期刊文献+

为您找到了以下期刊:

共找到73篇文章
< 1 2 4 >
每页显示 20 50 100
Comparative Study of CPLEX and D-Wave for Track Finding Resolution
1
作者 Duy Dao Hervé Kerivin +1 位作者 Philippe Lacomme Bogdan Vulpescu journal of quantum computing 2025年第1期39-54,共16页
Track finding is a complex optimization problem,originally introduced in particle physics for the reconstruction of the trajectories of particles.A track is typically composed of several consecutive segments,which tog... Track finding is a complex optimization problem,originally introduced in particle physics for the reconstruction of the trajectories of particles.A track is typically composed of several consecutive segments,which together form a smooth curve without any bifurcations.In this paper,we investigate various modeling approaches to assess their effectiveness and impact when applied to track finding,using both quantum and classical methods.We present implementations of three classical models using CPLEX,two quantum models on actual D-Wave quantum computers,and one quantummodel on a D-Wave simulator.The results show that,while CPLEX provides better results than D-Wave on small instances,D-Wave is able to propose solutions in shorter computation times for large instances,although the gap with the optimal solution tends to increase.To the best of our knowledge,this is the first numerical study comparing a non-quantum approach based on classical algorithms(Simplex and Branch and Bound)used in commercial software with a quantum approach offered by D-Wave.The results do not show the quantum supremacy typically expected,but they do demonstrate that quantum solutions can be competitive with classical approaches,and even more efficient than some classical modeling and solving methods. 展开更多
关键词 Quantum annealing track finding D-WAVE quadratic/linear models CPLEX
在线阅读 下载PDF
State-Space Reduction Techniques Exploiting Specific Constraints for Quantum Search Initialization,Application to an Outage Planning Problem
2
作者 Rodolphe Griset Ioannis Lavdas Jiri Guth Jarkovsky journal of quantum computing 2025年第1期81-105,共25页
Quantum search has emerged as one of the most promising fields in quantum computing.Stateof-the-art quantum search algorithms enable the search for specific elements in a distribution by monotonically increasing the d... Quantum search has emerged as one of the most promising fields in quantum computing.Stateof-the-art quantum search algorithms enable the search for specific elements in a distribution by monotonically increasing the density of these elements relative to the rest of the distribution.These kinds of algorithms demonstrate a theoretical quadratic speed-up on the number of queries compared to classical search algorithms in unstructured spaces.Unfortunately,the major part of the existing literature applies quantum search to problems whose size grows exponentially with the input size without exploiting any specific problem structure,rendering this kind of approach not exploitable in real industrial problems.In contrast,this work proposes exploiting specific constraints of an outage planning problem,consisting in setting outage dates of production units under specific fuel management constraints and resource constraints limiting the number of outages in parallel,to build an initial superposition of states with size almost quadratically increasing as a function of the problem size.This state space reduction,inspired by the quantum walk algorithm,constructs a state superposition corresponding to all paths in a state-graph,embedding spacing constraints between outages.Our numerical results on quantum emulators highlight the potential of the statespace reduction approach.In our simplified use case,the number of iterations required to reach a 90% probability of measuring a feasible solution is reduced by a factor between 2 and 4.More importantly,the squared ratio between the number of possible configurations and the number of valid solutions shifts from exponential to linear behavior,demonstrating that the quadratic speedup offered by Grover-based algorithms becomes sufficient in this setting.While these results are based on a simplified scenario and further investigation is needed to generalize them to large-scale industrial problems,they illustrate the promise of structure-aware initialization in significantly improving the efficiency of quantum search by focusing on a smaller,more relevant solution space. 展开更多
关键词 Quantum search amplitude amplification quantum walk scheduling planning problem
在线阅读 下载PDF
A Genetic Approach to Minimising Gate and Qubit Teleportations for Multi-Processor Quantum Circuit Distribution
3
作者 Oliver Crampton Panagiotis Promponas +3 位作者 Richard Chen Paul Polakos Leandros Tassiulas Louis Samuel journal of quantum computing 2025年第1期1-15,共15页
Distributed Quantum Computing(DQC)provides a means for scaling available quantum computation by interconnecting multiple quantum processor units(QPUs).A key challenge in this domain is efficiently allocating logical q... Distributed Quantum Computing(DQC)provides a means for scaling available quantum computation by interconnecting multiple quantum processor units(QPUs).A key challenge in this domain is efficiently allocating logical qubits from quantum circuits to the physical qubits within QPUs,a task known to be NP-hard.Traditional approaches,primarily focused on graph partitioning strategies,have sought to reduce the number of required Bell pairs for executing non-local CNOT operations,a form of gate teleportation.However,these methods have limitations in terms of efficiency and scalability.Addressing this,our work jointly considers gate and qubit teleportations introducing a novel meta-heuristic algorithm to minimise the network cost of executing a quantum circuit.By allowing dynamic reallocation of qubits along with gate teleportations during circuit execution,our method significantly enhances the overall efficacy and potential scalability of DQC frameworks.In our numerical analysis,we demonstrate that integrating qubit teleportations into our genetic algorithm for optimizing circuit blocking reduces the required resources,specifically the number of EPR pairs,compared to traditional graph partitioning methods.Our results,derived fromboth benchmark and randomly generated circuits,show that as circuit complexity increases—demanding more qubit teleportations—our approach effectively optimises these teleportations throughout the execution,thereby enhancing performance through strategic circuit partitioning.This is a step forward in the pursuit of a global quantum compiler which will ultimately enable the efficient use of a‘quantum data center’in the future. 展开更多
关键词 Distributed quantum computing optimisation TELEPORTATION HEURISTIC
在线阅读 下载PDF
Investigating Techniques to Optimise the Layout of Turbines in a Windfarm Using a Quantum Computer
4
作者 James Hancock Matthew Craven +1 位作者 Craig McNeile Davide Vadacchino journal of quantum computing 2025年第1期55-79,共25页
This paper investigates Windfarm Layout Optimization(WFLO),where we formulate turbine placement considering wake effects as a Quadratic Unconstrained Binary Optimization(QUBO)problem.Wind energy plays a critical role ... This paper investigates Windfarm Layout Optimization(WFLO),where we formulate turbine placement considering wake effects as a Quadratic Unconstrained Binary Optimization(QUBO)problem.Wind energy plays a critical role in the transition toward sustainable power systems,but the optimal placement of turbines remains a challenging combinatorial problem due to complex wake interactions.With recent advances in quantum computing,there is growing interest in exploring whether hybrid quantum-classical methods can provide advantages for such computationally intensive tasks.We investigate solving the resulting QUBO problem using the Variational Quantum Eigensolver(VQE)implemented onQiskit’s quantum computer simulator,employing a quantum noise-free,gate-based circuit model.Three classical optimizers are discussed,with a detailed analysis of the two most effective approaches:Constrained Optimization BY Linear Approximation(COBYLA)and Bayesian Optimization(BO).We compare these simulated quantum results with two established classical optimization methods:Simulated Annealing(SA)and the Gurobi solver.The study focuses on 4×4 grid configurations(requiring 16 qubits),providing insights into near-term quantum algorithm applicability for renewable energy optimization. 展开更多
关键词 Quantum computing QUBO windfarm layout optimization VQE
在线阅读 下载PDF
Analysis of Innovative Quantum Optimization Solutions for Shor’s Period Finding Algorithm Applied to the Computation of a^(x) mod 15
5
作者 Kaleb Dias Antoine KODO Eugène CEZIN journal of quantum computing 2025年第1期17-38,共22页
In the rapidly evolving domain of quantum computing,Shor’s algorithm has emerged as a groundbreaking innovation with far-reaching implications for the field of cryptographic security.However,the efficacy of Shor’s a... In the rapidly evolving domain of quantum computing,Shor’s algorithm has emerged as a groundbreaking innovation with far-reaching implications for the field of cryptographic security.However,the efficacy of Shor’s algorithm hinges on the critical step of determining the period,a process that poses a substantial computational challenge.This article explores innovative quantum optimization solutions that aim to enhance the efficiency of Shor’s period finding algorithm.The article focuses on quantum development environments,such as Qiskit and Cirq.A detailed analysis is conducted on three notable tools:Qiskit Transpiler,BQSKit,and Mitiq.The performance of these tools is evaluated in terms of execution time,precision,resource utilization,the number of quantum gates,circuit synthesis optimization,error mitigation,and qubit fidelity.Through rigorous case studies,we highlight the strengths and limitations of these tools,shedding light on their potential impact on integer factorization and cybersecurity.Our findings underscore the importance of quantum optimization and lay the foundation for future developments in quantum algorithmic enhancements,particularly within the Qiskit and Cirq quantum development environments. 展开更多
关键词 Quantum computing shor’s algorithm quantum optimization cryptographic security
在线阅读 下载PDF
Quantum Blockchain: A Decentralized, Encrypted and Distributed Database Based on Quantum Mechanics 被引量:4
6
作者 Chuntang Li Yinsong Xu +1 位作者 Jiahao Tang Wenjie Liu journal of quantum computing 2019年第2期49-63,共15页
Quantum blockchain can be understood as a decentralized, encrypted anddistributed database based on quantum computation and quantum information theory.Once the data is recorded in the quantum blockchain, it will not b... Quantum blockchain can be understood as a decentralized, encrypted anddistributed database based on quantum computation and quantum information theory.Once the data is recorded in the quantum blockchain, it will not be maliciously tamperedwith. In recent years, the development of quantum computation and quantum informationtheory makes more and more researchers focus on the research of quantum blockchain. Inthis paper, we review the developments in the field of quantum blockchain, and brieflyanalyze its advantages compared with the classical blockchain. The construction and theframework of the quantum blockchain are introduced. Then we introduce the method ofapplying quantum technology to a certain part of the general blockchain. In addition, theadvantages of quantum blockchain compared with classical blockchain and itsdevelopment prospects are summarized. 展开更多
关键词 Quantum computation quantum blockchain digital currency
在线阅读 下载PDF
Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model 被引量:2
7
作者 Zhexi Zhang Zhiguo Qu journal of quantum computing 2019年第2期89-109,共21页
How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy prepara... How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy preparation of Bell states, a novelanti-noise quantum network coding protocol is proposed in this paper. The new protocolencodes and transmits classical information by virtue of Bell states. It can guarantee thetransparency of the intermediate nodes during information, so that the eavesdropper Evedisables to get any information even if he intercepts the transmitted quantum states. Inview of the inevitability of quantum noise in quantum channel used, this paper analyzesthe influence of four kinds of noises on the new protocol in detail further, and verifies theefficiency of the protocol under different noise by mathematical calculation and analysis.In addition, based on the detailed mathematical analysis, the protocol has functioned wellnot only on improving the efficiency of information transmission, throughput and linkutilization in the quantum network, but also on enhancing reliability and antieavesdroppingattacks. 展开更多
关键词 Network coding quantum network coding bell states butterfly networkmodel quantum communication eavesdropping detection
在线阅读 下载PDF
Analysis and Prediction of Regional Electricity Consumption Based on BP Neural Network 被引量:6
8
作者 Pingping Xia Aihua Xu Tong Lian journal of quantum computing 2020年第1期25-32,共8页
Electricity consumption forecasting is one of the most important tasks for power system workers,and plays an important role in regional power systems.Due to the difference in the trend of power load and the past in th... Electricity consumption forecasting is one of the most important tasks for power system workers,and plays an important role in regional power systems.Due to the difference in the trend of power load and the past in the new normal,the influencing factors are more diversified,which makes it more difficult to predict the current electricity consumption.In this paper,the grey system theory and BP neural network are combined to predict the annual electricity consumption in Jiangsu.According to the historical data of annual electricity consumption and the six factors affecting electricity consumption,the gray correlation analysis method is used to screen the important factors,and three factors with large correlation degree are selected as the input parameters of BP neural network.The power forecasting model uses nearly 18 years of data to train and validate the model.The results show that the gray correlation analysis and BP neural network method have higher accuracy in power consumption prediction,and the calculation is more convenient than traditional methods. 展开更多
关键词 Electricity consumption prediction BP neural network grey relational analysis
在线阅读 下载PDF
T_GRASP: Optimization Algorithm of Ship Avoiding Typhoon Route 被引量:2
9
作者 Yingxian Huang Xueyan Ding +1 位作者 Yanan Zhang Leiming Yan journal of quantum computing 2022年第2期85-95,共11页
AGRASP-based algorithm called T_GRASP for avoiding typhoon route optimization is suggested to increase the security and effectiveness of ship navigation.One of the worst natural calamities that can disrupt a ship’s n... AGRASP-based algorithm called T_GRASP for avoiding typhoon route optimization is suggested to increase the security and effectiveness of ship navigation.One of the worst natural calamities that can disrupt a ship’s navigation and result in numerous safety mishaps is a typhoon.Currently,the captains manually review the collected weather data and steer clear of typhoons using their navigational expertise.The distribution of heavy winds andwaves produced by the typhoon also changes dynamically as a result of the surrounding large-scale air pressure distribution,which significantly enhances the challenge of the captain’s preparation for avoiding typhoon navigation.It is now necessary to find a solution to the challenge of designing a highsafety and effective ship navigation path to avoid typhoons.The T_GRASP algorithm is suggested to optimize the candidate set’s structure based on the GRASP algorithm’s frame.The algorithm can guarantee the safety of the ship to avoid typhoons and assure high route efficiency by using the lowest risk function,the shortest sailing time,and the least fuel consumption as the objective functions and the ship speed and highest safety as the model constraints.The outcomes of the simulation demonstrate the superiority of the suggested T_GRASP algorithm over both the conventional A∗algorithm and the ant colony algorithm.In addition to addressing issues with the traditional A∗algorithm,like its wide search space and poor efficiency,the proposed algorithm also addresses issues with the ant colony algorithm,like its excessive iterations and sluggish convergence. 展开更多
关键词 Ship voyage optimization weather routing avoiding typhoon A∗ GRASP ant colony algorithm
在线阅读 下载PDF
New Quantum Private Comparison Using Hyperentangled GHZ State 被引量:2
10
作者 Jerrel Gianni Zhiguo Qu journal of quantum computing 2021年第2期45-54,共10页
In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the ... In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the objective.This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom(DOF),which could have 64 combinations.The TP can decide which combination to use based on the shared key information provided from a quantum key distribution(QKD)protocol.By doing so,the security of the protocol can be improved further.Decoy photon technology is also used as another means of security and checks if the transmission in the quantum channel is secure or not before sending the quantum carrier.The proposed protocol is proved to be able to fend off various kinds of eavesdropping attacks.In addition,the new QPC protocol also can compare secret inputs securely and efficiently. 展开更多
关键词 GHZ state hyperentangled state information security quantum cryptography quantum private comparison
在线阅读 下载PDF
Improved Prediction and Understanding of Glass-Forming Ability Based on Random Forest Algorithm 被引量:2
11
作者 Chenjing Su Xiaoyu Li +3 位作者 Mengru Li Qinsheng Zhu Hao Fu Shan Yang journal of quantum computing 2021年第2期79-87,共9页
As an ideal material,bulk metallic glass(MG)has a wide range of applications because of its unique properties such as structural,functional and biomedical materials.However,it is difficult to predict the glass-forming... As an ideal material,bulk metallic glass(MG)has a wide range of applications because of its unique properties such as structural,functional and biomedical materials.However,it is difficult to predict the glass-forming ability(GFA)even given the criteria in theory and this problem greatly limits the application of bulk MG in industrial field.In this work,the proposed model uses the random forest classification method which is one of machine learning methods to solve the GFA prediction for binary metallic alloys.Compared with the previous SVM algorithm models of all features combinations,this new model is successfully constructed based on the random forest classification method with a new combination of features and it obtains better prediction results.Simultaneously,it further shows the degree of feature parameters influence on GFA.Finally,a normalized evaluation indicator of binary alloy for machine learning model performance is put forward for the first time.The result shows that the application of machine learning in MGs is valuable. 展开更多
关键词 GFA random forest binary alloy machine learning
在线阅读 下载PDF
Cipherchain:A Secure and Efficient Ciphertext Blockchain via mPECK 被引量:2
12
作者 Hailin Chen Gang Xu +5 位作者 Yuling Chen Xiubo Chen Yixian Yang Ruibin Fan Kaixiang Zhang Huizhong Li journal of quantum computing 2020年第1期57-83,共27页
Most existing blockchain schemes are based on the design concept“openness and transparency”to realize data security,which usually require transaction data to be presented in the form of plaintext.However,it inevitab... Most existing blockchain schemes are based on the design concept“openness and transparency”to realize data security,which usually require transaction data to be presented in the form of plaintext.However,it inevitably brings the issues with respect to data privacy and operating performance.In this paper,we proposed a novel blockchain scheme called Cipherchain,which can process and maintain transaction data in the form of ciphertext while the characteristics of immutability and auditability are guaranteed.Specifically in our scheme,transactions can be encrypted locally based on a searchable encryption scheme called multi-user public key encryption with conjunctive keyword search(mPECK),and can be accessed by multiple specific participants after appended to the globally consistent distributed ledger.By introducing execution-consensus-update paradigm of transaction flow,Cipherchain cannot only make it possible for transaction data to exist in the form of ciphertext,but also guarantee the overall system performance not greatly affected by cryptographic operations and other local execution work.In addition,Cipherchain is a promising scheme to realize the technology combination of“blockchain+cloud computing”and“permissioned blockchain+public blockchain”. 展开更多
关键词 Blockchain Cipherchain cloud computing mPECK
在线阅读 下载PDF
An Ui Design Optimization Strategy for General App in Big Data Environment 被引量:1
13
作者 Hangjun Zhou Jieyu Zhou +5 位作者 Guang Sun Wangdong Jiang Chuntian Luo Xiaoping Fan Haowen Zhang Haoran Zhang journal of quantum computing 2019年第2期65-80,共16页
Due to the huge amount of increasing data, the requirements of people forelectronic products such as mobile phones, tablets, and notebooks are constantlyimproving. The development and design of various software applic... Due to the huge amount of increasing data, the requirements of people forelectronic products such as mobile phones, tablets, and notebooks are constantlyimproving. The development and design of various software applications attach greatimportance to users’ experiences. The rationalized UI design should allow a user not onlyenjoy the visual design experience of the new product but also operating it morepleasingly. This process is to enhance the attractiveness and performance of the newproduct and thus to promote the active usage and consuming conduct of users. In thispaper, an UI design optimization strategy for general APP in the big data environment isproposed to get better user experience while effectively obtaining information. Anexperimental example of a library APP is designed to optimize the user experience. Theexperimental results show that the user-centered UI design is the core of optimization,and user portrait based on big data platforms is the key to UI design. 展开更多
关键词 UI design big data general APP user portrait
在线阅读 下载PDF
Hierarchical Geographically Weighted Regression Model 被引量:1
14
作者 Fengchang Xue journal of quantum computing 2019年第1期9-20,共12页
In spatial analysis, two problems of the scale effect and the spatial dependencehave been plagued scholars, the first law of geography presented to solve the spatialdependence has played a good role in the guidelines,... In spatial analysis, two problems of the scale effect and the spatial dependencehave been plagued scholars, the first law of geography presented to solve the spatialdependence has played a good role in the guidelines, forming the Geographical WeightedRegression (GWR). Based on classic statistical techniques, GWR model has ascertainsignificance in solving spatial dependence and spatial non-uniform problems, but it hasno impact on the integration of the scale effect. It does not consider the interactionbetween the various factors of the sampling scale observations and the numerous factorsof possible scale effects, so there is a loss of information. Crossing a two-stage analysisof “return of regression” to establish the model of Hierarchical Geographically WeightedRegression (HGWR), the first layer of regression analysis reflects the spatial dependenceof space samples and the second layer of the regression reflects the spatial relationshipsscaling. The combination of both solves the spatial scale effect analysis, spatialdependence and spatial heterogeneity of the combined effects. 展开更多
关键词 Geographic information regression analysis scale effect spatial dependence
在线阅读 下载PDF
Protein Secondary Structure Prediction with Dynamic Self-Adaptation Combination Strategy Based on Entropy 被引量:1
15
作者 Yuehan Du Ruoyu Zhang +4 位作者 Xu Zhang Antai Ouyang Xiaodong Zhang Jinyong Cheng Wenpeng Lu journal of quantum computing 2019年第1期21-28,共8页
The algorithm based on combination learning usually is superior to a singleclassification algorithm on the task of protein secondary structure prediction. However,the assignment of the weight of the base classifier us... The algorithm based on combination learning usually is superior to a singleclassification algorithm on the task of protein secondary structure prediction. However,the assignment of the weight of the base classifier usually lacks decision-makingevidence. In this paper, we propose a protein secondary structure prediction method withdynamic self-adaptation combination strategy based on entropy, where the weights areassigned according to the entropy of posterior probabilities outputted by base classifiers.The higher entropy value means a lower weight for the base classifier. The final structureprediction is decided by the weighted combination of posterior probabilities. Extensiveexperiments on CB513 dataset demonstrates that the proposed method outperforms theexisting methods, which can effectively improve the prediction performance. 展开更多
关键词 Multi-classifier combination ENTROPY protein secondary structure prediction dynamic self-adaptation
在线阅读 下载PDF
Near Term Hybrid Quantum Computing Solution to the Matrix Riccati Equations 被引量:1
16
作者 Augusto Gonzalez Bonorino Malick Ndiaye Casimer DeCusatis journal of quantum computing 2022年第3期135-146,共12页
The well-known Riccati differential equations play a key role in many fields,including problems in protein folding,control and stabilization,stochastic control,and cybersecurity(risk analysis and malware propaga-tion)... The well-known Riccati differential equations play a key role in many fields,including problems in protein folding,control and stabilization,stochastic control,and cybersecurity(risk analysis and malware propaga-tion).Quantum computer algorithms have the potential to implement faster approximate solutions to the Riccati equations compared with strictly classical algorithms.While systems with many qubits are still under development,there is significant interest in developing algorithms for near-term quantum computers to determine their accuracy and limitations.In this paper,we propose a hybrid quantum-classical algorithm,the Matrix Riccati Solver(MRS).This approach uses a transformation of variables to turn a set of nonlinear differential equation into a set of approximate linear differential equations(i.e.,second order non-constant coefficients)which can in turn be solved using a version of the Harrow-Hassidim-Lloyd(HHL)quantum algorithm for the case of Hermitian matrices.We implement this approach using the Qiskit language and compute near-term results using a 4 qubit IBM Q System quantum computer.Comparisons with classical results and areas for future research are discussed. 展开更多
关键词 Quantum computing matrix ricatti equations differential equations qiskit hybrid algorithm HHL algorithm
在线阅读 下载PDF
Weighted Particle Swarm Clustering Algorithm for Self-Organizing Maps 被引量:1
17
作者 Guorong Cui Hao Li +4 位作者 Yachuan Zhang Rongjing Bu Yan Kang Jinyuan Li Yang Hu journal of quantum computing 2020年第2期85-95,共11页
The traditional K-means clustering algorithm is difficult to determine the cluster number,which is sensitive to the initialization of the clustering center and easy to fall into local optimum.This paper proposes a clu... The traditional K-means clustering algorithm is difficult to determine the cluster number,which is sensitive to the initialization of the clustering center and easy to fall into local optimum.This paper proposes a clustering algorithm based on self-organizing mapping network and weight particle swarm optimization SOM&WPSO(Self-Organization Map and Weight Particle Swarm Optimization).Firstly,the algorithm takes the competitive learning mechanism of a self-organizing mapping network to divide the data samples into coarse clusters and obtain the clustering center.Then,the obtained clustering center is used as the initialization parameter of the weight particle swarm optimization algorithm.The particle position of the WPSO algorithm is determined by the traditional clustering center is improved to the sample weight,and the cluster center is the“food”of the particle group.Each particle moves toward the nearest cluster center.Each iteration optimizes the particle position and velocity and uses K-means and K-medoids recalculates cluster centers and cluster partitions until the end of the algorithm convergence iteration.After a lot of experimental analysis on the commonly used UCI data set,this paper not only solves the shortcomings of K-means clustering algorithm,the problem of dependence of the initial clustering center,and improves the accuracy of clustering,but also avoids falling into the local optimum.The algorithm has good global convergence. 展开更多
关键词 Self-organizing map weight particle swarm K-MEANS K-medoids global convergence
在线阅读 下载PDF
A Novel Intrusion Detection Algorithm Based on Long Short Term Memory Network 被引量:1
18
作者 Xinda Hao Jianmin Zhou +1 位作者 Xueqi Shen Yu Yang journal of quantum computing 2020年第2期97-104,共8页
In recent years,machine learning technology has been widely used for timely network attack detection and classification.However,due to the large number of network traffic and the complex and variable nature of malicio... In recent years,machine learning technology has been widely used for timely network attack detection and classification.However,due to the large number of network traffic and the complex and variable nature of malicious attacks,many challenges have arisen in the field of network intrusion detection.Aiming at the problem that massive and high-dimensional data in cloud computing networks will have a negative impact on anomaly detection,this paper proposes a Bi-LSTM method based on attention mechanism,which learns by transmitting IDS data to multiple hidden layers.Abstract information and high-dimensional feature representation in network data messages are used to improve the accuracy of intrusion detection.In the experiment,we use the public data set KDD-Cup 99 for verification.The experimental results show that the model can effectively detect unpredictable malicious behaviors under the current network environment,improve detection accuracy and reduce false positive rate compared with traditional intrusion detection methods. 展开更多
关键词 Bi-LSTM kdd-cup99 intrusion detection deep learning
在线阅读 下载PDF
A Survey of Time Series Data Visualization Methods 被引量:1
19
作者 Wangdong Jiang Jie Wu +3 位作者 Guang Sun Yuxin Ouyang Jing Li Shuang Zhou journal of quantum computing 2020年第2期105-117,共13页
In the era of big data,the general public is more likely to access big data,but they wouldn’t like to analyze the data.Therefore,the traditional data visualization with certain professionalism is not easy to be accep... In the era of big data,the general public is more likely to access big data,but they wouldn’t like to analyze the data.Therefore,the traditional data visualization with certain professionalism is not easy to be accepted by the general public living in the fast pace.Under this background,a new general visualization method for dynamic time series data emerges as the times require.Time series data visualization organizes abstract and hard-to-understand data into a form that is easily understood by the public.This method integrates data visualization into short videos,which is more in line with the way people get information in modern fast-paced lifestyles.The modular approach also facilitates public participation in production.This paper summarizes the dynamic visualization methods of time series data ranking,studies the relevant literature,shows its value and existing problems,and gives corresponding suggestions and future research prospects. 展开更多
关键词 Dynamic visualization historical ranking of time series data VIDEO big data
在线阅读 下载PDF
Smart Contract Fuzzing Based on Taint Analysis and Genetic Algorithms 被引量:1
20
作者 Zaoyu Wei Jiaqi Wang +1 位作者 Xueqi Shen Qun Luo journal of quantum computing 2020年第1期11-24,共14页
Smart contract has greatly improved the services and capabilities of blockchain,but it has become the weakest link of blockchain security because of its code nature.Therefore,efficient vulnerability detection of smart... Smart contract has greatly improved the services and capabilities of blockchain,but it has become the weakest link of blockchain security because of its code nature.Therefore,efficient vulnerability detection of smart contract is the key to ensure the security of blockchain system.Oriented to Ethereum smart contract,the study solves the problems of redundant input and low coverage in the smart contract fuzz.In this paper,a taint analysis method based on EVM is proposed to reduce the invalid input,a dangerous operation database is designed to identify the dangerous input,and genetic algorithm is used to optimize the code coverage of the input,which construct the fuzzing framework for smart contract together.Finally,by comparing Oyente and ContractFuzzer,the performance and efficiency of the framework are proved. 展开更多
关键词 Smart contract FUZZING taint analysis genetic algorithms
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部