An optimal dimension-down iterative algorithm (DDIA) is proposed for solving a mixed (continuous/ discrete) transportation network design problem (MNDP), which is generally expressed as a mathematical programmin...An optimal dimension-down iterative algorithm (DDIA) is proposed for solving a mixed (continuous/ discrete) transportation network design problem (MNDP), which is generally expressed as a mathematical programming with equilibrium constraints (MPEC). The upper level of the MNDP aims to optimize the network performance via both the expansion of existing links and the addition of new candidate links, whereas the lower level is a traditional Wardrop user equilibrium (UE) model. The idea of the proposed DDIA is to reduce the dimensions of the problem. A group of variables (discrete/continuous) are fixed to altemately optimize another group of variables (continuous/discrete). Some continuous network design problems (CNDPs) and discrete network design problems (DNDPs) are solved repeatedly until the optimal solution is obtained. A numerical example is given to demonstrate the efficiency of the proposed algorithm.展开更多
Collision and security issues are considered as barriers to RFID applications.In this paper,a parallelizable anti-collision based on chaotic sequence combined dynamic frame slotted aloha to build a high-efficiency RFI...Collision and security issues are considered as barriers to RFID applications.In this paper,a parallelizable anti-collision based on chaotic sequence combined dynamic frame slotted aloha to build a high-efficiency RFID system is proposed.In the tags parallelizable identification,we design a Discrete Markov process to analyze the success identification rate.Then a mutual authentication security protocol merging chaotic anti-collision is presented.The theoretical analysis and simulation results show that the proposed identification scheme has less than 45.1%of the identification time slots compared with the OVSF-system when the length of the chaos sequence is 31.The success identification rate of the proposed chaotic anti-collision can achieve 63%when the number of the tag is100.We test the energy consumption of the presented authentication protocol,which can simultaneously solve the anti-collision and security of the UHF RFID system.展开更多
A novel hybrid algorithm named ABC-BBO, which integrates artificial bee colony(ABC) algorithm with biogeography-based optimization(BBO) algorithm, is proposed to solve constrained mechanical design problems. ABC-BBO c...A novel hybrid algorithm named ABC-BBO, which integrates artificial bee colony(ABC) algorithm with biogeography-based optimization(BBO) algorithm, is proposed to solve constrained mechanical design problems. ABC-BBO combined the exploration of ABC algorithm with the exploitation of BBO algorithm effectively, and hence it can generate the promising candidate individuals. The proposed hybrid algorithm speeds up the convergence and improves the algorithm's performance. Several benchmark test functions and mechanical design problems are applied to verifying the effects of these improvements and it is demonstrated that the performance of this proposed ABC-BBO is superior to or at least highly competitive with other population-based optimization approaches.展开更多
Constrained optimization problems are very important as they are encountered in many science and engineering applications.As a novel evolutionary computation technique,cuckoo search(CS) algorithm has attracted much at...Constrained optimization problems are very important as they are encountered in many science and engineering applications.As a novel evolutionary computation technique,cuckoo search(CS) algorithm has attracted much attention and wide applications,owing to its easy implementation and quick convergence.A hybrid cuckoo pattern search algorithm(HCPS) with feasibility-based rule is proposed for solving constrained numerical and engineering design optimization problems.This algorithm can combine the stochastic exploration of the cuckoo search algorithm and the exploitation capability of the pattern search method.Simulation and comparisons based on several well-known benchmark test functions and structural design optimization problems demonstrate the effectiveness,efficiency and robustness of the proposed HCPS algorithm.展开更多
This study addresses the adaptive control and function projective synchronization problems between 2D Rulkov discrete-time system and Network discrete-time system. Based on backstepping design with three controllers, ...This study addresses the adaptive control and function projective synchronization problems between 2D Rulkov discrete-time system and Network discrete-time system. Based on backstepping design with three controllers, a systematic, concrete and automatic scheme is developed to investigate the function projective synchronization of discretetime chaotic systems. In addition, the adaptive control function is applied to achieve the state synchronization of two discrete-time systems. Numerical results demonstrate the effectiveness of the proposed control scheme.展开更多
In the classical multiprocessor scheduling problems, it is assumed that the problems are considered in off\|line or on\|line environment. But in practice, problems are often not really off\|line or on\|line but someh...In the classical multiprocessor scheduling problems, it is assumed that the problems are considered in off\|line or on\|line environment. But in practice, problems are often not really off\|line or on\|line but somehow in between. This means that, with respect to the on\|line problem, some further information about the tasks is available, which allows the improvement of the performance of the best possible algorithms. Problems of this class are called semi on\|line ones. The authors studied two semi on\|line multiprocessor scheduling problems, in which, the total processing time of all tasks is known in advance, or all processing times lie in a given interval. They proposed approximation algorithms for minimizing the makespan and analyzed their performance guarantee. The algorithms improve the known results for 3 or more processor cases in the literature.展开更多
There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution o...There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement.展开更多
The traditional manner to design public transportation system is to sequentially design the transit network and public bicycle network. A new public transportation system design problem that simultaneously considers b...The traditional manner to design public transportation system is to sequentially design the transit network and public bicycle network. A new public transportation system design problem that simultaneously considers both bus network design and public bicycle network design is proposed. The chemical reaction optimization(CRO) is designed to solve the problem. A shortcoming of CRO is that, when the two-molecule collisions take place, the molecules are randomly picked from the container.Hence, we improve CRO by employing different mating strategies. The computational results confirm the benefits of the mating strategies. Numerical experiments are conducted on the Sioux-Falls network. A comparison with the traditional sequential modeling framework indicates that the proposed approach has a better performance and is more robust. The practical applicability of the approach is proved by employing a real size network.展开更多
基金The National Natural Science Foundation of China(No. 50908235 )China Postdoctoral Science Foundation (No.201003520)
文摘An optimal dimension-down iterative algorithm (DDIA) is proposed for solving a mixed (continuous/ discrete) transportation network design problem (MNDP), which is generally expressed as a mathematical programming with equilibrium constraints (MPEC). The upper level of the MNDP aims to optimize the network performance via both the expansion of existing links and the addition of new candidate links, whereas the lower level is a traditional Wardrop user equilibrium (UE) model. The idea of the proposed DDIA is to reduce the dimensions of the problem. A group of variables (discrete/continuous) are fixed to altemately optimize another group of variables (continuous/discrete). Some continuous network design problems (CNDPs) and discrete network design problems (DNDPs) are solved repeatedly until the optimal solution is obtained. A numerical example is given to demonstrate the efficiency of the proposed algorithm.
基金supported by National Basic Research Program of China(973 Program, No.2010CB327403)
文摘Collision and security issues are considered as barriers to RFID applications.In this paper,a parallelizable anti-collision based on chaotic sequence combined dynamic frame slotted aloha to build a high-efficiency RFID system is proposed.In the tags parallelizable identification,we design a Discrete Markov process to analyze the success identification rate.Then a mutual authentication security protocol merging chaotic anti-collision is presented.The theoretical analysis and simulation results show that the proposed identification scheme has less than 45.1%of the identification time slots compared with the OVSF-system when the length of the chaos sequence is 31.The success identification rate of the proposed chaotic anti-collision can achieve 63%when the number of the tag is100.We test the energy consumption of the presented authentication protocol,which can simultaneously solve the anti-collision and security of the UHF RFID system.
基金Projects(61463009,11264005,11361014)supported by the National Natural Science Foundation of ChinaProject([2013]2082)supported by the Science Technology Foundation of Guizhou Province,China
文摘A novel hybrid algorithm named ABC-BBO, which integrates artificial bee colony(ABC) algorithm with biogeography-based optimization(BBO) algorithm, is proposed to solve constrained mechanical design problems. ABC-BBO combined the exploration of ABC algorithm with the exploitation of BBO algorithm effectively, and hence it can generate the promising candidate individuals. The proposed hybrid algorithm speeds up the convergence and improves the algorithm's performance. Several benchmark test functions and mechanical design problems are applied to verifying the effects of these improvements and it is demonstrated that the performance of this proposed ABC-BBO is superior to or at least highly competitive with other population-based optimization approaches.
基金Projects([2013]2082,[2009]2061)supported by the Science Technology Foundation of Guizhou Province,ChinaProject([2013]140)supported by the Excellent Science Technology Innovation Talents in Universities of Guizhou Province,ChinaProject(2008040)supported by the Natural Science Research in Education Department of Guizhou Province,China
文摘Constrained optimization problems are very important as they are encountered in many science and engineering applications.As a novel evolutionary computation technique,cuckoo search(CS) algorithm has attracted much attention and wide applications,owing to its easy implementation and quick convergence.A hybrid cuckoo pattern search algorithm(HCPS) with feasibility-based rule is proposed for solving constrained numerical and engineering design optimization problems.This algorithm can combine the stochastic exploration of the cuckoo search algorithm and the exploitation capability of the pattern search method.Simulation and comparisons based on several well-known benchmark test functions and structural design optimization problems demonstrate the effectiveness,efficiency and robustness of the proposed HCPS algorithm.
基金supported by the Natural Science Foundation of China under Grant Nos.10747141 and 10735030Zhejiang Provincial Natural Science Foundation under Grant No.605408+3 种基金Ningbo Natural Science Foundation under Grant Nos.2007A610049 and 2008A61001National Basic Research Program of China (973 Program 2007CB814800)Programme for Changjiang Scholars and Innovative Research Team in University (IRT0734)K.C.Wong Magna Fund in Ningbo University
文摘This study addresses the adaptive control and function projective synchronization problems between 2D Rulkov discrete-time system and Network discrete-time system. Based on backstepping design with three controllers, a systematic, concrete and automatic scheme is developed to investigate the function projective synchronization of discretetime chaotic systems. In addition, the adaptive control function is applied to achieve the state synchronization of two discrete-time systems. Numerical results demonstrate the effectiveness of the proposed control scheme.
文摘In the classical multiprocessor scheduling problems, it is assumed that the problems are considered in off\|line or on\|line environment. But in practice, problems are often not really off\|line or on\|line but somehow in between. This means that, with respect to the on\|line problem, some further information about the tasks is available, which allows the improvement of the performance of the best possible algorithms. Problems of this class are called semi on\|line ones. The authors studied two semi on\|line multiprocessor scheduling problems, in which, the total processing time of all tasks is known in advance, or all processing times lie in a given interval. They proposed approximation algorithms for minimizing the makespan and analyzed their performance guarantee. The algorithms improve the known results for 3 or more processor cases in the literature.
基金supported in part by National Natural Science Fundation of China under Grant No.61202458,61403109
文摘There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement.
基金Projects(71301115,71271150,71101102)supported by the National Natural Science Foundation of ChinaProject(20130032120009)supported by Specialized Research Fund for the Doctoral Program of Higher Education of China
文摘The traditional manner to design public transportation system is to sequentially design the transit network and public bicycle network. A new public transportation system design problem that simultaneously considers both bus network design and public bicycle network design is proposed. The chemical reaction optimization(CRO) is designed to solve the problem. A shortcoming of CRO is that, when the two-molecule collisions take place, the molecules are randomly picked from the container.Hence, we improve CRO by employing different mating strategies. The computational results confirm the benefits of the mating strategies. Numerical experiments are conducted on the Sioux-Falls network. A comparison with the traditional sequential modeling framework indicates that the proposed approach has a better performance and is more robust. The practical applicability of the approach is proved by employing a real size network.