Journal:Informatica
Volume 21, Issue 1 (2010), pp. 1–12
Abstract
New text independent speaker identification method is presented. Phase spectrum of all-pole linear prediction (LP) model is used to derive the speech features. The features are represented by pairs of numbers that are calculated from group delay extremums of LP model spectrum. The first component of the pair is an argument of maximum of group delay of all pole LP model spectrum and the second is an estimation of spectrum bandwidth at the point of spectrum extremum. A similarity metric that uses group delay features is introduced. The metric is adapted for text independent speaker identification with general assumption that test speech channel may contain multiple speakers. It is demonstrated that automatic speaker recognition system with proposed features and similarity metric outperforms systems based on Gaussian mixture model with Mel frequency cepstral coefficients, formants, antiformants and pitch features.
Journal:Informatica
Volume 21, Issue 1 (2010), pp. 13–30
Abstract
The genetic information in cells is stored in DNA sequences, represented by a string of four letters, each corresponding to a definite type of nucleotides. Genomic DNA sequences are very abundant in periodic patterns, which play important biological roles. The complexity of genetic sequences can be estimated using the information-theoretic methods. Low complexity regions are of particular interest to genome researchers, because they indicate to sequence repeats and patterns. In this paper, the complexity of genetic sequences is estimated using Shannon entropy, Rényi entropy and relative Kolmogorov complexity. The structural complexity based on periodicities is analyzed using the autocorrelation function and time delayed mutual information. As a case study, we analyze human 22nd chromosome and identify 3 and 49 bp periodicities.
Journal:Informatica
Volume 21, Issue 1 (2010), pp. 31–40
Abstract
As a means of supporting quality of service guarantees, aggregate multiplexing has attracted a lot of attention in the networking community, since it requires less complexity than flow-based scheduling. However, contrary to what happens in the case of flow-based multiplexing, few results are available for aggregate-based multiplexing. In this paper, we consider a server multiplexer fed by several flows and analyze the impact caused by traffic aggregation on the flows at the output of the server. No restriction is imposed on the server multiplexer other than the fact that it must operate in a work-conserving fashion. We characterize the best arrival curves that constrain the number of bits that leave the server, in any time interval, for each individual flow. These curves can be used to obtain the delays suffered by packets in complex scenarios where multiplexers are interconnected, as well as to determine the maximum size of the buffers in the different servers. Previous results provide tight delay bounds for networks where servers are of the FIFO type. Here, we provide tight bounds for any work-conserving scheduling policy, so that our results can be applied to heterogeneous networks where the servers (routers) can use different work-conserving scheduling policies such as First-In First-Out (FIFO), Earliest Deadline First (EDF), Strict Priority (SP), Guaranteed Rate scheduling (GR), etc.
Journal:Informatica
Volume 21, Issue 1 (2010), pp. 41–56
Abstract
Delegation of rights is a common practice in the real world. We present two identity-based threshold proxy signature schemes, which allow an original signer to delegate her signing capability to a group of n proxy signers, and it requires a consensus of t or more proxy signers in order to generate a valid signature. In addition to identity-based scheme, privacy protection for proxy singers and security assurance are two distinct features of this work. Our first scheme provides partial privacy protection to proxy signers such that all signers' identities are revealed, whereas none of those t participating signers is specified. On the other hand, all proxy signers remain anonymous in the second scheme. This provides a full privacy protection to all proxy signers; however, each valid signature contains a tag that allows one to trace all the participating proxy signers. Both our proposed schemes are secure against unforgeability under chosen message attack, and satisfy many other necessary conditions for proxy signature.
Journal:Informatica
Volume 21, Issue 1 (2010), pp. 57–78
Abstract
The DPLL procedure for the SAT problem is one of the fundamental algorithms in computer science, with many applications in a range of domains, including software and hardware verification. Most of the modern SAT solvers are based on this procedure, extending it with different heuristics. In this paper we present a formal proof that the DPLL procedure is correct. As far as we know, this is the first such proof. The proof was formalized within the Isabelle/Isar proof assistant system. This proof adds to the growing body of formalized mathematical knowledge and it also provides a number of lemmas relevant for proving correctness of modern SAT and SMT solvers.
Journal:Informatica
Volume 21, Issue 1 (2010), pp. 79–94
Abstract
In the previous papers (Pupeikis, 2000; Genov et al., 2006; Atanasov and Pupeikis, 2009), a direct approach for estimating the parameters of a discrete-time linear time-invariant (LTI) dynamic system, acting in a closed-loop in the case of additive noise with contaminating outliers uniformly spread in it, is presented. It is assumed there that the parameters of the LQG (Linear Quadratic Gaussian) controller are unknown, as well as known beforehand, too. The aim of the given paper is development of a minimum variance control (MVC) approach for a closed-loop discrete-time linear dynamic system when slowly or suddenly time-varying coefficients of the transfer function of such a system as well as that of a minimum variance (MV) controller are not known and ought to be estimated. The recursive parametric identification of an open-loop system and determination of the coefficients of the MV controller are performed in each current operation by processing observations in the case of additive noise at the output with contaminating outliers uniformly spread in it. The robust recursive technique, based on the S-algorithm, with a version of Shweppe's GM-estimator and with discounting previous data, used in the estimation, by introducing a constant as well as time-varying forgetting factors in the abovementioned estimator, is applied here in the calculation of estimates of the parameters of a dynamic system. Then, the recursive parameter estimates are used in each current iteration to determine unknown parameters of the MV controller. Afterwards, the current value of the MV control signal is found in each operation, and it is used to generate the output of the system, too. The results of numerical simulation by computer are presented and discussed.
Journal:Informatica
Volume 21, Issue 1 (2010), pp. 95–116
Abstract
We address the problem of statistical machine translation from highly inflective language to less inflective one. The characteristics of inflective languages are generally not taken into account by the statistical machine translation system. Existing translation systems often treat different inflected word forms of the same lemma as if they were independent of each other, although some interdependencies exist. On the other hand we know that if we reduce inflected word forms to common lemmas, some information is lost. It would be reasonable to eliminate only the variations in inflected word forms, which are not relevant for translation. Inflectional features of words are defined by morpho-syntactic descriptions (MSD) tags and we want reduce them. To do this the explicit knowledge about both languages (source and target language) is needed. The idea of the paper is to find the information-bearing MSDs in source language by data-driven approach. The task is performed by a global optimization algorithm, named Differential Evolution. The experiments were performed using freely available parallel English–Slovenian corpus SVEZ-IJS, which is lemmatized and annotated with MSD tags. The results show a promising direction toward optimal subset of morpho-syntactic features.
Journal:Informatica
Volume 21, Issue 1 (2010), pp. 117–122
Abstract
In 2007, Kancharla et al. proposed an identity-based strong designated verifier signature (IBSDVS) scheme based on bilinear pairings, and claimed it unforgeable and non-delegatable. However, in this paper, we show that this scheme is actually delegatable.
Journal:Informatica
Volume 21, Issue 1 (2010), pp. 123–138
Abstract
In stochastic programming and decision analysis, an important issue consists in the approximate representation of the multidimensional stochastic underlying process in the form of scenario tree. This paper presents the approach to generate the multistage multidimensional scenario tree out of a set of scenario fans. For this purpose, the multistage K-means clustering algorithm is developed. The presented scenario tree generation algorithm is motivated by the stability results for optimal values of a multistage stochastic program. The time complexity of developed multistage K-means clustering algorithm is proved to be linear in regard to the number of scenarios in the fan. The algorithm to determine the branches with nonduplicate information in the multistage scenario tree is also presented as an intermediate result of research.
Journal:Informatica
Volume 21, Issue 1 (2010), pp. 139–148
Abstract
The paper deals with the recursive identification of dynamic systems having noninvertible output characteristics, which can be represented by the Wiener model. A special form of the model is considered where the linear dynamic block is given by its transfer function and the nonlinear static block is characterized by such a description of the piecewise-linear characteristic, which is appropriate for noninvertible nonlinearities. The proposed algorithm is a direct application of the known recursive least squares method extended with the estimation of internal variables and enables the on-line estimation of both the linear block parameters and the parameters of some noninvertible nonlinearities and their changes. The feasibility of the proposed method is illustrated on examples of time-varying systems.