The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] computation(490hit)

241-260hit(490hit)

  • Butterfly Structure for Viterbi Decoders of All Rates k/n

    Tsung Sheng KUO  Chau-Yun HSU  

     
    PAPER-Coding Theory

      Vol:
    E90-A No:2
      Page(s):
    504-510

    This paper proposes a butterfly structure for Viterbi decoders, which works for convolutional codes of all rates k/n. The proposed butterfly structure can exploit the inherent symmetry of trellis branches, so that only some branch metrics need to be computed, while the others can be derived from the computed branches. Consequently, the computational complexity of the Viterbi decoder can be significantly reduced without any error performance loss. The applicability of the butterfly structure is validated by the best codes of rates 1/2, 2/3, and 3/4. Most of the best codes can apply the butterfly structure to reduce their branch metric computation complexity by a factor of 2 or 4. This study also reports a number of new codes with high branch symmetry under the symmetry consideration. Their branch metric computation can be reduced by a factor of 4, 8 or 16 with the similar performance to the best codes.

  • Optimization Design of Biorthogonal Wavelets for Embedded Image Coding

    Zaide LIU  Nanning ZHENG  Yuehu LIU  Huub VAN DE WETERING  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E90-D No:2
      Page(s):
    569-578

    We present here a simple technique for parametrization of popular biorthogonal wavelet filter banks (BWFBs) having vanishing moments (VMs) of arbitrary multiplicity. Given a prime wavelet filter with VMs of arbitrary multiplicity, after formulating it as a trigonometric polynomial depending on two free parameters, we prove the existence of its dual filter based on the theory of Diophantine equation. The dual filter permits perfect reconstruction (PR) and also has VMs of arbitrary multiplicity. We then give the complete construction of two-parameter families of 17/11 and 10/18 BWFBs, from which any linear-phase 17/11 and 10/18 BWFB possessing desired features could be derived with ease by adjusting the free parameters. In particular, two previously unpublished BWFBs for embedded image coding are constructed, both have optimum coding gains and rational coef ficients. Extensive experiments show that our new BWFBs exhibit performance equal to Winger's W-17/11 and Villasenor's V-10/18 (superior to CDF-9/7 by Cohen et al. and Villasenor's V-6/10) for image compression, and yet require slightly lower computational costs.

  • Evaluation of Isolation Structures against High-Frequency Substrate Coupling in Analog/Mixed-Signal Integrated Circuits

    Daisuke KOSAKA  Makoto NAGATA  Yoshitaka MURASAKA  Atsushi IWATA  

     
    PAPER

      Vol:
    E90-A No:2
      Page(s):
    380-387

    Substrate-coupling equivalent circuits can be derived for arbitrary isolation structures by F-matrix computation. The derived netlist represents a unified impedance network among multiple sites on a chip surface as well as internal nodes of isolation structures and can be applied with SPICE simulation to evaluate isolation strengths. Geometry dependency of isolation attributes to layout parameters such as area, width, and location distance. On the other hand, structural dependency arises from vertical impurity concentration specific to p+/n+ diffusion and deep n-well. Simulation-based prototyping of isolation structures can include all these dependences and strongly helps establish an isolation strategy against high-frequency substrate coupling in a given technology. The analysis of isolation strength provided by p+/n+ guard ring, deep n-well guard ring as well as deep n-well pocket well explains S21 measurements performed on high-frequency test structures targeting 5 GHz bandwidth, that was formed in a 0.25-µm CMOS high frequency.

  • A MATLAB-Based Code Generator for Parallel Sparse Matrix Computations Utilizing PSBLAS

    Taiji SASAOKA  Hideyuki KAWABATA  Toshiaki KITAMURA  

     
    PAPER-Parallel Programming

      Vol:
    E90-D No:1
      Page(s):
    2-12

    Parallel programs for distributed memory machines are not easy to create and maintain, especially when they involve sparse matrix computations. In this paper, we propose a program translation system for generating parallel sparse matrix computation codes utilizing PSBLAS. The purpose of the development of the system is to offer the user a convenient way to construct parallel sparse code based on PSBLAS. The system is build up on the idea of bridging the gap between the easy-to-read program representations and highly-tuned parallel executables based on existing parallel sparse matrix computation libraries. The system accepts a MATLAB program with annotations and generates subroutines for an SPMD-style parallel program which runs on distributed-memory machines. Experimental results on parallel machines show that the prototype of our system can generate fairly efficient PSBLAS codes for simple applications such as CG and Bi-CGSTAB programs.

  • Disjointed SRLG Routing for GMPLS Networks by Hierarchically Distributed PCE

    Hiroshi MATSUURA  Naotaka MORITA  Tatsuro MURAKAMI  Kazumasa TAKAMI  

     
    PAPER-Internet

      Vol:
    E90-B No:1
      Page(s):
    51-62

    Multilayered network interaction among various networks such as IP/MPLS packet networks and optical fiber networks are now achieved using generalized multiprotocol label switching (GMPLS) technology. One unique feature of GMPLS networks is that GMPLS packet-layer label switching paths (LSPs), such as IP/MPLS LSPs, sometimes tunnel through GMPLS lower layer LSPs such as optical fiber/lambda LSPs. One problem that occurs in this situation is protecting an important primary packet LSP by using a protection LSP that is physically separated from the primary LSP. The packet router has difficulty recognizing lower layer LSPs that are totally disjointed from the primary LSP. This is because, in a GMPLS's packet layer, a source router only differentiates one lower layer LSP from another, and does not check the disjointedness of segments through which the lower layer path passes. Sometimes, different lower LSPs pass through the same optical fiber, and a malfunction of one optical fiber sometimes causes many lower layer LSPs to malfunction at the same time. To solve this problem, a shared risk link group (SRLG) is introduced. Network links that belong to the same SRLG share a common physical resource. We apply this SRLG to the proposed hierarchically distributed path computation elements (HDPCEs) and achieve effective disjointed SRLG protection for important primary GMPLS packet paths.

  • Memory Size Computation for Real-Time Multimedia Applications Based on Polyhedral Decomposition

    Hongwei ZHU  Ilie I. LUICAN  Florin BALASA  

     
    PAPER-System Level Design

      Vol:
    E89-A No:12
      Page(s):
    3378-3386

    In real-time multimedia processing systems a very large part of the power consumption is due to the data storage and data transfer. Moreover, the area cost is often largely dominated by the memory modules. In deriving an optimized (for area and/or power) memory architecture, memory size computation is an important step in the exploration of the possible algorithmic specifications of multimedia applications. This paper presents a novel non-scalar approach for computing exactly the memory size in real-time multimedia algorithms. This methodology uses both algebraic techniques specific to the data-flow analysis used in modern compilers and, also, more recent advances in the theory of polyhedra. In contrast with all the previous works which are only estimation methods, this approach performs exact memory computations even for applications significantly large in terms of the code size, number of scalars, and number of array references.

  • Service Virtualization for Border Model Based Multi-Layer Service Network Architecture

    Mallik TATIPAMULA  Ichiro INOUE  Zafar ALI  Hisashi KOJIMA  Kohei SHIOMOTO  Shigeo URUSHIDANI  Shoichiro ASANO  

     
    PAPER

      Vol:
    E89-D No:12
      Page(s):
    2867-2874

    The rapidly increasing bandwidth requirements of IP traffic mean that networks based on optical technologies in conjunction with IP routing technologies will provide the backbone of the next generation Internet. One of the major issues is how to construct an optical-technology-based backbone network that offers the economical transport of large-scale IP/MPLS services while achieving reliable, robust network. The key to achieving this objective lies in multilayer coordination technologies using Multi-Layer Service Network [MLSN] Architecture, that we previously proposed [2]. One of the important aspects of MLSN architecture is ability to effectively use GMPLS network resources by IP/MPLS service networks. We propose extensions to previously proposed MLSN architecture. The proposed extensions to MLSN architecture are tailored to address "service virtualization and separation" of various service networks over GMPLS backbone. As a part of this extended MLSN architecture, we introduce novel concepts known as Logical Router (LR) and Virtual Router (VR) that would enable border router to be services domain router, so that it can connect multiple service networks such as L2VPN, L3VPN etc., over GMPLS backbone by offering service separation or virtualization. This service separation/isolation greatly enhances the reliability of next generation networks, as any failure on one service should be isolated from others. We evaluate our extended network architecture against requirements for the large scale network targeting at introducing such new technology to cope with vast traffic explosion and challenges in operation and service provision sophistication.

  • An Efficient Time-Domain Electromagnetic Solution Using the Time-Domain Variable Resolution Concept

    Hyung-Hoon KIM  Saehoon JU  Seungwon CHOI  Jong-Il PARK  Hyeongdong KIM  

     
    LETTER-Antennas and Propagation

      Vol:
    E89-B No:12
      Page(s):
    3487-3490

    To make the best use of the known characteristics of the alternating-direction-implicit finite-difference time-domain (ADI-FDTD) method such as unconditional stability and modeling accuracy, an efficient time domain solution with variable time-step size is proposed. Numerical results show that a time-step size for a given mesh size can be increased preserving a desired numerical accuracy over frequencies of interest.

  • Complexity and a Heuristic Algorithm of Computing Parallel Degree for Program Nets with SWITCH-Nodes

    Shingo YAMAGUCHI  Tomohiro TAKAI  Tatsuya WATANABE  Qi-Wei GE  Minoru TANAKA  

     
    PAPER-Concurrent Systems

      Vol:
    E89-A No:11
      Page(s):
    3207-3215

    This paper deals with computation of parallel degree, PARAdeg, for (dataflow) program nets with SWITCH-nodes. Ge et al. have given the definition of PARAdeg and an algorithm of computing PARAdeg for program nets with no SWITCH-nodes. However, for program nets with SWITCH-nodes, any algorithm of computing PARAdeg has not been proposed. We first show that it is intractable to compute PARAdeg for program nets with SWITCH-nodes. To do this, we define a subclass of program nets with SWITCH-nodes, named structured program nets, and then show that the decision problem related to compute PARAdeg for acyclic structured program nets is NP-complete. Next, we give a heuristic algorithm to compute PARAdeg for acyclic structured program nets. Finally, we do experiments to evaluate our heuristic algorithm for 200 acyclic structured program nets. We can say that the heuristic algorithm is reasonable, because its accuracy is more than 96% and the computation time can be greatly reduced.

  • Evolutionary Computing of Petri Net Structure for Cyclic Job Shop Scheduling

    Morikazu NAKAMURA  Koji HACHIMAN  Hiroki TOHME  Takeo OKAZAKI  Shiro TAMAKI  

     
    PAPER-Concurrent Systems

      Vol:
    E89-A No:11
      Page(s):
    3235-3243

    This paper considers Cyclic Job-Shop Scheduling Problems (CJSSP) extended from the Job-Shop Scheduling Problem (JSSP). We propose an evolutionary computing method to solve the problem approximately by generating the Petri net structure for scheduling. The crossover proposed in this paper employs structural analysis of Petri net model, that is, the crossover improves the cycle time by breaking the bottle-neck circuit obtained by solving a linear programming problem. Experimental evaluation shows the effectiveness of our approach.

  • A Co-channel Interference Cancellation Method Using Low Dimensional Sphere Decoding for MIMO Communication Systems

    Masatsugu HIGASHINAKA  Akihiro OKAZAKI  Katsuyuki MOTOYOSHI  Takayuki NAGAYASU  Hiroshi KUBO  Akihiro SHIBUYA  

     
    PAPER-Coding Theory

      Vol:
    E89-A No:10
      Page(s):
    2526-2534

    This paper proposes a co-channel interference cancellation method for multiple-input multiple-output (MIMO) wireless communication systems. Maximum-likelihood multi-user detection (ML-MUD), which is one of the co-channel interference cancellation methods at a receiver side, has excellent bit error rate (BER) performance. However, computational complexity of the ML-MUD is prohibitive, because the ML-MUD must search for the most probable symbol vector from all candidates of the transmitted signals. We apply sphere decoding (SD) to the ML-MUD in order to reduce the computational complexity of the ML-MUD, and moreover we propose a modified version of the SD suitable for the ML-MUD. The proposed method extracts desired signal components from a received signal vector and a channel matrix decomposed the upper triangular form, and then performs the SD to the low dimensional model in order to detect the transmitted signals of the desired user. Computer simulation confirms that the proposed method can suppress the undesired signals and detect the desired signals, offering significant reduction of the computational complexity of the conventional method.

  • Multiobjective Evolutionary Approach to the Design of Optimal Controllers for Interval Plants via Parallel Computation

    Chen-Chien James HSU  Chih-Yung YU  Shih-Chi CHANG  

     
    PAPER-Systems and Control

      Vol:
    E89-A No:9
      Page(s):
    2363-2373

    Design of optimal controllers satisfying performance criteria of minimum tracking error and disturbance level for an interval system using a multi-objective evolutionary approach is proposed in this paper. Based on a worst-case design philosophy, the design problem is formulated as a minimax optimization problem, subsequently solved by a proposed two-phase multi-objective genetic algorithm (MOGA). By using two sets of interactive genetic algorithms where the first one determines the maximum (worst-case) cost function values for a given set of controller parameters while the other one minimizes the maximum cost function values passed from the first genetic algorithm, the proposed approach evolutionarily derives the optimal controllers for the interval system. To suitably assess chromosomes for their fitness in a population, root locations of the 32 generalized Kharitonov polynomials will be used to establish a constraints handling mechanism, based on which a fitness function can be constructed for effective evaluation of the chromosomes. Because of the time-consuming process that genetic algorithms generally exhibit, particularly the problem nature of minimax optimization, a parallel computation scheme for the evolutionary approach in the MATLAB-based working environment is also proposed to accelerate the design process.

  • Computing Automorphism Groups of Chordal Graphs Whose Simplicial Components Are of Small Size

    Seinosuke TODA  

     
    INVITED PAPER

      Vol:
    E89-D No:8
      Page(s):
    2388-2401

    It is known that any chordal graph can be uniquely decomposed into simplicial components. Based on this fact, it is shown that for a given chordal graph, its automorphism group can be computed in O((c!n)O(1)) time, where c denotes the maximum size of simplicial components and n denotes the number of nodes. It is also shown that isomorphism of those chordal graphs can be decided within the same time bound. From the viewpoint of polynomial-time computability, our result strictly strengthens the previous ones respecting the clique number.

  • Decoding the (23, 12, 7) Golay Code Using a Low-Complexity Scheme

    Ching-Lung CHR  Szu-Lin SU  Shao-Wei WU  

     
    LETTER-Coding Theory

      Vol:
    E89-A No:8
      Page(s):
    2235-2238

    Similar to algebraic decoding schemes, the (23, 12, 7) Golay code can be decoded by applying the step-by-step decoding algorithm. In this work, a modified step-by-step algorithm for decoding the Golay code is presented. Logical analysis yielded a simple rule for directly determining whether a bit in the received word is correct. The computational complexity can be reduced significantly using this scheme.

  • Finding a Triangular Mesh with a Constant Number of Different Edge Lengths

    Shin-ichi TANIGAWA  Naoki KATOH  

     
    INVITED PAPER

      Vol:
    E89-D No:8
      Page(s):
    2364-2371

    We consider the problem of triangulating an x-monotone polygon with a small number of different edge lengths using Steiner points. Given a parameter α, where 0<α<1, we shall present an algorithm for finding an almost uniform triangular mesh with 3π/8α2+o(1/α2) different edge lengths such that every edge length is between l and (2+α)l. Experiments demonstrate the effectiveness of this algorithm.

  • Inserting Points Uniformly at Every Instance

    Sachio TERAMOTO  Tetsuo ASANO  Naoki KATOH  Benjamin DOERR  

     
    INVITED PAPER

      Vol:
    E89-D No:8
      Page(s):
    2348-2356

    Arranging n points as uniformly as possible is a frequently occurring problem. It is equivalent to packing n equal and non-overlapping circles in a unit square. In this paper we generalize this problem in such a way that points are inserted one by one with uniformity preserved at every instance. Our criterion for uniformity is to minimize the gap ratio (which is the maximum gap over the minimum gap) at every point insertion. We present a linear time algorithm for finding an optimal n-point sequence with the maximum gap ratio bounded by in the 1-dimensional case. We describe how hard the same problem is for a point set in the plane and propose a local search heuristics for finding a good solution.

  • DWT Domain On-Line Signature Verification Using the Pen-Movement Vector

    Isao NAKANISHI  Hiroyuki SAKAMOTO  Naoto NISHIGUCHI  Yoshio ITOH  Yutaka FUKUI  

     
    LETTER-Information Security

      Vol:
    E89-A No:4
      Page(s):
    1129-1131

    In order to reduce the computational complexity of the DWT domain on-line signature verification, the authors propose to utilize the pen-movement vector as an input parameter. Experimental results indicate that the verification rate obtained using the pen-movement vector parameter is equivalent to that obtained by the conventional method, although the computational complexity of the proposed method is approximately half that of the conventional method.

  • Dead Problem of Program Nets

    Shingo YAMAGUCHI  Kousuke YAMADA  Qi-Wei GE  Minoru TANAKA  

     
    PAPER

      Vol:
    E89-A No:4
      Page(s):
    887-894

    In this paper, we discuss a new property, named dead, of (dataflow) program nets. We say that a node of a program net is dead iff the node cannot fire once in any possible firing sequence, and furthermore the program net is partially dead. We tackle a problem of deciding whether a given program net is partially dead, named dead problem. Program nets can be classified into four subclasses: general, acyclic, SWITCH-less, and acyclic SWITCH-less nets. For each subclass, we give a method of solving dead problem and its computation complexity. Our results show that (i) acyclic SWITCH-less nets are not partially dead; (ii) for SWITCH-less nets, dead problem can be solved in polynomial time; (iii) for acyclic nets and general nets, dead problem is intractable.

  • Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes

    Hong WANG  Gang QIU  Deng-Guo FENG  Guo-Zhen XIAO  

     
    LETTER-Information Security

      Vol:
    E89-A No:3
      Page(s):
    822-825

    In PKC'01, Tzeng et al. proposed two robust forward-secure signature schemes with proactive security: one is an efficient scheme, but it requires a manager; the other scheme is a new construction based on distributed multiplication procedures. In this paper, we point out their new distributed multiplication procedure is not secure, thus making the whole new construction insecure. Finally, we present an improved forward-secure signature scheme without a manager.

  • Expressive Power of Quantum Pushdown Automata with Classical Stack Operations under the Perfect-Soundness Condition

    Masaki NAKANISHI  Kiyoharu HAMAGUCHI  Toshinobu KASHIWABARA  

     
    PAPER-Computation and Computational Models

      Vol:
    E89-D No:3
      Page(s):
    1120-1127

    One important question for quantum computing is whether a computational gap exists between models that are allowed to use quantum effects and models that are not. Several types of quantum computation models have been proposed, including quantum finite automata and quantum pushdown automata (with a quantum pushdown stack). It has been shown that some quantum computation models are more powerful than their classical counterparts and others are not since quantum computation models are required to obey such restrictions as reversible state transitions. In this paper, we investigate the power of quantum pushdown automata whose stacks are assumed to be implemented as classical devices, and show that they are strictly more powerful than their classical counterparts under the perfect-soundness condition, where perfect-soundness means that an automaton never accepts a word that is not in the language. That is, we show that our model can simulate any probabilistic pushdown automata and also show that there is a non-context-free language which quantum pushdown automata with classical stack operations can recognize with perfect soundness.

241-260hit(490hit)