In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square He...In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square Hermitian positive definite matrix N8x8 p is the key.The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge.We have provided NIST(National Institute of Standards and Technology)quality assurance tests for a random generated Hermitian matrix(a total of 10 different tests and additional analysis with approximate entropy and random digression).In the additional testing of the quality of the random matrix generated,we can conclude that the results of our analysis satisfy the defined strict requirements.This proposed MP encryption method can be applied effectively in the encryption and decryption of images in multi-party communications.In the experimental part of this paper,we give a comparison of encryption methods between machine learning methods.Machine learning algorithms could be compared by achieved results of classification concentrating on classes.In a comparative analysis,we give results of classifying of advanced encryption standard(AES)algorithm and proposed encryption method based on Moore–Penrose inverse.展开更多
Discrete element method can effectively simulate the discontinuity,inhomogeneity and large deformation and failure of rock and soil.Based on the innovative matrix computing of the discrete element method,the highperfo...Discrete element method can effectively simulate the discontinuity,inhomogeneity and large deformation and failure of rock and soil.Based on the innovative matrix computing of the discrete element method,the highperformance discrete element software MatDEM may handle millions of elements in one computer,and enables the discrete element simulation at the engineering scale.It supports heat calculation,multi-field and fluidsolid coupling numerical simulations.Furthermore,the software integrates pre-processing,solver,postprocessing,and powerful secondary development,allowing recompiling new discrete element software.The basic principles of the DEM,the implement and development of the MatDEM software,and its applications are introduced in this paper.The software and sample source code are available online(http://matdem.com).展开更多
The concepts of Rough Decision Support System (RDSS) and equivalence matrix are introduced in this paper. Based on a rough attribute vector tree (RAVT) method, two kinds of matrix computation algorithms — Recursive M...The concepts of Rough Decision Support System (RDSS) and equivalence matrix are introduced in this paper. Based on a rough attribute vector tree (RAVT) method, two kinds of matrix computation algorithms — Recursive Matrix Computation (RMC) and Parallel Matrix Computation (PMC) are proposed for rules extraction, attributes reduction and data cleaning finished synchronously. The algorithms emphasize the practicability and efficiency of rules generation. A case study of PMC is analyzed, and a comparison experiment of RMC algorithm shows that it is feasible and efficient for data mining and knowledge-discovery in RDSS.展开更多
Conventional electronic processors,which are the mainstream and almost invincible hardware for computation,are approaching their limits in both computational power and energy efficiency,especially in large-scale matri...Conventional electronic processors,which are the mainstream and almost invincible hardware for computation,are approaching their limits in both computational power and energy efficiency,especially in large-scale matrix computation.By combining electronic,photonic,and optoelectronic devices and circuits together,silicon-based optoelectronic matrix computation has been demonstrating great capabilities and feasibilities.Matrix computation is one of the few general-purpose computations that have the potential to exceed the computation performance of digital logic circuits in energy efficiency,computational power,and latency.Moreover,electronic processors also suffer from the tremendous energy consumption of the digital transceiver circuits during high-capacity data interconnections.We review the recent progress in photonic matrix computation,including matrix-vector multiplication,convolution,and multiply–accumulate operations in artificial neural networks,quantum information processing,combinatorial optimization,and compressed sensing,with particular attention paid to energy consumption.We also summarize the advantages of siliconbased optoelectronic matrix computation in data interconnections and photonic-electronic integration over conventional optical computing processors.Looking toward the future of silicon-based optoelectronic matrix computations,we believe that silicon-based optoelectronics is a promising and comprehensive platform for disruptively improving general-purpose matrix computation performance in the post-Moore’s law era.展开更多
Cloud computing provides the capability to con-nect resource-constrained clients with a centralized and shared pool of resources,such as computational power and storage on demand.Large matrix determinant computation i...Cloud computing provides the capability to con-nect resource-constrained clients with a centralized and shared pool of resources,such as computational power and storage on demand.Large matrix determinant computation is almost ubiquitous in computer science and requires large-scale data computation.Currently,techniques for securely outsourcing matrix determinant computations to untrusted servers are of utmost importance,and they have practical value as well as theoretical significance for the scientific community.In this study,we propose a secure outsourcing method for large matrix determinant computation.We em-ploy some transformations for privacy protection based on the original matrix,including permutation and mix-row/mix-column operations,before sending the target matrix to the cloud.The results returned from the cloud need to be de-clypled anul verified U ubtainl te cullett delinall.Il1 comparison with previously proposed algorithms,our new al-gorithm achieves a higher security level with greater cloud ef-ficiency.The experimental results demonstrate the efficiency and effectiveness of our algorithm.展开更多
As an indispensable part to compensate for the signal crosstalk in fiber communication systems,conventional digital multi-input multi-output(MIMO)signal processor is facing the challenges of high com-putational comple...As an indispensable part to compensate for the signal crosstalk in fiber communication systems,conventional digital multi-input multi-output(MIMO)signal processor is facing the challenges of high com-putational complexity,high power consumption and relatively low processing speed.The optical MIMOenables the best use of light and has been proposed to remedy this limitation.However,the currently existing optical MIMO methods are all restricted to the spatial di-mension,while the temporal dimension is neglected.Here,an on-chip spatial-temporal descrambler with four channels were devised and its MIMO functions were experimentally verified simultaneously in both spatial and temporal dimensions.The spatial crosstalk of single-channel descrambler and four-channel descrambler is respectively less than-21 dB and-18 dB,and the time delay is simultaneously com-pensated successfully.Moreover,a more universal model extended to mode-dependent loss and gain(MDL)compensation was further de-veloped,which is capable of being cascaded for the real optical trans-mission system.The first attempt at photonic spatial-temporal de-scrambler enriched the varieties of optical MIMO,and the proposed scheme provided a new opportunity for all-optical MIMO signal pro-cessing.展开更多
The cocktail party problem,i.e.,tracing and recognizing the speech of a specific speaker when multiple speakers talk simultaneously,is one of the critical problems yet to be solved to enable the wide application of au...The cocktail party problem,i.e.,tracing and recognizing the speech of a specific speaker when multiple speakers talk simultaneously,is one of the critical problems yet to be solved to enable the wide application of automatic speech recognition(ASR) systems.In this overview paper,we review the techniques proposed in the last two decades in attacking this problem.We focus our discussions on the speech separation problem given its central role in the cocktail party environment,and describe the conventional single-channel techniques such as computational auditory scene analysis(CASA),non-negative matrix factorization(NMF) and generative models,the conventional multi-channel techniques such as beamforming and multi-channel blind source separation,and the newly developed deep learning-based techniques,such as deep clustering(DPCL),the deep attractor network(DANet),and permutation invariant training(PIT).We also present techniques developed to improve ASR accuracy and speaker identification in the cocktail party environment.We argue effectively exploiting information in the microphone array,the acoustic training set,and the language itself using a more powerful model.Better optimization ob jective and techniques will be the approach to solving the cocktail party problem.展开更多
基金the support of Network Communication Technology(NCT)Research Groups,FTSM,UKM in providing facilities for this research.This paper is supported under the Dana Impak Perdana UKM DIP-2018-040 and Fundamental Research Grant Scheme FRGS/1/2018/TK04/UKM/02/7.
文摘In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square Hermitian positive definite matrix N8x8 p is the key.The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge.We have provided NIST(National Institute of Standards and Technology)quality assurance tests for a random generated Hermitian matrix(a total of 10 different tests and additional analysis with approximate entropy and random digression).In the additional testing of the quality of the random matrix generated,we can conclude that the results of our analysis satisfy the defined strict requirements.This proposed MP encryption method can be applied effectively in the encryption and decryption of images in multi-party communications.In the experimental part of this paper,we give a comparison of encryption methods between machine learning methods.Machine learning algorithms could be compared by achieved results of classification concentrating on classes.In a comparative analysis,we give results of classifying of advanced encryption standard(AES)algorithm and proposed encryption method based on Moore–Penrose inverse.
基金Financial supports from the Natural Science Foundation of China(41761134089,41977218)Six Talent Peaks Project of Jiangsu Province(RJFW-003)the Fundamental Research Funds for the Central Universities(14380103)are gratefully acknowledged.
文摘Discrete element method can effectively simulate the discontinuity,inhomogeneity and large deformation and failure of rock and soil.Based on the innovative matrix computing of the discrete element method,the highperformance discrete element software MatDEM may handle millions of elements in one computer,and enables the discrete element simulation at the engineering scale.It supports heat calculation,multi-field and fluidsolid coupling numerical simulations.Furthermore,the software integrates pre-processing,solver,postprocessing,and powerful secondary development,allowing recompiling new discrete element software.The basic principles of the DEM,the implement and development of the MatDEM software,and its applications are introduced in this paper.The software and sample source code are available online(http://matdem.com).
文摘The concepts of Rough Decision Support System (RDSS) and equivalence matrix are introduced in this paper. Based on a rough attribute vector tree (RAVT) method, two kinds of matrix computation algorithms — Recursive Matrix Computation (RMC) and Parallel Matrix Computation (PMC) are proposed for rules extraction, attributes reduction and data cleaning finished synchronously. The algorithms emphasize the practicability and efficiency of rules generation. A case study of PMC is analyzed, and a comparison experiment of RMC algorithm shows that it is feasible and efficient for data mining and knowledge-discovery in RDSS.
基金supported by the National Natural Science Foundation of China(62035001 and 61775005)。
文摘Conventional electronic processors,which are the mainstream and almost invincible hardware for computation,are approaching their limits in both computational power and energy efficiency,especially in large-scale matrix computation.By combining electronic,photonic,and optoelectronic devices and circuits together,silicon-based optoelectronic matrix computation has been demonstrating great capabilities and feasibilities.Matrix computation is one of the few general-purpose computations that have the potential to exceed the computation performance of digital logic circuits in energy efficiency,computational power,and latency.Moreover,electronic processors also suffer from the tremendous energy consumption of the digital transceiver circuits during high-capacity data interconnections.We review the recent progress in photonic matrix computation,including matrix-vector multiplication,convolution,and multiply–accumulate operations in artificial neural networks,quantum information processing,combinatorial optimization,and compressed sensing,with particular attention paid to energy consumption.We also summarize the advantages of siliconbased optoelectronic matrix computation in data interconnections and photonic-electronic integration over conventional optical computing processors.Looking toward the future of silicon-based optoelectronic matrix computations,we believe that silicon-based optoelectronics is a promising and comprehensive platform for disruptively improving general-purpose matrix computation performance in the post-Moore’s law era.
基金supported by the National Natural Science Foundation of China(Grant No.61502269)National Key Research and Development Program of China(2017YFA0303903)Zhejiang Province Key R&D Project(2017C01062).
文摘Cloud computing provides the capability to con-nect resource-constrained clients with a centralized and shared pool of resources,such as computational power and storage on demand.Large matrix determinant computation is almost ubiquitous in computer science and requires large-scale data computation.Currently,techniques for securely outsourcing matrix determinant computations to untrusted servers are of utmost importance,and they have practical value as well as theoretical significance for the scientific community.In this study,we propose a secure outsourcing method for large matrix determinant computation.We em-ploy some transformations for privacy protection based on the original matrix,including permutation and mix-row/mix-column operations,before sending the target matrix to the cloud.The results returned from the cloud need to be de-clypled anul verified U ubtainl te cullett delinall.Il1 comparison with previously proposed algorithms,our new al-gorithm achieves a higher security level with greater cloud ef-ficiency.The experimental results demonstrate the efficiency and effectiveness of our algorithm.
基金National Key Research and Development Program of China(2021YFB2801903,2021YFB2801900)National Natural Science Foundation of China(62075075,U21A20511,62275088)Innovation Project of Optics Valley Laboratory(Grant No.OVL2021BG001).
文摘As an indispensable part to compensate for the signal crosstalk in fiber communication systems,conventional digital multi-input multi-output(MIMO)signal processor is facing the challenges of high com-putational complexity,high power consumption and relatively low processing speed.The optical MIMOenables the best use of light and has been proposed to remedy this limitation.However,the currently existing optical MIMO methods are all restricted to the spatial di-mension,while the temporal dimension is neglected.Here,an on-chip spatial-temporal descrambler with four channels were devised and its MIMO functions were experimentally verified simultaneously in both spatial and temporal dimensions.The spatial crosstalk of single-channel descrambler and four-channel descrambler is respectively less than-21 dB and-18 dB,and the time delay is simultaneously com-pensated successfully.Moreover,a more universal model extended to mode-dependent loss and gain(MDL)compensation was further de-veloped,which is capable of being cascaded for the real optical trans-mission system.The first attempt at photonic spatial-temporal de-scrambler enriched the varieties of optical MIMO,and the proposed scheme provided a new opportunity for all-optical MIMO signal pro-cessing.
基金supported by the Tencent and Shanghai Jiao Tong University Joint Project
文摘The cocktail party problem,i.e.,tracing and recognizing the speech of a specific speaker when multiple speakers talk simultaneously,is one of the critical problems yet to be solved to enable the wide application of automatic speech recognition(ASR) systems.In this overview paper,we review the techniques proposed in the last two decades in attacking this problem.We focus our discussions on the speech separation problem given its central role in the cocktail party environment,and describe the conventional single-channel techniques such as computational auditory scene analysis(CASA),non-negative matrix factorization(NMF) and generative models,the conventional multi-channel techniques such as beamforming and multi-channel blind source separation,and the newly developed deep learning-based techniques,such as deep clustering(DPCL),the deep attractor network(DANet),and permutation invariant training(PIT).We also present techniques developed to improve ASR accuracy and speaker identification in the cocktail party environment.We argue effectively exploiting information in the microphone array,the acoustic training set,and the language itself using a more powerful model.Better optimization ob jective and techniques will be the approach to solving the cocktail party problem.