期刊文献+
共找到276篇文章
< 1 2 14 >
每页显示 20 50 100
An Iterated Greedy Algorithm with Memory and Learning Mechanisms for the Distributed Permutation Flow Shop Scheduling Problem
1
作者 Binhui Wang Hongfeng Wang 《Computers, Materials & Continua》 SCIE EI 2025年第1期371-388,共18页
The distributed permutation flow shop scheduling problem(DPFSP)has received increasing attention in recent years.The iterated greedy algorithm(IGA)serves as a powerful optimizer for addressing such a problem because o... The distributed permutation flow shop scheduling problem(DPFSP)has received increasing attention in recent years.The iterated greedy algorithm(IGA)serves as a powerful optimizer for addressing such a problem because of its straightforward,single-solution evolution framework.However,a potential draw-back of IGA is the lack of utilization of historical information,which could lead to an imbalance between exploration and exploitation,especially in large-scale DPFSPs.As a consequence,this paper develops an IGA with memory and learning mechanisms(MLIGA)to efficiently solve the DPFSP targeted at the mini-malmakespan.InMLIGA,we incorporate a memory mechanism to make a more informed selection of the initial solution at each stage of the search,by extending,reconstructing,and reinforcing the information from previous solutions.In addition,we design a twolayer cooperative reinforcement learning approach to intelligently determine the key parameters of IGA and the operations of the memory mechanism.Meanwhile,to ensure that the experience generated by each perturbation operator is fully learned and to reduce the prior parameters of MLIGA,a probability curve-based acceptance criterion is proposed by combining a cube root function with custom rules.At last,a discrete adaptive learning rate is employed to enhance the stability of the memory and learningmechanisms.Complete ablation experiments are utilized to verify the effectiveness of the memory mechanism,and the results show that this mechanism is capable of improving the performance of IGA to a large extent.Furthermore,through comparative experiments involving MLIGA and five state-of-the-art algorithms on 720 benchmarks,we have discovered that MLI-GA demonstrates significant potential for solving large-scale DPFSPs.This indicates that MLIGA is well-suited for real-world distributed flow shop scheduling. 展开更多
关键词 Distributed permutation flow shop scheduling MAKESPAN iterated greedy algorithm memory mechanism cooperative reinforcement learning
在线阅读 下载PDF
两个一维总体分布相等性的permutation检验 被引量:4
2
作者 黄群 林洁梅 赵佳因 《辽宁工程技术大学学报(自然科学版)》 CAS 北大核心 2012年第6期929-932,共4页
检验两个一维总体分布的相等性,采用理论证明和数值模拟的方法,在Prastgaard提出的Kolmogorov-Smirnov统计量T1及相应的permutation统计量T 1基础上,提出了基于K-S统计量的新统计量T2及相应的permutation统计量T 2,研究了在一维的情形... 检验两个一维总体分布的相等性,采用理论证明和数值模拟的方法,在Prastgaard提出的Kolmogorov-Smirnov统计量T1及相应的permutation统计量T 1基础上,提出了基于K-S统计量的新统计量T2及相应的permutation统计量T 2,研究了在一维的情形下T2与T 2的分布,并进行了数值模拟.结果表明:新统计量在原假设下有相同的极限分布,数值模拟结果优于原统计量.该方法对检验两总体分布的相等性有一定的参考价值. 展开更多
关键词 permutation方法 K-S统计量 permutation统计量 假设检验 统计推断 经验分布函数 极限分布 数值模拟
在线阅读 下载PDF
Sign-Balanced Pattern-Avoiding Permutation Classes
3
作者 Junyao PAN Pengfei GUO 《Journal of Mathematical Research with Applications》 2025年第4期427-436,共10页
A set of permutations is called sign-balanced if the set contains the same number of even permutations as odd permutations.Let S_(n)(σ_(1),σ_(2),...,σ_(r))denote the set of permutations in the symmetric group S_(n)... A set of permutations is called sign-balanced if the set contains the same number of even permutations as odd permutations.Let S_(n)(σ_(1),σ_(2),...,σ_(r))denote the set of permutations in the symmetric group S_(n)which avoid patternsσ_(1),σ_(2),...,σ_(r).The aim of this paper is to investigate when,for certain patternsσ_(1),σ_(2),...,σ_(r),S_(n)(σ_(1),σ_(2),...,σ_(r))is sign-balanced for every integer n>1.We prove that for any{σ_(1),σ_(2),...,σ_(r)}?S_3,if{σ_(1),σ_(2),...,σ_(r)}is sign-balanced except for{132,213,231,312},then S_(n)(σ_(1),σ_(2),...,σ_(r))is sign-balanced for every integer n>1.In addition,we give some results in the case of avoiding some patterns of length 4. 展开更多
关键词 permutation sign-balanced symmetric group avoid patterns
原文传递
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
4
作者 Ibtisam A.Taqi Sarab M.Hameed 《Computers, Materials & Continua》 2025年第10期1653-1674,共22页
The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information.Due to high processing requirements,tr... The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information.Due to high processing requirements,traditional encryption algorithms demand considerable computational effort for real-time audio encryption.To address these challenges,this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps.The audio data is first shuffled using Tent map for the random permutation.The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map.Finally,the Exclusive OR(XOR)operation is applied between the generated key and the shuffled audio to yield the cipher audio.The experimental results prove that the proposed method surpassed the other techniques by encrypting two types of audio files,as mono and stereo audio files with large sizes up to 122 MB,different sample rates 22,050,44,100,48,000,and 96,000 for WAV and 44,100 sample rates for MP3 of size 11 MB.The results show high Mean Square Error(MSE),low Signal-to-Noise Ratio(SNR),spectral distortion,100%Number of Sample Change Rate(NSCR),high Percent Residual Deviation(PRD),low Correlation Coefficient(CC),large key space 2^(616),high sensitivity to a slight change in the secret key and that it can counter several attacks,namely brute force attack,statistical attack,differential attack,and noise attack. 展开更多
关键词 Wave protection 1D logistic map Tent map random permutation key generation
在线阅读 下载PDF
Layer-2 transferable belief model:Manage uncertainty on random permutation sets
5
作者 Qian-Li Zhou Yong Deng 《Journal of Electronic Science and Technology》 2025年第2期52-64,共13页
In this paper,the transferable belief model established on power sets is extended to the permutation event space(PES)and is referred to as the layer-2 transferable belief model.Our goal is to provide a comprehensive a... In this paper,the transferable belief model established on power sets is extended to the permutation event space(PES)and is referred to as the layer-2 transferable belief model.Our goal is to provide a comprehensive approach for handling and modeling uncertainty,capable of representing both quantitative and qualitative information.First,the motivation for proposing the layer-2 transferable belief model and its information processing principles are explored from the perspective of weak propensity.Then,based on these principles,the corresponding information processing methods for the credal and pignistic levels are developed.Finally,the advantages of this model are validated through a classifier that leverages attribute fusion to enhance performance and decision-making accuracy. 展开更多
关键词 Evidence theory Information processing Information fusion Layer-2 belief structure Random permutation set
在线阅读 下载PDF
Efficient implementation of quantum permutation algorithm using a polar SrO molecule in pendular states
6
作者 Jie-Ru Hu Zuo-Yuan Zhang Jin-Ming Liu 《Communications in Theoretical Physics》 2025年第2期39-51,共13页
Quantum algorithms offer more enhanced computational efficiency in comparison to their classical counterparts when solving specific tasks.In this study,we implement the quantum permutation algorithm utilizing a polar ... Quantum algorithms offer more enhanced computational efficiency in comparison to their classical counterparts when solving specific tasks.In this study,we implement the quantum permutation algorithm utilizing a polar molecule within an external electric field.The selection of the molecular qutrit involves the utilization of field-dressed states generated through the pendular modes of SrO.Through the application of multi-target optimal control theory,we strategically design microwave pulses to execute logical operations,including Fourier transform,oracle U_(f)operation,and inverse Fourier transform within a three-level molecular qutrit structure.The observed high fidelity of our outcomes is intricately linked to the concept of the quantum speed limit,which quantifies the maximum speed of quantum state manipulation.Subsequently,we design the optimized pulse sequence to successfully simulate the quantum permutation algorithm on a single SrO molecule,achieving remarkable fidelity.Consequently,a quantum circuit comprising a single qutrit suffices to determine permutation parity with just a single function evaluation.Therefore,our results indicate that the optimal control theory can be well applied to the quantum computation of polar molecular systems. 展开更多
关键词 polar molecule optimal control quantum permutation algorithm pendular states
原文传递
A Note on a Class of Permutation Quadrinomials of F_(q^(2))
7
作者 QIN Xiaoer GUO Xiaonan +1 位作者 QIU Yinuo YAN Li 《Wuhan University Journal of Natural Sciences》 2025年第3期231-234,共4页
Constructing permutation polynomials is a hot topic in finite fields,and permutation polynomials have many applications in dif‐ferent areas.In this paper,by using monomials on the cosets of a subgroup to characterize... Constructing permutation polynomials is a hot topic in finite fields,and permutation polynomials have many applications in dif‐ferent areas.In this paper,by using monomials on the cosets of a subgroup to characterize the permutational property of rational functions onμq+1,we construct a class of permutation quadrinomials with the form f_(r,a,b,c,s,t,u)(x)=x^(r)(1+ax^(s(q-1))+bx^(t(q-1))+cxu(q-1))of F_(q^(2)). 展开更多
关键词 permutation quadrinomials MONOMIALS finite fields
原文传递
REVERSIBLE LOGIC GATE NETWORK CASCADE BASED ON PERMUTATION GROUP 被引量:1
8
作者 管致锦 秦小麟 戴华 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第3期219-223,共5页
The cascade of reversible logic gate network with n inputs and n outputs forms a group isomorphic to the symmetric group S2^n. Characteristics of a number of gates from the set of all generalized Toffoli gates are stu... The cascade of reversible logic gate network with n inputs and n outputs forms a group isomorphic to the symmetric group S2^n. Characteristics of a number of gates from the set of all generalized Toffoli gates are studied. Any permutation Sn is proved to be generated by a n-cycle 9 and a permutation τ= (ij,ik) together. It shows that any neighboring 2-cycle permutation can be generated by at most two NOT gates without ancilla bit. Based on the above theory, a cascade algorithm for reversible logic gate networks is proposed. A reversible example of logic gate network cascade is given to show the correctness of the algorithm. 展开更多
关键词 logic gates cascade connection permutation group
在线阅读 下载PDF
Bootstrap和Permutation方法在样本率多重比较中的应用 被引量:3
9
作者 钱俊 陈平雁 《中国医院统计》 2008年第1期43-45,共3页
目的介绍Bootstrap和Permutation方法在样本率多重比较中的应用。方法调用SAS中的MULTTEST过程,编写程序实现样本率的两两比较和与控制组比较,并通过实例说明效果。结果运用Bootstrap和Permutation方法能较好解决样本率的多重比较问题... 目的介绍Bootstrap和Permutation方法在样本率多重比较中的应用。方法调用SAS中的MULTTEST过程,编写程序实现样本率的两两比较和与控制组比较,并通过实例说明效果。结果运用Bootstrap和Permutation方法能较好解决样本率的多重比较问题。结论使用Bootstrap和Permutation方法的SAS程序,简单明了,结果准确,使用方便。 展开更多
关键词 BOOTSTRAP permutation 样本率 多重比较
暂未订购
Fractal sorting vector-based least significant bit chaotic permutation for image encryption 被引量:1
10
作者 Yong-Jin Xian Xing-Yuan Wang +2 位作者 Ying-Qian Zhang Xiao-Yu Wang Xiao-Hui Du 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第6期226-235,共10页
The image's least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV... The image's least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV-LSBCP) is a novel chaotic image encryption cryptosystem introduced in this article. The FSV-LSBCP effectively strengthens the security of the cryptographic scheme concerning the properties of the FSV. Key analysis, statistical analysis, resistance differential attack analysis, and resistance to cropping attacks and noise attacks are the focus of the suggested image encryption cryptosystem. The security experiment shows that the cryptosystem is adequate to achieve the desired degree of security. 展开更多
关键词 chaotic image encryption fractal sorting vector bit-level permutation FSV-based LSB chaotic permutation
原文传递
Matching spatial relation graphs using a constrained partial permutation strategy
11
作者 徐晓刚 孙正兴 刘文印 《Journal of Southeast University(English Edition)》 EI CAS 2003年第3期236-239,共4页
A constrained partial permutation strategy is proposed for matching spatial relation graph (SRG), which is used in our sketch input and recognition system Smart Sketchpad for representing the spatial relationship amon... A constrained partial permutation strategy is proposed for matching spatial relation graph (SRG), which is used in our sketch input and recognition system Smart Sketchpad for representing the spatial relationship among the components of a graphic object. Using two kinds of matching constraints dynamically generated in the matching process, the proposed approach can prune most improper mappings between SRGs during the matching process. According to our theoretical analysis in this paper, the time complexity of our approach is O(n 2) in the best case, and O(n!) in the worst case, which occurs infrequently. The spatial complexity is always O(n) for all cases. Implemented in Smart Sketchpad, our proposed strategy is of good performance. 展开更多
关键词 spatial relation graph graph matching constrained partial permutation graphics recognition
在线阅读 下载PDF
Constructing Permutation Binomials from Permutations of Subfields
12
作者 QIN Xiaoer YAN Li 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2020年第4期330-336,共7页
Permutation polynomials is a hot topic in finite fields,they have many applications in different areas.Permutation binomials and trinomials over finite fields were studied recently.In thispaper,by using a powerful lem... Permutation polynomials is a hot topic in finite fields,they have many applications in different areas.Permutation binomials and trinomials over finite fields were studied recently.In thispaper,by using a powerful lemma given by Zieve and some degree 5 and 6 permutation polynomials over Fq,we construct somepermutation binomials over Fqm. 展开更多
关键词 finite field permutation binomials normalized permutation polynomials
原文传递
On the Representations of Γ1-Nonderanged Permutation Group gp
13
作者 Ibrahim A. Aminu Ejima Ojonugwa Kazeem O. Aremu 《Advances in Pure Mathematics》 2016年第9期608-614,共7页
Representation theory is concerned with the ways of explaining or visualizing a group as a group of matrices. In this paper, we extend the permutation pattern of to a two-line notation. We consider the representations... Representation theory is concerned with the ways of explaining or visualizing a group as a group of matrices. In this paper, we extend the permutation pattern of to a two-line notation. We consider the representations of this non-deranged permutation group(p ≥ 5 and p a prime). Also we reveal some interesting properties and results of the character of where . 展开更多
关键词 Representation Non-Deranged permutation Group Γ1-permutation Group Fgp-Module CHARACTER
在线阅读 下载PDF
Microseismic signal denoising by combining variational mode decomposition with permutation entropy 被引量:7
14
作者 Zhang Xing-Li Cao Lian-Yue +2 位作者 Chen Yan Jia Rui-Sheng Lu Xin-Ming 《Applied Geophysics》 SCIE CSCD 2022年第1期65-80,144,145,共18页
Remarkable progress has been achieved on microseismic signal denoising in recent years,which is the basic component for rock-burst detection.However,its denoising effectiveness remains unsatisfactory.To extract the ef... Remarkable progress has been achieved on microseismic signal denoising in recent years,which is the basic component for rock-burst detection.However,its denoising effectiveness remains unsatisfactory.To extract the effective microseismic signal from polluted noisy signals,a novel microseismic signal denoising method that combines the variational mode decomposition(VMD)and permutation entropy(PE),which we denote as VMD–PE,is proposed in this paper.VMD is a recently introduced technique for adaptive signal decomposition,where K is an important decomposing parameter that determines the number of modes.VMD provides a predictable eff ect on the nature of detected modes.In this work,we present a method that addresses the problem of selecting an appropriate K value by constructing a simulation signal whose spectrum is similar to that of a mine microseismic signal and apply this value to the VMD–PE method.In addition,PE is developed to identify the relevant effective microseismic signal modes,which are reconstructed to realize signal filtering.The experimental results show that the VMD–PE method remarkably outperforms the empirical mode decomposition(EMD)–VMD filtering and detrended fl uctuation analysis(DFA)–VMD denoising methods of the simulated and real microseismic signals.We expect that this novel method can inspire and help evaluate new ideas in this field. 展开更多
关键词 DENOISING Microseismic signal permutation entropy Variational mode decomposition
在线阅读 下载PDF
Walsh Spectral Characteristics and the Auto-Correlation Function Characteristics of Forming Orthomorphic Permutations of Multi-Output Functions 被引量:4
15
作者 ZHAO Yaqun WANG Jue 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1895-1898,共4页
Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalize... Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalized Walsh spectrum of multi-output functions and the auto-correlation function of multi-output functions to investigate the Walsh spectral characteristics and the auto-correlation function characteristics of orthormophic permutations, several results are obtained. 展开更多
关键词 orthomorphic permutation multi-output functions walsh spectral auto-correlation function
在线阅读 下载PDF
Decryption of pure-position permutation algorithms 被引量:3
16
作者 赵晓宇 陈刚 +2 位作者 张亶 王肖虹 董光昌 《Journal of Zhejiang University Science》 EI CSCD 2004年第7期803-809,共7页
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ... Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown. 展开更多
关键词 DECRYPTION Image encryption FUZZY Position permutation
在线阅读 下载PDF
Anomalies in Special Permutation Flow Shop Scheduling Problems 被引量:3
17
作者 Lin Gui Liang Gao Xinyu Li 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2020年第3期53-59,共7页
Recent researches show that there are some anomalies,which are not satisfied with common sense,appearing in some special permutation flow shop scheduling problems(PFSPs).These anomalies can be divided into three diffe... Recent researches show that there are some anomalies,which are not satisfied with common sense,appearing in some special permutation flow shop scheduling problems(PFSPs).These anomalies can be divided into three different types,such as changing the processing time of some operations,changing the number of total jobs and changing the number of total machines.This paper summarizes these three types of anomalies showing in the special PFSPs and gives some examples to make them better understood.The extended critical path is proposed and the reason why these anomalies happen in special PFSPs is given:anomalies will occur in these special PFSPs when the time of the operations on the reverse critical path changes.After that,the further reason for these anomalies is presented that when any one of these three types of anomalies happens,the original constraint in the special PFSPs is destroyed,which makes the anomalies appear.Finally,the application of these anomalies in production practice is given through examples and also with the possible research directions.The main contribution of this research is analyzing the intial reason why the anomalies appear in special PFSPs and pointing out the application and the possible research directions of all these three types of anomalies. 展开更多
关键词 SCHEDULING permutation flow shop ANOMALY
在线阅读 下载PDF
Morphology Similarity Distance for Bearing Fault Diagnosis Based on Multi-Scale Permutation Entropy 被引量:3
18
作者 Jinbao Zhang Yongqiang Zhao +1 位作者 Lingxian Kong Ming Liu 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2020年第1期1-9,共9页
Bearings are crucial components in rotating machines,which have direct effects on industrial productivity and safety.To fast and accurately identify the operating condition of bearings,a novel method based on multi⁃sc... Bearings are crucial components in rotating machines,which have direct effects on industrial productivity and safety.To fast and accurately identify the operating condition of bearings,a novel method based on multi⁃scale permutation entropy(MPE)and morphology similarity distance(MSD)is proposed in this paper.Firstly,the MPE values of the original signals were calculated to characterize the complexity in different scales and they constructed feature vectors after normalization.Then,the MSD was employed to measure the distance among test samples from different fault types and the reference samples,and achieved classification with the minimum MSD.Finally,the proposed method was verified with two experiments concerning artificially seeded damage bearings and run⁃to⁃failure bearings,respectively.Different categories were considered for the two experiments and high classification accuracies were obtained.The experimental results indicate that the proposed method is effective and feasible in bearing fault diagnosis. 展开更多
关键词 bearing fault diagnosis multi⁃scale permutation entropy morphology similarity distance
在线阅读 下载PDF
A WATERMARKING ALGORITHM BASED ON PERMUTATION AND 2-D BARCODE 被引量:2
19
作者 Ji Zhen Zhang Jihong Xie Weixin (Faculty of Information Engineering, Shenzhen University, Shenzhen 518060) 《Journal of Electronics(China)》 2001年第4期375-381,共7页
This letter presents a method for digital image watermarking for copyright protection. This technique produces a watermarked image that closely retains the quality of the original host image while concurrently survivi... This letter presents a method for digital image watermarking for copyright protection. This technique produces a watermarked image that closely retains the quality of the original host image while concurrently surviving various image processing operations such as lowpass/highpass filtering, lossy JPEG compression, and cropping. This image watermarking algorithm takes full advantage of permutation and 2-D barcode (PDF417). The actual watermark embedding in spatial domain is followed using permutated image for improving the resistance to image cropping. Much higher watermark robustness is obtainable via a simple forward error correction technique, which is the main feature of PDF417 codes. Additional features of this technique include the easy determination of the existence of the watermark and that the watermark verification procedure does not need the original host image. The experimental results demonstrate its effectiveness. 展开更多
关键词 DIGITAL WATERMARK permutation 2-D BARCODE PDF417
在线阅读 下载PDF
NEW CONSTRUCTIONS OF LDPC CODES BASED ON CIRCULANT PERMUTATION MATRICES FOR AWGN CHANNEL 被引量:2
20
作者 Song Zixi Zhang Lijun 《Journal of Electronics(China)》 2014年第2期85-91,共7页
Two new design approaches for constructing Low-Density Parity-Check(LDPC) codes are proposed.One is used to design regular Quasi-Cyclic LDPC(QC-LDPC) codes with girth at least 8.The other is used to design irregular L... Two new design approaches for constructing Low-Density Parity-Check(LDPC) codes are proposed.One is used to design regular Quasi-Cyclic LDPC(QC-LDPC) codes with girth at least 8.The other is used to design irregular LDPC codes.Both of their parity-check matrices are composed of Circulant Permutation Matrices(CPMs).When iteratively decoded with the Sum-Product Algorithm(SPA),these proposed codes exhibit good performances over the AWGN channel. 展开更多
关键词 Circulant permutation Matrices(CPMs) Euclidean geometry Error floor Irregular LDPC codes Quasi-cyclic
在线阅读 下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部