共查询到20条相似文献,搜索用时 46 毫秒
1.
2.
3.
4.
改进的用于回归估计的支持向量机学习算法 总被引:6,自引:1,他引:6
该文对用于回归估计的标准支持向量机(SVM)加以改进,提出了一种新的用于回归估计的支持向量机学习算法。实验表明,这种新的学习算法在精度上与标准支持向量机算法完全相同,而在学习速度上明显优于标准学习算法。 相似文献
5.
6.
S盒是许多加密算法唯一的非线性部件,其安全性对这些算法的密码分析至关重要。S盒输出的布尔表达式(即模2域上的代数多项式)被用于衡量S盒的非线性度等用途。在已知S盒真值表情况下,对求S盒各输出布尔表达式的各种算法进行了探讨和总结。其中,折半异或法在普通PC计算机上只需要[m2m-1]次操作,其中[m]为S盒的输入位数,且不需要占用额外的内存。 相似文献
7.
布尔函数是在密码学、纠错编码和扩频通信等领域有着广泛应用的密码函数,寻找性能优良的布尔函数一直是密码学领域的重要问题之一。基于引力搜索算法设计了一种搜索布尔函数的新算法。该算法模仿万有引力定律,以n维空间中的质量点表示布尔函数,以布尔函数的密码特性作为目标适应度函数进行搜索。实验结果表明,算法使用新设计的目标适应度函数可以直接生成具有1阶弹性、1阶扩散准则和高非线性度、高代数次数以及低自相关指标等多种密码学指标的平衡布尔函数,并且进一步给出了直接生成2输出平衡布尔函数的计算机搜索算法。 相似文献
8.
9.
布尔网络是一种重要的基因调控数学模型,从布尔网络的状态变换推断其结构以发现基因之间的调控关系是布尔网络研究中长期关注的重要问题。已有的归纳逻辑程序算法不能从布尔网络的不确定(解释)状态变换学习推断其网络结构。为此,文中提出了非确定解释转换学习(Learning From Non-deterministic interpretation Transitions,LFNDIT)算法从布尔网络异步更新语义下的解释变换学习其网络结构。首先将异步更新语义下的不确定解释变换集转换成确定解释变换集,然后利用Inoue等提出的从1步解释转换学习(Learning From 1-step state transition,LF1T)算法计算其对应的正规逻辑程序(布尔网络)。该算法的完备性得到了证明,初步的实验结果表明,该方法能有效地从不确定状态变换计算布尔网络的结构,从而为发现布尔网络的结构提供了新的思路。 相似文献
10.
11.
We consider the following classes of quantified boolean formulas. Fix a finite set of basic boolean functions. Take conjunctions of these basic functions applied to variables and constants in arbitrary ways. Finally quantify existentially or universally some of the variables. We prove the following dichotomy theorem: For any set of basic boolean functions, the resulting set of formulas is either polynomially learnable from equivalence queries alone or else it is not PAC-predictable even with membership queries under cryptographic assumptions. Furthermore, we identify precisely which sets of basic functions are in which of the two cases. 相似文献
12.
模型学习是一种获取黑盒软件系统行为模型的有效方法,可分为主动学习和被动学习.主动学习是基于字母表构造测试用例,通过与黑盒系统主动交互,可在多项式时间内得到目标系统的最小完备自动机,其中等价查询仍是开发和应用主动自动机学习工具的障碍之一.通过探讨反例对于学习算法的影响,定义假设的比较规则,提出测试用例构造的两个原则,同时依据原则对Wp-method等价查询算法改进,产生更优的假设,有效降低查询的数量,并基于LearnLib开源工具,分别以3类自动机为实验对象验证原则和改进算法的有效性. 相似文献
13.
In order to minimize the impact of secret signing key exposure in attribute-based signature scenario, we construct an attribute-based key-insulated signature (ABKIS) scheme for expressive monotone boolean function access structures utilizing only four pairing operations in verification process and making the signature length constant, that is, the number of pairings required for signature verification and the size of signature are independent of the size of attribute set participated in the respective process. The (strong) key-insulated selective security of our ABKIS scheme is reduced to the computational Diffie–Hellman Exponent problem without using any random oracles. The proposed construction attains signer privacy, which is a fundamental requirement of the signature schemes in the attribute-based setting. 相似文献
14.
多数据库系统的数据模式集成与查询处理 总被引:2,自引:0,他引:2
在分析了多数据库系统数据模式体系结构的基础上 ,讨论了多数据库查询处理问题 :查询分解、查询转换和查询优化。给出了全局查询分解算法和全局查询优化算法 相似文献
15.
16.
In this article we give several new results on the complexity of algorithms that learn Boolean functions from quantum queries
and quantum examples.
Pacs: 03.67.Lx, 89.80.+h, 02.70.-c 相似文献
Hunziker et al.[Quantum Information Processing, to appear] conjectured that for any class C of Boolean functions, the number of quantum black-box queries which are required to exactly identify an unknown function from C is , where is a combinatorial parameter of the class C. We essentially resolve this conjecture in the affirmative by giving a quantum algorithm that, for any class C, identifies any unknown function from C using quantum black-box queries. | |
We consider a range of natural problems intermediate between the exact learning problem (in which the learner must obtain all bits of information about the black-box function) and the usual problem of computing a predicate (in which the learner must obtain only one bit of information about the black-box function). We give positive and negative results on when the quantum and classical query complexities of these intermediate problems are polynomially related to each other. | |
Finally, we improve the known lower bounds on the number of quantum examples (as opposed to quantum black-box queries) required for ɛ, Δ-PAC learning any concept class of Vapnik-Chervonenkis dimension d over the domain from to . This new lower bound comes closer to matching known upper bounds for classical PAC learning. |
17.
The theory revision, or concept revision, problem is to correct a given, roughly correct concept. This problem is considered here in the model of learning with equivalence and membership queries. A revision algorithm is considered efficient if the number of queries it makes is polynomial in the revision distance between the initial theory and the target theory, and polylogarithmic in the number of variables and the size of the initial theory. The revision distance is the minimal number of syntactic revision operations, such as the deletion or addition of literals, needed to obtain the target theory from the initial theory. Efficient revision algorithms are given for three classes of disjunctive normal form expressions: monotone k-DNF, monotone m-term DNF and unate two-term DNF. A negative result shows that some monotone DNF formulas are hard to revise. 相似文献
18.
19.
设计一种基于微处理器嵌入结构的数字集成电路测试系统;该系统在保留了传统数字集成电路测试系统使用的布尔差分算法的基础上,将布尔差分算法形成的中间大数据进行模糊神经网络的进一步分析,使得布尔差分算法获得可测故障捕捉结果的同时,将不可测故障进行充分捕捉;最终设计一款提供30×30固定快插式引脚且运行在最大750MHz频率上的数字集成电路测试系统;经过实测,发现升级后算法在测试敏感度和特异度方面均获得提升;该技术革新成果将对高复杂度硬件系统的测试工作带来显著的效率提升。 相似文献
20.
查询建议是当今搜索引擎必不可少的一个组成部分,它可以在用户输入完整查询前提供查询候选项,帮助用户更准确、更快速地表达信息需求. 深度学习技术有助于提升查询建议的准确度,成为近年来推动查询建议发展的主流技术. 主要对基于深度学习的查询建议研究现状进行归纳整理与分析对比,根据深度学习应用阶段不同,把其分为生成式查询建议与排名式查询建议2类,分析其中每种模型的建模思路和处理特征. 此外还介绍了查询建议领域常用的数据集、基线方法与评价指标,并对比其中不同模型的技术特点与实验结果. 最后总结了基于深度学习的查询建议研究目前面临的挑战与未来发展趋势.
相似文献