that a 4D-DCT basis works surprisingly well when it is combined with a weighting scheme that considers the amplitude differences between DCT coefficients. Simulations using 18 light field datasets show the superiority of the weighted 4D-DCT basis to the learned dictionary. Furthermore, we analyzed a disparity-dependent property of the reconstructed data that is unique to light fields.

  • Decode-and-Forward Cooperative Transmission with a Multi-Antenna Relay in Multiuser Networks

    Chang Kyung SUNG  Kyu-Sung HWANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/04/04
      Vol:
    E99-B No:9
      Page(s):
    2062-2071

    In this paper, we consider a two-hop relay network with a decode-and-forward (DF) relaying protocol where a multi-input/multi-output (MIMO) relay station (RS) is deployed in a cell edge to extend cell coverage of a base station (BS). We propose two MIMO relaying schemes to improve the quality of the BS-RS link, which is a key to improve data rates in the DF relaying: 1) spatial multiplexed MIMO antenna relaying (SM-MAR) with a uniform channel decomposition (UCD) precoder, and 2) MIMO relaying with section diversity (SD-MAR). In the SM-MAR, we greatly simplify user allocation by the UCD precoder and propose a sophisticated rate maximization technique to resolve the non-convexity of rate maximization problems. Through simulations, we show that the proposed UCD based power allocation exhibits up to two times higher achievable throughput than other techniques. In addition, the proposed SD-MAR supports the BS with a single transmit antenna and increases the signal quality of the BS-RS link with the selection diversity at the RS, which is much simpler to be implemented. For the SD-MAR, we derive a closed form expression for the achievable throughput and show that the selection diversity plays more important role on the achievable throughput than the multiuser diversity.

  • The Reliability Analysis of the 1-out-of-2 System in Which Two Modules Do Mutual Cooperation in Recovery Mode

    Aromhack SAYSANASONGKHAM  Satoshi FUKUMOTO  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Vol:
    E99-A No:9
      Page(s):
    1730-1734

    In this research, we investigated the reliability of a 1-out-of-2 system with two-stage repair comprising hardware restoration and data reconstruction modes. Hardware restoration is normally independently executed by two modules. In contrast, we assumed that one of the modules could omit data reconstruction by replicating the data from the module during normal operation. In this 1-out-of-2 system, the two modules mutually cooperated in the recovery mode. As a first step, an evaluation model using Markov chains was constructed to derive a reliability measure: “unavailability in steady state.” Numerical examples confirmed that the reliability of the system was improved by the use of two cooperating modules. As the data reconstruction time increased, the gains in terms of system reliability also increased.

  • Efficiency Analysis of SiC-MOSFET-Based Bidirectional Isolated DC/DC Converters

    Atsushi SAITO  Kenshiro SATO  Yuta TANIMOTO  Kai MATSUURA  Yutaka SASAKI  Mitiko MIURA-MATTAUSCH  Hans Jürgen MATTAUSCH  Yoshifumi ZOKA  

     
    PAPER-Electronic Circuits

      Vol:
    E99-C No:9
      Page(s):
    1065-1070

    Circuit performance of SiC-MOSFET-based bidirectional isolated DC/DC converters is investigated based on circuit simulation with the physically accurate compact device model HiSIM_HV. It is demonstrated that the combined optimization of the MOSFETs Ron and of the inductances in the transformer can enable a conversion efficiency of more than 97%. The simulation study also verifies that the possible efficiency improvements are diminished due to the MOSFET-performance degradation, namely the carrier-mobility reduction, which results in a limitation of the possible Ron reduction. It is further demonstrated that an optimization of the MOSFET-operation conditions is important to utilize the resulting higher MOSFET performance for achieving additional converter efficiency improvements.

  • Reliability and Failure Impact Analysis of Distributed Storage Systems with Dynamic Refuging

    Hiroaki AKUTSU  Kazunori UEDA  Takeru CHIBA  Tomohiro KAWAGUCHI  Norio SHIMOZONO  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/06/17
      Vol:
    E99-D No:9
      Page(s):
    2259-2268

    In recent data centers, large-scale storage systems storing big data comprise thousands of large-capacity drives. Our goal is to establish a method for building highly reliable storage systems using more than a thousand low-cost large-capacity drives. Some large-scale storage systems protect data by erasure coding to prevent data loss. As the redundancy level of erasure coding is increased, the probability of data loss will decrease, but the increase in normal data write operation and additional storage for coding will be incurred. We therefore need to achieve high reliability at the lowest possible redundancy level. There are two concerns regarding reliability in large-scale storage systems: (i) as the number of drives increases, systems are more subject to multiple drive failures and (ii) distributing stripes among many drives can speed up the rebuild time but increase the risk of data loss due to multiple drive failures. If data loss occurs by multiple drive failure, it affects many users using a storage system. These concerns were not addressed in prior quantitative reliability studies based on realistic settings. In this work, we analyze the reliability of large-scale storage systems with distributed stripes, focusing on an effective rebuild method which we call Dynamic Refuging. Dynamic Refuging rebuilds failed blocks from those with the lowest redundancy and strategically selects blocks to read for repairing lost data. We modeled the dynamic change of amount of storage at each redundancy level caused by multiple drive failures, and performed reliability analysis with Monte Carlo simulation using realistic drive failure characteristics. We showed a failure impact model and a method for localizing the failure. When stripes with redundancy level 3 were sufficiently distributed and rebuilt by Dynamic Refuging, the proposed technique turned out to scale well, and the probability of data loss decreased by two orders of magnitude for systems with a thousand drives compared to normal RAID. The appropriate setting of a stripe distribution level could localize the failure.

  • CMOS Majority Circuit with Large Fan-In

    Hisanao AKIMA  Yasuhiro KATAYAMA  Masao SAKURABA  Koji NAKAJIMA  Jordi MADRENAS  Shigeo SATO  

     
    PAPER-Electronic Circuits

      Vol:
    E99-C No:9
      Page(s):
    1056-1064

    Majority logic is quite important for various applications such as fault tolerant systems, threshold logic, spectrum spread coding, and artificial neural networks. The circuit implementation of majority logic is difficult when the number of inputs becomes large because the number of transistors becomes huge and serious delay would occur. In this paper, we propose a new majority circuit with large fan-in. The circuit is composed of ordinary CMOS transistors and the total number of transistors is approximately only 4N, where N is the total number of inputs. We confirmed a correct operation by using HSPICE simulation. The yield of the proposed circuit was evaluated with respect to N under the variations of device parameters by using Monte Carlo simulation.

  • A Configuration Management Study to Fast Massive Writing for Distributed NoSQL System

    Xianqiang BAO  Nong XIAO  Yutong LU  Zhiguang CHEN  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/06/20
      Vol:
    E99-D No:9
      Page(s):
    2269-2282

    NoSQL systems have become vital components to deliver big data services due to their high horizontal scalability. However, existing NoSQL systems rely on experienced administrators to configure and tune the wide range of configurable parameters for optimized performance. In this work, we present a configuration management framework for NoSQL systems, called xConfig. With xConfig, its users can first identify performance sensitive parameters and capture the tuned parameters for different workloads as configuration policies. Next, based on tuned policies, xConfig can be implemented as the corresponding configuration optimiaztion system for the specific NoSQL system. Also it can be used to analyze the range of configurable parameters that may impact the runtime performance of NoSQL systems. We implement a prototype called HConfig based on HBase, and the parameter tuning strategies for HConfig can generate tuned policies and enable HBase to run much more efficiently on both individual worker node and entire cluster. The massive writing oriented evaluation results show that HBase under write-intensive policies outperforms both the default configuration and some existing configurations while offering significantly higher throughput.

  • Embedded F-SIR Type Transmission Line with Open-Stub for Negative Group Delay Characteristic

    Yoshiki KAYANO  Hiroshi INOUE  

     
    BRIEF PAPER

      Vol:
    E99-C No:9
      Page(s):
    1023-1026

    Negative group delay characteristics can be used to improve signal-integrity performance such as equalizer for compensation of the group delay of transmission line (TL). This brief-paper newly attempts to propose a concept of the embedded Folded-Stepped Impedance Resonator (F-SIR) structure with open-stub resonator, for negative group delay and slope characteristics at high-frequency as well as low-insertion loss. The concept of the proposed TL is based on the combination of resonance and anti-resonance due to open-stub resonator in order to establish wideband negative group delay and negative slope characteristics. The proposed TL is fabricated on PCB, and then the concept is validated by measurement and simulation.

  • Analysis over Spectral Efficiency and Power Scaling in Massive MIMO Dual-Hop Systems with Multi-Pair Users

    Yi WANG  Baofeng JI  Yongming HUANG  Chunguo LI  Ying HU  Yewang QIAN  Luxi YANG  

     
    PAPER-Information Theory

      Vol:
    E99-A No:9
      Page(s):
    1665-1673

    This paper considers a massive multiple-input-multiple-output (MIMO) relaying system with multi-pair single-antenna users. The relay node adopts maximum-ratio combining/maximum-ratio transmission (MRC/MRT) stratagem for reception/transmission. We analyze the spectral efficiency (SE) and power scaling laws with respect to the number of relay antennas and other system parameters. First, by using the law of large numbers, we derive the closed-form expression of the SE, based on which, it is shown that the SE per user increases with the number of relay antennas but decreases with the number of user pairs, both logarithmically. It is further discovered that the transmit power at the source users and the relay can be continuously reduced as the number of relay antennas becomes large while the SE can maintains a constant value, which also means that the energy efficiency gain can be obtained simultaneously. Moreover, it is proved that the number of served user pairs can grow proportionally over the number of relay antennas with arbitrary SE requirement and no extra power cost. All the analytical results are verified through the numerical simulations.

  • A Collaborative Intrusion Detection System against DDoS for SDN

    Xiaofan CHEN  Shunzheng YU  

     
    LETTER-Information Network

      Pubricized:
    2016/06/01
      Vol:
    E99-D No:9
      Page(s):
    2395-2399

    DDoS remains a major threat to Software Defined Networks. To keep SDN secure, effective detection techniques for DDoS are indispensable. Most of the newly proposed schemes for detecting such attacks on SDN make the SDN controller act as the IDS or the central server of a collaborative IDS. The controller consequently becomes a target of the attacks and a heavy loaded point of collecting traffic. A collaborative intrusion detection system is proposed in this paper without the need for the controller to play a central role. It is deployed as a modified artificial neural network distributed over the entire substrate of SDN. It disperses its computation power over the network that requires every participating switch to perform like a neuron. The system is robust without individual targets and has a global view on a large-scale distributed attack without aggregating traffic over the network. Emulation results demonstrate its effectiveness.

  • Detecting Logical Inconsistencies by Clustering Technique in Natural Language Requirements

    Satoshi MASUDA  Tohru MATSUODANI  Kazuhiko TSUDA  

     
    PAPER

      Pubricized:
    2016/07/06
      Vol:
    E99-D No:9
      Page(s):
    2210-2218

    In the early phases of the system development process, stakeholders exchange ideas and describe requirements in natural language. Requirements described in natural language tend to be vague and include logical inconsistencies, whereas logical consistency is the key to raising the quality and lowering the cost of system development. Hence, it is important to find logical inconsistencies in the whole requirements at this early stage. In verification and validation of the requirements, there are techniques to derive logical formulas from natural language requirements and evaluate their inconsistencies automatically. Users manually chunk the requirements by paragraphs. However, paragraphs do not always represent logical chunks. There can be only one logical chunk over some paragraphs on the other hand some logical chunks in one paragraph. In this paper, we present a practical approach to detecting logical inconsistencies by clustering technique in natural language requirements. Software requirements specifications (SRSs) are the target document type. We use k-means clustering to cluster chunks of requirements and develop semantic role labeling rules to derive “conditions” and “actions” as semantic roles from the requirements by using natural language processing. We also construct an abstraction grammar to transform the conditions and actions into logical formulas. By evaluating the logical formulas with input data patterns, we can find logical inconsistencies. We implemented our approach and conducted experiments on three case studies of requirements written in natural English. The results indicate that our approach can find logical inconsistencies.

  • Effect of Contact Lubricant on Contact Resistance Characteristics — Contact Resistance of Lubricated Surface and Observation of Lubricant Molecules —

    Terutaka TAMAI  Masahiro YAMAKAWA  Yuta NAKAMURA  

     
    PAPER

      Vol:
    E99-C No:9
      Page(s):
    985-991

    The electrical lubricants have been accepted to reduce friction of contacts and to prevent degradation of contact resistance. However, as the lubricant has an electrical insulation property it seems that application to contact surface is unsuitable for contact resistance. These mechanisms in contact interfaces have not fully understood. In this paper, relationships between contact resistance and contact load were examined with both clean and lubricated surfaces. Orientation of the lubricant molecules was observed by high magnification images of STM and AFM. There was no difference in contact resistance characteristics for both clean and lubricated surfaces in spite of lubricants thickness. The molecules were orientated perpendicular to the surface. This fact turns over an established theory of adsorption of non-polar lubricant to surface.

  • Database Calibration for Outdoor Wi-Fi Positioning System

    Yuyang HUANG  Li-Ta HSU  Yanlei GU  Haitao WANG  Shunsuke KAMIJO  

     
    PAPER-Intelligent Transport System

      Vol:
    E99-A No:9
      Page(s):
    1683-1690

    The limitation of the GPS in urban canyon has led to the rapid development of Wi-Fi positioning system (WPS). The fingerprint-based WPS could be divided into calibration and positioning stages. In calibration stage, several grid points (GPs) are selected, and their position tags and featured access points (APs) are collected to build fingerprint database. In positioning stage, real time measurement of APs are compared with the feature of each GP in the database. The k weighted nearest neighbors (KWNN) algorithm is used as pattern matching algorithm to estimate the final positioning result. However, the performance of outdoor fingerprint-based WPS is not good enough for pedestrian navigation. The main challenge is to build a robust fingerprint database. The received number of APs in outdoor environments has large variation. In addition, positioning result estimated by GPS receiver is used as position tag of each GP to automatically build the fingerprint database. This paper studies the lifecycle of fingerprint database in outdoor environment. We also shows that using long time collected data to build database could improve the positioning accuracy. Moreover, a new 3D-GNSS (3D building models aided GNSS) positioning method is used to provide accurate position tags. In this paper, the fingerprint-based WPS has been developed in an outdoor environment near the center of Tokyo city. The proposed WPS can achieve around 17 meters positioning accuracy in urban canyon.

  • Color Error Diffusion Based on Neugebauer Model

    Hengjun YU  Kohei INOUE  Kenji HARA  Kiichi URAHAMA  

     
    LETTER-Image

      Vol:
    E99-A No:9
      Page(s):
    1758-1761

    In this paper, we propose a method for color error diffusion based on the Neugebauer model for color halftone printing. The Neugebauer model expresses an arbitrary color as a trilinear interpolation of basic colors. The proposed method quantizes the color of each pixel to a basic color which minimizes an accumulated quantization error, and the quantization error is diffused to the ratios of basic colors in subsequent pixels. Experimental results show that the proposed method outperforms conventional color error diffusion methods including separable method in terms of eye model-based mean squared error.

  • Observation of Break Arc Rotated by Radial Magnetic Field in a 48VDC Resistive Circuit Using Two High-Speed Cameras

    Jun MATSUOKA  Junya SEKIKAWA  

     
    BRIEF PAPER

      Vol:
    E99-C No:9
      Page(s):
    1027-1030

    Break arcs are rotated with the radial magnetic field formed by a magnet embedded in a fixed cathode contact. The break arcs are generated in a 48VDC resistive circuit. The circuit current when the contacts are closed is 10A. The depth of the magnet varies from 1mm to 4mm to change the strength of the radial magnetic field for rotating break arcs. Images of break arcs are taken by two high-speed cameras from two directions and the rotational motion of the break arcs is observed. The rotational period of rotational motion of the break arcs is investigated. The following results are obtained. The break arcs rotate clockwise on the cathode surface seen from anode side. This rotation direction conforms to the direction of the Lorentz force that affects to the break arcs with the radial magnetic field. The rotational period gradually decreases during break operation. When the depth of magnet is larger, the rotational period becomes longer.

2961-2980hit(16314hit)