期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Quantum-inspired ant algorithm for knapsack problems 被引量:3
1
作者 Wang Honggang Ma Liang Zhang Huizhen Li Gaoya 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第5期1012-1016,共5页
The knapsack problem is a well-known combinatorial optimization problem which has been proved to be NP-hard. This paper proposes a new algorithm called quantum-inspired ant algorithm (QAA) to solve the knapsack prob... The knapsack problem is a well-known combinatorial optimization problem which has been proved to be NP-hard. This paper proposes a new algorithm called quantum-inspired ant algorithm (QAA) to solve the knapsack problem. QAA takes the advantage of the principles in quantum computing, such as qubit, quantum gate, and quantum superposition of states, to get more probabilistic-based status with small colonies. By updating the pheromone in the ant algorithm and rotating the quantum gate, the algorithm can finally reach the optimal solution. The detailed steps to use QAA are presented, and by solving series of test cases of classical knapsack problems, the effectiveness and generality of the new algorithm are validated. 展开更多
关键词 knapsack problem quantum computing ant algorithm quantum-inspired ant algorithm.
下载PDF
CERTIFICATELESS SIGNATURE AND BLIND SIGNATURE 被引量:13
2
作者 Zhang Lei Zhang Futai 《Journal of Electronics(China)》 2008年第5期629-635,共7页
Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-... Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography(ID-PKC).Due to the advantages of the certificateless public key cryptography,a new efficient certificateless pairing-based signature scheme is presented,which has some advantages over previous constructions in computational cost.Based on this new signature scheme,a certificateless blind signature scheme is proposed.The security of our schemes is proven based on the hardness of computational Diffie-Hellman problem. 展开更多
关键词 Certificateless cryptography Digital signature Blind signature Certificateless blind signature Computational Diffie-Hellman (CDH) problem
下载PDF
PROBLEMS ON COMPUTING SHALLOW WATER CIRCULATION AND SIMULATING THE FLOW PAST ISLANDS IN NEARSHORE WATER
3
作者 ZHANG DIMING CHENG LIANGGUI, Department of Mechanics, Zhongshan University, Guangzhou,P.R. China 《Journal of Hydrodynamics》 SCIE EI CSCD 1989年第1期8-14,共7页
This paper continues discussing the problems of numerically solving the shallow water circulation on the basis of ref. 1, For the numerical method proposed in ref. 1, we applied a storage method with dense matrices, w... This paper continues discussing the problems of numerically solving the shallow water circulation on the basis of ref. 1, For the numerical method proposed in ref. 1, we applied a storage method with dense matrices, which abandoned usual bandwidth concept and attained the intention of saving interior storage, computing time and amount of preparing work before computing. The circulation considered the effect of small islands was successfully simulated by specially dealing with the bottom friction terms and the boundary conditions. In addition, we discussed the action of bottom friction on the dissipation of tidal energy and its effect on stability of period motion. 展开更多
关键词 problems ON computing SHALLOW WATER CIRCULATION AND SIMULATING THE FLOW PAST ISLANDS IN NEARSHORE WATER
原文传递
Clonal Strategy Algorithm Based on the Immune Memory 被引量:7
4
作者 Ruo-Chen Liu Li-Cheng Jiao Hai-Feng Du 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第5期728-734,共7页
Based on the clonal selection theory and immune memory mechanism in the natural immune system, a novel artificial immune system algorithm, Clonal Strategy Algorithm based on the Immune Memory (CSAIM), is proposed in... Based on the clonal selection theory and immune memory mechanism in the natural immune system, a novel artificial immune system algorithm, Clonal Strategy Algorithm based on the Immune Memory (CSAIM), is proposed in this paper. The algorithm realizes the evolution of antibody population and the evolution of memory unit at the same time, and by using clonal selection operator, the global optimal computation can be combined with the local searching. According to antibody-antibody (Ab-Ab) affinity and antibody-antigen (Ab-Ag) affinity, the algorithm can allot adaptively the scales of memory unit and antibody population. It is proved theoretically that CSAIM is convergent with probability 1. And with the computer simulations of eight benchmark functions and one instance of traveling salesman problem (TSP), it is shown that CSAIM has strong abilities in having high convergence speed, enhancing the diversity of the population and avoiding the premature convergence to some extent. 展开更多
关键词 artificial immune system clonal selection immune memory evolutionary computation traveling salesman problem
原文传递
An Optimized Divide-and-Conquer Algorithm for the Closest-Pair Problem in the Planar Case 被引量:3
5
作者 José C.Pereira Fernando G.Lobo 《Journal of Computer Science & Technology》 SCIE EI CSCD 2012年第4期891-896,共6页
We present an engineered version of the divide-and-conquer algorithm for finding the closest pair of points, within a given set of points in the XY-plane. For this version of the algorithm we show that only two pairwi... We present an engineered version of the divide-and-conquer algorithm for finding the closest pair of points, within a given set of points in the XY-plane. For this version of the algorithm we show that only two pairwise comparisons are required in the combine step, for each point that lies in the 25-wide vertical slab. The correctness of the algorithm is shown for all Minkowski distances with p ≥ 1. We also show empirically that, although the time complexity of the algorithm is still O(n lgn), the reduction in the total number of comparisons leads to a significant reduction in the total execution time, for inputs with size sufficiently large. 展开更多
关键词 geometrical problem and computation closest-pair problem Basic-2 algorithm
原文传递
Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing 被引量:2
6
作者 王亮亮 陈克非 +1 位作者 毛贤平 王永涛 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期398-405,共8页
In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencry... In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption (PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE (CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational Dire- Hellman (CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography. 展开更多
关键词 cloud computing secure data sharing proxy re-encryption(PRE) certificateless encryption key escrow computational Diffie-Hellman(CDH) problem random oracle
原文传递
Past review,current progress,and challenges ahead on the cocktail party problem 被引量:3
7
作者 Yan-min QIAN Chao WENG +2 位作者 Xuan-kai CHANG Shuai WANG Dong YU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第1期40-63,共24页
The cocktail party problem,i.e.,tracing and recognizing the speech of a specific speaker when multiple speakers talk simultaneously,is one of the critical problems yet to be solved to enable the wide application of au... The cocktail party problem,i.e.,tracing and recognizing the speech of a specific speaker when multiple speakers talk simultaneously,is one of the critical problems yet to be solved to enable the wide application of automatic speech recognition(ASR) systems.In this overview paper,we review the techniques proposed in the last two decades in attacking this problem.We focus our discussions on the speech separation problem given its central role in the cocktail party environment,and describe the conventional single-channel techniques such as computational auditory scene analysis(CASA),non-negative matrix factorization(NMF) and generative models,the conventional multi-channel techniques such as beamforming and multi-channel blind source separation,and the newly developed deep learning-based techniques,such as deep clustering(DPCL),the deep attractor network(DANet),and permutation invariant training(PIT).We also present techniques developed to improve ASR accuracy and speaker identification in the cocktail party environment.We argue effectively exploiting information in the microphone array,the acoustic training set,and the language itself using a more powerful model.Better optimization ob jective and techniques will be the approach to solving the cocktail party problem. 展开更多
关键词 Cocktail party problem Computational auditory scene analysis Non-negative matrix factorization Permutation invariant training Multi-talker speech processing
原文传递
New Constructions of Identity-Based Threshold Decryption 被引量:1
8
作者 ZHANG Leyou HU Yupu +1 位作者 TIAN Xu'an YANG Yang 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期222-226,共5页
In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive c... In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive chosen cipbertext attack under the computational bilinear Diffie-Hellman (CBDH) problem assumption in the random oracle. The pubic cheekability of ciphertext in the IDTDS is given by simply creating a signed E1Gamal encryption instead of a noninteractive zero-knowledge proof. Furthermore, we introduce a modified verifiable pairing to ensure all decryption shares are consistent. Our scheme is more efficient in verification than the schemes considered previously. 展开更多
关键词 ID-Based threshold decryption verifiable pair computational bilinear Diffie-Hellman (CBDH) problem provable security
原文传递
Constructing pairing-free certificateless public key encryption with keyword search
9
作者 Yang LU Ji-guo LI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第8期1049-1061,共13页
Searchable public key encryption enables a storage server to retrieve the publicly encrypted data without revealing the original data contents.It offers a perfect cryptographic solution to encrypted data retrieval in ... Searchable public key encryption enables a storage server to retrieve the publicly encrypted data without revealing the original data contents.It offers a perfect cryptographic solution to encrypted data retrieval in encrypted data storage systems.Certificateless cryptography(CLC)is a novel cryptographic primitive that has many merits.It overcomes the key escrow problem in identity-based cryptosystems and the cumbersome certificate problem in conventional public key cryptosystems.Motivated by the appealing features of CLC,three certificateless encryption with keyword search(CLEKS)schemes were presented in the literature.However,all of them were constructed with the costly bilinear pairing and thus are not suitable for the devices that have limited computing resources and battery power.So,it is interesting and worthwhile to design a CLEKS scheme without using bilinear pairing.In this study,we put forward a pairing-free CLEKS scheme that does not exploit bilinear pairing.We strictly prove that the scheme achieves keyword ciphertext indistinguishability against adaptive chosen-keyword attacks under the complexity assumption of the computational Diffie-Hellman problem in the random oracle model.Efficiency comparison and the simulation show that it enjoys better performance than the previous pairing-based CLEKS schemes.In addition,we briefly introduce three extensions of the proposed CLEKS scheme. 展开更多
关键词 Searchable public key encryption Certificateless public key encryption with keyword search Bilinear pairing Computational Diffie-Hellman problem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部