The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] analysis(1591hit)

241-260hit(1591hit)

  • Semi-Supervised Speech Enhancement Combining Nonnegative Matrix Factorization and Robust Principal Component Analysis

    Yonggang HU  Xiongwei ZHANG  Xia ZOU  Meng SUN  Yunfei ZHENG  Gang MIN  

     
    LETTER-Speech and Hearing

      Vol:
    E100-A No:8
      Page(s):
    1714-1719

    Nonnegative matrix factorization (NMF) is one of the most popular machine learning tools for speech enhancement. The supervised NMF-based speech enhancement is accomplished by updating iteratively with the prior knowledge of the clean speech and noise spectra bases. However, in many real-world scenarios, it is not always possible for conducting any prior training. The traditional semi-supervised NMF (SNMF) version overcomes this shortcoming while the performance degrades. In this letter, without any prior knowledge of the speech and noise, we present an improved semi-supervised NMF-based speech enhancement algorithm combining techniques of NMF and robust principal component analysis (RPCA). In this approach, fixed speech bases are obtained from the training samples chosen from public dateset offline. The noise samples used for noise bases training, instead of characterizing a priori as usual, can be obtained via RPCA algorithm on the fly. This letter also conducts a study on the assumption whether the time length of the estimated noise samples may have an effect on the performance of the algorithm. Three metrics, including PESQ, SDR and SNR are applied to evaluate the performance of the algorithms by making experiments on TIMIT with 20 noise types at various signal-to-noise ratio levels. Extensive experimental results demonstrate the superiority of the proposed algorithm over the competing speech enhancement algorithm.

  • Improved Multiple Impossible Differential Cryptanalysis of Midori128

    Mohamed TOLBA  Ahmed ABDELKHALEK  Amr M. YOUSSEF  

     
    LETTER-Cryptography and Information Security

      Vol:
    E100-A No:8
      Page(s):
    1733-1737

    Midori128 is a lightweight block cipher proposed at ASIACRYPT 2015 to achieve low energy consumption per bit. Currently, the best published impossible differential attack on Midori128 covers 10 rounds without the pre-whitening key. By exploiting the special structure of the S-boxes and the binary linear transformation layer in Midori128, we present impossible differential distinguishers that cover 7 full rounds including the mix column operations. Then, we exploit four of these distinguishers to launch multiple impossible differential attack against 11 rounds of the cipher with the pre-whitening and post-whitening keys.

  • Finding New Varieties of Malware with the Classification of Network Behavior

    Mitsuhiro HATADA  Tatsuya MORI  

     
    PAPER-Program Analysis

      Pubricized:
    2017/05/18
      Vol:
    E100-D No:8
      Page(s):
    1691-1702

    An enormous number of malware samples pose a major threat to our networked society. Antivirus software and intrusion detection systems are widely implemented on the hosts and networks as fundamental countermeasures. However, they may fail to detect evasive malware. Thus, setting a high priority for new varieties of malware is necessary to conduct in-depth analyses and take preventive measures. In this paper, we present a traffic model for malware that can classify network behaviors of malware and identify new varieties of malware. Our model comprises malware-specific features and general traffic features that are extracted from packet traces obtained from a dynamic analysis of the malware. We apply a clustering analysis to generate a classifier and evaluate our proposed model using large-scale live malware samples. The results of our experiment demonstrate the effectiveness of our model in finding new varieties of malware.

  • Design and Implementation of a Test Program for Benchmarking DNS64 Servers Open Access

    Gábor LENCSE  Dániel BAKAI  

     
    POSITION PAPER-Internet

      Pubricized:
    2016/12/16
      Vol:
    E100-B No:6
      Page(s):
    948-954

    A new Internet Draft on benchmarking methodologies for IPv6 transition technologies including DNS64 was adopted by the Benchmarking Working Group of IETF. The aim of our effort is to design and implement a test program that complies with the draft and thus to create the world's first standard DNS64 benchmarking tool. In this paper, we disclose our design considerations and high-level implementation decisions. The precision of our special timing method is tested and found to be excellent. Due to the prudent design, the performance of our test program is also excellent: it can send more than 200,000 AAAA record requests using a single core of a desktop computer with a 3.2GHz Intel Core i5-4570 CPU. Its operation comprises all the functionalities required by the draft including checking the timeliness and validity of the answers of the tested DNS64 server. Our DNS64 benchmarking program, dns64perf++, is distributed as free software under GNU GPL v2 license for the benefit of the research, benchmarking and networking communities.

  • Validating DCCP Simultaneous-Open and Feature Negotiation Procedures

    Somsak VANIT-ANUNCHAI  

     
    PAPER-Formal techniques

      Pubricized:
    2017/03/07
      Vol:
    E100-D No:6
      Page(s):
    1190-1199

    This paper presents the formal analysis of the feature negotiation and connection management procedures of the Datagram Congestion Control Protocol (DCCP). Using state space analysis we discover an error in the DCCP specification, that result in both ends of the connection having different agreed feature values. The error occurs when the client ignores an unexpected Response packet in the OPEN state that carries a valid Confirm option. This provides an evidence that the connection management procedure and feature negotiation procedures interact. We also propose solutions to rectify the problem.

  • Image Modification Based on Spatial Frequency Components for Visual Attention Retargeting

    Hironori TAKIMOTO  Syuhei HITOMI  Hitoshi YAMAUCHI  Mitsuyoshi KISHIHARA  Kensuke OKUBO  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2017/03/15
      Vol:
    E100-D No:6
      Page(s):
    1339-1349

    It is estimated that 80% of the information entering the human brain is obtained through the eyes. Therefore, it is commonly believed that drawing human attention to particular objects is effective in assisting human activities. In this paper, we propose a novel image modification method for guiding user attention to specific regions of interest by using a novel saliency map model based on spatial frequency components. We modify the frequency components on the basis of the obtained saliency map to decrease the visual saliency outside the specified region. By applying our modification method to an image, human attention can be guided to the specified region because the saliency inside the region is higher than that outside the region. Using gaze measurements, we show that the proposed saliency map matches well with the distribution of actual human attention. Moreover, we evaluate the effectiveness of the proposed modification method by using an eye tracking system.

  • Multi-View 3D Ball Tracking with Abrupt Motion Adaptive System Model, Anti-Occlusion Observation and Spatial Density Based Recovery in Sports Analysis

    Xina CHENG  Norikazu IKOMA  Masaaki HONDA  Takeshi IKENAGA  

     
    PAPER-Vision

      Vol:
    E100-A No:5
      Page(s):
    1215-1225

    Significant challenges in ball tracking of sports analysis by computer vision technology are: 1) accuracy of estimated 3D ball trajectory under difficult conditions; 2) external forces added by players lead to irregular motions of the ball; 3) unpredictable situations in the real game, i.e. the ball occluded by players and other objects, complex background and changing lighting condition. With the goal of multi-view 3D ball tracking, this paper proposes an abrupt motion adaptive system model, an anti-occlusion observation model, and a spatial density-based automatic recovery based on particle filter. The system model combines two different system noises that cover the motion of the ball both in general situation and situation subject to abrupt motion caused by external force. Combination ratio of these two noises and number of particles are adaptive to the estimated motion by weight distribution of particles. The anti-occlusion observation model evaluates image feature of each camera and eliminates influence of the camera with less confidence. The spatial density, which is calculated based on 3D ball candidates filtered out by spatial homographic relationship between cameras, is proposed for generating new set of particles to recover the tracking when tracking failure is detected. Experimental results based on HDTV video sequences (2014 Inter High School Men's Volleyball Games, Japan), which were captured by four cameras located at each corner of the court, show that the success rate achieved by the proposals of 3D ball tracking is 99.42%.

  • Variance Analysis for Least p-Norm Estimator in Mixture of Generalized Gaussian Noise

    Yuan CHEN  Long-Ting HUANG  Xiao Long YANG  Hing Cheung SO  

     
    LETTER-Digital Signal Processing

      Vol:
    E100-A No:5
      Page(s):
    1226-1230

    Variance analysis is an important research topic to assess the quality of estimators. In this paper, we analyze the performance of the least ℓp-norm estimator in the presence of mixture of generalized Gaussian (MGG) noise. In the case of known density parameters, the variance expression of the ℓp-norm minimizer is first derived, for the general complex-valued signal model. Since the formula is a function of p, the optimal value of p corresponding to the minimum variance is then investigated. Simulation results show the correctness of our study and the near-optimality of the ℓp-norm minimizer compared with Cramér-Rao lower bound.

  • Design Differences in Pedestrian Navigation Systems Depending on the Availability of Carriable Navigation Information

    Tetsuya MANABE  Takaaki HASEGAWA  

     
    PAPER-Intelligent Transport System

      Vol:
    E100-A No:5
      Page(s):
    1197-1205

    In this paper, the differences in navigation information design, which is important for kiosk-type pedestrian navigation systems, were experimentally examined depending on presence or absence of carriable navigation information in order to acquire the knowledge to contribute design guidelines of kiosk-type pedestrian navigation systems. In particular, we used route complexity information calculated using a regression equation that contained multiple factors. In the absence of carriable navigation information, both the destination arrival rate and route deviation rate improved. Easy routes were designed as M (17 to 39 characters in Japanese), while complicated routes were denoted as L (40 or more characters in Japanese). On the contrary, in the presence of carriable navigation information, the user's memory load was found to be reduced by carrying the same navigation information as kiosk-type terminals. Thus, the reconsideration of kiosk-type pedestrian navigation systems design, e.g., the means of presenting navigation information, is required. For example, if the system attaches importance to a high destination arrival rate, L_Carrying without regard to route complexity is better. If the system attaching importance to the low route deviation rate, M_Carrying in the case of easy routes and L_Carrying in the case of complicated routes have been better. Consequently, this paper presents the differences in the designs of pedestrian navigation systems depending on whether carriable navigation information is absent or present.

  • Analysis of Relaxation Oscillation in a Resonant Tunneling Diode Integrated with a Bow-Tie Antenna

    Naoto OKUMURA  Kiyoto ASAKAWA  Michihiko SUHARA  

     
    PAPER

      Vol:
    E100-C No:5
      Page(s):
    430-438

    In general, tunnel diodes exhibit various types of oscillation mode: the sinusoidal mode or the nonsinusoidal mode which is known as the relaxation oscillation (RO) mode. We derive a condition for generating the RO in resonant tunneling diodes (RTDs) with essential components for equivalent circuit model. A conditional equation to obtain sufficient nonlinearity towards the robust RO is clarified. Moreover, its condition also can be applied in case of a bow-tie antenna integrated RTD, thus a design policy to utilize the RO region for the antenna integrated RTD is established by numerical evaluations of time-domain large-signal nonlinear analysis towards a terahertz transmitter for broadband wireless communications.

  • Unsupervised Image Steganalysis Method Using Self-Learning Ensemble Discriminant Clustering

    Bing CAO  Guorui FENG  Zhaoxia YIN  Lingyan FAN  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2017/02/18
      Vol:
    E100-D No:5
      Page(s):
    1144-1147

    Image steganography is a technique of embedding secret message into a digital image to securely send the information. In contrast, steganalysis focuses on detecting the presence of secret messages hidden by steganography. The modern approach in steganalysis is based on supervised learning where the training set must include the steganographic and natural image features. But if a new method of steganography is proposed, and the detector still trained on existing methods will generally lead to the serious detection accuracy drop due to the mismatch between training and detecting steganographic method. In this paper, we just attempt to process unsupervised learning problem and propose a detection model called self-learning ensemble discriminant clustering (SEDC), which aims at taking full advantage of the statistical property of the natural and testing images to estimate the optimal projection vector. This method can adaptively select the most discriminative subspace and then use K-means clustering to generate the ultimate class labels. Experimental results on J-UNIWARD and nsF5 steganographic methods with three feature extraction methods such as CC-JRM, DCTR, GFR show that the proposed scheme can effectively classification better than blind speculation.

  • Removal of Salt-and-Pepper Noise Using a High-Precision Frequency Analysis Approach

    Masaya HASEGAWA  Kazuki SAKASHITA  Kousei UCHIKOSHI  Shigeki HIROBAYASHI  Tadanobu MISAWA  

     
    PAPER-Image Processing and Video Processing

      Pubricized:
    2017/01/24
      Vol:
    E100-D No:5
      Page(s):
    1097-1105

    A digital image is often deteriorated by impulse noise that may occur during processes such as transmission. An impulse noise converts the pixel data in the image into black (0) or white (255) values at a random frequency and is also called salt-and-pepper noise. In this paper, we identify the details of pixels that have been damaged by impulse noise by analyzing the frequency of the noisy image using non-harmonic analysis (NHA). From experimental results, we can confirm that this method shows superior performance compared to the recent PSNR denoising method. In addition, we show that the proposed method is particularly superior in eliminating impulse noise in images with high noise rates.

  • Traffic Anomaly Detection Based on Robust Principal Component Analysis Using Periodic Traffic Behavior

    Takahiro MATSUDA  Tatsuya MORITA  Takanori KUDO  Tetsuya TAKINE  

     
    PAPER-Network

      Pubricized:
    2016/11/21
      Vol:
    E100-B No:5
      Page(s):
    749-761

    In this paper, we study robust Principal Component Analysis (PCA)-based anomaly detection techniques in network traffic, which can detect traffic anomalies by projecting measured traffic data onto a normal subspace and an anomalous subspace. In a PCA-based anomaly detection, outliers, anomalies with excessively large traffic volume, may contaminate the subspaces and degrade the performance of the detector. To solve this problem, robust PCA methods have been studied. In a robust PCA-based anomaly detection scheme, outliers can be removed from the measured traffic data before constructing the subspaces. Although the robust PCA methods are promising, they incure high computational cost to obtain the optimal location vector and scatter matrix for the subspace. We propose a novel anomaly detection scheme by extending the minimum covariance determinant (MCD) estimator, a robust PCA method. The proposed scheme utilizes the daily periodicity in traffic volume and attempts to detect anomalies for every period of measured traffic. In each period, before constructing the subspace, outliers are removed from the measured traffic data by using a location vector and a scatter matrix obtained in the preceding period. We validate the proposed scheme by applying it to measured traffic data in the Abiline network. Numerical results show that the proposed scheme provides robust anomaly detection with less computational cost.

  • A New Efficient Resource Management Framework for Iterative MapReduce Processing in Large-Scale Data Analysis

    Seungtae HONG  Kyongseok PARK  Chae-Deok LIM  Jae-Woo CHANG  

    This paper has been cancelled due to violation of duplicate submission policy on IEICE Transactions on Information and Systems on September 5, 2019.
     
    PAPER

      Pubricized:
    2017/01/17
      Vol:
    E100-D No:4
      Page(s):
    704-717
    • HTML
    • Errata[Uploaded on March 1,2018]

    To analyze large-scale data efficiently, studies on Hadoop, one of the most popular MapReduce frameworks, have been actively done. Meanwhile, most of the large-scale data analysis applications, e.g., data clustering, are required to do the same map and reduce functions repeatedly. However, Hadoop cannot provide an optimal performance for iterative MapReduce jobs because it derives a result by doing one phase of map and reduce functions. To solve the problems, in this paper, we propose a new efficient resource management framework for iterative MapReduce processing in large-scale data analysis. For this, we first design an iterative job state-machine for managing the iterative MapReduce jobs. Secondly, we propose an invariant data caching mechanism for reducing the I/O costs of data accesses. Thirdly, we propose an iterative resource management technique for efficiently managing the resources of a Hadoop cluster. Fourthly, we devise a stop condition check mechanism for preventing unnecessary computation. Finally, we show the performance superiority of the proposed framework by comparing it with the existing frameworks.

  • Internet Data Center IP Identification and Connection Relationship Analysis Based on Traffic Connection Behavior Analysis

    Xuemeng ZHAI  Mingda WANG  Hangyu HU  Guangmin HU  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2016/10/21
      Vol:
    E100-B No:4
      Page(s):
    510-517

    Identifying IDC (Internet Data Center) IP addresses and analyzing the connection relationship of IDC could reflect the IDC network resource allocation and network layout which is helpful for IDC resource allocation optimization. Recent research mainly focuses on minimizing electricity consumption and optimizing network resource allocation based on IDC traffic behavior analysis. However, the lack of network-wide IP information from network operators has led to problems like management difficulties and unbalanced resource allocation of IDC, which are still unsolved today. In this paper, we propose a method for the IP identification and connection relationship analysis of IDC based on the flow connection behavior analysis. In our method, the frequent IP are extracted and aggregated in backbone communication network based on the traffic characteristics of IDC. After that, the connection graph of frequent IP (CGFIP) are built by analyzing the behavior of the users who visit the IDC servers, and IDC IP blocks are thus identified using CGFIP. Furthermore, the connection behavior characteristics of IDC are analyzed based on the connection graphs of IDC (CGIDC). Our findings show that the method can accurately identify the IDC IP addresses and is also capable of reflecting the relationships among IDCs effectively.

  • Codebook Learning for Image Recognition Based on Parallel Key SIFT Analysis

    Feng YANG  Zheng MA  Mei XIE  

     
    LETTER-Image Recognition, Computer Vision

      Pubricized:
    2017/01/10
      Vol:
    E100-D No:4
      Page(s):
    927-930

    The quality of codebook is very important in visual image classification. In order to boost the classification performance, a scheme of codebook generation for scene image recognition based on parallel key SIFT analysis (PKSA) is presented in this paper. The method iteratively applies classical k-means clustering algorithm and similarity analysis to evaluate key SIFT descriptors (KSDs) from the input images, and generates the codebook by a relaxed k-means algorithm according to the set of KSDs. With the purpose of evaluating the performance of the PKSA scheme, the image feature vector is calculated by sparse code with Spatial Pyramid Matching (ScSPM) after the codebook is constructed. The PKSA-based ScSPM method is tested and compared on three public scene image datasets. The experimental results show the proposed scheme of PKSA can significantly save computational time and enhance categorization rate.

  • Interdisciplinary Collaborator Recommendation Based on Research Content Similarity

    Masataka ARAKI  Marie KATSURAI  Ikki OHMUKAI  Hideaki TAKEDA  

     
    PAPER

      Pubricized:
    2016/10/13
      Vol:
    E100-D No:4
      Page(s):
    785-792

    Most existing methods on research collaborator recommendation focus on promoting collaboration within a specific discipline and exploit a network structure derived from co-authorship or co-citation information. To find collaboration opportunities outside researchers' own fields of expertise and beyond their social network, we present an interdisciplinary collaborator recommendation method based on research content similarity. In the proposed method, we calculate textual features that reflect a researcher's interests using a research grant database. To find the most relevant researchers who work in other fields, we compare constructing a pairwise similarity matrix in a feature space and exploiting existing social networks with content-based similarity. We present a case study at the Graduate University for Advanced Studies in Japan in which actual collaborations across departments are used as ground truth. The results indicate that our content-based approach can accurately predict interdisciplinary collaboration compared with the conventional collaboration network-based approaches.

  • Achievable Error Rate Performance Analysis of Space Shift Keying Systems with Imperfect CSI

    Jinkyu KANG  Seongah JEONG  Hoojin LEE  

     
    LETTER-Communication Theory and Signals

      Vol:
    E100-A No:4
      Page(s):
    1084-1087

    In this letter, efficient closed-form formulas for the exact and asymptotic average bit error probability (ABEP) of space shift keying (SSK) systems are derived over Rayleigh fading channels with imperfect channel state information (CSI). Specifically, for a generic 2×NR multiple-input multiple-output (MIMO) system with the maximum likelihood (ML) detection, the impact of imperfect CSI is taken into consideration in terms of two types of channel estimation errors with the fixed variance and the variance as a function of the number of pilot symbols and signal-to-noise ratio (SNR). Then, the explicit evaluations of the bit error floor (BEF) and asymptotic SNR loss are carried out based on the derived asymptotic ABEP formula, which accounts for the impact of imperfect CSI on the SSK system. The numerical results are presented to validate the exactness of our theoretical analysis.

  • An Improved Multivariate Wavelet Denoising Method Using Subspace Projection

    Huan HAO  Huali WANG  Naveed ur REHMAN  Liang CHEN  Hui TIAN  

     
    PAPER-Digital Signal Processing

      Vol:
    E100-A No:3
      Page(s):
    769-775

    An improved multivariate wavelet denoising algorithm combined with subspace and principal component analysis is presented in this paper. The key element is deriving an optimal orthogonal matrix that can project the multivariate observation signal to a signal subspace from observation space. Univariate wavelet shrinkage operator is then applied to the projected signals channel-wise resulting in the improvement of the output SNR. Finally, principal component analysis is performed on the denoised signal in the observation space to further improve the denoising performance. Experimental results based on synthesized and real world ECG data verify the effectiveness of the proposed algorithm.

  • Improved Differential Fault Analysis of SOSEMANUK with Algebraic Techniques

    Hao CHEN  Tao WANG  Shize GUO  Xinjie ZHAO  Fan ZHANG  Jian LIU  

     
    PAPER-Cryptography and Information Security

      Vol:
    E100-A No:3
      Page(s):
    811-821

    The differential fault analysis of SOSEMNAUK was presented in Africacrypt in 2011. In this paper, we improve previous work with algebraic techniques which can result in a considerable reduction not only in the number of fault injections but also in time complexity. First, we propose an enhanced method to determine the fault position with a success rate up to 99% based on the single-word fault model. Then, instead of following the design of SOSEMANUK at word levels, we view SOSEMANUK at bit levels during the fault analysis and calculate most components of SOSEMANUK as bit-oriented. We show how to build algebraic equations for SOSEMANUK and how to represent the injected faults in bit-level. Finally, an SAT solver is exploited to solve the combined equations to recover the secret inner state. The results of simulations on a PC show that the full 384 bits initial inner state of SOSEMANUK can be recovered with only 15 fault injections in 3.97h.

241-260hit(1591hit)