Rizal Setya PERDANA Yoshiteru ISHIDA
This study presents a formulation for generating context-aware natural language by machine from visual representation. Given an image sequence input, the visual storytelling task (VST) aims to generate a coherent, object-focused, and contextualized sentence story. Previous works in this domain faced a problem in modeling an architecture that works in temporal multi-modal data, which led to a low-quality output, such as low lexical diversity, monotonous sentences, and inaccurate context. This study introduces a further improvement, that is, an end-to-end architecture, called cross-modal contextualize attention, optimized to extract visual-temporal features and generate a plausible story. Visual object and non-visual concept features are encoded from the convolutional feature map, and object detection features are joined with language features. Three scenarios are defined in decoding language generation by incorporating weights from a pre-trained language generation model. Extensive experiments are conducted to confirm that the proposed model outperforms other models in terms of automatic metrics and manual human evaluation.
Fei ZHANG Peining ZHEN Dishan JING Xiaotang TANG Hai-Bao CHEN Jie YAN
Intrusion is one of major security issues of internet with the rapid growth in smart and Internet of Thing (IoT) devices, and it becomes important to detect attacks and set out alarm in IoT systems. In this paper, the support vector machine (SVM) and principal component analysis (PCA) based method is used to detect attacks in smart IoT systems. SVM with nonlinear scheme is used for intrusion classification and PCA is adopted for feature selection on the training and testing datasets. Experiments on the NSL-KDD dataset show that the test accuracy of the proposed method can reach 82.2% with 16 features selected from PCA for binary-classification which is almost the same as the result obtained with all the 41 features; and the test accuracy can achieve 78.3% with 29 features selected from PCA for multi-classification while 79.6% without feature selection. The Denial of Service (DoS) attack detection accuracy of the proposed method can achieve 8.8% improvement compared with existing artificial neural network based method.
Shohei KAMAMURA Yuhei HAYASHI Yuki MIYOSHI Takeaki NISHIOKA Chiharu MORIOKA Hiroyuki OHNISHI
This paper proposes a fast and scalable traffic monitoring system called Fast xFlow Proxy. For efficiently provisioning and operating networks, xFlow such as IPFIX and NetFlow is a promising technology for visualizing the detailed traffic matrix in a network. However, internet protocol (IP) packets in a large carrier network are encapsulated with various outer headers, e.g., layer 2 tunneling protocol (L2TP) or multi-protocol label switching (MPLS) labels. As native xFlow technologies are applied to the outer header, the desired inner information cannot be visualized. From this motivation, we propose Fast xFlow Proxy, which explores the complicated carrier's packet, extracts inner information properly, and relays the inner information to a general flow collector. Fast xFlow Proxy should be able to handle various packet processing operations possible (e.g., header analysis, header elimination, and statistics) at a wire rate. To realize the processing speed needed, we implement Fast xFlow Proxy using the data plane development kit (DPDK) and field-programmable gate array (FPGA). By optimizing deployment of processes between DPDK and FPGA, Fast xFlow Proxy achieves wire rate processing. From evaluations, we can achieve over 20 Gbps performance by using a single server and 100 Gbps performance by using scale-out architecture. We also show that this performance is sufficiently practical for monitoring a nationwide carrier network.
Wassapon WATANAKEESUNTORN Keichi TAKAHASHI Chawanat NAKASAN Kohei ICHIKAWA Hajimu IIDA
OpenFlow is a widely adopted implementation of the Software-Defined Networking (SDN) architecture. Since conventional network monitoring systems are unable to cope with OpenFlow networks, researchers have developed various monitoring systems tailored for OpenFlow networks. However, these existing systems either rely on a specific controller framework or an API, both of which are not part of the OpenFlow specification, and thus limit their applicability. This article proposes a transparent and low-overhead monitoring system for OpenFlow networks, referred to as Opimon. Opimon monitors the network topology, switch statistics, and flow tables in an OpenFlow network and visualizes the result through a web interface in real-time. Opimon monitors a network by interposing a proxy between the controller and switches and intercepting every OpenFlow message exchanged. This design allows Opimon to be compatible with any OpenFlow switch or controller. We tested the functionalities of Opimon on a virtual network built using Mininet and a large-scale international OpenFlow testbed (PRAGMA-ENT). Furthermore, we measured the performance overhead incurred by Opimon and demonstrated that the overhead in terms of latency and throughput was less than 3% and 5%, respectively.
Tomoyuki FURUICHI Mizuki MOTOYOSHI Suguru KAMEDA Takashi SHIBA Noriharu SUEMATSU
To reduce the complexity of direct radio frequency (RF) undersampling real-time spectrum monitoring in wireless Internet of Things (IoT) bands (920MHz, 2.4GHz, and 5 GHz bands), a design method of sampling frequencies is proposed in this paper. The Direct RF Undersampling receiver architecture enables the use of ADC with sampling clock lower frequency than receiving RF signal, but it needs RF signal identification signal processing from folded spectrums with multiple sampling clock frequencies. The proposed design method allows fewer sampling frequencies to be used than the conventional design method for continuous frequency range (D.C. to 5GHz-band). The proposed method reduced 2 sampling frequencies in wireless IoT bands case compared with the continuous range. The design result using the proposed method is verified by measurement.
Hideki KAWAGUCHI Takumi MURAMATSU Masahiro KATOH Masahito HOSAKA Yoshifumi TAKASHIMA
To achieve smooth beam injection in operation of synchrotron radiation facilities, pulsed multipole magnet beam injectors are developed. It is found that the developed beam injector causes serious disturbance in the circulating storage beam in the Aichi synchrotron radiation center, and that such the unexpected disturbance of the storage beam may be caused by eddy current induced on thin titanium coating inside a beam duct. In this work, the induced eddy current on the titanium layer is evaluated quantitatively by numerical simulations and improvement for the developed beam injector is discussed based on the numerical simulation.
The spectral envelope parameter is a significant speech parameter in the vocoder's quality. Recently, the Vector Quantized Variational AutoEncoder (VQ-VAE) is a state-of-the-art end-to-end quantization method based on the deep learning model. This paper proposed a new technique for improving the embedding space learning of VQ-VAE with the Generative Adversarial Network for quantizing the spectral envelope parameter, called VQ-VAE-EMGAN. In experiments, we designed the quantizer for the spectral envelope parameters of the WORLD vocoder extracted from the 16kHz speech waveform. As the results shown, the proposed technique reduced the Log Spectral Distortion (LSD) around 0.5dB and increased the PESQ by around 0.17 on average for four target bit operations compared to the conventional VQ-VAE.
Nur Syafiera Azreen NORODIN Kousuke NAKAMURA Masashi HOTTA
To realize a stable and efficient wireless power transfer (WPT) system that can be used in any environment, it is necessary to inspect the influence of environmental interference along the power transmission path of the WPT system. In this paper, attempts have been made to reduce the influence of the medium with a dielectric and conductive loss on the WPT system using spiral resonators for resonator-coupled type wireless power transfer (RC-WPT) system. An important element of the RC-WPT system is the resonators because they improve resonant characteristics by changing the shape or combination of spiral resonators to confine the electric field that mainly causes electrical loss in the system as much as possible inside the resonator. We proposed a novel dual-spiral resonator as a candidate and compared the basic characteristics of the RC-WPT system with conventional single-spiral and dual-spiral resonators. The parametric values of the spiral resonators, such as the quality factors and the coupling coefficients between resonators with and without a lossy medium in the power transmission path, were examined. For the lossy mediums, pure water or tap water filled with acryl bases was used. The maximum transmission efficiency of the RC-WPT system was then observed by tuning the matching condition of the system. Following that, the transmission efficiency of the system with and without lossy medium was investigated. These inspections revealed that the performance of the RC-WPT system with the lossy medium using the modified shape spiral resonator, which is the dual-spiral resonator proposed in our laboratory, outperformed the system using the conventional single-spiral resonator.
Shota SAITO Toshiyasu MATSUSHIMA
This letter investigates the information-theoretic privacy-utility tradeoff. We analyze the minimum information leakage (f-leakage) under the utility constraint that the excess distortion probability is allowed up to ε∈[0, 1). The derived upper bound is characterized by the ε-cutoff random transformation and a distortion ball.
Toru NAKANISHI Hiromi YOSHINO Tomoki MURAKAMI Guru-Vamsi POLICHARLA
To prove the graph relations such as the connectivity and isolation for a certified graph, a system of a graph signature and proofs has been proposed. In this system, an issuer generates a signature certifying the topology of an undirected graph, and issues the signature to a prover. The prover can prove the knowledge of the signature and the graph in the zero-knowledge, i.e., the signature and the signed graph are hidden. In addition, the prover can prove relations on the certified graph such as the connectivity and isolation between two vertexes. In the previous system, using integer commitments on RSA modulus, the graph relations are proved. However, the RSA modulus needs a longer size for each element. Furthermore, the proof size and verification cost depend on the total numbers of vertexes and edges. In this paper, we propose a graph signature and proof system, where these are computed on bilinear groups without the RSA modulus. Moreover, using a bilinear map accumulator, the prover can prove the connectivity and isolation on a graph, where the proof size and verification cost become independent from the total numbers of vertexes and edges.
Kwon Kham SAI Giovanni VIGLIETTA Ryuhei UEHARA
We study a new reconfiguration problem inspired by classic mechanical puzzles: a colored token is placed on each vertex of a given graph; we are also given a set of distinguished cycles on the graph. We are tasked with rearranging the tokens from a given initial configuration to a final one by using cyclic shift operations along the distinguished cycles. We call this a cyclic shift puzzle. We first investigate a large class of graphs, which generalizes several classic cyclic shift puzzles, and we give a characterization of which final configurations can be reached from a given initial configuration. Our proofs are constructive, and yield efficient methods for shifting tokens to reach the desired configurations. On the other hand, when the goal is to find a shortest sequence of shifting operations, we show that the problem is NP-hard, even for puzzles with tokens of only two different colors.
Hiroshi FUJIWARA Yuichi SHIRAI Hiroaki YAMAMOTO
The construction of a Huffman code can be understood as the problem of finding a full binary tree such that each leaf is associated with a linear function of the depth of the leaf and the sum of the function values is minimized. Fujiwara and Jacobs extended this to a general function and proved the extended problem to be NP-hard. The authors also showed the case where the functions associated with leaves are each non-decreasing and convex is solvable in polynomial time. However, the complexity of the case of non-decreasing non-convex functions remains unknown. In this paper we try to reveal the complexity by considering non-decreasing non-convex functions each of which takes the smaller value of either a linear function or a constant. As a result, we provide a polynomial-time algorithm for two subclasses of such functions.
Pedestrian detection is a significant task in computer vision. In recent years, it is widely used in applications such as intelligent surveillance systems and automated driving systems. Although it has been exhaustively studied in the last decade, the occlusion handling issue still remains unsolved. One convincing idea is to first detect human body parts, and then utilize the parts information to estimate the pedestrians' existence. Many parts-based pedestrian detection approaches have been proposed based on this idea. However, in most of these approaches, the low-quality parts mining and the clumsy part detector combination is a bottleneck that limits the detection performance. To eliminate the bottleneck, we propose Discriminative Part CNN (DP-CNN). Our approach has two main contributions: (1) We propose a high-quality body parts mining method based on both convolutional layer features and body part subclasses. The mined part clusters are not only discriminative but also representative, and can help to construct powerful pedestrian detectors. (2) We propose a novel method to combine multiple part detectors. We convert the part detectors to a middle layer of a CNN and optimize the whole detection pipeline by fine-tuning that CNN. In experiments, it shows astonishing effectiveness of optimization and robustness of occlusion handling.
Thanh Binh NGUYEN Naobumi MICHISHITA Hisashi MORISHITA Teruki MIYAZAKI Masato TADOKORO
We developed a mantle-cloak antenna by controlling the surface reactance of a dielectric-loaded dipole antenna. First, a mantle-cloak antenna with an assumed ideal metasurface sheet was designed, and band rejection characteristics were obtained by controlling the surface reactance of the mantle cloak. The variable range of the frequency spacing between the operating and stopband frequencies of the antenna was clarified by changing the value of the surface reactance. Next, a mantle-cloak antenna that uses vertical strip conductors was designed to clarify the characteristics and operating principle of the antenna. It was confirmed that the stopband frequency was 1130MHz, and the proposed antenna had a 36.3% bandwidth (|S11| ≤ -10dB) from 700 to 1010MHz. By comparing the |S11| characteristics and the input impedance characteristics of the proposed antenna with those of the dielectric-loaded antenna, the effect of the mantle cloak was confirmed. Finally, a prototype of the mantle-cloak antenna that uses vertical strip conductors was developed and measured to validate the simulation results. The measurement results were consistent with the simulation results.
Eunsam KIM Jinsung KIM Hyoseop SHIN
This paper presents a novel cooperative recording scheme in networked PVRs based on P2P networks to increase storage efficiency compared with when PVRs operate independently of each other, while maintaining program availability to a similar degree. We employ an erasure coding technique to guarantee data availability of recorded programs in P2P networks. We determine the data redundancy degree of recorded programs so that the system can support all the concurrent streaming requests for them and maintain as much availability as needed. We also present how to assign recording tasks to PVRs and playback the recorded programs without performance degradation. We show that our proposed scheme improves the storage efficiency significantly, compared with when PVRs do not cooperate with each other, while keeping the playbackability of each request similarly.
Tatsumi KONISHI Hiroyuki NAKANO Yoshikazu YANO Michihiro AOKI
This letter proposes a transmission scheme called spatial vector (SV), which is effective for Nakagami-m fading multiple-input multiple-output channels. First, the analytical error rate of SV is derived for Nakagami-m fading MIMO channels. Next, an example of SV called integer SV (ISV) is introduced. The error performance was evaluated over Nakagami-m fading from m = 1 to m = 50 and compared with spatial modulation (SM), enhanced SM, and quadrature SM. The results show that for m > 1, ISV outperforms the SM schemes and is robust to m variations.
Ryunosuke NAGAYAMA Ryohei BANNO Kazuyuki SHUDO
In Bitcoin and Ethereum, nodes require a large storage capacity to maintain all of the blockchain data such as transactions. As of September 2021, the storage size of the Bitcoin blockchain has expanded to 355 GB, and it has increased by approximately 50 GB every year over the last five years. This storage requirement is a major hurdle to becoming a block proposer or validator. We propose an architecture called Trail that allows nodes to hold all blocks in a small storage and to generate and validate blocks and transactions. A node in Trail holds all blocks without transactions, UTXOs or account balances. The block size is approximately 8 kB, which is 100 times smaller than that of Bitcoin. On the other hand, a client who issues transactions needs to hold proof of its assets. Thus, compared to traditional blockchains, clients must store additional data. We show that proper data archiving can keep the account device storage size small. Then, we propose a method of executing smart contracts in Trail using a threshold signature. Trail allows more users to be block proposers and validators and improves the decentralization and security of the blockchain.
Junichi KINOSHITA Akira TAKAMORI Kazuhisa YAMAMOTO Kazuo KURODA Koji SUZUKI Keisuke HIEDA
Image resolution under the effect of color speckle was successfully measured for a raster-scan mobile projector, using the modified contrast modulation method. This method was based on the eye-diagram analysis for distinguishing the binary image signals, black-and-white line pairs. The image resolution and the related metrics, illuminance, chromaticity, and speckle contrast were measured at the nine regions on the full-frame area projected on a standard diffusive reflectance screen. The nonuniformity data over the nine regions were discussed and analyzed.
In this paper, we propose rate adaptation mechanisms for robust and low-latency video transmissions exploiting multiple access points (Multi-AP) wireless local area networks (WLANs). The Multi-AP video transmissions employ link-level broadcast and packet-level forward error correction (FEC) in order to realize robust and low-latency video transmissions from a WLAN station (STA) to a gateway (GW). The PHY (physical layer) rate and FEC rate play a key role to control trade-off between the achieved reliability and airtime (i.e., occupancy period of the shared channel) for Multi-AP WLANs. In order to finely control this trade-off while improving the transmitted video quality, the proposed rate adaptation controls PHY rate and FEC rate to be employed for Multi-AP transmissions based on the link quality and frame format of conveyed video traffic. With computer simulations, we evaluate and investigate the effectiveness of the proposed rate adaptation in terms of packet delivery rate (PDR), airtime, delay, and peak signal to noise ratio (PSNR). Furthermore, the quality of video is assessed by using the traffic encoded/decoded by the actual video encoder/decoder. All these results show that the proposed rate adaptation controls trade-off between the reliability and airtime well while offering the high-quality and low-latency video transmissions.
Machine learning, especially deep learning, is dramatically changing the methods associated with optical thin-film inverse design. The vast majority of this research has focused on the parameter optimization (layer thickness, and structure size) of optical thin-films. A challenging problem that arises is an automated material search. In this work, we propose a new end-to-end algorithm for optical thin-film inverse design. This method combines the ability of unsupervised learning, reinforcement learning and includes a genetic algorithm to design an optical thin-film without any human intervention. Furthermore, with several concrete examples, we have shown how one can use this technique to optimize the spectra of a multi-layer solar absorber device.