The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

901-920hit(22683hit)

  • Contextualized Language Generation on Visual-to-Language Storytelling

    Rizal Setya PERDANA  Yoshiteru ISHIDA  

     
    PAPER

      Pubricized:
    2022/01/17
      Vol:
    E105-D No:5
      Page(s):
    873-886

    This study presents a formulation for generating context-aware natural language by machine from visual representation. Given an image sequence input, the visual storytelling task (VST) aims to generate a coherent, object-focused, and contextualized sentence story. Previous works in this domain faced a problem in modeling an architecture that works in temporal multi-modal data, which led to a low-quality output, such as low lexical diversity, monotonous sentences, and inaccurate context. This study introduces a further improvement, that is, an end-to-end architecture, called cross-modal contextualize attention, optimized to extract visual-temporal features and generate a plausible story. Visual object and non-visual concept features are encoded from the convolutional feature map, and object detection features are joined with language features. Three scenarios are defined in decoding language generation by incorporating weights from a pre-trained language generation model. Extensive experiments are conducted to confirm that the proposed model outperforms other models in terms of automatic metrics and manual human evaluation.

  • A Performance Model for Reconfigurable Block Cipher Array Utilizing Amdahl's Law

    Tongzhou QU  Zibin DAI  Yanjiang LIU  Lin CHEN  Xianzhao XIA  

     
    PAPER-Computer System

      Pubricized:
    2022/02/17
      Vol:
    E105-D No:5
      Page(s):
    964-972

    The existing research on Amdahl's law is limited to multi/many-core processors, and cannot be applied to the important parallel processing architecture of coarse-grained reconfigurable arrays. This paper studies the relation between the multi-level parallelism of block cipher algorithms and the architectural characteristics of coarse-grain reconfigurable arrays. We introduce the key variables that affect the performance of reconfigurable arrays, such as communication overhead and configuration overhead, into Amdahl's law. On this basis, we propose a performance model for coarse-grain reconfigurable block cipher array (CGRBA) based on the extended Amdahl's law. In addition, this paper establishes the optimal integer nonlinear programming model, which can provide a parameter reference for the architecture design of CGRBA. The experimental results show that: (1) reducing the communication workload ratio and increasing the number of configuration pages reasonably can significantly improve the algorithm performance on CGRBA; (2) the communication workload ratio has a linear effect on the execution time.

  • SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature Selection

    Fei ZHANG  Peining ZHEN  Dishan JING  Xiaotang TANG  Hai-Bao CHEN  Jie YAN  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2022/02/14
      Vol:
    E105-D No:5
      Page(s):
    1024-1038

    Intrusion is one of major security issues of internet with the rapid growth in smart and Internet of Thing (IoT) devices, and it becomes important to detect attacks and set out alarm in IoT systems. In this paper, the support vector machine (SVM) and principal component analysis (PCA) based method is used to detect attacks in smart IoT systems. SVM with nonlinear scheme is used for intrusion classification and PCA is adopted for feature selection on the training and testing datasets. Experiments on the NSL-KDD dataset show that the test accuracy of the proposed method can reach 82.2% with 16 features selected from PCA for binary-classification which is almost the same as the result obtained with all the 41 features; and the test accuracy can achieve 78.3% with 29 features selected from PCA for multi-classification while 79.6% without feature selection. The Denial of Service (DoS) attack detection accuracy of the proposed method can achieve 8.8% improvement compared with existing artificial neural network based method.

  • A Semantic-Based Dual Location Privacy-Preserving Approach

    Xudong YANG  Ling GAO  Yan LI  Jipeng XU  Jie ZHENG  Hai WANG  Quanli GAO  

     
    PAPER-Information Network

      Pubricized:
    2022/02/16
      Vol:
    E105-D No:5
      Page(s):
    982-995

    With the popularity and development of Location-Based Services (LBS), location privacy-preservation has become a hot research topic in recent years, especially research on k-anonymity. Although previous studies have done a lot of work on anonymity-based privacy protection, there are still several challenges far from being perfectly solved, such as the negative impact on the security of anonymity by the semantic information, which from anonymous locations and query content. To address these semantic challenges, we propose a dual privacy preservation scheme based on the architecture of multi-anonymizers in this paper. Different from existing approaches, our method enhanced location privacy by integrating location anonymity and the encrypted query. First, the query encryption method that combines improved shamir mechanism and multi-anonymizers is proposed to enhance query safety. Second, we design an anonymity method that enhances semantic location privacy through anonymous locations that satisfy personal semantic diversity and replace sensitive semantic locations. Finally, the experiment on the real dataset shows that our algorithms provide much better privacy and use than previous solutions.

  • Multi-Agent Reinforcement Learning for Cooperative Task Offloading in Distributed Edge Cloud Computing

    Shiyao DING  Donghui LIN  

     
    PAPER

      Pubricized:
    2021/12/28
      Vol:
    E105-D No:5
      Page(s):
    936-945

    Distributed edge cloud computing is an important computation infrastructure for Internet of Things (IoT) and its task offloading problem has attracted much attention recently. Most existing work on task offloading in distributed edge cloud computing usually assumes that each self-interested user owns one edge server and chooses whether to execute its tasks locally or to offload the tasks to cloud servers. The goal of each edge server is to maximize its own interest like low delay cost, which corresponds to a non-cooperative setting. However, with the strong development of smart IoT communities such as smart hospital and smart factory, all edge and cloud servers can belong to one organization like a technology company. This corresponds to a cooperative setting where the goal of the organization is to maximize the team interest in the overall edge cloud computing system. In this paper, we consider a new problem called cooperative task offloading where all edge servers try to cooperate to make the entire edge cloud computing system achieve good performance such as low delay cost and low energy cost. However, this problem is hard to solve due to two issues: 1) each edge server status dynamically changes and task arrival is uncertain; 2) each edge server can observe only its own status, which makes it hard to optimize team interest as global information is unavailable. For solving these issues, we formulate the problem as a decentralized partially observable Markov decision process (Dec-POMDP) which can well handle the dynamic features under partial observations. Then, we apply a multi-agent reinforcement learning algorithm called value decomposition network (VDN) and propose a VDN-based task offloading algorithm (VDN-TO) to solve the problem. Specifically, the motivation is that we use a team value function to evaluate the team interest, which is then divided into individual value functions for each edge server. Then, each edge server updates its individual value function in the direction that can maximize the team interest. Finally, we choose a part of a real dataset to evaluate our algorithm and the results show the effectiveness of our algorithm in a comparison with some other existing methods.

  • Performance Evaluation of Bluetooth Low Energy Positioning Systems When Using Sparse Training Data

    Tetsuya MANABE  Kosuke OMURA  

     
    PAPER

      Pubricized:
    2021/11/01
      Vol:
    E105-A No:5
      Page(s):
    778-786

    This paper evaluates the bluetooth low energy (BLE) positioning systems using the sparse-training data through the comparison experiments. The sparse-training data is extracted from the database including enough data for realizing the highly accurate and precise positioning. First, we define the sparse-training data, i.e., the data collection time and the number of smartphones, directions, beacons, and reference points, on BLE positioning systems. Next, the positioning performance evaluation experiments are conducted in two indoor environments, that is, an indoor corridor as a one-dimensionally spread environment and a hall as a twodimensionally spread environment. The algorithms for comparison are the conventional fingerprint algorithm and the hybrid algorithm (the authors already proposed, and combined the proximity algorithm and the fingerprint algorithm). Based on the results, we confirm that the hybrid algorithm performs well in many cases even when using sparse-training data. Consequently, the robustness of the hybrid algorithm, that the authors already proposed for the sparse-training data, is shown.

  • Fully Connected Imaging Network for Near-Field Synthetic Aperture Interferometric Radiometer

    Zhimin GUO  Jianfei CHEN  Sheng ZHANG  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2022/02/09
      Vol:
    E105-D No:5
      Page(s):
    1120-1124

    Millimeter wave synthetic aperture interferometric radiometers (SAIR) are very powerful instruments, which can effectively realize high-precision imaging detection. However due to the existence of interference factor and complex near-field error, the imaging effect of near-field SAIR is usually not ideal. To achieve better imaging results, a new fully connected imaging network (FCIN) is proposed for near-field SAIR. In FCIN, the fully connected network is first used to reconstruct the image domain directly from the visibility function, and then the residual dense network is used for image denoising and enhancement. The simulation results show that the proposed FCIN method has high imaging accuracy and shorten imaging time.

  • Multi-Level Encrypted Transmission Scheme Using Hybrid Chaos and Linear Modulation Open Access

    Tomoki KAGA  Mamoru OKUMURA  Eiji OKAMOTO  Tetsuya YAMAMOTO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2021/10/25
      Vol:
    E105-B No:5
      Page(s):
    638-647

    In the fifth-generation mobile communications system (5G), it is critical to ensure wireless security as well as large-capacity and high-speed communication. To achieve this, a chaos modulation method as an encrypted and channel-coded modulation method in the physical layer is proposed. However, in the conventional chaos modulation method, the decoding complexity increases exponentially with respect to the modulation order. To solve this problem, in this study, a hybrid modulation method that applies quadrature amplitude modulation (QAM) and chaos to reduce the amount of decoding complexity, in which some transmission bits are allocated to QAM while maintaining the encryption for all bits is proposed. In the proposed method, a low-complexity decoding method is constructed by ordering chaos and QAM symbols based on the theory of index modulation. Numerical results show that the proposed method maintains good error-rate performance with reduced decoding complexity and ensures wireless security.

  • Simple Proof of the Lower Bound on the Average Distance from the Fermat-Weber Center of a Convex Body Open Access

    Xuehou TAN  

     
    PAPER-Numerical Analysis and Optimization

      Pubricized:
    2021/11/15
      Vol:
    E105-A No:5
      Page(s):
    853-857

    We show that for any convex body Q in the plane, the average distance from the Fermat-Weber center of Q to the points in Q is at least Δ(Q)/6, where Δ(Q) denotes the diameter of Q. Our proof is simple and straightforward, since it needs only elementary calculations. This simplifies a previously known proof that is based on Steiner symmetrizations.

  • Low-Complexity VBI-Based Channel Estimation for Massive MIMO Systems

    Chen JI  Shun WANG  Haijun FU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2021/11/11
      Vol:
    E105-B No:5
      Page(s):
    600-607

    This paper proposes a low-complexity variational Bayesian inference (VBI)-based method for massive multiple-input multiple-output (MIMO) downlink channel estimation. The temporal correlation at the mobile user side is jointly exploited to enhance the channel estimation performance. The key to the success of the proposed method is the column-independent factorization imposed in the VBI framework. Since we separate the Bayesian inference for each column vector of signal-of-interest, the computational complexity of the proposed method is significantly reduced. Moreover, the temporal correlation is automatically uncoupled to facilitate the updating rule derivation for the temporal correlation itself. Simulation results illustrate the substantial performance improvement achieved by the proposed method.

  • LMI-Based Design of Output Feedback Controllers with Decentralized Event-Triggering

    Koichi KITAMURA  Koichi KOBAYASHI  Yuh YAMASHITA  

     
    PAPER

      Pubricized:
    2021/09/15
      Vol:
    E105-A No:5
      Page(s):
    816-822

    In this paper, event-triggered control over a sensor network is studied as one of the control methods of cyber-physical systems. Event-triggered control is a method that communications occur only when the measured value is widely changed. In the proposed method, by solving an LMI (Linear Matrix Inequality) feasibility problem, an event-triggered output feedback controller such that the closed-loop system is asymptotically stable is derived. First, the problem formulation is given. Next, the control problem is reduced to an LMI feasibility problem. Finally, the proposed method is demonstrated by a numerical example.

  • Specification and Verification of Multitask Real-Time Systems Using the OTS/CafeOBJ Method

    Masaki NAKAMURA  Shuki HIGASHI  Kazutoshi SAKAKIBARA  Kazuhiro OGATA  

     
    PAPER

      Pubricized:
    2021/09/24
      Vol:
    E105-A No:5
      Page(s):
    823-832

    Because processes run concurrently in multitask systems, the size of the state space grows exponentially. Therefore, it is not straightforward to formally verify that such systems enjoy desired properties. Real-time constrains make the formal verification more challenging. In this paper, we propose the following to address the challenge: (1) a way to model multitask real-time systems as observational transition systems (OTSs), a kind of state transition systems, (2) a way to describe their specifications in CafeOBJ, an algebraic specification language, and (3) a way to verify that such systems enjoy desired properties based on such formal specifications by writing proof scores, proof plans, in CafeOBJ. As a case study, we model Fischer's protocol, a well-known real-time mutual exclusion protocol, as an OTS, describe its specification in CafeOBJ, and verify that the protocol enjoys the mutual exclusion property when an arbitrary number of processes participates in the protocol*.

  • Feature Selection and Parameter Optimization of Support Vector Machines Based on a Local Search Based Firefly Algorithm for Classification of Formulas in Traditional Chinese Medicine Open Access

    Wen SHI  Jianling LIU  Jingyu ZHANG  Yuran MEN  Hongwei CHEN  Deke WANG  Yang CAO  

     
    LETTER-Algorithms and Data Structures

      Pubricized:
    2021/11/16
      Vol:
    E105-A No:5
      Page(s):
    882-886

    Syndrome is a crucial principle of Traditional Chinese Medicine. Formula classification is an effective approach to discover herb combinations for the clinical treatment of syndromes. In this study, a local search based firefly algorithm (LSFA) for parameter optimization and feature selection of support vector machines (SVMs) for formula classification is proposed. Parameters C and γ of SVMs are optimized by LSFA. Meanwhile, the effectiveness of herbs in formula classification is adopted as a feature. LSFA searches for well-performing subsets of features to maximize classification accuracy. In LSFA, a local search of fireflies is developed to improve FA. Simulations demonstrate that the proposed LSFA-SVM algorithm outperforms other classification algorithms on different datasets. Parameters C and γ and the features are optimized by LSFA to obtain better classification performance. The performance of FA is enhanced by the proposed local search mechanism.

  • Characterization and Construction of Generalized Bent Functions with Flexible Coefficients

    Zhiyao YANG  Pinhui KE  Zhixiong CHEN  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2021/10/29
      Vol:
    E105-A No:5
      Page(s):
    887-891

    In 2017, Tang et al. provided a complete characterization of generalized bent functions from ℤ2n to ℤq(q = 2m) in terms of their component functions (IEEE Trans. Inf. Theory. vol.63, no.7, pp.4668-4674). In this letter, for a general even q, we aim to provide some characterizations and more constructions of generalized bent functions with flexible coefficients. Firstly, we present some sufficient conditions for a generalized Boolean function with at most three terms to be gbent. Based on these results, we give a positive answer to a remaining question proposed by Hodžić in 2015. We also prove that the sufficient conditions are also necessary in some special cases. However, these sufficient conditions whether they are also necessary, in general, is left as an open problem. Secondly, from a uniform point of view, we provide a secondary construction of gbent function, which includes several known constructions as special cases.

  • Markov-Chain Analysis Model based Active Period Adaptation Scheme for IEEE 802.15.4 Network

    Ryota HORIUCHI  Kohei TOMITA  Nobuyoshi KOMURO  

     
    PAPER

      Pubricized:
    2021/10/22
      Vol:
    E105-A No:5
      Page(s):
    770-777

    Energy efficiency is one of the critical issues for Wireless Sensor Networks (WSN). IEEE 802.15.4 beacon-enabled MAC protocol achieves low energy consumption by having periodical inactive portions, where nodes run in low power. However, IEEE 802.15.4 beacon-enabled protocol cannot respond to dynamic changes in the number of sensor nodes and data rates in WSN because its duty cycle is fixed and immutable. In this paper, we propose a dynamic superframe duration adaptation scheme based on the Markov chain-based analysis methods for IEEE 802.15.4 beacon-enabled protocol. The proposed methods are flexible enough to accommodate changes in the number of sensor nodes and differences in data rates in WSNs while maintaining low latency and low energy consumption despite slight degradation in packet delivery ratio.

  • Distributed Scheme for Unit Commitment Problem Using Constraint Programming and ADMM Open Access

    Yuta INOUE  Toshiyuki MIYAMOTO  

     
    INVITED PAPER

      Pubricized:
    2021/09/02
      Vol:
    E105-A No:5
      Page(s):
    788-798

    The unit commitment problem (UCP) is the problem of deciding up/down and generation-level patterns of energy production units. Due to the expansion of distributed energy resources and the liberalization of energy trading in recent years, solving the distributed UCP (DUCP) is attracting the attention of researchers. Once an up/down pattern is determined, the generation-level pattern can be decided distributively using the alternating direction method of multipliers (ADMM). However, ADMM does not guarantee convergence when deciding both up/down and generation-level patterns. In this paper, we propose a method to solve the DUCP using ADMM and constraint optimization programming. Numerical experiments show the efficacy of the proposed method.

  • Reliable Decentralized Supervisory Control of Discrete Event Systems with Single-Level Inference

    Shigemasa TAKAI  Sho YOSHIDA  

     
    PAPER

      Pubricized:
    2021/10/08
      Vol:
    E105-A No:5
      Page(s):
    799-807

    We consider a reliable decentralized supervisory control problem for discrete event systems in the inference-based framework. This problem requires us to synthesize local supervisors such that the controlled system achieves the specification and is nonblocking, even if local control decisions of some local supervisors are not available for making the global control decision. In the case of single-level inference, we introduce a notion of reliable 1-inference-observability and show that reliable 1-inference-observability together with controllability and Lm(G)-closedness is a necessary and sufficient condition for the existence of a solution to the reliable decentralized supervisory control problem.

  • A Routing Strategy with Optimizing Linear Programming in Hybrid SDN

    Chenhui WANG  Hong NI  Lei LIU  

     
    PAPER-Network

      Pubricized:
    2021/12/01
      Vol:
    E105-B No:5
      Page(s):
    569-579

    Software-defined networking (SDN) decouples the control and forwarding of network devices, providing benefits such as simplified control. However, due to cost constraints and other factors, SDN is difficult to fully deploy. It has been proposed that SDN devices can be incrementally deployed in a traditional IP network, i.e., hybrid SDN, to provide partial SDN benefits. Studies have shown that better traffic engineering performance can be achieved by modifying the coverage and placement of SDN devices in hybrid SDN, because they can influence the behavior of legacy switches through certain strategies. However, it is difficult to develop and execute a traffic engineering strategy in hybrid SDN. This article proposes a routing algorithm to achieve approximate load balancing, which minimizes the maximum link utilization by using the optimal solution of linear programming and merging the minimum split traffic flows. A multipath forwarding mechanism under the same problem is designed to optimize transmission time. Experiments show that our algorithm has certain advantages in link utilization and transmission time compared to traditional distributed routing algorithms like OSPF and some hybrid SDN routing mechanisms. Furthermore, our algorithm can approximate the control effect of full SDN when the deployment rate of SDN devices is 40%.

  • SDM4IIoT: An SDN-Based Multicast Algorithm for Industrial Internet of Things

    Hequn LI  Jiaxi LU  Jinfa WANG  Hai ZHAO  Jiuqiang XU  Xingchi CHEN  

     
    PAPER-Network

      Pubricized:
    2021/11/11
      Vol:
    E105-B No:5
      Page(s):
    545-556

    Real-time and scalable multicast services are of paramount importance to Industrial Internet of Things (IIoT) applications. To realize these services, the multicast algorithm should, on the one hand, ensure the maximum delay of a multicast session not exceeding its upper delay bound. On the other hand, the algorithm should minimize session costs. As an emerging networking paradigm, Software-defined Networking (SDN) can provide a global view of the network to multicast algorithms, thereby bringing new opportunities for realizing the desired multicast services in IIoT environments. Unfortunately, existing SDN-based multicast (SDM) algorithms cannot meet the real-time and scalable requirements simultaneously. Therefore, in this paper, we focus on SDM algorithm design for IIoT environments. To be specific, the paper first converts the multicast tree construction problem for SDM in IIoT environments into a delay-bounded least-cost shared tree problem and proves that it is an NP-complete problem. Then, the paper puts forward a shared tree (ST) algorithm called SDM4IIoT to compute suboptimal solutions to the problem. The algorithm consists of five steps: 1) construct a delay-optimal shared tree; 2) divide the tree into a set of subpaths and a subtree; 3) optimize the cost of each subpath by relaxing the delay constraint; 4) optimize the subtree cost in the same manner; 5) recombine them into a shared tree. Simulation results show that the algorithm can provide real-time support that other ST algorithms cannot. In addition, it can achieve good scalability. Its cost is only 20.56% higher than the cost-optimal ST algorithm. Furthermore, its computation time is also acceptable. The algorithm can help to realize real-time and scalable multicast services for IIoT applications.

  • Performance Evaluation of Classification and Verification with Quadrant IQ Transition Image

    Hiro TAMURA  Kiyoshi YANAGISAWA  Atsushi SHIRANE  Kenichi OKADA  

     
    PAPER-Network Management/Operation

      Pubricized:
    2021/12/01
      Vol:
    E105-B No:5
      Page(s):
    580-587

    This paper presents a physical layer wireless device identification method that uses a convolutional neural network (CNN) operating on a quadrant IQ transition image. This work introduces classification and detection tasks in one process. The proposed method can identify IoT wireless devices by exploiting their RF fingerprints, a technology to identify wireless devices by using unique variations in analog signals. We propose a quadrant IQ image technique to reduce the size of CNN while maintaining accuracy. The CNN utilizes the IQ transition image, which image processing cut out into four-part. An over-the-air experiment is performed on six Zigbee wireless devices to confirm the proposed identification method's validity. The measurement results demonstrate that the proposed method can achieve 99% accuracy with the light-weight CNN model with 36,500 weight parameters in serial use and 146,000 in parallel use. Furthermore, the proposed threshold algorithm can verify the authenticity using one classifier and achieved 80% accuracy for further secured wireless communication. This work also introduces the identification of expanded signals with SNR between 10 to 30dB. As a result, at SNR values above 20dB, the proposals achieve classification and detection accuracies of 87% and 80%, respectively.

901-920hit(22683hit)