IEICE Transactions on Information and Systems
Online ISSN : 1745-1361
Print ISSN : 0916-8532
Current issue
Displaying 1-13 of 13 articles from this issue
Regular Section
  • Qinghua SHENG, Yu CHENG, Xiaofang HUANG, Changcai LAI, Xiaofeng HUANG, ...
    Article type: PAPER
    Subject area: Computer System
    2024 Volume E107.D Issue 7 Pages 797-806
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    Dependent Quantization (DQ) is a new quantization tool introduced in the Versatile Video Coding (VVC) standard. While it provides better rate-distortion calculation accuracy, it also increases the computational complexity and hardware cost compared to the widely used scalar quantization. To address this issue, this paper proposes a parallel-dependent quantization hardware architecture using Verilog HDL language. The architecture preprocesses the coefficients with a scalar quantizer and a high-frequency filter, and then further segments and processes the coefficients in parallel using the Viterbi algorithm. Additionally, the weight bit width of the rate-distortion calculation is reduced to decrease the quantization cycle and computational complexity. Finally, the final quantization of the TU is determined through sequential scanning and judging of the rate-distortion cost. Experimental results show that the proposed algorithm reduces the quantization cycle by an average of 56.96% compared to VVC's reference platform VTM, with a Bjøntegaard delta bit rate (BDBR) loss of 1.03% and 1.05% under the Low-delay P and Random Access configurations, respectively. Verification on the AMD FPGA development platform demonstrates that the hardware implementation meets the quantization requirements for 1080P@60Hz video hardware encoding.

    Download PDF (1943K)
  • Hiroki NAKANO, Daiki CHIBA, Takashi KOIDE, Naoki FUKUSHI, Takeshi YAGI ...
    Article type: PAPER
    Subject area: Information Network
    2024 Volume E107.D Issue 7 Pages 807-824
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    The increase in phishing attacks through email and short message service (SMS) has shown no signs of deceleration. The first thing we need to do to combat the ever-increasing number of phishing attacks is to collect and characterize more phishing cases that reach end users. Without understanding these characteristics, anti-phishing countermeasures cannot evolve. In this study, we propose an approach using Twitter as a new observation point to immediately collect and characterize phishing cases via e-mail and SMS that evade countermeasures and reach users. Specifically, we propose CrowdCanary, a system capable of structurally and accurately extracting phishing information (e.g., URLs and domains) from tweets about phishing by users who have actually discovered or encountered it. In our three months of live operation, CrowdCanary identified 35,432 phishing URLs out of 38,935 phishing reports. We confirmed that 31,960 (90.2%) of these phishing URLs were later detected by the anti-virus engine, demonstrating that CrowdCanary is superior to existing systems in both accuracy and volume of threat extraction. We also analyzed users who shared phishing threats by utilizing the extracted phishing URLs and categorized them into two distinct groups - namely, experts and non-experts. As a result, we found that CrowdCanary could collect information that is specifically included in non-expert reports, such as information shared only by the company brand name in the tweet, information about phishing attacks that we find only in the image of the tweet, and information about the landing page before the redirect. Furthermore, we conducted a detailed analysis of the collected information on phishing sites and discovered that certain biases exist in the domain names and hosting servers of phishing sites, revealing new characteristics useful for unknown phishing site detection.

    Download PDF (4550K)
  • Xiao'an BAO, Shifan ZHOU, Biao WU, Xiaomei TU, Yuting JIN, Qingqi ZHAN ...
    Article type: PAPER
    Subject area: Information Network
    2024 Volume E107.D Issue 7 Pages 825-834
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    With the popularization of software defined networks, switch migration as an important network management strategy has attracted increasing attention. Most existing switch migration strategies only consider local conditions and simple load thresholds, without fully considering the overall optimization and dynamics of the network. Therefore, this article proposes a switch migration algorithm based on global optimization. This algorithm adds a load prediction module to the migration model, determines the migration controller, and uses an improved whale optimization algorithm to determine the target controller and its surrounding controller set. Based on the load status of the controller and the traffic priority of the switch to be migrated, the optimal migration switch set is determined. The experimental results show that compared to existing schemes, the algorithm proposed in this paper improves the average flow processing efficiency by 15% to 40%, reduces switch migration times, and enhances the security of the controller.

    Download PDF (1530K)
  • Beibei LI, Xun RAN, Yiran LIU, Wensheng LI, Qingling DUAN
    Article type: PAPER
    Subject area: Artificial Intelligence, Data Mining
    2024 Volume E107.D Issue 7 Pages 835-844
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    Fish skin color detection plays a critical role in aquaculture. However, challenges arise from image color cast and the limited dataset, impacting the accuracy of the skin color detection process. To address these issues, we proposed a novel fish skin color detection method, termed VH-YOLOv5s. Specifically, we constructed a dataset for fish skin color detection to tackle the limitation posed by the scarcity of available datasets. Additionally, we proposed a Variance Gray World Algorithm (VGWA) to correct the image color cast. Moreover, the designed Hybrid Spatial Pyramid Pooling (HSPP) module effectively performs multi-scale feature fusion, thereby enhancing the feature representation capability. Extensive experiments have demonstrated that VH-YOLOv5s achieves excellent detection results on the Plectropomus leopardus skin color dataset, with a precision of 91.7%, recall of 90.1%, mAP@0.5 of 95.2%, and mAP@0.5:0.95 of 57.5%. When compared to other models such as Centernet, AutoAssign, and YOLOX-s, VH-YOLOv5s exhibits superior detection performance, surpassing them by 2.5%, 1.8%, and 1.7%, respectively. Furthermore, our model can be deployed directly on mobile phones, making it highly suitable for practical applications.

    Download PDF (3892K)
  • Ying-Chang HUNG, Duen-Ren LIU
    Article type: PAPER
    Subject area: Artificial Intelligence, Data Mining
    2024 Volume E107.D Issue 7 Pages 845-856
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    The prediction of peak power load is a critical factor directly impacting the stability of power supply, characterized significantly by its time series nature and intricate ties to the seasonal patterns in electricity usage. Despite its crucial importance, the current landscape of power peak load forecasting remains a multifaceted challenge in the field. This study aims to contribute to this domain by proposing a method that leverages a combination of three primary models - the GRU model, self-attention mechanism, and Transformer mechanism - to forecast peak power load. To contextualize this research within the ongoing discourse, it's essential to consider the evolving methodologies and advancements in power peak load forecasting. By delving into additional references addressing the complexities and current state of the power peak load forecasting problem, this study aims to build upon the existing knowledge base and offer insights into contemporary challenges and strategies adopted within the field. Data preprocessing in this study involves comprehensive cleaning, standardization, and the design of relevant functions to ensure robustness in the predictive modeling process. Additionally, recognizing the necessity to capture temporal changes effectively, this research incorporates features such as “Weekly Moving Average” and “Monthly Moving Average” into the dataset. To evaluate the proposed methodologies comprehensively, this study conducts comparative analyses with established models such as LSTM, Self-attention network, Transformer, ARIMA, and SVR. The outcomes reveal that the models proposed in this study exhibit superior predictive performance compared to these established models, showcasing their effectiveness in accurately forecasting electricity consumption. The significance of this research lies in two primary contributions. Firstly, it introduces an innovative prediction method combining the GRU model, self-attention mechanism, and Transformer mechanism, aligning with the contemporary evolution of predictive modeling techniques in the field. Secondly, it introduces and emphasizes the utility of “Weekly Moving Average” and “Monthly Moving Average” methodologies, crucial in effectively capturing and interpreting seasonal variations within the dataset. By incorporating these features, this study enhances the model's ability to account for seasonal influencing factors, thereby significantly improving the accuracy of peak power load forecasting. This contribution aligns with the ongoing efforts to refine forecasting methodologies and addresses the pertinent challenges within power peak load forecasting.

    Download PDF (3183K)
  • Zhu YIN, Xiaojian MA, Hang WANG
    Article type: PAPER
    Subject area: Office Information Systems, e-Business Modeling
    2024 Volume E107.D Issue 7 Pages 857-868
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    Highly conflicting evidence that may lead to the counter-intuitive results is one of the challenges for information fusion in Dempster-Shafer evidence theory. To deal with this issue, evidence conflict is investigated based on belief divergence measuring the discrepancy between evidence. In this paper, the pignistic probability transform belief χ2 divergence, named as BBχ2 divergence, is proposed. By introducing the pignistic probability transform, the proposed BBχ2 divergence can accurately quantify the difference between evidence with the consideration of multi-element sets. Compared with a few belief divergences, the novel divergence has more precision. Based on this advantageous divergence, a new multi-source information fusion method is devised. The proposed method considers both credibility weights and information volume weights to determine the overall weight of each evidence. Eventually, the proposed method is applied in target recognition and fault diagnosis, in which comparative analysis indicates that the proposed method can realize the highest accuracy for managing evidence conflict.

    Download PDF (9276K)
  • Lei WANG, Shanmin YANG, Jianwei ZHANG, Song GU
    Article type: PAPER
    Subject area: Image Recognition, Computer Vision
    2024 Volume E107.D Issue 7 Pages 869-877
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    Human action recognition (HAR) exhibits limited accuracy in video surveillance due to the 2D information captured with monocular cameras. To address the problem, a depth estimation-based human skeleton action recognition method (SARDE) is proposed in this study, with the aim of transforming 2D human action data into 3D format to dig hidden action clues in the 2D data. SARDE comprises two tasks, i.e., human skeleton action recognition and monocular depth estimation. The two tasks are integrated in a multi-task manner in end-to-end training to comprehensively utilize the correlation between action recognition and depth estimation by sharing parameters to learn the depth features effectively for human action recognition. In this study, graph-structured networks with inception blocks and skip connections are investigated for depth estimation. The experimental results verify the effectiveness and superiority of the proposed method in skeleton action recognition that the method reaches state-of-the-art on the datasets.

    Download PDF (2027K)
  • Min GAO, Gaohua CHEN, Jiaxin GU, Chunmei ZHANG
    Article type: PAPER
    Subject area: Image Recognition, Computer Vision
    2024 Volume E107.D Issue 7 Pages 878-889
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    Wearing a mask correctly is an effective method to prevent respiratory infectious diseases. Correct mask use is a reliable approach for preventing contagious respiratory infections. However, when dealing with mask-wearing in some complex settings, the detection accuracy still needs to be enhanced. The technique for mask-wearing detection based on YOLOv7-Tiny is enhanced in this research. Distribution Shifting Convolutions (DSConv) based on YOLOv7-tiny are used instead of the 3×3 convolution in the original model to simplify computation and increase detection precision. To decrease the loss of coordinate regression and enhance the detection performance, we adopt the loss function Intersection over Union with Minimum Points Distance (MPDIoU) instead of Complete Intersection over Union (CIoU) in the original model. The model is introduced with the GSConv and VoVGSCSP modules, recognizing the model's mobility. The P6 detection layer has been designed to increase detection precision for tiny targets in challenging environments and decrease missed and false positive detection rates. The robustness of the model is increased further by creating and marking a mask-wearing data set in a multi environment that uses Mixup and Mosaic technologies for data augmentation. The efficiency of the model is validated in this research using comparison and ablation experiments on the mask dataset. The results demonstrate that when compared to YOLOv7-tiny, the precision of the enhanced detection algorithm is improved by 5.4%, Recall by 1.8%, mAP@.5 by 3%, mAP@.5:.95 by 1.7%, while the FLOPs is decreased by 8.5G. Therefore, the improved detection algorithm realizes more real-time and accurate mask-wearing detection tasks.

    Download PDF (65793K)
  • Hongyun LU, Mengmeng ZHANG, Hongyuan JING, Zhi LIU
    Article type: LETTER
    Subject area: Fundamentals of Information Systems
    2024 Volume E107.D Issue 7 Pages 890-893
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    Currently, the most advanced knowledge distillation models use a metric learning approach based on probability distributions. However, the correlation between supervised probability distributions is typically geometric and implicit, causing inefficiency and an inability to capture structural feature representations among different tasks. To overcome this problem, we propose a knowledge distillation loss using the robust sliced Wasserstein distance with geometric median (GMSW) to estimate the differences between the teacher and student representations. Due to the intuitive geometric properties of GMSW, the student model can effectively learn to align its produced hidden states from the teacher model, thereby establishing a robust correlation among implicit features. In experiment, our method outperforms state-of-the-art models in both high-resource and low-resource settings.

    Download PDF (5146K)
  • Xueying WANG, Yuan HUANG, Xin LONG, Ziji MA
    Article type: LETTER
    Subject area: Fundamentals of Information Systems
    2024 Volume E107.D Issue 7 Pages 894-897
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    In recent years, the increasing complexity of deep network structures has hindered their application in small resource constrained hardware. Therefore, we urgently need to compress and accelerate deep network models. Channel pruning is an effective method to compress deep neural networks. However, most existing channel pruning methods are prone to falling into local optima. In this paper, we propose a channel pruning method via Improved Grey Wolf Optimizer Pruner which called IGWO-Pruner to prune redundant channels of convolutional neural networks. It identifies pruning ratio of each layer by using Improved Grey Wolf algorithm, and then fine-tuning the new pruned network model. In experimental section, we evaluate the proposed method in CIFAR datasets and ILSVRC-2012 with several classical networks, including VGGNet, GoogLeNet and ResNet-18/34/56/152, and experimental results demonstrate the proposed method is able to prune a large number of redundant channels and parameters with rare performance loss.

    Download PDF (364K)
  • SeulA LEE, Jiwoong PARK
    Article type: LETTER
    Subject area: Software System
    2024 Volume E107.D Issue 7 Pages 898-900
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    This paper analyzes performance differences between interrupt-based and polling-based asynchronous I/O interfaces in high CPU contention scenarios. It examines how the choice of I/O Interface can differ depending on the performance of NVMe SSDs, particularly when using PCIe 3.0 and PCIe 4.0-based SSDs.

    Download PDF (237K)
  • Masahiro TADA, Masayuki NISHIDA
    Article type: LETTER
    Subject area: Human-computer Interaction
    2024 Volume E107.D Issue 7 Pages 901-907
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    In this study, we use a vision-based driving monitoring sensor to track drivers' visual scanning behavior, a key factor for preventing traffic accidents. Our system evaluates driver's behaviors by referencing the safety knowledge of professional driving instructors, and provides real-time voice-guided safety advice to encourage safer driving. Our system's evaluation of safe driving behaviors matched the instructor's evaluation with accuracy over 80%.

    Download PDF (7004K)
  • Ryohei KANKE, Masanobu TAKAHASHI
    Article type: LETTER
    Subject area: Image Recognition, Computer Vision
    2024 Volume E107.D Issue 7 Pages 908-911
    Published: July 01, 2024
    Released on J-STAGE: July 01, 2024
    JOURNAL FREE ACCESS

    Amodal Instance Segmentation (AIS) aims to segment the regions of both visible and invisible parts of overlapping objects. The mainstream Mask R-CNN-based methods are unsuitable for thin objects with large overlaps because of their object proposal features with bounding boxes for three reasons. First, capturing the entire shapes of overlapping thin objects is difficult. Second, the bounding boxes of close objects are almost identical. Third, a bounding box contains many objects in most cases. In this paper, we propose a box-free AIS method, Seed-to-Mask, for thin objects with large overlaps. The method specifies a target object using a seed and iteratively extends the segmented region. We have achieved better performance in experiments on artificial data consisting only of thin objects.

    Download PDF (403K)
feedback
Top