IEICE Transactions on Information and Systems
Online ISSN : 1745-1361
Print ISSN : 0916-8532
E98.D 巻, 3 号
選択された号の論文の35件中1~35を表示しています
Special Section on Foundations of Computer Science - New Spirits in Theory of Computation and Algorithm -
Special Section on the Architectures, Protocols, and Applications for the Future Internet
  • Yusheng JI
    2015 年E98.D 巻3 号 p. 545
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
  • Shigeo URUSHIDANI, Shunji ABE, Kenjiro YAMANAKA, Kento AIDA, Shigetosh ...
    原稿種別: INVITED PAPER
    2015 年E98.D 巻3 号 p. 546-556
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    This paper describes an architectural design and related services of a new Japanese academic backbone network, called SINET5, which will be launched in April 2016. The network will cover all 47 prefectures with 100-Gigabit Ethernet technology and connect each pair of prefectures with a minimized latency. This will enable users to leverage evolving cloud-computing powers as well as draw on a high-performance platform for data-intensive applications. The transmission layer will form a fully meshed, SDN-friendly, and reliable network. The services will evolve to be more dynamic and cloud-oriented in response to user demands. Cyber-security measures for the backbone network and tools for performance acceleration and visualization are also discussed.
  • Hiroshi SHIMIZU, Hitoshi ASAEDA, Masahiro JIBIKI, Nozomu NISHINAGA
    原稿種別: PAPER
    専門分野: Internet Architecture and Protocols
    2015 年E98.D 巻3 号 p. 557-564
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    How to retrieve the closest content from an in-network cache is one of the most important issues in Information-Centric Networking (ICN). This paper proposes a novel content discovery scheme called Local Tree Hunting (LTH). By adding branch-cast functionality to a local tree for content requests to a Content-Centric Network (CCN) response node, the discovery area for caching nodes expands. Since the location of such a branch-casting node moves closer to the request node when the content is more widely cached, the discovery range, i.e. the branch size of the local tree, becomes smaller. Thus, the discovery area is autonomously adjusted depending on the content dissemination. With this feature, LTH is able to find the “almost true closest” caching node without checking all the caching nodes in the in-network cache. The performance analysis employed in Zipf's law content distribution model and which uses the Least Recently Used eviction rule shows the superiority of LTH with respect to identifying the almost exact closest cache.
  • Satoshi IMAI, Kenji LEIBNITZ, Masayuki MURATA
    原稿種別: PAPER
    専門分野: Internet Architecture and Protocols
    2015 年E98.D 巻3 号 p. 565-577
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    Content caching networks like Information-Centric Networking (ICN) are beneficial to reduce the network traffic by storing content data on routers near to users. In ICN, it becomes an important issue to manage system resources, such as storage and network bandwidth, which are influenced by cache characteristics of each cache node. Meanwhile, cache aging techniques based on Time-To-Live (TTL) of content facilitate analyzing cache characteristics and can realize appropriate resource management by setting efficient TTLs. However, it is difficult to search for the efficient TTLs in a distributed cache system connected by multiple cache nodes. Therefore, we propose an adaptive control mechanism of the TTL value of content in distributed cache systems by using predictive models which can estimate the impact of the TTL values on network resources and cache performance. Furthermore, we show the effectiveness of the proposed mechanism.
  • Masafumi KINOSHITA, Osamu TAKADA, Izumi MIZUTANI, Takafumi KOIKE, Kenj ...
    原稿種別: PAPER
    専門分野: Internet Operation and Management
    2015 年E98.D 巻3 号 p. 578-587
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    In the big data era, messaging systems are required to process large volumes of message traffic with high scalability and availability. However, conventional systems have two issues regarding availability. The first issue is that failover processing itself has a risk of failure. The second issue is to find a trade-off between consistency and availability. We propose a resilient messaging system based on a distributed in-memory key-value store (KVS). Its servers are interconnected with each other and messages are distributed to multiple servers in normal processing state. This architecture can continue messaging services wherever in the messaging system server/process failures occur without using failover processing. Furthermore, we propose two methods for improved resilience: the round-robin method with a slowdown KVS exclusion and the two logical KVS counter-rotating rings to provide short-term-availability in the messaging system. Evaluation results demonstrate that the proposed system can continue service without failover processing. Compared with the conventional method, our proposed distribution method reduced 92% of error responses to clients caused by server failures.
  • Sirikarn PUKKAWANNA, Hiroaki HAZEYAMA, Youki KADOBAYASHI, Suguru YAMAG ...
    原稿種別: PAPER
    専門分野: Internet Operation and Management
    2015 年E98.D 巻3 号 p. 588-595
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    Detecting traffic anomalies is an indispensable component of overall security architecture. As Internet and traffic data with more sophisticated attacks grow exponentially, preserving security with signature-based traffic analyzers or analyzers that do not support massive traffic are not sufficient. In this paper, we propose a novel method based on combined sketch technique and S-transform analysis for detecting anomalies in massive traffic streams. The method does not require any prior knowledge such as attack patterns and models representing normal traffic behavior. To detect anomalies, we summarize the entropy of traffic data over time and maintain the summarized data in sketches. The entropy fluctuation of the traffic data aggregated to the same bucket is observed by S-transform to detect spectral changes referred to as anomalies in this work. We evaluated the performance of the method with real-world backbone traffic collected at the United States and Japan transit link in terms of both accuracy and false positive rates. We also explored the method parameters' influence on detection performance. Furthermore, we compared the performance of our method to S-transform-based and Wavelet-based methods. The results demonstrated that our method was capable of detecting anomalies and overcame both methods. We also found that our method was not sensitive to its parameter settings.
  • Manyi WANG, Zhonglei WANG, Enjie DING, Yun YANG
    原稿種別: PAPER
    専門分野: Network Computing and Applications
    2015 年E98.D 巻3 号 p. 596-606
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    Radio Frequency based Device-Free Localization (RFDFL) is an emerging localization technique without requirements of attaching any electronic device to a target. The target can be localized by means of measuring the shadowing of received signal strength caused by the target. However, the accuracy of RFDFL deteriorates seriously in environment with WiFi interference. State-of-the-art methods do not efficiently solve this problem. In this paper, we propose a dual-band method to improve the accuracy of RFDFL in environment without/with severe WiFi interference. We introduce an algorithm of fusing dual-band images in order to obtain an enhanced image inferring more precise location and propose a timestamp-based synchronization method to associate the dual-band images to ensure their one-one correspondence. With real-world experiments, we show that our method outperforms traditional single-band localization methods and improves the localization accuracy by up to 40.4% in real indoor environment with high WiFi interference.
Regular Section
  • Yuichi SUDO, Toshimitsu MASUZAWA, Gen MOTOYOSHI, Tutomu MURASE
    原稿種別: PAPER
    専門分野: Fundamentals of Information Systems
    2015 年E98.D 巻3 号 p. 607-616
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    Users of wireless mobile devices need Internet access not only when they stay at home or office, but also when they travel. It may be desirable for such users to select a "longcut route" from their current location to his/her destination that has longer travel time than the shortest route, but provides a better mobile wireless environment. In this paper, we formulate the above situation as the optimization problem of “optimal longcut route selection”, which requires us to find the best route concerning the wireless environment subject to a travel time constraint. For this new problem, we show NP-hardness, propose two pseudo-polynomial time algorithms, and experimental evaluation of the algorithms.
  • Chunyan HOU, Chen CHEN, Jinsong WANG, Kai SHI
    原稿種別: PAPER
    専門分野: Software Engineering
    2015 年E98.D 巻3 号 p. 617-626
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    With the rise of component-based software development, its reliability has attracted much attention from both academic and industry communities. Component-based software development focuses on architecture design, and thus it is important for reliability analysis to emphasize software architecture. Existing approaches to architecture-based software reliability analysis don't model the usage profile explicitly, and they ignore the difference between the testing profile and the practical profile of components, which limits their applicability and accuracy. In response to these issues, a new reliability modeling and prediction approach is introduced. The approach considers reliability-related architecture factors by explicitly modeling the system usage profile, and transforms the testing profile into the practical usage profile of components by representing the profile with input sub-domains. Finally, the evaluation experiment shows the potential of the approach.
  • Yuki KASHIWABARA, Takashi ISHIO, Hideaki HATA, Katsuro INOUE
    原稿種別: PAPER
    専門分野: Software Engineering
    2015 年E98.D 巻3 号 p. 627-636
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    It is well-known that program readability is important for maintenance tasks. Method names are important identifiers for program readability because they are used for understanding the behavior of methods without reading a part of the program. Although developers can create a method name by arbitrarily choosing a verb and objects, the names are expected to represent the behavior consistently. However, it is not easy for developers to choose verbs and objects consistently since each developer may have a different notion of a suitable lexicon for method names. In this paper, we propose a technique to recommend candidate verbs for a method name so that developers can use various verbs consistently. We recommend candidate verbs likely to be used as a part of a method name, using association rules extracted from existing methods. To evaluate our technique, we have extracted rules from 445 open source projects written in Java and confirmed the accuracy of our approach by applying the extracted rules to several open source applications. As a result, we found that 84.9% of the considered methods in four projects are recommended the existing verb. Moreover, we found that 73.2% of the actual renamed methods in six projects are recommended the correct verb.
  • Yoon-Ho CHOI, Han-You JEONG, Seung-Woo SEO
    原稿種別: PAPER
    専門分野: Information Network
    2015 年E98.D 巻3 号 p. 637-648
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    During the investment process for enhancing the level of IT security, organizations typically rely on two kinds of security countermeasures, i.e., proactive security countermeasures (PSCs) and reactive security countermeasures (RSCs). The PSCs are known to prevent security incidents before their occurrence, while the RSCs identify security incidents and recover the damaged hardware and software during or after their occurrence. Some researchers studied the effect of the integration of PSCs and RSCs, and showed that the integration can control unwanted incidents better than a single type of security countermeasure. However, the studies were made mostly in a qualitative manner, not in a quantitative manner. In this paper, we focus on deriving a quantitative model that analyzes the influence of different conditions on the efficiency of the integrated security countermeasures. Using the proposed model, we analyze for the first time how vulnerability and the potential exploits resulting from such vulnerability can affect the efficiency of the integrated security countermeasures; furthermore, we analytically verify that as the efficiency of PSCs increases, the burden of RSCs decreases, and vice versa. Also, we describe how to select possibly optimal configurations of the integrated security countermeasures.
  • Chae Chang LEE, Ji Won YOON
    原稿種別: PAPER
    専門分野: Information Network
    2015 年E98.D 巻3 号 p. 649-660
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    In this paper, we present new methods for learning the individual patterns of a card user's transaction amount and the region in which he or she uses the card, for a given period, and for determining whether the specified transaction is allowable in accordance with these learned user transaction patterns. Then, we classify legitimate transactions and fraudulent transactions by setting thresholds based on the learned individual patterns.
  • Ahmed SHALABY, Ikki FUJIWARA, Michihiro KOIBUCHI
    原稿種別: PAPER
    専門分野: Information Network
    2015 年E98.D 巻3 号 p. 661-670
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    Recently network bandwidth becomes a performance concern particularly for collective communication since bisection bandwidths of supercomputers become far less than their full bisection bandwidths. In this context we propose the use of a network coding technique to reduce the number of unicasts and the size of data transferred in latency-sensitive collective communications in supercomputers. Our proposed network coding scheme has a hierarchical multicasting structure with intra-group and inter-group unicasts. Quantitative analysis show that the aggregate path hop counts by our hierarchical network coding decrease as much as 94% when compared to conventional unicast-based multicasts. We validate these results by cycle-accurate network simulations. In 1,024-switch networks, the network reduces the execution time of collective communications as much as 70%. We also show that our hierarchical network coding is beneficial for any packet size.
  • Shinichi SHIRAKAWA
    原稿種別: PAPER
    専門分野: Pattern Recognition
    2015 年E98.D 巻3 号 p. 671-680
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    One of the fast approximate similarity search techniques is a binary hashing method that transforms a real-valued vector into a binary code. The similarity between two binary codes is measured by their Hamming distance. In this method, a hash table is often used when undertaking a constant-time similarity search. The number of accesses to the hash table, however, increases when the number of bits lengthens. In this paper, we consider a method that does not access data with a long Hamming radius by using multiple binary codes. Further, we attempt to integrate the proposed approach and the existing multi-index hashing (MIH) method to accelerate the performance of the similarity search in the Hamming space. Then, we propose a learning method of the binary hash functions for multiple binary codes. We conduct an experiment on similarity search utilizing a dataset of up to 50 million items and show that our proposed method achieves a faster similarity search than that possible with the conventional linear scan and hash table search.
  • Min YAO, Hiroshi NAGAHASHI
    原稿種別: PAPER
    専門分野: Image Recognition, Computer Vision
    2015 年E98.D 巻3 号 p. 681-691
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    Face recognition under variable illumination conditions is a challenging task. Numbers of approaches have been developed for solving the illumination problem. In this paper, we summarize and analyze some noteworthy issues in illumination processing for face recognition by reviewing various representative approaches. These issues include a principle that associates various approaches with a commonly used reflectance model and the shared considerations like contribution of basic processing methods, processing domain, feature scale, and a common problem. We also address a more essential question-what to actually normalize. Through the discussion on these issues, we also provide suggestions on potential directions for future research. In addition, we conduct evaluation experiments on 1) contribution of fundamental illumination correction to illumination insensitive face recognition and 2) comparative performance of various approaches. Experimental results show that the approaches with fundamental illumination correction methods are more insensitive to extreme illumination than without them. Tan and Triggs' method (TT) using L1 norm achieves the best results among nine tested approaches.
  • Sukritta PARIPURANA, Werapon CHIRACHARIT, Kosin CHAMNONGTHAI, Hideo SA ...
    原稿種別: PAPER
    専門分野: Image Recognition, Computer Vision
    2015 年E98.D 巻3 号 p. 692-703
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    In retinal blood vessel extraction through background removal, the vessels in a fundus image which appear in a higher illumination variance area are often missing after the background is removed. This is because the intensity values of the vessel and the background are nearly the same. Thus, the estimated background should be robust to changes of the illumination intensity. This paper proposes retinal blood vessel extraction using background estimation. The estimated background is calculated by using a weight surface fitting method with a high degree polynomial. Bright pixels are defined as unwanted data and are set as zero in a weight matrix. To fit a retinal surface with a higher degree polynomial, fundus images are reduced in size by different scaling parameters in order to reduce the processing time and complexity in calculation. The estimated background is then removed from the original image. The candidate vessel pixels are extracted from the image by using the local threshold values. To identify the true vessel region, the candidate vessel pixels are dilated from the candidate. After that, the active contour without edge method is applied. The experimental results show that the efficiency of the proposed method is higher than the conventional low-pass filter and the conventional surface fitting method. Moreover, rescaling an image down using the scaling parameter at 0.25 before background estimation provides as good a result as a non-rescaled image does. The correlation value between the non-rescaled image and the rescaled image is 0.99. The results of the proposed method in the sensitivity, the specificity, the accuracy, the area under the receiver operating characteristic (ROC) curve (AUC) and the processing time per image are 0.7994, 0.9717, 0.9543, 0.9676 and 1.8320 seconds for the DRIVE database respectively.
  • Yuko OZASA, Mikio NAKANO, Yasuo ARIKI, Naoto IWAHASHI
    原稿種別: PAPER
    専門分野: Multimedia Pattern Processing
    2015 年E98.D 巻3 号 p. 704-711
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    This paper deals with a problem where a robot identifies an object that a human asks it to bring by voice when there is a set of objects that the human and the robot can see. When the robot knows the requested object, it must identify the object and when it does not know the object, it must say it does not. This paper presents a new method for discriminating unknown objects from known objects using object images and human speech. It uses a confidence measure that integrates image recognition confidences and speech recognition confidences based on logistic regression.
  • Ki-Seong LEE, Byung-Woo HONG, Youngmin KIM, Jaeyeop AHN, Chan-Gun LEE
    原稿種別: LETTER
    専門分野: Software Engineering
    2015 年E98.D 巻3 号 p. 712-716
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    Most previous approaches on comparing the results for software architecture recovery are designed to handle only flat decompositions. In this paper, we propose a novel distance called Split-Jaccard Distance of Hierarchical Decompositions. It extends the Jaccard coefficient and incorporates the concept of the splits of leaves in a hierarchical decomposition. We analyze the proposed distance and derive its properties, including the lower-bound and the metric space.
  • Meixu SONG, Jielin PAN, Qingwei ZHAO, Yonghong YAN
    原稿種別: LETTER
    専門分野: Speech and Hearing
    2015 年E98.D 巻3 号 p. 717-720
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    Introducing pronunciation models into decoding has been proven to be benefit to LVCSR. In this paper, a discriminative pronunciation modeling method is presented, within the framework of the Minimum Phone Error (MPE) training for HMM/GMM. In order to bring the pronunciation models into the MPE training, the auxiliary function is rewritten at word level and decomposes into two parts. One is for co-training the acoustic models, and the other is for discriminatively training the pronunciation models. On Mandarin conversational telephone speech recognition task, compared to the baseline using a canonical lexicon, the discriminative pronunciation models reduced the absolute Character Error Rate (CER) by 0.7% on LDC test set, and with the acoustic model co-training, 0.8% additional CER decrease had been achieved.
  • Hanhoon PARK
    原稿種別: LETTER
    専門分野: Image Processing and Video Processing
    2015 年E98.D 巻3 号 p. 721-725
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    In this letter, we propose a simple framework for accelerating a state-of-the-art histogram-based weighted median filter at no expense. It is based on a process of determining the filter processing direction. The determination is achieved by measuring the local feature variation of input images. Through experiments with natural images, it is verified that, depending on input images, the filtering speed can be substantially increased by changing the filtering direction.
  • Pei-Chen WU, Chang Hong LIN
    原稿種別: LETTER
    専門分野: Image Processing and Video Processing
    2015 年E98.D 巻3 号 p. 726-727
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    In this letter, we propose a novel Uniformity-Approximated Histogram Equalization (UAHE) algorithm to enhance the image as well as to preserve the image features. First, the UAHE algorithm generates the image histogram and computes the average value of all bins as the histogram threshold. In order to approximate the uniform histogram, the bins of image histograms greater than the above threshold are clipped, and the subtracted counts are averaged and uniformly assigned to the remaining bins lower than the threshold. The approximated uniform histogram is then applied to generate the intensity transformation function for image contrast enhancement. Experimental results show that our algorithm achieves the maximum entropy as well as the feature similarity values for image contrast enhancement.
  • Hanhoon PARK
    原稿種別: LETTER
    専門分野: Image Processing and Video Processing
    2015 年E98.D 巻3 号 p. 728-732
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    In this letter, we propose a new no-reference blur estimation method in the frequency domain. It is based on computing the cumulative distribution function (CDF) of the Fourier transform spectrum of the blurred image and analyzing the relationship between its shape and the blur strength. From the analysis, we propose and evaluate six curve-shaped analytic metrics for estimating blur strength. Also, we employ an SVM-based learning scheme to improve the accuracy and robustness of the proposed metrics. In our experiments on Gaussian blurred images, one of the six metrics outperformed the others and the standard deviation values between 0 and 6 could be estimated with an estimation error of 0.31 on average.
  • Deokmin HAAM, Hyeon-Gyu KIM, Myoung-Ho KIM
    原稿種別: LETTER
    専門分野: Image Recognition, Computer Vision
    2015 年E98.D 巻3 号 p. 733-736
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    This paper presents a filtering method for efficient face image retrieval over large volume of face databases. The proposed method employs a new face image descriptor, called a cell-orientation vector (COV). It has a simple form: a 72-dimensional vector of integers from 0 to 8. Despite of its simplicity, it achieves high accuracy and efficiency. Our experimental results show that the proposed method based on COVs provides better performance than a recent approach based on identity-based quantization in terms of both accuracy and efficiency.
  • Jong-Seung PARK, Seung-Ho LEE
    原稿種別: LETTER
    専門分野: Image Recognition, Computer Vision
    2015 年E98.D 巻3 号 p. 737-740
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    In this letter, we present a method for automatic mura detection for display film using the efficient decision of cut-off frequency with DCT and mask filtering with wavelet transform. First, the background image including reflected light is estimated using DCT with adaptive cut-off frequency, and DWT is applied to background-removed images for generating mura mask. Then, a mura mask is generated by separating low-frequency noise in the approximation coefficients. Lastly, mura is detected by applying mura mask filtering to the detail coefficients. According to the comparison by Semu index, the results from the proposed method are superior to those from the existing methods. This indicates that the proposed method is high in reliability.
  • Sungchul JUNG, Chang Ha LEE
    原稿種別: LETTER
    専門分野: Computer Graphics
    2015 年E98.D 巻3 号 p. 741-744
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    Displacement mapping has been widely used for adding geometric surface details to 3D mesh models. However, it requires sufficient tessellation of the mesh if fine details are to be represented. In this paper, we propose a method for applying the displacement mapping even on coarse models by using an augmented patch mesh. The patch mesh is a regularly tessellated flat square mesh, which is mapped onto the target area. Our method applies displacement mapping to the patch mesh for fitting it to the original mesh as well as for adding surface details. We generate a patch map, which stores three-dimensional displacements from the patch mesh to the original mesh. A displacement map is also provided for defining the new surface feature. The target area in the original mesh is then replaced with the patch mesh, and the patch mesh reconstructs the original shape using the patch map and the new surface detail is added using the displacement map. Our results show that our method conveniently adds surface features to various models. The proposed method is particularly useful if the surface features change dynamically since the original mesh is preserved and the separate patch mesh overwrites the target area at runtime.
  • Xingri QUAN, Jongwon SEOK, Keunsung BAE
    原稿種別: LETTER
    専門分野: Biological Engineering
    2015 年E98.D 巻3 号 p. 745-748
    発行日: 2015年
    公開日: 2015/03/01
    ジャーナル フリー
    The simplicity is a type of measurement that represents visual simplicity of a signal, regardless of its amplitude and frequency variation. We propose an algorithm that can detect major components of heart sound using Gaussian regression to the smoothed simplicity profile of a heart sound signal. The weight and spread of the Gaussians are used as features to discriminate cardiac murmurs from major components of a heart sound signal. Experimental results show that the proposed method is very promising for robust and accurate detection of major heart sound components as well as cardiac murmurs.
feedback
Top