The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] edge(512hit)

381-400hit(512hit)

  • Wiener-Hopf Analysis of the Diffraction by an Impedance Wedge: The Case of E Polarization

    Michinari SHIMODA  Ryuichi IWAKI  Masazumi MIYOSHI  Toyonori MATSUDA  

     
    PAPER-Electromagnetic Theory

      Vol:
    E84-C No:7
      Page(s):
    994-1001

    The diffraction of a plane electromagnetic wave by an impedance wedge whose boundary is described in terms of the skew coordinate systems is treated by using the Wiener-Hopf technique. The problem is formulated in terms of the simultaneous Wiener-Hopf equations, which are then solved by using a factorization and decomposition procedure and introducing appropriate functions to satisfy the edge condition. The exact solution is expressed through the Maliuzhinets functions. By deforming the integration path of the Fourier inverse transform, which expresses the scattered field, the expressions of the reflected field, diffracted field and the surface wave are obtained. The numerical examples for these fields are given and the characteristics of the surface wave are discussed.

  • Texture Boundary Detection Using 2-D Gabor Elementary Functions

    Bertin Rodolphe OKOMBI-DIBA  Juichi MIYAMICHI  Kenji SHOJI  

     
    PAPER-Image Processing, Image Pattern Recognition

      Vol:
    E84-D No:6
      Page(s):
    727-740

    A framework is proposed for segmenting image textures by using Gabor filters to detect boundaries between adjacent textured regions. By performing a multi-channel filtering of the input image with a small set of adaptively selected Gabor filters, tuned to underlying textures, feature images are obtained. To reduce the variance of the filter output for better texture boundary detection, a Gaussian post-filter is applied to the Gabor filter response over each channel. Significant local variations in each channel response are detected using a gradient operator, and combined through channel grouping to produce the texture gradient. A subsequent post-processing produces expected texture boundaries. The effectiveness of the proposed technique is demonstrated through experiments on synthetic and natural textures.

  • An Improved Algorithm for the Net Assignment Problem

    Takao ONO  Tomio HIRATA  

     
    PAPER

      Vol:
    E84-A No:5
      Page(s):
    1161-1165

    In this paper, we consider the net assignment problem in the logic emulation system. This problem is also known as the board-level-routing problem. There are field programmable logic arrays (FPGAs) and crossbars on an emulator board. Each FPGA is connected to each crossbar. Connection requests between FPGAs are called nets, and FPGAs are interconnected through crossbars. We are required to assign each net to the suitable crossbar. This problem is known to be NP-complete in general. A polynomial time algorithm is known for a certain restricted case, in which we treat only 2-terminal nets. In this paper we propose a new polynomial time algorithm for this case.

  • Improved Alternative Sequential Filter-Edge Detector

    Minsuk HONG  Jinsung OH  Sang-Hui PARK  

     
    LETTER-Image

      Vol:
    E84-A No:5
      Page(s):
    1352-1356

    In this paper, we present improved alternative sequential filter-edge detector using generalized directional morphological filters. Based on the properties of effective noise removal and detail preservation of the generalized directional morphological filters, we apply these filters to edge detection of noisy images. The performance of the edge detection in the presence of mixed noise is evaluated. Simulations show that edge detection method using generalized directional morphological filters can also improve the performance.

  • Manipulation of Weber-Schafheitlin Integral for Conducting Wedge

    Huen-Tae HA  Jung-Woong RA  

     
    LETTER-Antenna and Propagation

      Vol:
    E84-B No:3
      Page(s):
    691-693

    This letter presents a new transformation technique of series solution to asymptotic solution for a perfectly conducting wedge illuminated by E-polarized plane wave. This transformation gives an analytic manipulation example of the Weber-Schafheitlin integral for diffraction problem.

  • Discovering Knowledge from Graph Structured Data by Using Refutably Inductive Inference of Formal Graph Systems

    Tetsuhiro MIYAHARA  Tomoyuki UCHIDA  Takayoshi SHOUDAI  Tetsuji KUBOYAMA  Kenichi TAKAHASHI  Hiroaki UEDA  

     
    PAPER

      Vol:
    E84-D No:1
      Page(s):
    48-56

    We present a new method for discovering knowledge from structured data which are represented by graphs in the framework of Inductive Logic Programming. A graph, or network, is widely used for representing relations between various data and expressing a small and easily understandable hypothesis. The analyzing system directly manipulating graphs is useful for knowledge discovery. Our method uses Formal Graph System (FGS) as a knowledge representation language for graph structured data. FGS is a kind of logic programming system which directly deals with graphs just like first order terms. And our method employs a refutably inductive inference algorithm as a learning algorithm. A refutably inductive inference algorithm is a special type of inductive inference algorithm with refutability of hypothesis spaces, and is suitable for knowledge discovery. We give a sufficiently large hypothesis space, the set of weakly reducing FGS programs. And we show that this hypothesis space is refutably inferable from complete data. We have designed and implemented a prototype of a knowledge discovery system KD-FGS, which is based on our method and acquires knowledge directly from graph structured data. Finally we discuss the applicability of our method for graph structured data with experimental results on some graph theoretical notions.

  • A Theory of Demonstrating Program Result-Correctness with Cryptographic Applications

    Kouichi SAKURAI  

     
    INVITED SURVEY PAPER

      Vol:
    E84-D No:1
      Page(s):
    4-14

    We formalize a model of "demonstration of program result-correctness," and investigate how to prove this fact against possible adversaries, which naturally extends Blum's theory of program checking by adding zero-knowledge requirements. The zero-knowledge requirements are universal for yes and no instances alike.

  • Mathematical Derivation of Modified Edge Representation for Reduction of Surface Radiation Integral

    Ken-ichi SAKINA  Suomin CUI  Makoto ANDO  

     
    PAPER-Electromagnetic Theory

      Vol:
    E84-C No:1
      Page(s):
    74-83

    Modified Edge Representation (MER) empirically proposed by one of the authors is the line integral representation for computing surface radiation integrals of diffraction. It has remarkable accuracy in surface to line integral reduction even for sources very close to the scatterer. It also overcomes false and true singularities in equivalent edge currents. This paper gives the mathematical derivation of MER by using Stokes' theorem; MER is not only asymptotic but also global approximation. It proves remarkable applicability of MER, that is, to smooth curved surface, closely located sources and arbitrary currents which are irrelevant to Maxwell equations.

  • Cryptographic Works of Dr. Kenji Koyama: In Memoria

    Noboru KUNIHIRO  Kazuo OHTA  Tatsuaki OKAMOTO  Routo TERADA  Yukio TSURUOKA  

     
    INVITED PAPER

      Vol:
    E84-A No:1
      Page(s):
    108-113

    Dr. Kenji Koyama, one of the most respected and prominent Japanese researchers in modern cryptography, passed away on March 27, 2000. He left behind him many outstanding academic achievements in cryptography as well as other areas such as emotion transmission theory, learning and mathematical games. In this manuscript, with our deepest sympathy and greatest appreciation for his contribution to our society, we introduce his major works mainly in cryptography, although his papers in other areas are included in the bibliography list.

  • An Algorithm for Finding Two Edge-Disjoint Paths in Tournaments

    Shin-ichi NAKAYAMA  Shigeru MASUYAMA  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E83-A No:12
      Page(s):
    2672-2678

    This paper presents an O(n2)-time algorithm for constructing two edge-disjoint paths connecting two given pairs of vertices in a given tournament graph. It improves the time complexity of a previously known O(n4)-time algorithm.

  • Image Vector Quantization Using Classified Binary-Tree-Structured Self-Organizing Feature Maps

    Jyh-Shan CHANG  Tzi-Dar CHIUEH  

     
    PAPER-Image Processing, Image Pattern Recognition

      Vol:
    E83-D No:10
      Page(s):
    1898-1907

    With the continuing growth of the World Wide Web (WWW) services over the Internet, the demands for rapid image transmission over a network link of limited bandwidth and economical image storage of a large image database are increasing rapidly. In this paper, a classified binary-tree-structured Self-Organizing Feature Map neural network is proposed to design image vector codebooks for quantizing images. Simulations show that the algorithm not only produces codebooks with lower distortion than the well-known CVQ algorithm but also can minimize the edge degradation. Because the adjacent codewords in the proposed algorithm are updated concurrently, the codewords in the obtained codebooks tend to be ordered according to their mutual similarity which means more compression can be achieved with this algorithm. It should also be noticed that the obtained codebook is particularly well suited for progressive image transmission because it always forms a binary tree in the input space.

  • Trade off between Page Number and Number of Edge-Crossings on the Spine of Book Embeddings of Graphs

    Miki Shimabara MIYAUCHI  

     
    LETTER-Graphs and Networks

      Vol:
    E83-A No:8
      Page(s):
    1732-1734

    This paper studies the problem of book-embeddings of graphs. When each edge is allowed to appear in one or more pages by crossing the spine of a book, it is well known that every graph G can be embedded in a 3-page book. Recently, it has been shown that there exists a 3-page book embedding of G in which each edge crosses the spine O(log2 n) times. This paper considers a book with more than three pages. In this case, it is known that a complete graph Kn with n vertices can be embedded in a n/2 -page book without any edge-crossings on the spine. Thus it becomes an interesting problem to devise book-embeddings of G so as to reduce both the number of pages used and the number of edge-crossings over the spine. This paper shows that there exists a d-page book embedding of G in which each edge crosses the spine O(logd n) times. As a direct corollary, for any real number s, there is an ns -page book embedding of G in which each edge crosses the spine a constant number of times. In another paper, Enomoto-Miyauchi-Ota show that for an integer d, if n is sufficiently large compared with d, then for any embedding of Kn into a d-page book, there must exist Ω(n2 logd n) points at which edges cross over the spine. This means our result is the best possible for Kn in this case.

  • Automatic Elicitation of Knowledge for Detecting Feature Interactions in Telecommunication Services

    Tae YONEDA  Tadashi OHTA  

     
    PAPER-Theory and Methodology

      Vol:
    E83-D No:4
      Page(s):
    640-647

    This paper proposes a method of automatically eliciting knowledge which is used to detect feature interactions in telecommunication services. With conventional methods, the knowledge is provided manually. With the proposed method, the knowledge is automatically elicited as service constraints. In telecommunication systems, when a new service is added, new state transitions are created. In case of new service, the new state should be reached in the state transitions. On the other hand, some states of existing services should not be reached. These constraints can be considered as knowledge for detecting feature interactions. This paper also proposes a scenario for detecting feature interactions using elicited knowledge. This scenario was confirmed as effective.

  • Knowledge-Based Software Composition Using Rough Set Theory

    Yoshiyuki SHINKAWA  Masao J. MATSUMOTO  

     
    PAPER-Theory and Methodology

      Vol:
    E83-D No:4
      Page(s):
    691-700

    Software Composition is one of the major concerns in component based software development (CBSD). In this paper, we present a formal approach to construct software systems from requirements models using available components. We focus on the knowledge resides in the requirements and the components in order to deal with those heterogeneous concepts. This approach consists of three steps. The first step is selecting adaptable components to the requirements model. The requirements and the components are transformed into the form of Σ algebra, and the component adaptability is evaluated by Σ homomorphism. Rough Set Theory (RST) is used to make carriers of two Σ algebras common, which are derived from the requirements and the components. The second step is identifying the control structure of the requirements. Decision tables are used for representing the knowledge on the requirements, and RST is used to optimize the control structure. The third step is to implement the control structure as glue codes which would perform the components appropriately. This approach mainly focuses on enterprise back-office applications in this paper, however, it can be easily applied to other domains, since it assumes the requirements to be expressed in Colored Petri Nets (CPN), and CPN can express various problem domains other than enterprise back-office applications.

  • Software Creation: A Study on the Inside of Human Design Knowledge

    Hassan ABOLHASSANI  Hui CHEN  Behrouz Homayoun FAR  Zenya KOONO  

     
    PAPER-Theory and Methodology

      Vol:
    E83-D No:4
      Page(s):
    648-658

    This paper discusses the characteristics of human design knowledge. By studying a number of actual human made designs of excellent designers, the most frequent basic mental operations of a typical human designer have been found. They are: a design rule for hierarchical detailing reported previously, a micro design rule for generating a hierarchical expansion, dictionary operations to build a micro design rule and dictionaries. This study assumes a multiplicity of knowledge based on Zipf's theory, "the principle of least effort. " Zipf's principle may be proved and it becomes possible to understand the fundamental nature of human design.

  • A Mathematical Proof of Physical Optics Equivalent Edge Currents Based upon the Path of Most Rapid Phase Variation

    Suomin CUI  Ken-ichi SAKINA  Makoto ANDO  

     
    LETTER-Electromagnetic Theory

      Vol:
    E83-C No:4
      Page(s):
    659-663

    Mathematical proof for the equivalent edge currents for physical optics (POEECs) is given for plane wave incidence and the observer in far zone; the perfect accuracy of POEECs for plane wave incidence as well as the degradation for the dipole source closer to the scatterer is clearly explained for the first time. POEECs for perfectly conducting plates are extended to those for impedance plates.

  • A Generalized Knowledge-Based Approach to Comprehend Pascal and C Programs

    Haruki UENO  

     
    PAPER-Theory and Methodology

      Vol:
    E83-D No:4
      Page(s):
    591-598

    Knowledge-based program understanding is widely known as one of the key issues in programming education support systems and environments for novices. Most program understanders, however, have limitations. One of them is an ability to deal with a single programming language, while human tutors can comprehend plural languages by means of generalized knowledge on programming languages and techniques. This paper proposes the concepts and methodology of the knowledge-based program understander ALPUS II, which deals with plural programming languages, i. e. , Pascal and C, by means of generalized abstract syntax AL and knowledge representations based on it. ALPUS II is an extension of ALPUS, which dealt with a single programming language Pascal, and is a sub-system of an intelligent programming environment INTELLITUTOR. The INTELLITUTOR system consists of a guided programming editor GUIDE and a knowledge-based program understander ALPUS II, and is available on the Internet. In the process of comprehension source statements written in Pascal or C are translated into AL representation first. Since the contents of the programming knowledge bases are adjusted to deal with the AL representations the program comprehension procedure is available for both Pascal and C. It is possible to append other programming languages by simply attaching a transformation module for each additional procedural language. It is noted that knowledge acquisition tasks for additional languages are not needed since the contents of the knowledge base are generalized for multiple use. The INTELLITUTOR system was implemented in the frame-based knowledge engineering environment ZERO on a UNIX server machine in the Internet environment. ALPUS II demonstrates interesting features in program comprehension for the C language by means of the transformed knowledge from the already available knowledge for Pascal, which was developed for ALPUS, in a feasibility study. The current version of ALPUS II supports almost full specifications for Pascal and a Pascal-associated subset for C. This limitation should be reasonable for programming practice at freshmen classes of a university.

  • Formalization of Organizational Intelligence for Multiagent System Design

    Behrouz Homayoun FAR  Hassan HAJJI  Shadan SANIEPOUR  Sidi O. SOUEINA  Mahmoud M. ELKHOULY  

     
    PAPER-Theory and Methodology

      Vol:
    E83-D No:4
      Page(s):
    599-607

    Although there are many projects focusing on multiagent systems, there are only a few focusing on systematic design of large scale multiagent system. In this paper we formalize the knowledge representation and sharing of agents, using symbol structures, define agencies as organizations (i. e. , a coalition of agents), propose a formalism to represent organizational Intelligence, devise a basic configuration for generalized agents (AG), and use them in a large scale multiagent system design. Private knowledge of an AG agent is represented by a symbol structure (SS) and AG agents can share their knowledge using combination, specialization and generalization methods that operate on the SS. Opposite to the other works, organizational knowledge, is defined as a property of at least a pair of AG agents.

  • Graph Coloring Algorithms

    Xiao ZHOU  Takao NISHIZEKI  

     
    INVITED SURVEY PAPER-Graph Algorithms

      Vol:
    E83-D No:3
      Page(s):
    407-417

    Graph coloring is a fundamental problem, which often appears in various scheduling problems like the file transfer problem on computer networks. In this paper, we survey recent advances and results on the edge-coloring, the f-coloring, the [g,f]-coloring, and the total coloring problem for various classes of graphs such as bipartite graphs, series-parallel graphs, planar graphs, and graphs having fixed degeneracy, tree-width, genus, arboricity, unicyclic index or thickness. In particular, we review various upper bounds on the minimum numbers of colors required to color these classes of graphs, and present efficient sequential and parallel algorithms to find colorings of graphs with these numbers of colors.

  • Recent Development of Graph Connectivity Augmentation Algorithms

    Hiroshi NAGAMOCHI  

     
    INVITED SURVEY PAPER-Graph Algorithms

      Vol:
    E83-D No:3
      Page(s):
    372-383

    The connectivity augmentation problem asks to add to a given graph the smallest number of new edges so that the edge- (or vertex-) connectivity of the graph increases up to a specified value k. The problem has been extensively studied, and several efficient algorithm have been discovered. We survey the recent development of the algorithms for this problem. In particular, we show how the minimum cut algorithm due to Nagamochi and Ibaraki is effectively applied to solve the edge-connectivity augmentation problem.

381-400hit(512hit)