Journal:Informatica
Volume 16, Issue 3 (2005), pp. 395–406
Abstract
This paper relates properties of operators with the well-known concepts of positive realness and passivity properties in dynamic systems and their associate transfer functions. Those concepts together with very close related ones are first examined from a physical point of view. Then, they are related with hyperstability and properties of transfer functions while the hyperstability theorem is revisited and interpreted. Finally, the above concepts are compared to the mathematical concepts of positivity and closely related ones in operator theory in Hilbert spaces.
Journal:Informatica
Volume 16, Issue 3 (2005), pp. 383–394
Abstract
A modernization of signature scheme published in (Sakalauskas, 2004) is presented. This scheme differs from the prototype by its structure and uses a more general algebraic systems. It has a higher security and shorter key length and is also more computationally effective.
The introduced new algebraic structures, semiring and semimodule, are mutually compatible algebraic systems. The semiring is a set of operators acting in a semimodule as endomorphisms. There is postulated that action operation has a one-way function (OWF) property. The compatibility of both algebraic structures' means that the action operation has right and left distributivity property with respect to the additive operation defined in semimodule and semiring.
Two other essential OWFs are defined. The latter are based on known constructions and have a greater complexity than other recognized hard problems such as conjugator search problem in noncommutative groups, for example.
Journal:Informatica
Volume 16, Issue 3 (2005), pp. 365–382
Abstract
The problem of system input selection, dubbed in the literature as Type I Structure Identification problem, is addressed in this paper using an effective novel method. More specifically, the fuzzy curve technique, introduced by Lin and Cunningham (1995), is extended to an advantageous fuzzy surface technique; the latter is used for fast building a coarse model of the system from a subset of the initial candidate inputs. A simple genetic algorithm, enhanced with a local search operator, is used for finding an optimal subset of necessary and sufficient inputs by considering jointly more than one inputs. Extensive simulation results on both artificial data and real world data have demonstrated comparatively the advantages of the proposed method.
Journal:Informatica
Volume 16, Issue 3 (2005), pp. 347–364
Abstract
Estimation of the ratio of two totals is considered, when a probability sample from the finite population is available. Four estimators of the ratio are examined. The first one – called “simple” – is the ratio of the Horvitz–Thompson estimators of totals; the second – the ratio of two ratio estimators of totals; the third one – the ratio of two regression estimators of totals. The fourth one is a calibrated estimator of the ratio. The variances of these estimators are compared. The properties of such estimators of the ratio are studied. The simulation results are presented.
Journal:Informatica
Volume 16, Issue 3 (2005), pp. 333–346
Abstract
In this paper, a reliable information hiding scheme based on support vector machine and error correcting codes is proposed. To extract the hidden information bits from a possibly tampered watermarked image with a lower error probability, information hiding is modeled as a digital communication problem, and both the good generalization ability of support vector machine and the error correction code BCH are applied. Due to the good learning ability of support vector machine, it can learn the relationship between the hidden information and corresponding watermarked image; when the watermarked image is attacked by some intentional or unintentional attacks, the trained support vector machine can recover the right hidden information bits. The reliability of the proposed scheme has been tested under different attacks. The experimental results show that the embedded information bits are perceptually transparent and can successfully resist common image processing, jitter attack, and geometrical distortions. When the host image is heavily distorted, the hidden information can also be extracted recognizably, while most of existing methods are defeated. We expect this approach provide an alternative way for reliable information hiding by applying machine learning technologies.
Journal:Informatica
Volume 16, Issue 3 (2005), pp. 317–332
Abstract
The conjugate gradient method is an iterative technique used to solve systems of linear equations. The paper analyzes the performance of parallel preconditioned conjugate gradient algorithms. First, a theoretical model is proposed for estimation of the complexity of PPCG method and a scalability analysis is done for three different data decomposition cases. Computational experiments are done on IBM SP4 computer and some results are presented. It is shown that theoretical predictions agree well with computational results.
Journal:Informatica
Volume 15, Issue 4 (2004), pp. 565–580
Abstract
This paper describes our research on statistical language modeling of Lithuanian. The idea of improving sparse n‐gram models of highly inflected Lithuanian language by interpolating them with complex n‐gram models based on word clustering and morphological word decomposition was investigated. Words, word base forms and part‐of‐speech tags were clustered into 50 to 5000 automatically generated classes. Multiple 3‐gram and 4‐gram class‐based language models were built and evaluated on Lithuanian text corpus, which contained 85 million words. Class‐based models linearly interpolated with the 3‐gram model led up to a 13% reduction in the perplexity compared with the baseline 3‐gram model. Morphological models decreased out‐of‐vocabulary word rate from 1.5% to 1.02%.
Journal:Informatica
Volume 15, Issue 4 (2004), pp. 551–564
Abstract
Text categorization – the assignment of natural language documents to one or more predefined categories based on their semantic content – is an important component in many information organization and management tasks. Performance of neural networks learning is known to be sensitive to the initial weights and architecture. This paper discusses the use multilayer neural network initialization with decision tree classifier for improving text categorization accuracy. Decision tree from root node until a final leave is used for initialization of each single unit. Growing decision trees with increasingly larger amounts of training data will result in larger decision tree sizes. As a result, the neural networks constructed from these decision trees are often larger and more complex than necessary. Appropriate choice of certainty factor is able to produce trees that are essentially constant in size in the face of increasingly larger training sets. Experimental results support the conclusion that error based pruning can be used to produce appropriately sized trees, which are directly mapped to optimal neural network architecture with good accuracy. The experimental evaluation demonstrates this approach provides better classification accuracy with Reuters‐21578 corpus, one of the standard benchmarks for text categorization tasks. We present results comparing the accuracy of this approach with multilayer neural network initialized with traditional random method and decision tree classifiers.
Journal:Informatica
Volume 15, Issue 4 (2004), pp. 525–550
Abstract
Walras theory is well known and widely used in models of market economy. Various iterative methods are developed to search for the equilibrium conditions.
In this paper a new approach is proposed and implemented where the search for Walras equilibrium is defined as a stochastic global optimization problem. This way random nature of customer arrivals is represented and the convergence to equilibrium is provided if equilibrium exists.
This paper describes a part of a Web‐based integrated system for scientific cooperation and distance graduate studies of theories of optimization, games and markets which aim is to provide researchers and graduate students with hands‐on experience on effective use of software. The objectives are to provide a tool for scientific collaboration and to stimulate creative abilities of graduate students to work as independent researchers. The web‐site http://soften.ktu.lt/˜mockus includes a family of economic and finnacial models regarding them all as examples of the the general optimization theory.
Journal:Informatica
Volume 15, Issue 4 (2004), pp. 515–524
Abstract
Tree is one of the most studied and practically useful classes of graphs and is the attention of a great number of studies. There is absence of generalized results for tree as a class and even for one kind of labeling as whole. Only specialized results exist limited to specific types of trees only. A number of conjectures stand being unsolved. Graham and Sloane (1980) conjectured trees to be Harmonious and Ringel‐Kotzig conjectured trees to be Graceful about three decades ago. Kotzig and Rosa (1970) ask the question whether all trees are Magic or not. No generalized result for Antimagic labeling is given for trees so far. This paper presents the methodologies to obtain the major labeling schemes for trees viz., Harmonious, Sequential, Felicitous, Graceful, Antimagic and found the trees to be not Magic except T(2,1), thus solving the said conjectures. These findings could also be useful for those working in fields where graphs serve as models.