IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Volume E99.A, Issue 12
Displaying 51-61 of 61 articles from this issue
Regular Section
  • Yihang BO, Hao JIANG
    Article type: PAPER
    Subject area: Vision
    2016 Volume E99.A Issue 12 Pages 2547-2557
    Published: December 01, 2016
    Released on J-STAGE: December 01, 2016
    JOURNAL RESTRICTED ACCESS

    In this paper, we propose a novel decomposition method to segment multiple object regions simultaneously in cluttered videos. This method formulates object regions segmentation as a labeling problem in which we assign object IDs to the superpixels in a sequence of video frames so that the unary color matching cost is low, the assignment induces compact segments, and the superpixel labeling is consistent through time. Multi-object segmentation in a video is a combinatorial problem. We propose a binary linear formulation. Since the integer linear programming is hard to solve directly, we relax it and further decompose the relaxation into a sequence of much simpler max-flow problems. The proposed method is guaranteed to converge in a finite number of steps to the global optimum of the relaxation. It also has a high chance to obtain all integer solution and therefore achieves the global optimum. The rounding of the relaxation result gives an N-approximation solution, where N is the number of objects. Comparing to directly solving the integer program, the novel decomposition method speeds up the computation by orders of magnitude. Our experiments show that the proposed method is robust against object pose variation, occlusion and is more accurate than the competing methods while at the same time maintains the efficiency.

    Download PDF (11637K)
  • Weite LI, Bo ZHOU, Benhui CHEN, Jinglu HU
    Article type: PAPER
    Subject area: Neural Networks and Bioengineering
    2016 Volume E99.A Issue 12 Pages 2558-2565
    Published: December 01, 2016
    Released on J-STAGE: December 01, 2016
    JOURNAL RESTRICTED ACCESS

    This paper proposes a deep quasi-linear kernel for support vector machines (SVMs). The deep quasi-linear kernel can be constructed by using a pre-trained deep neural network. To realize this goal, a multilayer gated bilinear classifier is first designed to mimic the functionality of the pre-trained deep neural network, by generating the gate control signals using the deep neural network. Then, a deep quasi-linear kernel is derived by applying an SVM formulation to the multilayer gated bilinear classifier. In this way, we are able to further implicitly optimize the parameters of the multilayer gated bilinear classifier, which are a set of duplicate but independent parameters of the pre-trained deep neural network, by using an SVM optimization. Experimental results on different data sets show that SVMs with the proposed deep quasi-linear kernel have an ability to take advantage of the pre-trained deep neural networks and outperform SVMs with RBF kernels.

    Download PDF (1203K)
  • Bei ZHAO, Chen CHENG, Zhenguo MA, Feng YU
    Article type: LETTER
    Subject area: Digital Signal Processing
    2016 Volume E99.A Issue 12 Pages 2566-2570
    Published: December 01, 2016
    Released on J-STAGE: December 01, 2016
    JOURNAL RESTRICTED ACCESS

    Cross correlation is a general way to estimate time delay of arrival (TDOA), with a computational complexity of O(n log n) using fast Fourier transform. However, since only one spike is required for time delay estimation, complexity can be further reduced. Guided by Chinese Remainder Theorem (CRT), this paper presents a new approach called Co-prime Aliased Sparse FFT (CASFFT) in O(n1-1/d log n) multiplications and O(mn) additions, where m is smooth factor and d is stage number. By adjusting these parameters, it can achieve a balance between runtime and noise robustness. Furthermore, it has clear advantage in parallelism and runtime for a large range of signal-to-noise ratio (SNR) conditions. The accuracy and feasibility of this algorithm is analyzed in theory and verified by experiment.

    Download PDF (347K)
  • Norisato SUGA, Toshihiro FURUKAWA
    Article type: LETTER
    Subject area: Digital Signal Processing
    2016 Volume E99.A Issue 12 Pages 2571-2575
    Published: December 01, 2016
    Released on J-STAGE: December 01, 2016
    JOURNAL RESTRICTED ACCESS

    In this letter, we show the new signal power estimation method base on the subspace projection. This work mainly contributes to the SINR estimation problem because, in this research, the signal power estimation is implicitly or explicitly performed. The difference between our method and the conventional method related to this topic is the exploitation of the subspace character of the signals constructing the observed signal. As tools to perform subspace operation, we apply orthogonal projection and oblique projection which can extracts desired parameters. In the proposed scheme, the statistics of the projected observed signal by these projection are used to estimate the parameters.

    Download PDF (273K)
  • Zhengyu ZHU, Zhongyong WANG, Zheng CHU, Di ZHANG
    Article type: LETTER
    Subject area: Digital Signal Processing
    2016 Volume E99.A Issue 12 Pages 2576-2580
    Published: December 01, 2016
    Released on J-STAGE: December 01, 2016
    JOURNAL RESTRICTED ACCESS

    In this letter, we consider robust beamforming optimization for a multiuser multiple-input single-output system with simultaneous wireless information and power transmission (SWIPT) for the case of imperfect channel state information. Adopting the ellipsoidal uncertainty on channel vector, the robust beamforming design are reformulated as convex semi-definite programming (SDP) by rank-one relaxation. To reduce the complexity, an ellipsoidal uncertainty on channel covariance is studied to derive the equivalent form of original problem. Simulation results are provided to demonstrate the effectiveness of the proposed schemes.

    Download PDF (157K)
  • Shinya NAWATA, Ryo TAKAHASHI, Takashi HIKIHARA
    Article type: LETTER
    Subject area: Systems and Control
    2016 Volume E99.A Issue 12 Pages 2581-2584
    Published: December 01, 2016
    Released on J-STAGE: December 01, 2016
    JOURNAL RESTRICTED ACCESS

    Power packet is a unit of electric power transferred by a pulse with an information tag. This letter discusses up-stream dispatching of required power at loads to sources through density modulation of power packet. Here, power is adjusted at a proposed router which dispatches power packets according to the tags. It is analyzed by averaging method and numerically verified.

    Download PDF (2467K)
  • Donghoon LEE, Jaewook JUNG, Younsung CHOI, Dongho WON
    Article type: LETTER
    Subject area: Cryptography and Information Security
    2016 Volume E99.A Issue 12 Pages 2585-2590
    Published: December 01, 2016
    Released on J-STAGE: December 01, 2016
    JOURNAL RESTRICTED ACCESS

    Return-oriented programming (ROP) attacks, which have been increasing in number recently, are an exploitation technique that can bypass non-executable page protection methods by using codes that exist within benign programs or modules. There have been many studies on defense against ROP attacks, but most of them have high overhead or high time complexity in terms of the detection of gadgets. In this letter, we suggest an ROP defense technique which is fast, space-efficient, and of lower detection time complexity; it uses a compiler-based approach. The most recent ROP defense technique is a compiler-based zero-sum defender suggested by Kim et al., achieving very low overhead. However, it still did not solve the issue of time complexity regarding detection. Our technique performs a specific computation to identify gadgets at the resetting position immediately before and after a return instruction. This method can efficiently identify a series of gadgets performed without calls and defend against them. In our experiment, the performance overhead was 1.62% and the file size overhead was 4.60%; our proposed technique achieved O(1) in terms of time complexity while having almost the same overhead as the zero-sum defender.

    Download PDF (870K)
  • Xueqi ZHANG, Wei WU, Baoyun WANG, Jian LIU
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2016 Volume E99.A Issue 12 Pages 2591-2596
    Published: December 01, 2016
    Released on J-STAGE: December 01, 2016
    JOURNAL RESTRICTED ACCESS

    This letter investigates transmit optimization in multi-user multi-input multi-output (MIMO) wiretap channels. In particular, we address the transmit covariance optimization for an artificial-noise (AN)-aided secrecy rate maximization (SRM) when subject to individual harvested energy and average transmit power. Owing to the inefficiency of the conventional interior-point solvers in handling our formulated SRM problem, a custom-designed algorithm based on penalty function (PF) and projected gradient (PG) is proposed, which results in semi-closed form solutions. The proposed algorithm achieves about two orders of magnitude reduction of running time with nearly the same performance comparing to the existing interior-point solvers. In addition, the proposed algorithm can be extended to other power-limited transmit design problems. Simulation results demonstrate the excellent performance and high efficiency of the algorithm.

    Download PDF (279K)
  • Dechuan CHEN, Weiwei YANG, Jianwei HU, Yueming CAI, Xin LIU
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2016 Volume E99.A Issue 12 Pages 2597-2599
    Published: December 01, 2016
    Released on J-STAGE: December 01, 2016
    JOURNAL RESTRICTED ACCESS

    In this paper, we identify the tradeoff between security and reliability in the amplify-and-forward (AF) distributed beamforming (DBF) cooperative network with K untrusted relays. In particular, we derive the closed-form expressions for the connection outage probability (COP), the secrecy outage probability (SOP), the tradeoff relationship, and the secrecy throughput. Analytical and simulation results demonstrate that increasing K leads to the enhancement of the reliability performance, but the degradation of the security performance. This tradeoff also means that there exists an optimal K maximizing the secrecy throughput.

    Download PDF (165K)
  • Ding XU, Qun LI
    Article type: LETTER
    Subject area: Communication Theory and Signals
    2016 Volume E99.A Issue 12 Pages 2600-2603
    Published: December 01, 2016
    Released on J-STAGE: December 01, 2016
    JOURNAL RESTRICTED ACCESS

    This letter considers a cognitive radio (CR) network where multiple secondary downlinks coexist with a primary network. The primary user (PU) is assumed to be protected by the interference outage constraint with only channel distribution information (CDI) being available at the secondary users (SUs). The power allocation problem to maximize the sum outage capacity of the SUs under the interference outage constraint and the transmit power constraint is investigated. Due to the difficulty in obtaining the optimal solution, we propose a heuristic power allocation algorithm based on the bisection search method that can guarantee to satisfy both the interference outage and the transmit power constraints. It is shown that the proposed algorithm converges fast and outperforms other reference algorithms.

    Download PDF (182K)
  • Xiuping PENG, Jiadong REN, Chengqian XU, Kai LIU
    Article type: LETTER
    Subject area: Spread Spectrum Technologies and Applications
    2016 Volume E99.A Issue 12 Pages 2604-2608
    Published: December 01, 2016
    Released on J-STAGE: December 01, 2016
    JOURNAL RESTRICTED ACCESS

    In this letter, based on cyclic difference sets with parameters $(N,\frac{N-1}{2},\frac{N-3}{4})$ and complex transformations, a method for constructing degree-4 perfect Gaussian integer sequences (PGISs) with good balance property of length $N'\equiv2(\text{mod}4)$ are presented. Furthermore, the elements distribution of the proposed Gaussian integer sequences (GISs) is derived.

    Download PDF (107K)
feedback
Top