Journal:Informatica
Volume 14, Issue 1 (2003), pp. 3–18
Abstract
We discuss the application of heterogeneous metaprogramming (MPG) for the interface‐based design, which deals with the synthesis of the communication interfaces between Intellectual Property components (IPs). Heterogeneous MPG is based on the simultaneous usage of a domain language for describing domain functionality and a metalanguage for developing generic components and program generators. We present a design framework based on the MPG techniques. The novelty of our approach is that we apply the concept of heterogeneous MPG for the automatic generation of IP wrappers for communication between the third‐party soft IPs systematically. We present a case study for the synthesis of the communication interfaces using a FIFO protocol.
Journal:Informatica
Volume 14, Issue 1 (2003), pp. 19–36
Abstract
There are a growing number of applications, which extensively use the visual media. A key requirement in those applications is efficient access to the stored visual information for the purposes of indexing, fast retrieval, and scene analysis. To support this vision, many scene change detection algorithms have been developed for both sudden and gradual scene change in uncompressed domain. This paper presents a comparison of shot boundary detection and classification techniques and their variations including histogram, pixel‐differences, likelihood ratio, and motion vector. In addition, the pros and cons of each approach with many clarifying comments are presented.
Journal:Informatica
Volume 14, Issue 1 (2003), pp. 37–62
Abstract
The Markowitz model for single period portfolio optimization quantifies the problem by means of only two criteria: the mean, representing the expected outcome, and the risk, a scalar measure of the variability of outcomes. The classical Markowitz model uses the variance as the risk measure, thus resulting in a quadratic optimization problem. Following Sharpe's work on linear approximation to the mean‐variance model, many attempts have been made to linearize the portfolio optimization problem. There were introduced several alternative risk measures which are computationally attractive as (for discrete random variables) they result in solving Linear Programming (LP) problems. The LP solvability is very important for applications to real‐life financial decisions where the constructed portfolios have to meet numerous side constraints and take into account transaction costs. This paper provides a systematic overview of the LP solvable models with a wide discussion of their properties.
Journal:Informatica
Volume 14, Issue 1 (2003), pp. 63–74
Abstract
The paper presents a technique that defines creation of ESTELLE/Ag specifications using knowledge bases (KB). Application KB is created using the knowledge acquisition technique joined with a piece‐linear aggregate model. The production rules of the application KB are transformed to decision tables, and the static properties of the KB are checked in PROLOGA system. Further, the application KB is combined with the defined KB of validated properties and validation method, and application KB dynamic properties are checked in the expert system in CLIPS. A validated application KB is used defining a framework of ESTELLE/Ag specification using PRAXIS editor and supplementing PRAXIS generated framework with the application functional description. The technique is illustrated with an example of a single channel queuing system.
Journal:Informatica
Volume 14, Issue 1 (2003), pp. 75–84
Abstract
In this paper, the opening work on the development of a Lithuanian HMM speech recognition system is described. The triphone single‐Gaussian HMM speech recognition system based on Mel Frequency Cepstral Coefficients (MFCC) was developed using HTK toolkit. Hidden Markov model's parameters were estimated from phone‐level hand‐annotated Lithuanian speech corpus. The system was evaluated on a speaker‐independent ∼750 distinct isolated‐word recognition task. Though the speaker adaptation and language modeling techniques were not used, the system was performing at 20% word error rate.
Journal:Informatica
Volume 14, Issue 1 (2003), pp. 85–94
Abstract
A group signature scheme is a digital signature scheme that allows a group member to sign messages anonymously on behalf of the group. Recently, Tseng and Jan proposed two group signature schemes based on self‐certified and ID‐based public keys respectively. However, these two schemes were shown to be insecure against forgery due to Joye et al. Later, Sun et al. showed that Tseng and Jan's self‐certified group signature scheme is linkable. In this paper, we first point out that the proposed linking equation, which is used to check the linkability of Tseng and Jan's self‐certified scheme, cannot work because the inverse problem of RSA is hard. A repaired linking equation is consequently proposed to fix this problem. Then, we show that Tseng and Jan's ID‐based scheme is still linkable because given any two valid group signatures it is easy to decide whether these two group signatures are generated by the same group member or not.
Journal:Informatica
Volume 14, Issue 1 (2003), pp. 95–110
Abstract
It is a complex non‐linear problem to predict mechanical properties of concrete. As a new approach, the artificial neural networks can extract rules from data, but have difficulties with convergence by the traditional algorithms. The authors defined a new convex function of the grand total error and deduced a global optimization back‐propagation algorithm (GOBPA), which can solve the local minimum problem. For weights' adjustment and errors' computation of the neurons in various layers, a set of formulae are obtained by optimizing the grand total error function over a simple output space instead of a complicated weight space. Concrete strength simulated by neural networks accords with the data of the experiments on concrete, which demonstrates that this method is applicable to concrete properties' prediction meeting the required precision. Computation results show that GOBPA performs better than a linear regression analysis.
Journal:Informatica
Volume 14, Issue 1 (2003), pp. 111–120
Abstract
In the generalized group‐oriented cryptosystem, the sender can send a conditional message to a group of users such that only the specified sets of users in this group can cooperate to decrypt this message. In this paper, we will use an ElGamal cryptosystem and an elliptic curve ElGamal cryptosystem to achieve the purposes of generalization and group‐orientation, respectively. Both of our schemes are more efficient than Tsai et al.'s scheme in terms of sender's computational complexity.
Journal:Informatica
Volume 14, Issue 1 (2003), pp. 121–130
Abstract
Recent publications on multidimensional scaling express contradicting opinion on multimodality of STRESS criterion. An example has been published with rigorously provable multimodality of STRESS. We present an example of data and the rigorous proof of multimodality of SSTRESS for this data. Some comments are included on widely accepted opinion that minimization of SSTRESS is easier than minimization of STRESS.