The distributed permutation flow shop scheduling problem(DPFSP)has received increasing attention in recent years.The iterated greedy algorithm(IGA)serves as a powerful optimizer for addressing such a problem because o...The distributed permutation flow shop scheduling problem(DPFSP)has received increasing attention in recent years.The iterated greedy algorithm(IGA)serves as a powerful optimizer for addressing such a problem because of its straightforward,single-solution evolution framework.However,a potential draw-back of IGA is the lack of utilization of historical information,which could lead to an imbalance between exploration and exploitation,especially in large-scale DPFSPs.As a consequence,this paper develops an IGA with memory and learning mechanisms(MLIGA)to efficiently solve the DPFSP targeted at the mini-malmakespan.InMLIGA,we incorporate a memory mechanism to make a more informed selection of the initial solution at each stage of the search,by extending,reconstructing,and reinforcing the information from previous solutions.In addition,we design a twolayer cooperative reinforcement learning approach to intelligently determine the key parameters of IGA and the operations of the memory mechanism.Meanwhile,to ensure that the experience generated by each perturbation operator is fully learned and to reduce the prior parameters of MLIGA,a probability curve-based acceptance criterion is proposed by combining a cube root function with custom rules.At last,a discrete adaptive learning rate is employed to enhance the stability of the memory and learningmechanisms.Complete ablation experiments are utilized to verify the effectiveness of the memory mechanism,and the results show that this mechanism is capable of improving the performance of IGA to a large extent.Furthermore,through comparative experiments involving MLIGA and five state-of-the-art algorithms on 720 benchmarks,we have discovered that MLI-GA demonstrates significant potential for solving large-scale DPFSPs.This indicates that MLIGA is well-suited for real-world distributed flow shop scheduling.展开更多
Addressing the challenges posed by the nonlinear and non-stationary vibrations in rotating machinery,where weak fault characteristic signals hinder accurate fault state representation,we propose a novel feature extrac...Addressing the challenges posed by the nonlinear and non-stationary vibrations in rotating machinery,where weak fault characteristic signals hinder accurate fault state representation,we propose a novel feature extraction method that combines the Flexible Analytic Wavelet Transform(FAWT)with Nonlinear Quantum Permutation Entropy.FAWT,leveraging fractional orders and arbitrary scaling and translation factors,exhibits superior translational invariance and adjustable fundamental oscillatory characteristics.This flexibility enables FAWT to provide well-suited wavelet shapes,effectively matching subtle fault components and avoiding performance degradation associated with fixed frequency partitioning and low-oscillation bases in detecting weak faults.In our approach,gearbox vibration signals undergo FAWT to obtain sub-bands.Quantum theory is then introduced into permutation entropy to propose Nonlinear Quantum Permutation Entropy,a feature that more accurately characterizes the operational state of vibration simulation signals.The nonlinear quantum permutation entropy extracted from sub-bands is utilized to characterize the operating state of rotating machinery.A comprehensive analysis of vibration signals from rolling bearings and gearboxes validates the feasibility of the proposed method.Comparative assessments with parameters derived from traditional permutation entropy,sample entropy,wavelet transform(WT),and empirical mode decomposition(EMD)underscore the superior effectiveness of this approach in fault detection and classification for rotating machinery.展开更多
In the manufacturing industry,reasonable scheduling can greatly improve production efficiency,while excessive resource consumption highlights the growing significance of energy conservation in production.This paper st...In the manufacturing industry,reasonable scheduling can greatly improve production efficiency,while excessive resource consumption highlights the growing significance of energy conservation in production.This paper studies the problem of energy-efficient distributed heterogeneous permutation flowshop problem with variable processing speed(DHPFSP-VPS),considering both the minimum makespan and total energy consumption(TEC)as objectives.A discrete multi-objective squirrel search algorithm(DMSSA)is proposed to solve the DHPFSPVPS.DMSSA makes four improvements based on the squirrel search algorithm.Firstly,in terms of the population initialization strategy,four hybrid initialization methods targeting different objectives are proposed to enhance the quality of initial solutions.Secondly,enhancements are made to the population hierarchy system and position updating methods of the squirrel search algorithm,making it more suitable for discrete scheduling problems.Additionally,regarding the search strategy,six local searches are designed based on problem characteristics to enhance search capability.Moreover,a dynamic predator strategy based on Q-learning is devised to effectively balance DMSSA’s capability for global exploration and local exploitation.Finally,two speed control energy-efficient strategies are designed to reduce TEC.Extensive comparative experiments are conducted in this paper to validate the effectiveness of the proposed strategies.The results of comparing DMSSA with other algorithms demonstrate its superior performance and its potential for efficient solving of the DHPFSP-VPS problem.展开更多
We explore the entanglement features of pure symmetric N-qubit states characterized by N-distinct spinors with a particular focus on the Greenberger-Horne-Zeilinger (GHZ) states and , an equal superposition of W and o...We explore the entanglement features of pure symmetric N-qubit states characterized by N-distinct spinors with a particular focus on the Greenberger-Horne-Zeilinger (GHZ) states and , an equal superposition of W and obverse W states. Along with a comparison of pairwise entanglement and monogamy properties, we explore the geometric information contained in them by constructing their canonical steering ellipsoids. We obtain the volume monogamy relations satisfied by states as a function of number of qubits and compare with the maximal monogamy property of GHZ states.展开更多
In combinatorics, permutations are important objects with many operations. In this paper, we define a coupling product on permutations and prove that the space spanned by permutations is a graded algebra.
The cascade of reversible logic gate network with n inputs and n outputs forms a group isomorphic to the symmetric group S2^n. Characteristics of a number of gates from the set of all generalized Toffoli gates are stu...The cascade of reversible logic gate network with n inputs and n outputs forms a group isomorphic to the symmetric group S2^n. Characteristics of a number of gates from the set of all generalized Toffoli gates are studied. Any permutation Sn is proved to be generated by a n-cycle 9 and a permutation τ= (ij,ik) together. It shows that any neighboring 2-cycle permutation can be generated by at most two NOT gates without ancilla bit. Based on the above theory, a cascade algorithm for reversible logic gate networks is proposed. A reversible example of logic gate network cascade is given to show the correctness of the algorithm.展开更多
The image's least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV...The image's least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV-LSBCP) is a novel chaotic image encryption cryptosystem introduced in this article. The FSV-LSBCP effectively strengthens the security of the cryptographic scheme concerning the properties of the FSV. Key analysis, statistical analysis, resistance differential attack analysis, and resistance to cropping attacks and noise attacks are the focus of the suggested image encryption cryptosystem. The security experiment shows that the cryptosystem is adequate to achieve the desired degree of security.展开更多
A constrained partial permutation strategy is proposed for matching spatial relation graph (SRG), which is used in our sketch input and recognition system Smart Sketchpad for representing the spatial relationship amon...A constrained partial permutation strategy is proposed for matching spatial relation graph (SRG), which is used in our sketch input and recognition system Smart Sketchpad for representing the spatial relationship among the components of a graphic object. Using two kinds of matching constraints dynamically generated in the matching process, the proposed approach can prune most improper mappings between SRGs during the matching process. According to our theoretical analysis in this paper, the time complexity of our approach is O(n 2) in the best case, and O(n!) in the worst case, which occurs infrequently. The spatial complexity is always O(n) for all cases. Implemented in Smart Sketchpad, our proposed strategy is of good performance.展开更多
Representation theory is concerned with the ways of explaining or visualizing a group as a group of matrices. In this paper, we extend the permutation pattern of to a two-line notation. We consider the representations...Representation theory is concerned with the ways of explaining or visualizing a group as a group of matrices. In this paper, we extend the permutation pattern of to a two-line notation. We consider the representations of this non-deranged permutation group(p ≥ 5 and p a prime). Also we reveal some interesting properties and results of the character of where .展开更多
Remarkable progress has been achieved on microseismic signal denoising in recent years,which is the basic component for rock-burst detection.However,its denoising effectiveness remains unsatisfactory.To extract the ef...Remarkable progress has been achieved on microseismic signal denoising in recent years,which is the basic component for rock-burst detection.However,its denoising effectiveness remains unsatisfactory.To extract the effective microseismic signal from polluted noisy signals,a novel microseismic signal denoising method that combines the variational mode decomposition(VMD)and permutation entropy(PE),which we denote as VMD–PE,is proposed in this paper.VMD is a recently introduced technique for adaptive signal decomposition,where K is an important decomposing parameter that determines the number of modes.VMD provides a predictable eff ect on the nature of detected modes.In this work,we present a method that addresses the problem of selecting an appropriate K value by constructing a simulation signal whose spectrum is similar to that of a mine microseismic signal and apply this value to the VMD–PE method.In addition,PE is developed to identify the relevant effective microseismic signal modes,which are reconstructed to realize signal filtering.The experimental results show that the VMD–PE method remarkably outperforms the empirical mode decomposition(EMD)–VMD filtering and detrended fl uctuation analysis(DFA)–VMD denoising methods of the simulated and real microseismic signals.We expect that this novel method can inspire and help evaluate new ideas in this field.展开更多
Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalize...Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalized Walsh spectrum of multi-output functions and the auto-correlation function of multi-output functions to investigate the Walsh spectral characteristics and the auto-correlation function characteristics of orthormophic permutations, several results are obtained.展开更多
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ...Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown.展开更多
Recent researches show that there are some anomalies,which are not satisfied with common sense,appearing in some special permutation flow shop scheduling problems(PFSPs).These anomalies can be divided into three diffe...Recent researches show that there are some anomalies,which are not satisfied with common sense,appearing in some special permutation flow shop scheduling problems(PFSPs).These anomalies can be divided into three different types,such as changing the processing time of some operations,changing the number of total jobs and changing the number of total machines.This paper summarizes these three types of anomalies showing in the special PFSPs and gives some examples to make them better understood.The extended critical path is proposed and the reason why these anomalies happen in special PFSPs is given:anomalies will occur in these special PFSPs when the time of the operations on the reverse critical path changes.After that,the further reason for these anomalies is presented that when any one of these three types of anomalies happens,the original constraint in the special PFSPs is destroyed,which makes the anomalies appear.Finally,the application of these anomalies in production practice is given through examples and also with the possible research directions.The main contribution of this research is analyzing the intial reason why the anomalies appear in special PFSPs and pointing out the application and the possible research directions of all these three types of anomalies.展开更多
This letter presents a method for digital image watermarking for copyright protection. This technique produces a watermarked image that closely retains the quality of the original host image while concurrently survivi...This letter presents a method for digital image watermarking for copyright protection. This technique produces a watermarked image that closely retains the quality of the original host image while concurrently surviving various image processing operations such as lowpass/highpass filtering, lossy JPEG compression, and cropping. This image watermarking algorithm takes full advantage of permutation and 2-D barcode (PDF417). The actual watermark embedding in spatial domain is followed using permutated image for improving the resistance to image cropping. Much higher watermark robustness is obtainable via a simple forward error correction technique, which is the main feature of PDF417 codes. Additional features of this technique include the easy determination of the existence of the watermark and that the watermark verification procedure does not need the original host image. The experimental results demonstrate its effectiveness.展开更多
Two new design approaches for constructing Low-Density Parity-Check(LDPC) codes are proposed.One is used to design regular Quasi-Cyclic LDPC(QC-LDPC) codes with girth at least 8.The other is used to design irregular L...Two new design approaches for constructing Low-Density Parity-Check(LDPC) codes are proposed.One is used to design regular Quasi-Cyclic LDPC(QC-LDPC) codes with girth at least 8.The other is used to design irregular LDPC codes.Both of their parity-check matrices are composed of Circulant Permutation Matrices(CPMs).When iteratively decoded with the Sum-Product Algorithm(SPA),these proposed codes exhibit good performances over the AWGN channel.展开更多
Bearings are crucial components in rotating machines,which have direct effects on industrial productivity and safety.To fast and accurately identify the operating condition of bearings,a novel method based on multi⁃sc...Bearings are crucial components in rotating machines,which have direct effects on industrial productivity and safety.To fast and accurately identify the operating condition of bearings,a novel method based on multi⁃scale permutation entropy(MPE)and morphology similarity distance(MSD)is proposed in this paper.Firstly,the MPE values of the original signals were calculated to characterize the complexity in different scales and they constructed feature vectors after normalization.Then,the MSD was employed to measure the distance among test samples from different fault types and the reference samples,and achieved classification with the minimum MSD.Finally,the proposed method was verified with two experiments concerning artificially seeded damage bearings and run⁃to⁃failure bearings,respectively.Different categories were considered for the two experiments and high classification accuracies were obtained.The experimental results indicate that the proposed method is effective and feasible in bearing fault diagnosis.展开更多
The permutation flowshop scheduling problem (PFSP) is one of the most well-known and well-studied production scheduling problems with strong industrial background. This paper presents a new hybrid optimization algor...The permutation flowshop scheduling problem (PFSP) is one of the most well-known and well-studied production scheduling problems with strong industrial background. This paper presents a new hybrid optimization algorithm which combines the strong global search ability of artificial immune system (AIS) with a strong local search ability of extremal optimization (EO) algorithm. The proposed algorithm is applied to a set of benchmark problems with a makespan criterion. Performance of the algorithm is evaluated. Comparison results indicate that this new method is an effective and competitive approach to the PFSP.展开更多
Under improper transformations,the traditional transformation laws for cross products,the permutation tensor,and rotations are incorrect.For a cross product,using a counter-example the left-hand rule is proved wrong.T...Under improper transformations,the traditional transformation laws for cross products,the permutation tensor,and rotations are incorrect.For a cross product,using a counter-example the left-hand rule is proved wrong.The unique rule for a cross product is the right-hand rule.Coordinate systems have handedness,while a cross product is frame-indifference.Since the permutation tensor is defined as a triple product including a cross product,the law for the permutation tensor is false.For a rotation,its pseudovector representation is incorrect,because the mirror is an auxiliary device to produce the virtual image rather than a new coordinate system or reference frame.展开更多
基金supported in part by the National Key Research and Development Program of China under Grant No.2021YFF0901300in part by the National Natural Science Foundation of China under Grant Nos.62173076 and 72271048.
文摘The distributed permutation flow shop scheduling problem(DPFSP)has received increasing attention in recent years.The iterated greedy algorithm(IGA)serves as a powerful optimizer for addressing such a problem because of its straightforward,single-solution evolution framework.However,a potential draw-back of IGA is the lack of utilization of historical information,which could lead to an imbalance between exploration and exploitation,especially in large-scale DPFSPs.As a consequence,this paper develops an IGA with memory and learning mechanisms(MLIGA)to efficiently solve the DPFSP targeted at the mini-malmakespan.InMLIGA,we incorporate a memory mechanism to make a more informed selection of the initial solution at each stage of the search,by extending,reconstructing,and reinforcing the information from previous solutions.In addition,we design a twolayer cooperative reinforcement learning approach to intelligently determine the key parameters of IGA and the operations of the memory mechanism.Meanwhile,to ensure that the experience generated by each perturbation operator is fully learned and to reduce the prior parameters of MLIGA,a probability curve-based acceptance criterion is proposed by combining a cube root function with custom rules.At last,a discrete adaptive learning rate is employed to enhance the stability of the memory and learningmechanisms.Complete ablation experiments are utilized to verify the effectiveness of the memory mechanism,and the results show that this mechanism is capable of improving the performance of IGA to a large extent.Furthermore,through comparative experiments involving MLIGA and five state-of-the-art algorithms on 720 benchmarks,we have discovered that MLI-GA demonstrates significant potential for solving large-scale DPFSPs.This indicates that MLIGA is well-suited for real-world distributed flow shop scheduling.
基金supported financially by FundamentalResearch Program of Shanxi Province(No.202103021223056).
文摘Addressing the challenges posed by the nonlinear and non-stationary vibrations in rotating machinery,where weak fault characteristic signals hinder accurate fault state representation,we propose a novel feature extraction method that combines the Flexible Analytic Wavelet Transform(FAWT)with Nonlinear Quantum Permutation Entropy.FAWT,leveraging fractional orders and arbitrary scaling and translation factors,exhibits superior translational invariance and adjustable fundamental oscillatory characteristics.This flexibility enables FAWT to provide well-suited wavelet shapes,effectively matching subtle fault components and avoiding performance degradation associated with fixed frequency partitioning and low-oscillation bases in detecting weak faults.In our approach,gearbox vibration signals undergo FAWT to obtain sub-bands.Quantum theory is then introduced into permutation entropy to propose Nonlinear Quantum Permutation Entropy,a feature that more accurately characterizes the operational state of vibration simulation signals.The nonlinear quantum permutation entropy extracted from sub-bands is utilized to characterize the operating state of rotating machinery.A comprehensive analysis of vibration signals from rolling bearings and gearboxes validates the feasibility of the proposed method.Comparative assessments with parameters derived from traditional permutation entropy,sample entropy,wavelet transform(WT),and empirical mode decomposition(EMD)underscore the superior effectiveness of this approach in fault detection and classification for rotating machinery.
基金supported by the Key Research and Development Project of Hubei Province(Nos.2020BAB114 and 2023BAB094).
文摘In the manufacturing industry,reasonable scheduling can greatly improve production efficiency,while excessive resource consumption highlights the growing significance of energy conservation in production.This paper studies the problem of energy-efficient distributed heterogeneous permutation flowshop problem with variable processing speed(DHPFSP-VPS),considering both the minimum makespan and total energy consumption(TEC)as objectives.A discrete multi-objective squirrel search algorithm(DMSSA)is proposed to solve the DHPFSPVPS.DMSSA makes four improvements based on the squirrel search algorithm.Firstly,in terms of the population initialization strategy,four hybrid initialization methods targeting different objectives are proposed to enhance the quality of initial solutions.Secondly,enhancements are made to the population hierarchy system and position updating methods of the squirrel search algorithm,making it more suitable for discrete scheduling problems.Additionally,regarding the search strategy,six local searches are designed based on problem characteristics to enhance search capability.Moreover,a dynamic predator strategy based on Q-learning is devised to effectively balance DMSSA’s capability for global exploration and local exploitation.Finally,two speed control energy-efficient strategies are designed to reduce TEC.Extensive comparative experiments are conducted in this paper to validate the effectiveness of the proposed strategies.The results of comparing DMSSA with other algorithms demonstrate its superior performance and its potential for efficient solving of the DHPFSP-VPS problem.
文摘We explore the entanglement features of pure symmetric N-qubit states characterized by N-distinct spinors with a particular focus on the Greenberger-Horne-Zeilinger (GHZ) states and , an equal superposition of W and obverse W states. Along with a comparison of pairwise entanglement and monogamy properties, we explore the geometric information contained in them by constructing their canonical steering ellipsoids. We obtain the volume monogamy relations satisfied by states as a function of number of qubits and compare with the maximal monogamy property of GHZ states.
文摘In combinatorics, permutations are important objects with many operations. In this paper, we define a coupling product on permutations and prove that the space spanned by permutations is a graded algebra.
基金the National Natural Science Foundation of China(60673127)the National High Technology Research and Development Program of China(863Program)(2007AA01Z404)~~
文摘The cascade of reversible logic gate network with n inputs and n outputs forms a group isomorphic to the symmetric group S2^n. Characteristics of a number of gates from the set of all generalized Toffoli gates are studied. Any permutation Sn is proved to be generated by a n-cycle 9 and a permutation τ= (ij,ik) together. It shows that any neighboring 2-cycle permutation can be generated by at most two NOT gates without ancilla bit. Based on the above theory, a cascade algorithm for reversible logic gate networks is proposed. A reversible example of logic gate network cascade is given to show the correctness of the algorithm.
基金supported by the National Natural Science Foundation of China (Grant No. 61672124)the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund,China (Grant No. MMJJ20170203)+2 种基金the Liaoning Provincial Science and Technology Innovation Leading Talents Program Project,China (Grant No. XLYC1802013)the Key Research and Development Projects of Liaoning Province,China (Grant No. 2019020105-JH2/103)the Jinan City 20-University Funding Projects for Introducing Innovation Team Program,China (Grant No. 2019GXRC031)。
文摘The image's least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV-LSBCP) is a novel chaotic image encryption cryptosystem introduced in this article. The FSV-LSBCP effectively strengthens the security of the cryptographic scheme concerning the properties of the FSV. Key analysis, statistical analysis, resistance differential attack analysis, and resistance to cropping attacks and noise attacks are the focus of the suggested image encryption cryptosystem. The security experiment shows that the cryptosystem is adequate to achieve the desired degree of security.
文摘A constrained partial permutation strategy is proposed for matching spatial relation graph (SRG), which is used in our sketch input and recognition system Smart Sketchpad for representing the spatial relationship among the components of a graphic object. Using two kinds of matching constraints dynamically generated in the matching process, the proposed approach can prune most improper mappings between SRGs during the matching process. According to our theoretical analysis in this paper, the time complexity of our approach is O(n 2) in the best case, and O(n!) in the worst case, which occurs infrequently. The spatial complexity is always O(n) for all cases. Implemented in Smart Sketchpad, our proposed strategy is of good performance.
文摘Representation theory is concerned with the ways of explaining or visualizing a group as a group of matrices. In this paper, we extend the permutation pattern of to a two-line notation. We consider the representations of this non-deranged permutation group(p ≥ 5 and p a prime). Also we reveal some interesting properties and results of the character of where .
基金supported by the National Natural Science Foundation of China(No.51904173)Shandong Provincial Natural Science Foundation(No.ZR2018MEE008)the Project of Shandong Province Higher Educational Science and Technology Program(No.J18KA307).
文摘Remarkable progress has been achieved on microseismic signal denoising in recent years,which is the basic component for rock-burst detection.However,its denoising effectiveness remains unsatisfactory.To extract the effective microseismic signal from polluted noisy signals,a novel microseismic signal denoising method that combines the variational mode decomposition(VMD)and permutation entropy(PE),which we denote as VMD–PE,is proposed in this paper.VMD is a recently introduced technique for adaptive signal decomposition,where K is an important decomposing parameter that determines the number of modes.VMD provides a predictable eff ect on the nature of detected modes.In this work,we present a method that addresses the problem of selecting an appropriate K value by constructing a simulation signal whose spectrum is similar to that of a mine microseismic signal and apply this value to the VMD–PE method.In addition,PE is developed to identify the relevant effective microseismic signal modes,which are reconstructed to realize signal filtering.The experimental results show that the VMD–PE method remarkably outperforms the empirical mode decomposition(EMD)–VMD filtering and detrended fl uctuation analysis(DFA)–VMD denoising methods of the simulated and real microseismic signals.We expect that this novel method can inspire and help evaluate new ideas in this field.
基金Supported by State Key Laboratory of InformationSecurity Opening Foundation(01-02) .
文摘Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalized Walsh spectrum of multi-output functions and the auto-correlation function of multi-output functions to investigate the Walsh spectral characteristics and the auto-correlation function characteristics of orthormophic permutations, several results are obtained.
基金Project supported by the National Natural Science Foundationof China (Nos. 60302012+2 种基金 60202002) and the Youth ScientificResearch Foundation of Ningbo (No. 2003A61006) China
文摘Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown.
基金Supported by National Natural Science Foundation of China(Grant No.51825502).
文摘Recent researches show that there are some anomalies,which are not satisfied with common sense,appearing in some special permutation flow shop scheduling problems(PFSPs).These anomalies can be divided into three different types,such as changing the processing time of some operations,changing the number of total jobs and changing the number of total machines.This paper summarizes these three types of anomalies showing in the special PFSPs and gives some examples to make them better understood.The extended critical path is proposed and the reason why these anomalies happen in special PFSPs is given:anomalies will occur in these special PFSPs when the time of the operations on the reverse critical path changes.After that,the further reason for these anomalies is presented that when any one of these three types of anomalies happens,the original constraint in the special PFSPs is destroyed,which makes the anomalies appear.Finally,the application of these anomalies in production practice is given through examples and also with the possible research directions.The main contribution of this research is analyzing the intial reason why the anomalies appear in special PFSPs and pointing out the application and the possible research directions of all these three types of anomalies.
文摘This letter presents a method for digital image watermarking for copyright protection. This technique produces a watermarked image that closely retains the quality of the original host image while concurrently surviving various image processing operations such as lowpass/highpass filtering, lossy JPEG compression, and cropping. This image watermarking algorithm takes full advantage of permutation and 2-D barcode (PDF417). The actual watermark embedding in spatial domain is followed using permutated image for improving the resistance to image cropping. Much higher watermark robustness is obtainable via a simple forward error correction technique, which is the main feature of PDF417 codes. Additional features of this technique include the easy determination of the existence of the watermark and that the watermark verification procedure does not need the original host image. The experimental results demonstrate its effectiveness.
基金Supported by the National Natural Science Foundation of China(Nos.61271199,61172022)
文摘Two new design approaches for constructing Low-Density Parity-Check(LDPC) codes are proposed.One is used to design regular Quasi-Cyclic LDPC(QC-LDPC) codes with girth at least 8.The other is used to design irregular LDPC codes.Both of their parity-check matrices are composed of Circulant Permutation Matrices(CPMs).When iteratively decoded with the Sum-Product Algorithm(SPA),these proposed codes exhibit good performances over the AWGN channel.
基金Sponsored by the National Natural Science Foundation of China(Grant No.51505100)
文摘Bearings are crucial components in rotating machines,which have direct effects on industrial productivity and safety.To fast and accurately identify the operating condition of bearings,a novel method based on multi⁃scale permutation entropy(MPE)and morphology similarity distance(MSD)is proposed in this paper.Firstly,the MPE values of the original signals were calculated to characterize the complexity in different scales and they constructed feature vectors after normalization.Then,the MSD was employed to measure the distance among test samples from different fault types and the reference samples,and achieved classification with the minimum MSD.Finally,the proposed method was verified with two experiments concerning artificially seeded damage bearings and run⁃to⁃failure bearings,respectively.Different categories were considered for the two experiments and high classification accuracies were obtained.The experimental results indicate that the proposed method is effective and feasible in bearing fault diagnosis.
基金Project supported by the National Natural Science Foundation of China (Grant No.60574063)
文摘The permutation flowshop scheduling problem (PFSP) is one of the most well-known and well-studied production scheduling problems with strong industrial background. This paper presents a new hybrid optimization algorithm which combines the strong global search ability of artificial immune system (AIS) with a strong local search ability of extremal optimization (EO) algorithm. The proposed algorithm is applied to a set of benchmark problems with a makespan criterion. Performance of the algorithm is evaluated. Comparison results indicate that this new method is an effective and competitive approach to the PFSP.
基金National Natural Science Foundation of China(No.51978166)the Research Fund of Sanjiang University(No.2018SJKY005)。
文摘Under improper transformations,the traditional transformation laws for cross products,the permutation tensor,and rotations are incorrect.For a cross product,using a counter-example the left-hand rule is proved wrong.The unique rule for a cross product is the right-hand rule.Coordinate systems have handedness,while a cross product is frame-indifference.Since the permutation tensor is defined as a triple product including a cross product,the law for the permutation tensor is false.For a rotation,its pseudovector representation is incorrect,because the mirror is an auxiliary device to produce the virtual image rather than a new coordinate system or reference frame.