首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到16条相似文献,搜索用时 375 毫秒
1.
刘帅  蒋林  李远成  山蕊  朱育琳  王欣 《计算机应用》2022,42(5):1524-1530
针对大规模多输入多输出(MIMO)系统中,最小均方误差(MMSE)检测算法在可重构阵列结构上适应性差、计算复杂度高和运算效率低的问题,基于项目组开发的可重构阵列处理器,提出了一种基于MMSE算法的并行映射方法。首先,利用Gram矩阵计算时较为简单的数据依赖关系,设计时间上和空间上可以高度并行的流水线加速方案;其次,根据MMSE算法中Gram矩阵计算和匹配滤波计算模块相对独立的特点,设计模块化并行映射方案;最后,基于Xilinx Virtex-6开发板对映射方案进行实现并统计其性能。实验结果表明,该方法在MIMO规模为128×4128×8128×16的正交相移键控(QPSK)上行链路中,加速比分别2.80、4.04和5.57;在128×16的大规模MIMO系统中,可重构阵列处理器比专用硬件减少了42.6%的资源消耗。  相似文献   

2.
王梅  许传海  刘勇 《计算机应用》2021,41(12):3462-3467
多核学习方法是一类重要的核学习方法,但大多数多核学习方法存在如下问题:多核学习方法中的基核函数大多选择传统的具有浅层结构的核函数,在处理数据规模大且分布不平坦的问题时表示能力较弱;现有的多核学习方法的泛化误差收敛率大多为O1/n,收敛速度较慢。为此,提出了一种基于神经正切核(NTK)的多核学习方法。首先,将具有深层次结构的NTK作为多核学习方法的基核函数,从而增强多核学习方法的表示能力。然后,根据主特征值比例度量证明了一种收敛速率可达O1/n的泛化误差界;在此基础上,结合核对齐度量设计了一种全新的多核学习算法。最后,在多个数据集上进行了实验,实验结果表明,相比Adaboost和K近邻(KNN)等分类算法,新提出的多核学习算法具有更高的准确率和更好的表示能力,也验证了所提方法的可行性与有效性。  相似文献   

3.
高闯  唐冕  赵亮 《计算机应用》2021,41(12):3702-3706
针对现有表位预测方法对抗原中存在的重叠表位预测能力不佳的问题,提出了将基于局部度量(L-Metric)的重叠子图发现算法用于表位预测的模型。首先,利用抗原上的表面原子构建原子图并升级为氨基酸残基图;然后,利用基于信息流的图划分算法将氨基酸残基图划分为互不重叠的种子子图,并使用基于L-Metric的重叠子图发现算法对种子子图进行扩展以得到重叠子图;最后,利用由图卷积网络(GCN)和全连接网络(FCN)构建的分类模型将扩展后的子图分类为抗原表位和非抗原表位。实验结果表明,所提出的模型在相同数据集上的F1值与现有表位预测模型DiscoTope 2、ElliPro、EpiPred和Glep相比分别提高了267.3%、57.0%、65.4%和3.5%。同时,消融实验结果表明,所提出的重叠子图发现算法能够有效改善预测能力,使用该算法的模型相较于未使用该算法的模型的F1值提高了19.2%。  相似文献   

4.
针对脉冲噪声干扰环境下传统稀疏自适应滤波稳态性能差,甚至无法收敛等问题,同时为提高稀疏参数辨识的精度的同时不增加过多计算代价,提出了一种基于广义最大Versoria准则(GMVC)的稀疏自适应滤波算法——带有CIM约束的GMVC(CIMGMVC)。首先,利用广义Versoria函数作为学习准则,其包含误差p阶矩的倒数形式,当脉冲干扰出现导致误差非常大时,GMVC将趋近于0,从而达到抑制脉冲噪声的目的。其次,将互相关熵诱导维度(CIM)作为稀疏惩罚约束和GMVC相结合来构建新代价函数,其中的CIM以高斯概率密度函数为基础,当选择合适核宽度时,可无限逼近于l0-范数。最后,应用梯度法推导出CIMGMVC算法,并分析了所提算法的均方收敛性。在Matlab平台上采用α-stable分布模型产生脉冲噪声进行仿真,实验结果表明所提出的CIMGMVC算法能有效地抑制非高斯脉冲噪声的干扰,在稳健性方面优于传统稀疏自适应滤波,且稳态误差低于GMVC算法。  相似文献   

5.
函数查询是大数据应用中重要的操作,查询解答问题一直是数据库理论中的核心问题。为了分析大数据上函数查询解答问题的复杂度,首先,使用映射归约方法将函数查询语言归约到已知的可判定语言,证明了函数查询解答问题的可计算性;其次,使用一阶语言描述函数查询,并分析了一阶语言的复杂度;在此基础上,使用NC-factor归约方法将函数查询类归约到已知的ΠΤQ-complete类中。证明函数查询解答问题经过PTIME(多项式时间)预处理后,可以在NC(并行多项式-对数)时间内求解。通过以上证明可以推出,函数查询解答问题在大数据上是可处理的。  相似文献   

6.
朱槐雨  李博 《计算机应用》2021,41(11):3234-3241
无人机(UAV)航拍图像视野开阔,图像中的目标较小且边缘模糊,而现有单阶段多框检测器(SSD)目标检测模型难以准确地检测航拍图像中的小目标。为了有效地解决原有模型容易漏检的问题,借鉴特征金字塔网络(FPN)提出了一种基于连续上采样的SSD模型。改进SSD模型将输入图像尺寸调整为320×320,新增Conv3_3特征层,将高层特征进行上采样,并利用特征金字塔结构对VGG16网络前5层特征进行融合,从而增强各个特征层的语义表达能力,同时重新设计先验框的尺寸。在公开航拍数据集UCAS-AOD上训练并验证,实验结果表明,所提改进SSD模型的各类平均精度均值(mAP)达到了94.78%,与现有SSD模型相比,其准确率提升了17.62%,其中飞机类别提升了4.66%,汽车类别提升了34.78%。  相似文献   

7.
周玉彬  肖红  王涛  姜文超  熊梦  贺忠堂 《计算机应用》2021,41(11):3192-3199
针对工业机器人机械轴健康管理中检测效率和精准度较低的问题,提出了一种机械轴运行监控大数据背景下的基于动作周期退化相似性度量的健康指标(HI)构建方法,并结合长短时记忆(LSTM)网络进行机器人剩余寿命(RUL)的自动预测。首先,利用MPdist关注机械轴不同动作周期之间子周期序列相似性的特点,并计算正常周期数据与退化周期数据之间的偏离程度,进而构建HI;然后,利用HI集训练LSTM网络模型并建立HI与RUL之间的映射关系;最后,通过MPdist-LSTM混合模型自动计算RUL并适时预警。使用某公司六轴工业机器人进行实验,采集了加速老化数据约1 500万条,对HI单调性、鲁棒性和趋势性以及RUL预测的平均绝对误差(MAE)、均方根误差(RMSE)、决定系数(R2)、误差区间(ER)、早预测(EP)和晚预测(LP)等指标进行了实验测试,将该方法分别与动态时间规整(DTW)、欧氏距离(ED)、时域特征值(TDE)结合LSTM的方法,MPdist结合循环神经网络(RNN)和LSTM等方法进行比较。实验结果表明,相较于其他对比方法,所提方法所构建HI的单调性和趋势性分别至少提高了0.07和0.13,RUL预测准确率更高,ER更小,验证了所提方法的有效性。  相似文献   

8.
为评价阴影消除植被指数(Shadow-Eliminated Vegetation Index, SEVI)对常用十米级不同空间分辨率遥感影像的地形阴影消除效果,采用2019年1月24~25日过境的Sentinel S2B(10 m)、GF-1(16 m)、Landsat 8 OLI(30 m)、GF-4(50 m)4种空间分辨率多光谱影像,计算了基于地表反射率的NDVI、SEVI和基于SCS+C模型校正后反射率的NDVI。评价方法包括植被指数数值分析、本影和落影相对误差分析、变异系数分析、植被指数与太阳入射角余弦值(cosi)散点图分析等。评价结果显示:4种空间分辨率的SEVI在本影相对误差分别为2.172%、1.422%、1.351%、1.060%;对应落影的相对误差分别为2.598%、2.801%、3.795%、2.711%;相应SEVI与cosi的决定系数分别为0.017 3、0.010 7、0.001 1、0.000 1;相应变异系数分别为10.036%、9.070%、8.051%、1.631%。研究结果表明,SEVI对10~50 m不同空间分辨率遥感影像的地形阴影校正效果良好,优于用SCS+C模型校正后的地表反射率计算的NDVI;遥感影像的地形阴影效应随着空间分辨率降低而减弱。  相似文献   

9.
16轮Blow-CAST-Fish的弱密钥攻击   总被引:1,自引:0,他引:1       下载免费PDF全文
Blow-CAST-Fish的轮函数F由作为算法子密钥的四个S盒构成。如果S盒产生碰撞,则可构造F函数的输入差分为非零、输出差分为零的差分特征,进而对算法进行差分分析以获取其他子密钥。研究单个S盒的碰撞,构造F函数的差分特征,并测试使特征成立的弱密钥比例,给出了特征概率为2-49,弱密钥比例为2-52.4的14轮差分特征,并以此为基础,攻击16轮Blow-CAST-Fish。  相似文献   

10.
基于Sentinel-1合成孔径雷达 (SAR) 数据及相同时段的中分辨率成像光谱仪(MODIS)和Landsat 8两种归一化植被指数(NDVI),构建变化检测模型以估算黑河中游的高分辨率土壤水分,并探讨模型中具体参数设置对估算精度的影响。结果表明:①在对后向散射系数时间序列的差值 ( Δ σ ) 和植被指数 ( V I ) 进行线性建模过程中,MODIS NDVI和Landsat 8 NDVI这两种植被产品所构建的模型在 Δ σ - V I 空间中所选取的采样点比例分别为2%和4%时,各自取得最优精度; ②以土壤水分反演为目标,使用Landsat 8 NDVI构建的变化检测模型略优于使用MODIS NDVI构建的变化检测模型,两种模型的均方根误差RMSE分别为0.040 m3/m3和0.044 m3/m3,相关系数R分别为0.86和0.83; ③对于变化检测方法的关键参数,若使用低分辨率的SMAP/Sentinel-1 L2_SM_SP土壤水分数据分别代替站点观测的土壤水分初始值和缩放因子 (即两个连续时相土壤水分变化的最大值 Δ M s m a x ) 这两个参数,则土壤水分RMSE将分别增加0.01 m3/m3和0.04 m3/m3。即土壤水分缩放因子这一参数的误差对反演结果的影响大于土壤水分初始值误差对反演结果的影响,故采用高精度的缩放因子进行变化检测估算。研究结论对于利用新兴的Sentinel-1 SAR数据,通过变化检测算法准确获取高分辨率土壤水分信息具有实际参考价值。  相似文献   

11.
Combinatorial optimization in the face of uncertainty is a challenge in both operational research and machine learning. In this paper, we consider a special and important class called the adversarial online combinatorial optimization with semi-bandit feedback, in which a player makes combinatorial decisions and gets the corresponding feedback repeatedly. While existing algorithms focus on the regret guarantee or assume there exists an efficient offline oracle, it is still a challenge to solve this problem efficiently if the offline counterpart is NP-hard. In this paper, we propose a variant of the Followthe-Perturbed-Leader (FPL) algorithm to solve this problem. Unlike the existing FPL approach, our method employs an approximation algorithm as an offline oracle and perturbs the collected data by adding nonnegative random variables. Our approach is simple and computationally efficient. Moreover, it can guarantee a sublinear (1+ ε)-scaled regret of order O(T23) for any small ε>0 for an important class of combinatorial optimization problems that admit an FPTAS (fully polynomial time approximation scheme), in which Tis the number of rounds of the learning process. In addition to the theoretical analysis, we also conduct a series of experiments to demonstrate the performance of our algorithm.  相似文献   

12.
针对3D分组密码算法的安全性分析,对该算法抵抗中间相遇攻击的能力进行了评估。基于3D算法的基本结构及S盒的差分性质,减少了在构造多重集时所需的猜测字节数,从而构建了新的6轮3D算法中间相遇区分器。然后,将区分器向前扩展2轮,向后扩展3轮,得到11轮3D算法中间相遇攻击。实验结果表明:构建区分器时所需猜测的字节数为42 B,攻击时所需的数据复杂度约为2497个选择明文,时间复杂度约为2325.3次11轮3D算法加密,存储复杂度约为2342 B。新攻击表明11轮3D算法对中间相遇攻击是不免疫的。  相似文献   

13.
Sun et al.’s method of using Matsui’s bounding conditions to accelerate the search of differential characteristics was reviewed. Matsui’s boundary conditions and Sun et al.’s method of using Matsui’s bounding conditions to accelerate the search of differential characteristics were improved for better search efficiency. Then an improved method to search for the optimal differential characteristics in block ciphers was proposed. Besides, the accelerating effects of the number of threads and the query condition were investigated, and a strategy for choosing the number of threads and the query condition were proposed. STP and CryptoMiniSat were used to 24 search for 8-round SPECK96 differential characteristics with probabilities of 2- 25, 2- 26, 2- and 11-round 39 HIGHT differential characteristics with a probability of 2-, then the time-consuming of solving SAT/SMT problems under different number of threads and query conditions were compared. It was found that the number of threads has a great effect on the time consumption of searching for differential characteristics, while the query condition may have little effect on the time consumption of searching for differential characteristics. Then, a strategy on how to select the number of threads and the query condition was proposed. Furthermore, it was found that STP can affect the overall efficiency of the search. According to the proposed strategy, the 11-round optimal differential characteristics of HIGHT were searched by using the improved bounding conditions and improved method. A tight bound for the probability of the 11-round optimal differential characteristics of HIGHT was 45 obtained for the first time, i.e. 2- . To the best of our knowledge, the existing tightest bound of the optimal 11-45 11-round HIGHT is POpt ≥ 2 . This means that using the existing tightest bound of the optimal 11-round HIGHT cannot give an accurate evaluation of the security of 11-round HIGHT against differential cryptanalysis. Therefore, the result is the best-known result. © 2022, Beijing Xintong Media Co., Ltd.. All rights reserved.  相似文献   

14.
Robust regression plays an important role in many machine learning problems. A primal approach relies on the use of Huber loss and an iteratively reweighted l2 method. However, because the Huber loss is not smooth and its corresponding distribution cannot be represented as a Gaussian scale mixture, such an approach is extremely difficult to handle using a probabilistic framework. To address those limitations, this paper proposes two novel losses and the corresponding probability functions. One is called Soft Huber, which is well suited for modeling non-Gaussian noise. Another is Nonconvex Huber, which can help produce much sparser results when imposed as a prior on regression vector. They can represent any lq loss (12q<2) with tuning parameters, which makes the regression modelmore robust. We also show that both distributions have an elegant form, which is a Gaussian scale mixture with a generalized inverse Gaussian mixing density. This enables us to devise an expectation maximization (EM) algorithm for solving the regression model.We can obtain an adaptive weight through EM, which is very useful to remove noise data or irrelevant features in regression problems. We apply our model to the face recognition problem and show that it not only reduces the impact of noise pixels but also removes more irrelevant face images. Our experiments demonstrate the promising results on two datasets.  相似文献   

15.
A k-CNF (conjunctive normal form) formula is a regular (k, s)-CNF one if every variable occurs s times in the formula, where k≥2 and s>0 are integers. Regular (3, s)- CNF formulas have some good structural properties, so carrying out a probability analysis of the structure for random formulas of this type is easier than conducting such an analysis for random 3-CNF formulas. Some subclasses of the regular (3, s)-CNF formula have also characteristics of intractability that differ from random 3-CNF formulas. For this purpose, we propose strictly d-regular (k, 2s)-CNF formula, which is a regular (k, 2s)-CNF formula for which d≥0 is an even number and each literal occurs sd2 or s+d2 times (the literals from a variable x are x and ¬x, where x is positive and ¬x is negative). In this paper, we present a new model to generate strictly d-regular random (k, 2s)-CNF formulas, and focus on the strictly d-regular random (3, 2s)-CNF formulas. Let F be a strictly d-regular random (3, 2s)-CNF formula such that 2s>d. We show that there exists a real number s0 such that the formula F is unsatisfiable with high probability when s>s0, and present a numerical solution for the real number s0. The result is supported by simulated experiments, and is consistent with the existing conclusion for the case of d= 0. Furthermore, we have a conjecture: for a given d, the strictly d-regular random (3, 2s)-SAT problem has an SAT-UNSAT (satisfiable-unsatisfiable) phase transition. Our experiments support this conjecture. Finally, our experiments also show that the parameter d is correlated with the intractability of the 3-SAT problem. Therefore, our research maybe helpful for generating random hard instances of the 3-CNF formula.  相似文献   

16.
对作为Blow-CAST-Fish算法子密钥的4个S盒的碰撞性进行分析,构造输入差分为非零、输出差分为零的轮函数F的差分特征,通过对算法进行差分分析,获取相关子密钥,并测试使特征成立的弱密钥概率。在此基础上,成功利用特征概率为2-61、弱密钥概率为 2-12的6轮差分特征攻击8轮Blow-CAST-Fish算法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号