The search functionality is under construction.

Keyword Search Result

[Keyword] algorithms(306hit)

121-140hit(306hit)

  • Experimental Evaluation of Maximum-Supply Partitioning Algorithms for Demand-Supply Graphs

    Satoshi TAOKA  Kazuya WATANABE  Toshimasa WATANABE  

     
    PAPER

      Vol:
    E89-A No:4
      Page(s):
    1049-1057

    Let G = (D ∪ S,E) be an undirected graph with a vertex set D ∪ S and an (undirected) edge set E, where the vertex set is partitioned into two subsets, a demand vertex set D and a supply vertex set S. We assume that D ≠ and S ≠ in this paper. Each demand or supply vertex v has a positive real number d(v) or s(v), called the demand or supply of v, respectively. For any subset V' ⊆ D ∪ S, the demand of V' is defined by d(V') = Σv∈V'∩Dd(v) if V' ∩ D ≠ or d(V') = 0 if V' ∩ D = . Let s(S) = Σv∈S s(v). Any partition π = {V1,..., Vr} (|S| r |D ∪ S|) of D ∪ S is called a feasible partition of G if and only if π satisfies the following (1) and (2) for any k = 1,..., r: (1) |Vk ∩ S|1, and (2) if Vk ∩ S = {uk} then the induced subgraph G[Vk] of G is connected and d(Vk)s(uk). The demand d(π) of π is defined by d(π)=d(Vk). The "Maximum-Supply Partitioning Problem (MSPP)" is to find a feasible partition π of G such that d(π) is maximum among all feasible partitions of G. We implemented not only existing algorithms for obtainity heuristic or optimum solutions to MSPP but also those that are corrected or improved from existing ones. In this paper we show comparison of their capability based on computational experiments.

  • On Minimum k-Edge-Connectivity Augmentation for Specified Vertices of a Graph with Upper Bounds on Vertex-Degree

    Toshiya MASHIMA  Satoshi TAOKA  Toshimasa WATANABE  

     
    PAPER

      Vol:
    E89-A No:4
      Page(s):
    1042-1048

    The k-edge-connectivity augmentation problem for a specified set of vertices of a graph with degree constraints, kECA-SV-DC, is defined as follows: "Given an undirected multigraph G = (V,E), a specified set of vertices S ⊆V and a function g: V → Z+ ∪{∞}, find a smallest set E' of edges such that (V,E ∪ E') has at least k edge-disjoint paths between any pair of vertices in S and such that, for any v ∈ V, E' includes at most g(v) edges incident to v, where Z+ is the set of nonnegative integers." This paper first shows polynomial time solvability of kECA-SV-DC and then gives a linear time algorithm for 2ECA-SV-DC.

  • Zero-Knowledge Hierarchical Authentication in MANETs

    Pino CABALLERO-GIL  Candelaria HERNANDEZ-GOYA  

     
    LETTER-Application Information Security

      Vol:
    E89-D No:3
      Page(s):
    1288-1289

    This work addresses the critical problem of authentication in mobile ad hoc networks. It includes a new approach based on the Zero-Knowledge cryptographic paradigm where two different security levels are defined. The first level is characterized by the use of an NP-complete graph problem to describe an Access Control Protocol, while the highest level corresponds to a Group Authentication Protocol based on a hard-on-average graph problem. The main goal of the proposal is to balance security strength and network performance. Therefore, both protocols are scalable and decentralized, and their requirements of communication, storage and computation are limited.

  • Bi-Connectivity Augmentation for Specified Vertices of a Graph with Upper Bounds on Vertex-Degree Increase

    Toshiya MASHIMA  Takanori FUKUOKA  Satoshi TAOKA  Toshimasa WATANABE  

     
    PAPER-Graph Algorithm

      Vol:
    E89-D No:2
      Page(s):
    751-762

    The 2-vertex-connectivity augmentation problem for a specified set of vertices of a graph with degree constraints, 2VCA-SV-DC, is defined as follows: "Given an undirected graph G = (V,E), a specified set of vertices S ⊆V with |S|3 and a function g:V→Z+∪{∞}, find a smallest set E' of edges such that (V,E ∪E') has at least two internally-disjoint paths between any pair of vertices in S and such that vertex-degree increase of each v ∈V by the addition of E' to G is at most g(v), where Z+ is the set of nonnegative integers." This paper shows a linear time algorithm for 2VCA-SV-DC.

  • Mapping of Hierarchical Parallel Genetic Algorithms for Protein Folding onto Computational Grids

    Weiguo LIU  Bertil SCHMIDT  

     
    PAPER-Grid Computing

      Vol:
    E89-D No:2
      Page(s):
    589-596

    Genetic algorithms are a general problem-solving technique that has been widely used in computational biology. In this paper, we present a framework to map hierarchical parallel genetic algorithms for protein folding problems onto computational grids. By using this framework, the two level communication parts of hierarchical parallel genetic algorithms are separated. Thus both parts of the algorithm can evolve independently. This permits users to experiment with alternative communication models on different levels conveniently. The underlying programming techniques are based on generic programming, a programming technique suited for the generic representation of abstract concepts. This allows the framework to be built in a generic way at application level and thus provides good extensibility and flexibility. Experiments show that it can lead to significant runtime savings on PC clusters and computational grids.

  • Point-of-Failure Shortest-Path Rerouting: Computing the Optimal Swap Edges Distributively

    Paola FLOCCHINI  Antonio Mesa ENRIQUES  Linda PAGLI  Giuseppe PRENCIPE  Nicola SANTORO  

     
    PAPER-Network Protocols, Topology and Fault Tolerance

      Vol:
    E89-D No:2
      Page(s):
    700-708

    We consider the problem of computing the optimal swap edges of a shortest-path tree. This problem arises in designing systems that offer point-of-failure shortest-path rerouting service in presence of a single link failure: if the shortest path is not affected by the failed link, then the message will be delivered through that path; otherwise, the system will guarantee that, when the message reaches the node where the failure has occurred, the message will then be re-routed through the shortest detour to its destination. There exist highly efficient serial solutions for the problem, but unfortunately because of the structures they use, there is no known (nor foreseeable) efficient distributed implementation for them. A distributed protocol exists only for finding swap edges, not necessarily optimal ones. We present two simple and efficient distributed algorithms for computing the optimal swap edges of a shortest-path tree. One algorithm uses messages containing a constant amount of information, while the other is tailored for systems that allow long messages. The amount of data transferred by the protocols is the same and depends on the structure of the shortest-path spanning-tree; it is no more, and sometimes significantly less, than the cost of constructing the shortest-path tree.

  • Clustering-Based Probabilistic Model Fitting in Estimation of Distribution Algorithms

    Chang Wook AHN  Rudrapatna S. RAMAKRISHNA  

     
    LETTER-Biocybernetics, Neurocomputing

      Vol:
    E89-D No:1
      Page(s):
    381-383

    An efficient clustering strategy for estimation of distribution algorithms (EDAs) is presented. It is used for properly fitting probabilistic models that play an important role in guiding search direction. To this end, a fitness-aided ordering scheme is devised for deciding the input sequence of samples (i.e., individuals) for clustering. It can effectively categorise the individuals by using the (available) information about fitness landscape. Moreover, a virtual leader is introduced for providing a reliable reference for measuring the distance from samples to its own cluster. The proposed algorithm incorporates them within the framework of random the leader algorithm (RLA). Experimental results demonstrate that the proposed approach is more effective than the existing ones with regard to probabilistic model fitting.

  • Adaptive Clustering Technique Using Genetic Algorithms

    Nam Hyun PARK  Chang Wook AHN  Rudrapatna S. RAMAKRISHNA  

     
    LETTER-Data Mining

      Vol:
    E88-D No:12
      Page(s):
    2880-2882

    This paper proposes a genetically inspired adaptive clustering algorithm for numerical and categorical data sets. To this end, unique encoding method and fitness functions are developed. The algorithm automatically discovers the actual number of clusters and efficiently performs clustering without unduly compromising cluster-purity. Moreover, it outperforms existing clustering algorithms.

  • Improved Heuristic Algorithms for Minimizing Initial Markings of Petri Nets

    Satoshi TAOKA  Masahiro YAMAUCHI  Toshimasa WATANABE  

     
    PAPER

      Vol:
    E88-A No:11
      Page(s):
    3051-3061

    The minimum initial marking problem MIM of Petri nets is described as follows: "Given a Petri net and a firing count vector X, find an initial marking M0, with the minimum total token number, for which there is a sequence δ of transitions such that each transition t appears exactly X(t) times in δ, the first transition is enabled at M0 and the rest can be fired one by one subsequently." This paper proposes two heuristic algorithms AAD and AMIM + and shows the following (1) and (2) through experimental results: (1) AAD is more capable than any other known algorithm; (2) AMIM + can produce M0, with a small number of tokens, even if other algorithms are too slow to compute M0 as the size of an input instance gets very large.

  • A Compact Design of W-Band High-Pass Waveguide Filter Using Genetic Algorithms and Full-Wave Finite Element Analysis

    An-Shyi LIU  Ruey-Beei WU  Yi-Cheng LIN  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E88-C No:8
      Page(s):
    1764-1771

    This paper proposes an efficient two-phase optimization approach for a compact W-band double-plane stepped rectangular waveguide filter design, which combines genetic algorithms (GAs) with the simplified transmission-line model and full-wave analysis. Being more efficient and robust than the gradient-based method, the approach can lead to a compact waveguide filter design. Numerical results show that the resultant waveguide filter design with 4 sections (total length 19.6 mm) is sufficient to meet the design goal and provides comparable performance to that with 8 sections (total length 35.6 mm) by the Chebyshev synthesis approach. Based on the present approach, nineteen compact high-pass waveguide filters have been implemented and measured at the W-band with satisfactory performance.

  • Efficient Blind MAI Suppression in DS/CDMA Systems by Embedded Constraint Parallel Projection Techniques

    Masahiro YUKAWA  Renato L.G. CAVALCANTE  Isao YAMADA  

     
    PAPER-Digital Signal Processing

      Vol:
    E88-A No:8
      Page(s):
    2062-2071

    This paper presents two novel blind set-theoretic adaptive filtering algorithms for suppressing "Multiple Access Interference (MAI)," which is one of the central burdens in DS/CDMA systems. We naturally formulate the problem of MAI suppression as an asymptotic minimization of a sequence of cost functions under some linear constraint defined by the desired user's signature. The proposed algorithms embed the constraint into the direction of update, and thus the adaptive filter moves toward the optimal filter without stepping away from the constraint set. In addition, using parallel processors, the proposed algorithms attain excellent performance with linear computational complexity. Geometric interpretation clarifies an advantage of the proposed methods over existing methods. Simulation results demonstrate that the proposed algorithms achieve (i) much higher speed of convergence with rather better bit error rate performance than other blind methods and (ii) much higher speed of convergence than the non-blind NLMS algorithm (indeed, the speed of convergence of the proposed algorithms is comparable to the non-blind RLS algorithm).

  • Genetic Design Method for Near-Optimal Training Sequences in Wideband Spatial Multiplexing Systems

    Toshiaki KOIKE  Hidekazu MURATA  Susumu YOSHIDA  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E88-B No:8
      Page(s):
    3488-3492

    In spatial multiplexing systems using multiple antennas, the error-rate performance is heavily dependent on the residual channel estimation error. In this letter, we propose a design method that uses the genetic algorithms to optimize training sequences for accurate channel estimation.

  • Block Time-Recursive Real-Valued Discrete Gabor Transform Implemented by Unified Parallel Lattice Structures

    Liang TAO  Hon Keung KWAN  

     
    PAPER-Digital Circuits and Computer Arithmetic

      Vol:
    E88-D No:7
      Page(s):
    1472-1478

    In this paper, the 1-D real-valued discrete Gabor transform (RDGT) proposed in our previous work and its relationship with the complex-valued discrete Gabor transform (CDGT) are briefly reviewed. Block time-recursive RDGT algorithms for the efficient and fast computation of the 1-D RDGT coefficients and for the fast reconstruction of the original signal from the coefficients are then developed in both the critical sampling case and the oversampling case. Unified parallel lattice structures for the implementation of the algorithms are studied. And the computational complexity analysis and comparison show that the proposed algorithms provide a more efficient and faster approach for the computation of the discrete Gabor transforms.

  • Investigation of Numerical Stability of 2D FE/FDTD Hybrid Algorithm for Different Hybridization Schemes

    Neelakantam VENKATARAYALU  Yeow-Beng GAN  Le-Wei LI  

     
    PAPER

      Vol:
    E88-B No:6
      Page(s):
    2341-2345

    Numerical Stability of the Finite Element/Finite Difference Time Domain Hybrid algorithm is dependent on the hybridization mechanism adopted. A framework is developed to analyze the numerical stability of the hybrid time marching algorithm. First, the global iteration matrix representing the hybrid algorithm following different hybridization schemes is constructed. An analysis of the eigenvalues of this iteration matrix reveals the stability performance of the algorithm. Thus conclusions on the performance with respect to numerical stability of the different schemes can be arrived at. Further, numerical experiments are carried out to verify the conclusions based on the stability analysis.

  • Another Simple Algorithm for Edge-Coloring Bipartite Graphs

    Takashi TAKABATAKE  

     
    LETTER

      Vol:
    E88-A No:5
      Page(s):
    1303-1304

    A new edge-coloring algorithm for bipartite graphs is presented. This algorithm, based on the framework of the O(m log d + (m/d) log (m/d) log d) algorithm by Makino-Takabatake-Fujishige and the O(m log m) one by Alon, finds an optimal edge-coloring of a bipartite graph with m edges and maximum degree d in O(m log d + (m/d) log (m/d)) time. This algorithm does not require elaborate data structures, which the best known O(m log d) algorithm due to Cole-Ost-Schirra depends on.

  • Strong Identification Based on a Hard-on-Average Problem

    Pino CABALLERO-GIL  

     
    PAPER

      Vol:
    E88-A No:5
      Page(s):
    1117-1121

    The aim of this work is to investigate the possibility of designing zero-knowledge identification schemes based on hard-on-average problems. It includes a new two-party identification protocol whose security relies on a discrete mathematics problem classified as DistNP-Complete under the average-case analysis, the so-called Distributional Matrix Representability Problem. Thanks to the use of the search version of the mentioned problem, the zero-knowledge property is formally proved by black-box simulation, and consequently the security of the proposed scheme is actually guaranteed. Furthermore, with the proposal of a new zero-knowledge proof based on a problem never used before for this purpose, the set of tools for designing cryptographic applications is enlarged.

  • A 2-Approximation Algorithm to (k + 1)-Edge-Connect a Specified Set of Vertices in a k-Edge-Connected Graph

    Toshiya MASHIMA  Satoshi TAOKA  Toshimasa WATANABE  

     
    PAPER

      Vol:
    E88-A No:5
      Page(s):
    1290-1300

    The (k + δ)-edge-connectivity augmentation problem for a specified set of vertices ((k + δ)ECA-SV) is defined as follows: "Given an undirected graph G =(V,E), a specified set of vertices Γ V, a subgraph G ′=(V,E ′) with λ(Γ;G ′) = k of G and a cost function c: E Z+ (nonnegative integers), find a set E* E - E ′of edges, each connecting distinct vertices of V, of minimum total cost such that λ(Γ;G″) k + δ for G"=(V,E ′∪E*)," where λ(Γ;G″) is the minimum value of the maximum number of edge disjoint paths between any pair of vertices in Γ of G". The paper proposes an O(Δ+|V||E|) time 2-approximation algorithm FSAR for (k + 1)ECA-SV with a restriction λ(V;G ′) = λ(Γ;G ′), where Δ is the time complexity of constructing a structural graph of a given graph G ′.

  • Zero-Knowledge Proof for the Independent Set Problem

    Pino CABALLERO-GIL  

     
    LETTER

      Vol:
    E88-A No:5
      Page(s):
    1301-1302

    An efficient computational Zero-Knowledge Proof of Knowledge whose security relies on the NP-completeness of the Independent Set Problem is presented here. The proposed algorithm is constructed from a bit commitment scheme based on the hardness of the Discrete Logarithm Problem, which guarantees the fulfillment of soundness, completeness and computational zero-knowledge properties, and allows avoiding the use of the Graph Isomorphism Problem, which is present in every known Zero-Knowledge Proofs for the Independent Set Problem.

  • A Linear Time Algorithm for Bi-Connectivity Augmentation of Graphs with Upper Bounds on Vertex-Degree Increase

    Takanori FUKUOKA  Toshiya MASHIMA  Satoshi TAOKA  Toshimasa WATANABE  

     
    PAPER

      Vol:
    E88-A No:4
      Page(s):
    954-963

    The 2-vertex-connectivity augmentation problem of a graph with degree constraints, 2VCA-DC, is defined as follows: "Given an undirected graph G = (V,E) and an upper bound a(v;G) Z+{} on vertex-degree increase for each v V, find a smallest set E′ of edges such that (V,E E′) has at least two internally-disjoint paths between any pair of vertices in V and such that vertex-degree increase of each v V by the addition of E′ to G is at most a(v;G), where Z+ is the set of nonnegative integers." In this paper we show that checking the existence of a feasible solution and finding an optimum solution to 2VCA-DC can be done in O(|V|+|E|) time.

  • Solving Facility Layout Problem Using an Improved Genetic Algorithm

    Rong-Long WANG  Kozo OKAZAKI  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E88-A No:2
      Page(s):
    606-610

    The facility layout problem is one of the most fundamental quadratic assignment problems in operations research. In this paper, we present an improved genetic algorithm for solving the facility layout problem. In our computational model, we propose several improvements to the basic genetic procedures including conditional crossover and mutation. The performance of the proposed method is evaluated on some benchmark problems. Computational results showed that the improved genetic algorithm is capable of producing high-quality solutions.

121-140hit(306hit)