The search functionality is under construction.

Keyword Search Result

[Keyword] SOC(334hit)

101-120hit(334hit)

  • Designing Mobility Models Based on Relational Graph

    Zhenwei DING  Yusuke OMORI  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  

     
    PAPER-Wireless Network

      Vol:
    E97-D No:12
      Page(s):
    3007-3015

    Simulating the mobility of mobile devices has always been an important issue as far as wireless networks are concerned because mobility needs to be taken into account in various situations in wireless networks. Researchers have been trying, for many years, to improve the accuracy and flexibility of mobility models. Although recent progress of designing mobility models based on social graph have enhanced the performance of mobility models and made them more convenient to use, we believe the accuracy and flexibility of mobility models could be further improved by taking a more integrated structure as the input. In this paper, we propose a new way of designing mobility models on the basis of relational graph [1] which is a graph depicting the relation among objects, e.g. relation between people and people, and also people and places. Moreover, some novel mobility features were introduced in the proposed model to provide social, spatial and temporal properties in order to produce results similar to real mobility data. It was demonstrated by simulation that these measures could generate results similar to real mobility data.

  • Static Mapping with Dynamic Switching of Multiple Data-Parallel Applications on Embedded Many-Core SoCs

    Ittetsu TANIGUCHI  Junya KAIDA  Takuji HIEDA  Yuko HARA-AZUMI  Hiroyuki TOMIYAMA  

     
    PAPER-Fundamentals of Information Systems

      Vol:
    E97-D No:11
      Page(s):
    2827-2834

    This paper studies mapping techniques of multiple applications on embedded many-core SoCs. The mapping techniques proposed in this paper are static which means the mapping is decided at design time. The mapping techniques take into account both inter-application and intra-application parallelism in order to fully utilize the potential parallelism of the many-core architecture. Additionally, the proposed static mapping supports dynamic application switching, which means the applications mapped onto the same cores are switched to each other at runtime. Two approaches are proposed for static mapping: one approach is based on integer linear programming and the other is based on a greedy algorithm. Experimental results show the effectiveness of the proposed techniques.

  • Quality-of-Experience (QoE) in Emerging Mobile Social Networks

    Mianxiong DONG  Takashi KIMATA  Komei SUGIURA  Koji ZETTSU  

     
    PAPER

      Vol:
    E97-D No:10
      Page(s):
    2606-2612

    Mobile social networks (MSN) provides diverse services to meet the needs of mobile users, i.e., discovering new friends, and sharing their pictures, videos and other information among their common interest friends. On the other hand, Quality-of-Experience (QoE) is a new concept related to but differs from Quality-of-Service (QoS) perception. QoE is a subjective measure of a customer's experiences with a service focuses on the entire service experience, and is a more holistic evaluation. So far, QoS issues have been focused and mainly addressed in the literature of MSNs. To the best of our knowledge, this paper is the first article to address QoE issues in emerging MSNs. In this paper, we first present a comprehensive investigation on recent advances in MSNs as well as QoE issues addressed in various types of applications and networks. From the lessons learned from the literature, then we propose a future research direction of QoE in MSNs.

  • Privacy-Preserving Statistical Analysis Method by Splitting Server Roles for Distributed Real-World Data

    Jun ISHII  Hiroyuki MAEOMICHI  Akihiro TSUTSUI  Ikuo YODA  

     
    PAPER

      Vol:
    E97-B No:9
      Page(s):
    1779-1789

    This paper propose a novel method for obtaining statistical results such as averages, variances, and correlations without leaking any raw data values from data-holders by using multiple pseudonyms. At present, to obtain statistical results using a large amount of data, we need to collect all data in the same storage device. However, gathering real-world data that were generated by different people is not easy because they often contain private information. The authors split the roles of servers into publishing pseudonyms and collecting answers. Splitting these roles, different entities can more easily join as pseudonym servers than in previous secure multi-party computation methods and there is less chance of collusion between servers. Thus, our method enables data holders to protect themselves against malicious attacks from data users. We also estimated a typical problem that occurred with our method and added a pseudonym availability confirmation protocol to prevent the problem. We report our evaluation of the effectiveness of our method through implementation and experimentation and discuss how we incorporated the WebSocket protocol and MySQL Memoty Storage Engine to remove the bottleneck and improve the implementation style. Finally, we explain how our method can obtain averages, variances, and correlation from 5000 data holders within 50 seconds.

  • A Novel Optimal Social Trust Path Selection Algorithm for Large-Scale Complex Social Networks

    Lianggui LIU  Huiling JIA  

     
    PAPER-Internet

      Vol:
    E97-B No:9
      Page(s):
    1910-1920

    With the phenomenal explosion in online services, social networks are becoming an emerging ubiquitous platform for numerous services where service consumers require the selection of trustworthy service providers before invoking services with the help of other intermediate participants. Under this circumstance, evaluation of the trustworthiness of the service provider along the social trust paths from the service consumer to the service provider is required and to this end, selection of the optimal social trust path (OSTP) that can yield the most trustworthy evaluation result is a pre-requisite. OSTP selection with multiple quality of trust (QoT) constraints has been proven to be NP-Complete. Heuristic algorithms with polynomial and pseudo-polynomial-time complexities are often used to deal with this problem. However, existing solutions cannot guarantee the search efficiency, that is, they have difficulty in avoiding suboptimal solutions during the search process. Quantum annealing uses delocalization and tunneling to avoid local minima without sacrificing execution time. Several recent studies have proven that it is a promising way to tackle many optimization problems. In this paper, we propose a novel quantum annealing based OSTP selection algorithm (QA_OSTP) for large-scale complex social networks. Experiments show that QA_OSTP has better performance than its heuristic counterparts.

  • An Oscillation-Based On-Chip Temperature-Aware Dynamic Voltage and Frequency Scaling Scheme in System-on-a-Chip

    Katherine Shu-Min LI  Yingchieh HO  Yu-Wei YANG  Liang-Bi CHEN  

     
    PAPER-Circuit Implementations

      Vol:
    E97-D No:9
      Page(s):
    2320-2329

    The excessively high temperature in a chip may cause circuit malfunction and performance degradation, and thus should be avoided to improve system reliability. In this paper, a novel oscillation-based on-chip thermal sensing architecture for dynamically adjusting supply voltage and clock frequency in System-on-a-Chip (SoC) is proposed. It is shown that the oscillation frequency of a ring oscillator reduces linearly as the temperature rises, and thus provides a good on-chip temperature sensing mechanism. An efficient Dynamic Voltage-to-Frequency Scaling (DF2VS) algorithm is proposed to dynamically adjust supply voltage according to the oscillation frequencies of the ring oscillators distributed in SoC so that thermal sensing can be carried at all potential hot spots. An on-chip Dynamic Voltage Scaling or Dynamic Voltage and Frequency Scaling (DVS or DVFS) monitor selects the supply voltage level and clock frequency according to the outputs of all thermal sensors. Experimental results on SoC benchmark circuits show the effectiveness of the algorithm that a 10% reduction in supply voltage alone can achieve about 20% power reduction (DVS scheme), and nearly 50% reduction in power is achievable if the clock frequency is also scaled down (DVFS scheme). The chip temperature will be significant lower due to the reduced power consumption.

  • Aperiodic Complementary Sequences

    Zhimin SUN  Xiangyong ZENG  Yang YANG  

     
    LETTER-Communication Theory and Signals

      Vol:
    E97-A No:9
      Page(s):
    1998-2004

    For an integer q≥2, new sets of q-phase aperiodic complementary sequences (ACSs) are constructed by using known sets of q-phase ACSs and certain matrices. Employing the Kronecker product to two known sets of q-phase ACSs, some sets of q-phase aperiodic complementary sequences with a new length are obtained. For an even integer q, some sets of q-phase ACSs with new parameters are generated, and their equivalent matrix representations are also presented.

  • CROP: Community-Relevance-Based Opportunistic Routing in Delay Tolerant Networks

    Je-Wei CHANG  Chien CHEN  

     
    PAPER-Network

      Vol:
    E97-B No:9
      Page(s):
    1875-1888

    Researchers have developed several social-based routing protocols for delay tolerant networks (DTNs) over the past few years. Two main routing metrics to support social-based routing in DTNs are centrality and similarity metrics. These two metrics help packets decide how to travel through the network to achieve short delay or low drop rate. This study presents a new routing scheme called Community-Relevance based Opportunistic routing (CROP). CROP uses a different message forwarding approach in DTNs by combining community structure with a new centrality metric called community relevance. One fundamental change in this approach is that community relevance values do not represent the importance of communities themselves. Instead, they are computed for each community-community relationship individually, which means that the level of importance of one community depends on the packet's destination community. The study also compares CROP with other routing algorithms such as BubbleRap and SimBet. Simulation results show that CROP achieves an average delivery ratio improvement of at least 30% and can distribute packets more fairly within the network.

  • Semi-Supervised Feature Selection with Universum Based on Linked Social Media Data

    Junyang QIU  Yibing WANG  Zhisong PAN  Bo JIA  

     
    LETTER-Pattern Recognition

      Vol:
    E97-D No:9
      Page(s):
    2522-2525

    Independent and identically distributed (i.i.d) assumptions are commonly used in the machine learning community. However, social media data violate this assumption due to the linkages. Meanwhile, with the variety of data, there exist many samples, i.e., Universum, that do not belong to either class of interest. These characteristics pose great challenges to dealing with social media data. In this letter, we fully take advantage of Universum samples to enable the model to be more discriminative. In addition, the linkages are also taken into consideration in the means of social dimensions. To this end, we propose the algorithm Semi-Supervised Linked samples Feature Selection with Universum (U-SSLFS) to integrate the linking information and Universum simultaneously to select robust features. The empirical study shows that U-SSLFS outperforms state-of-the-art algorithms on the Flickr and BlogCatalog.

  • Complex-Valued Bipartite Auto-Associative Memory

    Yozo SUZUKI  Masaki KOBAYASHI  

     
    PAPER-Nonlinear Problems

      Vol:
    E97-A No:8
      Page(s):
    1680-1687

    Complex-valued Hopfield associative memory (CHAM) is one of the most promising neural network models to deal with multilevel information. CHAM has an inherent property of rotational invariance. Rotational invariance is a factor that reduces a network's robustness to noise, which is a critical problem. Here, we proposed complex-valued bipartite auto-associative memory (CBAAM) to solve this reduction in noise robustness. CBAAM consists of two layers, a visible complex-valued layer and an invisible real-valued layer. The invisible real-valued layer prevents rotational invariance and the resulting reduction in noise robustness. In addition, CBAAM has high parallelism, unlike CHAM. By computer simulations, we show that CBAAM is superior to CHAM in noise robustness. The noise robustness of CHAM decreased as the resolution factor increased. On the other hand, CBAAM provided high noise robustness independent of the resolution factor.

  • Constructing Social Networks from Literary Fiction

    Jong-kyu SEO  Sung-hwan KIM  Hwan-gue CHO  

     
    LETTER-Social Networks

      Vol:
    E97-D No:8
      Page(s):
    2046-2047

    A social network is a useful model for identifying hidden structures and meaningful knowledge among social atoms, which have complicated interactions. In recent years, most studies have focused on the real data of the social space such as emails, tweets, and human communities. In this paper, we construct a social network from literary fiction by mapping characters to vertices and their relationship strengths to edges. The main contribution of this paper is that our model can be exploited to reveal the deep structures of fiction novels by using graph theoretic concepts, without the involvement of any manual work. Experimental evaluation showed that our model successfully classified fictional characters in terms of their importance to the plot of a novel.

  • Applying Association Analysis to Dynamic Slicing Based Fault Localization

    Heling CAO  Shujuan JIANG  Xiaolin JU  Yanmei ZHANG  Guan YUAN  

     
    PAPER-Software Engineering

      Vol:
    E97-D No:8
      Page(s):
    2057-2066

    Fault localization is a necessary process of locating faults in buggy programs. This paper proposes a novel approach using dynamic slicing and association analysis to improve the effectiveness of fault localization. Our approach utilizes dynamic slicing to generate a reduced candidate set to narrow the range of faults, and introduces association analysis to mine the relationship between the statements in the execution traces and the test results. In addition, we develop a prototype tool DSFL to implement our approach. Furthermore, we perform a set of empirical studies with 12 Java programs to evaluate the effectiveness of the proposed approach. The experimental results show that our approach is more effective than the compared approaches.

  • Building a Dynamic Social Community with Non Playable Characters

    Justin PERRIE  Ling LI  

     
    PAPER-Social Networks

      Vol:
    E97-D No:8
      Page(s):
    1965-1973

    A challenge faced by the video game industry is to develop believable and more intelligent Non-Playable Characters (NPCs). To tackle this problem a low-cost and simple approach has been proposed in this research, which is the development of a gossip virtual social network for NPCs. The network allows simple individual NPCs to communicate their knowledge amongst themselves. The communication within this social network is governed by social-psychological rules. These rules are categorized into four types: Contact, whether the NPC are within a contactable range of each other; Observation, whether the NPCs actually want to talk to each other based on their personal traits; Status, the current representation of the NPCs; and Relationships which determines the long term ties of the NPCs. Evaluations of the proposed gossip virtual social network was conducted, both through statistical analysis and a survey of real users. Highly satisfactory results have been achieved.

  • Two-Step Boosting for OSN Based Sybil-Resistant Trust Value of Non-Sybil Identities

    Kyungbaek KIM  

     
    LETTER-Information Network

      Vol:
    E97-D No:7
      Page(s):
    1918-1922

    In the design of distributed systems, defending against Sybil attack is an important issue. Recently, OSN (Online Social Network)-based Sybil defending approaches, which use the fast mixing property of a social network graph with sufficient length of random walks and provide Sybil-resistant trust values, have been proposed. However, because of the probabilistic property of the previous approaches, some honest (non-Sybil) identities obtain low trust value and they are mistakenly considered as Sybil identities. A simple solution of boosting the trust value of honest identities is using longer random walks, but this direct boosting method also increases trust values of Sybil identities significantly. In this paper, a two-step boosting method is proposed to increase the Sybil-resistant trust value of honest identities reasonably and to prevent Sybil identities from having high trust values. The proposed boosting method is composed of two steps: initializing the trust value with a reasonably long random walks and boosting the trust value by using much longer random walks than the first step. The proposed method is evaluated by using sampled social network graphs of Facebook, and it is observed that the proposed method reduces the portion of honest identities mistakenly considered as Sybil identities substantially (from 30% to 1.3%) and keeps the low trust values of Sybil identities.

  • A Novel Test Data Compression Scheme for SoCs Based on Block Merging and Compatibility

    Tiebin WU  Hengzhu LIU  Botao ZHANG  

     
    PAPER

      Vol:
    E97-A No:7
      Page(s):
    1452-1460

    This paper presents a novel test data compression scheme for SoCs based on block merging and compatibility. The technique exploits the properties of compatibility and inverse compatibility between consecutive blocks, consecutive merged blocks, and two halves of the encoding merged block itself to encode the pre-computed test data. The decompression circuit is simple to be implemented and has advantage of test-independent. In addition, the proposed scheme is applicable for IP cores in SoCs since it compresses the test data without requiring any structural information of the circuit under test. Experimental results demonstrate that the proposed technique can achieve an average compression ratio up to 68.02% with significant low test application time.

  • Player Tracking in Far-View Soccer Videos Based on Composite Energy Function

    Kazuya IWAI  Sho TAKAHASHI  Takahiro OGAWA  Miki HASEYAMA  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E97-D No:7
      Page(s):
    1885-1892

    In this paper, an accurate player tracking method in far-view soccer videos based on a composite energy function is presented. In far-view soccer videos, player tracking methods that perform processing based only on visual features cannot accurately track players since each player region becomes small, and video coding causes color bleeding between player regions and the soccer field. In order to solve this problem, the proposed method performs player tracking on the basis of the following three elements. First, we utilize visual features based on uniform colors and player shapes. Second, since soccer players play in such a way as to maintain a formation, which is a positional pattern of players, we use this characteristic for player tracking. Third, since the movement direction of each player tends to change smoothly in successive frames of soccer videos, we also focus on this characteristic. Then we adopt three energies: a potential energy based on visual features, an elastic energy based on formations and a movement direction-based energy. Finally, we define a composite energy function that consists of the above three energies and track players by minimizing this energy function. Consequently, the proposed method achieves accurate player tracking in far-view soccer videos.

  • Creating Stories from Socially Curated Microblog Messages

    Akisato KIMURA  Kevin DUH  Tsutomu HIRAO  Katsuhiko ISHIGURO  Tomoharu IWATA  Albert AU YEUNG  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E97-D No:6
      Page(s):
    1557-1566

    Social media such as microblogs have become so pervasive such that it is now possible to use them as sensors for real-world events and memes. While much recent research has focused on developing automatic methods for filtering and summarizing these data streams, we explore a different trend called social curation. In contrast to automatic methods, social curation is characterized as a human-in-the-loop and sometimes crowd-sourced mechanism for exploiting social media as sensors. Although social curation web services like Togetter, Naver Matome and Storify are gaining popularity, little academic research has studied the phenomenon. In this paper, our goal is to investigate the phenomenon and potential of this new field of social curation. First, we perform an in-depth analysis of a large corpus of curated microblog data. We seek to understand why and how people participate in this laborious curation process. We then explore new ways in which information retrieval and machine learning technologies can be used to assist curators. In particular, we propose a novel method based on a learning-to-rank framework that increases the curator's productivity and breadth of perspective by suggesting which novel microblogs should be added to the curated content.

  • Predicting Political Orientation of News Articles Based on User Behavior Analysis in Social Network Open Access

    Jun-Gil KIM  Kyung-Soon LEE  

     
    PAPER

      Vol:
    E97-D No:4
      Page(s):
    685-693

    News articles usually represent a biased viewpoint on contentious issues, potentially causing social problems. To mitigate this media bias, we propose a novel framework for predicting orientation of a news article by analyzing social user behaviors in Twitter. Highly active users tend to have consistent behavior patterns in social network by retweeting behavior among users with the same viewpoints for contentious issues. The bias ratio of highly active users is measured to predict orientation of users. Then political orientation of a news article is predicted based on the bias ratio of users, mutual retweeting and opinion analysis of tweet documents. The analysis of user behavior shows that users with the value of 1 in bias ratio are 88.82%. It indicates that most of users have distinctive orientation. Our prediction method based on orientation of users achieved 88.6% performance in accuracy. Experimental results show significant improvements over the SVM classification. These results show that proposed detection method is effective in social network.

  • Discovery of the Optimal Trust Inference Path for Online Social Networks Open Access

    Yao MA  Hongwei LU  Zaobin GAN  

     
    PAPER

      Vol:
    E97-D No:4
      Page(s):
    673-684

    Analysis of the trust network proves beneficial to the users in Online Social Networks (OSNs) for decision-making. Since the construction of trust propagation paths connecting unfamiliar users is the preceding work of trust inference, it is vital to find appropriate trust propagation paths. Most of existing trust network discovery algorithms apply the classical exhausted searching approaches with low efficiency and/or just take into account the factors relating to trust without regard to the role of distrust relationships. To solve the issues, we first analyze the trust discounting operators with structure balance theory and validate the distribution characteristics of balanced transitive triads. Then, Maximum Indirect Referral Belief Search (MIRBS) and Minimum Indirect Functional Uncertainty Search (MIFUS) strategies are proposed and followed by the Optimal Trust Inference Path Search (OTIPS) algorithms accordingly on the basis of the bidirectional versions of Dijkstra's algorithm. The comparative experiments of path search, trust inference and edge sign prediction are performed on the Epinions data set. The experimental results show that the proposed algorithm can find the trust inference path with better efficiency and the found paths have better applicability to trust inference.

  • Culture Based Preference for the Information Feeding Mechanism in Online Social Networks Open Access

    Arunee RATIKAN  Mikifumi SHIKIDA  

     
    PAPER

      Vol:
    E97-D No:4
      Page(s):
    705-713

    Online Social Networks (OSNs) have recently been playing an important role in communication. From the audience aspect, they enable audiences to get unlimited information via the information feeding mechanism (IFM), which is an important part of the OSNs. The audience relies on the quantity and quality of the information served by it. We found that existing IFMs can result in two problems: information overload and cultural ignorance. In this paper, we propose a new type of IFM that solves these problems. The advantage of our proposed IFM is that it can filter irrelevant information with consideration of audiences' culture by using the Naïve Bayes (NB) algorithm together with features and factors. It then dynamically serves interesting and important information based on the current situation and preference of the audience. This mechanism helps the audience to reduce the time spent in finding interesting information. It can be applied to other cultures, societies and businesses. In the near future, the audience will be provided with excellent, and less annoying, communication. Through our studies, we have found that our proposed IFM is most appropriate for Thai and some groups of Japanese audiences under the consideration of audiences' culture.

101-120hit(334hit)