The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] SOC(334hit)

41-60hit(334hit)

  • An Empirical Study of README contents for JavaScript Packages

    Shohei IKEDA  Akinori IHARA  Raula Gaikovina KULA  Kenichi MATSUMOTO  

     
    PAPER-Software Engineering

      Pubricized:
    2018/10/24
      Vol:
    E102-D No:2
      Page(s):
    280-288

    Contemporary software projects often utilize a README.md to share crucial information such as installation and usage examples related to their software. Furthermore, these files serve as an important source of updated and useful documentation for developers and prospective users of the software. Nonetheless, both novice and seasoned developers are sometimes unsure of what is required for a good README file. To understand the contents of README, we investigate the contents of 43,900 JavaScript packages. Results show that these packages contain common content themes (i.e., ‘usage’, ‘install’ and ‘license’). Furthermore, we find that application-specific packages more frequently included content themes such as ‘options’, while library-based packages more frequently included other specific content themes (i.e., ‘install’ and ‘license’).

  • A Survey of Social Network Analysis Techniques and their Applications to Socially Aware Networking Open Access

    Sho TSUGAWA  

     
    INVITED SURVEY PAPER-Network

      Pubricized:
    2018/02/21
      Vol:
    E102-B No:1
      Page(s):
    17-39

    Socially aware networking is an emerging research field that aims to improve the current networking technologies and realize novel network services by applying social network analysis (SNA) techniques. Conducting socially aware networking studies requires knowledge of both SNA and communication networking, but it is not easy for communication networking researchers who are unfamiliar with SNA to obtain comprehensive knowledge of SNA due to its interdisciplinary nature. This paper therefore aims to fill the knowledge gap for networking researchers who are interested in socially aware networking but are not familiar with SNA. This paper surveys three types of important SNA techniques for socially aware networking: identification of influential nodes, link prediction, and community detection. Then, this paper introduces how SNA techniques are used in socially aware networking and discusses research trends in socially aware networking.

  • Robust Image Identification with DC Coefficients for Double-Compressed JPEG Images

    Kenta IIDA  Hitoshi KIYA  

     
    PAPER

      Pubricized:
    2018/10/19
      Vol:
    E102-D No:1
      Page(s):
    2-10

    In the case that images are shared via social networking services (SNS) and cloud photo storage services (CPSS), it is known that the JPEG images uploaded to the services are mostly re-compressed by the providers. Because of such a situation, a new image identification scheme for double-compressed JPEG images is proposed in this paper. The aim is to detect a single-compressed image that has the same original image as the double-compressed ones. In the proposed scheme, a feature extracted from only DC coefficients in DCT coefficients is used for the identification. The use of the feature allows us not only to robustly avoid errors caused by double-compression but also to perform the identification for different size images. The simulation results demonstrate the effectiveness of the proposed one in terms of the querying performance.

  • Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems

    Tatsuya CHUMAN  Kenta IIDA  Warit SIRICHOTEDUMRONG  Hitoshi KIYA  

     
    PAPER

      Pubricized:
    2018/10/19
      Vol:
    E102-D No:1
      Page(s):
    11-18

    Encryption-then-Compression (EtC) systems have been proposed to securely transmit images through an untrusted channel provider. In this study, EtC systems were applied to social media like Twitter that carry out image manipulations. The block scrambling-based encryption schemes used in EtC systems were evaluated in terms of their robustness against image manipulation on social media. The aim was to investigate how five social networking service (SNS) providers, Facebook, Twitter, Google+, Tumblr and Flickr, manipulate images and to determine whether the encrypted images uploaded to SNS providers can avoid being distorted by such manipulations. In an experiment, encrypted and non-encrypted JPEG images were uploaded to various SNS providers. The results show that EtC systems are applicable to the five SNS providers.

  • A Robot Model That Obeys a Norm of a Human Group by Participating in the Group and Interacting with Its Members

    Yotaro FUSE  Hiroshi TAKENOUCHI  Masataka TOKUMARU  

     
    PAPER-Kansei Information Processing, Affective Information Processing

      Pubricized:
    2018/10/03
      Vol:
    E102-D No:1
      Page(s):
    185-194

    Herein, we proposed a robot model that will obey a norm of a certain group by interacting with the group members. Using this model, a robot system learns the norm of the group as a group member itself. The people with individual differences form a group and a characteristic norm that reflects the group members' personalities. When robots join a group that includes humans, the robots need to obey a characteristic norm: a group norm. We investigated whether the robot system generates a decision-making criterion to obey group norms by learning from interactions through reinforcement learning. In this experiment, human group members and the robot system answer same easy quizzes that could have several vague answers. When the group members answered differently from one another at first, we investigated whether the group members answered the quizzes while considering the group norm. To avoid bias toward the system's answers, one of the participants in a group only obeys the system, whereas the other participants are unaware of the system. Our experiments revealed that the group comprising the participants and the robot system forms group norms. The proposed model enables a social robot to make decisions socially in order to adjust their behaviors to common sense not only in a large human society but also in partial human groups, e.g., local communities. Therefore, we presumed that these robots can join human groups by interacting with its members. To adapt to these groups, these robots adjust their own behaviors. However, further studies are required to reveal whether the robots' answers affect people and whether the participants can form a group norm based on a robot's answer even in a situation wherein the participants recognize that they are interacting in a group that include a real robot. Moreover, some participants in a group do not know that the other participant only obeys the system's decisions and pretends to answer questions to prevent biased answers.

  • Nash Equilibria in Combinatorial Auctions with Item Bidding and Subadditive Symmetric Valuations

    Hiroyuki UMEDA  Takao ASANO  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1324-1333

    We discuss Nash equilibria in combinatorial auctions with item bidding. Specifically, we give a characterization for the existence of a Nash equilibrium in a combinatorial auction with item bidding when valuations by n bidders satisfy symmetric and subadditive properties. By this characterization, we can obtain an algorithm for deciding whether a Nash equilibrium exists in such a combinatorial auction.

  • Cross-Validation-Based Association Rule Prioritization Metric for Software Defect Characterization

    Takashi WATANABE  Akito MONDEN  Zeynep YÜCEL  Yasutaka KAMEI  Shuji MORISAKI  

     
    PAPER-Software Engineering

      Pubricized:
    2018/06/13
      Vol:
    E101-D No:9
      Page(s):
    2269-2278

    Association rule mining discovers relationships among variables in a data set, representing them as rules. These are expected to often have predictive abilities, that is, to be able to predict future events, but commonly used rule interestingness measures, such as support and confidence, do not directly assess their predictive power. This paper proposes a cross-validation -based metric that quantifies the predictive power of such rules for characterizing software defects. The results of evaluation this metric experimentally using four open-source data sets (Mylyn, NetBeans, Apache Ant and jEdit) show that it can improve rule prioritization performance over conventional metrics (support, confidence and odds ratio) by 72.8% for Mylyn, 15.0% for NetBeans, 10.5% for Apache Ant and 0 for jEdit in terms of SumNormPre(100) precision criterion. This suggests that the proposed metric can provide better rule prioritization performance than conventional metrics and can at least provide similar performance even in the worst case.

  • Review Rating Prediction on Location-Based Social Networks Using Text, Social Links, and Geolocations

    Yuehua WANG  Zhinong ZHONG  Anran YANG  Ning JING  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/06/01
      Vol:
    E101-D No:9
      Page(s):
    2298-2306

    Review rating prediction is an important problem in machine learning and data mining areas and has attracted much attention in recent years. Most existing methods for review rating prediction on Location-Based Social Networks only capture the semantics of texts, but ignore user information (social links, geolocations, etc.), which makes them less personalized and brings down the prediction accuracy. For example, a user's visit to a venue may be influenced by their friends' suggestions or the travel distance to the venue. To address this problem, we develop a review rating prediction framework named TSG by utilizing users' review Text, Social links and the Geolocation information with machine learning techniques. Experimental results demonstrate the effectiveness of the framework.

  • Revealing of the Underlying Mechanism of Different Node Centralities Based on Oscillation Dynamics on Networks

    Chisa TAKANO  Masaki AIDA  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/02/01
      Vol:
    E101-B No:8
      Page(s):
    1820-1832

    In recent years, with the rapid development of the Internet and cloud computing, an enormous amount of information is exchanged on various social networking services. In order to handle and maintain such a mountain of information properly by limited resources in the network, it is very important to comprehend the dynamics for propagation of information or activity on the social network. One of many indices used by social network analysis which investigates the network structure is “node centrality”. A common characteristic of conventional node centralities is that it depends on the topological structure of network and the value of node centrality does not change unless the topology changes. The network dynamics is generated by interaction between users whose strength is asymmetric in general. Network structure reflecting the asymmetric interaction between users is modeled by a directed graph, and it is described by an asymmetric matrix in matrix-based network model. In this paper, we showed an oscillation model for describing dynamics on networks generated from a certain kind of asymmetric interaction between nodes by using a symmetric matrix. Moreover, we propose a new extended index of well-known two node centralities based on the oscillation model. In addition, we show that the proposed index can describe various aspect of node centrality that considers not only the topological structure of the network, but also asymmetry of links, the distribution of source node of activity, and temporal evolution of activity propagation by properly assigning the weight of each link. The proposed model is regarded as the fundamental framework for different node centralities.

  • Retweeting Prediction Based on Social Hotspots and Dynamic Tensor Decomposition

    Qian LI  Xiaojuan LI  Bin WU  Yunpeng XIAO  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/01/30
      Vol:
    E101-D No:5
      Page(s):
    1380-1392

    In social networks, predicting user behavior under social hotspots can aid in understanding the development trend of a topic. In this paper, we propose a retweeting prediction method for social hotspots based on tensor decomposition, using user information, relationship and behavioral data. The method can be used to predict the behavior of users and analyze the evolvement of topics. Firstly, we propose a tensor-based mechanism for mining user interaction, and then we propose that the tensor be used to solve the problem of inaccuracy that arises when interactively calculating intensity for sparse user interaction data. At the same time, we can analyze the influence of the following relationship on the interaction between users based on characteristics of the tensor in data space conversion and projection. Secondly, time decay function is introduced for the tensor to quantify further the evolution of user behavior in current social hotspots. That function can be fit to the behavior of a user dynamically, and can also solve the problem of interaction between users with time decay. Finally, we invoke time slices and discretization of the topic life cycle and construct a user retweeting prediction model based on logistic regression. In this way, we can both explore the temporal characteristics of user behavior in social hotspots and also solve the problem of uneven interaction behavior between users. Experiments show that the proposed method can improve the accuracy of user behavior prediction effectively and aid in understanding the development trend of a topic.

  • Data Association and Localization of Multiple Radio Sources Using DOA and Received Signal Power by a Single Moving Passive Sensor

    Takeshi AMISHIMA  Toshio WAKAYAMA  

     
    PAPER-Sensing

      Pubricized:
    2017/11/13
      Vol:
    E101-B No:5
      Page(s):
    1336-1345

    Our goal is to use a single passive moving sensor to determine the locations of multiple radio stations. The conventional method uses only direction-of-arrival (DOA) measurements, and its performance is poor when emitters are located closely in the lateral direction, even if they are not close in the range direction, or in the far field from the moving sensor, resulting in similar DOAs for several emitters. This paper proposes a new method that uses the power of the received signals as well as DOA. The received signal power is a function of the inverse of the squared distance between an emitter and the moving sensor. This has the advantage of providing additional information in the range direction; therefore, it can be used for data association as additional information when emitter ranges are different from each other. Simulations showed that the success rate of the conventional method is 73%, whereas that of the proposed method is 97%, an overall 24-percentage-point improvement. The localization error of the proposed method is also reduced to half that of the conventional method. We further investigated its performance with different emitter and sensor configurations. In all cases, the proposed method proved superior to the conventional method.

  • A 11.3-µA Physical Activity Monitoring System Using Acceleration and Heart Rate

    Motofumi NAKANISHI  Shintaro IZUMI  Mio TSUKAHARA  Hiroshi KAWAGUCHI  Hiromitsu KIMURA  Kyoji MARUMOTO  Takaaki FUCHIKAMI  Yoshikazu FUJIMORI  Masahiko YOSHIMOTO  

     
    PAPER

      Vol:
    E101-C No:4
      Page(s):
    233-242

    This paper presents an algorithm for a physical activity (PA) classification and metabolic equivalents (METs) monitoring and its System-on-a-Chip (SoC) implementation to realize both power reduction and high estimation accuracy. Long-term PA monitoring is an effective means of preventing lifestyle-related diseases. Low power consumption and long battery life are key features supporting the wider dissemination of the monitoring system. As described herein, an adaptive sampling method is implemented for longer battery life by minimizing the active rate of acceleration without decreasing accuracy. Furthermore, advanced PA classification using both the heart rate and acceleration is introduced. The proposed algorithms are evaluated by experimentation with eight subjects in actual conditions. Evaluation results show that the root mean square error with respect to the result of processing with fixed sampling rate is less than 0.22[METs], and the mean absolute error is less than 0.06[METs]. Furthermore, to minimize the system-level power dissipation, a dedicated SoC is implemented using 130-nm CMOS process with FeRAM. A non-volatile CPU using non-volatile memory and a flip-flop is used to reduce the stand-by power. The proposed algorithm, which is implemented using dedicated hardware, reduces the active rate of the CPU and accelerometer. The current consumption of the SoC is less than 3-µA. And the evaluation system using the test chip achieves 74% system-level power reduction. The total current consumption including that of the accelerometer is 11.3-µA on average.

  • A New Block Association Scheme for IEEE 802.11ah

    Pranesh STHAPIT  Jae-Young PYUN  

     
    PAPER

      Pubricized:
    2017/09/19
      Vol:
    E101-B No:3
      Page(s):
    648-656

    IEEE 802.11ah is a new wireless standard for large-scale wireless connectivity in IoT and M2M applications. One of the major requirements placed on IEEE 802.11ah is the energy-efficient communication of several thousand stations with a single access point. This is especially difficult to achieve during network initialization, because the several thousand stations must rely on the rudimentary approach of random channel access, and the inevitable increase in channel access contention yields a long association delay. IEEE 802.11ah has introduced an authentication control mechanism that classifies stations into groups, and only a small number of stations in a group are allowed to access the medium at a time. Although the grouping strategy provides fair channel access to a large number of stations, the presence of several thousand stations and limitation that only a group can use the channel at a time, causes the association time to remain excessive. In this paper, we propose a novel block association method that enables simultaneous association of all groups. Our experiments verify that our block association method decreases the total association time by many folds.

  • Mobile Edge Computing Empowers Internet of Things Open Access

    Nirwan ANSARI  Xiang SUN  

     
    INVITED PAPER

      Pubricized:
    2017/09/19
      Vol:
    E101-B No:3
      Page(s):
    604-619

    In this paper, we propose a Mobile Edge Internet of Things (MEIoT) architecture by leveraging the fiber-wireless access technology, the cloudlet concept, and the software defined networking framework. The MEIoT architecture brings computing and storage resources close to Internet of Things (IoT) devices in order to speed up IoT data sharing and analytics. Specifically, the IoT devices (belonging to the same user) are associated to a specific proxy Virtual Machine (VM) in the nearby cloudlet. The proxy VM stores and analyzes the IoT data (generated by its IoT devices) in real-time. Moreover, we introduce the semantic and social IoT technology in the context of MEIoT to solve the interoperability and inefficient access control problem in the IoT system. In addition, we propose two dynamic proxy VM migration methods to minimize the end-to-end delay between proxy VMs and their IoT devices and to minimize the total on-grid energy consumption of the cloudlets, respectively. Performance of the proposed methods is validated via extensive simulations.

  • A Stackelberg Game Based Pricing and User Association for Spectrum Splitting Macro-Femto HetNets

    Bo GU  Zhi LIU  Cheng ZHANG  Kyoko YAMORI  Osamu MIZUNO  Yoshiaki TANAKA  

     
    PAPER-Network

      Pubricized:
    2017/07/10
      Vol:
    E101-B No:1
      Page(s):
    154-162

    The demand for wireless traffic is increasing rapidly, which has posed huge challenges to mobile network operators (MNOs). A heterogeneous network (HetNet) framework, composed of a marcocell and femtocells, has been proved to be an effective way to cope with the fast-growing traffic demand. In this paper, we assume that both the macrocell and femtocells are owned by the same MNO, with revenue optimization as its ultimate goal. We aim to propose a pricing strategy for macro-femto HetNets with a user centric vision, namely, mobile users would have their own interest to make rational decisions on selecting between the macrocell and femtocells to maximize their individual benefit. We formulate a Stackelberg game to analyze the interactions between the MNO and users, and obtain the equilibrium solution for the Stackelberg game. Via extensive simulations, we evaluate the proposed pricing strategy in terms of its efficiency with respect to the revenue optimization.

  • Robust Image Identification without Visible Information for JPEG Images

    Kenta IIDA  Hitoshi KIYA  

     
    PAPER

      Pubricized:
    2017/10/16
      Vol:
    E101-D No:1
      Page(s):
    13-19

    A robust identification scheme for JPEG images is proposed in this paper. The aim is to robustly identify JPEG images that are generated from the same original image, under various compression conditions such as differences in compression ratios and initial quantization matrices. The proposed scheme does not provide any false negative matches in principle. In addition, secure features, which do not have any visual information, are used to achieve not only a robust identification scheme but also secure one. Conventional schemes can not avoid providing false negative matches under some compression conditions, and are required to manage a secret key for secure identification. The proposed scheme is applicable to the uploading process of images on social networks like Twitter for image retrieval and forensics. A number of experiments are carried out to demonstrate that the effectiveness of the proposed method. The proposed method outperforms conventional ones in terms of query performances, while keeping a reasonable security level.

  • Relay-Assisted Load Balancing Scheme Based on Practical Throughput Estimation

    Won-Tae YU  Jeongsik CHOI  Woong-Hee LEE  Seong-Cheol KIM  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/07/03
      Vol:
    E101-B No:1
      Page(s):
    242-252

    In cellular network environments, where users are not evenly distributed across cells, overloaded base stations handling many users have difficulties in providing effective and fair services with their limited resources. Additionally, users at the cell edge may suffer from the potential problems resulting from low signal-to-interference ratio owing to the incessant interference from adjacent cells. In this paper, we propose a relay-assisted load balancing scheme to resolve these traffic imbalance. The proposed scheme can improve the performance of the overall network by utilizing relay stations to divert heavy traffic to other cells, and by adopting a partial frequency-reuse scheme to mitigate inter-cell interference. Each user and relay station calculates its own utility influence in the neighboring candidates for reassociation and decides whether to stay or move to another cell presenting the maximum total network utility increment. Simulation results show that the proposed scheme improves the overall network fairness to users by improving the performance of cell boundary users without degrading the total network throughput. We achieve a system performance gain of 16 ∼ 35% when compared with conventional schemes, while ensuring fairness among users.

  • Quantum Associative Memory with Quantum Neural Network via Adiabatic Hamiltonian Evolution

    Yoshihiro OSAKABE  Hisanao AKIMA  Masao SAKURABA  Mitsunaga KINJO  Shigeo SATO  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2017/08/09
      Vol:
    E100-D No:11
      Page(s):
    2683-2689

    There is increasing interest in quantum computing, because of its enormous computing potential. A small number of powerful quantum algorithms have been proposed to date; however, the development of new quantum algorithms for practical use remains essential. Parallel computing with a neural network has successfully realized certain unique functions such as learning and recognition; therefore, the introduction of certain neural computing techniques into quantum computing to enlarge the quantum computing application field is worthwhile. In this paper, a novel quantum associative memory (QuAM) is proposed, which is achieved with a quantum neural network by employing adiabatic Hamiltonian evolution. The memorization and retrieval procedures are inspired by the concept of associative memory realized with an artificial neural network. To study the detailed dynamics of our QuAM, we examine two types of Hamiltonians for pattern memorization. The first is a Hamiltonian having diagonal elements, which is known as an Ising Hamiltonian and which is similar to the cost function of a Hopfield network. The second is a Hamiltonian having non-diagonal elements, which is known as a neuro-inspired Hamiltonian and which is based on interactions between qubits. Numerical simulations indicate that the proposed methods for pattern memorization and retrieval work well with both types of Hamiltonians. Further, both Hamiltonians yield almost identical performance, although their retrieval properties differ. The QuAM exhibits new and unique features, such as a large memory capacity, which differs from a conventional neural associative memory.

  • Robust THP Transceiver for MIMO Interference Channel with Reduced Complexity

    Xuan GENG  Conggai LI  Feng LIU  

     
    LETTER-Communication Theory and Signals

      Vol:
    E100-A No:11
      Page(s):
    2534-2538

    This letter considers the robust Tomlinson-Harashima Precoding(THP) transceiver design for Multiple-Input Multiple-Output (MIMO) interference channel (IC). Assuming bounded channel state information (CSI) error, we deal with the optimization for minimizing the worst case per-user mean square error (MSE) and sum MSE. We present an approximate approach to derive the upper bound of the constraint leading to less semidefinite. Then the alternate approach is adopted to update the receiver matrix by solving second-order-cone programming (SOCP), and update the transmitter matrix and feedback matrix by solving semidefinite program (SDP), respectively. Simulation results show that the proposed method achieves similar performance of the S-procedure method, whereas the computation complexity is reduced significantly, especially for the system with large number of transmit antennas.

  • Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks Open Access

    Liang-Chun CHEN  Chien-Lung HSU  Nai-Wei LO  Kuo-Hui YEH  Ping-Hsien LIN  

     
    INVITED PAPER

      Pubricized:
    2017/07/21
      Vol:
    E100-D No:10
      Page(s):
    2267-2274

    With the successful development and rapid advancement of social networking technology, people tend to exchange and share information via online social networks, such as Facebook and LINE.Massive amounts of information are aggregated promptly and circulated quickly among people. However, with the enormous volume of human-interactions, various types of swindles via online social networks have been launched in recent years. Effectively detecting fraudulent activities on social networks has taken on increased importance, and is a topic of ongoing interest. In this paper, we develop a fraud analysis and detection system based on real-time messaging communications, which constitute one of the most common human-interacted services of online social networks. An integrated platform consisting of various text-mining techniques, such as natural language processing, matrix processing and content analysis via a latent semantic model, is proposed. In the system implementation, we first collect a series of fraud events, all of which happened in Taiwan, to construct analysis modules for detecting such fraud events. An Android-based application is then built for alert notification when dubious logs and fraud events happen.

41-60hit(334hit)