期刊文献+
共找到1,511篇文章
< 1 2 76 >
每页显示 20 50 100
Identities on q-Harmonic Numbers
1
作者 Mengxiao Zhou Haitao Jin Huanhuan Zheng 《Journal of Applied Mathematics and Physics》 2024年第5期1796-1803,共8页
With the help of the classical Abel’s lemma on summation by parts and algorithm of q-hypergeometric summations, we deal with the summation, which can be written as multiplication of a q-hypergeometric term and q-harm... With the help of the classical Abel’s lemma on summation by parts and algorithm of q-hypergeometric summations, we deal with the summation, which can be written as multiplication of a q-hypergeometric term and q-harmonic numbers. This enables us to construct and prove identities on q-harmonic numbers. Several examples are also given. 展开更多
关键词 Harmonic numbers q-Zeilberger algorithm Abel’s Lemma
下载PDF
A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform
2
作者 Peter Awonnatemi Agbedemnab Mohammed Akolgo Moses Apambila Agebure 《Journal of Information Security》 2023年第4期422-436,共15页
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen... Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes. 展开更多
关键词 Discrete Wavelet Transform (DWT) Digital Watermarking ENCRYPTION Genetic algorithm (GA) Residue number System (RNS) GARN
下载PDF
Collatz Conjecture Redefinition on Prime Numbers
3
作者 Ramon Carbó-Dorca 《Journal of Applied Mathematics and Physics》 2023年第1期147-157,共11页
The definition of Collatz Operator, the mathematical avatar of the Collatz Algorithm, permits the transformation of the Collatz conjecture, which is delineated over the whole natural number set, into an equivalent inf... The definition of Collatz Operator, the mathematical avatar of the Collatz Algorithm, permits the transformation of the Collatz conjecture, which is delineated over the whole natural number set, into an equivalent inference restricted to the odd prime number set only. Based on this redefinition, one can describe an empirical-heuristic proof of the Collatz conjecture. 展开更多
关键词 natural numbers Prime numbers Pseudospaces Collatz Conjecture Collatz algorithm Collatz Operator Collatz Compliance Syracuse algorithm
下载PDF
Ensuring Quality of Random Numbers from TRNG: Design and Evaluation of Post-Processing Using Genetic Algorithm
4
作者 Jose J. Mijares Chan Parimala Thulasiraman +1 位作者 Gabriel Thomas Ruppa Thulasiram 《Journal of Computer and Communications》 2016年第4期73-92,共20页
Random numbers generated by pseudo-random and true random number generators (TRNG) are used in a wide variety of important applications. A TRNG relies on a non-deterministic source to sample random numbers. In this pa... Random numbers generated by pseudo-random and true random number generators (TRNG) are used in a wide variety of important applications. A TRNG relies on a non-deterministic source to sample random numbers. In this paper, we improve the post-processing stage of TRNGs using a heuristic evolutionary algorithm. Our post-processing algorithm decomposes the problem of improving the quality of random numbers into two phases: (i) Exact Histogram Equalization: it modifies the random numbers distribution with a specified output distribution;(ii) Stationarity Enforcement: using genetic algorithms, the output of (ii) is permuted until the random numbers meet wide-sense stationarity. We ensure that the quality of the numbers generated from the genetic algorithm is within a specified level of error defined by the user. We parallelize the genetic algorithm for improved performance. The post-processing is based on the power spectral density of the generated numbers used as a metric. We propose guideline parameters for the evolutionary algorithm to ensure fast convergence, within the first 100 generations, with a standard deviation over the specified quality level of less than 0.45. We also include a TestU01 evaluation over the random numbers generated. 展开更多
关键词 True Random number Generators Genetic algorithms Auto-Correlation ENTROPY Power Spectral Density
下载PDF
An NC Algorithm for Sorting Real Numbers in <em>O</em>(nlogn/√<span style="font-size: 14px;font-weight: bold;margin-left:-2px;margin-right:2px;border-top:2px solid black;">loglogn</span>) Operations
5
作者 Yijie Han Sneha Mishra Md Usman Gani Syed 《Open Journal of Applied Sciences》 2019年第5期403-408,共6页
We apply the recent important result of serial sorting of n real numbers in time to the design of a parallel algorithm for sorting real numbers in time and operations. This is the first NC algorithm known to take oper... We apply the recent important result of serial sorting of n real numbers in time to the design of a parallel algorithm for sorting real numbers in time and operations. This is the first NC algorithm known to take operations for sorting real numbers. 展开更多
关键词 Parallel algorithms SORTING Sort Real numbers Complexity
下载PDF
Diversity of Pareto front: A multiobjective genetic algorithm based on dominating information 被引量:1
6
作者 Wei CHEN 1 , Jingyu YAN 2 , Mei CHEN 1 , Xin LI 1 (1.Department of Automation, Hefei University of Technology, Hefei Anhui 230009, China 2.Department of Mechanical and Automation Engineering, the Chinese University of Hong Kong, Hong Kong, China) 《控制理论与应用(英文版)》 EI 2010年第2期222-228,共7页
In this paper, the diversity information included by dominating number is analyzed, and the probabilistic relationship between dominating number and diversity in the space of objective function is proved. A ranking me... In this paper, the diversity information included by dominating number is analyzed, and the probabilistic relationship between dominating number and diversity in the space of objective function is proved. A ranking method based on dominating number is proposed to build the Pareto front. Without increasing basic Pareto method’s computation complexity and introducing new parameters, a new multiobjective genetic algorithm based on proposed ranking method (MOGA-DN) is presented. Simulation results on function optimization and parameters optimization of control system verify the efficiency of MOGA-DN. 展开更多
关键词 Dominating number Ranking method MULTIOBJECTIVE Genetic algorithm
下载PDF
A two-grid algorithm based on Newton iteration for the stream function form of the Navier-Stokes equations 被引量:1
7
作者 SHAO Xin-ping HAN Dan-fu 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2011年第3期368-378,共11页
In this paper, we propose a two-grid algorithm for solving the stream function formulation of the stationary Navies-Stokes equations. The algorithm is constructed by reducing the original system to one small, nonlinea... In this paper, we propose a two-grid algorithm for solving the stream function formulation of the stationary Navies-Stokes equations. The algorithm is constructed by reducing the original system to one small, nonlinear system on the coarse mesh space and two similar linear systems (with same stiffness matrix but different right-hand side) on the fine mesh space. The convergence analysis and error estimation of the algorithm are given for the case of conforming elements. Furthermore, the Mgorithm produces a numerical solution with the optimal asymptotic H^2-error. Finally, we give a numerical illustration to demonstrate the effectiveness of the two-grid algorithm for solving the Navier-Stokes equations. 展开更多
关键词 Two-grid algorithm navier-Stokes equations Stream function form Reynolds number Newton iteration.
下载PDF
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation 被引量:1
8
作者 Protais Ndagijimana Fulgence Nahayo +2 位作者 Marc Kokou Assogba Adoté François-Xavier Ametepe Juma Shabani 《Journal of Information Security》 2020年第3期149-160,共12页
The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the br... The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography. 展开更多
关键词 Thermal Noise True Random numbers algorithm Post-Quantum Cryptography
下载PDF
A New Evolutionary Algorithm Based on the Decimal Coding
9
作者 Dong Wen-yong, Li Yuan-xiang, Zheng Bo-jin, Zen San-you, Zhang Jin-bo State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072,Hubei, China 《Wuhan University Journal of Natural Sciences》 CAS 2002年第2期150-156,共7页
Traditional Evolutionary Algorithm (EAs) is based on the binary code, real number code, structure code and so on. But these coding strategies have their own advantages and disadvantages for the optimization of functio... Traditional Evolutionary Algorithm (EAs) is based on the binary code, real number code, structure code and so on. But these coding strategies have their own advantages and disadvantages for the optimization of functions. In this paper a new Decimal Coding Strategy (DCS), which is convenient for space division and alterable precision, was proposed, and the theory analysis of its implicit parallelism and convergence was also discussed. We also redesign several genetic operators for the decimal code. In order to utilize the historial information of the existing individuals in the process of evolution and avoid repeated exploring, the strategies of space shrinking and precision alterable, are adopted. Finally, the evolutionary algorithm based on decimal coding (DCEAs) was applied to the optimization of functions, the optimization of parameter, mixed-integer nonlinear programming. Comparison with traditional GAs was made and the experimental results show that the performances of DCEAS are better than the tradition GAs. 展开更多
关键词 evolutionary algorithm function optimize genetic algorithm decimal coding CLC number TP 301.6
下载PDF
A Novel Power Optimization Method by Minimum Comparator Number Algorithm for Pipeline ADCs 被引量:1
10
作者 宁宁 吴霜毅 +1 位作者 王向展 杨谟华 《Journal of Electronic Science and Technology of China》 2007年第1期75-80,共6页
The effects of stage numbers on power dissipation of pipeline analog-to-digital converter (ADC) are studied and a novel design method aiming for power optimization is presented. In this method, a minimum comparator ... The effects of stage numbers on power dissipation of pipeline analog-to-digital converter (ADC) are studied and a novel design method aiming for power optimization is presented. In this method, a minimum comparator number algorithm (MCNA) is first introduced, and then the optimum distribution of resolutions through pipeline ADC stages is deduced by MCNA. Based on the optimum stage-resolution distribution, an optimization method is established, which examines the precise function between ADC power and stage resolutions with a parameter of power ratio (Rp). For 10-bit pipeline ADC with scaling down technology, the simulation results by using MATLAB CAD tools show that an eight-stage topology with 1-bit RSD correction achieves the power optimization indicated by the power reduction ratio. 展开更多
关键词 minimum comparator number algorithm pipeline analog-to-digital converter power dissipation scaling down stage resolution
下载PDF
Study on Prediction Model of Number of Rainstorm Days in Summer Based on C5.0 Decision Tree Algorithm
11
作者 Shi Yimin Chen Weiwei Zhu Yunfeng 《Meteorological and Environmental Research》 CAS 2019年第2期56-60,共5页
Based on the data of daily precipitation in Lianyungang area from 1951 to 2012 and various climate signal data from the National Climate Center website and the NOAA website,a model for predicting whether the number of... Based on the data of daily precipitation in Lianyungang area from 1951 to 2012 and various climate signal data from the National Climate Center website and the NOAA website,a model for predicting whether the number of rainstorm days in summer in Lianyungang area is large was established by the classical C5. 0 decision tree algorithm. The data samples in 48 years( accounting for about 80% of total number of samples)was as the training set of a model,and the training accuracy rate of the model was 95. 83%. The data samples in the remaining 14 years( accounting for about 20% of total number of samples) were used as the test set of the model to test the model,and the test accuracy of the model was 85. 71%. The results showed that the prediction model of number of rainstorm days in summer constructed by C5. 0 algorithm had high accuracy and was easy to explain. Moreover,it is convenient for meteorological staff to use directly. At the same time,this study provides a new idea for short-term climate prediction of number of rainstorm days in summer. 展开更多
关键词 C5. 0 algorithm number of RAINSTORM DAYS PREDICTION model
下载PDF
Convergence analysis of a nonlinear Lagrange algorithm for general nonlinear constrained optimization problems
12
作者 HE Su-xiang WU Li-xun 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2014年第3期352-366,共15页
The convergence analysis of a nonlinear Lagrange algorithm for solving nonlinear constrained optimization problems with both inequality and equality constraints is explored in detail. The estimates for the derivatives... The convergence analysis of a nonlinear Lagrange algorithm for solving nonlinear constrained optimization problems with both inequality and equality constraints is explored in detail. The estimates for the derivatives of the multiplier mapping and the solution mapping of the proposed algorithm are discussed via the technique of the singular value decomposition of matrix. Based on the estimates, the local convergence results and the rate of convergence of the algorithm are presented when the penalty parameter is less than a threshold under a set of suitable conditions on problem functions. Furthermore, the condition number of the Hessian of the nonlinear Lagrange function with respect to the decision variables is analyzed, which is closely related to efficiency of the algorithm. Finally, the preliminary numericM results for several typical test problems are reported. 展开更多
关键词 nonlinear Lagrange algorithm general nonlinear constrained optimization problem solutionmapping multiplier mapping condition number.
下载PDF
Development of New Method for Generating Prime Numbers
13
作者 Seidikassym Baibekov Serik Altynbek 《Natural Science》 2015年第8期416-423,共8页
The article is devoted to actual problems of prime numbers. A theorem that allows generating a sequence of prime numbers is proposed. An algorithm for generating prime numbers has been developed. A comparison of the p... The article is devoted to actual problems of prime numbers. A theorem that allows generating a sequence of prime numbers is proposed. An algorithm for generating prime numbers has been developed. A comparison of the proposed theorem, with Wilson’s theorem is also provided. 展开更多
关键词 PRIME numbers THEOREM algorithm Method PRIME TWINS Generation
下载PDF
Performance Evaluation and Analysis of Switching Algorithms in MIMO-OFDM System with Ideal and Non-Ideal CSI
14
作者 Yosra Mlayeh Fethi Tlili +2 位作者 Fatma Rouissi Ilham Ouachani Adel Ghazel 《International Journal of Communications, Network and System Sciences》 2010年第12期945-953,共9页
In this paper we analyzed the bit error rate performance of a switching algorithm between spatial multiplex-ing and diversity for an OFDM MIMO system with ideal channel state information. The effect of channel estimat... In this paper we analyzed the bit error rate performance of a switching algorithm between spatial multiplex-ing and diversity for an OFDM MIMO system with ideal channel state information. The effect of channel estimation error was studied and we verified by simulations that the spatial multiplexing outperforms the switching algorithm. Given that the switching algorithm is based on the comparison of the channel matrix Demmel condition number to a threshold, its accuracy is compromised when channel estimation error in-creases. As a first intuitive solution, we proceeded to the adaptation of the threshold, but this didn’t lead to a pertinent improvement for the main reason that channel estimation errors did affect the MIMO techniques which use different constellation. Based on that, we proposed a new estimation technique that improved the bit error rate performance significantly. 展开更多
关键词 MIMO Diversity Spatial MULTIPLEXING OFDM Demmel Condition number SWITCHING algorithm Channel Estimation
下载PDF
There Are Infinitely Many Mersnne Composite Numbers with Prime Exponents
15
作者 Fengsui Liu 《Advances in Pure Mathematics》 2018年第7期687-698,共12页
By extending both arithmetical operations into finite sets of natural numbers, from the entire set of natural numbers successively deleting some residue classes modulo a prime, we invented a recursive sieve method or ... By extending both arithmetical operations into finite sets of natural numbers, from the entire set of natural numbers successively deleting some residue classes modulo a prime, we invented a recursive sieve method or algorithm on natural numbers and their sets. The algorithm mechanically yields a sequence of sets, which converges to the set of all primes p such that 2p + 1 divides the Mersenne number Mp. The cardinal sequence corresponding to the sequence of sets is strictly increasing. So that we have captured enough usable structures, without any estimation, the existing theories of those structures allow us to prove an exact result: there are infinitely many Mersenne composite numbers with prime exponents Mp. 展开更多
关键词 Mersenne Composite numbers Sophie German PRIMES RECURSIVE algorithm Order Topology Limit of Sequence of Sets
下载PDF
On Iterative Algorithm and Perturbation Analysis for the Nonlinear Matrix Equation
16
作者 Chacha Stephen Chacha 《Communications on Applied Mathematics and Computation》 2022年第3期1158-1174,共17页
In this study,an iterative algorithm is proposed to solve the nonlinear matrix equation X+A∗eXA=In.Explicit expressions for mixed and componentwise condition numbers with their upper bounds are derived to measure the ... In this study,an iterative algorithm is proposed to solve the nonlinear matrix equation X+A∗eXA=In.Explicit expressions for mixed and componentwise condition numbers with their upper bounds are derived to measure the sensitivity of the considered nonlinear matrix equation.Comparative analysis for the derived condition numbers and the proposed algorithm are presented.The proposed iterative algorithm reduces the number of iterations significantly when incorporated with exact line searches.Componentwise condition number seems more reliable to detect the sensitivity of the considered equation than mixed condition number as validated by numerical examples. 展开更多
关键词 Mixed condition number Componentwise condition number Iterative algorithm Perturbation analysis Exact line search
下载PDF
Modeling and Validation of Base Pressure for Aerodynamic Vehicles Based on Machine Learning Models
17
作者 Jaimon Dennis Quadros Sher Afghan Khan +1 位作者 Abdul Aabid Muneer Baig 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第12期2331-2352,共22页
The application of abruptly enlarged flows to adjust the drag of aerodynamic vehicles using machine learning models has not been investigated previously.The process variables(Mach number(M),nozzle pressure ratio(η),a... The application of abruptly enlarged flows to adjust the drag of aerodynamic vehicles using machine learning models has not been investigated previously.The process variables(Mach number(M),nozzle pressure ratio(η),area ratio(α),and length to diameter ratio(γ))were numerically explored to address several aspects of this process,namely base pressure(β)and base pressure with cavity(βcav).In this work,the optimal base pressure is determined using the PCA-BAS-ENN based algorithm to modify the base pressure presetting accuracy,thereby regulating the base drag required for smooth flow of aerodynamic vehicles.Based on the identical dataset,the GA-BP and PSO-BP algorithms are also compared to thePCA-BAS-ENNalgorithm.The data for training and testing the algorithmswas derived using the regression equation developed using the Box-Behnken Design(BBD).The results show that the PCA-BAS-ENN model delivered highly accurate predictions when compared to the other two models.As a result,the advantages of these results are two-fold,providing:(i)a detailed examination of the efficiency of different neural network algorithms in dealing with a genuine aerodynamic problem,and(ii)helpful insights for regulating process variables to improve technological,operational,and financial factors,simultaneously. 展开更多
关键词 High speed flow Mach number machine learning PCA-BAS-ENN algorithm
下载PDF
Floyd-Warshall Algorithm Based on Picture Fuzzy Information
18
作者 Shaista Habib Aqsa Majeed +1 位作者 Muhammad Akram Mohammed M.Ali Al-Shamiri 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第9期2873-2894,共22页
The Floyd-Warshall algorithm is frequently used to determine the shortest path between any pair of nodes.It works well for crisp weights,but the problem arises when weights are vague and uncertain.Let us take an examp... The Floyd-Warshall algorithm is frequently used to determine the shortest path between any pair of nodes.It works well for crisp weights,but the problem arises when weights are vague and uncertain.Let us take an example of computer networks,where the chosen path might no longer be appropriate due to rapid changes in network conditions.The optimal path from among all possible courses is chosen in computer networks based on a variety of parameters.In this paper,we design a new variant of the Floyd-Warshall algorithm that identifies an All-Pair Shortest Path(APSP)in an uncertain situation of a network.In the proposed methodology,multiple criteria and theirmutual associationmay involve the selection of any suitable path between any two node points,and the values of these criteria may change due to an uncertain environment.We use trapezoidal picture fuzzy addition,score,and accuracy functions to find APSP.We compute the time complexity of this algorithm and contrast it with the traditional Floyd-Warshall algorithm and fuzzy Floyd-Warshall algorithm. 展开更多
关键词 Trapezoidal picture fuzzy number score function accuracy function shortest path problem Floyd-Warshall algorithm
下载PDF
Bayes-Q-Learning Algorithm in Edge Computing for Waste Tracking
19
作者 D.Palanikkumar R.Ramesh Kumar +2 位作者 Mehedi Masud Mrim M.Alnfiai Mohamed Abouhawwash 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2425-2440,共16页
The major environmental hazard in this pandemic is the unhygienic dis-posal of medical waste.Medical wastage is not properly managed it will become a hazard to the environment and humans.Managing medical wastage is a ... The major environmental hazard in this pandemic is the unhygienic dis-posal of medical waste.Medical wastage is not properly managed it will become a hazard to the environment and humans.Managing medical wastage is a major issue in the city,municipalities in the aspects of the environment,and logistics.An efficient supply chain with edge computing technology is used in managing medical waste.The supply chain operations include processing of waste collec-tion,transportation,and disposal of waste.Many research works have been applied to improve the management of wastage.The main issues in the existing techniques are ineffective and expensive and centralized edge computing which leads to failure in providing security,trustworthiness,and transparency.To over-come these issues,in this paper we implement an efficient Naive Bayes classifier algorithm and Q-Learning algorithm in decentralized edge computing technology with a binary bat optimization algorithm(NBQ-BBOA).This proposed work is used to track,detect,and manage medical waste.To minimize the transferring cost of medical wastage from various nodes,the Q-Learning algorithm is used.The accuracy obtained for the Naïve Bayes algorithm is 88%,the Q-Learning algo-rithm is 82%and NBQ-BBOA is 98%.The error rate of Root Mean Square Error(RMSE)and Mean Error(MAE)for the proposed work NBQ-BBOA are 0.012 and 0.045. 展开更多
关键词 Binary bat algorithm naïve bayes supply chain EDGE medical wastage
下载PDF
Navigating the Quantum Threat Landscape: Addressing Classical Cybersecurity Challenges
20
作者 Sabina Sokol 《Journal of Quantum Information Science》 2023年第2期56-77,共22页
This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are dis... This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are discussed, along with quantum vulnerabilities in public key infrastructure and symmetric cryptographic algorithms. Other relevant non-encryption-specific areas within cybersecurity are similarly raised. The evolution and expansion of cyberwarfare as well as new developments in cyber defense beyond post-quantum cryptography and quantum key distribution are subsequently explored, with an emphasis on public and private sector awareness and vigilance in maintaining strong security posture. 展开更多
关键词 Quantum Computing Post-Quantum Cryptography (PQC) Quantum Hacking CYBERSECURITY Internet of Things (IoT) Shor’s algorithm Quantum Random number Generators (QRNGs) Pseudorandom number Generators (RNGs) Quantum Key Distribution (QKD) Symmetric Key Cryp-tography Asymmetric Key Cryptography
下载PDF
上一页 1 2 76 下一页 到第
使用帮助 返回顶部