The search functionality is under construction.

IEICE TRANSACTIONS on Information

  • Impact Factor

    0.59

  • Eigenfactor

    0.002

  • article influence

    0.1

  • Cite Score

    1.4

Advance publication (published online immediately after acceptance)

Volume E85-D No.2  (Publication Date:2002/02/01)

    Special Issue on Selected Papers from LA Symposium
  • FOREWORD

    Shigeki IWATA  

     
    FOREWORD

      Page(s):
    311-311
  • On Cellular Arrays and Other Topics in Parallel Computing

    Oscar H. IBARRA  

     
    INVITED SURVEY PAPER

      Page(s):
    312-321

    We give an overview of the computational complexity of linear and mesh-connected cellular and iterative arrays with respect to well known models of sequential and parallel computation. We discuss one-way communication versus two-way communication, serial input versus parallel input, and space-efficient simulations. In particular, we look at the parallel complexity of cellular arrays in terms of the PRAM theory and its implications, e.g., to the parallel complexity of recurrence equations and loops. We also point out some important and fundamental open problems that remain unresolved. Next, we investigate the solvability of some reachability and safety problems concerning machines operating in parallel and cite some possible applications. Finally, we briefly discuss the complexity of the "commutativity analysis" technique that is used in the areas of parallel computing and parallelizing compilers.

  • A Note on Approximating the Survivable Network Design Problem in Hypergraphs

    Liang ZHAO  Hiroshi NAGAMOCHI  Toshihide IBARAKI  

     
    PAPER

      Page(s):
    322-326

    We consider to design approximation algorithms for the survivable network design problem in hypergraphs (SNDPHG) based on algorithms developed for the survivable network design problem in graphs (SNDP) or the element connectivity problem in graphs (ECP). Given an instance of the SNDPHG, by replacing each hyperedge e={v1,・・・,vk} with a new vertex we and k edges {we, v1},・・・, {we, vk}, we define an SNDP or ECP in the resulting graph. We show that by approximately solving the SNDP or ECP defined in this way, several approximation algorithms for the SNDPHG can be obtained. One of our results is a dmax+-approximation algorithm for the SNDPHG with dmax 3, where dmax (resp. dmax+) is the maximum degree of hyperedges (resp. hyperedges with positive cost). Another is a dmax+(rmax)-approximation algorithm for the SNDPHG, where (i)=j=1i(1/j) is the harmonic function and rmax is the maximum connectivity requirement.

  • On the Power of Non-deterministic Quantum Finite Automata

    Masaki NAKANISHI  Takao INDOH  Kiyoharu HAMAGUCHI  Toshinobu KASHIWABARA  

     
    PAPER

      Page(s):
    327-332

    The class NQP was proposed as the class of problems that are solvable by non-deterministic quantum Turing machines in polynomial time. In this paper, we introduce non-deterministic quantum finite automata in which the same non-determinism as in non-deterministic quantum Turing machines is applied. We compare non-deterministic quantum finite automata with the classical counterparts, and show that (unlike the case of classical finite automata) the class of languages recognizable by non-deterministic quantum finite automata properly contains the class of all regular languages.

  • Necessary and Sufficient Numbers of Cards for Sharing Secret Keys on Hierarchical Groups

    Takaaki MIZUKI  Takao NISHIZEKI  

     
    PAPER

      Page(s):
    333-345

    Suppose that there are players in two hierarchical groups and a computationally unlimited eavesdropper. Using a random deal of cards, a player in the higher group wishes to send a one-bit message information-theoretically securely either to all the players in her group or to all the players in the two groups. This can be done by the so-called 2-level key set protocol. In this paper we give a necessary and sufficient condition for the 2-level key set protocol to succeed.

  • A Note on Realtime One-Way Alternating and Deterministic Multi-Counter Automata

    Tsunehiro YOSHINAGA  Katsushi INOUE  

     
    LETTER

      Page(s):
    346-349

    This paper investigates the accepting powers of one-way alternating and deterministic multi-counter automata operating in realtime. We partially solve the open problem posed in [4], and show that for each k1, there is a language accepted by a realtime one-way deterministic (k+3)-counter automaton, but not accepted by any realtime one-way alternating k-counter automaton.

  • Regular Section
  • Enhanced Mutual Exclusion Algorithm for Mobile Computing Environments

    Hyun Ho KIM  Sang Joon AHN  Tai Myoung CHUNG  Young Ik EOM  

     
    PAPER-Algorithms

      Page(s):
    350-361

    The mobile computing system is a set of functions on a distributed environment organized to support mobile hosts. In this environment, mobile hosts should be able to move without any constraints and should remain connected to the network even while moving. Also, they should be able to get necessary information regardless of their current location and time. Distributed mutual exclusion methods for supporting distributed algorithms have hitherto been designed for networks only with static hosts. However, with the emergence of mobile computing environments, a new distributed mutual exclusion method needs to be developed for integrating mobile hosts with underlying distributed systems. In the sense, many issues that should be considered stem from three essential properties of mobile computing system such as wireless communication, portability, and mobility. Thus far, distributed mutual exclusion methods for mobile computing environments were designed based on a token ring structure, which has the drawback of requiring high costs in order to locate mobile hosts. In this paper, we propose not only a distributed mutual exclusion method that can reduce such costs by structuring the entire system as a tree-based logical structure but also recovery schemes that can be applied when a node failure occurs. Finally, we evaluate the operation costs for the mutual exclusion scheme and the recovery scheme.

  • Minimal Spanning Tree Construction with MetricMatrix

    Masahiro ISHIKAWA  Kazutaka FURUSE  Hanxiong CHEN  Nobuo OHBO  

     
    PAPER-Databases

      Page(s):
    362-372

    Clustering is one of the most important topics in the field of knowledge discovery from databases. Especially, hierarchical clustering is useful since it gives a hierarchical view of a whole database and can be used to guide users in browsing a huge database. In many cases, clustering can be modeled as a graph partitioning problem. When an appropriate distance function between database objects is given, a database can be viewed as an edge-weighted complete graph, where vertices are database objects and weights of edges are distances between them. Then a process of MST (Minimal Spanning Tree) construction can be viewed as a process of a single-linkage agglomerative clustering process for database objects. In this paper, we propose an efficient MST construction method for a large complete metric graph, which is derived from a database with a metric distance function defined on it. Our method utilizes a metric index to reduce the number of distance calculations. The basic idea is to exclude those edges less probable to be a part of an MST by using the metric postulate. For this purpose, we introduce a new metric index named MetricMatrix. Experimental results show that our method can drastically reduce the number of distance calculations needed for MST construction in comparison with the classical method.

  • Asynchronous Cache Invalidation Strategy to Support Read-Only Transaction in Mobile Environments

    SungHun NAM  IlYoung CHUNG  SungHo CHO  ChongSun HWANG  

     
    PAPER-Databases

      Page(s):
    373-385

    The stateless-based cache invalidation schemes for wireless environments can be categorized into either asynchronous or synchronous cache invalidation according to the broadcasting way of invalidation report. However, if the asynchronous cache invalidation scheme attempts to support local processing of read-only transaction, a critical problem may occur; the asynchronous invalidation reports provide no guarantee of waiting time for mobile transactions requesting commit. To solve this problem, the server in our approaches broadcasts two kind of messages, asynchronous invalidation report to reduce transaction latency and periodic guide message to avoid the uncertainty of waiting time for the next invalidation report. This paper presents a simulation-based analysis on the performance of the suggesting algorithms. The simulation experiments show that the local processing algorithms of read-only transaction based on asynchronous cache invalidation scheme get better response time than the algorithm based on synchronous cache invalidation scheme.

  • Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network

    Narn-Yih LEE  

     
    PAPER-Applications of Information Security Techniques

      Page(s):
    386-391

    In 1998, Jan and Tseng proposed two integrated schemes of user authentication and access control which can be used to implement a protection system in distributed computer systems. This paper will analyze the security of both schemes and show that an intruder can easily forge a login, be accepted and logged in as a legal user, and access system resources. We will then propose a modified scheme to withstand our proposed attacks.

  • 4-kbit/s Multi-Dispersed-Pulse-Based CELP (MDP-CELP) Speech Coder

    Hiroyuki EHARA  Koji YOSHIDA  Kazutoshi YASUNAGA  Toshiyuki MORII  

     
    PAPER-Speech and Hearing

      Page(s):
    392-401

    This paper presents a high quality 4-kbit/s speech coding algorithm based on a CELP algorithm. The coder operates on speech frames of 20 ms. The algorithm has following four main features: multiple sub-codebooks, backward adaptive mode switching, dispersed-pulse structure, and noise post-processing. The multiple sub-codebooks consist of a pulse-codebook and a random-codebook so that they can handle both signals, noise-like (e.g. unvoiced, stationary noise) and pulse-like (e.g. voiced). The backward adaptive mode switching is performed using decoded parameters; therefore, no additional mode bit is transmitted. The random-codebook size is switched with the backward adaptively selected mode. The subjective quality of unvoiced speech or noise-like signal can be improved by this switching operation because the random-codebook size is greatly increased in such signal mode. The dispersed-pulse structure provides better performance of sparse pulse excitation using dispersed pulses instead of simple unit pulses. The noise post-processing employs a stationary background noise generator for producing stationary noise signal. It significantly improves subjective quality of decoded signal under various background noise conditions. Subjective listening tests are conducted in accordance with ACR and DCR tests. The ACR test results indicate that the fundamental performance of the MDP-CELP is equivalent to that of 32-kbit/s adaptive differential pulse code modulation (ADPCM). The DCR test results show that the performance of the MDP-CELP is equivalent to or better than that of 8-kbit/s conjugate-structure algebraic code excited linear prediction (CS-ACELP) under several background noise conditions.

  • A Probabilistic Approach to Plane Extraction and Polyhedral Approximation of Range Data

    Caihua WANG  Hideki TANAHASHI  Hidekazu HIRAYU  Yoshinori NIWA  Kazuhiko YAMAMOTO  

     
    PAPER-Image Processing, Image Pattern Recognition

      Page(s):
    402-410

    In this paper, we propose a probabilistic approach to derive an approximate polyhedral description from range data. We first compare several least-squares-based methods for estimation of local normal vectors and select the most robust one based on a reasonable noise model of the range data. Second, we extract the stable planar regions from the range data by examining the distributions of the local normal vectors together with their spatial information in the 2D range image. Instead of segmenting the range data completely, we use only the geometries of the extracted stable planar regions to derive a polyhedral description of the range data. The curved surfaces in the range data are approximated by their extracted plane patches. With a probabilistic approach, the proposed method can be expected to be robust against the noise. Experimental results on real range data from different sources show the effectiveness of the proposed method.

  • Parallel Computation of Parametric Piecewise Modeling Method

    Hiroshi NAGAHASHI  Mohamed IMINE  

     
    PAPER-Computer Graphics

      Page(s):
    411-417

    This paper develops a simple algorithm for calculating a polynomial curve or surface in a parallel way. The number of arithmetic operations and the necessary time for the calculation are evaluated in terms of polynomial degree and resolution of a curve and the number of processors used. We made some comparisons between our method and a conventional method for generating polynomial curves and surfaces, especially in computation time and approximation error due to the reduction of the polynomial degree. It is shown that our method can perform fast calculation within tolerable error.

  • A Fast Finite Field Multiplier Architecture for High-Security Elliptic Curve Cryptosystems

    Sangook MOON  Yong Joo LEE  Jae Min PARK  Byung In MOON  Yong Surk LEE  

     
    LETTER-Applications of Information Security Techniques

      Page(s):
    418-420

    A new approach on designing a finite field multiplier architecture is proposed. The proposed architecture trades reduction in the number of clock cycles with resources. This architecture features high performance, simple structure, scalability and independence on the choice of the finite field, and can be used in high security cryptographic applications such as elliptic curve crypto-systems in large prime Galois Fields (GF(2m)).

  • An Efficient Laplacian-Model Based Dequantization for Uniformly Quantized DCT Coefficients

    Kwang-Deok SEO  Kook-Yeol YOO  Jae-Kyoon KIM  

     
    LETTER-Image Processing, Image Pattern Recognition

      Page(s):
    421-425

    Quantization is an essential step which leads to compression in discrete cosine transform (DCT) domain. In this paper, we show how a statistically non-optimal uniform quantizer can be improved by employing an efficient reconstruction method. For this purpose, we estimate the probability distribution function (PDF) of original DCT coefficients in a decoder. By applying the estimated PDF into the reconstruction process, the dequantization distortion can be reduced. The proposed method can be used practically in any applications where uniform quantizers are used. In particular, it can be used for the quantization scheme of the JPEG and MPEG coding standards.

  • A Novel Rough Neural Network and Its Training Algorithm

    Sheng-He SUN  Xiao-Dan MEI  Zhao-Li ZHANG  

     
    LETTER-Biocybernetics, Neurocomputing

      Page(s):
    426-431

    A novel rough neural network (RNN) structure and its application are proposed in this paper. We principally introduce its architecture and training algorithms: the genetic training algorithm (GA) and the tabu search training algorithm (TSA). We first compare RNN with the conventional NN trained by the BP algorithm in two-dimensional data classification. Then we compare RNN with NN by the same training algorithm (TSA) in functional approximation. Experiment results show that the proposed RNN is more effective than NN, not only in computation time but also in performance.