The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] selection(486hit)

41-60hit(486hit)

  • Machine Learning-Based Approach for Depression Detection in Twitter Using Content and Activity Features

    Hatoon S. ALSAGRI  Mourad YKHLEF  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2020/04/24
      Vol:
    E103-D No:8
      Page(s):
    1825-1832

    Social media channels, such as Facebook, Twitter, and Instagram, have altered our world forever. People are now increasingly connected than ever and reveal a sort of digital persona. Although social media certainly has several remarkable features, the demerits are undeniable as well. Recent studies have indicated a correlation between high usage of social media sites and increased depression. The present study aims to exploit machine learning techniques for detecting a probable depressed Twitter user based on both, his/her network behavior and tweets. For this purpose, we trained and tested classifiers to distinguish whether a user is depressed or not using features extracted from his/her activities in the network and tweets. The results showed that the more features are used, the higher are the accuracy and F-measure scores in detecting depressed users. This method is a data-driven, predictive approach for early detection of depression or other mental illnesses. This study's main contribution is the exploration part of the features and its impact on detecting the depression level.

  • Strategy for Improving Target Selection Accuracy in Indirect Touch Input

    Yizhong XIN  Ruonan LIU  Yan LI  

     
    PAPER-Human-computer Interaction

      Pubricized:
    2020/04/10
      Vol:
    E103-D No:7
      Page(s):
    1703-1709

    Aiming at the problem of low accuracy of target selection in indirect touch input, an indirect multi-touch input device was designed and built. We explored here four indirect touch input techniques which were TarConstant, TarEnlarge, TarAttract, TarEnlargeAttract, and investigated their performance when subjects completing the target selection tasks through comparative experiments. Results showed that TarEnlargeAttract enabled the shortest movement time along with the lowest error rate, 2349.9ms and 10.9% respectively. In terms of learning effect, both TarAttract and TarEnlargeAttract had learning effect on movement time, which indicated that the speed of these two techniques can be improved with training. Finally, the strategy of improving the accuracy of indirect touch input was given, which has reference significance for the interface design of indirect touch input.

  • Control Vector Selection for Extended Packetized Predictive Control in Wireless Networked Control Systems

    Keisuke NAKASHIMA  Takahiro MATSUDA  Masaaki NAGAHARA  Tetsuya TAKINE  

     
    PAPER-Network

      Pubricized:
    2020/01/15
      Vol:
    E103-B No:7
      Page(s):
    748-758

    We study wireless networked control systems (WNCSs), where controllers (CLs), controlled objects (COs), and other devices are connected through wireless networks. In WNCSs, COs can become unstable due to bursty packet losses and random delays on wireless networks. To reduce these network-induced effects, we utilize the packetized predictive control (PPC) method, where future control vectors to compensate bursty packet losses are generated in the receiving horizon manner, and they are packed into packets and transferred to a CO unit. In this paper, we extend the PPC method so as to compensate random delays as well as bursty packet losses. In the extended PPC method, generating many control vectors improves the robustness against both problems while it increases traffic on wireless networks. Therefore, we consider control vector selection to improve the robustness effectively under the constraint of single packet transmission. We first reconsider the input strategy of control vectors received by COs and propose a control vector selection scheme suitable for the strategy. In our selection scheme, control vectors are selected based on the estimated average and variance of round-trip delays. Moreover, we solve the problem that the CL may misconceive the CO's state due to insufficient information for state estimation. Simulation results show that our selection scheme achieves the higher robustness against both bursty packet losses and delays in terms of the 2-norm of the CO's state.

  • Stochastic Discrete First-Order Algorithm for Feature Subset Selection

    Kota KUDO  Yuichi TAKANO  Ryo NOMURA  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2020/04/13
      Vol:
    E103-D No:7
      Page(s):
    1693-1702

    This paper addresses the problem of selecting a significant subset of candidate features to use for multiple linear regression. Bertsimas et al. [5] recently proposed the discrete first-order (DFO) algorithm to efficiently find near-optimal solutions to this problem. However, this algorithm is unable to escape from locally optimal solutions. To resolve this, we propose a stochastic discrete first-order (SDFO) algorithm for feature subset selection. In this algorithm, random perturbations are added to a sequence of candidate solutions as a means to escape from locally optimal solutions, which broadens the range of discoverable solutions. Moreover, we derive the optimal step size in the gradient-descent direction to accelerate convergence of the algorithm. We also make effective use of the L2-regularization term to improve the predictive performance of a resultant subset regression model. The simulation results demonstrate that our algorithm substantially outperforms the original DFO algorithm. Our algorithm was superior in predictive performance to lasso and forward stepwise selection as well.

  • Intrusion Detection System Using Deep Learning and Its Application to Wi-Fi Network

    Kwangjo KIM  

     
    INVITED PAPER

      Pubricized:
    2020/03/31
      Vol:
    E103-D No:7
      Page(s):
    1433-1447

    Deep learning is gaining more and more lots of attractions and better performance in implementing the Intrusion Detection System (IDS), especially for feature learning. This paper presents the state-of-the-art advances and challenges in IDS using deep learning models, which have been achieved the big performance enhancements in the field of computer vision, natural language processing, and image/audio processing than the traditional methods. After providing a systematic and methodical description of the latest developments in deep learning from the points of the deployed architectures and techniques, we suggest the pros-and-cons of all the deep learning-based IDS, and discuss the importance of deep learning models as feature learning approach. For this, the author has suggested the concept of the Deep-Feature Extraction and Selection (D-FES). By combining the stacked feature extraction and the weighted feature selection for D-FES, our experiment was verified to get the best performance of detection rate, 99.918% and false alarm rate, 0.012% to detect the impersonation attacks in Wi-Fi network which can be achieved better than the previous publications. Summary and further challenges are suggested as a concluding remark.

  • Multicast UE Selection for Efficient D2D Content Delivery Based on Social Networks

    Yanli XU  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E103-A No:5
      Page(s):
    802-805

    Device-to-device (D2D) content delivery reduces the energy consumption of frequent content retrieval in future content-centric cellular networks based on proximal content delivery. Compared with unicast, multicast may be more efficient since it serves the content requests of multiple users simultaneously. The serving efficiency mainly depends on the selection of multicast transmitter, which has not been well addressed. In this letter, we consider the match degree between the multicast content of transmitter and the required content of receiver based on social relationship between transceivers. By integrating the effects of communication environments and match degree into the selection procedure, a multicast UE selection scheme is proposed to improve the number of benefited receivers from D2D multicast. Simulation results show that the proposed scheme can efficiently improve the performance of D2D multicast content delivery under different communication environments.

  • Outage Performance of Multi-Carrier Relay Selections in Multi-Hop OFDM with Index Modulation

    Pengli YANG  Fuqi MU  

     
    LETTER-Communication Theory and Signals

      Vol:
    E103-A No:3
      Page(s):
    638-642

    In this letter, we adopt two multi-carrier relay selections, i.e., bulk and per-subcarrier (PS), to the multi-hop decode-and-forward relaying orthogonal frequency-division multiplexing with index modulation (OFDM-IM) system. Particularly, in the form of average outage probability (AOP), the influence of joint selection and non-joint selection acting on the last two hops on the system is analyzed. The closed-form expressions of AOPs and the asymptotic AOPs expressions at high signal-to-noise ratio are given and verified by numerical simulations. The results show that both bulk and PS can achieve full diversity order and that PS can provide additional power gain compared to bulk when JS is used. The theoretical analyses in this letter provide an insight into the combination of OFDM-IM and cooperative communication.

  • Enhancing Physical Layer Security Performance in Downlink Cellular Networks through Cooperative Users

    Shijie WANG  Yuanyuan GAO  Xiaochen LIU  Guangna ZHANG  Nan SHA  Mingxi GUO  Kui XU  

     
    LETTER-Graphs and Networks

      Vol:
    E102-A No:12
      Page(s):
    2008-2014

    In this paper, we explore how to enhance the physical layer security performance in downlink cellular networks through cooperative jamming technology. Idle user equipments (UE) are used to cooperatively transmit jamming signal to confuse eavesdroppers (Eve). We propose a threshold-based jammer selection scheme to decide which idle UE should participate in the transmission of jamming signal. Threshold conditions are carefully designed to decrease interference to legitimate channel, while maintain the interference to the Eves. Moreover, fewer UE are activated, which is helpful for saving energy consumptions of cooperative UEs. Analytical expressions of the connection and secrecy performances are derived, which are validated through Monte Carlo simulations. Theoretical and simulation results reveal that our proposed scheme can improve connection performance, while approaches the secrecy performance of [12]. Furthermore, only 43% idle UEs of [12] are used for cooperative jamming, which helps to decrease energy consumption of network.

  • Security Performance Analysis of Joint Multi-Relay and Jammer Selection for Physical-Layer Security under Nakagami-m Fading Channel

    Guangna ZHANG  Yuanyuan GAO  Huadong LUO  Nan SHA  Mingxi GUO  Kui XU  

     
    LETTER-Cryptography and Information Security

      Vol:
    E102-A No:12
      Page(s):
    2015-2020

    In this paper, we investigate a novel joint multi-relay and jammer selection (JMRJS) scheme in order to improve the physical layer security of wireless networks. In the JMRJS scheme, all the relays succeeding in source decoding are selected to assist in the source signal transmission and meanwhile, all the remaining relay nodes are employed to act as friendly jammers to disturb the eavesdroppers by broadcasting artificial noise. Based on the more general Nakagami-m fading channel, we analyze the security performance of the JMRJS scheme for protecting the source signal against eavesdropping. The exact closed-form expressions of outage probability (OP) and intercept probability (IP) for the JMRJS scheme over Nakagami-m fading channel are derived. Moreover, we analyze the security-reliability tradeoff (SRT) of this scheme. Simulation results show that as the number of decode-and-forward (DF)relay nodes increases, the SRT of the JMRJS scheme improves notably. And when the transmit power is below a certain value, the SRT of the JMRJS scheme consistently outperforms the joint single-relay and jammer selection (JSRJS) scheme and joint equal-relay and jammer selection (JERJS) scheme respectively. In addition, the SRT of this scheme is always better than that of the multi-relay selection (MRS) scheme.

  • Decentralized Relay Selection for Large-Scale Dynamic UAVs Networks: A Mood-Driven Approach

    Xijian ZHONG  Yan GUO  Ning LI  Shanling LI  Aihong LU  

     
    LETTER-Communication Theory and Signals

      Vol:
    E102-A No:12
      Page(s):
    2031-2036

    In the large-scale multi-UAV systems, the direct link may be invalid for two remote nodes on account of the constrained power or complex communication environment. Idle UAVs may work as relays between the sources and destinations to enhance communication quality. In this letter, we investigate the opportunistic relay selection for the UAVs dynamic network. On account of the time-varying channel states and the variable numbers of sources and relays, relay selection becomes much more difficult. In addition, information exchange among all nodes may bring much cost and it is difficult to implement in practice. Thus, we propose a decentralized relay selection approach based on mood-driven mechanism to combat the dynamic characteristics, aiming to maximize the total capacity of the network without information exchange. With the proposed approach, the sources can make decisions only according to their own current states and update states according to immediate rewards. Numerical results show that the proposed approach has attractive properties.

  • A Hybrid Feature Selection Method for Software Fault Prediction

    Yiheng JIAN  Xiao YU  Zhou XU  Ziyi MA  

     
    PAPER-Software Engineering

      Pubricized:
    2019/07/09
      Vol:
    E102-D No:10
      Page(s):
    1966-1975

    Fault prediction aims to identify whether a software module is defect-prone or not according to metrics that are mined from software projects. These metric values, also known as features, may involve irrelevance and redundancy, which hurt the performance of fault prediction models. In order to filter out irrelevant and redundant features, a Hybrid Feature Selection (abbreviated as HFS) method for software fault prediction is proposed. The proposed HFS method consists of two major stages. First, HFS groups features with hierarchical agglomerative clustering; second, HFS selects the most valuable features from each cluster to remove irrelevant and redundant ones based on two wrapper based strategies. The empirical evaluation was conducted on 11 widely-studied NASA projects, using three different classifiers with four performance metrics (precision, recall, F-measure, and AUC). Comparison with six filter-based feature selection methods demonstrates that HFS achieves higher average F-measure and AUC values. Compared with two classic wrapper feature selection methods, HFS can obtain a competitive prediction performance in terms of average AUC while significantly reducing the computation cost of the wrapper process.

  • A Fast Cross-Validation Algorithm for Kernel Ridge Regression by Eigenvalue Decomposition

    Akira TANAKA  Hideyuki IMAI  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E102-A No:9
      Page(s):
    1317-1320

    A fast cross-validation algorithm for model selection in kernel ridge regression problems is proposed, which is aiming to further reduce the computational cost of the algorithm proposed by An et al. by eigenvalue decomposition of a Gram matrix.

  • Secure Multiuser Communications with Multiple Untrusted Relays over Nakagami-m Fading Channels

    Dechuan CHEN  Yunpeng CHENG  Weiwei YANG  Jianwei HU  Yueming CAI  Junquan HU  Meng WANG  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E102-A No:8
      Page(s):
    978-981

    In this letter, we investigate the physical layer security in multi-user multi-relay networks, where each relay is not merely a traditional helper, but at the same time, can become a potential eavesdropper. We first propose an efficient low-complexity user and relay selection scheme to significantly reduce the amount of channel estimation as well as the amount of potential links for comparison. For the proposed scheme, we derive the closed-form expression for the lower bound of ergodic secrecy rate (ESR) to evaluate the system secrecy performance. Simulation results are provided to verify the validity of our expressions and demonstrate how the ESR scales with the number of users and relays.

  • Power Allocation Scheme for Energy Efficiency Maximization in Distributed Antenna System with Discrete-Rate Adaptive Modulation

    Xiangbin YU  Xi WANG  Tao TENG  Qiyishu LI  Fei WANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/02/12
      Vol:
    E102-B No:8
      Page(s):
    1705-1714

    In this paper, we study the power allocation (PA) scheme design for energy efficiency (EE) maximization with discrete-rate adaptive modulation (AM) in the downlink distributed antenna system (DAS). By means of the Karush-Kuhn-Tucker (KKT) conditions, an optimal PA scheme with closed-form expression is derived for maximizing the EE subject to maximum transmit power and target bit error rate (BER) constraints, where the number of active transmit antennas is also derived for attaining PA coefficients. Considering that the optimal scheme needs to calculate the PA of all transmit antennas for each modulation mode, its complexity is extremely high. For this reason, a low-complexity suboptimal PA is also presented based on the antenna selection method. By choosing one or two remote antennas, the suboptimal scheme offers lower complexity than the optimal one, and has almost the same EE performance as the latter. Besides, the outage probability is derived in a performance evaluation. Computer simulation shows that the developed optimal scheme can achieve the same EE as the exhaustive search based approach, which has much higher complexity, and the suboptimal scheme almost matches the EE of the optimal one as well. The suboptimal scheme with two-antenna selection is particularly effective in terms of balancing performance and complexity. Moreover, the derived outage probability is in good agreement with the corresponding simulation.

  • Low-Complexity Joint Transmit and Receive Antenna Selection for Transceive Spatial Modulation

    Junshan LUO  Shilian WANG  Qian CHENG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/02/12
      Vol:
    E102-B No:8
      Page(s):
    1695-1704

    Joint transmit and receive antenna selection (JTRAS) for transceive spatial modulation (TRSM) is investigated in this paper. A couple of low-complexity and efficient JTRAS algorithms are proposed to improve the reliability of TRSM systems by maximizing the minimum Euclidean distance (ED) among all received signals. Specifically, the QR decomposition based ED-JTRAS achieves near-optimal error performance with a moderate complexity reduction as compared to the optimal ED-JTRAS method. The singular value decomposition based ED-JTRAS achieves sub-optimal error performance with a significant complexity reduction. Simulation results show that the proposed methods remarkably improve the system reliability in both uncorrelated and spatially correlated Rayleigh fading channels, as compared to the conventional norm based JTRAS method.

  • A New Hybrid Ant Colony Optimization Based on Brain Storm Optimization for Feature Selection

    Haomo LIANG  Zhixue WANG  Yi LIU  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2019/04/12
      Vol:
    E102-D No:7
      Page(s):
    1396-1399

    Machine learning algorithms are becoming more and more popular in current era. Data preprocessing especially feature selection is helpful for improving the performance of those algorithms. A new powerful feature selection algorithm is proposed. It combines the advantages of ant colony optimization and brain storm optimization which simulates the behavior of human beings. Six classical datasets and five state-of-art algorithms are used to make a comparison with our algorithm on binary classification problems. The results on accuracy, percent rate, recall rate, and F1 measures show that the developed algorithm is more excellent. Besides, it is no more complex than the compared approaches.

  • An Effective Feature Selection Scheme for Android ICC-Based Malware Detection Using the Gap of the Appearance Ratio

    Kyohei OSUGE  Hiroya KATO  Shuichiro HARUTA  Iwao SASASE  

     
    PAPER-Dependable Computing

      Pubricized:
    2019/03/12
      Vol:
    E102-D No:6
      Page(s):
    1136-1144

    Android malwares are rapidly becoming a potential threat to users. Among several Android malware detection schemes, the scheme using Inter-Component Communication (ICC) is gathering attention. That scheme extracts numerous ICC-related features to detect malwares by machine learning. In order to mitigate the degradation of detection performance caused by redundant features, Correlation-based Feature Selection (CFS) is applied to feature before machine learning. CFS selects useful features for detection in accordance with the theory that a good feature subset has little correlation with mutual features. However, CFS may remove useful ICC-related features because of strong correlation between them. In this paper, we propose an effective feature selection scheme for Android ICC-based malware detection using the gap of the appearance ratio. We argue that the features frequently appearing in either benign apps or malwares are useful for malware detection, even if they are strongly correlated with each other. To select useful features based on our argument, we introduce the proportion of the appearance ratio of a feature between benign apps and malwares. Since the proportion can represent whether a feature frequently appears in either benign apps or malwares, this metric is useful for feature selection based on our argument. Unfortunately, the proportion is ineffective when a feature appears only once in all apps. Thus, we also introduce the difference of the appearance ratio of a feature between benign apps and malwares. Since the difference simply represents the gap of the appearance ratio, we can select useful features by using this metric when such a situation occurs. By computer simulation with real dataset, we demonstrate our scheme improves detection accuracy by selecting the useful features discarded in the previous scheme.

  • Feature Subset Selection for Ordered Logit Model via Tangent-Plane-Based Approximation

    Mizuho NAGANUMA  Yuichi TAKANO  Ryuhei MIYASHIRO  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2019/02/21
      Vol:
    E102-D No:5
      Page(s):
    1046-1053

    This paper is concerned with a mixed-integer optimization (MIO) approach to selecting a subset of relevant features from among many candidates. For ordinal classification, a sequential logit model and an ordered logit model are often employed. For feature subset selection in the sequential logit model, Sato et al.[22] recently proposed a mixed-integer linear optimization (MILO) formulation. In their MILO formulation, a univariate nonlinear function contained in the sequential logit model was represented by a tangent-line-based approximation. We extend this MILO formulation toward the ordered logit model, which is more commonly used for ordinal classification than the sequential logit model is. Making use of tangent planes to approximate a bivariate nonlinear function involved in the ordered logit model, we derive an MILO formulation for feature subset selection in the ordered logit model. Our computational results verify that the proposed method is superior to the L1-regularized ordered logit model in terms of solution quality.

  • Feature Selection of Deep Learning Models for EEG-Based RSVP Target Detection Open Access

    Jingxia CHEN  Zijing MAO  Ru ZHENG  Yufei HUANG  Lifeng HE  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2019/01/22
      Vol:
    E102-D No:4
      Page(s):
    836-844

    Most recent work used raw electroencephalograph (EEG) data to train deep learning (DL) models, with the assumption that DL models can learn discriminative features by itself. It is not yet clear what kind of RSVP specific features can be selected and combined with EEG raw data to improve the RSVP classification performance of DL models. In this paper, we tried to extract RSVP specific features and combined them with EEG raw data to capture more spatial and temporal correlations of target or non-target event and improve the EEG-based RSVP target detection performance. We tested on X2 Expertise RSVP dataset to show the experiment results. We conducted detailed performance evaluations among different features and feature combinations with traditional classification models and different CNN models for within-subject and cross-subject test. Compared with state-of-the-art traditional Bagging Tree (BT) and Bayesian Linear Discriminant Analysis (BLDA) classifiers, our proposed combined features with CNN models achieved 1.1% better performance in within-subject test and 2% better performance in cross-subject test. This shed light on the ability for the combined features to be an efficient tool in RSVP target detection with deep learning models and thus improved the performance of RSVP target detection.

  • Quantum Algorithm on Logistic Regression Problem

    Jun Suk KIM  Chang Wook AHN  

     
    LETTER-Fundamentals of Information Systems

      Pubricized:
    2019/01/28
      Vol:
    E102-D No:4
      Page(s):
    856-858

    We examine the feasibility of Deutsch-Jozsa Algorithm, a basic quantum algorithm, on a machine learning-based logistic regression problem. Its major property to distinguish the function type with an exponential speedup can help identify the feature unsuitability much more quickly. Although strict conditions and restrictions to abide exist, we reconfirm the quantum superiority in many aspects of modern computing.

41-60hit(486hit)