The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

2741-2760hit(21534hit)

  • Graph-Based Video Search Reranking with Local and Global Consistency Analysis

    Soh YOSHIDA  Takahiro OGAWA  Miki HASEYAMA  Mitsuji MUNEYASU  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2018/01/30
      Vol:
    E101-D No:5
      Page(s):
    1430-1440

    Video reranking is an effective way for improving the retrieval performance of text-based video search engines. This paper proposes a graph-based Web video search reranking method with local and global consistency analysis. Generally, the graph-based reranking approach constructs a graph whose nodes and edges respectively correspond to videos and their pairwise similarities. A lot of reranking methods are built based on a scheme which regularizes the smoothness of pairwise relevance scores between adjacent nodes with regard to a user's query. However, since the overall consistency is measured by aggregating only the local consistency over each pair, errors in score estimation increase when noisy samples are included within query-relevant videos' neighbors. To deal with the noisy samples, the proposed method leverages the global consistency of the graph structure, which is different from the conventional methods. Specifically, in order to detect this consistency, the propose method introduces a spectral clustering algorithm which can detect video groups, in which videos have strong semantic correlation, on the graph. Furthermore, a new regularization term, which smooths ranking scores within the same group, is introduced to the reranking framework. Since the score regularization is performed by both local and global aspects simultaneously, the accurate score estimation becomes feasible. Experimental results obtained by applying the proposed method to a real-world video collection show its effectiveness.

  • Power Allocation for Energy Efficiency Maximization in DAS with Imperfect CSI and Multiple Receive Antennas

    Weiye XU  Min LIN  Ying WANG  Fei WANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/10/23
      Vol:
    E101-B No:5
      Page(s):
    1270-1279

    Based on imperfect channel state information (CSI), the energy efficiency (EE) of downlink distributed antenna systems (DASs) with multiple receive antennas is investigated assuming composite Rayleigh fading channels. A new EE is introduced which is defined as the ratio of the average transmission rate to the total consumed power. According to this definition, an optimal power allocation (PA) scheme is developed for maximizing EE in a DAS subject to the maximum transmit power constraint. It is shown that a PA solution for the constrained EE optimization does exist and is unique. A Newton method based practical iterative algorithm is presented to solve PA. To avoid the iterative calculation, a suboptimal PA scheme is derived by means of the Lambert function, which yields a closed-form PA. The developed schemes include the ones under perfect CSI as special cases, and only need the statistical CSI. Thus, they have low overhead and good robustness. Moreover, the theoretical EE under imperfect CSI is derived for performance evaluation, and the resulting closed-form EE expression is obtained. Simulation results indicate that the theoretical EE can match the corresponding simulated value well, and the developed suboptimal scheme has performance close to optimal one, but with lower complexity.

  • Access System Virtualization for Sustainable and Agile Development Open Access

    Akihiro OTAKA  

     
    INVITED PAPER

      Pubricized:
    2017/10/18
      Vol:
    E101-B No:4
      Page(s):
    961-965

    This paper describes why we require access system virtualization. The purpose of access system virtualization is different from that of core network virtualization. Therefore, a specific approach should be considered such as the separation of software and hardware, interface standardization, or deep softwarization.

  • Semantically Readable Distributed Representation Learning and Its Expandability Using a Word Semantic Vector Dictionary

    Ikuo KESHI  Yu SUZUKI  Koichiro YOSHINO  Satoshi NAKAMURA  

     
    PAPER

      Pubricized:
    2018/01/18
      Vol:
    E101-D No:4
      Page(s):
    1066-1078

    The problem with distributed representations generated by neural networks is that the meaning of the features is difficult to understand. We propose a new method that gives a specific meaning to each node of a hidden layer by introducing a manually created word semantic vector dictionary into the initial weights and by using paragraph vector models. We conducted experiments to test the hypotheses using a single domain benchmark for Japanese Twitter sentiment analysis and then evaluated the expandability of the method using a diverse and large-scale benchmark. Moreover, we tested the domain-independence of the method using a Wikipedia corpus. Our experimental results demonstrated that the learned vector is better than the performance of the existing paragraph vector in the evaluation of the Twitter sentiment analysis task using the single domain benchmark. Also, we determined the readability of document embeddings, which means distributed representations of documents, in a user test. The definition of readability in this paper is that people can understand the meaning of large weighted features of distributed representations. A total of 52.4% of the top five weighted hidden nodes were related to tweets where one of the paragraph vector models learned the document embeddings. For the expandability evaluation of the method, we improved the dictionary based on the results of the hypothesis test and examined the relationship of the readability of learned word vectors and the task accuracy of Twitter sentiment analysis using the diverse and large-scale benchmark. We also conducted a word similarity task using the Wikipedia corpus to test the domain-independence of the method. We found the expandability results of the method are better than or comparable to the performance of the paragraph vector. Also, the objective and subjective evaluation support each hidden node maintaining a specific meaning. Thus, the proposed method succeeded in improving readability.

  • A Data Fusion-Based Fire Detection System

    Ying-Yao TING  Chi-Wei HSIAO  Huan-Sheng WANG  

     
    PAPER-Technologies for Knowledge Support Platform

      Pubricized:
    2018/01/19
      Vol:
    E101-D No:4
      Page(s):
    977-984

    To prevent constraints or defects of a single sensor from malfunctions, this paper proposes a fire detection system based on the Dempster-Shafer theory with multi-sensor technology. The proposed system operates in three stages: measurement, data reception and alarm activation, where an Arduino is tasked with measuring and interpreting the readings from three types of sensors. Sensors under consideration involve smoke, light and temperature detection. All the measured data are wirelessly transmitted to the backend Raspberry Pi for subsequent processing. Within the system, the Raspberry Pi is used to determine the probability of fire events using the Dempster-Shafer theory. We investigate moderate settings of the conflict coefficient and how it plays an essential role in ensuring the plausibility of the system's deduced results. Furthermore, a MySQL database with a web server is deployed on the Raspberry Pi for backlog and data analysis purposes. In addition, the system provides three notification services, including web browsing, smartphone APP, and short message service. For validation, we collected the statistics from field tests conducted in a controllable and safe environment by emulating fire events happening during both daytime and nighttime. Each experiment undergoes the No-fire, On-fire and Post-fire phases. Experimental results show an accuracy of up to 98% in both the No-fire and On-fire phases during the daytime and an accuracy of 97% during the nighttime under reasonable conditions. When we take the three phases into account, the accuracy in the daytime and nighttime increase to 97% and 89%, respectively. Field tests validate the efficiency and accuracy of the proposed system.

  • Efficient Methods for Aggregate Reverse Rank Queries

    Yuyang DONG  Hanxiong CHEN  Kazutaka FURUSE  Hiroyuki KITAGAWA  

     
    PAPER

      Pubricized:
    2018/01/18
      Vol:
    E101-D No:4
      Page(s):
    1012-1020

    Given two data sets of user preferences and product attributes in addition to a set of query products, the aggregate reverse rank (ARR) query returns top-k users who regard the given query products as the highest aggregate rank than other users. ARR queries are designed to focus on product bundling in marketing. Manufacturers are mostly willing to bundle several products together for the purpose of maximizing benefits or inventory liquidation. This naturally leads to an increase in data on users and products. Thus, the problem of efficiently processing ARR queries become a big issue. In this paper, we reveal two limitations of the state-of-the-art solution to ARR query; that is, (a) It has poor efficiency when the distribution of the query set is dispersive. (b) It has to process a large portion user data. To address these limitations, we develop a cluster-and-process method and a sophisticated indexing strategy. From the theoretical analysis of the results and experimental comparisons, we conclude that our proposals have superior performance.

  • Having an Insight into Malware Phylogeny: Building Persistent Phylogeny Tree of Families

    Jing LIU  Pei Dai XIE  Meng Zhu LIU  Yong Jun WANG  

     
    LETTER-Information Network

      Pubricized:
    2018/01/09
      Vol:
    E101-D No:4
      Page(s):
    1199-1202

    Malware phylogeny refers to inferring evolutionary relationships between instances of families. It has gained a lot of attention over the past several years, due to its efficiency in accelerating reverse engineering of new variants within families. Previous researches mainly focused on tree-based models. However, those approaches merely demonstrate lineage of families using dendrograms or directed trees with rough evolution information. In this paper, we propose a novel malware phylogeny construction method taking advantage of persistent phylogeny tree model, whose nodes correspond to input instances and edges represent the gain or lost of functional characters. It can not only depict directed ancestor-descendant relationships between malware instances, but also show concrete function inheritance and variation between ancestor and descendant, which is significant in variants defense. We evaluate our algorithm on three malware families and one benign family whose ground truth are known, and compare with competing algorithms. Experiments demonstrate that our method achieves a higher mean accuracy of 61.4%.

  • A Deep Learning-Based Approach to Non-Intrusive Objective Speech Intelligibility Estimation

    Deokgyu YUN  Hannah LEE  Seung Ho CHOI  

     
    LETTER-Speech and Hearing

      Pubricized:
    2018/01/09
      Vol:
    E101-D No:4
      Page(s):
    1207-1208

    This paper proposes a deep learning-based non-intrusive objective speech intelligibility estimation method based on recurrent neural network (RNN) with long short-term memory (LSTM) structure. Conventional non-intrusive estimation methods such as standard P.563 have poor estimation performance and lack of consistency, especially, in various noise and reverberation environments. The proposed method trains the LSTM RNN model parameters by utilizing the STOI that is the standard intrusive intelligibility estimation method with reference speech signal. The input and output of the LSTM RNN are the MFCC vector and the frame-wise STOI value, respectively. Experimental results show that the proposed objective intelligibility estimation method outperforms the conventional standard P.563 in various noisy and reverberant environments.

  • Detecting TV Program Highlight Scenes Using Twitter Data Classified by Twitter User Behavior and Evaluating It to Soccer Game TV Programs

    Tessai HAYAMA  

     
    PAPER-Datamining Technologies

      Pubricized:
    2018/01/19
      Vol:
    E101-D No:4
      Page(s):
    917-924

    This paper presents a novel TV event detection method for automatically generating TV program digests by using Twitter data. Previous studies of TV program digest generation based on Twitter data have developed TV event detection methods that analyze the frequency time series of tweets that users made while watching a given TV program; however, in most of the previous studies, differences in how Twitter is used, e.g., sharing information versus conversing, have not been taken into consideration. Since these different types of Twitter data are lumped together into one category, it is difficult to detect highlight scenes of TV programs and correctly extract their content from the Twitter data. Therefore, this paper presents a highlight scene detection method to automatically generate TV program digests for TV programs based on Twitter data classified by Twitter user behavior. To confirm the effectiveness of the proposed method, experiments using 49 soccer game TV programs were conducted.

  • Broadband Sleeve Dipole Antenna with Consistent Gain in the Horizontal Direction

    Takatsugu FUKUSHIMA  Naobumi MICHISHITA  Hisashi MORISHITA  Naoya FUJIMOTO  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/10/06
      Vol:
    E101-B No:4
      Page(s):
    1061-1068

    This paper improves radiation patterns and impedance matching of a broadband sleeve dipole antenna. A broadband sleeve dipole antenna is designed and the effect of the structure parameters on the |S11| characteristics is calculated. Current distributions of the resonance frequencies are calculated. A broadband sleeve dipole antenna with plate element is proposed. Better impedance matching is obtained by adjusting the size of the plate element. The nulls of the radiation patterns are reduced at high frequencies and the gain in the horizontal direction is improved.

  • Cyber-Physical Hybrid Environment Using a Largescale Discussion System Enhances Audiences' Participation and Satisfaction in the Panel Discussion

    Satoshi KAWASE  Takayuki ITO  Takanobu OTSUKA  Akihisa SENGOKU  Shun SHIRAMATSU  Tokuro MATSUO  Tetsuya OISHI  Rieko FUJITA  Naoki FUKUTA  Katsuhide FUJITA  

     
    PAPER-Creativity Support Systems and Decision Support Systems

      Pubricized:
    2018/01/19
      Vol:
    E101-D No:4
      Page(s):
    847-855

    Performance based on multi-party discussion has been reported to be superior to that based on individuals. However, it is impossible that all participants simultaneously express opinions due to the time and space limitations in a large-scale discussion. In particular, only a few representative discussants and audiences can speak in conventional unidirectional discussions (e.g., panel discussion), although many participants gather for the discussion. To solve these problems, in this study, we proposed a cyber-physical discussion using “COLLAGREE,” which we developed for building consensus of large-scale online discussions. COLLAGREE is equipped with functions such as a facilitator, point ranking system, and display of discussion in tree structure. We focused on the relationship between satisfaction with the discussion and participants' desire to express opinions. We conducted the experiment in the panel discussion of an actual international conference. Participants who were audiences in the floor used COLLAGREE during the panel discussion. They responded to questionnaires after the experiment. The main findings are as follows: (1) Participation in online discussion was associated with the satisfaction of the participants; (2) Participants who desired to positively express opinions joined the cyber-space discussion; and (3) The satisfaction of participants who expressed opinions in the cyber-space discussion was higher than those of participants who expressed opinions in the real-space discussion and those who did not express opinions in both the cyber- and real-space discussions. Overall, active behaviors in the cyber-space discussion were associated with participants' satisfaction with the entire discussion, suggesting that cyberspace provided useful alternative opportunities to express opinions for audiences who used to listen to conventional unidirectional discussions passively. In addition, a complementary relationship exists between participation in the cyber-space and real-space discussions. These findings can serve to create a user-friendly discussion environment.

  • Visual Analysis of Geometry Constrained Large-Scale Network

    Zhonghua YAO  Lingda WU  Yang SUN  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2017/10/17
      Vol:
    E101-B No:4
      Page(s):
    1000-1009

    Due to the structure complexity, it is difficult to display structure of large-scale network fully. To solve the problem, this paper research on network simplification and accelerating drawing. Specific research content includes accelerated network layout based on quadtree and community geometric constrain, aiming to provide overall situation perception of network topology. Experiment results show that this method can quickly visualize complex structure of large-scale network, and present overall situation and structural characteristics of the network by clear and understandable visual expression, and contribute to mining and awareness of network connection mode and structural characteristics.

  • On Implementing an Automatic Headline Generation for Discussion BBS Systems —Cases of Citizens' Deliberations for Communities—

    Katsuhide FUJITA  Ryosuke WATANABE  

     
    PAPER-Creativity Support Systems and Decision Support Systems

      Pubricized:
    2018/01/19
      Vol:
    E101-D No:4
      Page(s):
    865-873

    Recently, the opportunity to discuss topics on a variety of online discussion bulletin boards has been increasing. However, it can be difficult to understand the contents of each discussion as the number of posts increases. Therefore, it is important to generate headlines that can automatically summarize each post in order to understand the contents of each discussion at a glance. In this paper, we propose a method to extract and generate post headlines for online discussion bulletin boards, automatically. We propose templates with multiple patterns to extract important sentences from the posts. In addition, we propose a method to generate headlines by matching the templates with the patterns. Then, we evaluate the effectiveness of our proposed method using questionnaires.

  • Nested Circular Array and Its Concentric Extension for Underdetermined Direction of Arrival Estimation

    Thomas BASIKOLO  Koichi ICHIGE  Hiroyuki ARAI  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2017/10/17
      Vol:
    E101-B No:4
      Page(s):
    1076-1084

    In this paper, a new array geometry is proposed which is capable of performing underdetermined Direction-Of-Arrival (DOA) estimation for the circular array configuration. DOA estimation is a classical problem and one of the most important techniques in array signal processing as it has applications in wireless and mobile communications, acoustics, and seismic sensing. We consider the problem of estimating DOAs in the case when we have more sources than the number of physical sensors where the resolution must be maintained. The proposed array geometry called Nested Sparse Circular Array (NSCA) is an extension of the two level nested linear array obtained by nesting two sub-circular arrays and one element is placed at the origin. In order to extend the array aperture, a Khatri-Rao (KR) approach is applied to the proposed NSCA which yields the virtual array structure. To utilize the increase in the degrees of freedom (DOFs) that this new array provides, a subspace based approach (MUSIC) for DOA estimation and l1-based optimization approach is extended to estimate DOAs using NSCA. Simulations show that better performance for underdetermined DOA estimation is achieved using the proposed array geometry.

  • An Interference Suppression for Transporting Radio Frequency Signals with 10 Gbps Optical On-Off Keying

    Yuya KANEKO  Takeshi HIGASHINO  Minoru OKADA  

     
    PAPER-Lasers, Quantum Electronics

      Vol:
    E101-C No:4
      Page(s):
    285-291

    This paper demonstrates the suppressing power of 10 Gbps On Off keyed signal using biased half-wave rectification. Authors have previously reported that radio frequency (RF) and optical on-off keying (OOK) signal can be simultaneously transmitted over the radio over fiber (RoF) link [1]. Since the optical OOK signal has much broader bandwidth compared to RF signal, it interferes with RF signal. Reference [1] experimentally shows that the optical OOK signal degrades the RF signal in terms of signal-to-noise power ratio (SNR) when 10 Gbps OOK and 1.9 GHz microwave are employed as baseband and RF, respectively. This paper proposes an interference suppression, and the proposal is subsequently used for detecting the RF signal. Experiments are conducted for the purpose of the proof-of-concept of the proposal. Finally numerical simulations are employed to show the performance enhancement in terms of error vector magnitude (EVM).

  • Investigative Report Writing Support System for Effective Knowledge Construction from the Web

    Hiroyuki MITSUHARA  Masami SHISHIBORI  Akihiro KASHIHARA  

     
    PAPER-Creativity Support Systems and Decision Support Systems

      Pubricized:
    2018/01/19
      Vol:
    E101-D No:4
      Page(s):
    874-883

    Investigative reports plagiarized from the web should be eliminated because such reports result in ineffective knowledge construction. In this study, we developed an investigative report writing support system for effective knowledge construction from the web. The proposed system attempts to prevent plagiarism by restricting copying and pasting information from web pages. With this system, students can verify information through web browsing, externalize their constructed knowledge as notes for report materials, write reports using these notes, and remove inadequacies in the report by reflection. A comparative experiment showed that the proposed system can potentially prevent web page plagiarism and make knowledge construction from the web more effective compared to a conventional report writing environment.

  • Capacity of Two-Way In-Band Full-Duplex Relaying with Imperfect Channel State Information

    Siye WANG  Mingyao WANG  Boyu JIA  Yonghua LI  Wenbo XU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/10/06
      Vol:
    E101-B No:4
      Page(s):
    1108-1115

    In this paper, we investigate the capacity performance of an in-band full-duplex (IBFD) amplify-and-forward two-way relay system under the effect of residual loop-back-interference (LBI). In a two-way IBFD relay system, two IBFD nodes exchange data with each other via an IBFD relay. Both two-way relaying and IBFD one-way relaying could double the spectrum efficiency theoretically. However, due to imperfect channel estimation, the performance of two-way relaying is degraded by self-interference at the receiver. Moreover, the performance of the IBFD relaying is deteriorated by LBI between the transmit antenna and the receive antenna of the node. Different from the IBFD one-way relay scenario, the IBFD two-way relay system will suffer from an extra level of LBI at the destination receiver. We derive accurate approximations of the average end-to-end capacities for both the IBFD and half-duplex modes. We evaluate the impact of the LBI and channel estimation errors on system performance. Monte Carlo simulations verify the validity of analytical results. It can be shown that with certain signal-to-noise ratio values and effective interference cancellation techniques, the IBFD transmission is preferable in terms of capacity. The IBFD two-way relaying is an attractive technique for practical applications.

  • Regularized Kernel Representation for Visual Tracking

    Jun WANG  Yuanyun WANG  Chengzhi DENG  Shengqian WANG  Yong QIN  

     
    PAPER-Digital Signal Processing

      Vol:
    E101-A No:4
      Page(s):
    668-677

    Developing a robust appearance model is a challenging task due to appearance variations of objects such as partial occlusion, illumination variation, rotation and background clutter. Existing tracking algorithms employ linear combinations of target templates to represent target appearances, which are not accurate enough to deal with appearance variations. The underlying relationship between target candidates and the target templates is highly nonlinear because of complicated appearance variations. To address this, this paper presents a regularized kernel representation for visual tracking. Namely, the feature vectors of target appearances are mapped into higher dimensional features, in which a target candidate is approximately represented by a nonlinear combination of target templates in a dimensional space. The kernel based appearance model takes advantage of considering the non-linear relationship and capturing the nonlinear similarity between target candidates and target templates. l2-regularization on coding coefficients makes the approximate solution of target representations more stable. Comprehensive experiments demonstrate the superior performances in comparison with state-of-the-art trackers.

  • Energy-Efficient Power Allocation with Rate Proportional Fairness Constraint in Non-Orthogonal Multiple Access Systems

    Zheng-qiang WANG  Chen-chen WEN  Zi-fu FAN  Xiao-yu WAN  

     
    LETTER-Communication Theory and Signals

      Vol:
    E101-A No:4
      Page(s):
    734-737

    In this letter, we consider the power allocation scheme with rate proportional fairness to maximize energy efficiency in the downlink the non-orthogonal multiple access (NOMA) systems. The optimization problem of energy efficiency is a non-convex optimization problem, and the fractional programming is used to transform the original problem into a series of optimization sub-problems. A two-layer iterative algorithm is proposed to solve these sub-problems, in which power allocation with the fixed energy efficiency is achieved in the inner layer, and the optimal energy efficiency of the system is obtained by the bisection method in the outer layer. Simulation results show the effectiveness of the proposed algorithm.

  • Sentiment Classification for Hotel Booking Review Based on Sentence Dependency Structure and Sub-Opinion Analysis

    Tran Sy BANG  Virach SORNLERTLAMVANICH  

     
    PAPER-Datamining Technologies

      Pubricized:
    2018/01/19
      Vol:
    E101-D No:4
      Page(s):
    909-916

    This paper presents a supervised method to classify a document at the sub-sentence level. Traditionally, sentiment analysis often classifies sentence polarity based on word features, syllable features, or N-gram features. A sentence, as a whole, may contain several phrases and words which carry their own specific sentiment. However, classifying a sentence based on phrases and words can sometimes be incoherent because they are ungrammatically formed. In order to overcome this problem, we need to arrange words and phrase in a dependency form to capture their semantic scope of sentiment. Thus, we transform a sentence into a dependency tree structure. A dependency tree is composed of subtrees, and each subtree allocates words and syllables in a grammatical order. Moreover, a sentence dependency tree structure can mitigate word sense ambiguity or solve the inherent polysemy of words by determining their word sense. In our experiment, we provide the details of the proposed subtree polarity classification for sub-opinion analysis. To conclude our discussion, we also elaborate on the effectiveness of the analysis result.

2741-2760hit(21534hit)