Niching techniques diversify the population of evolutionary algorithms, encouraging heterogeneous convergence to multiple optima. The key to an effective diversification is identifying the similarity among individuals...
详细信息
Niching techniques diversify the population of evolutionary algorithms, encouraging heterogeneous convergence to multiple optima. The key to an effective diversification is identifying the similarity among individuals. With no prior knowledge of the fitness landscapes, it is usually determined by uninformative assumptions on the number of peaks. We propose a method to estimate the sharing distance and the corresponding population size. Using the probably approximately correct (PAC) learning theory and the e-cover concept, we derive the PAC neighbor distance of a local optimum. Within this neighborhood, uniform samples are drawn and we compute the subspace fitness distance correlation (FDC) coefficients. An algorithm is developed to estimate the granularity feature of the fitness landscapes. The sharing distance is determined from the granularity feature and furthermore, the population size is decided. Experiments demonstrate that by using the estimated population size and sharing distance an evolutionary algorithm (EA) correctly identifies multiple optima.
A method is proposed for harnessing of human power based on children's play in playground and public places, on devices such as the seesaw, merry-go-round and swing. When large numbers of children play in a playgr...
详细信息
A method is proposed for harnessing of human power based on children's play in playground and public places, on devices such as the seesaw, merry-go-round and swing. When large numbers of children play in a playground, part of the power of their play can be usefully harnessed resulting in significant energy storage. This stored energy can then be converted to electricity for powering basic, low-power appliances such as lights, fans, communications equipment, and so on. The method provides a low-cost, low-resource means of generation of electricity, especially for use in developing countries. The paper discusses the basic theory behind the method. Results of experiments on a laboratory prototype compressed air human power conversion system using a teeter-totter are presented to illustrate the practical effectiveness of the proposed method.
We initiate the study of the computational complexity of the covering radius problem for point lattices, and approximation versions of the problem for both lattices and linear codes. We also investigate the computatio...
详细信息
We initiate the study of the computational complexity of the covering radius problem for point lattices, and approximation versions of the problem for both lattices and linear codes. We also investigate the computational complexity of the shortest linearly independent vectors problem, and its relation to the covering radius problem for lattices. For the covering radius on n-dimensional lattices, we show that the problem can be approximated within any constant factor /spl gamma/(n) > 1 in random exponential time 2/sup O(n)/, it is in AM for /spl gamma/(n) = 2, in coAM for /spl gamma/(n) = /spl radic/(n log n), and in NP /spl cap/ coNP for /spl gamma/(n) = /spl radic/n. For the covering radius on n-dimensional linear codes, we show that the problem can be solved in deterministic polynomial time for approximation factor /spl gamma/(n) = log n, but cannot be solved in polynomial time for some /spl gamma/(n) = /spl Omega/(log log n) unless NP can be simulated in deterministic n/sup O(log log log n)/ time. Moreover, we prove that the problem is NP-hard for every constant approximation factor, it is /spl Pi//sub 2/-hard for some constant approximation factor, and it is in AM for approximation factor 2. So, it is unlikely to be /spl Pi//sub 2/-hard for approximation factors larger than 2. This is a natural hardness of approximation result in the polynomial hierarchy. For the shortest independent vectors problem, we give a coAM protocol achieving approximation factor /spl gamma/(n) = /spl radic/(n/log n), solving an open problem of Blomer and Seifert (1999), and prove that the problem is also in coNP for /spl gamma/(n) = /spl radic/n. Both results are obtained by giving a gap-preserving nondeterministic polynomial time reduction to the closest vector problem.
The cover picture shows an STM tip measuring the network conductance of a nanosized network built from molecular conductors using programmed self-assembly; a dramatic illustration of the potential of nanoelectronics. ...
详细信息
The cover picture shows an STM tip measuring the network conductance of a nanosized network built from molecular conductors using programmed self-assembly; a dramatic illustration of the potential of nanoelectronics. Gold nanoparticles are attached to a modified cowpea mosaic virus scaffold. The particles can then be interconnected using thiol-terminated organic molecules, which act as molecular wires. For more information, please read the Communication "An Engineered Virus as a Scaffold for Three-Dimensional Self-Assembly on the Nanoscale" by A. S. Blum and co-workers on page 702 ff.
We show that solving modular linear equation on the average is at least as hard as approximating several lattice problems in the worst case within a factor almost linear in the rank of the lattice. The lattice problem...
详细信息
We show that solving modular linear equation on the average is at least as hard as approximating several lattice problems in the worst case within a factor almost linear in the rank of the lattice. The lattice problems we consider are the shortest vector problem, the shortest independent vectors problem and the covering radius problem. The approximation factor we obtain is O(n) for all three problems. This greatly improves on all previous work on the subject starting from Ajtai's seminal paper (STOC, 1996), up to the strongest previously known results by Micciancio (STOC, 2002). Our results also bring us closer to the limit where the problems are no longer known to be in NP /spl cap/ coNP. Our main tools are Gaussian measures on lattices and the high dimensional Fourier transform. We start by defining a new lattice parameter which determines the amount of Gaussian noise that one has to add to a lattice in order to get close to a uniform distribution, in addition to yielding quantitatively much stronger results, the use of this parameter allows us to simplify many of the complications in previous work. Our technical contributions are two-fold. First, we show tight connections between this new parameter and existing lattice parameters. One such important connection is between this parameter and the length of the shortest set of linearly independent vectors. Second, we prove that the distribution that one obtains after adding Gaussian noise to the lattice has the following interesting property: the distribution of the noise vector when conditioning on the final value behaves in many respects like the original Gaussian noise vector. In particular, its moments remain essentially unchanged.
Constraints are an important aspect of role-based access control (RBAC). Constraints have to be satisfied when an administrator wants to assign (revoke) a role to a user or a permission to a role. The importance of co...
详细信息
Summary form only given. Clustering is an architectural technique that allows the design of wide superscalar processors without sacrificing cycle time, but at the cost of longer communication latencies. Simultaneous m...
详细信息
Summary form only given. Clustering is an architectural technique that allows the design of wide superscalar processors without sacrificing cycle time, but at the cost of longer communication latencies. Simultaneous multithreading architectures effectively tolerate instruction latency, but put even more pressure on timing-critical processor resources. We show that the synergistic combination of the two techniques minimizes the IPC impact of the clustered architecture, and even permits more aggressive clustering of the processor than is possible with a single-threaded processor. Additionally, we show that multithreading enables effective instruction steering policies unavailable to a single-threaded clustered architecture. We explore the impact of aggressively clustering four complex processor structures, (1) instruction window wakeup and functional unit bypass logic, (2) register renaming logic, (3) the fetch unit, and (4) the integer register file, on a simultaneous multithreading processor.
We present the design of the Web Stream Customizer Architecture, the basis for a middleware system that supports customization of Web content and streams. Our notion of customization is quite general, including functi...
详细信息
We present the design of the Web Stream Customizer Architecture, the basis for a middleware system that supports customization of Web content and streams. Our notion of customization is quite general, including functions such as mtering, remote buffering, remote caching, flow regulation (e.g., for video playback), compression, and encryption, all of which are especially valuable for wireless resource· limited clients, which are a primary target of support. The system is highly deployable, as it works entirely within the Web's common programming and communication frameworks, such as using HTTP and relying solely on standard proxy mechanisms, and therefore does not require any changes to existing Web servers and browsers.
The discovery of novel non-coding RNAs has been among the most exciting recent developments in biology. Yet, many more remain undiscovered. It has been hypothesized that there is in fact an abundance of functional non...
详细信息
The discovery of novel non-coding RNAs has been among the most exciting recent developments in biology. Yet, many more remain undiscovered. It has been hypothesized that there is in fact an abundance of functional non-coding RNA (ncRNA) with various catalytic and regulatory junctions. Computational methods tailored specifically for ncRNA are being actively developed. As the inherent signal for ncRNA is weaker than that for protein coding genes, comparative methods offer the most promising approach, and are the subject of our research. We consider the following problem: Given an RNA sequence with a known secondary structure, efficiently compute all structural homologs (computed as a function of sequence and structural similarity) in a genomic database. Our approach, based on structural filters that eliminate a large portion of the database, while retaining the true homologs allows us to search a typical bacterial database in minutes on a standard PC, with high sensitivity and specificity. This is two orders of magnitude better than current available software for the problem.
暂无评论