The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] evolution(162hit)

41-60hit(162hit)

  • An Adaptive Time-Step Control Method in Damped Pseudo-Transient Analysis for Solving Nonlinear DC Circuit Equations

    Xiao WU  Zhou JIN  Dan NIU  Yasuaki INOUE  

     
    PAPER-Nonlinear Problems

      Vol:
    E100-A No:2
      Page(s):
    619-628

    An adaptive time-step control method is proposed for the damped pseudo-transient analysis (DPTA) method. The new method is based on the idea of switched evolution/relaxation (SER), which can automatically adapt the step size for different circuit states. Considering the number of iterations needed for the convergence of Newton-Raphson (NR) method and the states in previous steps, the proposed method can automatically optimize the time-step size. Using numerical examples, the new method is proven to improve robustness, simulation efficiency, and the convergence of DPTA for solving nonlinear DC circuit equations.

  • Performance Analysis Based on Density Evolution on Fault Erasure Belief Propagation Decoder

    Hiroki MORI  Tadashi WADAYAMA  

     
    PAPER-Coding Theory and Techniques

      Vol:
    E99-A No:12
      Page(s):
    2155-2161

    In this paper, we will present analysis on the fault erasure BP decoders based on the density evolution. In the fault BP decoder, the messages exchanged in a BP process are stochastically corrupted due to unreliable logic gates and flip-flops; i.e., we assume circuit components with transient faults. We derived a set of the density evolution equations for the fault erasure BP processes. Our density evolution analysis reveals the asymptotic behaviors of the estimation error probability of the fault erasure BP decoders. In contrast to the fault free cases, it is observed that the error probabilities of the fault erasure BP decoder converge to positive values, and that there exists a discontinuity in an error curve corresponding to the fault BP threshold. It is also shown that an message encoding technique provides higher fault BP thresholds than those of the original decoders at the cost of increased circuit size.

  • NDN-Based Message Delivery with Collaborative Communication for Reducing Base Station Power Consumption in Disasters Open Access

    Yuki KOIZUMI  Suhwuk KIM  Yuki URATA  Toru HASEGAWA  

     
    PAPER

      Vol:
    E99-B No:12
      Page(s):
    2541-2549

    This paper proposes an NDN-based message delivery protocol over a cellular network in disasters. Collaborative communication among cellular devices is integrated into the protocol so that power consumed by battery-operated base stations (BSs) is reduced when a blackout occurs. A key idea is to reduce consumed radio resources by making cellular devices of which radio propagation quality are better forward messages of neighboring devices. The radio resource reduction contributes to reducing power consumed by a battery-operated BS. We empirically and analytically evaluate how the proposed message delivery protocol reduces the power consumption of a BS assuming a densely populated shelter.

  • Surface Reconstruction of Renal Corpuscle from Microscope Renal Biopsy Image Sequence

    Jun ZHANG  Jinglu HU  

     
    PAPER-Image

      Vol:
    E99-A No:12
      Page(s):
    2539-2546

    The three dimensional (3D) reconstruction of a medical image sequence can provide intuitive morphologies of a target and help doctors to make more reliable diagnosis and give a proper treatment plan. This paper aims to reconstruct the surface of a renal corpuscle from the microscope renal biopsy image sequence. First, the contours of renal corpuscle in all slices are extracted automatically by using a context-based segmentation method with a coarse registration. Then, a new coevolutionary-based strategy is proposed to realize a fine registration. Finally, a Gauss-Seidel iteration method is introduced to achieve a non-rigid registration. Benefiting from the registrations, a smooth surface of the target can be reconstructed easily. Experimental results prove that the proposed method can effectively register the contours and give an acceptable surface for medical doctors.

  • A Color Scheme Method by Interactive Evolutionary Computing Considering Contrast of Luminance and Design Property

    Keiko YAMASHITA  Kaoru ARAKAWA  

     
    PAPER-Image

      Vol:
    E99-A No:11
      Page(s):
    1981-1989

    A method of color scheme is proposed considering contrast of luminance between adjacent regions and design property. This method aims at setting the contrast of luminance high, in order to make the image understandable to visually handicapped people. This method also realizes preferable color design for visually normal people by assigning color components from color combination samples. Interactive evolutionary computing is adopted to design the luminance and the color, so that the luminance and color components are assigned to each region appropriately on the basis of human subjective criteria. Here, the luminance is designed first, and then color components are assigned, keeping the luminance unchanged. Since samples of fine color combinations are applied, the obtained color design is also fine and harmonic. Computer simulations verify the high performance of this system.

  • Singular-Spectrum Analysis for Digital Audio Watermarking with Automatic Parameterization and Parameter Estimation Open Access

    Jessada KARNJANA  Masashi UNOKI  Pakinee AIMMANEE  Chai WUTIWIWATCHAI  

     
    PAPER-Information Network

      Pubricized:
    2016/05/16
      Vol:
    E99-D No:8
      Page(s):
    2109-2120

    This paper proposes a blind, inaudible, robust digital-audio watermarking scheme based on singular-spectrum analysis, which relates to watermarking techniques based on singular value decomposition. We decompose a host signal into its oscillatory components and modify amplitudes of some of those components with respect to a watermark bit and embedding rule. To improve the sound quality of a watermarked signal and still maintain robustness, differential evolution is introduced to find optimal parameters of the proposed scheme. Test results show that, although a trade-off between inaudibility and robustness still persists, the difference in sound quality between the original and the watermarked one is considerably smaller. This improved scheme is robust against many attacks, such as MP3 and MP4 compression, and band-pass filtering. However, there is a drawback, i.e., some music-dependent parameters need to be shared between embedding and extraction processes. To overcome this drawback, we propose a method for automatic parameter estimation. By incorporating the estimation method into the framework, those parameters need not to be shared, and the test results show that it can blindly decode watermark bits with an accuracy of 99.99%. This paper not only proposes a new technique and scheme but also discusses the singular value and its physical interpretation.

  • A Conditional Dependency Based Probabilistic Model Building Grammatical Evolution

    Hyun-Tae KIM  Hyun-Kyu KANG  Chang Wook AHN  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2016/04/11
      Vol:
    E99-D No:7
      Page(s):
    1937-1940

    In this paper, a new approach to grammatical evolution is presented. The aim is to generate complete programs using probabilistic modeling and sampling of (probability) distribution of given grammars. To be exact, probabilistic context free grammars are employed and a modified mapping process is developed to create new individuals from the distribution of grammars. To consider problem structures in the individual generation, conditional dependencies between production rules are incorporated into the mapping process. Experiments confirm that the proposed algorithm is more effective than existing methods.

  • Modified t-Distribution Evolutionary Algorithm for Dynamic Deployment of Wireless Sensor Networks

    Xiaolei LIU  Xiaosong ZHANG  Yiqi JIANG  Qingxin ZHU  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2016/03/22
      Vol:
    E99-D No:6
      Page(s):
    1595-1602

    Optimizating the deployment of wireless sensor networks, which is one of the key issues in wireless sensor networks research, helps improve the coverage of the networks and the system reliability. In this paper, we propose an evolutionary algorithm based on modified t-distribution for the wireless sensor by introducing a deployment optimization operator and an intelligent allocation operator. A directed perturbation operator is applied to the algorithm to guide the evolution of the node deployment and to speed up the convergence. In addition, with a new geometric sensor detection model instead of the old probability model, the computing speed is increased by 20 times. The simulation results show that when this algorithm is utilized in the actual scene, it can get the minimum number of nodes and the optimal deployment quickly and effectively.Compared with the existing mainstream swarm intelligence algorithms, this method has satisfied the need for convergence speed and better coverage, which is closer to the theoretical coverage value.

  • A Partitioning Parallelization with Hybrid Migration of MOEA/D for Bi-Objective Optimization on Message-Passing Clusters

    Yu WU  Yuehong XIE  Weiqin YING  Xing XU  Zixing LIU  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E99-A No:4
      Page(s):
    843-848

    A partitioning parallelization of the multi-objective evolutionary algorithm based on decomposition, pMOEA/D, is proposed in this letter to achieve significant time reductions for expensive bi-objective optimization problems (BOPs) on message-passing clusters. Each sub-population of pMOEA/D resides on a separate processor in a cluster and consists of a non-overlapping partition and some extra overlapping individuals for updating neighbors. Additionally, sub-populations cooperate across separate processors by the hybrid migration of elitist individuals and utopian points. Experimental results on two benchmark BOPs and the wireless sensor network layout problem indicate that pMOEA/D achieves satisfactory performance in terms of speedup and quality of solutions on message-passing clusters.

  • Slicing Fine-Grained Code Change History

    Katsuhisa MARUYAMA  Takayuki OMORI  Shinpei HAYASHI  

     
    PAPER-Software Engineering

      Pubricized:
    2015/12/21
      Vol:
    E99-D No:3
      Page(s):
    671-687

    Change-aware development environments can automatically record fine-grained code changes on a program and allow programmers to replay the recorded changes in chronological order. However, since they do not always need to replay all the code changes to investigate how a particular entity of the program has been changed, they often eliminate several code changes of no interest by manually skipping them in replaying. This skipping action is an obstacle that makes many programmers hesitate when they use existing replaying tools. This paper proposes a slicing mechanism that automatically removes manually skipped code changes from the whole history of past code changes and extracts only those necessary to build a particular class member of a Java program. In this mechanism, fine-grained code changes are represented by edit operations recorded on the source code of a program and dependencies among edit operations are formalized. The paper also presents a running tool that slices the operation history and replays its resulting slices. With this tool, programmers can avoid replaying nonessential edit operations for the construction of class members that they want to understand. Experimental results show that the tool offered improvements over conventional replaying tools with respect to the reduction of the number of edit operations needed to be examined and over history filtering tools with respect to the accuracy of edit operations to be replayed.

  • Optimal Spectrum Allocation in the Dynamic Heterogeneous Cellular Network

    Xiong ZHOU  Suili FENG  Yuehua DING  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:1
      Page(s):
    240-248

    In the dynamic heterogeneous cellular network, spectrum allocation deeply impacts the quality of service and performance of network. In this paper, spectrum allocation is formulated as a dynamic programming problem. A two-level framework is proposed by jointly considering users' dynamic service selection and provider's spectrum allocation. In the first level, the users' service selection is modeled as an evolutionary game, and an evolutionary equilibrium is obtained. In the second level, the service provider allocates the spectral resources to macrocells and femtocells according to the users' strategies, so as to maximize its profits. By jointly considering the service selection and spectrum allocation, the equilibriums of the dynamic network are found. The stability of the equilibriums is analyzed and proven. The proposed two-level framework is validated by the numerical simulation.

  • An Effective Time-Step Control Method in Damped Pseudo-Transient Analysis for Solving Nonlinear DC Circuit Equations

    Xiao WU  Zhou JIN  Dan NIU  Yasuaki INOUE  

    This Paper was withdrawn by the authors. The withdrawal procedure has been completed on July 19, 2016.
     
    PAPER-Nonlinear Problems

      Vol:
    E98-A No:11
      Page(s):
    2274-2282

    An effective time-step control method is proposed for the damped pseudo-transient analysis (DPTA). This method is based on the idea of the switched evolution/relaxation method which can automatically adapt the step size for different circuit states. Considering the number of iterations needed for the convergence of the Newton-Raphson method, the new method adapts the suitable time-step size with the status of previous steps. By numerical examples, it is proved that this method can improve the simulation efficiency and convergence for the DPTA method to solve nonlinear DC circuits.

  • An Efficient and Universal Conical Hypervolume Evolutionary Algorithm in Three or Higher Dimensional Objective Space

    Weiqin YING  Yuehong XIE  Xing XU  Yu WU  An XU  Zhenyu WANG  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E98-A No:11
      Page(s):
    2330-2335

    The conical area evolutionary algorithm (CAEA) has a very high run-time efficiency for bi-objective optimization, but it can not tackle problems with more than two objectives. In this letter, a conical hypervolume evolutionary algorithm (CHEA) is proposed to extend the CAEA to a higher dimensional objective space. CHEA partitions objective spaces into a series of conical subregions and retains only one elitist individual for every subregion within a compact elitist archive. Additionally, each offspring needs to be compared only with the elitist individual in the same subregion in terms of the local hypervolume scalar indicator. Experimental results on 5-objective test problems have revealed that CHEA can obtain the satisfactory overall performance on both run-time efficiency and solution quality.

  • Manage the Tradeoff in Data Sanitization

    Peng CHENG  Chun-Wei LIN  Jeng-Shyang PAN  Ivan LEE  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2015/07/14
      Vol:
    E98-D No:10
      Page(s):
    1856-1860

    Sharing data might bring the risk of disclosing the sensitive knowledge in it. Usually, the data owner may choose to sanitize data by modifying some items in it to hide sensitive knowledge prior to sharing. This paper focuses on protecting sensitive knowledge in the form of frequent itemsets by data sanitization. The sanitization process may result in side effects, i.e., the data distortion and the damage to the non-sensitive frequent itemsets. How to minimize these side effects is a challenging problem faced by the research community. Actually, there is a trade-off when trying to minimize both side effects simultaneously. In view of this, we propose a data sanitization method based on evolutionary multi-objective optimization (EMO). This method can hide specified sensitive itemsets completely while minimizing the accompanying side effects. Experiments on real datasets show that the proposed approach is very effective in performing the hiding task with fewer damage to the original data and non-sensitive knowledge.

  • New Burst-Mode Erbium-Doped Fiber Amplifier with Wide Linearity and High Output Power for Uplink Analog Radio-over-Fiber Signal Transmission

    Masaki SHIRAIWA  Yoshinari AWAJI  Naoya WADA  Atsushi KANNO  Toshiaki KURI  Pham TIEN DAT  Tetsuya KAWANISHI  

     
    PAPER-RoF and Applications

      Vol:
    E98-C No:8
      Page(s):
    832-839

    We report the adaptability of the burst-mode erbium-doped fiber amplifier (BM-EDFA) for uplink transmission of sharply rising analog radio-over-fiber (RoF) signals by using long-term evolution (LTE) -Advanced format on a mobile front-haul. Recent drastically increased mobile data traffic is boosting the demand for high-speed radio communication technologies for next-generation mobile services to enhance user experience. However, the latency become increasingly visible as serious issues. Analog RoF technology is a promising candidate for a next generation mobile front-haul to realize low latency. For the uplink, an RoF signal may rise sharply in response to a burst of in-coming radio signals. We propose that a newly developed BM-EDFA is applied for such a sharply rising RoF signal transmission. The BM-EDFA that we designed using enhanced intrinsic saturation power EDF to suppress the gain transient caused by received optical power fluctuations with optical feedback. The new BM-EDFA was designed for a wider linear output power range and lower NF than the previous BM-EDFA. The observed range of received optical power satisfying an error vector magnitude of less than 8%rms achieved over 16dB. We consider that our BM-EDFAs with wide linear ranges of output power will be a key device for the LTE-Advanced RoF uplink signal transmission via optical access networks for the next-generation mobile front-haul.

  • Approximating the Evolution History of Software from Source Code

    Tetsuya KANDA  Takashi ISHIO  Katsuro INOUE  

     
    PAPER-Software Engineering

      Pubricized:
    2015/03/17
      Vol:
    E98-D No:6
      Page(s):
    1185-1193

    Once a software product has been released, a large number of software products may be derived from an original single product. Management and maintenance of product variants are important, but those are hardly cared because developers do not make efforts for the further maintainability in the initial phase of software development. However, history of products would be lost in typical cases and developers have only source code of products in the worst case. In this paper, we approximate the evolution history of software products using source code of them. Our key idea is that two successive products are the most similar pair of products in evolution history, and have many similar source files. We did an experiment to compare the analysis result with actual evolution history. The result shows 78% (on average) of edges in the extracted trees are consistent with the actual evolution history of the products.

  • Iterative Channel Estimation and Decoding via Spatial Coupling

    Shuhei HORIO  Keigo TAKEUCHI  Tsutomu KAWABATA  

     
    PAPER

      Vol:
    E98-A No:2
      Page(s):
    549-557

    For low-density parity-check codes, spatial coupling was proved to boost the performance of iterative decoding up to the optimal performance. As an application of spatial coupling, in this paper, bit-interleaved coded modulation (BICM) with spatially coupled (SC) interleaving — called SC-BICM — is considered to improve the performance of iterative channel estimation and decoding for block-fading channels. In the iterative receiver, feedback from the soft-in soft-out decoder is utilized to refine the initial channel estimates in linear minimum mean-squared error (LMMSE) channel estimation. Density evolution in the infinite-code-length limit implies that the SC-BICM allows the receiver to attain accurate channel estimates even when the pilot overhead for training is negligibly small. Furthermore, numerical simulations show that the SC-BICM can provide a steeper reduction in bit error rate than conventional BICM, as well as a significant improvement in the so-called waterfall performance for high rate systems.

  • Comparative Analysis of Modularity Metrics for Evaluating Evolutionary Software

    Ki-Seong LEE  Chan-Gun LEE  

     
    LETTER-Software Engineering

      Vol:
    E98-D No:2
      Page(s):
    439-443

    Modularity is an effective evaluation approach for understanding the structural quality of evolutionary software. However, there are many diverse ways to measure it. In this paper, we analyze and compare various modularity metrics that have been studied in different domains to assess their applicability to evolutionary software analysis. Through extensive experiments with artificial DSMs and open-source software, we find that the correlations of those metrics are generally high despite their differences. However, our experiments show that a certain metric can be more sensitive to particular modular factors, hence applying of comprehensive modularity metrics must be taken into consideration.

  • Interactive Evolutionary System for Synthesizing Facial Caricature with Non-planar Expression

    Tatsuya UGAI  Keita SATO  Kaoru ARAKAWA  Hiroshi HARASHIMA  

     
    PAPER

      Vol:
    E97-A No:11
      Page(s):
    2154-2160

    A method to synthesize facial caricatures with non-planar expression is proposed. Several methods have been already proposed to synthesize facial caricatures automatically, but they mainly synthesize plane facial caricatures which look somewhat monotonous. In order to generate expressive facial caricature, the image should be expressed in non-planar style, expressing the depth of the face by shading and highlighting. In this paper, a new method to express such non-planar effect in facial caricatures is proposed by blending the grayscale information of the real face image into the plane caricature. Some methods also have been proposed to generate non-planar facial caricature, but the proposed method can adjust the degree of non-planar expression by interactive evolutionary computing, so that the obtained expression is satisfied by the user based on his/her subjective criteria. Since the color of the face looks changed, when the grayscale information of the natural face image is mixed, the color information of the skin area are also set by interactive evolutionary computing. Experimental results show the high performance of the proposed method.

  • Power Saving Efficiency Analysis of QoS Scheduling in the LTE Network Featuring Discontinuous Reception Operation

    Yen-Wen CHEN  Meng-Hsien LIN  Yung-Ta SU  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:10
      Page(s):
    2212-2221

    To lengthen the operational time of mobile devices, power must be managed effectively. To achieve this objective, a Discontinuous Reception (DRX) mechanism is proposed for use in the long-term evolution (LTE) network to enable user equipment (UE) to consume power efficiently. The DRX mechanism provides parameters related to base stations such as evolved Node B (eNB) to configure and manage the transition of UEs between idle (sleep) and active states. Although these parameters can be adjusted dynamically in cooperation with the traffic scheduler, a high signaling overhead and processing load might be introduced in practical deployment if the parameters are adjusted too frequently. In this study, to examine power-saving efficiency, distinct traffic types were scheduled that were constrained by various quality of service (QoS) factors without dynamically changing the DRX parameters. The concept of burst-based scheduling is proposed, based on considering the state transitions and channel conditions of each UE, to increase power-saving efficiency while concurrently satisfying the desired QoS. Both Hypertext Transfer Protocol (HTTP) and video-stream traffic models were exhaustively simulated to examine the performance of the proposed scheme and numerous scheduling alternatives were tested to compare the proposed scheme with other schemes. The simulation results indicate that video-streaming traffic is more sensitive to the scheduling schemes than HTTP traffic. The simulation results were further analyzed in terms of traffic scheduling and parameter adjustment and the analysis results can help design future studies on power management in the LTE network.

41-60hit(162hit)