期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Infinite-and K-Step Opacity Verification of Discrete-Event Systems Under Nondeterministic Observations
1
作者 CHU Qian ZHANG Jiahui +2 位作者 HAN Xiaoguang LI Zhiwu CHEN Zengqiang 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2023年第5期1830-1850,共21页
In some practical applications modeled by discrete-event systems(DES),the observations of events may be no longer deterministic due to sensor faults/failures,packet loss,and/or measurement uncertainties.In this contex... In some practical applications modeled by discrete-event systems(DES),the observations of events may be no longer deterministic due to sensor faults/failures,packet loss,and/or measurement uncertainties.In this context,it is interesting to reconsider the infinite-step opacity(∞-SO)and K-step opacity(K-SO)of a DES under abnormal conditions as mentioned.In this paper,the authors extend the notions of∞-SO and K-SO defined in the standard setting to the framework of nondeterministic observations(i.e.,the event-observation mechanism is state-dependent and nondeterministic).Obviously,the extended notions of∞-SO and K-SO are more general than the previous standard ones.To effectively verify them,a matrix-based current state estimator in the context of this advanced framework is constructed using the Boolean semi-tensor product(BSTP)technique.Accordingly,the necessary and sufficient conditions for verifying these two extended versions of opacity are provided as well as their complexity analysis.Finally,several examples are given to illustrate the obtained theoretical results. 展开更多
关键词 Boolean semi-tensor product discrete-event system infinite-step opacity K-step opacity nondeterministic observation
原文传递
Generating Conformance Tests for Nondeterministic Protocol Machines
2
作者 罗钢 《Journal of Computer Science & Technology》 SCIE EI CSCD 1994年第4期289-301,共13页
We present a method of generating test cases from the software specifications which are modeled by nondeterministic finite state machines. It is applicable to both nondeterministic and deterministic finite state mach... We present a method of generating test cases from the software specifications which are modeled by nondeterministic finite state machines. It is applicable to both nondeterministic and deterministic finite state machines. When applied to deterministic machines, this method yields usually smaller test suites with full fault coverage than the existing methods that also assure full fault coverage. In particular, the proposed mehod can be used to test the control portion of software specified in the formalspecification languages SDL or ESTELLE. 展开更多
关键词 Automata theory ESTELLE finite state machines nondeterministic finite state machines protocol conformance testing protocol engineering SDL and software testing
原文传递
Optimizing Connections:Applied Shortest Path Algorithms for MANETs
3
作者 Ibrahim Alameri Jitka Komarkova +2 位作者 Tawfik Al-Hadhrami Abdulsamad Ebrahim Yahya Atef Gharbi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期787-807,共21页
This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of nodes.Themain objective was to del... This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of nodes.Themain objective was to delve into and refine the application of the Dijkstra’s algorithm in this context,a method conventionally esteemed for its efficiency in static networks.Thus,this paper has carried out a comparative theoretical analysis with the Bellman-Ford algorithm,considering adaptation to the dynamic network conditions that are typical for MANETs.This paper has shown through detailed algorithmic analysis that Dijkstra’s algorithm,when adapted for dynamic updates,yields a very workable solution to the problem of real-time routing in MANETs.The results indicate that with these changes,Dijkstra’s algorithm performs much better computationally and 30%better in routing optimization than Bellman-Ford when working with configurations of sparse networks.The theoretical framework adapted,with the adaptation of the Dijkstra’s algorithm for dynamically changing network topologies,is novel in this work and quite different from any traditional application.The adaptation should offer more efficient routing and less computational overhead,most apt in the limited resource environment of MANETs.Thus,from these findings,one may derive a conclusion that the proposed version of Dijkstra’s algorithm is the best and most feasible choice of the routing protocol for MANETs given all pertinent key performance and resource consumption indicators and further that the proposed method offers a marked improvement over traditional methods.This paper,therefore,operationalizes the theoretical model into practical scenarios and also further research with empirical simulations to understand more about its operational effectiveness. 展开更多
关键词 Dijkstra’s algorithm optimization complexity analysis shortest path first comparative algorithm analysis nondeterministic polynomial(NP)-complete
在线阅读 下载PDF
High-security nondeterministic encryption communication based on spin-space-frequency multiplexing metasurface
4
作者 Shi Sun Yue Gou +1 位作者 Tie Jun Cui Hui Feng Ma 《PhotoniX》 2024年第1期77-93,共17页
Information security plays an important role in every aspect of life to protect data from stealing and deciphering.However,most of the previously reported works were based on pure algorithm layer or pure physical laye... Information security plays an important role in every aspect of life to protect data from stealing and deciphering.However,most of the previously reported works were based on pure algorithm layer or pure physical layer encryptions,which have certain limitations in security.In this paper,a nondeterministic message encryption communication scheme is proposed based on a spin-space-frequency multiplexing metasurface(SSFMM),which integrates both algorithmic and physical layer encryptions,and can also produce multiple different ciphertexts for the same message to prevent the message from being cracked through frequency analysis,thus greatly enhancing the security of the information.To be specific,an SSFMM is first designed as a physical-layer meta-key,which can generate eight independent dot matrix holograms with different spin,space,and frequency characteristics.The target message is then encrypted based on these dot matrix holograms combined with algorithmic operations,and the encrypted message is converted into a quick response(QR)code for easy sending to the target users.Once the target user gets that QR code,he/she can scan it to obtain the encryption information,and then recover the target message according to the pre-agreed encryption protocol combined with the eight dot matrix holograms of SSFMM.Finally,the feasibility of the proposed encryption scheme was experimentally validated at the microwave frequency band. 展开更多
关键词 Spin-space-frequency multiplexing metasurface High-security nondeterministic Encryption communication
原文传递
Simulated annealing algorithm for detecting graph isomorphism 被引量:4
5
作者 Geng Xiutang Zhang Kai 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第5期1047-1052,共6页
Evolutionary computation techniques have mostly been used to solve various optimization problems, and it is well known that graph isomorphism problem (GIP) is a nondeterministic polynomial problem. A simulated annea... Evolutionary computation techniques have mostly been used to solve various optimization problems, and it is well known that graph isomorphism problem (GIP) is a nondeterministic polynomial problem. A simulated annealing (SA) algorithm for detecting graph isomorphism is proposed, and the proposed SA algorithm is well suited to deal with random graphs with large size. To verify the validity of the proposed SA algorithm, simulations are performed on three pairs of small graphs and four pairs of large random graphs with edge densities 0.5, 0.1, and 0.01, respectively. The simulation results show that the proposed SA algorithm can detect graph isomorphism with a high probability. 展开更多
关键词 graph isomorphism problem simulated annealing algorithm nondeterministic polynomial problem local search.
在线阅读 下载PDF
Statistics of states generated by quantum-scissors device
6
作者 Ming-Hao Wang Guo-An Yan 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第3期103-108,共6页
Generating desired states is a prerequisite in quantum information. Some desired states can be generated by a quantum-scissors device(QSD). We present a detailed analysis of the properties of the generated states, inc... Generating desired states is a prerequisite in quantum information. Some desired states can be generated by a quantum-scissors device(QSD). We present a detailed analysis of the properties of the generated states, including average photon numbers and intensity gains. The theoretical analysis shows that there is a nondeterministic amplification in terms of the average photon number under the condition that the average photon number of the input state is less than 1. In contrast to the input states, the generated states show the nonclassical property described by the negativity of the Wigner function. Furthermore, we generalize the QSD to truncate arbitrary photon number terms of the input states, which may be useful in high-dimensional quantum information processing. 展开更多
关键词 QUANTUM state generation nondeterministic AMPLIFICATION NONCLASSICAL property generalized quantum-scissors
在线阅读 下载PDF
SIMULATED ANNEALING BASED POLYNOMIAL TIME QOS ROUTING ALGORITHM FOR MANETS
7
作者 Liu Lianggui Feng Guangzeng 《Journal of Electronics(China)》 2006年第5期691-697,共7页
Multi-constrained Quality-of-Service (QoS) routing is a big challenge for Mobile Ad hoc Networks (MANETs) where the topology may change constantly. In this paper a novel QoS Routing Algorithm based on Simulated Anneal... Multi-constrained Quality-of-Service (QoS) routing is a big challenge for Mobile Ad hoc Networks (MANETs) where the topology may change constantly. In this paper a novel QoS Routing Algorithm based on Simulated Annealing (SA_RA) is proposed. This algorithm first uses an energy function to translate multiple QoS weights into a single mixed metric and then seeks to find a feasible path by simulated annealing. The pa- per outlines simulated annealing algorithm and analyzes the problems met when we apply it to Qos Routing (QoSR) in MANETs. Theoretical analysis and experiment results demonstrate that the proposed method is an effective approximation algorithms showing better performance than the other pertinent algorithm in seeking the (approximate) optimal configuration within a period of polynomial time. 展开更多
关键词 Energy function Multi-constrained Quality-of-Service (QoS) routing nondeterministic polynomial time complete problem Polynomial time algorithm Simulated annealing
在线阅读 下载PDF
Local Search Heuristics for NFA State Minimization Problem
8
作者 Andrey V. Tsyganov 《International Journal of Communications, Network and System Sciences》 2012年第9期638-643,共6页
In the present paper we introduce new heuristic methods for the state minimization of nondeterministic finite automata. These methods are based on the classical Kameda-Weiner algorithm joined with local search heurist... In the present paper we introduce new heuristic methods for the state minimization of nondeterministic finite automata. These methods are based on the classical Kameda-Weiner algorithm joined with local search heuristics, such as stochastic hill climbing and simulated annealing. The description of the proposed methods is given and the results of the numerical experiments are provided. 展开更多
关键词 nondeterministic Finite AUTOMATA STATE MINIMIZATION HEURISTICS Local Search PARALLELISM
在线阅读 下载PDF
A Program Study of the Union of Semilattices on the Set of Subsets of Grids of Waterloo Language
9
作者 Mikhail E. Abramyan Boris F. Melnikov 《Journal of Applied Mathematics and Physics》 2023年第5期1459-1470,共12页
The aim is to study the set of subsets of grids of the Waterloo language from the point of view of abstract algebra and graph theory. The study was conducted using the library for working with transition graphs of non... The aim is to study the set of subsets of grids of the Waterloo language from the point of view of abstract algebra and graph theory. The study was conducted using the library for working with transition graphs of nondeterministic finite automata NFALib implemented by one of the authors in C#, as well as statistical methods for analyzing algorithms. The results are regularities obtained when considering semilattices on a set of subsets of grids of the Waterloo language. It follows from the results obtained that the minimum covering automaton equivalent to the Waterloo automaton can be obtained by adding one additional to the minimum covering set of grids. . 展开更多
关键词 nondeterministic Finite Automata Universal Automaton Basic Automaton Grid Covering Automaton Equivalent Transformation Algorithms Water-loo Automaton
在线阅读 下载PDF
A Comparative Study on Test Case Generation of Concurrent Programs
10
作者 Bidush Kumar Sahoo Mitrabinda Ray 《World Journal of Engineering and Technology》 2016年第2期273-280,共8页
This paper deals with a comparative study on testing of concurrent programs based on different techniques. The various challenges in testing concurrent programming are: defining test coverage criteria based on control... This paper deals with a comparative study on testing of concurrent programs based on different techniques. The various challenges in testing concurrent programming are: defining test coverage criteria based on control flow, generating control flow graph of nondeterministic programs, investigating the applicability of sequential testing criteria to parallel program testing etc. For solving these issues, some existing techniques are discussed in this study. Various researchers use an intermediate graph called Event Inter Actions Graph (EIAG) to solve the problem of generating the control flow graph of nondeterministic programs. Some researches propose an intermediate graph called Interaction Sequence Testing Criteria (ISTC) approach based on sequence of interactions to solve the problem of test coverage criteria based on control and data flow. Another method to solve the problem of generating test coverage based on control flow graph of nondeterministic programs is constraint based approach. It needs constrained elements to generate test case which includes structural element and constraint. The selection of good test cases has been addressed by test data generation technique. The technique of concurrent path analysis approach is used to solve the problem of applicability of sequential testing criteria to parallel program testing. It reduces the number of combined concurrent test paths. The sequential test paths are combined to form concurrent test path. The Integration and System Test Automation (ISTA) approach is used to solve the problem of applicability of sequential testing criteria to parallel program testing. It is used for automated test case generation and execution by using high-level Petri net is a finite state test model. 展开更多
关键词 Concurrent Program EIAG Dead Statement Control Flow Graph nondeterministic Program
在线阅读 下载PDF
Certainty-based Preference Completion 被引量:1
11
作者 Lei Li Minghe Xue +2 位作者 Zan Zhang Huanhuan Chen Xindong Wu 《Data Intelligence》 EI 2022年第1期112-133,共22页
As from time to time it is impractical to ask agents to provide linear orders over all alternatives,for these partial rankings it is necessary to conduct preference completion.Specifically,the personalized preference ... As from time to time it is impractical to ask agents to provide linear orders over all alternatives,for these partial rankings it is necessary to conduct preference completion.Specifically,the personalized preference of each agent over all the alternatives can be estimated with partial rankings from neighboring agents over subsets of alternatives.However,since the agents’rankings are nondeterministic,where they may provide rankings with noise,it is necessary and important to conduct the certainty-based preference completion.Hence,in this paper firstly,for alternative pairs with the obtained ranking set,a bijection has been built from the ranking space to the preference space,and the certainty and conflict of alternative pairs have been evaluated with a well-built statistical measurement Probability-Certainty Density Function on subjective probability,respectively.Then,a certainty-based voting algorithm based on certainty and conflict has been taken to conduct the certainty-based preference completion.Moreover,the properties of the proposed certainty and conflict have been studied empirically,and the proposed approach on certainty-based preference completion for partial rankings has been experimentally validated compared to state-of-arts approaches with several datasets. 展开更多
关键词 Preference completion nondeterministic CERTAINTY Subjective probability CONFLICT
原文传递
Big Data analytics for privacy through ND-homomorphic encryption
12
作者 S.Saravanan N.Poornima 《Journal of Control and Decision》 EI 2023年第1期64-71,共8页
Rapidly rising the quantity of Big Data is an opportunity to flout the privacy of people. Whenhigh processing capacity and massive storage are required for Big Data, distributed networkshave been used. There are sever... Rapidly rising the quantity of Big Data is an opportunity to flout the privacy of people. Whenhigh processing capacity and massive storage are required for Big Data, distributed networkshave been used. There are several people involved in these activities, the system may contributeto privacy infringements frameworks have been developed for the preservation of privacy atvarious levels (e.g. information age, information the executives and information preparing) asfor the existing pattern of huge information. We plan to frame this paper as a literature surveyof these classifications, including the Privacy Processes in Big Data and the presentation of theAssociate Challenges. Homomorphic encryption is particularised aimed at solitary single actionon the ciphered information. Homomorphic enciphering is restrained to an honest operation onthe encoded data. The reference to encryption project fulfils many accurate trading operationson coded numerical data;therefore, it protects the written in code-sensible information evenmore. 展开更多
关键词 Security and confidentiality vast statistics data ENCRYPTION nondeterministic fully homomorphic encryption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部