首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The security provisioning of increasing healthcare data is of critical importance. The e-health clouds can be seen as a move towards an efficient management of such a big volume of healthcare data. Many schemes have been presented to bring more security and privacy along with efficiency, in the handling of data for booming e-health industry. Recently, in this connection, Jiang et al. (J Supercomput 1–24 doi: 10.1007/s11227-015-1610-x, 2016) presented a three-factor authentication protocol for e-health clouds. In this letter, we identify a serious flaw in the mutual authentication phase of the scheme, since an adversary may launch a denial-of-service attack (DoS) against the service providing server. Finally, we suggest a modification in the scheme to overcome the DoS attack.  相似文献   

2.
We study the class of pseudo-BL-algebras whose every maximal filter is normal. We present an equational base for this class and we extend these results for the class of basic pseudo hoops with fixed strong unit. This is a continuation of the research from Botur et al. (Soft Comput 16:635–644, doi: 10.1007/s00500-011-0763-7, 2012).  相似文献   

3.
The objective of this paper is to focus on one of the “building blocks” of additive manufacturing technologies, namely selective laser-processing of particle-functionalized materials. Following a series of work in Zohdi (Int J Numer Methods Eng 53:1511–1532, 2002; Philos Trans R Soc Math Phys Eng Sci 361(1806):1021–1043, 2003; Comput Methods Appl Mech Eng 193(6–8):679–699, 2004; Comput Methods Appl Mech Eng 196:3927–3950, 2007; Int J Numer Methods Eng 76:1250–1279, 2008; Comput Methods Appl Mech Eng 199:79–101, 2010; Arch Comput Methods Eng 1–17. doi: 10.1007/s11831-013-9092-6, 2013; Comput Mech Eng Sci 98(3):261–277, 2014; Comput Mech 54:171–191, 2014; J Manuf Sci Eng ASME doi: 10.1115/1.4029327, 2015; CIRP J Manuf Sci Technol 10:77–83, 2015; Comput Mech 56:613–630, 2015; Introduction to computational micromechanics. Springer, Berlin, 2008; Introduction to the modeling and simulation of particulate flows. SIAM (Society for Industrial and Applied Mathematics), Philadelphia, 2007; Electromagnetic properties of multiphase dielectrics: a primer on modeling, theory and computation. Springer, Berlin, 2012), a laser-penetration model, in conjunction with a Finite Difference Time Domain Method using an immersed microstructure method, is developed. Because optical, thermal and mechanical multifield coupling is present, a recursive, staggered, temporally-adaptive scheme is developed to resolve the internal microstructural fields. The time step adaptation allows the numerical scheme to iteratively resolve the changing physical fields by refining the time-steps during phases of the process when the system is undergoing large changes on a relatively small time-scale and can also enlarge the time-steps when the processes are relatively slow. The spatial discretization grids are uniform and dense enough to capture fine-scale changes in the fields. The microstructure is embedded into the spatial discretization and the regular grid allows one to generate a matrix-free iterative formulation which is amenable to rapid computation, with minimal memory requirements, making it ideal for laptop computation. Numerical examples are provided to illustrate the modeling and simulation approach, which by design, is straightforward to computationally implement, in order to be easily utilized by researchers in the field. More advanced conduction models, based on thermal-relaxation, which are a key feature of fast-pulsing laser technologies, are also discussed.  相似文献   

4.
An extended QR algorithm specifically tailored for Hamiltonian matrices is presented. The algorithm generalizes the customary Hamiltonian QR algorithm with additional freedom in choosing between various possible extended Hamiltonian Hessenberg forms. We introduced in Ferranti et al. (Calcolo, 2015. doi: 10.1007/s10092-016-0192-1) an algorithm to transform certain Hamiltonian matrices to such forms. Whereas the convergence of the classical QR algorithm is related to classical Krylov subspaces, convergence in the extended case links to extended Krylov subspaces, resulting in a greater flexibility, and possible enhanced convergence behavior. Details on the implementation, covering the bidirectional chasing and the bulge exchange based on rotations are presented. The numerical experiments reveal that the convergence depends on the selected extended forms and illustrate the validity of the approach.  相似文献   

5.
This paper focuses on two variants of the Milstein scheme, namely the split-step backward Milstein method and a newly proposed projected Milstein scheme, applied to stochastic differential equations which satisfy a global monotonicity condition. In particular, our assumptions include equations with super-linearly growing drift and diffusion coefficient functions and we show that both schemes are mean-square convergent of order 1. Our analysis of the error of convergence with respect to the mean-square norm relies on the notion of stochastic C-stability and B-consistency, which was set up and applied to Euler-type schemes in Beyn et al. (J Sci Comput 67(3):955–987, 2016. doi: 10.1007/s10915-015-0114-4). As a direct consequence we also obtain strong order 1 convergence results for the split-step backward Euler method and the projected Euler–Maruyama scheme in the case of stochastic differential equations with additive noise. Our theoretical results are illustrated in a series of numerical experiments.  相似文献   

6.
State-based formal methods [e.g. Event-B/RODIN (Abrial in Modeling in Event-B—system and software engineering. Cambridge University Press, Cambridge, 2010; Abrial et al. in Int J Softw Tools Technol Transf (STTT) 12(6):447–466, 2010)] for critical system development and verification are now well established, with track records including tool support and industrial applications. The focus of proof-based verification, in particular, is on safety properties. Liveness properties, which guarantee eventual, or converging computations of some requirements, are less well dealt with. Inductive reasoning about liveness is not explicitly supported. Liveness proofs are often complex and expensive, requiring high-skill levels on the part of the verification engineer. Fairness-based temporal logic approaches have been proposed to address this, e.g. TLA Lamport (ACM Trans Program Lang Syst 16(3):872–923, 1994) and that of Manna and Pnueli (Temporal verification of reactive systems—safety. Springer, New York, 1995). We contribute to this technology need by proposing a fairness-based method integrating temporal and first-order logic, proof and tools for modelling and verification of safety and liveness properties. The method is based on an integration of Event-B and TLA. Building on our previous work (Méry and Poppleton in Integrated formal methods, 10th international conference, IFM 2013, Turku, Finland, pp 208–222, 2013. doi: 10.1007/978-3-642-38613-8_15), we present the method via three example population protocols Angluin et al. (Distrib Comput 18(4):235–253, 2006). These were proposed as a theoretical framework for computability reasoning about Wireless Sensor Network and Mobile Ad-Hoc Network algorithms. Our examples present typical liveness and convergence requirements. We prove convergence results for the examples by integrated modelling and proof with Event-B/RODIN and TLA. We exploit existing proof rules, define and apply three new proof rules; soundness proofs are also provided. During the process we observe certain repeating patterns in the proofs. These are easily identified and reused because of the explicit nature of the reasoning.  相似文献   

7.
In this paper, we introduce a novel model that restores a color image from a grayscale image with color values given in small regions. The model is based on the idea of the generalization of the low dimensional manifold model (Shi et al. in J Sci Comput, 2017.  https://doi.org/10.1007/s10915-017-0549-x) and the YCbCr color space. It involves two prior terms, a weighted nonlocal Laplacian (WNLL) and a weighted total variation (WTV). The WNLL allows regions without color information to be interpolated smoothly from given sparse color data, while the WTV assists to inhibit the diffusion of color values across edges. To cope with various types of sampled data, we introduce an updating rule for the weight function in the WNLL. Furthermore, we present an efficient iterative algorithm for solving the proposed model. Lastly, numerical experiments validate the superior performance of the proposed model over that of the other state-of-the-art models.  相似文献   

8.
System Open image in new window is a linear λ-calculus with numbers and an iterator, which, although imposing linearity restrictions on terms, has all the computational power of Gödel’s System  Open image in new window . System Open image in new window owes its power to two features: the use of a closed reduction strategy (which permits the construction of an iterator on an open function, but only iterates the function after it becomes closed), and the use of a liberal typing rule for iterators based on iterative types. In this paper, we study these new types, and show how they relate to intersection types. We also give a sound and complete type reconstruction algorithm for System  Open image in new window .  相似文献   

9.
Learning how to forecast is always important for traders, and divergent learning frequencies prevail among traders. The influence of the evolutionary frequency on learning performance has occasioned many studies of agent-based computational finance (e.g., Lettau in J Econ Dyn Control 21:1117–1147, 1997. doi: 10.1016/S0165-1889(97)00046-8; Szpiro in Complexity 2(4):31–39, 1997. doi: 10.1002/(SICI)1099-0526(199703/04)2:4<31::AID-CPLX8>3.0.CO;2-3; Cacho and Simmons in Aust J Agric Resour Econ 43(3):305–322, 1999. doi: 10.1111/1467-8489.00081). Although these studies all suggest that evolving less frequently and, hence, experiencing more realizations help learning, this implication may result from their common stationary assumption. Therefore, we first attempt to approach this issue in a ‘dynamically’ evolving market in which agents learn to forecast endogenously generated asset prices. Moreover, in these studies’ market settings, evolving less frequently also meant having a longer time horizon. However, it is not true in many market settings that are even closer to the real financial markets. The clarification that the evolutionary frequency and the time horizon are two separate notions leaves the effect of the evolutionary frequency on learning even more elusive and worthy of exploration independently. We find that the influence of a trader’s evolutionary frequency on his forecasting accuracy depends on all market participants and the resulting price dynamics. In addition, prior studies also commonly assume that traders have identical preferences, which is too strong an assumption to apply to a real market. Considering the heterogeneity of preferences, we find that converging to the rational expectations equilibrium is hardly possible, and we even suggest that agents in a slow-learning market learn frequently. We also apply a series of econometric tests to explain the simulation results.  相似文献   

10.
In previous work, Nescolarde-Selva and Usó-Doménech (2014a Nescolarde-Selva, J. and J. L. Usó-Doménech. “Semiotic Vision of Ideologies.” Found Sci 19 (2014a): 263282.[Crossref], [Web of Science ®] [Google Scholar], b) discussed the theory that complex belief systems have a topological structure. In this article it is suggested that this structure is also fuzzy. We introduce the concepts of fuzzy sets in the context of beliefs (substantive and derived), and between derived beliefs themselves. Also introduced are the concepts of fuzzy covering and fuzzy invariance and the relationships between them.  相似文献   

11.
ABSTRACT

We propose a method, called QSQN-WF, for evaluating queries to Datalog¬ databases under the well-founded semantics. It is the first one that is set-at-a-time and strictly goal-directed w.r.t. SLS-resolution defined by Przymusinski. These properties are important for reducing accesses to the secondary storage and redundant computations. The first property distinguishes our method from the one based on SLG-resolution by Chen, Swift, and Warren (1995 Chen, W., T. Swift, and D. S. Warren. 1995. Efficient top-down computation of queries under the well-founded semantics. Journal of Logic Programming 24 (3):16199. doi:10.1016/0743-1066(94)00028-5[Crossref] [Google Scholar]) (which is tuple-at-a-time). The second property distinguishes our method from the ones based on the magic-sets transformation by Kemp, Srivastava, and Stuckey (1995 Kemp, D. B., D. Srivastava, and P. J. Stuckey. 1995. Bottom-up evaluation and query optimization of well-founded models. Theoretical Computer Science 146 (1 & 2):14584. doi:10.1016/0304-3975(94)00153-a[Crossref], [Web of Science ®] [Google Scholar]) and Morishita (1996 Morishita, S. 1996. An extension of Van Gelder's alternating fixpoint to magic programs. Journal of Computer and System Sciences 52 (3):50621. doi:10.1006/jcss.1996.0038[Crossref], [Web of Science ®] [Google Scholar]), which use magic atoms not in the most appropriate way and are not strictly goal-directed w.r.t. SLS-resolution. Our method follows SLS-resolution, with Van Gelder’s alternating fixpoint semantics on the background, but uses a query-subquery net to implement tabulation and the set-at-a-time technique, reduce redundant computations, and allow any control strategy within each iteration of the main loop. It is sound and complete w.r.t. the well-founded semantics and has PTIME data complexity.  相似文献   

12.
《国际计算机数学杂志》2012,89(18):2562-2575
In this article, we extend a Milstein finite difference scheme introduced in 8 Giles, M. B. and Reisinger, C. 2012. Stochastic finite differences and multilevel Monte Carlo for a class of SPDEs in finance. SIAM Financ. Math., 3(1): 572592. (doi:10.1137/110841916)[Crossref] [Google Scholar] for a certain linear stochastic partial differential equation (SPDE) to semi-implicit and fully implicit time-stepping as introduced by Szpruch 32 Szpruch, L. 2010. Numerical approximations of nonlinear stochastic systems PhD Thesis, University of Strathclyde [Google Scholar] for stochastic differential equations (SDEs). We combine standard finite difference Fourier analysis for partial differential equations with the linear stability analysis in 3 Buckwar, E. and Sickenberger, T. 2011. A comparative linear mean-square stability analysis of Maruyama- and Milstein-type methods. Math. Comput. Simulation, 81: 11101127. (doi:10.1016/j.matcom.2010.09.015)[Crossref], [Web of Science ®] [Google Scholar] for SDEs to analyse the stability and accuracy. The results show that Crank–Nicolson time-stepping for the principal part of the drift with a partially implicit but negatively weighted double Itô integral gives unconditional stability over all parameter values and converges with the expected order in the mean-square sense. This opens up the possibility of local mesh refinement in the spatial domain, and we show experimentally that this can be beneficial in the presence of reduced regularity at boundaries.  相似文献   

13.
Chemical reaction network has been a model of interest to both theoretical and applied computer scientists, and there has been concern about its physical-realisticity which calls for study on the atomic property of chemical reaction networks. Informally, a chemical reaction network is “atomic” if each reaction may be interpreted as the rearrangement of indivisible units of matter. There are several reasonable definitions formalizing this idea. We investigate the computational complexity of deciding whether a given network is atomic according to each of these definitions. Primitive atomic, which requires each reaction to preserve the total number of atoms, is shown to be equivalent to mass conservation. Since it is known that it can be decided in polynomial time whether a given chemical reaction network is mass-conserving (Mayr and Weihmann, in: International conference on applications and theory of petri nets and concurrency, Springer, New York, 2014), the equivalence we show gives an efficient algorithm to decide primitive atomicity. Subset atomic further requires all atoms be species, so intuitively this type of network is endowed with a “better” property than primitive atomic (i.e. mass conserving) ones in the sense that the atoms are not just abstract indivisible units, but also actual participants of reactions. We show that deciding if a network is subset atomic is in \({\mathsf{NP}}\), and “whether a network is subset atomic with respect to a given atom set” is strongly \({\mathsf{NP}}\)-\({\mathsf {complete}}\). Reachably atomic, studied by Adleman et al. (On the mathematics of the law of mass action, Springer, Dordrecht, 2014.  https://doi.org/10.1007/978-94-017-9041-3_1), and Gopalkrishnan (2016), further requires that each species has a sequence of reactions splitting it into its constituent atoms. Using a combinatorial argument, we show that there is a polynomial-time algorithm to decide whether a given network is reachably atomic, improving upon the result of Adleman et al. that the problem is decidable. We show that the reachability problem for reachably atomic networks is \({\mathsf {PSPACE}}\)-\({\mathsf {complete}}\). Finally, we demonstrate equivalence relationships between our definitions and some cases of an existing definition of atomicity due to Gnacadja (J Math Chem 49(10):2137, 2011).  相似文献   

14.
Using molecular dynamics simulations, the present study investigated the precise characteristics of the binary mixture of condensable gas (vapor) and non-condensable gas (NC gas) molecules creating kinetic boundary conditions (KBCs) at a gas–liquid interface in equilibrium. We counted the molecules utilizing the improved two-boundary method proposed in previous studies by Kobayashi et al. (Heat Mass Trans 52:1851–1859, 2016. doi: 10.1007/s00231-015-1700-6). In this study, we employed Ar for the vapor molecules, and Ne for the NC gas molecules. The present method allowed us to count easily the evaporating, condensing, degassing, dissolving, and reflecting molecules in order to investigate the detailed motion of the molecules, and also to evaluate the velocity distribution function of the KBCs at the interface. Our results showed that the evaporation and condensation coefficients for vapor and NC gas molecules decrease with the increase in the molar fraction of the NC gas molecules in the liquid. We also found that the KBCs can be specified as a function of the molar fraction and liquid temperature. Furthermore, we discussed the method to construct the KBCs of vapor and NC gas molecules.  相似文献   

15.
ABSTRACT

Image hiding methods embed a secret image into a host image. The resultant stego-image does not attract the interceptors that would not detect the differences between the host image and the stego-image. To exploit the great developments in the area of image compression and to improve the quality of stego-image, this paper proposes a new method to embed the secret image into the host image. Basically, the secret image is compressed and then embedded into host image. The embedding method is based on the Optimal Pixel Adjustment Process (OPAP) and genetic algorithm. In the paper we addressed the important issues to build such systems. The experimental results showed that the proposed method can improve the quality from 60% to 80% when compared with the simple Least Significant Bit (LSB) replacement methods. Adding to that, the mean square error of the stego-image is much lower compared with other methods (Chan & Cheng, 2004 Chan, C.K. and Cheng, L.M. 2004. Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3): 469474. [Crossref], [Web of Science ®] [Google Scholar]; Chang, Hsiao, & Chan, 2003 Chang, C.C., Hsiao, J.Y. and Chan, C.S. 2003. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36(7): 15831595. [Crossref], [Web of Science ®] [Google Scholar]; Thien & Lin, 2003 Thien, C.C. and Lin, J.C. 2003. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition, 36(12): 28752881. [Crossref], [Web of Science ®] [Google Scholar]; Tseng, Chan, Ho, & Chu, 208; Wang, Lin, & Lin, 2001 Wang, R.Z., Lin, C.F. and Lin, J.C. 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34(3): 671683. [Crossref], [Web of Science ®] [Google Scholar]). Also, the proposed technique improves capacity. In other words, we can embed a secret image with size 450?×?450 inside a hosting image with size 512?×?512.  相似文献   

16.
Recently, Gao et al. (J Time Ser Anal, 2016 doi:  10.1111/jtsa.12178) propose a new estimation method for dynamic panel probit model with random effects, where the theoretical properties of estimator are derived. In this paper, we extend their estimation method to the \(T\ge 3\) case, and some Monte Carlo simulations are presented to illustrate the extended estimator.  相似文献   

17.
《国际计算机数学杂志》2012,89(12):2568-2583
We present semi-local and local convergence results for Newton's method in order to approximate a locally unique solution of a nonlinear equation in a Banach space setting. Our technique is more flexible than in earlier studies such that [J.A. Ezquerro, D. González, and M.A. Hernández, Majorizing sequences for Newton's method from initial value problems, J. Comput. Appl. Math. 236 (2012), pp. 2246–2258; J.A. Ezquerro, D. González, and M.A. Hernández, A general semi-local convergence result for Newton's method under centred conditions for the second derivative, ESAIM: Math. Model. Numer. Anal. 47 (2013), pp. 149–167]. The operator involved is twice Fréchet-differentiable. We also assume certain centred Lipschitz-type conditions for the derivative which are more precise than the Lipschitz conditions used in earlier works. Numerical examples are used to show that our results apply to solve equations but earlier ones do not in the semi-local case. In the local case we obtain a larger convergence ball. These advantages are obtained under the same computational cost as before [17 J.A. Ezquerro, D. González, and M.A. Hernández, Majorizing sequences for Newton's method from initial value problems, J. Comput. Appl. Math. 236 (2012), pp. 22462258. doi: 10.1016/j.cam.2011.11.012[Crossref], [Web of Science ®] [Google Scholar],18 J.A. Ezquerro, D. González, and M.A. Hernández, A general semilocal convergence result for Newton's method under centered conditions for the second derivative, ESAIM: Math. Model. Numer. Anal. 47 (2013), pp. 149167. doi: 10.1051/m2an/2012026[Crossref], [Web of Science ®] [Google Scholar]].  相似文献   

18.
Using the well-known Arrow and Karlin (1958) Arrow, K.J., and Karlin, S. (1958), ‘Production over Time with Increasing Marginal Costs’, in Studies in the Mathematical Theory of Inventory and Production, eds. K.J. Arrow and S. Karlin, Stanford: Stanford University Press, pp. 6169. [Google Scholar] dynamic production–inventory model and the model with tradable emission permits which was presented by Dobos (2005 Dobos, I. (2005), ‘The Effects of Emission Trading on Production and Inventories in the Arrow–Karlin Model’, International Journal of Production Economics, 93–94, 301308.[Crossref], [Web of Science ®] [Google Scholar], 2007) Dobos I. (2007), ‘Tradable Emission Permits and Production-inventory Strategies of the Firm’, International Journal of Production Economics, 108, 329333.[Crossref], [Web of Science ®] [Google Scholar], we develop a model of the production–inventory system with deteriorating items and tradable emission permits. The objective of this paper is to apply the optimal control theory to solve the production–inventory problem with deteriorating items and tradable emission permits, and derive the optimal inventory level and the optimal production rate that minimise the total cost. The results are discussed with a numerical example and a sensitivity analysis of the optimal solution with respect to the parameters of the production–inventory system is carried out.  相似文献   

19.
Constraint Satisfaction Problem (CSP) is an important problem in artificial intelligence and operations research. Many practical problems can be formulated as CSP, i.e., finding a consistent value assignment to variables subject to a set of constraints. In this paper, we give a quantitative approach to solve the CSPs which deals uniformly with binary constraints as well as high order,k-ary (k ≥ 2) constraints. In this quantitative approach, using variable transformation and constraint transformation, a CSP is transformed into a satisfiability (SAT) problem. The SAT problem is then solved within a continuous search space. We will evaluate the performance of this method based on randomly generated SAT problem instances and regularly generatedk-ary (k ≥ 2) CSP problem instances.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号