The search functionality is under construction.
The search functionality is under construction.

IEICE TRANSACTIONS on Information

  • Impact Factor

    0.59

  • Eigenfactor

    0.002

  • article influence

    0.1

  • Cite Score

    1.4

Advance publication (published online immediately after acceptance)

Volume E78-D No.4  (Publication Date:1995/04/25)

    Regular Section
  • A Polynomial-Time Algorithm for Checking the Inclusion for Strict Deterministic Restricted One-Counter Automata

    Ken HIGUCHI  Etsuji TOMITA  Mitsuo WAKATSUKI  

     
    PAPER-Automata, Languages and Theory of Computing

      Page(s):
    305-313

    A deterministic pushdown automaton (dpda) having just one stack symbol is called a deterministic restricted one-counter automaton (droca). When it accepts by empty stack, it is called strict. A deterministic one-counter automaton (doca) is a dpda having only one stack symbol, with the exception of a bottom-of-stack marker. The class of languages accepted by strict droca's is a subclass of the class of languages accepted by doca's. Valiant has proved the decidability of the equivalence problem for doca's and the undecidability of the inclusion problem for doca's. Hence the decidablity of the equivalence problem for strict droca's is obvious. In this paper, we present a new direct branching algorithm for checking the inclusion for a pair of languages accepted by strict droca's. Then we show that the worst-case time complexity of our algorithm is polynomial with respect to these automata.

  • Decomposable Termination of Composable Term Rewriting Systems

    Masahito KURIHARA  Azuma OHUCHI  

     
    PAPER-Algorithm and Computational Complexity

      Page(s):
    314-320

    We extend the theorem of Gramlich on modular termination of term rewriting systems, by relaxing the disjointness condition and introducing the composability instead. More precisely, we prove that if R1, R-1 are composable, terminating term rewriting systems such that their union is nonterminating then for some a {1, -1}, Ra OR is nonterminating and R-aRa is Fa-lifting. Here, OR is defined to be the special system {or(x, y) x, or(x, y) y}, Fa is the set of function symbols associated with Ra, and an Fa-lifting system contains a rule which has either a variable or a symbol from Fa at the leftmost position of its right-hand side. The extended theorem is stronger than the original one in that it relaxed the disjointness and constructor-sharing conditions and allowed the two systems to share defined symbols in common under the restriction of composability. The corollaries of the theorem show several sufficient conditions for decomposability of termination, which are useful for proving termination of term rewriting systems defined by combination of several composable modules.

  • A Parallel Algorithm for Determining the Congruence of Point Sets in Three-Dimensions

    Tatsuya AKUTSU  

     
    PAPER-Algorithm and Computational Complexity

      Page(s):
    321-325

    This paper describes an O(log3n) time O(n/log n) processors parallel algorithm for determining the congruence (exact matching) of two point sets in three-dimensions on a CREW PRAM, where n is the maximum size of the input point sets. Although optimal O(n log n) time sequential algorithms were developed for this problem, no efficient parallel algorithm was known previously. In the algorithm, the original problem is reduced to the two-dimensional congruence problem by computing a three-dimensional point set cps(S) for each input point set S, where cps(S) satisfies the following conditions: 0|cps(S)|12; cps(T(S))T(cps(S)) for all isometric transformations T. The two-dimensional problem can be solved efficiently in parallel using a parallel version of a previously-known sequential algorithm. cps(S) is computed recursively in the following way: the size of a point set is reduced by a constant factor in each recursive step. To reduce the size of a point set, a convex hull is constructed and then it is regarded as a planar graph, so that combinatorial properties of a planar graph are used effectively. A sequential version of the algorithm works in O(n log n) time, so that this paper gives another optimal sequential algorithm. The presented algorithm can be applied for graphs such that each vertex corresponds to a point and each edge corresponds to a line segment connecting its endpoints. Moreover, the algorithm can be modified for computing the canonical form of a point set or a graph.

  • On Ternary Cellular Arrays Designed from Ternary Decision Diagrams

    Naotake KAMIURA  Hidetoshi SATOH  Yutaka HATA  Kazuhara YAMATO  

     
    PAPER-Computer Hardware and Design

      Page(s):
    326-335

    In this paper, we propose a method to design ternary cellular arrays by using Ternary Decision Diagrams (TDD's). Our cellular array has a rectangular structure composed of ternary switch cells. The ternary functions represented by TDD's are realized by mapping the TDD's to the arrays directly. That is, both the nodes and the edges in the TDD are realized by some sets of the cells. Since TDD's can represent easily multiple-output functions without large memory requirements, our arrays are wuitable for the realization of multiple-output functions. To evaluate our method, we apply our method to some benchmark circuits, and compare our arrays with the ternary PLA's. The experimental results show that our arrays have the advantage for their sizes, especially in the realization of symmetric functions. The results also clarify that the size of our arrays depends on the size of TDD's.

  • Concurrency Control with Permissible Serializability in Multi-Media Data Processings

    Yuichi SAKAUE  Jun'ichi MIYAO  

     
    PAPER-Computer Hardware and Design

      Page(s):
    336-344

    Recent advances of processing speed and window systems in computers, especially workstations, accelerate multi-media data processing (MMDP). Then, a variety of data such as numerics, characters, voice, video, animation and so on, are processed concurrently in a workstation. In data processings, concurrent execution of transactions is a key to improve through-puts. However, concurrent execution without concurrency control may cause inconsistent results. Thus, the concurrency control must be introduced in such systems. However, in MMDP it is ineffective to adopt previous concurrency control methods for ordinal databases since multi-media data are huge and possess a real-time property. This paper discusses concurrency control for MMDP. We propose some new concepts for MMDP, and define a new serializability class called Permissible Serializability which provides high concurrency in MMDP compared with ordinal classes. Then, we propose a concurrency control algorithm TYPE for the Permissible Serializability, and show some simulation results.

  • Packing Sequential Stretches in the MDFM

    Paulo LORENZO  Munehiro GOTO  Arthur J. CATTO  

     
    PAPER-Computer Hardware and Design

      Page(s):
    345-354

    The Manchester Dataflow Machine (MDFM) works with tasks of size equal to one single instruction. This fine granularity aims at exploring all parallelism at the instruction level. However, this project decision increases the instruction communication cost, which ends up to jam the interconnection network and reduces the system performance. One way to skirt this problem is to adopt variable size tasks instead of working with such small task size. In this paper, in order to study whether or not the usage of such variable size tasks in the MDFM architecture contributes to the improvement of the performance, some simulations by toy programs take place. In the simulation, variable size tasks are realized by packing the sequential instruction stretches into one task. To manage this packing, the Sequential Block (SB) technique is developed. The simulation of those packed and unpacked programs give an outline of advantages and disadvantages of working with variable size tasks, and how the SB technique should be implemented in the system.

  • Decentralized Voting Protocols and their Communication Structures

    Amane NAKAJIMA  

     
    PAPER-Computer Systems

      Page(s):
    355-362

    Voting is a general way of achieving mutual exclusion and synchronization in distributed systems with replicated data. In centralized voting protocols, a requesting node, which works as a central controller, exchanges messages in order to collect votes from other nodes. This paper proposes decentralized voting protocols, in which all nodes execute the same protocol and reach the same result in a decentralized and autonomous way. When a decentalized voting protocol is implemented by using one-round message exchange, it requires n(n1) messages, where n is the number of nodes. The number of messages can be reduced by using multiple-round message exchange. The paper describes the computation in each node in the form of the finite state automaton, and gives communication structures for it. It is shown that kn(n1/k1) messages are enough when messages are exchanged in k rounds.

  • Adapt Dynamic Evolution in a Reflective Object-Oriented Computer Language

    Issam A. HAMID  Mohammed ERRADI  Gregor v. BOCHMANN  Setsuo OHSUGA  

     
    PAPER-Software Theory

      Page(s):
    363-382

    This paper describes the design of the reflective concurrent object-oriented specification language RMondel. RMondel is designed for the specification and modeling of distributed systems. It allows the development of executable specifications which may be modified dynamically. Reflection in RMondel is supported by two fundamental features that are: Structural Reflection (SR) and Behavioral Reflection (BR). Reflection is the capability to monitor and modify dynamically the structure and the behavior of the system. We show how the features of the language are enhanced using specific meta-operations and meta-objects, to allow for the dynamic modification of types (classes) and instances using the same language. RMondel specification can be modified by adding or modifying types and instances to get a new adapted specification. Consistency is checked dynamically at the type level as well as at the specification level. At the type level, structural and behavioral constrations are defined to preserve the conformance of types. At the specification level, a transaction mechanism and a locking protocol are defined to ensure the consistency of the whole specification.

  • An Automatic Selection Method of Key Search Algorithms

    Masami SHISHIBORI  Junichi AOE  Ki-Hong PARK  Hisatoshi MOCHIZUKI  

     
    PAPER-Software Systems

      Page(s):
    383-393

    The selection of an appropriate key search algorithm for a specific application field is an important issue in application systems development. This is because data retrieval is the most time-consuming part of many application programs. An automatic selection method for key search algorithms is presented in this paper. The methodology has been implemented in a system called KESE2 (KEy-SEarch ALgorithm SElection). Key search algorithms are selected according to the user's requirements through interaction with KESE2 which bases its inferences on an evaluation table. This evaluation table contains values rating the performance of each key search algorithm for the different searching properties, or characteristics. The selection algorithm presented is based on step by step reduction of unsuitable key search algorithms and searching properties. The paper also proposes assistance facilities that consist of both a support function and a program synthesis function. Experimental results show that the appropriate key search algorithms are effectively selected, and that the necessary number of questions asked, to select the appropriate algorithm, is reduced to less than half of the total number of possible questions. The support function is useful for the user during the selection process and the program synthesis function fully translates a selected key search algorithm into high level language in an average of less than 1 hour.

  • An Analysis of Traceability in Requirements Documents

    Kenji TAKAHASHI  Shuichiro YAMAMOTO  

     
    PAPER-Software Systems

      Page(s):
    394-402

    We study the correspondence between problem descriptions and requirements specification documents derived from them. Based on the results of this investigation, a model that integrates the problem space and the requirements specification space is developed. This integration is based on a semantic network representation. We also propose a model of the requirements elicitation process that is consistent with our empirical studies of traceability in requirements documents. In this process, analysts derived requirements specifications from incomplete and ambiguous problem descriptions given by customers, identify missing information, completed it, and then decide the system boundaries that define which part of the problem descriptions to implement as the target system. The model can be used to complete problem descriptions given by customers and determine the system boundaries.

  • An Automatic Programming System SPACE with Highly Visualized and Abstract Program Specification

    Minoru HARADA  Takashi YOSHIMIZU  

     
    PAPER-Software Systems

      Page(s):
    403-419

    In this paper, it is stated that visualization and abstraction of program specifications can be highly integrated on the basis of decision tables and condition expressions. In order to demonstrate this idea, we developed an automatic programming system called SPACE: SPecification Acquisition and Compiling Engine. SPACE is designed to ease the production of business data processing program. SPACE has functions both to support the creation of visual program specifications and to generate COBOL programs according to the input program specifications. To visualize program specification, SPACE design windows are comprised of two diagrams and four tables in a format similar to the conventional detailed design sheets. To represent module functions, in particular, a visualized computation model called a decision table is used. All the possible execution states of a module are represented by combining the state function called condition expressions. The condition expressions represent the typical file processing patterns in very familiar form to actual business application designer. They do not simply give function values; each of them carries out implicit attached procedures according to the characteristic I/O control logic for business data processing. Hence users can describe program specifications concisely by designating merely the condition expression instead of the detailed I/O control logic. This paper uses sample descriptions of stock control problems to explain how visualization of computation and abstraction of algorithm can be integrated and formalized on a basis of a decision table and a condition expression. Also the paper describes how to generate programs from visual specifications.

  • Design and Construction of an Advisory Dialogue Database

    Tadahiko KUMAMOTO  Akira ITO  Tsuyoshi EBINA  

     
    PAPER-Databases

      Page(s):
    420-427

    We are aming to develop a computer-based consultant system which helps novice computer users to achieve their task goals on computers through natural language dialogues. Our target is spoken Japanese. To develop effective methods for processing spoken Japanese, it is essential to analyze real dialogues and to find the characteristics of spoken Japanese. In this paper, we discuss the design problems associated with constructing a spoken dialogue database from the viewpoint of advisory dialogue collection, describe XMH (X-window-based electronic mail handling program) usage experiments made to collect advisory dialogues between novice XMH users and an expert consultant, and show the dialogue database we constructed from these dialogues. The main features of our database are as follows: (1) Our target dialogues were advisory ones. (2) The advisory dialogues were all related to the use of XMH that has a visual interface operated by a keyboard and a mouse. (3) The primary objective of the users was not to engage in dialogues but to achieve specific task goals using XMH. (4) Not only what the users said but also XMH operations performed by the users are included as dialogue elements. This kind of dialogue database is a very effective source for developing new methods for processing spoken language in multimodal consultant systems, and we have therefore made it available to the public. Based on our analysis of the database, we have already developed several effective methods such as a method for recognizing user's communicative intention from a transcript of spoken Japanese, and a method for controlling dialogues between a novice XMH user and the computer-based consultant system which we are developing. Also, we have proposed several response generation rules as the response strategy for the consultant system. We have developed an experimental consultant system by implementing the above methods and strategy.

  • A realization of an arbitrary BPC Permutation in Hypercube Connected Computer Networks

    Hiroshi MASUYARA  Yuichiro MORITA  Etsuko MASUYAMA  

     
    PAPER-Computer Networks

      Page(s):
    428-435

    A multiple instruction stream-multiple data stream (MIMD) computer is a parallel computer consisting of a large number of identical processing elements. The essential feature that distinguishes one MIMD computer family from another is the interconnection network. In this paper, we are concerned with a representative type of interconnection networks: the hypercube connected network. A family of regular graphs is presented as a possible candidate for the implementation of a distributed system and for fault-tolerant architectures. The symmetry of graphs makes it possible to determine message routing by using a simple distributed algorithm. A candidate having the same property is the hypercube connected network. Arbitrary data permutations are generally accomplished by sorting. For certain classes of permutations, however, this is, for many frequently used permutations in parallel processing such as bit reversal, bit shuffle, bit complement, matrix transpose, butterfly permutations used in FFT algorithms, and segment shuffles, there exist algorithms that are more efficient than the best sorting algorithm. One such class is the bit permute complement (BPC) class of permutations. In this paper, we, first, develop an algorithm to realize an arbitrary BPC permutation in hypercube connected networks. The developed algorithm in hypercube connected networks requires only 1 token memory register in each node. We next evaluate the ability to realize BPC permutations in these networks of an arbitrary size by estimating the number of required routing steps.

  • The Optimal Routing Algorithm in Hierarchical Cubic Network and Its Properties

    San-Kyun YUN  Kyu Ho PARK  

     
    PAPER-Computer Networks

      Page(s):
    436-443

    A Hierarchical Cubic Network (HCN) is a hierarchical hypercube network proposed by Ghose. The HCN is topologically superior to many other similar networks, in particular, the hypercube. It has a considerably lower diameter than a comparable hypercube and is realized using almost half the number of links per node as a comparable hypercube. In this paper, we propose the shortest routing algorithm in HCN(n, n) and show that the diameter of HCN(n, n) with 22n nodes is n(n1)/31 which is about 2/3 of that of a comparable hypercube. We also propose the optimal routing algorithm in HCN(m, n) where mn and obtain that its diameter is n(m1)/31. Typical parallel algorithms run in HCN(m, n) with the same time complexity as a hypercube and the hypercube topology can be emulated with O(1) time complexity in it.

  • Group Communications Algorithm for Dynamically Updating in Distributed Systems

    Hiroaki HIGAKI  

     
    PAPER-Computer Networks

      Page(s):
    444-454

    This paper proposes a novel updating technique, dynamically updating, for achieving extension or modification of functions in a distributed system. Usual updating technique requires synchronous suspension for multiple processes for avoiding unspecified reception caused by the conflict of different versions of processes. Thus, this technique needs very high overhead and it must restrict the types of distributed systems, to which it can be applied, to RPC (remote procedure call) type or client-server type. Using the proposed dynamically updating technique, updating management can be invoked asynchronously by each process with assurance of correct execution of the system, i.e., the system can cope with the effect of unspecified reception caused by mixture of different version processes. Therefore, low overhead updating can be achieved in partner type distributed systems, that is more general type including communications systems or computer networks. Dynamically updating technique is implemented by using a novel distributed algorithm that consists of group communication, checkpoint setting, and rollback recovery. By using the algorithm proposed in this paper, rollback recovery can be achieved with the lowest overhead, i.e., a set of checkpoint determines the last global state for consistent rollback recovery and a set of processes that need to rollback simultaneously is the smallest one. This paper also proves the correctness of the proposed algorithm.

  • A New Approach of Parsing and Search Based on the Divide and Conquer Strategy for Continuous Speech Recognition

    Ming-Sheng WANG  Satoshi IMAI  

     
    PAPER-Speech Processing and Acoustics

      Page(s):
    455-465

    In this paper, we report a new approach about parsing and searching problem for a given phonetic lattice. The approach is based on the Divide and Conquer (DC) strategy. By dividing the phonetic lattice, we first construct a PD-tree to represent this lattice, then, we parse through this PD-tree to identify the possible sentence which is supposed to be the speech utterance. Next, we propose a new search scheme called Downward Request (DR) search model to decrease the computation costs, and this search model gives us the optimal or N-best solutions. Experiments performed on Chinese speech recognition show us the good results.

  • Constraint Satisfaction Approach to Extraction of Japanese Character Regions from Unformatted Document Image

    Keiji GYOHTEN  Noboru BABAGUCHI  Tadahiro KITAHASHI  

     
    PAPER-Image Processing, Computer Graphics and Pattern Recognition

      Page(s):
    466-475

    In this paper, we present a method for extracting the Japanese printed characters from unformatted document images. This research takes into account the multiple general features specific to the Japanese printed characters. In our method, these features are thought of as the constraints for the regions to be extracted within the constraint satisfaction approach. This is achieved by minimizing a constraint function estimating quantitative satisfaction of the features. Our method is applicable to all kinds of the Japanese documents because it is no need of a priori knowledge about the document layout. We have favorable experimental results for the effectiveness of this method.

  • A Paint System of Monochromatic Moving Images

    Hiroshi NAGAHASHI  Takeshi AGUI  Tatsushi ISHIGURO  

     
    PAPER-Image Processing, Computer Graphics and Pattern Recognition

      Page(s):
    476-483

    A method for painting a sequence of monochromatic images is proposed. In this method, a color model, whose base components are hue, saturation and intensity, is used to keep the lightness of images unchanged before and after painting. Two successive frames in the monochromatic image sequence and a colored image of the first frame which is interactively painted, are analyzed in order to paint the next monochromatic frame. The painting process is composed of two phases, that is, an automatic coloring phase and an interactive retouching phase. In the automatic coloring phase, hierarchical image segmentation and region matching procedures are performed, and the two attributes of hue and saturation are mapped from the painted image of the first frame to the next image. In the retouching phase, using an interactive paint system based on the color model, users can modify the chromatic components of pixels whose colors were not mapped correctly. Several experiments show that our method is very effective in reducing tedious painting.

  • Kernel Hidden Unit Analysis--Network Size Reduction by Entropy Minimization--

    Ryotaro KAMIMURA  Shohachiro NAKANISHI  

     
    PAPER-Bio-Cybernetics and Neurocomputing

      Page(s):
    484-489

    In this paper, we propose a method, called Kernel Hidden Unit Analysis, to reduce the network size. The kernel hidden unit analysis in composed of two principal components: T-component and S-component. The T-component transforms original networks into the networks which can easily be simplified. The S-component is used to select kernel units in the networks and construct kernel networks with kernel units. For the T-component, an entropy function is used, which is defined with respect to the state of the hidden units. In a process of entropy minimization, multiple strongly inhibitory connections are to be generated, which tend to turn off as many units as possible. Thus, some major hidden units can easily be extracted. Concerning the S-component, we use the relevance and the variance of input-hidden connections and detect the kernel hidden units for constructing the kernel network. Applying the kernel hidden unit analysis to the symmetry problem and autoencoders, we perfectly succeeded in obtaining kernel networks with small entropy, that is, small number of hidden units.

  • A Modified Information Criterion for Automatic Model and Parameter Selection in Neural Network Learning

    Sumio WATANABE  

     
    PAPER-Bio-Cybernetics and Neurocomputing

      Page(s):
    490-499

    This paper proposes a practical training algorithm for artificial neural networks, by which both the optimally pruned model and the optimally trained parameter for the minimum prediction error can be found simultaneously. In the proposed algorithm, the conventional information criterion is modified into a differentiable function of weight parameters, and then it is minimized while being controlled back to the conventional form. Since this method has several theoretical problems, its effectiveness is examined by computer simulations and by an application to practical ultrasonic image reconstruction.

  • Extraction of Glossiness Using Spatial Filter with Variable Resolution

    Seiichi SERIKAWA  Teruo SHIMOMURA  

     
    LETTER-Image Processing, Computer Graphics and Pattern Recognition

      Page(s):
    500-502

    A new gloss-extracting method is proposed in this study. A spatial filter with variable resolution is used for the extraction of glossiness. Various spheres and cylinders with curvature radii from 4 to mm are used as the specimens. In all samples, a strong correlation, with a correlation coefficient of more than 0.98, has been observed between psychological glossiness Gph perceived by the human eye and glossiness Gfm extracted by this method. This method is useful for plane specimens as well as spherical and cylindrical ones.

  • Modified MCR Expression of Binary Document Images

    Supoj CHINVEERAPHAN  Abdel Malek B.C. ZIDOURI  Makoto SATO  

     
    LETTER-Image Processing, Computer Graphics and Pattern Recognition

      Page(s):
    503-507

    As a first step to develop a system to analyze or recognize patterns contained in mages, it is important to provide a good base representation that can facilitate efficiently the interpretation of such patterns. Since structural features of basic patterns in document images such as characters or tables are horizontal and vertical stroke components, we propose a new expression of document image based on the MCR expression that can express well such features of text and tabular components of an image.

  • Pseudo Bayesian Screening of Psychiatric Patients

    Kazuo YANA  Koji KAWACHI  Kazuhiro IIDA  Yoshio OKUBO  Michio TOHRU  Fumio OKUYAMA  

     
    LETTER-Medical Electronics and Medical Information

      Page(s):
    508-510

    This paper describes a method for screening psychiatric patients based on a questionnaire consisting of simple yes/no questions regarding to physical, mental conditions and subjective symptoms which is provided at their first visit to the hospital. The analysis of the questionnaire is important to understand patients' background. One hundred filled out questionnaires were utilized for constructing and evaluating a pseude Bayesian classifier which classifies patients into three categories i.e. Schizophrenic, emotional and neurotic disorders with average correct prediction rate of 73.3%. The rate was 16.6% higher than the result given by experienced medical doctors and the method will be a useful mean for automatic screening of the psychiatric patients.