IEICE Transactions on Information and Systems
Online ISSN : 1745-1361
Print ISSN : 0916-8532
Volume E105.D, Issue 1
Displaying 1-26 of 26 articles from this issue
Special Section on Empirical Software Engineering
  • Shinpei HAYASHI
    2022 Volume E105.D Issue 1 Pages 1
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS
    Download PDF (140K)
  • Daniel Moritz MARUTSCHKE, Victor V. KRYSSANOV, Patricia BROCKMANN
    Article type: PAPER
    2022 Volume E105.D Issue 1 Pages 2-10
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Global software engineering education faces unique challenges to reflect as close as possible real-world distributed team development in various forms. The complex nature of planning, collaborating, and upholding partnerships present administrative difficulties on top of budgetary constrains. These lead to limited opportunities for students to gain international experiences and for researchers to propagate educational and practical insights. This paper presents an empirical view on three different course structures conducted by the same research and educational team over a four-year time span. The courses were managed in Japan and Germany, facing cultural challenges, time-zone differences, language barriers, heterogeneous and homogeneous team structures, amongst others. Three semesters were carried out before and one during the Covid-19 pandemic. Implications for a recent focus on online education for software engineering education and future directions are discussed. As administrational and institutional differences typically do not guarantee the same number of students on all sides, distributed teams can be 1. balanced, where the number of students on one side is less than double the other, 2. unbalanced, where the number of students on one side is significantly larger than double the other, or 3. one-sided, where one side lacks students altogether. An approach for each of these three course structures is presented and discussed. Empirical analyses and reoccurring patterns in global software engineering education are reported. In the most recent three global software engineering classes, students were surveyed at the beginning and the end of the semester. The questionnaires ask students to rank how impactful they perceive factors related to global software development such as cultural aspects, team structure, language, and interaction. Results of the shift in mean perception are compared and discussed for each of the three team structures.

    Download PDF (680K)
  • Syful ISLAM, Dong WANG, Raula GAIKOVINA KULA, Takashi ISHIO, Kenichi M ...
    Article type: PAPER
    2022 Volume E105.D Issue 1 Pages 11-18
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Third-party package usage has become a common practice in contemporary software development. Developers often face different challenges, including choosing the right libraries, installing errors, discrepancies, setting up the environment, and building failures during software development. The risks of maintaining a third-party package are well known, but it is unclear how information from Stack Overflow (SO) can be useful. This paper performed an empirical study to explore npm package co-usage examples from SO. From over 30,000 SO question posts, we extracted 2,100 posts with package usage information and matched them against the 217,934 npm library package. We find that, popular and highly used libraries are not discussed as often in SO. However, we can see that the accepted answers may prove useful, as we believe that the usage examples and executable commands could be reused for tool support.

    Download PDF (1253K)
  • Bodin CHINTHANET, Raula GAIKOVINA KULA, Rodrigo ELIZA ZAPATA, Takashi ...
    Article type: LETTER
    2022 Volume E105.D Issue 1 Pages 19-20
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    It has become common practice for software projects to adopt third-party dependencies. Developers are encouraged to update any outdated dependency to remain safe from potential threats of vulnerabilities. In this study, we present an approach to aid developers show whether or not a vulnerable code is reachable for JavaScript projects. Our prototype, SōjiTantei, is evaluated in two ways (i) the accuracy when compared to a manual approach and (ii) a larger-scale analysis of 780 clients from 78 security vulnerability cases. The first evaluation shows that SōjiTantei has a high accuracy of 83.3%, with a speed of less than a second analysis per client. The second evaluation reveals that 68 out of the studied 78 vulnerabilities reported having at least one clean client. The study proves that automation is promising with the potential for further improvement.

    Download PDF (261K)
  • Yukasa MURAKAMI, Masateru TSUNODA
    Article type: LETTER
    2022 Volume E105.D Issue 1 Pages 21-25
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Although many software engineering studies have been conducted, it is not clear whether they meet the needs of software development practitioners. Some studies evaluated the effectiveness of software engineering research by practitioners, to clarify the research satisfies the needs of the practitioners. We performed replicated study of them, recruiting practitioners who mainly belong to SMEs (small and medium-sized enterprises) to the survey. We asked 16 practitioners to evaluate cutting-edge software engineering studies presented in ICSE 2016. In the survey, we set the viewpoint of the evaluation as the effectiveness for the respondent's own work. As a result, the ratio of positive answers (i.e., the answers were greater than 2 on a 5-point scale) was 33.3%, and the ratio was lower than past studies. The result was not affected by the number of employees in the respondent's company, but would be affected by the viewpoint of the evaluation.

    Download PDF (411K)
  • Jie TAN, Jianmin PANG, Cong LIU
    Article type: LETTER
    2022 Volume E105.D Issue 1 Pages 26-30
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Due to the rapid development of different processors, e.g., x86 and Sunway, software porting between different platforms is becoming more frequent. However, the migrated software's execution efficiency on the target platform is different from that of the source platform, and most of the previous studies have investigated the improvement of the efficiency from the hardware perspective. To the best of our knowledge, this is the first paper to exclusively focus on studying what software factors can result in performance change after software migration. To perform our study, we used SonarQube to detect and measure five software factors, namely Duplicated Lines (DL), Code Smells Density (CSD), Big Functions (BF), Cyclomatic Complexity (CC), and Complex Functions (CF), from 13 selected projects of SPEC CPU2006 benchmark suite. Then, we measured the change of software performance by calculating the acceleration ratio of execution time before (x86) and after (Sunway) software migration. Finally, we performed a multiple linear regression model to analyze the relationship between the software performance change and the software factors. The results indicate that the performance change of software migration from the x86 platform to the Sunway platform is mainly affected by three software factors, i.e., Code Smell Density (CSD), Cyclomatic Complexity (CC), and Complex Functions (CF). The findings can benefit both researchers and practitioners.

    Download PDF (156K)
  • Keitaro NAKASAI, Masateru TSUNODA, Kenichi MATSUMOTO
    Article type: LETTER
    2022 Volume E105.D Issue 1 Pages 31-36
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Software developers often use a web search engine to improve work efficiency. However, web search strategies (e.g., frequently changing web search keywords) may be different for each developer. In this study, we attempted to define a better web search strategy. Although many previous studies analyzed web search behavior in programming, they did not provide guidelines for web search strategies. To suggest guidelines for web search strategies, we asked 10 subjects four questions about programming which they had to solve, and analyzed their behavior. In the analysis, we focused on the subjects' task time and the web search metrics defined by us. Based on our experiment, to enhance the effectiveness of the search, we suggest (1) that one should not go through the next search result pages, (2) the number of keywords in queries should be suppressed, and (3) previously used keywords must be avoided when creating a new query.

    Download PDF (270K)
Special Section on Enriched Multimedia — Multimedia Technologies Enhancing User Experience —
  • Masaki KAWAMURA
    2022 Volume E105.D Issue 1 Pages 37
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS
    Download PDF (126K)
  • Kiyoharu AIZAWA
    Article type: INVITED PAPER
    2022 Volume E105.D Issue 1 Pages 38-45
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    This paper introduces our work on a Movie Map, which will enable users to explore a given city area using 360° videos. Visual exploration of a city is always needed. Nowadays, we are familiar with Google Street View (GSV) that is an interactive visual map. Despite the wide use of GSV, it provides sparse images of streets, which often confuses users and lowers user satisfaction. Forty years ago, a video-based interactive map was created - it is well-known as Aspen Movie Map. Movie Map uses videos instead of sparse images and seems to improve the user experience dramatically. However, Aspen Movie Map was based on analog technology with a huge effort and never built again. Thus, we renovate the Movie Map using state-of-the-art technology. We build a new Movie Map system with an interface for exploring cities. The system consists of four stages; acquisition, analysis, management, and interaction. After acquiring 360° videos along streets in target areas, the analysis of videos is almost automatic. Frames of the video are localized on the map, intersections are detected, and videos are segmented. Turning views at intersections are synthesized. By connecting the video segments following the specified movement in an area, we can watch a walking view along a street. The interface allows for easy exploration of a target area. It can also show virtual billboards in the view.

    Download PDF (4286K)
  • Tetsuya KOJIMA, Kento AKIMOTO
    Article type: PAPER
    2022 Volume E105.D Issue 1 Pages 46-53
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS
    Supplementary material

    Data hiding techniques are usually applied into digital watermarking or digital fingerprinting, which is used to protect intellectual property rights or to avoid illegal copies of the original works. It has been pointed out that data hiding can be utilized as a communication medium. In conventional digital watermarking frameworks, it is required that the difference between the cover objects and the stego objects are quite small, such that the difference cannot be recognized by human sensory systems. On the other hand, the authors have proposed a ‘hearable’ data hiding technique for audio signals that can carry secret messages and can be naturally recognized as a musical piece by human ears. In this study, we extend the idea of the hearable data hiding into video signals by utilizing the visual effects. As visual effects, we employ fade-in and fade-out effects which can be used as a kind of visual rendering for scene transitions. In the proposed schemes, secret messages are generated as one-dimensional barcodes which are used for fade-in or fade-out effects. The present paper shows that the proposed schemes have the high accuracy in extracting the embedded messages even from the video signals captured by smartphones or tablets. It is also shown that the video signals conveying the embedded messages can be naturally recognized by human visual systems through subjective evaluation experiments.

    Download PDF (1779K)
  • Rio KUROKAWA, Kazuki YAMATO, Madoka HASEGAWA
    Article type: PAPER
    2022 Volume E105.D Issue 1 Pages 54-64
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    In recent years, several reversible contrast-enhancement methods for color images using digital watermarking have been proposed. These methods can restore an original image from a contrast-enhanced image, in which the information required to recover the original image is embedded with other payloads. In these methods, the hue component after enhancement is similar to that of the original image. However, the saturation of the image after enhancement is significantly lower than that of the original image, and the obtained image exhibits a pale color tone. Herein, we propose a method for enhancing the contrast and saturation of color images and nearly preserving the hue component in a reversible manner. Our method integrates red, green, and blue histograms and preserves the median value of the integrated components. Consequently, the contrast and saturation improved, whereas the subjective image quality improved. In addition, we confirmed that the hue component of the enhanced image is similar to that of the original image. We also confirmed that the original image was perfectly restored from the enhanced image. Our method can contribute to the field of digital photography as a legal evidence. The required storage space for color images and issues pertaining to evidence management can be reduced considering our method enables the creation of color images before and after the enhancement of one image.

    Download PDF (2494K)
  • Huy H. NGUYEN, Minoru KURIBAYASHI, Junichi YAMAGISHI, Isao ECHIZEN
    Article type: PAPER
    2022 Volume E105.D Issue 1 Pages 65-77
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Deep neural networks (DNNs) have achieved excellent performance on several tasks and have been widely applied in both academia and industry. However, DNNs are vulnerable to adversarial machine learning attacks in which noise is added to the input to change the networks' output. Consequently, DNN-based mission-critical applications such as those used in self-driving vehicles have reduced reliability and could cause severe accidents and damage. Moreover, adversarial examples could be used to poison DNN training data, resulting in corruptions of trained models. Besides the need for detecting adversarial examples, correcting them is important for restoring data and system functionality to normal. We have developed methods for detecting and correcting adversarial images that use multiple image processing operations with multiple parameter values. For detection, we devised a statistical-based method that outperforms the feature squeezing method. For correction, we devised a method that uses for the first time two levels of correction. The first level is label correction, with the focus on restoring the adversarial images' original predicted labels (for use in the current task). The second level is image correction, with the focus on both the correctness and quality of the corrected images (for use in the current and other tasks). Our experiments demonstrated that the correction method could correct nearly 90% of the adversarial images created by classical adversarial attacks and affected only about 2% of the normal images.

    Download PDF (1282K)
Regular Section
  • Isamu HASEGAWA, Tomoyuki YOKOGAWA
    Article type: PAPER
    Subject area: Software System
    2022 Volume E105.D Issue 1 Pages 78-91
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Visual script languages with a node-based interface have commonly been used in the video game industry. We examined the bug database obtained in the development of FINAL FANTASY XV (FFXV), and noticed that several types of bugs were caused by simple mis-descriptions of visual scripts and could therefore be mechanically detected. We propose a method for the automatic verification of visual scripts in order to improve productivity of video game development. Our method can automatically detect those bugs by using symbolic model checking. We show a translation algorithm which can automatically convert a visual script to an input model for NuSMV that is an implementation of symbolic model checking. For a preliminary evaluation, we applied our method to visual scripts used in the production for FFXV. The evaluation results demonstrate that our method can detect bugs of scripts and works well in a reasonable time.

    Download PDF (905K)
  • Kaiho FUKUCHI, Hiroshi YAMADA
    Article type: PAPER
    Subject area: Software System
    2022 Volume E105.D Issue 1 Pages 92-104
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    In infrastructure-as-a-service platforms, cloud users can adjust their database (DB) service scale to dynamic workloads by changing the number of virtual machines running a DB management system (DBMS), called DBMS instances. Replicating a DBMS instance is a non-trivial task since DBMS replication is time-consuming due to the trend that cloud vendors offer high-spec DBMS instances. This paper presents BalenaDB, which performs urgent DBMS replication for handling sudden workload increases. Unlike convectional replication schemes that implicitly assume DBMS replicas are generated on remote machines, BalenaDB generates a warmed-up DBMS replica on an instance running on the local machine where the master DBMS instance runs, by leveraging the master DBMS resources. We prototyped BalenaDB on MySQL 5.6.21, Linux 3.17.2, and Xen 4.4.1. The experimental results show that the time for generating the warmed-up DBMS replica instance on BalenaDB is up to 30× shorter than an existing DBMS instance replication scheme, achieving significantly efficient memory utilization.

    Download PDF (1540K)
  • Keigo TAGA, Junjun ZHENG, Koichi MOURI, Shoichi SAITO, Eiji TAKIMOTO
    Article type: PAPER
    Subject area: Information Network
    2022 Volume E105.D Issue 1 Pages 105-115
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    A wide range of communication protocols has recently been developed to address service diversification. At the same time, firewalls (FWs) are installed at the boundaries between internal networks, such as those owned by companies and homes, and the Internet. In general, FWs are configured as whitelists and release only the port corresponding to the service to be used and block communication from other ports. In a previous study, we proposed a method for traversing a FW and enabling communication by inserting a pseudo-transmission control protocol (TCP) header imitating HTTPS into a packet, which normally would be blocked by the FW. In that study, we confirmed the efficiency of the proposed method via its implementation and experiments. Even though common encapsulating techniques work on end-nodes, the previous implementation worked on the relay node assuming a router. Further, middleboxes, which overwrite L3 and L4 headers on the Internet, need to be taken into consideration. Accordingly, we re-implemented the proposed method into an end-node and added a feature countering a typical middlebox, i.e., NAPT, into our implementation. In this paper, we describe the functional confirmation and performance evaluations of both versions of the proposed method.

    Download PDF (2356K)
  • Akira TANAKA, Masanari NAKAMURA, Hideyuki IMAI
    Article type: PAPER
    Subject area: Artificial Intelligence, Data Mining
    2022 Volume E105.D Issue 1 Pages 116-122
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    The solution of the ordinary kernel ridge regression, based on the squared loss function and the squared norm-based regularizer, can be easily interpreted as a stochastic linear estimator by considering the autocorrelation prior for an unknown true function. As is well known, a stochastic affine estimator is one of the simplest extensions of the stochastic linear estimator. However, its corresponding kernel regression problem is not revealed so far. In this paper, we give a formulation of the kernel regression problem, whose solution is reduced to a stochastic affine estimator, and also give interpretations of the formulation.

    Download PDF (342K)
  • Isana FUNAHASHI, Taichi YOSHIDA, Xi ZHANG, Masahiro IWAHASHI
    Article type: PAPER
    Subject area: Image Processing and Video Processing
    2022 Volume E105.D Issue 1 Pages 123-133
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    In this paper, we propose an image adjustment method for multi-exposure images based on convolutional neural networks (CNNs). We call image regions without information due to saturation and object moving in multi-exposure images lacking areas in this paper. Lacking areas cause the ghosting artifact in fused images from sets of multi-exposure images by conventional fusion methods, which tackle the artifact. To avoid this problem, the proposed method estimates the information of lacking areas via adaptive inpainting. The proposed CNN consists of three networks, warp and refinement, detection, and inpainting networks. The second and third networks detect lacking areas and estimate their pixel values, respectively. In the experiments, it is observed that a simple fusion method with the proposed method outperforms state-of-the-art fusion methods in the peak signal-to-noise ratio. Moreover, the proposed method is applied for various fusion methods as pre-processing, and results show obviously reducing artifacts.

    Download PDF (11505K)
  • Kenshiro TAMATA, Tomohiro MASHITA
    Article type: PAPER
    Subject area: Image Recognition, Computer Vision
    2022 Volume E105.D Issue 1 Pages 134-140
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    A typical approach to reconstructing a 3D environment model is scanning the environment with a depth sensor and fitting the accumulated point cloud to 3D models. In this kind of scenario, a general 3D environment reconstruction application assumes temporally continuous scanning. However in some practical uses, this assumption is unacceptable. Thus, a point cloud matching method for stitching several non-continuous 3D scans is required. Point cloud matching often includes errors in the feature point detection because a point cloud is basically a sparse sampling of the real environment, and it may include quantization errors that cannot be ignored. Moreover, depth sensors tend to have errors due to the reflective properties of the observed surface. We therefore make the assumption that feature point pairs between two point clouds will include errors. In this work, we propose a feature description method robust to the feature point registration error described above. To achieve this goal, we designed a deep learning based feature description model that consists of a local feature description around the feature points and a global feature description of the entire point cloud. To obtain a feature description robust to feature point registration error, we input feature point pairs with errors and train the models with metric learning. Experimental results show that our feature description model can correctly estimate whether the feature point pair is close enough to be considered a match or not even when the feature point registration errors are large, and our model can estimate with higher accuracy in comparison to methods such as FPFH or 3DMatch. In addition, we conducted experiments for combinations of input point clouds, including local or global point clouds, both types of point cloud, and encoders.

    Download PDF (1340K)
  • Kangbo SUN, Jie ZHU
    Article type: PAPER
    Subject area: Image Recognition, Computer Vision
    2022 Volume E105.D Issue 1 Pages 141-149
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Local discriminative regions play important roles in fine-grained image analysis tasks. How to locate local discriminative regions with only category label and learn discriminative representation from these regions have been hot spots. In our work, we propose Searching Discriminative Regions (SDR) and Learning Discriminative Regions (LDR) method to search and learn local discriminative regions in images. The SDR method adopts attention mechanism to iteratively search for high-response regions in images, and uses this as a clue to locate local discriminative regions. Moreover, the LDR method is proposed to learn compact within category and sparse between categories representation from the raw image and local images. Experimental results show that our proposed approach achieves excellent performance in both fine-grained image retrieval and classification tasks, which demonstrates its effectiveness.

    Download PDF (2779K)
  • Naohiro TAWARA, Atsunori OGAWA, Tomoharu IWATA, Hiroto ASHIKAWA, Tetsu ...
    Article type: PAPER
    Subject area: Natural Language Processing
    2022 Volume E105.D Issue 1 Pages 150-160
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Most conventional multi-source domain adaptation techniques for recurrent neural network language models (RNNLMs) are domain-centric. In these approaches, each domain is considered independently and this makes it difficult to apply the models to completely unseen target domains that are unobservable during training. Instead, our study exploits domain attributes, which represent common knowledge among such different domains as dialects, types of wordings, styles, and topics, to achieve domain generalization that can robustly represent unseen target domains by combining the domain attributes. To achieve attribute-based domain generalization system in language modeling, we introduce domain attribute-based experts to a multi-stream RNNLM called recurrent adaptive mixture model (RADMM) instead of domain-based experts. In the proposed system, a long short-term memory is independently trained on each domain attribute as an expert model. Then by integrating the outputs from all the experts in response to the context-dependent weight of the domain attributes of the current input, we predict the subsequent words in the unseen target domain and exploit the specific knowledge of each domain attribute. To demonstrate the effectiveness of our proposed domain attributes-centric language model, we experimentally compared the proposed model with conventional domain-centric language model by using texts taken from multiple domains including different writing styles, topics, dialects, and types of wordings. The experimental results demonstrated that lower perplexity can be achieved using domain attributes.

    Download PDF (4185K)
  • Koji KAMMA, Sarimu INOUE, Toshikazu WADA
    Article type: PAPER
    Subject area: Biocybernetics, Neurocomputing
    2022 Volume E105.D Issue 1 Pages 161-169
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Pruning is an effective technique to reduce computational complexity of Convolutional Neural Networks (CNNs) by removing redundant neurons (or weights). There are two types of pruning methods: holistic pruning and layer-wise pruning. The former selects the least important neuron from the entire model and prunes it. The latter conducts pruning layer by layer. Recently, it has turned out that some layer-wise methods are effective for reducing computational complexity of pruned models while preserving their accuracy. The difficulty of layer-wise pruning is how to adjust pruning ratio (the ratio of neurons to be pruned) in each layer. Because CNNs typically have lots of layers composed of lots of neurons, it is inefficient to tune pruning ratios by human hands. In this paper, we present Pruning Ratio Optimizer (PRO), a method that can be combined with layer-wise pruning methods for optimizing pruning ratios. The idea of PRO is to adjust pruning ratios based on how much pruning in each layer has an impact on the outputs in the final layer. In the experiments, we could verify the effectiveness of PRO.

    Download PDF (620K)
  • Hyun KWON
    Article type: LETTER
    Subject area: Artificial Intelligence, Data Mining
    2022 Volume E105.D Issue 1 Pages 170-174
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Deep neural networks show good performance in image recognition, speech recognition, and pattern analysis. However, deep neural networks show weaknesses, one of which is vulnerability to backdoor attacks. A backdoor attack performs additional training of the target model on backdoor samples that contain a specific trigger so that normal data without the trigger will be correctly classified by the model, but the backdoor samples with the specific trigger will be incorrectly classified by the model. Various studies on such backdoor attacks have been conducted. However, the existing backdoor attack causes misclassification by one classifier. In certain situations, it may be necessary to carry out a selective backdoor attack on a specific model in an environment with multiple models. In this paper, we propose a multi-model selective backdoor attack method that misleads each model to misclassify samples into a different class according to the position of the trigger. The experiment for this study used MNIST and Fashion-MNIST as datasets and TensorFlow as the machine learning library. The results show that the proposed scheme has a 100% average attack success rate for each model while maintaining 97.1% and 90.9% accuracy on the original samples for MNIST and Fashion-MNIST, respectively.

    Download PDF (591K)
  • Zihao SONG, Peng SONG, Chao SHENG, Wenming ZHENG, Wenjing ZHANG, Shaok ...
    Article type: LETTER
    Subject area: Pattern Recognition
    2022 Volume E105.D Issue 1 Pages 175-179
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Unsupervised Feature selection is an important dimensionality reduction technique to cope with high-dimensional data. It does not require prior label information, and has recently attracted much attention. However, it cannot fully utilize the discriminative information of samples, which may affect the feature selection performance. To tackle this problem, in this letter, we propose a novel discriminative virtual label regression method (DVLR) for unsupervised feature selection. In DVLR, we develop a virtual label regression function to guide the subspace learning based feature selection, which can select more discriminative features. Moreover, a linear discriminant analysis (LDA) term is used to make the model be more discriminative. To further make the model be more robust and select more representative features, we impose the 2,1-norm on the regression and feature selection terms. Finally, extensive experiments are carried out on several public datasets, and the results demonstrate that our proposed DVLR achieves better performance than several state-of-the-art unsupervised feature selection methods.

    Download PDF (253K)
  • Weiwei LUO, Wenpeng ZHOU, Jinglong FANG, Lingyan FAN
    Article type: LETTER
    Subject area: Image Processing and Video Processing
    2022 Volume E105.D Issue 1 Pages 180-183
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Recently, channel-aware steganography has been presented for high security. The corresponding selection-channel-aware (SCA) detecting algorithms have also been proposed for improving the detection performance. In this paper, we propose a novel detecting algorithm of JPEG steganography, where the embedding probability and block evaluation are integrated into the new probability. This probability can embody the change due to data embedding. We choose the same high-pass filters as maximum diversity cascade filter residual (MD-CFR) to obtain different image residuals and a weighted histogram method is used to extract detection features. Experimental results on detecting two typical steganographic methods show that the proposed method can improve the performance compared with the state-of-art methods.

    Download PDF (227K)
  • Wenjing ZHANG, Peng SONG, Wenming ZHENG
    Article type: LETTER
    Subject area: Image Recognition, Computer Vision
    2022 Volume E105.D Issue 1 Pages 184-188
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    In this letter, we propose a novel transferable sparse regression (TSR) method, for cross-database facial expression recognition (FER). In TSR, we firstly present a novel regression function to regress the data into a latent representation space instead of a strict binary label space. To further alleviate the influence of outliers and overfitting, we impose a row sparsity constraint on the regression term. And a pairwise relation term is introduced to guide the feature transfer learning. Secondly, we design a global graph to transfer knowledge, which can well preserve the cross-database manifold structure. Moreover, we introduce a low-rank constraint on the graph regularization term to uncover additional structural information. Finally, several experiments are conducted on three popular facial expression databases, and the results validate that the proposed TSR method is superior to other non-deep and deep transfer learning methods.

    Download PDF (100K)
  • Jiayi LI, Lin YANG, Junyan YI, Haichuan YANG, Yuki TODO, Shangce GAO
    Article type: LETTER
    Subject area: Biocybernetics, Neurocomputing
    2022 Volume E105.D Issue 1 Pages 189-192
    Published: January 01, 2022
    Released on J-STAGE: January 01, 2022
    JOURNAL FREE ACCESS

    Differential Evolution (DE) algorithm is simple and effective. Since DE has been proposed, it has been widely used to solve various complex optimization problems. To further exploit the advantages of DE, we propose a new variant of DE, termed as ranking-based differential evolution (RDE), by performing ranking on the population. Progressively better individuals in the population are used for mutation operation, thus improving the algorithm's exploitation and exploration capability. Experimental results on a number of benchmark optimization functions show that RDE significantly outperforms the original DE and performs competitively in comparison with other two state-of-the-art DE variants.

    Download PDF (950K)
feedback
Top