The search functionality is under construction.

Keyword Search Result

[Keyword] network(4507hit)

41-60hit(4507hit)

  • Network Traffic Anomaly Detection: A Revisiting to Gaussian Process and Sparse Representation

    Yitu WANG  Takayuki NAKACHI  

     
    PAPER-Communication Theory and Signals

      Pubricized:
    2023/06/27
      Vol:
    E107-A No:1
      Page(s):
    125-133

    Seen from the Internet Service Provider (ISP) side, network traffic monitoring is an indispensable part during network service provisioning, which facilitates maintaining the security and reliability of the communication networks. Among the numerous traffic conditions, we should pay extra attention to traffic anomaly, which significantly affects the network performance. With the advancement of Machine Learning (ML), data-driven traffic anomaly detection algorithms have established high reputation due to the high accuracy and generality. However, they are faced with challenges on inefficient traffic feature extraction and high computational complexity, especially when taking the evolving property of traffic process into consideration. In this paper, we proposed an online learning framework for traffic anomaly detection by embracing Gaussian Process (GP) and Sparse Representation (SR) in two steps: 1). To extract traffic features from past records, and better understand these features, we adopt GP with a special kernel, i.e., mixture of Gaussian in the spectral domain, which makes it possible to more accurately model the network traffic for improving the performance of traffic anomaly detection. 2). To combat noise and modeling error, observing the inherent self-similarity and periodicity properties of network traffic, we manually design a feature vector, based on which SR is adopted to perform robust binary classification. Finally, we demonstrate the superiority of the proposed framework in terms of detection accuracy through simulation.

  • Information-Centric Function Chaining for ICN-Based In-Network Computing in the Beyond 5G/6G Era Open Access

    Yusaku HAYAMIZU  Masahiro JIBIKI  Miki YAMAMOTO  

     
    PAPER

      Pubricized:
    2023/10/06
      Vol:
    E107-B No:1
      Page(s):
    94-104

    Information-Centric Networking (ICN) originally innovated for efficient data distribution, is currently discussed to be applied to edge computing environment. In this paper, we focus on a more flexible context, in-network computing, which is enabled by ICN architecture. In ICN-based in-network computing, a function chaining (routing) method for chaining multiple functions located at different routers widely distributed in the network is required. Our proposal is a twofold approach, On-demand Routing for Responsive Route (OR3) and Route Records (RR). OR3 efficiently chains data and multiple functions compared with an existing routing method. RR reactively stores routing information to reduce communication/computing overhead. In this paper, we conducted a mathematical analytics in order to verify the correctness of the proposed routing algorithm. Moreover, we investigate applicabilities of OR3/RR to an edge computing context in the future Beyond 5G/6G era, in which rich computing resources are provided by mobile nodes thanks to the cutting-edge mobile device technologies. In the mobile environments, the optimum from viewpoint of “routing” is largely different from the stable wired environment. We address this challenging issue and newly propose protocol enhancements for OR3 by considering node mobility. Evaluation results reveal that mobility-enhanced OR3 can discover stable paths for function chaining to enable more reliable ICN-based in-network computing under the highly-dynamic network environment.

  • Resource-Efficient and Availability-Aware Service Chaining and VNF Placement with VNF Diversity and Redundancy

    Takanori HARA  Masahiro SASABE  Kento SUGIHARA  Shoji KASAHARA  

     
    PAPER

      Pubricized:
    2023/10/10
      Vol:
    E107-B No:1
      Page(s):
    105-116

    To establish a network service in network functions virtualization (NFV) networks, the orchestrator addresses the challenge of service chaining and virtual network function placement (SC-VNFP) by mapping virtual network functions (VNFs) and virtual links onto physical nodes and links. Unlike traditional networks, network operators in NFV networks must contend with both hardware and software failures in order to ensure resilient network services, as NFV networks consist of physical nodes and software-based VNFs. To guarantee network service quality in NFV networks, the existing work has proposed an approach for the SC-VNFP problem that considers VNF diversity and redundancy. VNF diversity splits a single VNF into multiple lightweight replica instances that possess the same functionality as the original VNF, which are then executed in a distributed manner. VNF redundancy, on the other hand, deploys backup instances with standby mode on physical nodes to prepare for potential VNF failures. However, the existing approach does not adequately consider the tradeoff between resource efficiency and service availability in the context of VNF diversity and redundancy. In this paper, we formulate the SC-VNFP problem with VNF diversity and redundancy as a two-step integer linear program (ILP) that adjusts the balance between service availability and resource efficiency. Through numerical experiments, we demonstrate the fundamental characteristics of the proposed ILP, including the tradeoff between resource efficiency and service availability.

  • A CNN-Based Multi-Scale Pooling Strategy for Acoustic Scene Classification

    Rong HUANG  Yue XIE  

     
    LETTER-Speech and Hearing

      Pubricized:
    2023/10/17
      Vol:
    E107-D No:1
      Page(s):
    153-156

    Acoustic scene classification (ASC) is a fundamental domain within the realm of artificial intelligence classification tasks. ASC-based tasks commonly employ models based on convolutional neural networks (CNNs) that utilize log-Mel spectrograms as input for gathering acoustic features. In this paper, we designed a CNN-based multi-scale pooling (MSP) strategy for ASC. The log-Mel spectrograms are utilized as the input to CNN, which is partitioned into four frequency axis segments. Furthermore, we devised four CNN channels to acquire inputs from distinct frequency ranges. The high-level features extracted from outputs in various frequency bands are integrated through frequency pyramid average pooling layers at multiple levels. Subsequently, a softmax classifier is employed to classify different scenes. Our study demonstrates that the implementation of our designed model leads to a significant enhancement in the model's performance, as evidenced by the testing of two acoustic datasets.

  • CQTXNet: A Modified Xception Network with Attention Modules for Cover Song Identification

    Jinsoo SEO  Junghyun KIM  Hyemi KIM  

     
    LETTER

      Pubricized:
    2023/10/02
      Vol:
    E107-D No:1
      Page(s):
    49-52

    Song-level feature summarization is fundamental for the browsing, retrieval, and indexing of digital music archives. This study proposes a deep neural network model, CQTXNet, for extracting song-level feature summary for cover song identification. CQTXNet incorporates depth-wise separable convolution, residual network connections, and attention models to extend previous approaches. An experimental evaluation of the proposed CQTXNet was performed on two publicly available cover song datasets by varying the number of network layers and the type of attention modules.

  • Frameworks for Privacy-Preserving Federated Learning

    Le Trieu PHONG  Tran Thi PHUONG  Lihua WANG  Seiichi OZAWA  

     
    INVITED PAPER

      Pubricized:
    2023/09/25
      Vol:
    E107-D No:1
      Page(s):
    2-12

    In this paper, we explore privacy-preserving techniques in federated learning, including those can be used with both neural networks and decision trees. We begin by identifying how information can be leaked in federated learning, after which we present methods to address this issue by introducing two privacy-preserving frameworks that encompass many existing privacy-preserving federated learning (PPFL) systems. Through experiments with publicly available financial, medical, and Internet of Things datasets, we demonstrate the effectiveness of privacy-preserving federated learning and its potential to develop highly accurate, secure, and privacy-preserving machine learning systems in real-world scenarios. The findings highlight the importance of considering privacy in the design and implementation of federated learning systems and suggest that privacy-preserving techniques are essential in enabling the development of effective and practical machine learning systems.

  • CCTSS: The Combination of CNN and Transformer with Shared Sublayer for Detection and Classification

    Aorui GOU  Jingjing LIU  Xiaoxiang CHEN  Xiaoyang ZENG  Yibo FAN  

     
    PAPER-Image

      Pubricized:
    2023/07/06
      Vol:
    E107-A No:1
      Page(s):
    141-156

    Convolutional Neural Networks (CNNs) and Transformers have achieved remarkable performance in detection and classification tasks. Nevertheless, their feature extraction cannot consider both local and global information, so the detection and classification performance can be further improved. In addition, more and more deep learning networks are designed as more and more complex, and the amount of computation and storage space required is also significantly increased. This paper proposes a combination of CNN and transformer, and designs a local feature enhancement module and global context modeling module to enhance the cascade network. While the local feature enhancement module increases the range of feature extraction, the global context modeling is used to capture the feature maps' global information. To decrease the model complexity, a shared sublayer is designed to realize the sharing of weight parameters between the adjacent convolutional layers or cross convolutional layers, thereby reducing the number of convolutional weight parameters. Moreover, to effectively improve the detection performance of neural networks without increasing network parameters, the optimal transport assignment approach is proposed to resolve the problem of label assignment. The classification loss and regression loss are the summations of the cost between the demander and supplier. The experiment results demonstrate that the proposed Combination of CNN and Transformer with Shared Sublayer (CCTSS) performs better than the state-of-the-art methods in various datasets and applications.

  • Energy-Efficient One-to-One and Many-to-One Concurrent Transmission for Wireless Sensor Networks

    SenSong HE  Ying QIU  

     
    LETTER-Information Network

      Pubricized:
    2023/09/19
      Vol:
    E106-D No:12
      Page(s):
    2107-2111

    Recent studies have shown that concurrent transmission with precise time synchronization enables reliable and efficient flooding for wireless networks. However, most of them require all nodes in the network to forward packets a fixed number of times to reach the destination, which leads to unnecessary energy consumption in both one-to-one and many-to-one communication scenarios. In this letter, we propose G1M address this issue by reducing redundant packet forwarding in concurrent transmissions. The evaluation of G1M shows that compared with LWB, the average energy consumption of one-to-one and many-to-one transmission is reduced by 37.89% and 25%, respectively.

  • Design of a Dual-Band Load-Modulated Sequential Amplifier with Extended Back-off

    Minghui YOU  Guohua LIU  Zhiqun CHENG  

     
    BRIEF PAPER-Microwaves, Millimeter-Waves

      Pubricized:
    2023/06/07
      Vol:
    E106-C No:12
      Page(s):
    808-811

    This letter presents a dual-band load-modulated sequential amplifier (LMSA). The proposed amplifier changed the attenuator terminated at the isolation port of the four-port combiner of the traditional sequential power amplifier (SPA) architecture into a reactance modulation network (RMN) for load modulation. The impedance can be maintained pure resistance by designing RMN, thus realizing high efficiency and a good portion of the output power in the multiple bands. Compared to the dual-band Doherty power amplifier with a complex dual-band load modulation network (LMN), the proposed LMSA has advantages as maintaining high output power back-off (OBO) efficiency, wide bandwidth and simple construction. A 10-watt dual-band LMSA is simulated and measured in 1.7-1.9GHz and 2.4-2.6GHz with saturated efficiencies 61.2-69.9% and 54.4-70.8%, respectively. The corresponding 9dB OBO efficiency is 46.5-57.1% and 46.4-54.4%, respectively.

  • Optimization Algorithm with Automatic Adjustment of the Number of Switches in the Order/Radix Problem

    Masaki TSUKAMOTO  Yoshiko HANADA  Masahiro NAKAO  Keiji YAMAMOTO  

     
    PAPER

      Pubricized:
    2023/06/12
      Vol:
    E106-D No:12
      Page(s):
    1979-1987

    The Order/Radix Problem (ORP) is an optimization problem that can be solved to find an optimal network topology in distributed memory systems. It is important to find the optimum number of switches in the ORP. In the case of a regular graph, a good estimation of the preferred number of switches has been proposed, and it has been shown that simulated annealing (SA) finds a good solution given a fixed number of switches. However, generally the optimal graph does not necessarily satisfy the regular condition, which greatly increases the computational costs required to find a good solution with a suitable number of switches for each case. This study improved the new method based on SA to find a suitable number of switches. By introducing neighborhood searches in which the number of switches is increased or decreased, our method can optimize a graph by changing the number of switches adaptively during the search. In numerical experiments, we verified that our method shows a good approximation for the best setting for the number of switches, and can simultaneously generate a graph with a small host-to-host average shortest path length, using instances presented by Graph Golf, an international ORP competition.

  • Heuristic-Based Service Chain Construction with Security-Level Management

    Daisuke AMAYA  Takuji TACHIBANA  

     
    PAPER

      Pubricized:
    2023/07/27
      Vol:
    E106-B No:12
      Page(s):
    1380-1391

    Network function virtualization (NFV) technology significantly changes the traditional communication network environments by providing network functions as virtual network functions (VNFs) on commercial off-the-shelf (COTS) servers. Moreover, for using VNFs in a pre-determined sequence to provide each network service, service chaining is essential. A VNF can provide multiple service chains with the corresponding network function, reducing the number of VNFs. However, VNFs might be the source or the target of a cyberattack. If the node where the VNF is installed is attacked, the VNF would also be easily attacked because of its security vulnerabilities. Contrarily, a malicious VNF may attack the node where it is installed, and other VNFs installed on the node may also be attacked. Few studies have been done on the security of VNFs and nodes for service chaining. This study proposes a service chain construction with security-level management. The security-level management concept is introduced to built many service chains. Moreover, the cost optimization problem for service chaining is formulated and the heuristic algorithm is proposed. We demonstrate the effectiveness of the proposed method under certain network topologies using numerical examples.

  • MITA: Multi-Input Adaptive Activation Function for Accurate Binary Neural Network Hardware

    Peiqi ZHANG  Shinya TAKAMAEDA-YAMAZAKI  

     
    PAPER

      Pubricized:
    2023/05/24
      Vol:
    E106-D No:12
      Page(s):
    2006-2014

    Binary Neural Networks (BNN) have binarized neuron and connection values so that their accelerators can be realized by extremely efficient hardware. However, there is a significant accuracy gap between BNNs and networks with wider bit-width. Conventional BNNs binarize feature maps by static globally-unified thresholds, which makes the produced bipolar image lose local details. This paper proposes a multi-input activation function to enable adaptive thresholding for binarizing feature maps: (a) At the algorithm level, instead of operating each input pixel independently, adaptive thresholding dynamically changes the threshold according to surrounding pixels of the target pixel. When optimizing weights, adaptive thresholding is equivalent to an accompanied depth-wise convolution between normal convolution and binarization. Accompanied weights in the depth-wise filters are ternarized and optimized end-to-end. (b) At the hardware level, adaptive thresholding is realized through a multi-input activation function, which is compatible with common accelerator architectures. Compact activation hardware with only one extra accumulator is devised. By equipping the proposed method on FPGA, 4.1% accuracy improvement is achieved on the original BNN with only 1.1% extra LUT resource. Compared with State-of-the-art methods, the proposed idea further increases network accuracy by 0.8% on the Cifar-10 dataset and 0.4% on the ImageNet dataset.

  • Joint Virtual Network Function Deployment and Scheduling via Heuristics and Deep Reinforcement Learning

    Zixiao ZHANG  Eiji OKI  

     
    PAPER-Network

      Pubricized:
    2023/08/01
      Vol:
    E106-B No:12
      Page(s):
    1424-1440

    This paper introduces heuristic approaches and a deep reinforcement learning approach to solve a joint virtual network function deployment and scheduling problem in a dynamic scenario. We formulate the problem as an optimization problem. Based on the mathematical description of the optimization problem, we introduce three heuristic approaches and a deep reinforcement learning approach to solve the problem. We define an objective to maximize the ratio of delay-satisfied requests while minimizing the average resource cost for a dynamic scenario. Our introduced two greedy approaches are named finish time greedy and computational resource greedy, respectively. In the finish time greedy approach, we make each request be finished as soon as possible despite its resource cost; in the computational resource greedy approach, we make each request occupy as few resources as possible despite its finish time. Our introduced simulated annealing approach generates feasible solutions randomly and converges to an approximate solution. In our learning-based approach, neural networks are trained to make decisions. We use a simulated environment to evaluate the performances of our introduced approaches. Numerical results show that the introduced deep reinforcement learning approach has the best performance in terms of benefit in our examined cases.

  • Stackelberg Game for Wireless-Powered Relays Assisted Batteryless IoT Networks

    Yanming CHEN  Bin LYU  Zhen YANG  Fei LI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2023/08/10
      Vol:
    E106-B No:12
      Page(s):
    1479-1490

    In this paper, we investigate a wireless-powered relays assisted batteryless IoT network based on the non-linear energy harvesting model, where there exists an energy service provider constituted by the hybrid access point (HAP) and an IoT service provider constituted by multiple clusters. The HAP provides energy signals to the batteryless devices for information backscattering and the wireless-powered relays for energy harvesting. The relays are deployed to assist the batteryless devices with the information transmission to the HAP by using the harvested energy. To model the energy interactions between the energy service provider and IoT service provider, we propose a Stackelberg game based framework. We aim to maximize the respective utility values of the two providers. Since the utility maximization problem of the IoT service provider is non-convex, we employ the fractional programming theory and propose a block coordinate descent (BCD) based algorithm with successive convex approximation (SCA) and semi-definite relaxation (SDR) techniques to solve it. Numerical simulation results confirm that compared to the benchmark schemes, our proposed scheme can achieve larger utility values for both the energy service provider and IoT service provider.

  • Deep Neural Networks Based End-to-End DOA Estimation System Open Access

    Daniel Akira ANDO  Yuya KASE  Toshihiko NISHIMURA  Takanori SATO  Takeo OHGANE  Yasutaka OGAWA  Junichiro HAGIWARA  

     
    PAPER

      Pubricized:
    2023/09/11
      Vol:
    E106-B No:12
      Page(s):
    1350-1362

    Direction of arrival (DOA) estimation is an antenna array signal processing technique used in, for instance, radar and sonar systems, source localization, and channel state information retrieval. As new applications and use cases appear with the development of next generation mobile communications systems, DOA estimation performance must be continually increased in order to support the nonstop growing demand for wireless technologies. In previous works, we verified that a deep neural network (DNN) trained offline is a strong candidate tool with the promise of achieving great on-grid DOA estimation performance, even compared to traditional algorithms. In this paper, we propose new techniques for further DOA estimation accuracy enhancement incorporating signal-to-noise ratio (SNR) prediction and an end-to-end DOA estimation system, which consists of three components: source number estimator, DOA angular spectrum grid estimator, and DOA detector. Here, we expand the performance of the DOA detector and angular spectrum estimator, and present a new solution for source number estimation based on DNN with very simple design. The proposed DNN system applied with said enhancement techniques has shown great estimation performance regarding the success rate metric for the case of two radio wave sources although not fully satisfactory results are obtained for the case of three sources.

  • Integration of Network and Artificial Intelligence toward the Beyond 5G/6G Networks Open Access

    Atsushi TAGAMI  Takuya MIYASAKA  Masaki SUZUKI  Chikara SASAKI  

     
    INVITED PAPER

      Pubricized:
    2023/07/14
      Vol:
    E106-B No:12
      Page(s):
    1267-1274

    Recently, there has been a surge of interest in Artificial Intelligence (AI) and its applications have been considered in various fields. Mobile networks are becoming an indispensable part of our society, and are considered as one of the promising applications of AI. In the Beyond 5G/6G era, AI will continue to penetrate networks and AI will become an integral part of mobile networks. This paper provides an overview of the collaborations between networks and AI from two categories, “AI for Network” and “Network for AI,” and predicts mobile networks in the B5G/6G era. It is expected that the future mobile network will be an integrated infrastructure, which will not only be a mere application of AI, but also provide as the process infrastructure for AI applications. This integration requires a driving application, and the network operation is one of the leading candidates. Furthermore, the paper describes the latest research and standardization trends in the autonomous networks, which aims to fully automate network operation, as a future network operation concept with AI, and discusses research issues in the future mobile networks.

  • A Nationwide 400-Gbps Backbone Network for Research and Education in Japan Open Access

    Takashi KURIMOTO  Koji SASAYAMA  Osamu AKASHI  Kenjiro YAMANAKA  Naoya KITAGAWA  Shigeo URUSHIDANI  

     
    INVITED PAPER

      Pubricized:
    2023/06/01
      Vol:
    E106-B No:12
      Page(s):
    1275-1285

    This paper describes the architectural design, services, and operation and monitoring functions of Science Information NETwork 6 (SINET6), a 400-Gigabit Ethernet-based academic backbone network launched on a nationwide scale in April 2022. In response to the requirements from universities and research institutions, SINET upgraded its world-class network speed, improved its accessibility, enhanced services and security, incorporated 5G mobile functions, and strengthened international connectivity. With fully-meshed connectivity and fast rerouting, it attains nationwide high performance and high reliability. The evaluation results of network performance are also reported.

  • A Lightweight Reinforcement Learning Based Packet Routing Method Using Online Sequential Learning

    Kenji NEMOTO  Hiroki MATSUTANI  

     
    PAPER-Computer System

      Pubricized:
    2023/08/15
      Vol:
    E106-D No:11
      Page(s):
    1796-1807

    Existing simple routing protocols (e.g., OSPF, RIP) have some disadvantages of being inflexible and prone to congestion due to the concentration of packets on particular routers. To address these issues, packet routing methods using machine learning have been proposed recently. Compared to these algorithms, machine learning based methods can choose a routing path intelligently by learning efficient routes. However, machine learning based methods have a disadvantage of training time overhead. We thus focus on a lightweight machine learning algorithm, OS-ELM (Online Sequential Extreme Learning Machine), to reduce the training time. Although previous work on reinforcement learning using OS-ELM exists, it has a problem of low learning accuracy. In this paper, we propose OS-ELM QN (Q-Network) with a prioritized experience replay buffer to improve the learning performance. It is compared to a deep reinforcement learning based packet routing method using a network simulator. Experimental results show that introducing the experience replay buffer improves the learning performance. OS-ELM QN achieves a 2.33 times speedup than a DQN (Deep Q-Network) in terms of learning speed. Regarding the packet transfer latency, OS-ELM QN is comparable or slightly inferior to the DQN while they are better than OSPF in most cases since they can distribute congestions.

  • MIMO Systems with Neural Networks in OFDM-Based WDM Visible Light Communications

    Naoki UMEZAWA  Saeko OSHIBA  

     
    BRIEF PAPER

      Pubricized:
    2023/05/12
      Vol:
    E106-C No:11
      Page(s):
    727-730

    In this paper, we describe a wavelength-division multiplexing visible-light communication (VLC) system using two colored light-emitting diodes (LEDs) with similar emission wavelengths. A multi-input multi-output signal-separation method using a neural network is proposed to cancel the optical cross chatter caused by the spectral overlap of LEDs. The experimental results demonstrate that signal separation using neural networks can be achieved in wavelength-multiplexed VLC systems with a bit error rate of less than 3.8×10-3 (forward error correction limit). Furthermore, the simulation results reveal that the carrier-to-noise ratio (CNR) is improved by 2dB for the successive interference canceller (SIC) compared to the zero-forcing method.

  • Enhancing Cup-Stacking Method for Collective Communication

    Takashi YOKOTA  Kanemitsu OOTSU  Shun KOJIMA  

     
    PAPER-Computer System

      Pubricized:
    2023/08/22
      Vol:
    E106-D No:11
      Page(s):
    1808-1821

    An interconnection network is an inevitable component for constructing parallel computers. It connects computation nodes so that the nodes can communicate with each other. As a parallel computation essentially requires inter-node communication according to a parallel algorithm, the interconnection network plays an important role in terms of communication performance. This paper focuses on the collective communication that is frequently performed in parallel computation and this paper addresses the Cup-Stacking method that is proposed in our preceding work. The key issues of the method are splitting a large packet into slices, re-shaping the slice, and stacking the slices, in a genetic algorithm (GA) manner. This paper discusses extending the Cup-Stacking method by introducing additional items (genes) and proposes the extended Cup-Stacking method. Furthermore, this paper places comprehensive discussions on the drawbacks and further optimization of the method. Evaluation results reveal the effectiveness of the extended method, where the proposed method achieves at most seven percent improvement in duration time over the former Cup-Stacking method.

41-60hit(4507hit)