The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ALG(2355hit)

401-420hit(2355hit)

  • GA-MAP: An Error Tolerant Address Mapping Method in Data Center Networks Based on Improved Genetic Algorithm

    Gang DENG  Hong WANG  Zhenghu GONG  Lin CHEN  Xu ZHOU  

     
    PAPER-Network

      Pubricized:
    2015/09/15
      Vol:
    E98-D No:12
      Page(s):
    2071-2081

    Address configuration is a key problem in data center networks. The core issue of automatic address configuration is assigning logical addresses to the physical network according to a blueprint, namely logical-to-device ID mapping, which can be formulated as a graph isomorphic problem and is hard. Recently years, some work has been proposed for this problem, such as DAC and ETAC. DAC adopts a sub-graph isomorphic algorithm. By leveraging the structure characteristic of data center network, DAC can finish the mapping process quickly when there is no malfunction. However, in the presence of any malfunctions, DAC need human effort to correct these malfunctions and thus is time-consuming. ETAC improves on DAC and can finish mapping even in the presence of malfunctions. However, ETAC also suffers from some robustness and efficiency problems. In this paper, we present GA-MAP, a data center networks address mapping algorithm based on genetic algorithm. By intelligently leveraging the structure characteristic of data center networks and the global search characteristic of genetic algorithm, GA-MAP can solve the address mapping problem quickly. Moreover, GA-MAP can even finish address mapping when physical network involved in malfunctions, making it more robust than ETAC. We evaluate GA-MAP via extensive simulation in several of aspects, including computation time, error-tolerance, convergence characteristic and the influence of population size. The simulation results demonstrate that GA-MAP is effective for data center addresses mapping.

  • A Length Matching Routing Algorithm for Set-Pair Routing Problem

    Yuta NAKATANI  Atsushi TAKAHASHI  

     
    PAPER-Physical Level Design

      Vol:
    E98-A No:12
      Page(s):
    2565-2571

    In the routing design of interposer and etc., the combination of a pin pair to be connected by wire is often flexible, and the reductions of the total wire length and the length difference are pursued to keep the circuit performance. Even though the total wire length can be minimized by finding a minimum cost maximum flow in set pair routing problems, the length difference is often large, and the reduction of it is not easy. In this paper, an algorithm that reduces the length difference while keeping the total wire length small is proposed. In the proposed algorithm, an initial routing first obtained by a minimum cost maximum flow. Then it is modified to reduce the maximum length while keeping the minimum total wire length, and a connection of the minimum length is detoured to reduce the length difference. The effectiveness of the proposed algorithm is confirmed by experiments.

  • A Cloud-Friendly Communication-Optimal Implementation for Strassen's Matrix Multiplication Algorithm

    Jie ZHOU  Feng YU  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2015/07/27
      Vol:
    E98-D No:11
      Page(s):
    1896-1905

    Due to its on-demand and pay-as-you-go properties, cloud computing has become an attractive alternative for HPC applications. However, communication-intensive applications with complex communication patterns still cannot be performed efficiently on cloud platforms, which are equipped with MapReduce technologies, such as Hadoop and Spark. In particular, one major obstacle is that MapReduce's simple programming model cannot explicitly manipulate data transfers between compute nodes. Another obstacle is cloud's relatively poor network performance compared with traditional HPC platforms. The traditional Strassen's algorithm of square matrix multiplication has a recursive and complex pattern on the HPC platform. Therefore, it cannot be directly applied to the cloud platform. In this paper, we demonstrate how to make Strassen's algorithm with complex communication patterns “cloud-friendly”. By reorganizing Strassen's algorithm in an iterative pattern, we completely separate its computations and communications, making it fit to MapReduce programming model. By adopting a novel data/task parallel strategy, we solve Strassen's data dependency problems, making it well balanced. This is the first instance of Strassen's algorithm in MapReduce-style systems, which also matches Strassen's communication lower bound. Further experimental results show that it achieves a speedup ranging from 1.03× to 2.50× over the classical Θ(n3) algorithm. We believe the principle can be applied to many other complex scientific applications.

  • On Makespan, Migrations, and QoS Workloads' Execution Times in High Speed Data Centers Open Access

    Daniel LAGO  Edmundo MADEIRA  Deep MEDHI  

     
    INVITED PAPER

      Vol:
    E98-B No:11
      Page(s):
    2099-2110

    With the growth of cloud-based services, cloud data centers are experiencing large growth. A key component in a cloud data center is the network technology deployed. In particular, Ethernet technology, commonly deployed in cloud data centers, is already envisioned for 10 Tbps Ethernet. In this paper, we study and analyze the makespan, workload execution times, and virtual machine migrations as the network speed increases. In particular, we consider homogeneous and heterogeneous data centers, virtual machine scheduling algorithms, and workload scheduling algorithms. Results obtained from our study indicate that the increase in a network's speed reduces makespan and workloads execution times, while aiding in the increase of the number of virtual machine migrations. We further observed that the number of migrations' behaviors in relation to the speed of the networks also depends on the employed virtual machines scheduling algorithm.

  • An Efficient and Universal Conical Hypervolume Evolutionary Algorithm in Three or Higher Dimensional Objective Space

    Weiqin YING  Yuehong XIE  Xing XU  Yu WU  An XU  Zhenyu WANG  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E98-A No:11
      Page(s):
    2330-2335

    The conical area evolutionary algorithm (CAEA) has a very high run-time efficiency for bi-objective optimization, but it can not tackle problems with more than two objectives. In this letter, a conical hypervolume evolutionary algorithm (CHEA) is proposed to extend the CAEA to a higher dimensional objective space. CHEA partitions objective spaces into a series of conical subregions and retains only one elitist individual for every subregion within a compact elitist archive. Additionally, each offspring needs to be compared only with the elitist individual in the same subregion in terms of the local hypervolume scalar indicator. Experimental results on 5-objective test problems have revealed that CHEA can obtain the satisfactory overall performance on both run-time efficiency and solution quality.

  • Network Clock System that Ensures a High Level of Frequency Accuracy

    Shuichi FUJIKAWA  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E98-B No:11
      Page(s):
    2212-2226

    This paper proposes a network clock system that detects degradation in the frequency accuracy of network clocks distributed across a network and finds the sources of the degradation. This system uses two factors to identify degradation in frequency accuracy and an algorithm that finds degradation sources by integrating and analyzing the evaluation results gathered from the entire network. Many frequency stability measurement systems have been proposed, and most are based on time synchronization protocols. These systems also realize avoidance of frequency degradation and identification of the sources of the degradation. Unfortunately, the use of time synchronization protocols is impractical if the service provider, such as NTT, has already installed a frequency synchronization system; the provider must replace massive amounts of equipment with new devices that support the time synchronization protocols. Considering the expenditure of installment, this is an excessive burden on service providers. Therefore, a new system that can detect of frequency degradation in network clocks and identify the degradation causes without requiring new equipment is strongly demanded. The proposals made here are implemented by the installation of new circuit cards in current equipment and installing a server that runs the algorithm. This proposed system is currently being installed in NTT's network.

  • Reduced Complexity Belief Propagation Decoding Algorithm for Polar Codes Based on the Principle of Equal Spacing

    Yinfang HONG  Hui LI  Wenping MA  Xinmei WANG  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E98-B No:9
      Page(s):
    1824-1831

    In the log-likelihood ratio (LLR) domain, the belief propagation (BP) decoding algorithm for polar codes incurs high computation complexity due to the computation of the hyperbolic functions in the node update rules. In this paper, we propose a linear approximation method based on the principle of equal spacing to simplify the hyperbolic functions in the BP decoding algorithm. Our method replaces the computation of hyperbolic functions with addition and multiplication operations in the node update rules. Simulation results show that the performance of the modified BP decoding algorithm is almost the same as the original BP decoding algorithm in the low Signal to Noise Ratio (SNR) region, and in the high SNR region the performance of our method is slightly worse. The modified BP decoding algorithm is only implemented with addition and multiplication operations, which greatly reduces computation complexity, and simplifies hardware implementation.

  • A Compressive Regularization Imaging Algorithm for Millimeter-Wave SAIR

    Yilong ZHANG  Yuehua LI  Guanhua HE  Sheng ZHANG  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2015/05/07
      Vol:
    E98-D No:8
      Page(s):
    1609-1612

    Aperture synthesis technology represents an effective approach to millimeter-wave radiometers for high-resolution observations. However, the application of synthetic aperture imaging radiometer (SAIR) is limited by its large number of antennas, receivers and correlators, which may increase noise and cause the image distortion. To solve those problems, this letter proposes a compressive regularization imaging algorithm, called CRIA, to reconstruct images accurately via combining the sparsity and the energy functional of target space. With randomly selected visibility samples, CRIA employs l1 norm to reconstruct the target brightness temperature and l2 norm to estimate the energy functional of it simultaneously. Comparisons with other algorithms show that CRIA provides higher quality target brightness temperature images at a lower data level.

  • A Cooking-Step Scheduling Algorithm with Guidance System for Homemade Cooking

    Yukiko MATSUSHIMA  Nobuo FUNABIKI  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2015/05/18
      Vol:
    E98-D No:8
      Page(s):
    1439-1448

    Homemade cooking plays a key role for a healthy and cost-efficient life. Unfortunately, preparing multiple dishes is generally time-consuming. In this paper, an algorithm is proposed to minimize the cooking time by scheduling the cooking-step of multiple dishes. The cooking procedure of a dish is divided into a sequence of six types of cooking-steps to consider the constraints in cooks and cooking utensils in a kitchen. A cooking model is presented to optimize the cooking-step schedule and estimate the cooking time for a given starting order of dishes under various constraints of cooks and utensils. Then, a high-quality schedule is sought by repeating the generation of a new order and the model application based on exhaustive search and simulated annealing. Our simulation results and cooking experiments confirm the effectiveness of our proposal.

  • Uplink Non-Orthogonal Multiple Access (NOMA) with Single-Carrier Frequency Division Multiple Access (SC-FDMA) for 5G Systems

    Anxin LI  Anass BENJEBBOUR  Xiaohang CHEN  Huiling JIANG  Hidetoshi KAYAMA  

     
    PAPER

      Vol:
    E98-B No:8
      Page(s):
    1426-1435

    Non-orthogonal multiple access (NOMA) utilizing the power domain and advanced receiver has been considered as one promising multiple access technology for further cellular enhancements toward the 5th generation (5G) mobile communications system. Most of the existing investigations into NOMA focus on the combination of NOMA with orthogonal frequency division multiple access (OFDMA) for either downlink or uplink. In this paper, we investigate NOMA for uplink with single carrier-frequency division multiple access (SC-FDMA) being used. Differently from OFDMA, SC-FDMA requires consecutive resource allocation to a user equipment (UE) in order to achieve low peak to average power ratio (PAPR) transmission by the UE. Therefore, sophisticated designs of scheduling algorithm for NOMA with SC-FDMA are needed. To this end, this paper investigates the key issues of uplink NOMA scheduling such as UE grouping method and resource widening strategy. Because the optimal schemes have high computational complexity, novel schemes with low computational complexity are proposed for practical usage for uplink resource allocation of NOMA with SC-FDMA. On the basis of the proposed scheduling schemes, the performance of NOMA is investigated by system-level simulations in order to provide insights into the suitability of using NOMA for uplink radio access. Key issues impacting NOMA performance are evaluated and analyzed, such as scheduling granularity, UE number and the combination with fractional frequency reuse (FFR). Simulation results verify the effectiveness of the proposed algorithms and show that NOMA is a promising radio access technology for 5G systems.

  • Improvement of the Solving Performance by the Networking of Particle Swarm Optimization

    Tomoyuki SASAKI  Hidehiro NAKANO  Arata MIYAUCHI  Akira TAGUCHI  

     
    PAPER-Nonlinear Problems

      Vol:
    E98-A No:8
      Page(s):
    1777-1786

    This paper presents a particle swarm optimization network (PSON) to improve the search capability of PSO. In PSON, multi-PSOs are connected for the purpose of communication. A variety of network topology can be realized by varying the number of connected PSOs of each PSO. The solving performance and convergence speed can be controlled by changing the network topology. Furthermore, high parallelism is can be realized by assigning PSO to single processor. The stability condition analysis and performance of PSON are shown.

  • Enhanced Bandwidth Allocation Using the Statistics of Arrival (EBACSOA): A Scheduling Algorithm for WiMAX Network

    Hann-Tzong CHERN  Chun-Chieh LEE  Jhih-Syue JHOU  

     
    PAPER-Network

      Vol:
    E98-B No:8
      Page(s):
    1553-1560

    In Worldwide interoperability for Microwave Access (WiMAX) network, QoS(quality of service) is provided for service flows. For this, five classes of services are defined in IEEE 802.16. They are Unsolicited Grant Service (UGS), Extended Real-Time Polling Service (ertPS), Real-Time Polling Service (rtPS), Non Real-Time Polling Service (nrtPS) and Best Effort (BE). For real-time classes, the sent packet has a deadline. As the transmission delay is over the limitation of deadline, the packet becomes useless and will be discarded. Thus, they will be served earlier and have higher probability. Nevertheless, non-real-time packets need also to be served from time to time. The scheduler should assign proper bandwidth for non-real-time flows and send the real-time packets before they are discarded. To deicide the right allocated bandwidth, the arrival rate of each flow is a good parameter for assignment. The average µ and standard deviation σ of arrival rate correspond to the long term need and variation of load for one flow. Thus, we proposed a scheduling algorithm named BAcSOA in which µ+kσ is used as a reference to allocate bandwidth with weighted round robin for one flow [5]. Different classes of flows will be given different values of k which corresponds to the priorities of classes. In this algorithm, flow with higher priority should have larger value of k. The value of k will decide the performance of this class. In this paper, we revise the algorithm to EBAcSOA and propose a mathematical way to decide the value of k for a required performance. Then, a simulation platform is proposed to decide k such that a required performance can be obtained for an operating system. This approach may be different from other researches in which there is no required performance and the performance results are obtained only for several operating points. However, the approach proposed is more practical from the view of an operator and may become an attractive point for other researchers.

  • A New Adaptive Notch Filtering Algorithm Based on Normalized Lattice Structure with Improved Mean Update Term

    Shinichiro NAKAMURA  Shunsuke KOSHITA  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Digital Signal Processing

      Vol:
    E98-A No:7
      Page(s):
    1482-1493

    In this paper, we propose Affine Combination Lattice Algorithm (ACLA) as a new lattice-based adaptive notch filtering algorithm. The ACLA makes use of the affine combination of Regalia's Simplified Lattice Algorithm (SLA) and Lattice Gradient Algorithm (LGA). It is proved that the ACLA has faster convergence speed than the conventional lattice-based algorithms. We conduct this proof by means of theoretical analysis of the mean update term. Specifically, we show that the mean update term of the ACLA is always larger than that of the conventional algorithms. Simulation examples demonstrate the validity of this analytical result and the utility of the ACLA. In addition, we also derive the step-size bound for the ACLA. Furthermore, we show that this step-size bound is characterized by the gradient of the mean update term.

  • Centralized Inter-Cell Interference Coordination Using Multi-Band 3D Beam-Switching in Cellular Networks

    Hiroyuki SEKI  Fumiyuki ADACHI  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E98-B No:7
      Page(s):
    1363-1372

    The deployment of small cells is one of the most effective means to cope with the traffic explosion of cellular mobile systems. However, a small cell system increases the inter-cell interference, which limits the capacity and degrades the cell-edge user throughput. Inter-cell interference coordination (ICIC), such as fractional frequency reuse (FFR), is a well-known scheme that autonomously mitigates inter-cell interference. In the Long Term Evolution (LTE)-Advanced, the three-dimensional (3D) beamforming, which combines conventional horizontal beamforming and vertical beamforming, has been gaining increasing attention. This paper proposes a novel centralized ICIC scheme that controls the direction of narrow 3D beam for each frequency band of each base station. The centralized controller collects information from the base stations and calculates sub-optimum combinations of narrow beams so as to maximize the proportional fair (PF) utility of all users. This paper describes the throughput of the new centralized ICIC scheme as evaluated by computer simulations and shows it has a significant gain in both average user throughput and cell-edge user throughput compared with the conventional ICIC scheme. This paper also investigates the feasibility of the scheme by assessing its throughput performance in a realistic deployment scenario.

  • Strong Security of the Strongly Multiplicative Ramp Secret Sharing Based on Algebraic Curves

    Ryutaroh MATSUMOTO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:7
      Page(s):
    1576-1578

    We introduce a coding theoretic criterion for Yamamoto's strong security of the ramp secret sharing scheme. After that, by using it, we show the strong security of the strongly multiplicative ramp secret sharing proposed by Chen et al. in 2008.

  • Another Optimal Binary Representation of Mosaic Floorplans

    Katsuhisa YAMANAKA  Shin-ichi NAKANO  

     
    LETTER

      Vol:
    E98-A No:6
      Page(s):
    1223-1224

    Recently a compact code of mosaic floorplans with ƒ inner face was proposed by He. The length of the code is 3ƒ-3 bits and asymptotically optimal. In this paper, we propose a new code of mosaic floorplans with ƒ inner faces including k boundary faces. The length of our code is at most $3f - rac{k}{2} - 1$ bits. Hence our code is shorter than or equal to the code by He, except for few small floorplans with k=ƒ≤3. Coding and decoding can be done in O(ƒ) time.

  • Algorithm for Identifying the Maximum Detour Hinge Vertices of a Permutation Graph

    Hirotoshi HONMA  Yoko NAKAJIMA  Yuta IGARASHI  Shigeru MASUYAMA  

     
    PAPER

      Vol:
    E98-A No:6
      Page(s):
    1161-1167

    A hinge vertex is a vertex in an undirected graph such that there exist two vertices whose removal makes the distance between them longer than before. Identifying hinge vertices in a graph can help detect critical nodes in communication network systems, which is useful for making them more stable. For finding them, an O(n3) time algorithm was developed for a simple graph, and, linear time algorithms were developed for interval and permutation graphs, respectively. Recently, the maximum detour hinge vertex problem is defined by Honma et al. For a hinge vertex u in a graph, the detour degree of u is the largest value of distance between any pair of x and y (x and y are adjacent to u) by removing u. A hinge vertex with the largest detour degree in G is defined as the maximum detour hinge vertex of G. This problem is motivated by practical applications, such as network stabilization with a limited cost, i.e., by enhancing the reliability of the maximum detour hinge vertex, the stability of the network is much improved. We previously developed an O(n2) time algorithm for solving this problem on an interval graph. In this study, we propose an algorithm that identifies the maximum detour hinge vertex on a permutation graph in O(n2) time, where n is the number of vertices in the graph.

  • An Efficient Pattern Matching Algorithm for Ordered Term Tree Patterns

    Yusuke SUZUKI  Takayoshi SHOUDAI  Tomoyuki UCHIDA  Tetsuhiro MIYAHARA  

     
    PAPER

      Vol:
    E98-A No:6
      Page(s):
    1197-1211

    A term tree pattern is a rooted ordered tree pattern which consists of ordered tree structures with edge labels and structured variables with labels. All variables with the same label in a term tree pattern can be simultaneously replaced with ordered trees isomorphic to the same rooted ordered tree. Then, a term tree pattern is suitable for representing structural features common to tree structured data such as XML documents on the web, the secondary structures of RNA in biology and parse trees describing grammatical structures of natural languages. Let $ott$ be the set of all term tree patterns which have one or more variables with the same label. Let $lott$ be the set of all term tree patterns t such that all variables in t have distinct labels. We remark that $lottsubsetneq ott$ holds. In this paper, we consider a problem, called Matching problem for term tree patterns, of deciding whether or not a given rooted ordered tree T is obtained from a given term tree pattern t by replacing variables in t with rooted ordered trees. We show that Matching problem for term tree patterns in $ott$ is NP-complete, by giving a reduction from the string pattern matching problem, which is NP-complete. Next, by giving operations on an interval, which is a set containing all integers between two given integers representing vertex identifiers, we propose an efficient algorithm for solving Matching problem for term tree patterns in $lottsubsetneq ott$. Then, we show that, when an ordered tree having N vertices and a term tree pattern $t in lott$ having n vertices are given, the proposed matching algorithm correctly solves this problem in O(nN) time.

  • Two Lower Bounds for Shortest Double-Base Number System

    Parinya CHALERMSOOK  Hiroshi IMAI  Vorapong SUPPAKITPAISARN  

     
    LETTER-Algorithms and Data Structures

      Vol:
    E98-A No:6
      Page(s):
    1310-1312

    In this letter, we derive two lower bounds for the number of terms in a double-base number system (DBNS), when the digit set is {1}. For a positive integer n, we show that the number of terms obtained from the greedy algorithm proposed by Dimitrov, Imbert, and Mishra [1] is $Thetaleft( rac{log n}{log log n} ight)$. Also, we show that the number of terms in the shortest double-base chain is Θ(log n).

  • Improving Width-3 Joint Sparse Form to Attain Asymptotically Optimal Complexity on Average Case

    Hiroshi IMAI  Vorapong SUPPAKITPAISARN  

     
    LETTER

      Vol:
    E98-A No:6
      Page(s):
    1216-1222

    In this paper, we improve a width-3 joint sparse form proposed by Okeya, Katoh, and Nogami. After the improvement, the representation can attain an asymtotically optimal complexity found in our previous work. Although claimed as optimal by the authors, the average computation time of multi-scalar multiplication obtained by the representation is 563/1574n+o(n)≈0.3577n+o(n). That number is larger than the optimal complexity 281/786n+o(n)≈0.3575n+o(n) found in our previous work. To optimize the width-3 joint sparse form, we add more cases to the representation. After the addition, we can show that the complexity is updated to 281/786n+o(n)≈0.3575n+o(n), which implies that the modified representation is asymptotically optimal. Compared to our optimal algorithm in the previous work, the modified width-3 joint sparse form uses less dynamic memory, but it consumes more static memory.

401-420hit(2355hit)