The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] algorithm(2137hit)

881-900hit(2137hit)

  • Structure Learning of Bayesian Networks Using Dual Genetic Algorithm

    Jaehun LEE  Wooyong CHUNG  Euntai KIM  

     
    PAPER-Artificial Intelligence and Cognitive Science

      Vol:
    E91-D No:1
      Page(s):
    32-43

    A new structure learning approach for Bayesian networks (BNs) based on dual genetic algorithm (DGA) is proposed in this paper. An individual of the population is represented as a dual chromosome composed of two chromosomes. The first chromosome represents the ordering among the BN nodes and the second represents the conditional dependencies among the ordered BN nodes. It is rigorously shown that there is no BN structure that cannot be encoded by the proposed dual genetic encoding and the proposed encoding explores the entire solution space of the BN structures. In contrast with existing GA-based structure learning methods, the proposed method learns not only the topology of the BN nodes, but also the ordering among the BN nodes, thereby, exploring the wider solution space of a given problem than the existing method. The dual genetic operators are closed in the set of the admissible individuals. The proposed method is applied to real-world and benchmark applications, while its effectiveness is demonstrated through computer simulation.

  • Discrete Modelling of Continuous-Time Systems Having Interval Uncertainties Using Genetic Algorithms

    Chen-Chien HSU  Tsung-Chi LU  Heng-Chou CHEN  

     
    PAPER-Systems and Control

      Vol:
    E91-A No:1
      Page(s):
    357-364

    In this paper, an evolutionary approach is proposed to obtain a discrete-time state-space interval model for uncertain continuous-time systems having interval uncertainties. Based on a worst-case analysis, the problem to derive the discrete interval model is first formulated as multiple mono-objective optimization problems for matrix-value functions associated with the discrete system matrices, and subsequently optimized via a proposed genetic algorithm (GA) to obtain the lower and upper bounds of the entries in the system matrices. To show the effectiveness of the proposed approach, roots clustering of the characteristic equation of the obtained discrete interval model is illustrated for comparison with those obtained via existing methods.

  • Blind CMA-Based Asynchronous Multiuser Detection Using Generalized Sidelobe Canceller with Decision Feedback

    Ann-Chen CHANG  Chih-Wei JEN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:1
      Page(s):
    376-380

    This letter deals with blind multiuser detection based on the multi-channel linearly constrained constant modulus algorithm (MLCCMA) for asynchronous code division multiple access (CDMA) systems over frequency-selective Rayleigh fading channels. In conjunction with the decision-feedback generalized sidelobe canceller (DFGSC), we present an efficient approach to combat multiple access interference and intersymbol interference. Computer simulations confirm that the proposed MLCCMA-based DFGSC can significantly speed up convergence and improve the output performance.

  • Backward Channel Protection Based on Randomized Tree-Walking Algorithm and Its Analysis for Securing RFID Tag Information and Privacy

    Wonjoon CHOI  Myungchul YOON  Byeong-hee ROH  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E91-B No:1
      Page(s):
    172-182

    Eavesdropping on backward channels in RFID environments may cause severe privacy problems because it means the exposure of personal information related to tags that each person has. However, most existing RFID tag security schemes are focused on the forward channel protections. In this paper, we propose a simple but effective method to solve the backward channel eavesdropping problem based on Randomized-tree walking algorithm for securing tag ID information and privacy in RFID-based applications. In order to show the efficiency of the proposed scheme, we derive two performance models for the cases when CRC is used and not used. It is shown that the proposed method can lower the probability of eavesdropping on backward channels near to '0.'

  • Real-Time Point-Based Rendering Using Visibility Map

    Byeong-Seok SHIN  Dong-Ryeol OH  Daniel KANG  

     
    PAPER-Computer Graphics

      Vol:
    E91-D No:1
      Page(s):
    124-131

    Because of its simplicity and intuitive approach, point-based rendering has been a very popular research area. Recent approaches have focused on hardware-accelerated techniques. By applying a deferred shading scheme, both high-quality images and high-performance rendering have been achieved. However, previous methods showed problems related to depth-based visibility computation. We propose an extended point-based rendering method using a visibility map. In our method we employ a distance-based visibility technique (replacing depth-based visibility), an averaged position map and an adaptive fragment processing scheme, resulting in more accurate and improved image quality, as well as improved rendering performance.

  • An Optimal Parallel Algorithm for Finding All Hinge Vertices of a Circular-Arc Graph

    Hirotoshi HONMA  Shigeru MASUYAMA  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E91-A No:1
      Page(s):
    383-391

    Let G =(V, E) be an undirected simple graph with u ∈ V. If there exist any two vertices in G whose distance becomes longer when a vertex u is removed, then u is defined as a hinge vertex. Finding the set of hinge vertices in a graph is useful for identifying critical nodes in an actual network. A number of studies concerning hinge vertices have been made in recent years. In a number of graph problems, it is known that more efficient sequential or parallel algorithms can be developed by restricting classes of graphs. In this paper, we shall propose a parallel algorithm which runs in O(log n) time with O(n/log n) processors on EREW PRAM for finding all hinge vertices of a circular-arc graph.

  • Estimating Periodic Software Rejuvenation Schedules under Discrete-Time Operation Circumstance

    Kazuki IWAMOTO  Tadashi DOHI  Naoto KAIO  

     
    PAPER-Dependable Computing

      Vol:
    E91-D No:1
      Page(s):
    23-31

    Software rejuvenation is a preventive and proactive solution that is particularly useful for counteracting the phenomenon of software aging. In this article, we consider periodic software rejuvenation models based on the expected cost per unit time in the steady state under discrete-time operation circumstance. By applying the discrete renewal reward processes, we describe the stochastic behavior of a telecommunication billing application with a degradation mode, and determine the optimal periodic software rejuvenation schedule minimizing the expected cost. Similar to the earlier work by the same authors, we develop a statistically non-parametric algorithm to estimate the optimal software rejuvenation schedule, by applying the discrete total time on test concept. Numerical examples are presented to estimate the optimal software rejuvenation schedules from the simulation data. We discuss the asymptotic behavior of estimators developed in this paper.

  • Low Complexity Fano-Based Detection Algorithm with Iterative Structure for V-BLAST Systems

    Jongsub CHA  Hyoungsuk JEON  Hyuckjae LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E91-B No:1
      Page(s):
    347-350

    We present a computationally efficient Fano detection algorithm with an iterative structure for V-BLAST systems. As our previous work, we introduced a Fano-based sequential detection scheme with three interrelated steps whose computational loads are excessive. To deal with the computational inefficiency, the proposed algorithm is redesigned by the addition of two steps: preparation and iterative tree searching. In particular, it employs an early stop technique to avoid the unnecessary iteration or to stop the needless searching process of the algorithm. Computer simulation shows that the proposed scheme yields significant saving in complexity with very small performance degradation, compared with sphere detection (SD).

  • New Weakness in the Key-Scheduling Algorithm of RC4

    Toshihiro OHIGASHI  Yoshiaki SHIRAISHI  Masakatu MORII  

     
    PAPER-Symmetric Cryptography

      Vol:
    E91-A No:1
      Page(s):
    3-11

    In a key scheduling algorithm (KSA) of stream ciphers, a secret key is expanded into a large initial state. An internal state reconstruction method is known as a general attack against stream ciphers; it recovers the initial state from a given pair of plaintext and ciphertext more efficiently than exhaustive key search. If the method succeeds, then it is desirable that the inverse of KSA is infeasible in order to avoid the leakage of the secret key information. This paper shows that it is easy to compute a secret key from an initial state of RC4. We propose a method to recover an -bit secret key from only the first bits of the initial state of RC4 using linear equations with the time complexity less than that of one execution of KSA. It can recover the secret keys of which number is 2103.6 when the size of the secret key is 128 bits. That is, the 128-bit secret key can be recovered with a high probability when the first 128 bits of the initial state are determined using the internal state reconstruction method.

  • A Distortion-Free Learning Algorithm for Feedforward Multi-Channel Blind Source Separation

    Akihide HORITA  Kenji NAKAYAMA  Akihiro HIRANO  

     
    PAPER-Digital Signal Processing

      Vol:
    E90-A No:12
      Page(s):
    2835-2845

    FeedForward (FF-) Blind Source Separation (BSS) systems have some degree of freedom in the solution space. Therefore, signal distortion is likely to occur. First, a criterion for the signal distortion is discussed. Properties of conventional methods proposed to suppress the signal distortion are analyzed. Next, a general condition for complete separation and distortion-free is derived for multi-channel FF-BSS systems. This condition is incorporated in learning algorithms as a distortion-free constraint. Computer simulations using speech signals and stationary colored signals are performed for the conventional methods and for the new learning algorithms employing the proposed distortion-free constraint. The proposed method can well suppress signal distortion, while maintaining a high source separation performance.

  • A Novel Manifold Learning Algorithm for Localization Estimation in Wireless Sensor Networks

    Shancang LI  Deyun ZHANG  

     
    LETTER

      Vol:
    E90-B No:12
      Page(s):
    3496-3500

    We propose an accurate, distributed localization method that uses the connectivity measure to localize nodes in a wireless sensor network. The proposed method is based on a self-organizing isometric embedding algorithm that adaptively emphasizes the most accurate range of measurements and naturally accounts for communication constraints within the sensor network. Each node adaptively chooses a neighborhood of sensors and updates its estimate of position by minimizing a local cost function and then passes this update to the neighboring sensors. Simulations demonstrate that the proposed method is more robust to measurement error than previous methods and it can achieve comparable results using much fewer anchor nodes than previous methods.

  • The Vanstone-Zuccherato Schemes Revisited

    Naoki KANAYAMA  Shigenori UCHIYAMA  

     
    PAPER-Information Security

      Vol:
    E90-A No:12
      Page(s):
    2903-2907

    In 1995, Vanstone and Zuccherato proposed a novel method of generating RSA moduli having a predetermined set of bits which are the ASCII representation of user's identification information (i.e., name, email address, etc.). This could lead to a savings in bandwidth for data transmission and storage. In this paper, we apply this idea of Vanstone and Zuccherato for reducing the storage requirement of RSA public moduli to integer factoring based public-key schemes with their moduli of the form prq. More precisely, we explicitly propose two efficient methods for specifying high-order bits of prime factors of their public-keys. We also consider the security of the proposed methods.

  • An Improved Clonal Selection Algorithm and Its Application to Traveling Salesman Problems

    Shangce GAO  Zheng TANG  Hongwei DAI  Jianchen ZHANG  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E90-A No:12
      Page(s):
    2930-2938

    The clonal selection algorithm (CS), inspired by the basic features of adaptive immune response to antigenic stimulus, can exploit and explore the solution space parallelly and effectively. However, antibody initialization and premature convergence are two problems of CS. To overcome these two problems, we propose a chaotic distance-based clonal selection algorithm (CDCS). In this novel algorithm, we introduce a chaotic initialization mechanism and a distance-based somatic hypermutation to improve the performance of CS. The proposed algorithm is also verified for numerous benchmark traveling salesman problems. Experimental results show that the improved algorithm proposed in this paper provides better performance when compared to other metaheuristics.

  • A V-BLAST System Using Modulation Set Selection for Reduced-Complexity Tree Searching in the QRD-M Algorithm

    Hyounkuk KIM  Kihwan JEON  Joonhyuk KANG  Hyuncheol PARK  

     
    LETTER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E90-B No:12
      Page(s):
    3665-3669

    This letter presents a new vertical Bell Labs layered space-time (V-BLAST) transmission scheme for developing low-complexity tree searching in the QRD-M algorithm. In the new V-BLAST system, we assign modulation scheme in ascending order from top to bottom tree branches. The modulation set to be assigned is decided by two criteria: minimum performance loss and maximum complexity reduction. We also propose an open-loop power allocation algorithm to surmount the performance loss. Numerical results show that the proposed V-BLAST transmission approach can significantly reduce the computational loads of the QRD-M algorithm with a slight performance degradation.

  • Shrink-Wrapped Isosurface from Cross Sectional Images

    Young Kyu CHOI  James K. HAHN  

     
    PAPER-Computer Graphics

      Vol:
    E90-D No:12
      Page(s):
    2070-2076

    This paper addresses a new surface reconstruction scheme for approximating the isosurface from a set of tomographic cross sectional images. Differently from the novel Marching Cubes (MC) algorithm, our method does not extract the iso-density surface (isosurface) directly from the voxel data but calculates the iso-density point (isopoint) first. After building a coarse initial mesh approximating the ideal isosurface by the cell-boundary representation, it metamorphoses the mesh into the final isosurface by a relaxation scheme, called shrink-wrapping process. Compared with the MC algorithm, our method is robust and does not make any cracks on surface. Furthermore, since it is possible to utilize lots of additional isopoints during the surface reconstruction process by extending the adjacency definition, theoretically the resulting surface can be better in quality than the MC algorithm. According to experiments, it is proved to be very robust and efficient for isosurface reconstruction from cross sectional images.

  • Multistage Channel Estimation and Data Detection for Multi-Antenna CDMA Systems with Single Spreading Code Per User

    Shu-Ming TSENG  Hung-Chieh YU  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Vol:
    E90-B No:12
      Page(s):
    3523-3529

    A training-based vector channel estimation method has been proposed for single-user code-division multiple access (CDMA) systems in fast-varying correlated multipath fading channels. In this paper, we extend it in an iterative way to multiuser multiple-input multiple-output (MIMO) CDMA systems where both the transmitter and receiver have multiple antennas. In the training period, we propose to add the minimum mean square error (MMSE) front end before channel estimation to suppress multiuser interference (MUI) from substreams with difference spreading codes, so then we can get good initial vector channel estimation for each user. In the data transmission period, we proposed to add MMSE/parallel interference cancellation (PIC) front end to suppress MUI, interference suppression, and vector channel estimation in an iterative way. The perfect channel estimation is assumed in Liu et al., and the inter-play between channel estimation and multiuser detection is not discussed either. On the contrary, the novelty of the proposed method is that we add MMSE/PIC front end (in addition to matched filter) before channel estimation and we repeatedly switch between MMSE/PIC front end and channel estimation.

  • `Adaptive Link Adjustment' Applied to the Fixed Charge Transportation Problem

    Sang-Moon SOAK  

     
    PAPER-Numerical Analysis and Optimization

      Vol:
    E90-A No:12
      Page(s):
    2863-2876

    The fixed charge transportation problem (FCTP) is a classic challenge for combinatorial optimization; it is based on the well-known transportation problem (TP), and is one of the prime examples of an NP-complete variant of the TP, of general importance in a wide range of transportation network design problems. Many techniques have been applied to this problem, and the most effective so far (in terms of near-optimal results in reasonable time on large instances) are evolutionary algorithm based approaches. In particular, an EA proposed by Eckert and Gottlieb has produced the best performance so far on a set of specific benchmark instances. We introduce a new scheme, which has more general applicability, but which we test here on the FCTP. The proposed scheme applies an adaptive mutation process immediately following the evaluation of a phenotype. It thereby adapts automatically to learned information encoded in the chromosome. The underlying encoding approach is to encode an ordering of elements for interpretation by a constructive algorithm (such as with the Link and Node Biased encoding for spanning trees, and the Random Keys encoding which has been applied to both scheduling and graph problems), however the main adaptive process rewards links in such a way that genes effectively encode a measure of the number of times their associated link has appeared in selected solutions. Tests are done which compare our approach with Eckert and Gottlieb's results on benchmark FCTP instances, and other approaches.

  • Extended Algorithm for Calculating Routes with Include Route Constraint in IP Networks

    Rie HAYASHI  Eiji OKI  Kohei SHIOMOTO  

     
    LETTER-Network

      Vol:
    E90-B No:12
      Page(s):
    3677-3679

    This paper proposes an algorithm for calculating routes that considers the include route constraint while minimizing cost. A route with include route constraint has to traverse a group of assigned nodes. The trouble when calculating a route that satisfies an include route constraint is that routes set in different sections may traverse the same link. In order to prevent this violation (overlap), we introduce an alternate route selection policy. Numerical results show that the probability of finding appropriate routes (no overlap) is more than 95% with the proposed algorithm while only 35% with the conventional algorithm.

  • Discrete Program-Size Dependent Software Reliability Assessment: Modeling, Estimation, and Goodness-of-Fit Comparisons

    Shinji INOUE  Shigeru YAMADA  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E90-A No:12
      Page(s):
    2891-2902

    In this paper we propose a discrete program-size dependent software reliability growth model flexibly describing the software failure-occurrence phenomenon based on a discrete Weibull distribution. We also conduct model comparisons of our discrete SRGM with existing discrete SRGMs by using actual data sets. The program size is one of the important metrics of software complexity. It is known that flexible discrete software reliability growth modeling is difficult due to the mathematical manipulation under a conventional modeling-framework in which the time-dependent behavior of the cumulative number of detected faults is formulated by a difference equation. Our discrete SRGM is developed under an existing unified modeling-framework based on the concept of general order-statistics, and can incorporate the effect of the program size into software reliability assessment. Further, we discuss the method of parameter estimation, and derive software reliability assessment measures of our discrete SRGM. Finally, we show numerical examples of discrete software reliability analysis based on our discrete SRGM by using actual data.

  • A Post-Processing for the Enumerative Code Implementation of Ziv-Lempel Incremental Parsing

    Tsutomu KAWABATA  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E90-B No:11
      Page(s):
    3263-3265

    Ziv-Lempel incremental parsing [1] is a fundamental algorithm for lossless data compression. There is a simple enumerative implementation [7] which preserves a duality between the encoder and the decoder. However, due to its compactness, the implementation when combined with a complete integer code, allows only an input sequence with a length consistent with the parsing boundaries. In this letter, we propose a simple additional mechanism for post-processing a binary file of arbitrary length, provided the file punctuation is externally managed.

881-900hit(2137hit)