The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] form(3161hit)

3101-3120hit(3161hit)

  • Some Properties of Kleene-Stone Logic Functions and Their Canonical Disjunctive Form

    Noboru TAKAGI  Masao MUKAIDONO  

     
    PAPER-Computer Hardware and Design

      Vol:
    E76-D No:2
      Page(s):
    163-170

    In this paper, we will define Kleene-Stone logic functions which are functions F: [0, 1]n[0, 1] including the intuitionistic negation into fuzzy logic functions, and they can easily represent the concepts of necessity and possibility which are important concepts of many-valued logic systems. A set of Kleene-Stone logic functions is one of the models of Kleene-Stone algebra, which is both Kleene algebra and Stone algebra, as same as a set of fuzzy logic functions is one of the models of Kleene algebra. This paper, especially, describes some algebraic properties and representation of Kleene-Stone logic functions.

  • Associated Information Retrieval System (AIRS)--Its Performance and User Experience--

    Haruo KIMOTO  Toshiaki IWADERA  

     
    PAPER-Bio-Cybernetics

      Vol:
    E76-D No:2
      Page(s):
    274-283

    An information retrieval system based on a dynamic thesaurus was developed utilizing the connectionist approach. The dynamic thesaurus consists of nodes, which represent each term of a thesaurus, and links, which represent the connections between nodes. Term information that is automatically extracted from user's relevant documents is used to change node weights and generate links. Thus, node weights and links reflect a user's interest. A document retrieval experiment using the dynamic thesaurus was conducted in which both a high recall rate and a high precision rate were achieved.

  • Optical Technologies for Phased Array Antennas

    Alwyn SEEDS  

     
    INVITED PAPER

      Vol:
    E76-C No:2
      Page(s):
    198-206

    This paper reviews the application of optical technologies to phased array antennas. The performance of the fibre transmission medium and of sources and detectors is reviewed, leading to simple expressions for transmission loss and noise performance. Both coherent and non-coherent beam forming techniques are considered. Future trends, including the use of optical amplifiers and coherent signal generation, will also be discussed.

  • Generalized Partitioning Scheme of Singnature File for Information Retrieval

    Yong-Moo KWON  Yong-Jin PARK  

     
    PAPER-Databases

      Vol:
    E76-D No:2
      Page(s):
    189-198

    Compared to multi-level signature file techniques, PSF (Partitioned Signature File) technique has less processing overhead by its characteristics of a simple file organization. In a multi-processor environment, the PSF technique also has an advantage that queries can be processed in parallel effectively by allocating one or more partitions to each processor. Main point of the PSF technique is a partitioning scheme based on a key selection. In this paper, an n-BFK (n-Bounded Floating Key) partitioning scheme is proposed, in which the number of segments for a key selection is bounded by n. The cost model is developed for the performance evaluation of the proposed scheme. By performance comparison with the existing schemes, the efficiencies of the proposed scheme are shown with respect to a disk access cost, a signature reduction ratio, and an uniformity of workload.

  • Orientable Closed Surface Construction from Volume Data

    Takanori NAGAE  Takeshi AGUI  Hiroshi NAGAHASHI  

     
    PAPER-Image Processing, Computer Graphics and Pattern Recognition

      Vol:
    E76-D No:2
      Page(s):
    269-273

    Surface construction is known as a way to visualize volume data. Although currently used algorithms such as marching cubes have good enough quality for volume visualization, they do not ensure adequate surface topology. These algorithms work well when the surface is rather simple. While when complicated, the surface does not separate the internal and external spaces, that is, there exist some holes on the surface, or exist redundant overlaps or self-intersection. Actually, adequate surface topology is important not only for visualization but for laser stereolithography, which creates real 3D plastic objects. In the present paper, we propose a new method that produces a set of triangular patches from a given volume data. The fact that the set of patches has no holes, no redundancy, no self-intersection, and has orientable closed surface topology is shown.

  • A Characterization of Kleene-Stone Logic Functions

    Noboru TAKAGI  Masao MUKAIDONO  

     
    PAPER-Computer Hardware and Design

      Vol:
    E76-D No:2
      Page(s):
    171-178

    Kleene-Stone algebra is both Kleene algebra and Stone algebra. The set of Kleene-Stone logic functions discussed in this paper is one of the models of Kleene-Stone algebra, and they can easily represent the concepts of necessity and possibility which are important concepts for many-valued logic systems. Main results of this paper are that the followings are clarified: a necessary and sufficient condition for a function to be a Kleene-Stone logic function and a formula representing the number of n-variable Kleene-Stone logic functions.

  • Methods to Securely Realize Caller-Authenticated and Callee-Specified Telephone Calls

    Tomoyuki ASANO  Tsutomu MATSUMOTO  Hideki IMAI  

     
    PAPER

      Vol:
    E76-A No:1
      Page(s):
    88-95

    This paper presents two methods for securely realizing caller-authenticated and callee-specified calls over telecommunication networks with terminals that accept IC cards having KPS-based cryptographic functions. In the proposed protocols, users can verify that the partner is the proper owner of a certain ID or a certain pen name. Users' privacy is protected even if they do the caller-authenticated and callee-specified calls and do not pay their telephone charge in advance.

  • Phrase Recognition in Conversational Speech Using Prosodic and Phonemic Information

    Shigeki OKAWA  Takashi ENDO  Tetsunori KOBAYASHI  Katsuhiko SHIRAI  

     
    PAPER

      Vol:
    E76-D No:1
      Page(s):
    44-50

    In this paper, a new scheme for ohrase recognition in conversational speech is proposed, in which prosodic and phonemic information processing are usefully combined. This approach is employed both to produce candidates of phrase boundaries and to discriminate phonemes. The fundamental frequency patterns of continuous utterances are statistically analyzed and the likelihood of the occurrence of a phrase boundary is calculated for every frame. At the same time, the likelihood of phonemic characteristics of each frame can be obtained using a hierarchical clustering method. These two scores, along with lexical and grammatical constraints, can be effectively utilized to develop a possible word sequences or a word lattices which correspond to the continuous speech utterances. Our preliminary experjment shows the feasibility of applying prosody for continuous speech recognition especially for conversational style utterances.

  • The Sibling Intractable Function Family (SIFF): Notion, Construction and Applications

    Yuliang ZHENG  Thomas HARDJONO  Josef PIEPRZYK  

     
    PAPER

      Vol:
    E76-A No:1
      Page(s):
    4-13

    This paper presents a new concept in cryptography called the sibling intractable function family (SIFF) which has the property that given a set of initial strings colliding with one another, it is computationally infeasible to find another string that would collide with the initial strings. The various concepts behind SIFF are presented together with a construction of SIFF from any one-way function. Applications of SIFF to many practical problems are also discussed. These include the hierarchical access control problem which is a long-standing open problem induced by a paper of Akl and Taylor about ten years ago, the shared mail box problem, access control in distributed systems and the multiple message authentication problem.

  • On a Recursive Form of Welch-Berlekamp Algorithm

    Kiyomichi ARAKI  Masayuki TAKADA  Masakatu  MORII  

     
    PAPER-Information Theory and Coding Theory

      Vol:
    E76-A No:1
      Page(s):
    132-138

    In this paper a recursive form of Welch-Berlekamp (W-B) algorithm is provided which is a novel and fast decoding algorithm.

  • Telecommunications in the 21st Century

    David G. MESSERSCHMITT  

     
    INVITED PAPER

      Vol:
    E76-B No:1
      Page(s):
    3-11

    The term telecommunications is derived from "tele", meaning at a distance, and "communications", meaning exchanging of information. The history of electronic communications has thus far been applied to the exchange of spoken, visual, and or textual information between pairs of people, pairs of machines, and people and machines. The role of telecommunications has been to provide a medium for the exchange of the information, with the burden placed on the communicating people or machines to initiate the communication and to interpret or process the information being exchanged. In this paper we attempt to predict some future trends in telecommunications, reaching into the next century. Such predictions are inevitably incomplete, inaccurate, or both. Nevertheless, it is a useful exercise to try to anticipate these trends, and more importanly the issues and problems that will arise in the future, as a way of focusing near-term research efforts and suggesting opportunities. One of our hypotheses about the future is that telecommunications networks will become much more active in initiating, controlling, and participating in the exchange of information. Our approach will be to first review some particularly important past developments, and then to try to predict the future in two ways: First, by extrapolating present trends and activities, and second, by criticizing current trends and anticipating problems looming on the horizon.

  • An Access Control Mechanism for Object-Oriented Database Systems

    Tadashi ARAKI  Tetsuya CHIKARAISHI  Thomas HARDJONO  Tadashi OHTA  Nobuyoshi TERASHIMA  

     
    PAPER

      Vol:
    E76-A No:1
      Page(s):
    112-121

    The security problems of object-oriented database system are investigated and security level assignment constraints and an access control mechanism based on the multilevel access control security policy are proposed. The proposed mechanism uses the Trusted Computing Base. A unique feature of the mechanism is that security levels are assigned not only to data items (objects), but also to methods and methods are not shown to the users whose security level is lower than that of the methods. And we distinguish between the security level of a variable in a class and that in an instance and distinguish between the level of an object when it is taken by itself and it is taken as a variable or an element of another complex object. All of this realizes the policy of multilevel access control.

  • Improving the Performance of Enciphered B+-Trees

    Thomas HARDJONO  Tadashi ARAKI  Tetsuya CHIKARAISHI  

     
    PAPER

      Vol:
    E76-A No:1
      Page(s):
    104-111

    The performance of an enciphered B+-tree can be improved by the selective encryption of the components of the nodes in the tree. This paper suggests an approach to the selective encryption of nodes in a B+-tree and a method to substitute the plaintext search keys in order to increase the security of the tree. The method is based on structures in combinatorial block designs, and it allows for faster traversal of the tree, hence improving the overall speed of query responses. It also represents a trade-off between security and performance in that the substitution method affords less security compared to encryption. However, assuming the use of a secure cryptosystem with parameters which are kept secret, the encrypted state of the data pointers and data blocks still prevents an intruder from accessing the stored data. The method based on block designs has the advantage of requiring only a small amount of information being kept secret. This presents a considerable savings in terms of space used to hold security-related information.

  • Practical Consequences of the Discrepancy between Zero-Knowledge Protocols and Their Parallel Execution

    Kouichi SAKURAI  Toshiya ITOH  

     
    PAPER

      Vol:
    E76-A No:1
      Page(s):
    14-22

    In this paper, we investigate the discrepancy between a serial version and a parallel version of zero-knowledge protocols, and clarify the information "leaked" in the parallel version, which is not zero-knowledge unlike the case of the serial version. We consider two sides: one negative and the other positive in the parallel version of zero-knowledge protocols, especially of the Fiat-Shamir scheme.

  • A Mathematical Theory for Transient Analysis of Communication Networks

    Hisashi KOBAYASHI  Qiang REN  

     
    INVITED PAPER

      Vol:
    E75-B No:12
      Page(s):
    1266-1276

    In the present paper we present a mathematical theory for the transient analysis of probabilistic models relevant to communication networks. First we review the z-transform method, the matrix method, and the Laplace transform, as applied to a class of birth-and-death process model that is relevant to characterize network traffic sources. We then show how to develop transient solutions in terms of the eigenvalues and spectral expansions. In the latter half the paper we develop a general theory to solve dynamic behavior of statistical multiplexer for multiple types of traffic sources, which will arise in the B-ISDN environment. We transform the partial differential equation that governs the system into a concise form by using the theory of linear operator. We present a closed form expression (in the Laplace transform domain) for transient solutions of the joint probability distribution of the number of on sources and buffer content for an arbitrary initial condition. Both finite and infinite buffer capacity cases are solved exactly. The essence of this general result is based on the unique determination of unknown boundary conditions of the probability distributions. Other possible applications of this general theory are discussed, and several problems for future investigations are identified.

  • Linear Transformations between Embedded Processes Associated with M/M/1 Queueing Systems

    Toshikane ODA  Aurel A. LAZAR  

     
    PAPER

      Vol:
    E75-B No:12
      Page(s):
    1308-1314

    The embedded Markov processes associated with Markovian queueing systems are closely related, and their relationships are important for establishing an analytical basis for performance evaluation techniques. As a first step, we analyze the embedded processes associated with a general M/M/1 queueing system. Linear transformations between the infinitesimal generators and the transition probability matrices of embedded processes at arrival and departure times are explicitly derived. Based upon these linear transformations, the equilibrium distributions of the system states at arrival and departure times are obtained and expressed in terms of the equilibrium distribution at arbitrary times. The approach presented here uncovers an underlying algebraic structure of M/M/1 queueing systems, and establishes an algebraic methodology for analyzing the equilibrium probabilities of the system states at arrival and departure times for more general Markovian queueing systems.

  • Waveform Estimation of Sound Sources in a Reverberant Environment with Inverse Filters

    Kiyohito FUJII  Masato ABE  Toshio SONE  

     
    PAPER

      Vol:
    E75-A No:11
      Page(s):
    1484-1492

    This paper proposes a method to estimate the waveform of a specified sound source in a noisy and reverberant environment using a sensor array. Previously, we proposed an iterative method to estimate the waveform. However, in this method the effect of reflection sound reduces to 1/M, where M is the number of microphones. Therefore, to solve the reverberation problem, we propose a new method using inverse filters of the transfer functions from the sound sources to each microphone. First, the transfer function from each sound source to each microphone is measured by the cross-spectrum technique and each inverse filter is calculated by the QR method. Then the initially estimated waveform of a sound source is the averaged signal of the inverse filter outputs. Since this waveform still contains the effects of the other sound sources, the iterative technique is adopted to estimate the waveform more precisely, reducing the effects of the other sound and the reflection sound. Some computer simulations and experiments were carried out. The results show the effectiveness of our method.

  • Derivation of a Parallel Bottom-Up Parser from a Sequential Parser

    Kazuko TAKAHASHI  

     
    PAPER-Software Theory

      Vol:
    E75-D No:6
      Page(s):
    852-860

    This paper describes the derivation of a parallel program from a nondeterministic sequential program using a bottom-up parser as an example. The derivation procedure consists of two stages: exploitation of AND-parallelism and exploitation of OR-parallelism. An interpreter of the sequential parser BUP is first transformed so that processes for the nodes in a parsing tree can run in parallel. Then, the resultant program is transformed so that a nondeterministic search of a parsing tree can be done in parallel. The former stage is performed by hand-simulation, and the latter is accomplished by the compiler of ANDOR-, which is an AND/OR parallel logic programming language. The program finally derived, written in KL1 (Kernel Language of the FGCS Project), achieves an all-solution search without side effects. The program generated corresponds to an interpreter of PAX, a revised parallel version of BUP. This correspondence shows that the derivation method proposed in this paper is effective for creating efficient parallel programs.

  • Fault Tolerance of an Information Disseminating Scheme on a Processor Network

    Kumiko KANAI  Yoshihide IGARASHI  Kinya MIURA  

     
    PAPER-Algorithms, Data Structures and Computational Complexity

      Vol:
    E75-A No:11
      Page(s):
    1555-1560

    We discuss fault tolerance of an information disseminating scheme, t-disseminate on a network with N processors, where each processor can send a message to t directions at each round. When N is a power of t+1 and at most tlogt+1N-1 (at most t) processors and/or edges have hailed, logt+1N+(f1)/t rounds (logt+1N+2 rounds) suffice for broadcasting information to all destinations from any source by t-disseminate. For a arbitrary N, logt+1N2f/t1 rounds (logt+1N+2 rounds) suffice for broadcasting information to all destinations from any source by t-disseminate if at most t(logt+1N1)/2 (at most t/2) processors and/or edges have failed.

  • Automatic Correction of Left-Ventricular Pressure Waveform Using the Natural Observation Method

    Jun-ichi HORI  Yoshiaki SAITOH  Tohru KIRYU  Taizo IIJIMA  

     
    PAPER-Medical Electronics and Medical Information

      Vol:
    E75-D No:6
      Page(s):
    909-915

    The pressure waveforms indicated on a catheter manometer system are subject to serious distortion due to the resonance of the catheter itself, or the compliance of a particular transducer. Although several methods have been proposed for improving those characteristics, they ahave never been put into practice. We have focused on the transfer function of the catheter manometer, and made a pilot system, using the natural observation method. This method has been suggested as a means of studying the structure of the instantaneous waveform. In this manner, we were able to increace the bandwidth in the ferquency domain and reduce the ringing in the time domain. Correction was performed automatically, using a step wave. Reproduction of the waveform with a flushing device, was a task of equal simplicity, that allowed us to estimate the system parameters so that the response waveform became step-like. In the experiment, our system provided distortion-free left-ventricular pressure waveform measurements and exact evaluation of the cardiac pumping system. The values obtained came much closer to the original figures arrived at by the catheter-tip manometer system.

3101-3120hit(3161hit)