期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Factorization of Width-two CSL Algebras and Nest Algebras
1
作者 YANG You-long WU Yan 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2006年第1期10-14,共5页
In this paper, we show that the invertible operator T, which is a bounded linear functional on a separable Hilbert space H, could factor as T = US, where U is unitary and S belongs to width-two CSL algebra algφ (φ ... In this paper, we show that the invertible operator T, which is a bounded linear functional on a separable Hilbert space H, could factor as T = US, where U is unitary and S belongs to width-two CSL algebra algφ (φ = M∨N) when nest M or N is a countable nest, or S belongs to algφ^-1 when nests M and N are countable nests. For the factorization of nest,we obtain that T factors as T = US where S ∈ DN^-1 and U is unitary as N be a countable nest. 展开更多
关键词 width-two CSL algebra nest algebra FACTORIZATION invertible operator
下载PDF
AN INFEASIBLE-INTERIOR-POINT PREDICTOR-CORRECTOR ALGORITHM FOR THE SECOND-ORDER CONE PROGRAM 被引量:11
2
作者 迟晓妮 刘三阳 《Acta Mathematica Scientia》 SCIE CSCD 2008年第3期551-559,共9页
A globally convergent infeasible-interior-point predictor-corrector algorithm is presented for the second-order cone programming (SOCP) by using the Alizadeh- Haeberly-Overton (AHO) search direction. This algorith... A globally convergent infeasible-interior-point predictor-corrector algorithm is presented for the second-order cone programming (SOCP) by using the Alizadeh- Haeberly-Overton (AHO) search direction. This algorithm does not require the feasibility of the initial points and iteration points. Under suitable assumptions, it is shown that the algorithm can find an -approximate solution of an SOCP in at most O(√n ln(ε0/ε)) iterations. The iteration-complexity bound of our algorithm is almost the same as the best known bound of feasible interior point algorithms for the SOCP. 展开更多
关键词 Second-order cone programming infeasible-interior-point algorithm predictor-corrector algorithm global convergence
下载PDF
Bayesian network learning algorithm based on unconstrained optimization and ant colony optimization 被引量:3
3
作者 Chunfeng Wang Sanyang Liu Mingmin Zhu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第5期784-790,共7页
Structure learning of Bayesian networks is a wellresearched but computationally hard task.For learning Bayesian networks,this paper proposes an improved algorithm based on unconstrained optimization and ant colony opt... Structure learning of Bayesian networks is a wellresearched but computationally hard task.For learning Bayesian networks,this paper proposes an improved algorithm based on unconstrained optimization and ant colony optimization(U-ACO-B) to solve the drawbacks of the ant colony optimization(ACO-B).In this algorithm,firstly,an unconstrained optimization problem is solved to obtain an undirected skeleton,and then the ACO algorithm is used to orientate the edges,thus returning the final structure.In the experimental part of the paper,we compare the performance of the proposed algorithm with ACO-B algorithm.The experimental results show that our method is effective and greatly enhance convergence speed than ACO-B algorithm. 展开更多
关键词 Bayesian network structure learning ant colony optimization unconstrained optimization
下载PDF
Fully Secure Identity-based Broadcast Encryption in the Subgroups 被引量:1
4
作者 张乐友 胡予濮 吴青 《China Communications》 SCIE CSCD 2011年第2期152-158,共7页
In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive se... In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive security) under three static(i.e. non q-based) assumptions. It is worth noting that only recently Waters gives a short ciphertext broadcast encryption system that is even adaptively secure under the simple assumptions. One feature of our methodology is that it is relatively simple to leverage our techniques to get adaptive security. 展开更多
关键词 identity-based broadcast encryption dual system encryption full security static assumption SUBGROUP provable security
下载PDF
Hooke and Jeeves algorithm for linear support vector machine 被引量:1
5
作者 Yeqing Liu Sanyang Liu Mingtao Gu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第1期138-141,共4页
Coordinate descent method is a unconstrained optimization technique. When it is applied to support vector machine (SVM), at each step the method updates one component of w by solving a one-variable sub-problem while... Coordinate descent method is a unconstrained optimization technique. When it is applied to support vector machine (SVM), at each step the method updates one component of w by solving a one-variable sub-problem while fixing other components. All components of w update after one iteration. Then go to next iteration. Though the method converges and converges fast in the beginning, it converges slow for final convergence. To improve the speed of final convergence of coordinate descent method, Hooke and Jeeves algorithm which adds pattern search after every iteration in coordinate descent method was applied to SVM and a global Newton algorithm was used to solve one-variable subproblems. We proved the convergence of the algorithm. Experimental results show Hooke and Jeeves' method does accelerate convergence specially for final convergence and achieves higher testing accuracy more quickly in classification. 展开更多
关键词 support vector machine CLASSIFICATION pattern search Hooke and Jeeves coordinate descent global Newton algorithm.
下载PDF
Graphical model construction based on evolutionary algorithms
6
作者 Youlong YANG Yan WU Sanyang LIU 《控制理论与应用(英文版)》 EI 2006年第4期349-354,共6页
Using Bayesian networks to model promising solutions from the current population of the evolutionary algorithms can ensure efficiency and intelligence search for the optimum. However, to construct a Bayesian network t... Using Bayesian networks to model promising solutions from the current population of the evolutionary algorithms can ensure efficiency and intelligence search for the optimum. However, to construct a Bayesian network that fits a given dataset is a NP-hard problem, and it also needs consuming mass computational resources. This paper develops a methodology for constructing a graphical model based on Bayesian Dirichlet metric. Our approach is derived from a set of propositions and theorems by researching the local metric relationship of networks matching dataset. This paper presents the algorithm to construct a tree model from a set of potential solutions using above approach. This method is important not only for evolutionary algorithms based on graphical models, but also for machine learning and data mining. The experimental results show that the exact theoretical results and the approximations match very well. 展开更多
关键词 Graphical model Evolutionary algorithms Bayesian network Tree models Bayesian Dirichlet metric
下载PDF
Hypersphere support vector machines based on generalized multiplicative updates
7
作者 吴青 刘三阳 张乐友 《Journal of Shanghai University(English Edition)》 CAS 2008年第2期126-130,共5页
This paper proposes a novel hypersphere support vector machines (HSVMs) based on generalized multiplicative updates. This algorithm can obtain the boundary of hypersphere containing one class of samples by the descr... This paper proposes a novel hypersphere support vector machines (HSVMs) based on generalized multiplicative updates. This algorithm can obtain the boundary of hypersphere containing one class of samples by the description of the training samples from one class and use this boundary to classify the test samples. The generalized multiplicative updates are applied to solving boundary optimization progranmning. Multiplicative updates available are suited for nonnegative quadratic convex programming. The generalized multiplicative updates are derived to box and sum constrained quadratic programming in this paper. They provide an extremely straightforward way to implement support vector machines (SVMs) where all variables are updated in parallel. The generalized multiplicative updates converge monotonically to the solution of the maximum margin hyperplane. The experiments show the superiority of our new algorithm. 展开更多
关键词 hypersphere support vector machines (HSVMs) multiplicative updates sum and box constrained quadraticprogramming classification.
下载PDF
New Constructions of Identity-Based Threshold Decryption 被引量:1
8
作者 ZHANG Leyou HU Yupu +1 位作者 TIAN Xu'an YANG Yang 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期222-226,共5页
In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive c... In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive chosen cipbertext attack under the computational bilinear Diffie-Hellman (CBDH) problem assumption in the random oracle. The pubic cheekability of ciphertext in the IDTDS is given by simply creating a signed E1Gamal encryption instead of a noninteractive zero-knowledge proof. Furthermore, we introduce a modified verifiable pairing to ensure all decryption shares are consistent. Our scheme is more efficient in verification than the schemes considered previously. 展开更多
关键词 ID-Based threshold decryption verifiable pair computational bilinear Diffie-Hellman (CBDH) problem provable security
原文传递
Identity-based Broadcast Encryption with Shorter Transmissions 被引量:2
9
作者 张乐友 胡予濮 牟宁波 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期641-645,共5页
This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphe... This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphertexts. Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network. Finally, the proposed schemes are provable security under the decision generalized bilinear Diffi-Hellman (GBDH) assumption in the random oracles model. 展开更多
关键词 broadcast encryption identity-based encryption short transmissions provable security
原文传递
Nondifferentiable Multiobjective Programming under Generalized d-ρ-(η,θ)-Type I Univexity
10
作者 Chun Feng WANG San Yang LIU 《Journal of Mathematical Research and Exposition》 CSCD 2011年第4期655-664,共10页
In this puper, on the basis of notions of d-p-(η, θ)-invex function, type I function and univex function, we present new classes of generalized d-p-(η, θ)-type I univex functions. By using these new concepts, ... In this puper, on the basis of notions of d-p-(η, θ)-invex function, type I function and univex function, we present new classes of generalized d-p-(η, θ)-type I univex functions. By using these new concepts, we obtain several sufficient optimality conditions for a feasible solution to be an efficient solution, and derive some Mond-Weir type duality results. 展开更多
关键词 multiobjective programming generalized d-p-(η θ)-type I univexity DUALITY optimality.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部