In this paper,we propose a new full-Newton step feasible interior-point algorithm for the special weighted linear complementarity problems.The proposed algorithm employs the technique of algebraic equivalent transform...In this paper,we propose a new full-Newton step feasible interior-point algorithm for the special weighted linear complementarity problems.The proposed algorithm employs the technique of algebraic equivalent transformation to derive the search direction.It is shown that the proximity measure reduces quadratically at each iteration.Moreover,the iteration bound of the algorithm is as good as the best-known polynomial complexity for these types of problems.Furthermore,numerical results are presented to show the efficiency of the proposed algorithm.展开更多
The aim of this paper is to price power option with its underlying asset price following exponential normal inverse gaussian(NIG)process.We first find the risk neutral equivalent martingale measure Q by Esscher transf...The aim of this paper is to price power option with its underlying asset price following exponential normal inverse gaussian(NIG)process.We first find the risk neutral equivalent martingale measure Q by Esscher transform.Then,using the Fourier transform and its inverse,we derive the analytical pricing formulas of power options which are expressed in the form of Fourier integral.In addition,the fast Fourier transform(FFT)algorithm is applied to calculate these pricing formulas.Finally,Shangzheng 50ETF options are chosen to test our results.Estimating the parameters in NIG process by maximum likelihood method,we show that the NIG prices are much closer to market prices than the Black-Scholes-Merton(BSM)ones.展开更多
Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution,tampering,and copyright infringement.This study introduces a novel hybrid watermarking framework that...Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution,tampering,and copyright infringement.This study introduces a novel hybrid watermarking framework that integrates Discrete Wavelet Transform(DWT),Redundant Discrete Wavelet Transform(RDWT),and Möbius Transformations(MT),with optimization of transformation parameters achieved via a Genetic Algorithm(GA).By combining frequency and spatial domain techniques,the proposed method significantly enhances both the imper-ceptibility and robustness of watermark embedding.The approach leverages DWT and RDWT for multi-resolution decomposition,enabling watermark insertion in frequency subbands that balance visibility and resistance to attacks.RDWT,in particular,offers shift-invariance,which improves performance under geometric transformations.Möbius transformations are employed for spatial manipulation,providing conformal mapping and spatial dispersion that fortify watermark resilience against rotation,scaling,and translation.The GA dynamically optimizes the Möbius parameters,selecting configurations that maximize robustness metrics such as Peak Signal-to-Noise Ratio(PSNR),Structural Similarity Index Measure(SSIM),Bit Error Rate(BER),and Normalized Cross-Correlation(NCC).Extensive experiments conducted on medical and standard benchmark images demonstrate the efficacy of the proposed RDWT-MT scheme.Results show that PSNR exceeds 68 dB,SSIM approaches 1.0,and BER remains at 0.0000,indicating excellent imperceptibility and perfect watermark recovery.Moreover,the method exhibits exceptional resilience to a wide range of image processing attacks,including Gaussian noise,JPEG compression,histogram equalization,and cropping,achieving NCC values close to or equal to 1.0.Comparative evaluations with state-of-the-art watermarking techniques highlight the superiority of the proposed method in terms of robustness,fidelity,and computational efficiency.The hybrid framework ensures secure,adaptive watermark embedding,making it highly suitable for applications in digital rights management,content authentication,and medical image protection.The integration of spatial and frequency domain features with evolutionary optimization presents a promising direction for future watermarking technologies.展开更多
An improved version of the sparse A^(*)algorithm is proposed to address the common issue of excessive expansion of nodes and failure to consider current ship status and parameters in traditional path planning algorith...An improved version of the sparse A^(*)algorithm is proposed to address the common issue of excessive expansion of nodes and failure to consider current ship status and parameters in traditional path planning algorithms.This algorithm considers factors such as initial position and orientation of the ship,safety range,and ship draft to determine the optimal obstacle-avoiding route from the current to the destination point for ship planning.A coordinate transformation algorithm is also applied to convert commonly used latitude and longitude coordinates of ship travel paths to easily utilized and analyzed Cartesian coordinates.The algorithm incorporates a hierarchical chart processing algorithm to handle multilayered chart data.Furthermore,the algorithm considers the impact of ship length on grid size and density when implementing chart gridification,adjusting the grid size and density accordingly based on ship length.Simulation results show that compared to traditional path planning algorithms,the sparse A^(*)algorithm reduces the average number of path points by 25%,decreases the average maximum storage node number by 17%,and raises the average path turning angle by approximately 10°,effectively improving the safety of ship planning paths.展开更多
The accurate estimation of lithium battery state of health(SOH)plays an important role in the health management of battery systems.In order to improve the prediction accuracy of SOH,this paper proposes a stochastic co...The accurate estimation of lithium battery state of health(SOH)plays an important role in the health management of battery systems.In order to improve the prediction accuracy of SOH,this paper proposes a stochastic configuration network based on a multi-converged black-winged kite search algorithm,called SBKA-CLSCN.Firstly,the indirect health index(HI)of the battery is extracted by combining it with Person correlation coefficients in the battery charging and discharging cycle point data.Secondly,to address the problem that the black-winged kite optimization algorithm(BKA)falls into the local optimum problem and improve the convergence speed,the Sine chaotic black-winged kite search algorithm(SBKA)is designed,which mainly utilizes the Sine mapping and the golden-sine strategy to enhance the algorithm’s global optimality search ability;secondly,the Cauchy distribution and Laplace regularization techniques are used in the SCN model,which is referred to as CLSCN,thereby improving the model’s overall search capability and generalization ability.Finally,the performance of SBKA and SBKA-CLSCN is evaluated using eight benchmark functions and the CALCE battery dataset,respectively,and compared in comparison with the Long Short-Term Memory(LSTM)model and the Gated Recurrent Unit(GRU)model,and the experimental results demonstrate the feasibility and effectiveness of the SBKA-CLSCN algorithm.展开更多
In the field of Internet, an image is of great significance to information transmission. Meanwhile, how to ensure and improve its security has become the focus of international research. We combine DNA codec with quan...In the field of Internet, an image is of great significance to information transmission. Meanwhile, how to ensure and improve its security has become the focus of international research. We combine DNA codec with quantum Arnold transform(QAr T) to propose a new double encryption algorithm for quantum color images to improve the security and robustness of image encryption. First, we utilize the biological characteristics of DNA codecs to perform encoding and decoding operations on pixel color information in quantum color images, and achieve pixel-level diffusion. Second, we use QAr T to scramble the position information of quantum images and use the operated image as the key matrix for quantum XOR operations. All quantum operations in this paper are reversible, so the decryption operation of the ciphertext image can be realized by the reverse operation of the encryption process. We conduct simulation experiments on encryption and decryption using three color images of “Monkey”, “Flower”, and “House”. The experimental results show that the peak value and correlation of the encrypted images on the histogram have good similarity, and the average normalized pixel change rate(NPCR) of RGB three-channel is 99.61%, the average uniform average change intensity(UACI) is 33.41%,and the average information entropy is about 7.9992. In addition, the robustness of the proposed algorithm is verified by the simulation of noise interference in the actual scenario.展开更多
This study introduces a novel methodology and makes case studies for anomaly detection in multivariate oil production time-series data,utilizing a supervised Transformer algorithm to identify spurious events related t...This study introduces a novel methodology and makes case studies for anomaly detection in multivariate oil production time-series data,utilizing a supervised Transformer algorithm to identify spurious events related to interval control valves(ICVs)in intelligent well completions(IWC).Transformer algorithms present significant advantages in time-series anomaly detection,primarily due to their ability to handle data drift and capture complex patterns effectively.Their self-attention mechanism allows these models to adapt to shifts in data distribution over time,ensuring resilience against changes that can occur in time-series data.Additionally,Transformers excel at identifying intricate temporal dependencies and long-range interactions,which are often challenging for traditional models.Field tests conducted in the ultradeep water subsea wells of the Santos Basin further validate the model’s capability for early anomaly identification of ICVs,minimizing non-productive time and safeguarding well integrity.The model achieved an accuracy of 0.9544,a balanced accuracy of 0.9694 and an F1-Score of 0.9574,representing significant improvements over previous literature models.展开更多
AlphaPanda(AlphaFold2[1]inspired protein-specific antibody design in a diffusional manner)is an advanced algorithm for designing complementary determining regions(CDRs)of the antibody targeted the specific epitope,com...AlphaPanda(AlphaFold2[1]inspired protein-specific antibody design in a diffusional manner)is an advanced algorithm for designing complementary determining regions(CDRs)of the antibody targeted the specific epitope,combining transformer[2]models,3DCNN[3],and diffusion[4]generative models.展开更多
基金Supported by the Optimisation Theory and Algorithm Research Team(Grant No.23kytdzd004)University Science Research Project of Anhui Province(Grant No.2024AH050631)the General Programs for Young Teacher Cultivation of Educational Commission of Anhui Province(Grant No.YQYB2023090).
文摘In this paper,we propose a new full-Newton step feasible interior-point algorithm for the special weighted linear complementarity problems.The proposed algorithm employs the technique of algebraic equivalent transformation to derive the search direction.It is shown that the proximity measure reduces quadratically at each iteration.Moreover,the iteration bound of the algorithm is as good as the best-known polynomial complexity for these types of problems.Furthermore,numerical results are presented to show the efficiency of the proposed algorithm.
基金Supported by National Natural Science Foundation of China(11571089,11501164)Natural Science Founda-tion of Hebei Province(A2019205299)+1 种基金the Foundation of Hebei Education Department(ZD2018065,ZD2019053)Hebei Normal University(L2019Z01).
文摘The aim of this paper is to price power option with its underlying asset price following exponential normal inverse gaussian(NIG)process.We first find the risk neutral equivalent martingale measure Q by Esscher transform.Then,using the Fourier transform and its inverse,we derive the analytical pricing formulas of power options which are expressed in the form of Fourier integral.In addition,the fast Fourier transform(FFT)algorithm is applied to calculate these pricing formulas.Finally,Shangzheng 50ETF options are chosen to test our results.Estimating the parameters in NIG process by maximum likelihood method,we show that the NIG prices are much closer to market prices than the Black-Scholes-Merton(BSM)ones.
文摘Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution,tampering,and copyright infringement.This study introduces a novel hybrid watermarking framework that integrates Discrete Wavelet Transform(DWT),Redundant Discrete Wavelet Transform(RDWT),and Möbius Transformations(MT),with optimization of transformation parameters achieved via a Genetic Algorithm(GA).By combining frequency and spatial domain techniques,the proposed method significantly enhances both the imper-ceptibility and robustness of watermark embedding.The approach leverages DWT and RDWT for multi-resolution decomposition,enabling watermark insertion in frequency subbands that balance visibility and resistance to attacks.RDWT,in particular,offers shift-invariance,which improves performance under geometric transformations.Möbius transformations are employed for spatial manipulation,providing conformal mapping and spatial dispersion that fortify watermark resilience against rotation,scaling,and translation.The GA dynamically optimizes the Möbius parameters,selecting configurations that maximize robustness metrics such as Peak Signal-to-Noise Ratio(PSNR),Structural Similarity Index Measure(SSIM),Bit Error Rate(BER),and Normalized Cross-Correlation(NCC).Extensive experiments conducted on medical and standard benchmark images demonstrate the efficacy of the proposed RDWT-MT scheme.Results show that PSNR exceeds 68 dB,SSIM approaches 1.0,and BER remains at 0.0000,indicating excellent imperceptibility and perfect watermark recovery.Moreover,the method exhibits exceptional resilience to a wide range of image processing attacks,including Gaussian noise,JPEG compression,histogram equalization,and cropping,achieving NCC values close to or equal to 1.0.Comparative evaluations with state-of-the-art watermarking techniques highlight the superiority of the proposed method in terms of robustness,fidelity,and computational efficiency.The hybrid framework ensures secure,adaptive watermark embedding,making it highly suitable for applications in digital rights management,content authentication,and medical image protection.The integration of spatial and frequency domain features with evolutionary optimization presents a promising direction for future watermarking technologies.
基金Supported by the Tianjin University of Technology Graduate R esearch Innovation Project(YJ2281).
文摘An improved version of the sparse A^(*)algorithm is proposed to address the common issue of excessive expansion of nodes and failure to consider current ship status and parameters in traditional path planning algorithms.This algorithm considers factors such as initial position and orientation of the ship,safety range,and ship draft to determine the optimal obstacle-avoiding route from the current to the destination point for ship planning.A coordinate transformation algorithm is also applied to convert commonly used latitude and longitude coordinates of ship travel paths to easily utilized and analyzed Cartesian coordinates.The algorithm incorporates a hierarchical chart processing algorithm to handle multilayered chart data.Furthermore,the algorithm considers the impact of ship length on grid size and density when implementing chart gridification,adjusting the grid size and density accordingly based on ship length.Simulation results show that compared to traditional path planning algorithms,the sparse A^(*)algorithm reduces the average number of path points by 25%,decreases the average maximum storage node number by 17%,and raises the average path turning angle by approximately 10°,effectively improving the safety of ship planning paths.
文摘The accurate estimation of lithium battery state of health(SOH)plays an important role in the health management of battery systems.In order to improve the prediction accuracy of SOH,this paper proposes a stochastic configuration network based on a multi-converged black-winged kite search algorithm,called SBKA-CLSCN.Firstly,the indirect health index(HI)of the battery is extracted by combining it with Person correlation coefficients in the battery charging and discharging cycle point data.Secondly,to address the problem that the black-winged kite optimization algorithm(BKA)falls into the local optimum problem and improve the convergence speed,the Sine chaotic black-winged kite search algorithm(SBKA)is designed,which mainly utilizes the Sine mapping and the golden-sine strategy to enhance the algorithm’s global optimality search ability;secondly,the Cauchy distribution and Laplace regularization techniques are used in the SCN model,which is referred to as CLSCN,thereby improving the model’s overall search capability and generalization ability.Finally,the performance of SBKA and SBKA-CLSCN is evaluated using eight benchmark functions and the CALCE battery dataset,respectively,and compared in comparison with the Long Short-Term Memory(LSTM)model and the Gated Recurrent Unit(GRU)model,and the experimental results demonstrate the feasibility and effectiveness of the SBKA-CLSCN algorithm.
基金Project supported by the Natural Science Foundation of Shandong Province, China (Grant No. ZR2021MF049)Joint Fund of Natural Science Foundation of Shandong Province (Grant Nos. ZR2022LLZ012 and ZR2021LLZ001)the Key R&D Program of Shandong Province, China (Grant No. 2023CXGC010901)。
文摘In the field of Internet, an image is of great significance to information transmission. Meanwhile, how to ensure and improve its security has become the focus of international research. We combine DNA codec with quantum Arnold transform(QAr T) to propose a new double encryption algorithm for quantum color images to improve the security and robustness of image encryption. First, we utilize the biological characteristics of DNA codecs to perform encoding and decoding operations on pixel color information in quantum color images, and achieve pixel-level diffusion. Second, we use QAr T to scramble the position information of quantum images and use the operated image as the key matrix for quantum XOR operations. All quantum operations in this paper are reversible, so the decryption operation of the ciphertext image can be realized by the reverse operation of the encryption process. We conduct simulation experiments on encryption and decryption using three color images of “Monkey”, “Flower”, and “House”. The experimental results show that the peak value and correlation of the encrypted images on the histogram have good similarity, and the average normalized pixel change rate(NPCR) of RGB three-channel is 99.61%, the average uniform average change intensity(UACI) is 33.41%,and the average information entropy is about 7.9992. In addition, the robustness of the proposed algorithm is verified by the simulation of noise interference in the actual scenario.
文摘This study introduces a novel methodology and makes case studies for anomaly detection in multivariate oil production time-series data,utilizing a supervised Transformer algorithm to identify spurious events related to interval control valves(ICVs)in intelligent well completions(IWC).Transformer algorithms present significant advantages in time-series anomaly detection,primarily due to their ability to handle data drift and capture complex patterns effectively.Their self-attention mechanism allows these models to adapt to shifts in data distribution over time,ensuring resilience against changes that can occur in time-series data.Additionally,Transformers excel at identifying intricate temporal dependencies and long-range interactions,which are often challenging for traditional models.Field tests conducted in the ultradeep water subsea wells of the Santos Basin further validate the model’s capability for early anomaly identification of ICVs,minimizing non-productive time and safeguarding well integrity.The model achieved an accuracy of 0.9544,a balanced accuracy of 0.9694 and an F1-Score of 0.9574,representing significant improvements over previous literature models.
基金supported by the Key Project of International Cooperation of Qilu University of Technology(Grant No.:QLUTGJHZ2018008)Shandong Provincial Natural Science Foundation Committee,China(Grant No.:ZR2016HB54)Shandong Provincial Key Laboratory of Microbial Engineering(SME).
文摘AlphaPanda(AlphaFold2[1]inspired protein-specific antibody design in a diffusional manner)is an advanced algorithm for designing complementary determining regions(CDRs)of the antibody targeted the specific epitope,combining transformer[2]models,3DCNN[3],and diffusion[4]generative models.