Bent functions are functions that have the biggest distance from all linear binary functions. Attacks against cryptosystems can be defeated when these systems use bent functions. Generalisation of bent functions is st...
详细信息
ISBN:
(数字)9781728171432
ISBN:
(纸本)9781728171449
Bent functions are functions that have the biggest distance from all linear binary functions. Attacks against cryptosystems can be defeated when these systems use bent functions. Generalisation of bent functions is still unknown and when they have many variables, it is very difficult to find them. Therefore, the construction of bent functions is done by using discovery of them within a subset of functions. Thus, this paper describes a method for creating groups of functions in Reed-Muller (RM) domain within which efficient detection of bent functions is performed. As follows, the search space for discovery is limited, and it can be defined for various subsets of Boolean functions. Experimental results confirm that the time required for discovery of bent function when using RM subsets are smaller than when using general random discovery.
The Nearest Neighbors search is a widely used technique with applications on several classification problems. Particularly, the k-nearest neighbor (kNN) algorithm is a well-known method used in modern information retr...
详细信息
ISBN:
(数字)9781728183282
ISBN:
(纸本)9781728183299
The Nearest Neighbors search is a widely used technique with applications on several classification problems. Particularly, the k-nearest neighbor (kNN) algorithm is a well-known method used in modern information retrieval systems aiming to obtain relevant objects based on their similarity to a given query object. Although algorithms based on an exhaustive search have proven to be effective for the kNN classification, their main drawback is their high computational complexity, especially with high-dimensional data. In this work, we present a novel and parallel algorithm to solve kNN queries on a multi-GPU platform. The proposed method is comprised of two stages, which first is based on pivots using the value of K to reduce the search space, and the second one uses a set of heaps to return the final results. Experimental results showed that using between 1-4 GPUs, the proposed algorithm achieves speed-ups of 117x, 224x, 330x, and 389x, respectively. Besides, the obtained results were compared with previous approaches of the state-of-the-art (cp-select and CUB Library), evidencing the superiority of our proposal.
With the gradual increase of the penetration rate of new energy, the cyber physical system paves a new way for real time dispatch, rational planning and effective utilization of new energy. This paper establishes a dy...
详细信息
The following topics are dealt with: learning (artificial intelligence); optimisation; feature extraction; genetic algorithms; medical robotics; signal processing; particle swarm optimisation; data acquisition; medica...
详细信息
ISBN:
(数字)9781728131498
ISBN:
(纸本)9781728131504
The following topics are dealt with: learning (artificial intelligence); optimisation; feature extraction; genetic algorithms; medical robotics; signal processing; particle swarm optimisation; data acquisition; medical signal processing; neural nets.
We present a parallel algorithm (EREW PRAM algorithm) for linked lists contraction. We show that when we contract a linked list from size n to size n/c for a suitable constant c we can pack the linked list into an arr...
详细信息
Time performance improvement of the pattern matching mainly lies in reducing the times of character comparisons in each round of matching and increasing the distance that the text string matching window skips to the r...
详细信息
ISBN:
(数字)9781728188119
ISBN:
(纸本)9781728188126
Time performance improvement of the pattern matching mainly lies in reducing the times of character comparisons in each round of matching and increasing the distance that the text string matching window skips to the right when mismatching happens. Based on the above ideas, an improved algorithm based on the combination of word frequency and SHIFT-AND and BMHS2 is proposed. The improved algorithm first uses word frequency matching in each round of matching to reduce the times of character comparisons in matching window. Then, in order to improve the moving distance of the text string matching window when mismatching happens, the BMHS2 and SHIFT-AND algorithms are introduced. Move the text string matching window to the right by the larger skip distance between the SHIFT-AND and BMHS2 algorithms when characters mismatch. The experimental results show that under the same conditions, compared with the SHIFT-AND and BMHS2 algorithms, the improved pattern matching algorithm I_SHIFT-AND_BMHS2 has a certain improvement in matching time performance.
In distributed clustering problems, nodes in a wireless sensor network must learn clusters from the data sensed across the network, without centralising the raw data. This paper presents an asynchronous distributed cl...
详细信息
A lot of progress in computing systems components are devoted today to grant more support for parallelism. This, is likely affording much opportunities for High Performance Computing (HPC) applications developers who ...
详细信息
Pursuit-Evasion Game (PEG) consists of a team of pursuers trying to capture one or more evaders. PEG is important due to its application in surveillance, search and rescue, disaster robotics, boundary defense and so o...
详细信息
ISBN:
(数字)9781728162126
ISBN:
(纸本)9781728162133
Pursuit-Evasion Game (PEG) consists of a team of pursuers trying to capture one or more evaders. PEG is important due to its application in surveillance, search and rescue, disaster robotics, boundary defense and so on. In general, PEG requires exponential time to compute the minimum number of pursuers to capture an evader. To mitigate this, we have designed a parallel optimal algorithm to minimize the capture time in PEG. Given a discrete topology, this algorithm also outputs the minimum number of pursuers to capture an evader. A classic example of PEG is the popular arcade game, Pac-Man. Although Pac-Man topology has almost 300 nodes, our algorithm can handle this. We show that Pac-Man is overkill, i.e., given the Pac-Man game topology, Pac-Man game contains more pursuers/ghosts (four) than it is necessary (two) to capture evader/Pac-man. We evaluate the proposed algorithm on many different topologies.
Background: Sequence comparison and alignment plays an important role in computational biology as they allow for rating the similarities between molecular sequences. Pair-wise alignment contributes significantly in ca...
详细信息
暂无评论