algorithms courses are typically organized either by application area or by design technique. Each of these organizations has its strength, but neither effectively reflects the fact that sophisticated algorithms are n...
详细信息
algorithms courses are typically organized either by application area or by design technique. Each of these organizations has its strength, but neither effectively reflects the fact that sophisticated algorithms are not designed in a single pass. This paper describes and gives an example of the strategy of successive transformation, in which a sequence of algorithms is generated to solve a single problem. design of algorithms by successive transformation requires more time per problem, since each problem requires multiple phases of analysis. To the extent that this method is used, the breadth of the course in terms of areas and algorithms is reduced. However, we assert that at least a few such experiences are indispensable, because such painstaking analysis is representative of algorithm design as it really is, and because successive transformation is an excellent way to show students the power of theory to improve applications.
With the development of computer application technology and the popularity of computer network applications, people are increasingly relying on computers and network systems to complete important tasks, which makes co...
详细信息
With the development of computer application technology and the popularity of computer network applications, people are increasingly relying on computers and network systems to complete important tasks, which makes computer system security issues extremely important. As one of the core components of computer system security, identity authentication technology refers to the technical means used to confirm the operator identity process in computers and network systems. Currently, text-based password authentication is still the most widely used authentication technology because of its simplicity. Graphical password is a new type of password verification technology. It is an alternative solution to the shortcomings of text passwords that are difficult to remember and poorly resistant to cracking.
As a centerless self-organizing wireless network, Ad Hoc network requires both router transceiver nodes and other nodes to facilitate the data forwarding. Therefore, larger data transfer will easily cause the network ...
详细信息
As a centerless self-organizing wireless network, Ad Hoc network requires both router transceiver nodes and other nodes to facilitate the data forwarding. Therefore, larger data transfer will easily cause the network to be congested, thereby leading to the block of wireless network signal. Base on this situation, a Bayesian control algorithm is proposed to solve the congestion of Ad Hoc network so as to make full use of the wireless network resources, prevent the network congestion to the greatest degree and improve the performance of wireless network. Further, a reliability test is conducted on the congestion control algorithm of Ad Hoc network to make better use of wireless network real-time data and their performance.
Solving multimodal multi-objective optimization problems (MMOPs) has received increasing attention. How-ever, recent studies only consider unconstrained MMOPs. Given the fact that there are usually constraints in real...
详细信息
Solving multimodal multi-objective optimization problems (MMOPs) has received increasing attention. How-ever, recent studies only consider unconstrained MMOPs. Given the fact that there are usually constraints in real-world optimization problems, in this work, we propose a test problem construction approach for constrained multimodal multi-objective optimization. Based on the approach, a test suite, containing 14 instances with diverse features and difficulties, is created. Meanwhile, a new evolutionary framework is tailored for this kind of problem. We test the proposed framework in the experiments and compare it to state-of-the-art multimodal multi-objective optimization algorithms on the proposed test suite. The results reveal that the proposed test suite is challenging and it can motivate researchers to develop new algorithms. In addition, the superiority of our proposed framework demonstrates its effectiveness in handling constrained MMOPs.
作者:
Zhu, JiaweiFudan Univ
Inst Nano Elect & Quantum Comp State Key Lab Surface Phys Shanghai 200433 Peoples R China Fudan Univ
Dept Phys Shanghai 200433 Peoples R China
Adiabatic quantum computing (AQC) is a computation protocol to solve difficult problems exploiting quantum advantage, directly applicable to optimization problems. In performing the AQC, different configurations of th...
详细信息
Adiabatic quantum computing (AQC) is a computation protocol to solve difficult problems exploiting quantum advantage, directly applicable to optimization problems. In performing the AQC, different configurations of the Hamiltonian path could lead to dramatic differences in the computation efficiency. It is thus crucial to configure the Hamiltonian path to optimize the computation performance of AQC. Here we apply a reinforcement learning approach to configure AQC for integer programming, where we find the learning process automatically converges to a quantum algorithm that exhibits scaling advantage over the trivial AQC using a linear Hamiltonian path. This reinforcement-learning-based approach for quantum adiabatic algorithm design for integer programming can well be adapted to the quantum resources in different quantum computation devices, due to its built-in flexibility.
Secure Multi-Party Computation (MPC) is a promising privacy-preserving technology to enable multiple trustless parties to compute a function jointly without revealing private inputs to each other. With the fast develo...
详细信息
ISBN:
(纸本)9781728125848
Secure Multi-Party Computation (MPC) is a promising privacy-preserving technology to enable multiple trustless parties to compute a function jointly without revealing private inputs to each other. With the fast development of MPC protocols, software implementation, and underlying computation infrastructure, MPC has developed from purely theoretical interest to tangible platform implementations for real-world applications. In this paper, we investigate multiple mechanisms to design efficient MPC algorithms by avoiding costly MPC operations and leveraging parallel operations. In order to speed up database table searching, a machine learning-based approach is proposed to completely avoid equality-check operations, playing the trade-off between efficiency and accuracy. According to our experimental results, a well-designed MPC algorithm could improve performance and scalability significantly, and thus make MPC technology practicable.
Non-line-of-sight (NLOS) propagation, which widely exists in wireless systems, will degrade the performance of wireless positioning system if it is not taken into consideration in the localization algorithm design. Th...
详细信息
ISBN:
(纸本)9781479966653
Non-line-of-sight (NLOS) propagation, which widely exists in wireless systems, will degrade the performance of wireless positioning system if it is not taken into consideration in the localization algorithm design. The 3rd Generation Partnership Project (3GPP) suggests that the probabilities of line-of-sight (LOS) and NLOS are related to the distance between the receiver and the transmitter. In this paper, we propose a Maximum Likelihood Estimator (MLE) for localization, which incorporates the distance dependent LOS/NLOS probabilities. Then, the position error bound is derived using Cramer-Rao Lower Bound (CRLB). Through numerical analysis, the impact of NLOS propagation on the position error bound is evaluated. The performance of our proposed algorithm is verified by real world experimental data.
Cloud radio access network (C-RAN) is a new concept of network architecture, which brings a technical revolution into the wireless communication market and leads to some kind of all new mode of the future wireless com...
详细信息
ISBN:
(纸本)9781479944811
Cloud radio access network (C-RAN) is a new concept of network architecture, which brings a technical revolution into the wireless communication market and leads to some kind of all new mode of the future wireless communications. In this paper the clustering algorithm based on multi-objective optimization is investigated. The proposed algorithm aims at maximizing the throughput contribution of the Remote RF Head (RRH) to the whole system and minimizing its total power consumption with guaranteed energy efficiency of RRH. Using the novel greedy dynamic clustering algorithm, the joint capacity of RRHs is improved. The throughput of each RRH is first given using the pricing mechanism and the Pascoletti and Serafini Scalarization method is then implemented to solve the multi-objective optimization problem. Finally, the performance of the algorithm is assessed by the simulation results. It is shown that the novel dynamic clustering algorithm based on multi-objective optimization in the C-RAN architecture outperforms the traditional greedy clustering approach.
This paper deals with iterative formation control problems for multi-agent systems with switching topologies. Our approach combines consensus protocol algorithms conducted with an iterative learning control update. Th...
详细信息
ISBN:
(纸本)9781479917730
This paper deals with iterative formation control problems for multi-agent systems with switching topologies. Our approach combines consensus protocol algorithms conducted with an iterative learning control update. This leads to networks dynamically changing with evolution along two directions: a finite time axis and an infinite iteration axis. A distributed algorithm is constructed based on nearest neighbor information, and its convergence is established via a Roesser system-based two-dimensional approach. It is shown that a desired relative formation between agents can be achieved along a finite time trajectory if and only if the union of the interaction graphs between the agents over iteration intervals of finite length has a spanning tree for every time step. Simulations are included to illustrate the effectiveness of the derived results.
For the network security problem, this paper proposes a kind of loose security protocol algorithm. The protocol includes two parts: authentication and encryption, which are respectively used for authentication and enc...
详细信息
For the network security problem, this paper proposes a kind of loose security protocol algorithm. The protocol includes two parts: authentication and encryption, which are respectively used for authentication and encryption for the network applications. This paper also adopts OPNET to customize the application modeling method in order to analyze the network performance of the protocol algorithm. The simulation shows that, after analysis and optimization of the algorithm performance through customizing the application model by using OPNET in the design of the loose security protocol algorithm, the algorithm performance has a significant improvement.
暂无评论