The search functionality is under construction.

Keyword Search Result

[Keyword] network(4507hit)

241-260hit(4507hit)

  • A Deep Q-Network Based Intelligent Decision-Making Approach for Cognitive Radar

    Yong TIAN  Peng WANG  Xinyue HOU  Junpeng YU  Xiaoyan PENG  Hongshu LIAO  Lin GAO  

     
    PAPER-Neural Networks and Bioengineering

      Pubricized:
    2021/10/15
      Vol:
    E105-A No:4
      Page(s):
    719-726

    The electromagnetic environment is increasingly complex and changeable, and radar needs to meet the execution requirements of various tasks. Modern radars should improve their intelligence level and have the ability to learn independently in dynamic countermeasures. It can make the radar countermeasure strategy change from the traditional fixed anti-interference strategy to dynamically and independently implementing an efficient anti-interference strategy. Aiming at the performance optimization of target tracking in the scene where multiple signals coexist, we propose a countermeasure method of cognitive radar based on a deep Q-learning network. In this paper, we analyze the tracking performance of this method and the Markov Decision Process under the triangular frequency sweeping interference, respectively. The simulation results show that reinforcement learning has substantial autonomy and adaptability for solving such problems.

  • Accurate End-to-End Delay Bound Analysis for Large-Scale Network Via Experimental Comparison

    Xiao HONG  Yuehong GAO  Hongwen YANG  

     
    PAPER-Network

      Pubricized:
    2021/10/15
      Vol:
    E105-B No:4
      Page(s):
    472-484

    Computer networks tend to be subjected to the proliferation of mobile demands, therefore it poses a great challenge to guarantee the quality of network service. For real-time systems, the QoS performance bound analysis for the complex network topology and background traffic in modern networks is often difficult. Network calculus, nevertheless, converts a complex non-linear network system into an analyzable linear system to accomplish more accurate delay bound analysis. The existing network environment contains complex network resource allocation schemes, and delay bound analysis is generally pessimistic, hence it is essential to modify the analysis model to improve the bound accuracy. In this paper, the main research approach is to obtain the measurement results of an actual network by building a measurement environment and the corresponding theoretical results by network calculus. A comparison between measurement data and theoretical results is made for the purpose of clarifying the scheme of bandwidth scheduling. The measurement results and theoretical analysis results are verified and corrected, in order to propose an accurate per-flow end-to-end delay bound analytic model for a large-scale scheduling network. On this basis, the instructional significance of the analysis results for the engineering construction is discussed.

  • Deep Gaussian Denoising Network Based on Morphological Operators with Low-Precision Arithmetic

    Hikaru FUJISAKI  Makoto NAKASHIZUKA  

     
    PAPER-Image, Digital Signal Processing

      Pubricized:
    2021/11/08
      Vol:
    E105-A No:4
      Page(s):
    631-638

    This paper presents a deep network based on morphological filters for Gaussian denoising. The morphological filters can be applied with only addition, max, and min functions and require few computational resources. Therefore, the proposed network is suitable for implementation using a small microprocessor. Each layer of the proposed network consists of a top-hat transform, which extracts small peaks and valleys of noise components from the input image. Noise components are iteratively reduced in each layer by subtracting the noise components from the input image. In this paper, the extensions of opening and closing are introduced as linear combinations of the morphological filters for the top-hat transform of this deep network. Multiplications are only required for the linear combination of the morphological filters in the proposed network. Because almost all parameters of the network are structuring elements of the morphological filters, the feature maps and parameters can be represented in short bit-length integer form, which is suitable for implementation with single instructions, multiple data (SIMD) instructions. Denoising examples show that the proposed network obtains denoising results comparable to those of BM3D [1] without linear convolutions and with approximately one tenth the number of parameters of a full-scale deep convolutional neural network [2]. Moreover, the computational time of the proposed method using SIMD instructions of a microprocessor is also presented.

  • Image Super-Resolution via Generative Adversarial Networks Using Metric Projections onto Consistent Sets for Low-Resolution Inputs

    Hiroya YAMAMOTO  Daichi KITAHARA  Hiroki KURODA  Akira HIRABAYASHI  

     
    PAPER-Image

      Pubricized:
    2021/09/29
      Vol:
    E105-A No:4
      Page(s):
    704-718

    This paper addresses single image super-resolution (SR) based on convolutional neural networks (CNNs). It is known that recovery of high-frequency components in output SR images of CNNs learned by the least square errors or least absolute errors is insufficient. To generate realistic high-frequency components, SR methods using generative adversarial networks (GANs), composed of one generator and one discriminator, are developed. However, when the generator tries to induce the discriminator's misjudgment, not only realistic high-frequency components but also some artifacts are generated, and objective indices such as PSNR decrease. To reduce the artifacts in the GAN-based SR methods, we consider the set of all SR images whose square errors between downscaling results and the input image are within a certain range, and propose to apply the metric projection onto this consistent set in the output layers of the generators. The proposed technique guarantees the consistency between output SR images and input images, and the generators with the proposed projection can generate high-frequency components with few artifacts while keeping low-frequency ones as appropriate for the known noise level. Numerical experiments show that the proposed technique reduces artifacts included in the original SR images of a GAN-based SR method while generating realistic high-frequency components with better PSNR values in both noise-free and noisy situations. Since the proposed technique can be integrated into various generators if the downscaling process is known, we can give the consistency to existing methods with the input images without degrading other SR performance.

  • Resource Allocation Modeling for Fine-Granular Network Slicing in Beyond 5G Systems Open Access

    Zhaogang SHU  Tarik TALEB  Jaeseung SONG  

     
    INVITED PAPER

      Pubricized:
    2021/10/19
      Vol:
    E105-B No:4
      Page(s):
    349-363

    Through the concept of network slicing, a single physical network infrastructure can be split into multiple logically-independent Network Slices (NS), each of which is customized for the needs of its respective individual user or industrial vertical. In the beyond 5G (B5G) system, this customization can be done for many targeted services, including, but not limited to, 5G use cases and beyond 5G. The network slices should be optimized and customized to stitch a suitable environment for targeted industrial services and verticals. This paper proposes a novel Quality of Service (QoS) framework that optimizes and customizes the network slices to ensure the service level agreement (SLA) in terms of end-to-end reliability, delay, and bandwidth communication. The proposed framework makes use of network softwarization technologies, including software-defined networking (SDN) and network function virtualization (NFV), to preserve the SLA and ensure elasticity in managing the NS. This paper also mathematically models the end-to-end network by considering three parts: radio access network (RAN), transport network (TN), and core network (CN). The network is modeled in an abstract manner based on these three parts. Finally, we develop a prototype system to implement these algorithms using the open network operating system (ONOS) as a SDN controller. Simulations are conducted using the Mininet simulator. The results show that our QoS framework and the proposed resource allocation algorithms can effectively schedule network resources for various NS types and provide reliable E2E QoS services to end-users.

  • Experiment of Integrated Technologies in Robotics, Network, and Computing for Smart Agriculture Open Access

    Ryota ISHIBASHI  Takuma TSUBAKI  Shingo OKADA  Hiroshi YAMAMOTO  Takeshi KUWAHARA  Kenichi KAWAMURA  Keisuke WAKAO  Takatsune MORIYAMA  Ricardo OSPINA  Hiroshi OKAMOTO  Noboru NOGUCHI  

     
    INVITED PAPER

      Pubricized:
    2021/11/05
      Vol:
    E105-B No:4
      Page(s):
    364-378

    To sustain and expand the agricultural economy even as its workforce shrinks, the efficiency of farm operations must be improved. One key to efficiency improvement is completely unmanned driving of farm machines, which requires stable monitoring and control of machines from remote sites, a safety system to ensure safe autonomous driving even without manual operations, and precise positioning in not only small farm fields but also wider areas. As possible solutions for those issues, we have developed technologies of wireless network quality prediction, an end-to-end overlay network, machine vision for safety and positioning, network cooperated vehicle control and autonomous tractor control and conducted experiments in actual field environments. Experimental results show that: 1) remote monitoring and control can be seamlessly continued even when connection between the tractor and the remote site needs to be switched across different wireless networks during autonomous driving; 2) the safety of the autonomous driving can automatically be ensured by detecting both the existence of people in front of the unmanned tractor and disturbance of network quality affecting remote monitoring operation; and 3) the unmanned tractor can continue precise autonomous driving even when precise positioning by satellite systems cannot be performed.

  • A Data Augmentation Method for Cow Behavior Estimation Systems Using 3-Axis Acceleration Data and Neural Network Technology

    Chao LI  Korkut Kaan TOKGOZ  Ayuka OKUMURA  Jim BARTELS  Kazuhiro TODA  Hiroaki MATSUSHIMA  Takumi OHASHI  Ken-ichi TAKEDA  Hiroyuki ITO  

     
    PAPER-Neural Networks and Bioengineering

      Pubricized:
    2021/09/30
      Vol:
    E105-A No:4
      Page(s):
    655-663

    Cow behavior monitoring is critical for understanding the current state of cow welfare and developing an effective planning strategy for pasture management, such as early detection of disease and estrus. One of the most powerful and cost-effective methods is a neural-network-based monitoring system that analyzes time series data from inertial sensors attached to cows. For this method, a significant challenge is to improve the quality and quantity of teaching data in the development of neural network models, which requires us to collect data that can cover various realistic conditions and assign labels to them. As a result, the cost of data collection is significantly high. This work proposes a data augmentation method to solve two major quality problems in the collection process of teaching data. One is the difficulty and randomicity of teaching data acquisition and the other is the sensor position changes during actual operation. The proposed method can computationally emulate different rotating states of the collar-type sensor device from the measured acceleration data. Furthermore, it generates data for actions that occur less frequently. The verification results showed significantly higher estimation performance with an average accuracy of over 98% for five main behaviors (feeding, walking, drinking, rumination, and resting) based on learning with long short-term memory (LSTM) network. Compared with the estimation performance without data augmentation, which was insufficient with a minimum of 60.48%, the recognition rate was improved by 2.52-37.05pt for various behaviors. In addition, comparison of different rotation intervals was investigated and a 30-degree increment was selected based on the accuracy performances analysis. In conclusion, the proposed data expansion method can improve the accuracy in cow behavior estimation by a neural network model. Moreover, it contributes to a significant reduction of the teaching data collection cost for machine learning and opens many opportunities for new research.

  • An Efficient Resource Allocation Using Resource Abstraction for Optical Access Networks for 5G-RAN

    Seiji KOZAKI  Akiko NAGASAWA  Takeshi SUEHIRO  Kenichi NAKURA  Hiroshi MINENO  

     
    PAPER-Network Virtualization

      Pubricized:
    2021/11/22
      Vol:
    E105-B No:4
      Page(s):
    411-420

    In this paper, a novel method of resource abstraction and an abstracted-resource model for dynamic resource control in optical access networks are proposed. Based on this proposal, an implementation assuming application to 5G mobile fronthaul and backhaul is presented. Finally, an evaluation of the processing time for resource allocation using this method is performed using a software prototype of the control function. From the results of the evaluation, it is confirmed that the proposed method offers better characteristics than former approaches, and is suitable for dynamic resource control in 5G applications.

  • NFD.P4: NDN In-Networking Cache Implementation Scheme with P4

    Saifeng HOU  Yuxiang HU  Le TIAN  Zhiguang DANG  

     
    LETTER-Information Network

      Pubricized:
    2021/12/27
      Vol:
    E105-D No:4
      Page(s):
    820-823

    This work proposes NFD.P4, a cache implementation scheme in Named Data Networking (NDN), to solve the problem of insufficient cache space of prgrammable switch and realize the practical application of NDN. We transplant the cache function of NDN.P4 to the NDN Forwarding Daemon (NFD) cache server, which replace the memory space of programmable switch.

  • Timer-Based Increase and Delay-Based Decrease Algorithm for RDMA Congestion Control

    Masahiro NOGUCHI  Daisuke SUGAHARA  Miki YAMAMOTO  

     
    PAPER-Data Center Network

      Pubricized:
    2021/10/13
      Vol:
    E105-B No:4
      Page(s):
    421-431

    For recent datacenter networks, RDMA (Remote Direct Memory Access) can ease the overhead of the TCP/IP protocol suite. The RoCEv2 (RDMA over Converged Ethernet version 2) standard enables RDMA on widely deployed Ethernet technology. RoCEv2 leverages priority-based flow control (PFC) for realizing the lossless environment required by RDMA. However, PFC is well-known to have the technical weakness of head-of-line blocking. Congestion control for RDMA is a very hot research topic for datacenter networks. In this paper, we propose a novel congestion control algorithm for RoCEv2, TIDD (Timer-based Increase and Delay-based Decrease). TIDD basically combines the timer-based increase of DCQCN and delay-based decrease of TIMELY. Extensive simulation results show that TIDD satisfies the high throughput and low latency required for datacenter networks.

  • MKGN: A Multi-Dimensional Knowledge Enhanced Graph Network for Multi-Hop Question and Answering

    Ying ZHANG  Fandong MENG  Jinchao ZHANG  Yufeng CHEN  Jinan XU  Jie ZHOU  

     
    PAPER-Natural Language Processing

      Pubricized:
    2021/12/29
      Vol:
    E105-D No:4
      Page(s):
    807-819

    Machine reading comprehension with multi-hop reasoning always suffers from reasoning path breaking due to the lack of world knowledge, which always results in wrong answer detection. In this paper, we analyze what knowledge the previous work lacks, e.g., dependency relations and commonsense. Based on our analysis, we propose a Multi-dimensional Knowledge enhanced Graph Network, named MKGN, which exploits specific knowledge to repair the knowledge gap in reasoning process. Specifically, our approach incorporates not only entities and dependency relations through various graph neural networks, but also commonsense knowledge by a bidirectional attention mechanism, which aims to enhance representations of both question and contexts. Besides, to make the most of multi-dimensional knowledge, we investigate two kinds of fusion architectures, i.e., in the sequential and parallel manner. Experimental results on HotpotQA dataset demonstrate the effectiveness of our approach and verify that using multi-dimensional knowledge, especially dependency relations and commonsense, can indeed improve the reasoning process and contribute to correct answer detection.

  • A Method for Generating Color Palettes with Deep Neural Networks Considering Human Perception

    Beiying LIU  Kaoru ARAKAWA  

     
    PAPER-Image, Vision, Neural Networks and Bioengineering

      Pubricized:
    2021/09/30
      Vol:
    E105-A No:4
      Page(s):
    639-646

    A method to generate color palettes from images is proposed. Here, deep neural networks (DNN) are utilized in order to consider human perception. Two aspects of human perception are considered; one is attention to image, and the other is human preference for colors. This method first extracts N regions with dominant color categories from the image considering human attention. Here, N is the number of colors in a color palette. Then, the representative color is obtained from each region considering the human preference for color. Two deep neural-net systems are adopted here, one is for estimating the image area which attracts human attention, and the other is for estimating human preferable colors from image regions to obtain representative colors. The former is trained with target images obtained by an eye tracker, and the latter is trained with dataset of color selection by human. Objective and subjective evaluation is performed to show high performance of the proposed system compared with conventional methods.

  • Face Super-Resolution via Triple-Attention Feature Fusion Network

    Kanghui ZHAO  Tao LU  Yanduo ZHANG  Yu WANG  Yuanzhi WANG  

     
    LETTER-Image

      Pubricized:
    2021/10/13
      Vol:
    E105-A No:4
      Page(s):
    748-752

    In recent years, compared with the traditional face super-resolution (SR) algorithm, the face SR based on deep neural network has shown strong performance. Among these methods, attention mechanism has been widely used in face SR because of its strong feature expression ability. However, the existing attention-based face SR methods can not fully mine the missing pixel information of low-resolution (LR) face images (structural prior). And they only consider a single attention mechanism to take advantage of the structure of the face. The use of multi-attention could help to enhance feature representation. In order to solve this problem, we first propose a new pixel attention mechanism, which can recover the structural details of lost pixels. Then, we design an attention fusion module to better integrate the different characteristics of triple attention. Experimental results on FFHQ data sets show that this method is superior to the existing face SR methods based on deep neural network.

  • Autonomous Gateway Mobility Control for Heterogeneous Drone Swarms: Link Stabilizer and Path Optimizer

    Taichi MIYA  Kohta OHSHIMA  Yoshiaki KITAGUCHI  Katsunori YAMAOKA  

     
    PAPER-Ad Hoc Network

      Pubricized:
    2021/10/18
      Vol:
    E105-B No:4
      Page(s):
    432-448

    Heterogeneous drone swarms are large hybrid drone clusters in which multiple drones with different wireless protocols are interconnected by some translator drones called GWs. Nowadays, because inexpensive drones, such as toy drones, have become widely used in society, the technology for constructing huge drone swarms is attracting more and more attention. In this paper, we propose an autonomous GW mobility control algorithm for establishing stabilized and low-delay communication among heterogeneous clusters, assuming that only GWs are controllable and relocatable to ensure the flexible operationality of drone swarms. Our proposed algorithm is composed of two independent sub algorithms - the Link Stabilizer and the Path Optimizer. The Stabilizer maintains the neighbor links and consists of two schemes: the neighbor clustering based on relative velocities and the GW velocity calculation using a kinetic model. The Optimizer creates a shortcut to reduce the end-to-end delay for newly established communication by relocating the GW dynamically. We also propose a conceptual protocol design to implement this algorithm into real-world drone swarms in a distributed manner. Computer simulation reveals that the Stabilizer improved the connection stability for all three mobility models even under the high node mobility, and the Optimizer reduced the communication delay by the optimal shortcut formation under any conditions of the experiments and its performance is comparable to the performance upper limit obtained by the brute-force searching.

  • Dynamic Service Chain Construction Based on Model Predictive Control in NFV Environments

    Masaya KUMAZAKI  Masaki OGURA  Takuji TACHIBANA  

     
    PAPER-Network Virtualization

      Pubricized:
    2021/10/15
      Vol:
    E105-B No:4
      Page(s):
    399-410

    For beyond 5G era, in network function virtualization (NFV) environments, service chaining can be utilized to provide the flexible network infrastructures needed to support the creation of various application services. In this paper, we propose a dynamic service chain construction based on model predictive control (MPC) to utilize network resources. In the proposed method, the number of data packets in the buffer at each node is modeled as a dynamical system for MPC. Then, we formulate an optimization problem with the predicted amount of traffic injecting into each service chain from users for the dynamical system. In the optimization problem, the transmission route of each service chain, the node where each VNF is placed, and the amount of resources for each VNF are determined simultaneously by using MPC so that the amount of resources allocated to VNFs and the number of VNF migrations are minimized. In addition, the performance of data transmission is also controlled by considering the maximum amount of data packets stored in buffers. The performance of the proposed method is evaluated by simulation, and the effectiveness of the proposed method with different parameter values is investigated.

  • Experimental Study of Fault Injection Attack on Image Sensor Interface for Triggering Backdoored DNN Models Open Access

    Tatsuya OYAMA  Shunsuke OKURA  Kota YOSHIDA  Takeshi FUJINO  

     
    PAPER

      Pubricized:
    2021/10/26
      Vol:
    E105-A No:3
      Page(s):
    336-343

    A backdoor attack is a type of attack method inducing deep neural network (DNN) misclassification. An adversary mixes poison data, which consist of images tampered with adversarial marks at specific locations and of adversarial target classes, into a training dataset. The backdoor model classifies only images with adversarial marks into an adversarial target class and other images into the correct classes. However, the attack performance degrades sharply when the location of the adversarial marks is slightly shifted. An adversarial mark that induces the misclassification of a DNN is usually applied when a picture is taken, so the backdoor attack will have difficulty succeeding in the physical world because the adversarial mark position fluctuates. This paper proposes a new approach in which an adversarial mark is applied using fault injection on the mobile industry processor interface (MIPI) between an image sensor and the image recognition processor. Two independent attack drivers are electrically connected to the MIPI data lane in our attack system. While almost all image signals are transferred from the sensor to the processor without tampering by canceling the attack signal between the two drivers, the adversarial mark is injected into a given location of the image signal by activating the attack signal generated by the two attack drivers. In an experiment, the DNN was implemented on a Raspberry pi 4 to classify MNIST handwritten images transferred from the image sensor over the MIPI. The adversarial mark successfully appeared in a specific small part of the MNIST images using our attack system. The success rate of the backdoor attack using this adversarial mark was 91%, which is much higher than the 18% rate achieved using conventional input image tampering.

  • User Identification and Channel Estimation by Iterative DNN-Based Decoder on Multiple-Access Fading Channel Open Access

    Lantian WEI  Shan LU  Hiroshi KAMABE  Jun CHENG  

     
    PAPER-Communication Theory and Signals

      Pubricized:
    2021/09/01
      Vol:
    E105-A No:3
      Page(s):
    417-424

    In the user identification (UI) scheme for a multiple-access fading channel based on a randomly generated (0, 1, -1)-signature code, previous studies used the signature code over a noisy multiple-access adder channel, and only the user state information (USI) was decoded by the signature decoder. However, by considering the communication model as a compressed sensing process, it is possible to estimate the channel coefficients while identifying users. In this study, to improve the efficiency of the decoding process, we propose an iterative deep neural network (DNN)-based decoder. Simulation results show that for the randomly generated (0, 1, -1)-signature code, the proposed DNN-based decoder requires less computing time than the classical signal recovery algorithm used in compressed sensing while achieving higher UI and channel estimation (CE) accuracies.

  • Cooperative Recording to Increase Storage Efficiency in Networked Home Appliances

    Eunsam KIM  Jinsung KIM  Hyoseop SHIN  

     
    LETTER-Information Network

      Pubricized:
    2021/12/02
      Vol:
    E105-D No:3
      Page(s):
    727-731

    This paper presents a novel cooperative recording scheme in networked PVRs based on P2P networks to increase storage efficiency compared with when PVRs operate independently of each other, while maintaining program availability to a similar degree. We employ an erasure coding technique to guarantee data availability of recorded programs in P2P networks. We determine the data redundancy degree of recorded programs so that the system can support all the concurrent streaming requests for them and maintain as much availability as needed. We also present how to assign recording tasks to PVRs and playback the recorded programs without performance degradation. We show that our proposed scheme improves the storage efficiency significantly, compared with when PVRs do not cooperate with each other, while keeping the playbackability of each request similarly.

  • Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches

    Kosei SAKAMOTO  Kazuhiko MINEMATSU  Nao SHIBATA  Maki SHIGERI  Hiroyasu KUBO  Takanori ISOBE  

     
    PAPER

      Pubricized:
    2021/12/07
      Vol:
    E105-A No:3
      Page(s):
    278-288

    In spite of the research for a linear layer of Type-2 Generalized Feistel Network (Type-2 GFN) over more than 10 years, finding a good 32-branch permutation for Type-2 GFN is still a very hard task due to a huge search space. In terms of the diffusion property, Suzaki and Minematsu investigated the required number of rounds to achieve the full diffusion when the branch number is up to 16. After that, Derbez et al. presented a class of 32-branch permutations that achieves the 9-round full diffusion and they prove that this is optimal. However, this class is not suitable to be used in Type-2 GFN because it requires a large number of rounds to ensure a sufficient number of active S-boxes. In this paper, we present how to find a good class of 32-branch permutations for Type-2 GFN. To achieve this goal, we convert Type-2 GFN into a LBlock-like structure, and then we evaluate the diffusion property and the resistance against major attacks, such as differential, linear, impossible differential and integral attacks by an MILP. As a result, we present a good class of 32-branch permutations that achieves the 10-round full diffusion, ensures differentially/linearly active S-boxes of 66 at 19 round, and has the 18/20-round impossible differential/integral distinguisher, respectively. The 32-branch permutation used in WARP was chosen among this class.

  • Efficient Computation of Betweenness Centrality by Graph Decompositions and Their Applications to Real-World Networks

    Tatsuya INOHA  Kunihiko SADAKANE  Yushi UNO  Yuma YONEBAYASHI  

     
    PAPER

      Pubricized:
    2021/11/08
      Vol:
    E105-D No:3
      Page(s):
    451-458

    Betweenness centrality is one of the most significant and commonly used centralities, where centrality is a notion of measuring the importance of nodes in networks. In 2001, Brandes proposed an algorithm for computing betweenness centrality efficiently, and it can compute those values for all nodes in O(nm) time for unweighted networks, where n and m denote the number of nodes and links in networks, respectively. However, even Brandes' algorithm is not fast enough for recent large-scale real-world networks, and therefore, much faster algorithms are expected. The objective of this research is to theoretically improve the efficiency of Brandes' algorithm by introducing graph decompositions, and to verify the practical effectiveness of our approaches by implementing them as computer programs and by applying them to various kinds of real-world networks. A series of computational experiments shows that our proposed algorithms run several times faster than the original Brandes' algorithm, which are guaranteed by theoretical analyses.

241-260hit(4507hit)