-
Yukiya Hatajima, Kenjiro Takazawa
2024 Volume 16 Pages
1-4
Published: 2024
Released on J-STAGE: January 14, 2024
JOURNAL
FREE ACCESS
A min–max spanning tree is a spanning tree minimizing the maximum weight of its edges. Sepasian and Monabbati (2017) introduced the problem of upgrading the maximum edge weight of a min–max spanning tree. Each edge weight can be decreased by paying a cost, and the objective is to minimize the maximum weight of a min–max spanning tree within a given budget. They designed a polynomial algorithm and a faster algorithm for a special case. In this paper, we extend their algorithm to matroids. Further, we show that the algorithm for the special case is applicable to a more general case.
View full abstract
-
Shotaro Yagishita, Shummin Nakayama
2024 Volume 16 Pages
5-8
Published: 2024
Released on J-STAGE: February 06, 2024
JOURNAL
FREE ACCESS
Recently, proximal Newton-type methods with metrics restricted to diagonal matrices have been proposed for solving composite optimization problems whose objective function is the sum of a smooth function and a possibly nonsmooth function. Although the effectiveness of one of them, the proximal diagonal Newton method (PDNM), has been reported theoretically and numerically, only 𝒪(1/k) sublinear convergence rate has been obtained at best for non-strongly convex problems. We propose an accelerated variant of the PDNM, which achieves the convergence rate of 𝒪(1/k2).
View full abstract
-
Misaki Iwai
2024 Volume 16 Pages
9-12
Published: 2024
Released on J-STAGE: February 06, 2024
JOURNAL
FREE ACCESS
Because of a declining birth rate and an aging population, intergenerational inequality in the public pension system has become one of the most serious social issues, especially in Japan. This paper examines whether it is possible to address intergenerational inequality while maintaining the current pay-as-you-go system in Japan’s National Pension scheme. The study employs agent-based modeling simulation to investigate two settings related to financial resources: (i) changes in the ratio of insurance premiums to taxes, and (ii) the ratio of consumption tax to income tax.
View full abstract
-
Tomoya Miyashita, Shuhei Kudo, Yusaku Yamamoto
2024 Volume 16 Pages
13-16
Published: 2024
Released on J-STAGE: February 21, 2024
JOURNAL
FREE ACCESS
In this paper, we perform a roundoff error analysis of an integration-based method for computing the matrix sign function recently proposed by Nakaya and Tanaka. The method expresses the matrix sign function using an integral representation and computes the integral numerically by the double-exponential formula. While the method has large-grain parallelism and works well for well-conditioned matrices, its accuracy deteriorates when the input matrix is ill-conditioned or highly nonnormal. We investigate the reason for this phenomenon by a detailed roundoff error analysis.
View full abstract
-
Kazuki Yamamoto, Takahiko Kurahashi, Yuki Murakami, Fujio Ikeda, Ikuo ...
2024 Volume 16 Pages
17-20
Published: 2024
Released on J-STAGE: March 24, 2024
JOURNAL
FREE ACCESS
In this study, a method was developed for estimating defects in concrete from test data generated by hammering a concrete plate using machine learning. A neural network was constructed based on a self-attention network to estimate the three-dimensional position and size of the defects placed within the concrete plate. The scalograms generated from the acceleration responses were used as the input. Identification was also conducted using data augmentation, in which we evaluated the effect of the number of training data items on identification accuracy.
View full abstract
-
Kosuke Shimizu, Masayuki Kishida, Takahiko Kurahashi
2024 Volume 16 Pages
21-24
Published: 2024
Released on J-STAGE: March 24, 2024
JOURNAL
FREE ACCESS
This paper describes level-set based topology optimization for bi-linear type elasto-plastic problems. The geometric complexity can be controlled by the value of the regularization factor τ defined by the phase-field method, and the application of this method to bi-linear elasto-plastic models aims to improve the reliability of structural designs. In this study, a comparison is carried out for the final topologies in elastic and bi-linear elasto-plastic models using 2D and 3D cantilever beam models; we also provide reliable design considerations.
View full abstract
-
Haruhisa Oda
2024 Volume 16 Pages
25-28
Published: 2024
Released on J-STAGE: April 18, 2024
JOURNAL
FREE ACCESS
Advances in experimental technologies have induced the need for 3D cell data analysis. However, we lack a simple method that directly analyzes 3D data. 2D methods are insufficient when cells overlap orthogonal to slices. Experimental constraints sometimes make the step size of slices greater than a pixel in each slice. We present a 3D figure detection technology using persistent homology usable even in the above situations. Also, the parameters have clear geometric meanings. Thus, our method serves as an easy-to-use 3D cell detection technology that directly uses 3D data and respects experimental constraints.
View full abstract
-
Tomoya Kamijima, Shun Sato, Kansei Ushiyama, Takayasu Matsuo, Ken’ichi ...
2024 Volume 16 Pages
29-32
Published: 2024
Released on J-STAGE: May 09, 2024
JOURNAL
FREE ACCESS
A sequence of solutions generated by a continuous optimization method can be associated with a solution trajectory of the continuous dynamical system obtained by the continuous limit of step sizes being 0. Such dynamical systems can contain Hessians even when the original optimization methods do not. In this paper, we show the convergence rate of such dynamical systems via the method of Lyapunov functions and argue their optimality.
View full abstract
-
Keishi Takahisa, Ken Umeno
2024 Volume 16 Pages
33-36
Published: 2024
Released on J-STAGE: June 27, 2024
JOURNAL
FREE ACCESS
A chaotic dynamical system is one in which the system obeys deterministic laws but its future and past are difficult to predict. In this study, we observed and discussed the behavior of orbits of coupled two nonchaotic dynamical systems when they are coupled. As a result, a chaotic synchronization phenomenon, in which the orbits of the two dynamical systems synchronize completely with chaotic natures, was observed under certain conditions. We clarified the conditions under which the phenomenon occurs by analytically deriving the conditional Lyapunov exponent, Cauchy Laws with ergodic theory.
View full abstract
-
Narimasa Sasa
2024 Volume 16 Pages
37-40
Published: 2024
Released on J-STAGE: June 27, 2024
JOURNAL
FREE ACCESS
Numerical properties of the momentum conservation law for Hamiltonian partial differential equations are investigated based on a symplectic time integration. In the nonlinear Klein–Gordon system, it is shown that the critical value of the coefficient of the dispersion term is nearly proportional to the inverse square of the total grid number. The result is consistent with the scale invariance of the equation of motion. On the other hand, in the nonlinear Schrödinger-type system, the critical value of the coefficient does not follow the scale invariance of the equation of motion.
View full abstract
-
Misao Endo
2024 Volume 16 Pages
41-44
Published: 2024
Released on J-STAGE: July 04, 2024
JOURNAL
FREE ACCESS
In this study, we developed a mixed-integer programming model that can help maximize the profit of the gas-fired power generation business in Japan. Owing to the practical constraints of liquefied natural gas (LNG) cargo, LNG tank, and power generating unit, Japanese gas-fired power producers are currently unable to effectively utilize the futures market. By using this model, power producers can calculate the optimal futures position and the number of spot LNG cargoes to buy/sell in response to the daily changing forward spark spread. The numerical simulation shows that the optimal electricity futures position decreases in a step-wise manner against the electricity futures price.
View full abstract
-
Masaharu Mura, Koichi Kondo
2024 Volume 16 Pages
45-48
Published: 2024
Released on J-STAGE: July 04, 2024
JOURNAL
FREE ACCESS
This study proposes an integrable discretization of linear and logistic equations at random intervals with higher-order accuracy. We approximate the exponential function by rational functions using the Padé approximation of any degree and employ them to increase accuracy. We design a new integrable discretization of the linear equations under random intervals with higher-order accuracy. The logistic equation can be discretized through dependent variable transformation while maintaining integrability.
View full abstract
-
Naoki Ishii, Shun Sato, Takayasu Matsuo
2024 Volume 16 Pages
49-52
Published: 2024
Released on J-STAGE: July 07, 2024
JOURNAL
FREE ACCESS
Numerical integrators which conserve invariants of original differential equations are called conservative integrators. While most of them are computationally expensive, a cheaper class is the projection methods, where conservation is realized by simple projections. However, such methods do not necessarily preserve affine invariance originally held in differential equations. In this study, we point out several affine-invariant projections and discuss how the affine invariance affects the quality of numerical solutions.
View full abstract
-
Kota Takeda, Shizuo Kaji, Takemasa Miyoshi
2024 Volume 16 Pages
53-56
Published: 2024
Released on J-STAGE: July 07, 2024
JOURNAL
FREE ACCESS
Numerical simulation of the one-dimensional advection equations is known to be difficult with discontinuous initial states. The initial shape undergoes distortion due to high-frequency fluctuations, exemplifying a prevalent challenge in discretizing dynamics: the violation of conservation laws. In addressing this issue, our study introduces a topological regularization method for numerical simulations, leveraging persistent homology. The effectiveness of our approach is demonstrated through numerical simulations of the one-dimensional advection equation with a rectangular initial state. The results highlight the potential of our method to improve the accuracy and fidelity of simulations, especially in scenarios where maintaining topological conservation is critical.
View full abstract
-
Suguru Iwasaki, Ken Umeno
2024 Volume 16 Pages
57-60
Published: 2024
Released on J-STAGE: August 04, 2024
JOURNAL
FREE ACCESS
Generative Adversarial Networks (GANs) are the architecture of significant interest in the field of data generation using machine learning. Attempts have been made in the past to generate time-series data using GANs. In this study, we generated time series following a generalized Boole transformation using GANs and investigated how well the generated data preserved the characteristics of the original time series from both a dynamic and statistical perspective. Additionally, we examined the impact of the distribution followed by the random noise input to the GAN’s generator on the pseudo time series.
View full abstract
-
Yasuhiro Matsumoto
2024 Volume 16 Pages
61-64
Published: 2024
Released on J-STAGE: August 07, 2024
JOURNAL
FREE ACCESS
This paper presents a fast wavefield evaluation method for two-dimensional wave scattering problems. The proposed method is based on a modified version of proxy-surface-accelerated interpolative decomposition, making it effective even if the evaluation points are near the boundary. The commonly known fast multipole method requires the use of direct evaluations near the boundaries of scatterers because the analytical expansion of kernel functions does not converge. On the one hand, the proposed method does not require the analytical expansion of kernel functions. The validity and effectiveness of the proposed method are demonstrated using numerical examples.
View full abstract
-
Kaito Sato, Hiroshi Onuki, Tsuyoshi Takagi
2024 Volume 16 Pages
65-68
Published: 2024
Released on J-STAGE: August 24, 2024
JOURNAL
FREE ACCESS
Some isogeny-based cryptosystems use addition and doubling on the Jacobian over genus-2 sextic and non-monic hyperelliptic curves. In this study, we generalized some formulae for quintic and monic curves to sextic curves using projective coordinates and then compared them. For sextic curves and projective coordinates, the formulae based on Lange’s were faster than those based on Costello–Lauter’s, in contrast to quintic curves. The formulae based on Lange’s take 64M + 6S for addition and 59M + 9S for doubling, where M and S denote the computational costs of multiplication and squaring, respectively.
View full abstract
-
Katsuhisa Ozaki, Xuefeng Liu
2024 Volume 16 Pages
69-72
Published: 2024
Released on J-STAGE: September 13, 2024
JOURNAL
FREE ACCESS
This study introduces a novel algorithm designed to facilitate the accurate generation of domain triangulation for certain n-dimensional simplex domains. Traditional mesh generators employing floating-point arithmetic often encounter rounding errors, leading to a discrepancy between the generated domain triangulation and the intended geometric domain. Our algorithm introduces strategic perturbations to the triangulation nodes. This ensures that boundary nodes are precisely aligned on the domain boundary, thereby preserving the domain’s geometric integrity. Furthermore, this paper highlights the algorithm’s significance in enhancing the precision and reliability of high-precision eigenvalue computations for differential operators through practical mesh generation examples.
View full abstract
-
Keiichiro Kagawa, Yoshihiro Yamazaki
2024 Volume 16 Pages
73-76
Published: 2024
Released on J-STAGE: September 13, 2024
JOURNAL
FREE ACCESS
In this paper, we report the behavior of solutions of the one-dimensional Cahn–Hilliard equation with dynamic boundary conditions, where the time evolution on the boundary is induced by the boundary derivative. By studying the time evolution from a certain initial value, we find that as the time constant on the boundary asymptotically approaches a certain value, the relaxation to a stable stationary solution slows down at a logarithmic rate. This phenomenon is not observed in the case of the Neumann boundary condition.
View full abstract
-
Tomoaki Okayama, Tadatoshi Kosaka
2024 Volume 16 Pages
77-80
Published: 2024
Released on J-STAGE: September 13, 2024
JOURNAL
FREE ACCESS
Lundin and Stenger applied the Sinc approximation combined with the single-exponential (SE) transformation to approximate derivatives over the finite interval (−1,1), and provided its theoretical error analysis. In this study, we improve their approximation formula by replacing the SE transformation with the double-exponential (DE) transformation. The replacement has already been proposed for the first-order derivative, and an error analysis has also been provided. This study proposes the approximation and provides its rigorous convergence analysis for any order derivative.
View full abstract
-
Yudai Sugiyama, Takahiko Kurahashi, Yuichi Iwanaka, Masahiro Sato, Nor ...
2024 Volume 16 Pages
81-84
Published: 2024
Released on J-STAGE: September 21, 2024
JOURNAL
FREE ACCESS
In the aquaculture industry, damage occurs because of a sudden decrease in salinity concentration. Therefore, the demand for real-time forecasting has increased. Forecasting through machine learning is increasing; however, observation stations at the target site are not always present. Therefore, we predicted the flow field at the target site through data assimilation (DA) using a method combining the Kalman filter and finite element method. In this study, we used the predicted values with DA for long short-term memory and improved the prediction accuracy.
View full abstract
-
Yoshihiro Yamazaki, Shousuke Ohmori
2024 Volume 16 Pages
85-88
Published: 2024
Released on J-STAGE: September 29, 2024
JOURNAL
FREE ACCESS
Due to phase lock caused by a saddle-node bifurcation, the states of limit cycles for a tropically discretized Sel’kov model become equivalent to those for its ultradiscretized max-plus model. This property is essentially the same as the case of the negative feedback model, and existence of a general mechanism for ultradiscretization of the limit cycles is suggested. Furthermore, we find the logarithmic dependence of the time to pass the bottleneck for phase drift motion in the vicinity of the bifurcation point. This dependency can be understood as a consequence of the piecewise linearization by applying the ultradiscrete limit.
View full abstract
-
Takeshi Terao, Toshiyuki Imamura, Katsuhisa Ozaki
2024 Volume 16 Pages
89-92
Published: 2024
Released on J-STAGE: October 03, 2024
JOURNAL
FREE ACCESS
Numerical computation for eigenvalue decomposition plays a crucial role in many scientific fields, and highly accurate eigenpairs are required in certain domains. A novel method was proposed in this study for the iterative refinement of the eigenpair of a real symmetric matrix, which is based on the Ogita–Aishima method and uses compact WY representation. The proposed method can refine the accuracy of a partial eigenpair without using a full eigenvector matrix. Numerical examples illustrate the convergence of residuals, and a large-memory computer is not required for refinement.
View full abstract
-
Atsushi Maeno, Satoshi Tsujimoto
2024 Volume 16 Pages
93-96
Published: 2024
Released on J-STAGE: October 03, 2024
JOURNAL
FREE ACCESS
The discrete relativistic Toda equation is derived from the compatibility condition of the spectral transformations of the Laurent biorthogonal polynomials. The ultradiscrete version of this equation is regarded as a time evolution of the soliton cellular automaton, a new kind of box-ball system. In the time evolution of this automaton, not only balls but also some boxes move. We introduce 10-arc lines for the automaton and obtain the conserved quantities corresponding to soliton sizes.
View full abstract
-
Genki Akimoto, Tsuyoshi Takagi
2024 Volume 16 Pages
97-100
Published: 2024
Released on J-STAGE: October 10, 2024
JOURNAL
FREE ACCESS
In this study, we show that a weak key exists with a high probability in Strongly Asymmetric Algorithm-5 (SAA-5), a post-quantum key agreement protocol based on matrix operations on finite field 𝔽p. It has been claimed that only an exhaustive attack is possible for recovering a secret shared key. We propose a polynomial time recovery attack on the weak keys using the prime factorization of p – 1, the rank of matrices used in the protocol, and the Chinese remainder theorem. We also report the results of numerical experiments on SAA-5 using Magma against the recommended parameters, which can be recovered within a short time.
View full abstract