The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ALG(2355hit)

641-660hit(2355hit)

  • An Improved Sufficient Condition for Reconfiguration of List Edge-Colorings in a Tree

    Takehiro ITO  Kazuto KAWAMURA  Xiao ZHOU  

     
    PAPER

      Vol:
    E95-D No:3
      Page(s):
    737-745

    We study the problem of reconfiguring one list edge-coloring of a graph into another list edge-coloring by changing only one edge color assignment at a time, while at all times maintaining a list edge-coloring, given a list of allowed colors for each edge. Ito, Kamiski and Demaine gave a sufficient condition so that any list edge-coloring of a tree can be transformed into any other. In this paper, we give a new sufficient condition which improves the known one. Our sufficient condition is best possible in some sense. The proof is constructive, and yields a polynomial-time algorithm that finds a transformation between two given list edge-colorings of a tree with n vertices via O(n2) recoloring steps. We remark that the upper bound O(n2) on the number of recoloring steps is tight, because there is an infinite family of instances on paths that satisfy our sufficient condition and whose reconfiguration requires Ω(n2) recoloring steps.

  • Enumerating All Rooted Trees Including k Leaves

    Masanobu ISHIKAWA  Katsuhisa YAMANAKA  Yota OTACHI  Shin-ichi NAKANO  

     
    PAPER

      Vol:
    E95-D No:3
      Page(s):
    763-768

    This paper presents an efficient algorithm to generate all (unordered) rooted trees with exactly n vertices including exactly k leaves. There are known results on efficient enumerations of some classes of graphs embedded on a plane, for instance, biconnected and triconnected triangulations [3],[6], and floorplans [4]. On the other hand, it is difficult to enumerate a class of graphs without a fixed embedding. The paper is on enumeration of rooted trees without a fixed embedding. We already proposed an algorithm to generate all “ordered” trees with n vertices including k leaves [11], while the algorithm cannot seem to efficiently generate all (unordered) rooted trees with n vertices including k leaves. We design a simple tree structure among such trees, then by traversing the tree structure we generate all such trees in constant time per tree in the worst case. By repeatedly applying the algorithm for each k=1,2, ...,n-1, we can also generate all rooted trees with exactly n vertices.

  • Global Mapping Analysis: Stochastic Gradient Algorithm in Multidimensional Scaling

    Yoshitatsu MATSUDA  Kazunori YAMAGUCHI  

     
    PAPER-Artificial Intelligence, Data Mining

      Vol:
    E95-D No:2
      Page(s):
    596-603

    In order to implement multidimensional scaling (MDS) efficiently, we propose a new method named “global mapping analysis” (GMA), which applies stochastic approximation to minimizing MDS criteria. GMA can solve MDS more efficiently in both the linear case (classical MDS) and non-linear one (e.g., ALSCAL) if only the MDS criteria are polynomial. GMA separates the polynomial criteria into the local factors and the global ones. Because the global factors need to be calculated only once in each iteration, GMA is of linear order in the number of objects. Numerical experiments on artificial data verify the efficiency of GMA. It is also shown that GMA can find out various interesting structures from massive document collections.

  • Efficient Address Generation for Permutation Polynomial Based Interleavers over Integer Rings

    Jonghoon RYU  

     
    LETTER-Coding Theory

      Vol:
    E95-A No:1
      Page(s):
    421-424

    Permutation polynomial based interleavers over integer rings have recently received attention for their excellent channel coding performance, elegant algebraic properties and simplicity of implementation. In this letter, it is shown that permutation polynomial based interleavers of practical interest is decomposed into linear permutation polynomials. Based on this observation, it is shown that permutation polynomial based interleavers as well as their inverses can be efficiently implemented.

  • On Algebraic Property of T-Functions

    Ruilin LI  Bing SUN  Chao LI  Shaojing FU  

     
    LETTER

      Vol:
    E95-A No:1
      Page(s):
    267-269

    T-function is a kind of cryptographic function which is shown to be useful in various applications. It is known that any function f on F2n or Z2n automatically deduces a unique polynomial fF ∈ F2n[x] with degree ≤ 2n-1. In this letter, we study an algebraic property of fF while f is a T-function. We prove that for a single cycle T-function f on F2n or Z2n, deg fF=2n-2 which is optimal for a permutation. We also consider a kind of widely used T-function in many cryptographic algorithms, namely the modular addition function Ab(x)=x+b ∈ Z2n[x]. We demonstrate how to calculate deg Ab F from the constant value b. These results can facilitate us to evaluate the immunity of the T-function based cryptosystem against some known attacks such as interpolation attack and integral attack.

  • A Class of 1-Resilient Functions in Odd Variables with High Nonlinearity and Suboptimal Algebraic Immunity

    Yusong DU  Fangguo ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E95-A No:1
      Page(s):
    417-420

    Based on Tu-Deng's conjecture and the Tu-Deng function, in 2010, X. Tang et al. proposed a class of Boolean functions in even variables with optimal algebraic degree, very high nonlinearity and optimal algebraic immunity. In this corresponding, we consider the concatenation of Tang's function and another Boolean function, and study its cryptographic properties. With this idea, we propose a class of 1-resilient Boolean functions in odd variables with optimal algebraic degree, good nonlinearity and suboptimal algebraic immunity based on Tu-Deng's conjecture.

  • A Least Bit Error Rate Adaptive Array for MultiLevel Modulations

    Satoshi DENNO  Daisuke UMEHARA  Masahiro MORIKURA  

     
    PAPER-Radio Systems

      Vol:
    E95-B No:1
      Page(s):
    69-76

    This paper proposes an adaptive algorithm for adaptive arrays that minimizes the bit error rate (BER) of the array output signals in radio communication systems with the use of multilevel modulation signals. In particular, amplitude phase shift keying (APSK) is used as one type of multilevel modulations in this paper. Simultaneous non-linear equations that are satisfied by the optimum weight vector of the proposed algorithm are derived and used for theoretical analyze of the performance of the adaptive array based on the proposed algorithm. As a result of the theoretical analysis, it can be shown that the proposed adaptive array improves the carrier to interference ratio of the array output signal without taking advantage of the nulls. Furthermore, it is confirmed that the result of the theoretical analysis agrees with that of computer simulation. When the number of the received antenna is less than that of the received signals, the adaptive array based on the proposed algorithm is verified to achieve much better performance then that based on the least mean square (LMS) algorithm.

  • A Note on the Pairing Computation Using Normalized Miller Functions

    Naoki OGURA  Shigenori UCHIYAMA  Naoki KANAYAMA  Eiji OKAMOTO  

     
    PAPER-Mathematics

      Vol:
    E95-A No:1
      Page(s):
    196-203

    This paper considers the normalization of Miller functions for computing “point-evaluation” pairings on an elliptic curve E over a finite field Fq, where the characteristic of Fq is neither 2 nor 3. It is shown that the normalized Miller functions for computing point-evaluation pairings on G2G1 when (i) the embedding degree k is even, or (ii) 3|k and E/Fq(q ≡ (1 mod 3)) is a curve of the form Y2=X3+b. Thus, there is no need to consider the normalization for computing pairings on many pairing-friendly elliptic curves.

  • MS Location Estimation with Genetic Algorithm

    Chien-Sheng CHEN  Jium-Ming LIN  Wen-Hsiung LIU  Ching-Lung CHI  

     
    PAPER-ITS

      Vol:
    E95-A No:1
      Page(s):
    305-312

    Intelligent transportation system (ITS) makes use of vehicle position to decrease the heavy traffic and improve service reliability of public transportation system. Many existing systems, such as global positioning system (GPS) and cellular communication systems, can be used to estimate vehicle location. The objective of wireless location is to determine the mobile station (MS) location in a wireless cellular communications system. The non-line-of-sight (NLOS) problem is the most crucial factor that it causes large measured error. In this paper, we present a novel positioning algorithm based on genetic algorithm (GA) to locate MS when three BSs are available for location purpose. Recently, GA are widely used as many various optimization problems. The proposed algorithm utilizes the intersections of three time of arrival (TOA) circles based on GA to estimate the MS location. The simulation results show that the proposed algorithms can really improve the location accuracy, even under severe NLOS conditions.

  • A Fast On-Line Algorithm for the Longest Common Subsequence Problem with Constant Alphabet

    Yoshifumi SAKAI  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E95-A No:1
      Page(s):
    354-361

    This article presents an algorithm that solves an on-line version of the longest common subsequence (LCS) problem for two strings over a constant alphabet in O(d+n) time and O(m+d) space, where m is the length of the shorter string, the whole of which is given to the algorithm in advance, n is the length of the longer string, which is given as a data stream, and d is the number of dominant matches between the two strings. A new upper bound, O(p(m-q)), of d is also presented, where p is the length of the LCS of the two strings, and q is the length of the LCS of the shorter string and the m-length prefix of the longer string.

  • Error Analysis of Multilevel Fast Multipole Algorithm for Electromagnetic Scattering Problems

    Seiya KISHIMOTO  Shinichiro OHNUKI  

     
    PAPER-Numerical Techniques

      Vol:
    E95-C No:1
      Page(s):
    71-78

    Error analysis of the multilevel fast multipole algorithm is studied for electromagnetic scattering problems. We propose novel error prediction and control methods and verify that the computational error for scattering problems with over one million unknowns can be precisely controlled under desired digits of accuracy. Optimum selection of truncation numbers to minimize computational error also will be discussed.

  • Indexed Swap Matching for Short Patterns

    Hua ZHAO  Songfeng LU  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E95-A No:1
      Page(s):
    362-366

    Let T be a text of length n and P be a pattern of length m, both strings over a fixed finite alphabet. The Pattern Matching with Swaps problem is to find all occurrences of P in T if adjacent pattern characters can be swapped. In the Approximate Pattern Matching problem with Swaps, one seeks for every text location with a swapped match of P, the number of swaps necessary to obtain a match at the location. In this paper we provide the first off-line solution for the swap matching problem and the approximate pattern matching problem with swaps. We present a new data-structure called a Swap-transforming Tree. And we give a precise upper-bond of the number of the swapped versions of a pattern. By using the swap-transforming tree, we can solve both problems in time O(λmlog2 n) on an O(nHk) bits indexing data structure. Here λ is a constant. Our solution is more effective when the pattern is short.

  • Precoding Scheme Robust to Imperfect CSI in Downlink Multiuser MIMO-OFDM System

    Linchen CHANG  Kazuhiko FUKAWA  Hiroshi SUZUKI  Satoshi SUYAMA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:12
      Page(s):
    3515-3524

    This paper proposes a precoding scheme for downlink multiuser MIMO-OFDM systems. The proposed precoding employs the minimum average bit error rate (MABER) criterion, and obtains precoding matrices by the steepest descent algorithm in order to minimize average BER of mobile stations. As the cost function of the proposed scheme, an upper bound of the average BER is derived from the pairwise error probability (PEP) and is averaged with respect to channel state information (CSI) errors. Thus, the MABER scheme is robust against imperfect CSI. Computer simulations under a frequency-selective fading condition demonstrate that the proposed precoder is more robust against the CSI errors than both the zero-forcing (ZF) precoder and a robust sum mean square error (SMSE) precoder, and that it is superior in BER to the conventional schemes.

  • Orthogonal and ZCZ Sets of Real-Valued Periodic Orthogonal Sequences from Huffman Sequences

    Takahiro MATSUMOTO  Shinya MATSUFUJI  Tetsuya KOJIMA  Udaya PARAMPALLI  

     
    PAPER

      Vol:
    E94-A No:12
      Page(s):
    2728-2736

    This paper presents a method of generating sets of orthogonal and zero-correlation zone (ZCZ) periodic real-valued sequences of period 2n, n ≥ 1. The sequences admit a fast correlation algorithm and the sets of sequences achieve the upper bound on family size. A periodic orthogonal sequence has the periodic autocorrelation function with zero sidelobes, and a set with orthogonal sequences whose mutual periodic crosscorrelation function at zero shift is zero. Similarly, a ZCZ set is the set of the sequences with zero-correlation zone. In this paper, we derive the real-valued periodic orthogonal sequences of period 2n from a real-valued Huffman sequence of length 2ν+1, ν being a positive integer and ν ≥ n, whose aperiodic autocorrelation function has zero sidelobes except possibly at the left and right shift-ends. The orthogonal and ZCZ sets of real-valued periodic orthogonal sequences are useful in various systems, such as synchronous code division multiple access (CDMA) systems, quasi-synchronous CDMA systems and digital watermarkings.

  • An Adaptive Weighted Clustering Algorithm for Cooperative Communications

    Qiyue YU  Weixiao MENG  Fumiyuki ADACHI  

     
    PAPER

      Vol:
    E94-B No:12
      Page(s):
    3251-3258

    The cooperative relay network exploits the space diversity gain by allowing cooperation among users to improve transmission quality. It is an important issue to identify the cluster-head (or relay node) and its members who are to cooperate. The cluster-head consumes more battery power than an ordinary node since it has extra responsibilities, i.e., ensuring the cooperation of its members' transmissions; thereby the cluster-head has a lower throughput than the average. Since users are joining or departing the clusters from time to time, the network topology is changing and the network may not be stable. How to balance the fairness among users and the network stability is a very interesting topic. This paper proposes an adaptive weighted clustering algorithm (AWCA), in which the weight factors are introduced to adaptively control both the stability and fairness according to the number of arrival users. It is shown that when the number of arrival users is large, AWCA has the life time longer than FWCA and similar to SWCA and that when the number of arrival users is small, AWCA provides fairness higher than SWCA and close to FWCA.

  • Sum Rate Optimization in Multiuser Cognitive Radio Networks

    Fanggang WANG  Bo AI  Zhangdui ZHONG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:12
      Page(s):
    3505-3514

    In multiuser cognitive radio (CR) networks, we address the problem of joint transmit beamforming (BF) and power control (PC) for secondary users (SUs) when they are allowed to transmit simultaneously with primary users (PUs). The objective is to optimize the network sum rate under the interference constraints of PUs, which is a nonconvex problem. Iterative dual subgradient (IDuSuG) algorithm is proposed by iteratively performing BF and PC to optimize the sum rate, among which minimum mean square error (MMSE) or virtual power-weighed projection (VIP2) is used to design beamformers and subgradient method is used to control the power. VIP2 algorithm is devised for the case in which the interference caused by MMSE beamformer exceeds the threshold. Moreover, channel uncertainty due to lack of cooperation is considered. A closed-form worst-case expression is derived, with which the uncertainty optimization problem is transformed into a certain one. A robust algorithm based on IDuSuG is provided by modifying updates in iterative process. Furthermore, second-order cone programming approximation (SOCPA) method is proposed as another robust algorithm. Typical network models are approximated to SOCP problems and solved by interior-point method. Finally the network sum rates for different PU and SU numbers are assessed for both certainty and uncertainty channel models by simulation.

  • Distributed Cooperative Multicell Beamforming Based on a Viewpoint of Layered Channel

    Jiamin LI  Dongming WANG  Pengcheng ZHU  Lan TANG  Xiaohu YOU  

     
    PAPER

      Vol:
    E94-B No:12
      Page(s):
    3225-3231

    In this paper, a distributed cooperative multicell beamforming algorithm is proposed, and a detail analysis and solving method for instantaneous and statistical channel state information (CSI) are presented. Firstly, an improved distributed iterative beamforming algorithm is proposed for the multiple-input single-output interference channel (MISO IC) scenario which chooses virtual signal-to-interference-and-noise (SINR) as decision criterion to initialize and then iteratively solves the constrained optimization problem of maximizing the virtual SINR for a given level of generated interference to other users. Then, the algorithm is generalized to the multicell date sharing scenario with a heuristics power allocation scheme based on a viewpoint of the layered channel. Finally, the performance is illustrated through numerical simulations.

  • A Graph Rewriting Approach for Converting Asynchronous ROMs into Synchronous Ones

    Md. Nazrul Islam MONDAL  Koji NAKANO  Yasuaki ITO  

     
    PAPER

      Vol:
    E94-D No:12
      Page(s):
    2378-2388

    Most of FPGAs have Configurable Logic Blocks (CLBs) to implement combinational and sequential circuits and block RAMs to implement Random Access Memories (RAMs) and Read Only Memories (ROMs). Circuit design that minimizes the number of clock cycles is easy if we use asynchronous read operations. However, most of FPGAs support synchronous read operations, but do not support asynchronous read operations. The main contribution of this paper is to provide one of the potent approaches to resolve this problem. We assume that a circuit using asynchronous ROMs designed by a non-expert or quickly designed by an expert is given. Our goal is to convert this circuit with asynchronous ROMs into an equivalent circuit with synchronous ones. The resulting circuit with synchronous ROMs can be embedded into FPGAs. We also discuss several techniques to decrease the latency and increase the clock frequency of the resulting circuits.

  • Simulation-Based Tactics Generation for Warship Combat Using the Genetic Algorithm

    Yong-Jun YOU  Sung-Do CHI  Jae-Ick KIM  

     
    LETTER-Artificial Intelligence, Data Mining

      Vol:
    E94-D No:12
      Page(s):
    2533-2536

    In most existing warships combat simulation system, the tactics of a warship is manipulated by human operators. For this reason, the simulation results are restricted due to the capabilities of human operators. To deal with this, we have employed the genetic algorithm for supporting the evolutionary simulation environment. In which, the tactical decision by human operators is replaced by the human model with a rule-based chromosome for representing tactics so that the population of simulations are created and hundreds of simulation runs are continued on the basis of the genetic algorithm without any human intervention until finding emergent tactics which shows the best performance throughout the simulation. Several simulation tests demonstrate the techniques.

  • A Fast Systematic Optimized Comparison Algorithm for CNU Design of LDPC Decoders

    Jui-Hui HUNG  Sau-Gee CHEN  

     
    PAPER-Communication Theory and Signals

      Vol:
    E94-A No:11
      Page(s):
    2246-2253

    This work first investigates two existing check node unit (CNU) architectures for LDPC decoding: self-message-excluded CNU (SME-CNU) and two-minimum CNU (TM-CNU) architectures, and analyzes their area and timing complexities based on various realization approaches. Compared to TM-CNU architecture, SME-CNU architecture is faster in speed but with much higher complexity for comparison operations. To overcome this problem, this work proposes a novel systematic optimization algorithm for comparison operations required by SME-CNU architectures. The algorithm can automatically synthesize an optimized fast comparison operation that guarantees a shortest comparison delay time and a minimized total number of 2-input comparators. High speed is achieved by adopting parallel divide-and-conquer comparison operations, while the required comparators are minimized by developing a novel set construction algorithm that maximizes shareable comparison operations. As a result, the proposed design significantly reduces the required number of comparison operations, compared to conventional SME-CNU architectures, under the condition that both designs have the same speed performance. Besides, our preliminary hardware simulations show that the proposed design has comparable hardware complexity to low-complexity TM-CNU architectures.

641-660hit(2355hit)