The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ALG(2355hit)

2101-2120hit(2355hit)

  • Digital Halftoning Algorithms Based on Optimization Criteria and Their Experimental Evaluation

    Tetsuo ASANO  Desh RANJAN  Thomas ROOS  

     
    PAPER

      Vol:
    E79-A No:4
      Page(s):
    524-532

    Digital halftoning is a well-known technique in image processing to convert an image having several bits for brightness levels into a binary image consisting only of black and white dots. A great number of algorithms have been presented for this problem, some of which have only been evaluated just by comparison with human eyes. In this paper we formulate the digital halftoning problem as a combinatiorial problem which allows an exact solution with graph-theoretic tools. For this, we consider a d-dimensional grid of n := Nd pixels (d 1). For each pixel, we define a so-called k-neighborhood, k {0,...N - 1}, which is the set of at most (2k + 1)d pixels that can be reached from the current pixel in a distance of k. Now, in order to solve the digital halftoning problem, we are going to minimize the sum of distances of all k-neighborhoods between the original picture and the halftoned one. We show that the problem can be solved in linear time in the one-dimensional case while it looks hopeless to have a polynomial-time algorithm in higher dimension including the usual two-dimensional case. We present an exact algorithm for the one-dimensional case which runs in O(n) time if k is regarded to be a constant. For two-dimensional case we present fast approximation techniques based on space filling curves. An experimental comparison of several implementations of approximate algorithms proves that our algorithms are of practical interest.

  • Nonadaptive Fault-Tolerant File Transmission in Rotator Graphs

    Yukihiro HAMADA  Feng BAO  Aohan MEI  Yoshihide IGARASHI  

     
    PAPER

      Vol:
    E79-A No:4
      Page(s):
    477-482

    A directed graph G = (V,E) is called the n-rotator graph if V = {a1a2an|a1a2an is a permutation of 1,2,,n} and E = {(a1a2an,b1b2bn)| for some 2 i n, b1b2bn = a2aia1ai+1an}. We show that for any pair of distinct nodes in the n-rotator graph, we can construct n - 1 disjoint paths, each length < 2n, connecting the two nodes. We propose a nonadaptive fault-tolerant file transmission algorithm which uses these disjoint paths. Then the probabilistic analysis of its reliability is given.

  • Comparisons of Energy-Descent Optimization Algorithms for Maximum Clique Problems

    Nobuo FUNABIKI  Seishi NISHIKAWA  

     
    PAPER

      Vol:
    E79-A No:4
      Page(s):
    452-460

    A clique of a graph G(V,E) is a subset of V such that every pair of vertices is connected by an edge in E. Finding a maximum clique of an arbitrary graph is a well-known NP-complete problem. Recently, several polynomial time energy-descent optimization algorithms have been proposed for approximating the maximum clique problem, where they seek a solution by minimizing the energy function representing the constraints and the goal function. In this paper, we propose the binary neural network as an efficient synchronous energy-descent optimization algorithm. Through two types of random graphs, we compare the performance of four promising energy-descent optimization algorithms. The simulation results show that RaCLIQUE, the modified Boltzmann machine algorithm, is the best asynchronous algorithm for random graphs, while the binary neural network is the best one for k random cliques graphs.

  • Aluminum-Graded-Base PNp AlGaAs/GaAs Heterojunction Transistor with 37 GHz Cut-Off Frequency

    Atsushi KAMEYAMA  Alan MASSENGALE  Changhong DAI  James S. HARRIS, Jr.  

     
    PAPER

      Vol:
    E79-C No:4
      Page(s):
    518-523

    The base transit time of an Aluminum-graded-base PNp AlGaAs/GaAs heterojunction bipolar transistor (HBT) was studied in order to clarify the effect of aluminum grading in the base. Theoretical analysis using a classical drift diffusion model with velocity saturation at the base-collector junction and a high base quasielectric field (58 keV/cm) created by 20%-aluminum linear grading in a 400 base, leads to a base transit time (τb) of 0.9 ps. The base transit time is reduced by four times, compared to the base transit time of 3.6 ps without aluminum grading in the base. In order to demonstrate this advantage, we fabricated aluminum-graded-base PNp AlGaAs/GaAs heterojunction transistor which employs a 20%-aluminum linear graded 400 -wide base. The device with a 2 µm 10 µm emitter showed high RF performance with a cut-off frequency (ft) of 37 GHz and a maximum oscillation frequency (fmax) of 30 GHz at a collector current density of 3.4 104 A/cm2. Further analysis using direct parameter extraction of a small signal circuit model under the collector current density of 1.1-9.9104 A/cm2 indicated the intrinsic transit time, which is the sum of the base transit time and the collector depletion layer transit time (τSC), was as low as 2.3 ps under lowinjection level. Subtracting the collector depletion-layer transit time from the intrinsic time leads to a base transit time of 1.1 ps, which is close to the theoretical base transit time and is the shortest value ever reported. The structure is very attractive for pnp-type AlGaAs HBTs combined with Npn HBTs for complementary applications.

  • An Efficient Parallel Parsing Algorithm for Context-Free Languages Based on Earley's Method

    Kiyotaka ATSUMI  Shigeru MASUYAMA  

     
    PAPER

      Vol:
    E79-A No:4
      Page(s):
    547-552

    We propose a parallel parsing algorithm based on Earley's method, which works in O(log2n) time using O(n4.752) processors on CREW PRAM. This algorithm runs with less number of precessors compared with previously proposed W. Rytter's algorithm.

  • Set-To-Set Fault Tolerant Routing in Hypercudes*

    Qian Ping GU  Satoshi OKAWA  Shietung PENG  

     
    PAPER

      Vol:
    E79-A No:4
      Page(s):
    483-488

    In this paper, we give an algorithm which, given a set F of at most n-k faulty nodes, and two sets S={s1, , sk} and T = {t1,, tk}, 1kn, of non-faulty nodes in n-dimensional hypercubes Hn, finds k fault-tree node disjoint paths sitje, where (j1, , Jk) is a permutation of (1, , k), of length at most n + k in O(kn log k) time. The result of this paper implies that n disjoint paths of length at most 2n for set-to-set node disjoint path problem in Hn can be found in O(n2 log n) time.

  • A Time-Domain Filtering Scheme for the Modified Root-MUSIC Algorithm

    Hiroyoshi YAMADA  Yoshio YAMAGUCHI  Masakazu SENGOKU  

     
    PAPER-Antennas and Propagation

      Vol:
    E79-B No:4
      Page(s):
    595-601

    A new superresolution technique is proposed for high-resolution estimation of the scattering analysis. For complicated multipath propagation environment, it is not enough to estimate only the delay-times of the signals. Some other information should be required to identify the signal path. The proposed method can estimate the frequency characteristic of each signal in addition to its delay-time. One method called modified (Root) MUSIC algorithm is known as a technique that can treat both of the parameters (frequency characteristic and delay-time). However, the method is based on some approximations in the signal decorrelation, that sometimes make problems. Therefore, further modification should be needed to apply the method to the complicated scattering analysis. In this paper, we propose to apply a time-domain null filtering scheme to reduce some of the dominant signal components. It can be shown by a simple experiment that the new technique can enhance estimation accuracy of the frequency characteristic in the Root-MUSIC algorithm.

  • CDV Reduction Shaping Algorithm in ATM Networks

    Kan TOYOSHIMA  

     
    LETTER-Communication Networks and Services

      Vol:
    E79-B No:4
      Page(s):
    602-604

    This letter proposes a new shaping algorithm (CRSA: CDV Reduction Shaping Algorithm) that can freely reduce the maximum CDV value of a cell stream to any predetermined value. There is a trade off between shaping delay and the maximum CDV value reduction achieved when using CRSA. The shaper using CRSA (CR-shaper) output satisfies the Peak Cell Rate Reference Algorithm set with the CR-shaper parameters.

  • Attacking Method on Tanaka's Scheme**

    Kiyomichi ARAKI  Masato NAKAO  

     
    LETTER-Information Security

      Vol:
    E79-D No:3
      Page(s):
    247-248

    In this paper, we show a collusion attack on the novel and sophisticated ID-based non-interactive key sharing scheme proposed by Tanaka [2], [3]. It is based on a linear algebraic approach [4]. We discuss its complexity and provide numerical simulation results of the success probability in forging the shared keys.

  • High-Speed Adaptive Noise Canceller with Parallel Block Structure

    Kiyoyasu MARUYAMA  Chawalit BENJANGKAPRASERT  Nobuaki TAKAHASHI  Tsuyoshi TAKEBE  

     
    PAPER

      Vol:
    E79-A No:3
      Page(s):
    275-282

    An adaptive algorithm for a single sinusoid detection using IIR bandpass filter with parallel block structure has been proposed by Nishimura et al. However, the algorithm has three problems: First, it has several input frequencies being impossible to converge. Secondly, the convergence rate can not be higher than that of the scalar structure. Finally, it has a large amount of computation. In this paper, a new algorithm is proposed to solve these problems. In addition, a new structure is proposed to reduce the amount of computation, in which the adaptive control signal generator is realized by the paralel block structure. Simulation results are given to illustrate the performance of the proposed algorithm.

  • Channel Allocation Algorithms for Multislot TDMA with Multiclass Users

    Theodore BUOT  Fujio WATANABE  

     
    PAPER-Access, Network

      Vol:
    E79-B No:3
      Page(s):
    244-250

    This paper proposed a method of slot allocation in a multislot TDMA system when multiple service priorities are supported. The algorithm is tested both in Variable Rate Reservation Access (VRRA) and Advanced TDMA protocols. We exploit the multislot reservation capability to achieve the delay requirements of each priority level. The channel allocation algorithm assumed that all data terminals are capable of multislot reservation. In this case the delay variance can be controlled based on the packet length information and the accumulated delay of each data user. The performance of the system is evaluated using the cumulative delay distribution and mean overall delays for the different user types.

  • Random Access Algorithm for Users with Multiple Priorities

    Theodore BUOT  Fujio WATANABE  

     
    PAPER-Access, Network

      Vol:
    E79-B No:3
      Page(s):
    237-243

    This paper presents a method of employing a priority scheme in a random access environment. A prioritized nonblocked stack collision resolution algorithm with binary feedback is developed and tested using simulations. The algorithm accommodates an n-level priority scheme which makes it attractive in mobile data systems. The effectiveness of the algorithm is described on its ability to first, reject the lowest priority class when the system load is near or on the maximum value and second, minimize the delay spread of the higher class users. The performance of the algorithm is characterized using the throughput/delay and cumulative delay for each class of users.

  • A Fast and Accurate Algorithm for Computing Desired Eigenpairs of Hermitian Matrices

    Chang Wan JEON  Hyoung Joong KIM  Jang Gyu LEE  

     
    PAPER-Algorithm and Computational Complexity

      Vol:
    E79-D No:3
      Page(s):
    182-188

    A fast and stable algorithm for locating a desired eigenvalue and its corresponding eigenvector is presented. Its effectiveness is shown through a numerical simulation. The proposed algorithm is fast and numerically accurate enough to be applied to a real application.

  • Cumulant-Based Adaptive Deconvolution for Multichannel Tracking

    Mingyong ZHOU  Zhongkan LIU  Hiromitsu HAMA  

     
    PAPER-Algorithm and Computational Complexity

      Vol:
    E79-D No:3
      Page(s):
    177-181

    A cumulant-based lattice algorithm for multichannel adaptive filtering is proposed in this paper. Proposed algorithm takes into account the advantages of higer-order statistics, that is, improvement of estimation accuracy, blindness to colored Gaussian noise and the possibility to estimate the nonminimum-phase system etc. Without invoking the Instrumental Variable () method as used in other papers [1], [2], the algorithm is derived directly from the recursive pseudo-inverse matrix. The behavior of the algorithm is illustrated by numerical examples.

  • Design of Multiplierless 2-D State-Space Digital Filters over a Powers-of-Two Coefficient Space

    Young-Ho LEE  Masayuki KAWAMATA  Tatsuo HIGUCHI  

     
    LETTER

      Vol:
    E79-A No:3
      Page(s):
    374-377

    This letter presents an efficient design method of multiplierless 2-D state-space digital filters (SSDFs) based on a genetic algorithm. The resultant multiplierless 2-D SSDFs, whose coefficients are represented as the sum of two powers-of-two terms, are attractive for high-speed operation and simple implementation. The design problem of multiplierless 2-D SSDFs described by Roesser's local state-space model is formulated subject to the constraint that the resultant filters are stable. To ensure the stability for the resultant 2-D SSDFs, a stability test routine is embedded in th design procedure.

  • Design Algorithm for Virtual Path Based ATM Networks

    Byung Han RYU  Hiroyuki OHSAKI  Masayuki MURATA  Hideo MIYAHAEA  

     
    PAPER-Communication Networks and Services

      Vol:
    E79-B No:2
      Page(s):
    97-107

    An ATM network design algorithm is treated as a resource allocation problem. As an effective way to facilitate a coexistence of traffic with its diverse characteristics and different quality of service (QOS) requirements in ATM networks, a virtual path (VP) concept has been proposed. In attempting to design the VP (Virtual Path)-based ATM network, it requires to consider a network topology and traffic pattern generated from users for minimizing a network construction cost while satisfying QOS requirements such as cell / call loss probabilities and cell delay times. In this paper, we propose a new heuristic design algorithm for the VP-based ATM network under QOS constraints. A minimum bandwidth required to transfer a given amount of traffic is first obtained by utilizing an equivalent bandwidth method. After all the routes of VPs are temporarily established by means of the shortest paths, we try to minimize the network cost through the alternation of VP route, the separation of a single VP into several VPs, and the introduction of VCX nodes. To evaluate our design algorithm, we consider two kinds of traffic; voice traffic as low speed service and still picture traffic as high speed service. Through numerical examples, we demonstrate that our design method can achieve an efficient use of network resources, which results in the cost-effective VP-based ATM network.

  • Message Transfer Algorithms on the Recursive Diagonal Torus

    Yulu YANG  Hideharu AMANO  

     
    PAPER-Computer Systems

      Vol:
    E79-D No:2
      Page(s):
    107-116

    Recursive Diagonal Torus (RDT) is a class of interconnection network for massively parallel computers with 216 nodes. In this paper, message transfer algorithms on the RDT are proposed and discussed. First, a simple one-to-one message routing algorithm called the vector routing is introduced and its practical extension called the floating vector routing is proposed. In the floating vector routing both the diameter and average distance are improved compared with the fixed vector routing. Next, broadcasting and hypercube emulation algorithm scheme on the RDT are shown. Finally, deadlock-free message routing algorithms on the RDT are discussed. By a simple modification of the e-cube routing and a small numbers of additional virtual channels, both one-to-one message transfer and broadcast can be achieved without deadlock.

  • The Best Linear Expression Search of FEAL

    Shiho MORIAI  Kazumaro AOKI  Kazuo OHTA  

     
    PAPER

      Vol:
    E79-A No:1
      Page(s):
    2-11

    It is important to find the best linear expression to estimate the vulnerability of cryptosystems to Linear Cryptanalysis. This paper shows the results of the best linear expressions search of FEAL-N (N32) and discusses the security of FEAL against Linear Cryptanalysis. We improve Matsui's search algorithm which determines the best linear expressions, and apply it to FEAL. The improved search algorithm finds all the best linear expression of FEAL-N (N32) much faster than the original; the required time is decreased from over three months to about two and a half days. We find the best linear expressions of FEAL-7, FEAL-15, and FEAL-31 with deviations of 1.152-8, 1.482-20, and 1.992-41, respectively. These linear expressions have higher deviations than those derived from Bi-ham's 4-round iterative linear approximations. Using these data we calculated the number of known plaintexts required to attack FEAL-8, FEAL-16, and FEAL-32. It is proved that FEAL-32 is secure against Linear Cryptanalysis.

  • Design of 2-D IIR Filter Using the Genetic Algorithm

    Masahiko KISHIDA  Nozomu HAMADA  

     
    LETTER-Digital Signal Processing

      Vol:
    E79-A No:1
      Page(s):
    131-133

    A design method of 2-D lattice digital filter using the Genetic Algorithm (GA) is proposed. By using the GA. 2-D all-pole lattice filter with the cascade connection of transversal (all-zoro) filter is designed directly from a given desired frequency responce.

  • Vision System for Depalletizing Robot Using Genetic Labeling

    Manabu HASHIMOTO  Kazuhiko SUMI  Shin'ichi KURODA  

     
    PAPER

      Vol:
    E78-D No:12
      Page(s):
    1552-1558

    In this paper, we present a vision system for a depalletizing robot which recognizes carton objects. The algorithm consists of the extraction of object candidates and a labeling process to determine whether or not they actually exist. We consider this labeling a combinatorial optimization of labels, we propose a new labeling method applying Genetic Algorithm (GA). GA is an effective optimization method, but it has been inapplicable to real industrial systems because of its processing time and difficulty of finding the global optimum solution. We have solved these problems by using the following guidelines for designing GA: (1) encoding high-level information to chromosomes, such as the existence of object candidates; (2) proposing effective coding method and genetic operations based on the building block hypothesis; and (3) preparing a support procedure in the vision system for compensating for the mis-recognition caused by the pseudo optimum solution in labeling. Here, the hypothesis says that a better solution can be generated by combining parts of good solutions. In our problem, it is expected that a global desirable image interpretation can be obtained by combining subimages interpreted consistently. Through real image experiments, we have proven that the reliability of the vision system we have proposed is more than 98% and the recognition speed is 5 seconds/image, which is practical enough for the real-time robot task.

2101-2120hit(2355hit)