The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Y(22683hit)

1321-1340hit(22683hit)

  • Preliminary Performance Analysis of Distributed DNN Training with Relaxed Synchronization

    Koichi SHIRAHATA  Amir HADERBACHE  Naoto FUKUMOTO  Kohta NAKASHIMA  

     
    BRIEF PAPER

      Pubricized:
    2020/12/01
      Vol:
    E104-C No:6
      Page(s):
    257-260

    Scalability of distributed DNN training can be limited by slowdown of specific processes due to unexpected hardware failures. We propose a dynamic process exclusion technique so that training throughput is maximized. Our evaluation using 32 processes with ResNet-50 shows that our proposed technique reduces slowdown by 12.5% to 50% without accuracy loss through excluding the slow processes.

  • Evaluation of the Dynamic Characteristics of Microdroplets by Vibration

    Kosuke FUJISHIRO  Satomitsu IMAI  

     
    BRIEF PAPER

      Pubricized:
    2020/12/01
      Vol:
    E104-C No:6
      Page(s):
    210-212

    In fields such as medicine and chemistry, methods for transporting microdroplets are currently necessitated, which include the analysis of reagents, mixing, and separation. As microdroplets become finer, their movement becomes difficult to control as a result of surface tension. This has resulted in the use of an excessive amount of reagents. In this study, we evaluated the dynamic characteristics of microdroplets and the excitation force. Microdroplets were dropped onto a tilted glass substrate, and the displacement of the microdroplets was measured while changing the droplet amount, vibration frequency, and vibration direction. Moreover, the behavior of the droplet just before it started to move was observed, and the relationship between the displacement of the minute droplet and the vibration force was compared and examined.

  • The Analysis of Accommodation Response and Convergence Eye Movement When Viewing 8K Images

    Miho SHINOHARA  Reiko KOYAMA  Shinya MOCHIDUKI  Mitsuho YAMADA  

     
    LETTER

      Pubricized:
    2020/12/15
      Vol:
    E104-A No:6
      Page(s):
    902-906

    We paid attention the amount of change for each resolution by specifying the gaze position of images, and measured accommodation and convergence eye movement when watching high-resolution images. Change of convergence angle and accommodation were like the actual depth composition in the image when images were presented in the high-resolution.

  • Deep Clustering for Improved Inter-Cluster Separability and Intra-Cluster Homogeneity with Cohesive Loss

    Byeonghak KIM  Murray LOEW  David K. HAN  Hanseok KO  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/01/28
      Vol:
    E104-D No:5
      Page(s):
    776-780

    To date, many studies have employed clustering for the classification of unlabeled data. Deep separate clustering applies several deep learning models to conventional clustering algorithms to more clearly separate the distribution of the clusters. In this paper, we employ a convolutional autoencoder to learn the features of input images. Following this, k-means clustering is conducted using the encoded layer features learned by the convolutional autoencoder. A center loss function is then added to aggregate the data points into clusters to increase the intra-cluster homogeneity. Finally, we calculate and increase the inter-cluster separability. We combine all loss functions into a single global objective function. Our new deep clustering method surpasses the performance of existing clustering approaches when compared in experiments under the same conditions.

  • Light-YOLOv3: License Plate Detection in Multi-Vehicle Scenario

    Yuchao SUN  Qiao PENG  Dengyin ZHANG  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2021/02/22
      Vol:
    E104-D No:5
      Page(s):
    723-728

    With the development of the Internet of Vehicles, License plate detection technology is widely used, e.g., smart city and edge senor monitor. However, traditional license plate detection methods are based on the license plate edge detection, only suitable for limited situation, such as, wealthy light and favorable camera's angle. Fortunately, deep learning networks represented by YOLOv3 can solve the problem, relying on strict condition. Although YOLOv3 make it better to detect large targets, its low performance in detecting small targets and lack of the real-time interactively. Motivated by this, we present a faster and lightweight YOLOv3 model for multi-vehicle or under-illuminated images scenario. Generally, our model can serves as a guideline for optimizing neural network in multi-vehicle scenario.

  • A Throughput Drop Estimation Model for Concurrent Communications under Partially Overlapping Channels without Channel Bonding and Its Application to Channel Assignment in IEEE 802.11n WLAN

    Kwenga ISMAEL MUNENE  Nobuo FUNABIKI  Hendy BRIANTORO  Md. MAHBUBUR RAHMAN  Fatema AKHTER  Minoru KURIBAYASHI  Wen-Chung KAO  

     
    PAPER

      Pubricized:
    2021/02/16
      Vol:
    E104-D No:5
      Page(s):
    585-596

    Currently, the IEEE 802.11n wireless local-area network (WLAN) has been extensively deployed world-wide. For the efficient channel assignment to access-points (APs) from the limited number of partially overlapping channels (POCs) at 2.4GHz band, we have studied the throughput drop estimation model for concurrently communicating links using the channel bonding (CB). However, non-CB links should be used in dense WLANs, since the CB links often reduce the transmission capacity due to high interferences from other links. In this paper, we examine the throughput drop estimation model for concurrently communicating links without using the CB in 802.11n WLAN, and its application to the POC assignment to the APs. First, we verify the model accuracy through experiments in two network fields. The results show that the average error is 9.946% and 6.285% for the high and low interference case respectively. Then, we verify the effectiveness of the POC assignment to the APs using the model through simulations and experiments. The results show that the model improves the smallest throughput of a host by 22.195% and the total throughput of all the hosts by 22.196% on average in simulations for three large topologies, and the total throughput by 12.89% on average in experiments for two small topologies.

  • Non-Volatile Main Memory Emulator for Embedded Systems Employing Three NVMM Behaviour Models

    Yu OMORI  Keiji KIMURA  

     
    PAPER-Computer System

      Pubricized:
    2021/02/05
      Vol:
    E104-D No:5
      Page(s):
    697-708

    Emerging byte-addressable non-volatile memory devices attract much attention. A non-volatile main memory (NVMM) built on them enables larger memory size and lower power consumption than a traditional DRAM main memory. To fully utilize an NVMM, both software and hardware must be cooperatively optimized. Simultaneously, even focusing on a memory module, its micro architecture is still being developed though real non-volatile memory modules, such as Intel Optane DC persistent memory (DCPMM), have been on the market. Looking at existing NVMM evaluation environments, software simulators can evaluate various micro architectures with their long simulation time. Emulators can evaluate the whole system fast with less flexibility in their configuration than simulators. Thus, an NVMM emulator that can realize flexible and fast system evaluation still has an important role to explore the optimal system. In this paper, we introduce an NVMM emulator for embedded systems and explore a direction of optimization techniques for NVMMs by using it. It is implemented on an SoC-FPGA board employing three NVMM behaviour models: coarse-grain, fine-grain and DCPMM-based. The coarse and fine models enable NVMM performance evaluations based on extensions of traditional DRAM behaviour. The DCPMM-based model emulates the behaviour of a real DCPMM. Whole evaluation environment is also provided including Linux kernel modifications and several runtime functions. We first validate the developed emulator with an existing NVMM emulator, a cycle-accurate NVMM simulator and a real DCPMM. Then, the program behavior differences among three models are evaluated with SPEC CPU programs. As a result, the fine-grain model reveals the program execution time is affected by the frequency of NVMM memory requests rather than the cache hit ratio. Comparing with the fine-grain model and the coarse-grain model under the condition of the former's longer total write latency than the latter's, the former shows lower execution time for four of fourteen programs than the latter because of the bank-level parallelism and the row-buffer access locality exploited by the former model.

  • Single-Letter Characterizations for Information Erasure under Restriction on the Output Distribution

    Naruaki AMADA  Hideki YAGI  

     
    PAPER-Information Theory

      Pubricized:
    2020/11/09
      Vol:
    E104-A No:5
      Page(s):
    805-813

    In order to erase data including confidential information stored in storage devices, an unrelated and random sequence is usually overwritten, which prevents the data from being restored. The problem of minimizing the cost for information erasure when the amount of information leakage of the confidential information should be less than or equal to a constant asymptotically has been introduced by T. Matsuta and T. Uyematsu. Whereas the minimum cost for overwriting has been given for general sources, a single-letter characterization for stationary memoryless sources is not easily derived. In this paper, we give single-letter characterizations for stationary memoryless sources under two types of restrictions: one requires the output distribution of the encoder to be independent and identically distributed (i.i.d.) and the other requires it to be memoryless but not necessarily i.i.d. asymptotically. The characterizations indicate the relation among the amount of information leakage, the minimum cost for information erasure and the rate of the size of uniformly distributed sequences. The obtained results show that the minimum costs are different between these restrictions.

  • Topological Optimization Problem for a Network System with Separate Subsystems

    Yoshihiro MURASHIMA  Taishin NAKAMURA  Hisashi YAMAMOTO  Xiao XIAO  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Pubricized:
    2020/10/27
      Vol:
    E104-A No:5
      Page(s):
    797-804

    In a network topology design problem, it is important to analyze the reliability and construction cost of complex network systems. This paper addresses a topological optimization problem of minimizing the total cost of a network system with separate subsystems under a reliability constraint. To solve this problem, we develop three algorithms. The first algorithm finds an exact solution. The second one finds an exact solution, specialized for a system with identical subsystems. The third one is a heuristic algorithm, which finds an approximate solution when a network system has several identical subsystems. We also conduct numerical experiments and demonstrate the efficacy and efficiency of the developed algorithms.

  • Optimization of Hybrid Energy System Configuration for Marine Diesel Engine Open Access

    Guangmiao ZENG  Rongjie WANG  Ran HAN  

     
    PAPER-Algorithms and Data Structures

      Pubricized:
    2020/11/11
      Vol:
    E104-A No:5
      Page(s):
    786-796

    Because solar energy is intermittent and a ship's power-system load fluctuates and changes abruptly, in this work, the solar radiation parameters were adjusted according to the latitude and longitude of the ship and the change of the sea environment. An objective function was constructed that accounted for the cost and service life simultaneously to optimize the configuration of the marine diesel engine hybrid energy system. Finally, the improved artificial bee colony algorithm was used to optimize and obtain the optimal system configuration. The feasibility of the method was verified by ship navigation tests. This method exhibited better configuration performance optimization than the traditional methods.

  • A Modified Whale Optimization Algorithm for Pattern Synthesis of Linear Antenna Array

    Wentao FENG  Dexiu HU  

     
    LETTER-Numerical Analysis and Optimization

      Pubricized:
    2020/11/09
      Vol:
    E104-A No:5
      Page(s):
    818-822

    A modified whale optimization algorithm (MWOA) with dynamic leader selection mechanism and novel population updating procedure is introduced for pattern synthesis of linear antenna array. The current best solution is dynamic changed for each whale agent to overcome premature with local optima in iteration. A hybrid crossover operator is embedded in original algorithm to improve the convergence accuracy of solution. Moreover, the flow of population updating is optimized to balance the exploitation and exploration ability. The modified algorithm is tested on a 28 elements uniform linear antenna array to reduce its side lobe lever and null depth lever. The simulation results show that MWOA algorithm can improve the performance of WOA obviously compared with other algorithms.

  • ICN Performance Enhancing Proxies Intended to Mitigate Performance Degradation in Global Content Delivery

    Kazuaki UEDA  Atsushi TAGAMI  

     
    PAPER

      Pubricized:
    2021/02/22
      Vol:
    E104-D No:5
      Page(s):
    637-646

    A global content delivery plays an important role in the current Internet. Information-Centric Networking (ICN) is a future internet architecture which attempts to redesign the Internet with a focus on the content delivery. However, it has the potential performance degradation in the global content delivery. In this paper, we propose an ICN performance enhancing proxy (ICN-PEP) to mitigate this performance degradation. The key idea is to prefetch Data packets and to serve them to the consumer with the shorter round trip time. By utilizing ICN features, it can be developed as an offline and state-less proxy which has an advantage of scalability. We evaluate the performance of ICN-PEP in both simulation and experiment on global testbed and show that ICN-PEP improves the performance of global content delivery.

  • Multicast Routing Model to Minimize Number of Flow Entries in Software-Defined Network Open Access

    Seiki KOTACHI  Takehiro SATO  Ryoichi SHINKUMA  Eiji OKI  

     
    PAPER-Network

      Pubricized:
    2020/11/13
      Vol:
    E104-B No:5
      Page(s):
    507-518

    The Software-defined network (SDN) uses a centralized SDN controller to store flow entries in the flow table of each SDN switch; the entries in the switch control packet flows. When a multicast service is provided in an SDN, the SDN controller stores a multicast entry dedicated for a multicast group in each SDN switch. Due to the limited capacity of each flow table, the number of flow entries required to set up a multicast tree must be suppressed. A conventional multicast routing scheme suppresses the number of multicast entries in one multicast tree by replacing some of them with unicast entries. However, since the conventional scheme individually determines a multicast tree for each request, unicast entries dedicated to the same receiver are distributed to various SDN switches if there are multiple multicast service requests. Therefore, further reduction in the number of flow entries is still possible. In this paper, we propose a multicast routing model for multiple multicast requests that minimizes the number of flow entries. This model determines multiple multicast trees simultaneously so that a unicast entry dedicated to the same receiver and stored in the same SDN switch is shared by multicast trees. We formulate the proposed model as an integer linear programming (ILP) problem. In addition, we develop a heuristic algorithm which can be used when the ILP problem cannot be solved in practical time. Numerical results show that the proposed model reduces the required number of flow entries compared to two benchmark models; the maximum reduction ratio is 49.3% when the number of multicast requests is 40.

  • Parallel Peak Cancellation Signal-Based PAPR Reduction Method Using Null Space in MIMO Channel for MIMO-OFDM Transmission Open Access

    Taku SUZUKI  Mikihito SUZUKI  Kenichi HIGUCHI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/11/20
      Vol:
    E104-B No:5
      Page(s):
    539-549

    This paper proposes a parallel peak cancellation (PC) process for the computational complexity-efficient algorithm called PC with a channel-null constraint (PCCNC) in the adaptive peak-to-average power ratio (PAPR) reduction method using the null space in a multiple-input multiple-output (MIMO) channel for MIMO-orthogonal frequency division multiplexing (OFDM) signals. By simultaneously adding multiple PC signals to the time-domain transmission signal vector, the required number of iterations of the iterative algorithm is effectively reduced along with the PAPR. We implement a constraint in which the PC signal is transmitted only to the null space in the MIMO channel by beamforming (BF). By doing so the data streams do not experience interference from the PC signal on the receiver side. Since the fast Fourier transform (FFT) and inverse FFT (IFFT) operations at each iteration are not required unlike the previous algorithm and thanks to the newly introduced parallel processing approach, the enhanced PCCNC algorithm reduces the required total computational complexity and number of iterations compared to the previous algorithms while achieving the same throughput-vs.-PAPR performance.

  • NetworkAPI: An In-Band Signalling Application-Aware Traffic Engineering Using SRv6 and IP Anycast

    Takuya MIYASAKA  Yuichiro HEI  Takeshi KITAHARA  

     
    PAPER

      Pubricized:
    2021/02/22
      Vol:
    E104-D No:5
      Page(s):
    617-627

    Application-aware Traffic Engineering (TE) plays a crucial role in ensuring quality of services (QoS) for recently emerging applications such as AR, VR, cloud gaming, and connected vehicles. While a deterministic application-aware TE is required for these mission-critical applications, a negotiation procedure between applications and network operators needs to undergo major simplification to fulfill the scalability of the application based on emerging microservices and container-based architecture. In this paper, we propose a NetworkAPI framework which allows an application to indicate a desired TE behavior inside IP packets by leveraging Segment Routing over IPv6 (SRv6). In the NetworkAPI framework, the TE behavior provided by the network operator is expressed as an SRv6 Segment Identifier (SID) in the form of a 128-bit IPv6 address. Because the IPv6 address of an SRv6 SID is distributed using IP anycast, the application can utilize the unchanged SRv6 SID regardless of the application's location, as if the application controls an API on the transport network. We implement a prototype of the NetworkAPI framework on a Linux kernel. On the prototype implementation, a basic packet forwarding performance is evaluated to demonstrate the feasibility of our framework.

  • Collaborative Ontology Development and its Use for Video Annotation in Elderly Care Domain

    Satoshi NISHIMURA  Julio VIZCARRA  Yuichi OOTA  Ken FUKUDA  

     
    PAPER

      Pubricized:
    2021/02/04
      Vol:
    E104-D No:5
      Page(s):
    528-538

    Multimedia data and information management is an important task according to the development of media processing technology. Multimedia is a useful resource that people understand complex situations such as the elderly care domain. Appropriate annotation is beneficial in several tasks of information management, such as storing, retrieval, and summarization of data, from a semantic perspective. However, the metadata annotation for multimedia data remains problematic because metadata is obtained as a result of interpretation depending on domain-specific knowledge, and it needs well-controlled and comprehensive vocabulary for annotation. In this study, we proposed a collaborative methodology for developing ontologies and annotation with domain experts. The method includes (1) classification of knowledge types for collaborative construction of annotation data, (2) division of tasks among a team composed of domain experts, ontology engineers, and annotators, and (3) incremental approach to ontology development. We applied the proposed method to 11 videos on elderly care domain for the confirmation of its feasibility. We focused on annotation of actions occurring in these videos, thereby the annotated data is used as a support in evaluating staff skills. The application results show the content in the ontology during annotation increases monotonically. The number of “action concepts” is saturated and reused among the case studies. This demonstrates that the ontology is reusable and could represent various case studies by using a small number of “action concepts”. This study concludes by presenting lessons learnt from the case studies.

  • An Experimental Study across GPU DBMSes toward Cost-Effective Analytical Processing

    Young-Kyoon SUH  Seounghyeon KIM  Joo-Young LEE  Hawon CHU  Junyoung AN  Kyong-Ha LEE  

     
    LETTER

      Pubricized:
    2020/11/06
      Vol:
    E104-D No:5
      Page(s):
    551-555

    In this letter we analyze the economic worth of GPU on analytical processing of GPU-accelerated database management systems (DBMSes). To this end, we conducted rigorous experiments with TPC-H across three popular GPU DBMSes. Consequently, we show that co-processing with CPU and GPU in the GPU DBMSes was cost-effective despite exposed concerns.

  • Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time

    Ryusei NAGASAWA  Keisuke FURUMOTO  Makoto TAKITA  Yoshiaki SHIRAISHI  Takeshi TAKAHASHI  Masami MOHRI  Yasuhiro TAKANO  Masakatu MORII  

     
    LETTER

      Pubricized:
    2021/02/24
      Vol:
    E104-D No:5
      Page(s):
    556-561

    The Topics over Time (TOT) model allows users to be aware of changes in certain topics over time. The proposed method inputs the divided dataset of security blog posts based on a fixed period using an overlap period to the TOT. The results suggest the extraction of topics that include malware and attack campaign names that are appropriate for the multi-labeling of cyber threat intelligence reports.

  • Design and Implementation of LoRa-Based Wireless Sensor Network with Embedded System for Smart Agricultural Recycling Rapid Processing Factory

    Chia-Yu WANG  Chia-Hsin TSAI  Sheng-Chung WANG  Chih-Yu WEN  Robert Chen-Hao CHANG  Chih-Peng FAN  

     
    INVITED PAPER

      Pubricized:
    2021/02/25
      Vol:
    E104-D No:5
      Page(s):
    563-574

    In this paper, the effective Long Range (LoRa) based wireless sensor network is designed and implemented to provide the remote data sensing functions for the planned smart agricultural recycling rapid processing factory. The proposed wireless sensor network transmits the sensing data from various sensors, which measure the values of moisture, viscosity, pH, and electrical conductivity of agricultural organic wastes for the production and circulation of organic fertilizers. In the proposed wireless sensor network design, the LoRa transceiver module is used to provide data transmission functions at the sensor node, and the embedded platform by Raspberry Pi module is applied to support the gateway function. To design the cloud data server, the MySQL methodology is applied for the database management system with Apache software. The proposed wireless sensor network for data communication between the sensor node and the gateway supports a simple one-way data transmission scheme and three half-duplex two-way data communication schemes. By experiments, for the one-way data transmission scheme under the condition of sending one packet data every five seconds, the packet data loss rate approaches 0% when 1000 packet data is transmitted. For the proposed two-way data communication schemes, under the condition of sending one packet data every thirty seconds, the average packet data loss rates without and with the data-received confirmation at the gateway side can be 3.7% and 0%, respectively.

  • Sparse Regression Model-Based Relearning Architecture for Shortening Learning Time in Traffic Prediction

    Takahiro HIRAYAMA  Takaya MIYAZAWA  Masahiro JIBIKI  Ved P. KAFLE  

     
    PAPER

      Pubricized:
    2021/02/16
      Vol:
    E104-D No:5
      Page(s):
    606-616

    Network function virtualization (NFV) enables network operators to flexibly provide diverse virtualized functions for services such as Internet of things (IoT) and mobile applications. To meet multiple quality of service (QoS) requirements against time-varying network environments, infrastructure providers must dynamically adjust the amount of computational resources, such as CPU, assigned to virtual network functions (VNFs). To provide agile resource control and adaptiveness, predicting the virtual server load via machine learning technologies is an effective approach to the proactive control of network systems. In this paper, we propose an adjustment mechanism for regressors based on forgetting and dynamic ensemble executed in a shorter time than that of our previous work. The framework includes a reducing training data method based on sparse model regression. By making a short list of training data derived from the sparse regression model, the relearning time can be reduced to about 57% without degrading provisioning accuracy.

1321-1340hit(22683hit)