The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

2721-2740hit(22683hit)

  • Efficient Approach for Mitigating Mobile Phishing Attacks

    Hyungkyu LEE  Younho LEE  Changho SEO  Hyunsoo YOON  

     
    PAPER-Internet

      Pubricized:
    2018/03/23
      Vol:
    E101-B No:9
      Page(s):
    1982-1996

    We propose a method for efficiently detecting phishing attacks in mobile environments. When a user visits a website of a certain URL, the proposed method first compares the URL to a generated whitelist. If the URL is not in the whitelist, it detects if the site is a phishing site based on the results of Google search with a carefully refined URL. In addition, the phishing detection is performed only when the user provides input to the website, thereby reducing the frequency of invoking phishing detection to decrease the amount of power used. We implemented the proposed method and used 8315 phishing sites and the same number of legitimate websites for evaluating the performance of the proposed method. We achieved a phishing detection rate of 99.22% with 81.22% reduction in energy consumption as compared to existing approaches that also use search engine for phishing detection. Moreover, because the proposed method does not employ any other algorithm, software, or comparison group, the proposed method can be easily deployed.

  • An Edge Detection Method Based on Wavelet Transform at Arbitrary Angles

    Su LIU  Xingguang GENG  Yitao ZHANG  Shaolong ZHANG  Jun ZHANG  Yanbin XIAO  Chengjun HUANG  Haiying ZHANG  

     
    PAPER-Biological Engineering

      Pubricized:
    2018/06/13
      Vol:
    E101-D No:9
      Page(s):
    2392-2400

    The quality of edge detection is related to detection angle, scale, and threshold. There have been many algorithms to promote edge detection quality by some rules about detection angles. However these algorithm did not form rules to detect edges at an arbitrary angle, therefore they just used different number of angles and did not indicate optimized number of angles. In this paper, a novel edge detection algorithm is proposed to detect edges at arbitrary angles and optimized number of angles in the algorithm is introduced. The algorithm combines singularity detection with Gaussian wavelet transform and edge detection at arbitrary directions and contain five steps: 1) An image is divided into some pixel lines at certain angle in the range from 45° to 90° according to decomposition rules of this paper. 2) Singularities of pixel lines are detected and form an edge image at the certain angle. 3) Many edge images at different angles form a final edge images. 4) Detection angles in the range from 45° to 90° are extended to range from 0° to 360°. 5) Optimized number of angles for the algorithm is proposed. Then the algorithm with optimized number of angles shows better performances.

  • Evaluating Energy-Efficiency of DRAM Channel Interleaving Schemes for Multithreaded Programs

    Satoshi IMAMURA  Yuichiro YASUI  Koji INOUE  Takatsugu ONO  Hiroshi SASAKI  Katsuki FUJISAWA  

     
    PAPER-Computer System

      Pubricized:
    2018/06/08
      Vol:
    E101-D No:9
      Page(s):
    2247-2257

    The power consumption of server platforms has been increasing as the amount of hardware resources equipped on them is increased. Especially, the capacity of DRAM continues to grow, and it is not rare that DRAM consumes higher power than processors on modern servers. Therefore, a reduction in the DRAM energy consumption is a critical challenge to reduce the system-level energy consumption. Although it is well known that improving row buffer locality(RBL) and bank-level parallelism (BLP) is effective to reduce the DRAM energy consumption, our preliminary evaluation on a real server demonstrates that RBL is generally low across 15 multithreaded benchmarks. In this paper, we investigate the memory access patterns of these benchmarks using a simulator and observe that cache line-grained channel interleaving schemes, which are widely applied to modern servers including multiple memory channels, hurt the RBL each of the benchmarks potentially possesses. In order to address this problem, we focus on a row-grained channel interleaving scheme and compare it with three cache line-grained schemes. Our evaluation shows that it reduces the DRAM energy consumption by 16.7%, 12.3%, and 5.5% on average (up to 34.7%, 28.2%, and 12.0%) compared to the other schemes, respectively.

  • Fast Enumeration of All Pareto-Optimal Solutions for 0-1 Multi-Objective Knapsack Problems Using ZDDs

    Hirofumi SUZUKI  Shin-ichi MINATO  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1375-1382

    Finding Pareto-optimal solutions is a basic approach in multi-objective combinatorial optimization. In this paper, we focus on the 0-1 multi-objective knapsack problem, and present an algorithm to enumerate all its Pareto-optimal solutions, which improves upon the method proposed by Bazgan et al. Our algorithm is based on dynamic programming techniques using an efficient data structure called zero-suppressed binary decision diagram (ZDD), which handles a set of combinations compactly. In our algorithm, we utilize ZDDs for storing all the feasible solutions compactly, and pruning inessential partial solutions as quickly as possible. As an output of the algorithm, we can obtain a useful ZDD indexing all the Pareto-optimal solutions. The results of our experiments show that our algorithm is faster than the previous method for various types of three- and four-objective instances, which are difficult problems to solve.

  • Impact of Buffer Management Solutions on MAC Layer Performance in Wireless Sensor Networks

    Derviş AYGÖR  Shafqat Ur REHMAN  Fatih Vehbi ÇELEBİ  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2018/03/14
      Vol:
    E101-B No:9
      Page(s):
    2058-2068

    This paper is primarily concerned with the performance of Medium Access Control (MAC) layer plans for Wireless Sensor Networks (WSNs) in the context of buffer management solutions. We propose a novel buffer management solution that improves the general performance of MAC layer plans, in particular those crafted for WSNs. An analytical model is introduced in order to evaluate the cost of different buffer management solutions. The proposed buffer management solution, Single Queue Multi Priority (SQMP), is compared with well-known Single Queue Single Priority (SQSP) and Multi Queue Multi Priority (MQMP) buffer management solutions. All buffer management solutions are investigated in terms of throughput performance, utilization of the buffer and prioritization capabilities. Despite the relatively good performance of the different buffer management solutions in uncongested networks, the characteristic features of WSNs cause a degradation in the performance. In bursty conditions, SQMP controls and manages this degradation more effectively in comparison with the other two solutions. Simulations based on Omnet++ and Castalia confirm the performance improvements of our buffer management solution.

  • Trading-Off Computing and Cooling Energies by VM Migration in Data Centers

    Ying SONG  Xia ZHAO  Bo WANG  Yuzhong SUN  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2018/06/01
      Vol:
    E101-D No:9
      Page(s):
    2224-2234

    High energy cost is a big challenge faced by the current data centers, wherein computing energy and cooling energy are main contributors to such cost. Consolidating workload onto fewer servers decreases the computing energy. However, it may result in thermal hotspots which typically consume greater cooling energy. Thus the tradeoff between computing energy decreasing and cooling energy decreasing is necessary for energy saving. In this paper, we propose a minimized-total-energy virtual machine (VM for short) migration model called C2vmMap based on efficient tradeoff between computing and cooling energies, with respect to two relationships: one for between the resource utilization and computing power and the other for among the resource utilization, the inlet and outlet temperatures of servers, and the cooling power. Regarding online resolution of the above model for better scalability, we propose a VM migration algorithm called C2vmMap_heur to decrease the total energy of a data center at run-time. We evaluate C2vmMap_heur under various workload scenarios. The real server experimental results show that C2vmMap_heur reduces up to 40.43% energy compared with the non-migration load balance algorithm. This algorithm saves up to 3x energy compared with the existing VM migration algorithm.

  • Hardware Architecture for High-Speed Object Detection Using Decision Tree Ensemble

    Koichi MITSUNARI  Jaehoon YU  Takao ONOYE  Masanori HASHIMOTO  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1298-1307

    Visual object detection on embedded systems involves a multi-objective optimization problem in the presence of trade-offs between power consumption, processing performance, and detection accuracy. For a new Pareto solution with high processing performance and low power consumption, this paper proposes a hardware architecture for decision tree ensemble using multiple channels of features. For efficient detection, the proposed architecture utilizes the dimensionality of feature channels in addition to parallelism in image space and adopts task scheduling to attain random memory access without conflict. Evaluation results show that an FPGA implementation of the proposed architecture with an aggregated channel features pedestrian detector can process 229 million samples per second at 100MHz operation frequency while it requires a relatively small amount of resources. Consequently, the proposed architecture achieves 350fps processing performance for 1080P Full HD images and outperforms conventional object detection hardware architectures developed for embedded systems.

  • Energy Efficient Resource Allocation for Downlink Cooperative Non-Orthogonal Multiple Access Systems

    Zi-fu FAN  Qu CHENG  Zheng-qiang WANG  Xian-hui MENG  Xiao-yu WAN  

     
    LETTER-Communication Theory and Signals

      Vol:
    E101-A No:9
      Page(s):
    1603-1607

    In this letter, we study the resource allocation for the downlink cooperative non-orthogonal multiple access (NOMA) systems based on the amplifying-and-forward protocol relay transmission. A joint power allocation and amplification gain selection scheme are proposed. Fractional programming and the iterative algorithm based on the Lagrangian multiplier are used to allocate the transmit power to maximize the energy efficiency (EE) of the systems. Simulation results show that the proposed scheme can achieve higher energy efficiency compared with the minimum power transmission (MPT-NOMA) scheme and the conventional OMA scheme.

  • Modified Generalized Sidelobe Canceller for Nonuniform Linear Array Radar Space-Time Adaptive Processing

    Xiang ZHAO  Zishu HE  Yikai WANG  Yuan JIANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E101-A No:9
      Page(s):
    1585-1587

    This letter addresses the problem of space-time adaptive processing (STAP) for airborne nonuniform linear array (NLA) radar using a generalized sidelobe canceller (GSC). Due to the difficulty of determining the spatial nulls for the NLAs, it is a problem to obtain a valid blocking matrix (BM) of the GSC directly. In order to solve this problem and improve the STAP performance, a BM modification method based on the modified Gram-Schmidt orthogonalization algorithm is proposed. The modified GSC processor can achieve the optimal STAP performance and as well a faster convergence rate than the orthogonal subspace projection method. Numerical simulations validate the effectiveness of the proposed methods.

  • Robust Index Code to Distribute Digital Images and Digital Contents Together

    Minsu KIM  Kunwoo LEE  Katsuhiko GONDOW  Jun-ichi IMURA  

     
    PAPER

      Pubricized:
    2018/06/20
      Vol:
    E101-D No:9
      Page(s):
    2179-2189

    The main purpose of Codemark is to distribute digital contents using offline media. Due to the main purpose of Codemark, Codemark cannot be used on digital images. It has high robustness on only printed images. This paper presents a new color code called Robust Index Code (RIC for short), which has high robustness on JPEG Compression and Resize targeting digital images. RIC embeds a remote database index to digital images so that users can reach to any digital contents. Experimental results, using our implemented RIC encoder and decoder, have shown high robustness on JPEG Comp. and Resize of the proposed codemark. The embedded database indexes can be extracted 100% on compressed images to 30%. In conclusion, it is able to store all the type of digital products by embedding indexes into digital images to access database, which means it makes a Superdistribution system with digital images realized. Therefore RIC has the potential for new Internet image services, since all the images encoded by RIC are possible to access original products anywhere.

  • On Searching Linear Transformations for the Register R of MICKEY-Family Ciphers

    Lin WANG  Ying GAO  Yu ZHOU  Xiaoni DU  

     
    LETTER

      Vol:
    E101-A No:9
      Page(s):
    1546-1547

    MICKEY-family ciphers are lightweight cryptographic primitives and include a register R determined by two related maximal-period linear transformations. Provided that primitivity is efficiently decided in finite fields, it is shown by quantitative analysis that potential parameters for R can be found in probabilistic polynomial time.

  • Joint Estimation of Frequency and DOA with Spatio-Temporal Sub-Nyquist Sampling Based on Spectrum Correction and Chinese Remainder Theorem

    Xiangdong HUANG  Mengkai YANG  Mingzhuo LIU  Lin YANG  Haipeng FU  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/03/14
      Vol:
    E101-B No:9
      Page(s):
    2007-2016

    This paper addresses joint estimation of the frequency and the direction-of-arrival (DOA), under the relaxed condition that both snapshots in the temporal domain and sensors in the spacial domain are sparsely spaced. Specifically, a novel coprime sparse array allowing a large range for interelement spacings is employed in the proposed joint scheme, which greatly alleviates the conventional array's half-wavelength constraint. Further, by incorporating small-sized DFT spectrum correction with the closed-form robust Chinese Remainder Theorem (CRT), both spectral aliasing and integer phase ambiguity caused by spatio-temporal under-sampling can be removed in an efficient way. As a result, these two parameters can be efficiently estimated by reusing the observation data collected in parallel at different undersampling rates, which remarkably improves the data utilization. Numerical results demonstrate that the proposed joint scheme is highly accurate.

  • Nash Equilibria in Combinatorial Auctions with Item Bidding and Subadditive Symmetric Valuations

    Hiroyuki UMEDA  Takao ASANO  

     
    PAPER

      Vol:
    E101-A No:9
      Page(s):
    1324-1333

    We discuss Nash equilibria in combinatorial auctions with item bidding. Specifically, we give a characterization for the existence of a Nash equilibrium in a combinatorial auction with item bidding when valuations by n bidders satisfy symmetric and subadditive properties. By this characterization, we can obtain an algorithm for deciding whether a Nash equilibrium exists in such a combinatorial auction.

  • Video Saliency Detection Using Spatiotemporal Cues

    Yu CHEN  Jing XIAO  Liuyi HU  Dan CHEN  Zhongyuan WANG  Dengshi LI  

     
    PAPER

      Pubricized:
    2018/06/20
      Vol:
    E101-D No:9
      Page(s):
    2201-2208

    Saliency detection for videos has been paid great attention and extensively studied in recent years. However, various visual scene with complicated motions leads to noticeable background noise and non-uniformly highlighting the foreground objects. In this paper, we proposed a video saliency detection model using spatio-temporal cues. In spatial domain, the location of foreground region is utilized as spatial cue to constrain the accumulation of contrast for background regions. In temporal domain, the spatial distribution of motion-similar regions is adopted as temporal cue to further suppress the background noise. Moreover, a backward matching based temporal prediction method is developed to adjust the temporal saliency according to its corresponding prediction from the previous frame, thus enforcing the consistency along time axis. The performance evaluation on several popular benchmark data sets validates that our approach outperforms existing state-of-the-arts.

  • Research on the Impedance Characteristic of a Two-Coil Wireless Power Transfer System

    Suqi LIU  Jianping TAN  Xue WEN  

     
    PAPER-Electronic Circuits

      Vol:
    E101-C No:9
      Page(s):
    711-717

    Wireless power transfer (WPT) via coupled magnetic resonances has more than ten years history of development. However, it appears frequency splitting phenomenon in the over-coupled region, thus, the output power of the two-coil WPT system achieves the maximum output power at the two splitting angular frequencies and not at the natural resonant angular frequency. By investigating the relationship between the impedances of the transmitter side and receiver side, we found that WPT system is a power superposition system, and the reasons were given to explaining how to appear the frequency splitting and impact on the maximum output power of the system in details. First, the circuit model was established and transfer characteristics of the two-coil WPT system were studied by utilizing circuit theories. Second, the mechanism of the power superposition of the WPT system was carefully researched. Third, the relationship between the impedances of the transmitter side and receiver side was obtained by investigating the impedance characteristics of a two-coil WPT system, and also the impact factors of the maximum output power of the system were obtained by using a power superposition mechanism. Finally, the experimental circuit was designed and experimental results are well consistent with the theoretical analysis.

  • Fast CU Termination Algorithm with AdaBoost Classifier in HEVC Encoder

    Yitong LIU  Wang TIAN  Yuchen LI  Hongwen YANG  

     
    LETTER

      Pubricized:
    2018/06/20
      Vol:
    E101-D No:9
      Page(s):
    2220-2223

    High Efficiency Video Coding (HEVC) has a better coding efficiency comparing with H.264/AVC. However, performance enhancement results in increased computational complexity which is mainly brought by the quadtree based coding tree unit (CTU). In this paper, an early termination algorithm based on AdaBoost classifier for coding unit (CU) is proposed to accelerate the process of searching the best partition for CTU. Experiment results indicate that our method can save 39% computational complexity on average at the cost of increasing Bjontegaard-Delta rate (BD-rate) by 0.18.

  • Cross-Validation-Based Association Rule Prioritization Metric for Software Defect Characterization

    Takashi WATANABE  Akito MONDEN  Zeynep YÜCEL  Yasutaka KAMEI  Shuji MORISAKI  

     
    PAPER-Software Engineering

      Pubricized:
    2018/06/13
      Vol:
    E101-D No:9
      Page(s):
    2269-2278

    Association rule mining discovers relationships among variables in a data set, representing them as rules. These are expected to often have predictive abilities, that is, to be able to predict future events, but commonly used rule interestingness measures, such as support and confidence, do not directly assess their predictive power. This paper proposes a cross-validation -based metric that quantifies the predictive power of such rules for characterizing software defects. The results of evaluation this metric experimentally using four open-source data sets (Mylyn, NetBeans, Apache Ant and jEdit) show that it can improve rule prioritization performance over conventional metrics (support, confidence and odds ratio) by 72.8% for Mylyn, 15.0% for NetBeans, 10.5% for Apache Ant and 0 for jEdit in terms of SumNormPre(100) precision criterion. This suggests that the proposed metric can provide better rule prioritization performance than conventional metrics and can at least provide similar performance even in the worst case.

  • Entity Ranking for Queries with Modifiers Based on Knowledge Bases and Web Search Results

    Wiradee IMRATTANATRAI  Makoto P. KATO  Katsumi TANAKA  Masatoshi YOSHIKAWA  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2018/06/18
      Vol:
    E101-D No:9
      Page(s):
    2279-2290

    This paper proposes methods of finding a ranked list of entities for a given query (e.g. “Kennin-ji”, “Tenryu-ji”, or “Kinkaku-ji” for the query “ancient zen buddhist temples in kyoto”) by leveraging different types of modifiers in the query through identifying corresponding properties (e.g. established date and location for the modifiers “ancient” and “kyoto”, respectively). While most major search engines provide the entity search functionality that returns a list of entities based on users' queries, entities are neither presented for a wide variety of search queries, nor in the order that users expect. To enhance the effectiveness of entity search, we propose two entity ranking methods. Our first proposed method is a Web-based entity ranking that directly finds relevant entities from Web search results returned in response to the query as a whole, and propagates the estimated relevance to the other entities. The second proposed method is a property-based entity ranking that ranks entities based on properties corresponding to modifiers in the query. To this end, we propose a novel property identification method that identifies a set of relevant properties based on a Support Vector Machine (SVM) using our seven criteria that are effective for different types of modifiers. The experimental results showed that our proposed property identification method could predict more relevant properties than using each of the criteria separately. Moreover, we achieved the best performance for returning a ranked list of relevant entities when using the combination of the Web-based and property-based entity ranking methods.

  • Formal Method for Security Analysis of Electronic Payment Protocols

    Yi LIU  Qingkun MENG  Xingtong LIU  Jian WANG  Lei ZHANG  Chaojing TANG  

     
    PAPER-Information Network

      Pubricized:
    2018/06/19
      Vol:
    E101-D No:9
      Page(s):
    2291-2297

    Electronic payment protocols provide secure service for electronic commerce transactions and protect private information from malicious entities in a network. Formal methods have been introduced to verify the security of electronic payment protocols; however, these methods concentrate on the accountability and fairness of the protocols, without considering the impact caused by timeliness. To make up for this deficiency, we present a formal method to analyze the security properties of electronic payment protocols, namely, accountability, fairness and timeliness. We add a concise time expression to an existing logical reasoning method to represent the event time and extend the time characteristics of the logical inference rules. Then, the Netbill protocol is analyzed with our formal method, and we find that the fairness of the protocol is not satisfied due to the timeliness problem. The results illustrate that our formal method can analyze the key properties of electronic payment protocols. Furthermore, it can be used to verify the time properties of other security protocols.

  • Pattern-Based Ontology Modeling and Reasoning for Emergency System

    Yue TAN  Wei LIU  Zhenyu YANG  Xiaoni DU  Zongtian LIU  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2018/06/05
      Vol:
    E101-D No:9
      Page(s):
    2323-2333

    Event-centered information integration is regarded as one of the most pressing issues in improving disaster emergency management. Ontology plays an increasingly important role in emergency information integration, and provides the possibility for emergency reasoning. However, the development of event ontology for disaster emergency is a laborious and difficult task due to the increasingly scale and complexity of emergencies. Ontology pattern is a modeling solution to solve the recurrent ontology design problem, which can improve the efficiency of ontology development by reusing patterns. By study on characteristics of numerous emergencies, this paper proposes a generic ontology pattern for emergency system modeling. Based on the emergency ontology pattern, a set of reasoning rules for emergency-evolution, emergency-solution and emergency-resource utilization reasoning were proposed to conduct emergency knowledge reasoning and q.

2721-2740hit(22683hit)