首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 140 毫秒
1.
提出了一种静态的软硬件任务划分与调度相结合的算法,可以同时获得给定任务集在该类平台上的软硬件任务划分和任务调度方案. 算法的时间复杂度为O(V(E+V)+V2logV+PVlogV). 实验结果表明了该算法的可行性和有效性.  相似文献   

2.
改进的求和生成器的密码分析   总被引:3,自引:0,他引:3  
利用分别征服攻击、Chepyzhov提出的快速相关攻击以及代数攻击等3种算法对改进的求和生成器进行了密码分析,并分别给出了攻击算法的计算复杂度和所需要的密钥流的长度  相似文献   

3.
我国学者有关终端无功补偿智能控制的相关研究主要集中在针对非线性问题的启发式算法的研究过程,正如文献[1]所言,通过鲍威尔算法可以规避因电压、电流、负载峰值等因素的影响而导致的无功补偿容量确定时应用遗传算法容易获取局部最优解的问题。但是,鲍威尔算法本身采用的是共轭向量机制,属于时间复杂度为O(nn)的复杂问题,即使其改进算法也是一个O(n2)问题,这并不利于对于大数据的求解。  相似文献   

4.
分析了各种模式匹配经典算法及其有效环境后,提出一种适合中文关键词搜索的尾字比较查表跳转的扩展Horspool算法,它具有O(n/m)最优复杂度和O(n/m(1-m/2σ))的平均复杂度。实验结果表明,在随机语言环境下,算法性能非常接近最优情况;在自然语言环境下,效率也达到最优情况的90%以上。  相似文献   

5.
基于LBlock算法的轮函数结构,给出16轮和17轮的LBlock分组密码算法的中间相遇攻击方法.攻击16轮LBlock算法所需的数据量约为232,计算量约为244.5次16轮加密;攻击17轮LBlock算法所需的数据量约为232,计算量约为255.5次17轮加密.攻击结果表明,17轮的轮LBlock算法对中间相遇攻击是不免疫的.  相似文献   

6.
对HIGHT进行了差分故障攻击.攻击采用单字节级的差分故障模型,在倒数第3轮和倒数第4轮进行故障诱导来恢复密钥.模拟实验结果显示采用大约32次故障诱导便可恢复密钥,分析的计算复杂度约为256.模加差分表预计算的复杂度为232.  相似文献   

7.
修正学习算法La*属于改进的安全协议自适应分析算法,它能够避免教师经验不足,并实现字符集扩展。立足于正确性和复杂度方面,对修正学习算法进行分析和证明,其为安全协议自适应模型检测提供助力,实现成本控制,有效缓解状态空间爆炸,使协议对环境和各种攻击方法极具防御性。  相似文献   

8.
Jacobi算法用于求解实对称矩阵的特征值和特征向量,算法中最费时的环节为查找非对角元素最大值;量子计算中的Grover算法在搜索规模为N的无序数据库时可以将时间复杂度降为O(N~(1/2))。本文提出用Grover算法的扩展算法——最大值查找的量子算法去加速Jacobi算法中最费时的步骤,进而提高整个算法的计算速度。  相似文献   

9.
陈平  汪国昭 《科技通报》2007,23(6):863-866
提出了一种基于有序简单多边形的平面点集凸包快速求取的改进算法,新的算法能够避免极值点重合的问题。本文算法不仅达到了O(nlnn)的理论时间复杂度下限,而且算法简单,易于实现。  相似文献   

10.
在分析大流识别算法中的散列方法和计数方法的优缺点的基础上,针对网络流的重尾分布特性,提出一种能够有效结合散列方法和计数方法优点的大流识别算法CBF-SS(counting Bloom filter&space saving).该算法首先采用改进的计数型布鲁姆过滤器(counting Bloom filter,CBF)过滤掉大部分的小流,然后通过SS(space saving)计数算法识别出网络中的大流.理论分析和实验结果表明,CBF-SS算法具有较低的时间复杂度和空间复杂度,在大流识别效果上远优于SS等算法.  相似文献   

11.
《Journal of The Franklin Institute》2022,359(18):11155-11185
Nowadays, cyber-physical systems (CPSs) have been widely used in various fields due to their powerful performance and low cost. The cyber attacks will cause security risks and even huge losses according to the universality and vulnerability of CPSs. As a typical network attack, deception attacks have the features of high concealment and strong destructiveness. Compared with the traditional deception attack models with a constant value, a deception attack with random characteristics is introduced in this paper, which is difficult to identify. In order to defend against such deception attacks and overcome energy constraints in CPSs, the secure state estimation and the event-triggered communication mechanism without feedback information are co-considered to reconcile accuracy of estimation and energy consumption. Firstly, an event-triggered augmented state estimator is proposed for secure state estimation and attack identification. Then, under the ideology of equivalence, the augmented state estimator is derived as a concise two-stage estimator with reduced order. The two-stage estimator can perform the secure state estimation and attack identification respectively. The estimators ensure the accuracy of attack identification well since not treating attack information as the trigger event. Afterward, the comparison of the computational complexity of these two algorithms is analyzed. Finally, an example of a target tracking system is supplied to prove the effectiveness and efficiency of the proposed algorithm.  相似文献   

12.
13.
回溯算法是解决N皇后问题的经典算法。在分析N皇后问题的解结构的基础上,优化了利用回溯法求解N皇后问题的解空间树,并改进了互不攻击的条件,大大地减少了比较次数和求解的复杂度,通过理论分析和实验证明了改进算法的可行性。  相似文献   

14.
《Research Policy》2022,51(8):104059
In this paper we investigate the labour content of complex products. By exploiting O*NET information on the skill and knowledge required by occupations, we find that the product complexity measure suggested by Hausmann and Hidalgo (2009) is highly intensive in STEM knowledge and in Science, Mathematics and Critical Thinking skill requirements. We then propose a new measure of occupational complexity based on these occupational features. Among other advantages, this indicator has the merit to measure complexity for service industries that, so far, has never been measured. In an empirical model of the growth of USA Metropolitan Areas (MSAs), we find that MSAs whose initial industrial structure embeds a higher level of occupational complexity experience higher real per capita GDP growth over the 2001–2017 period. The occupational complexity measure is a stronger predictor of growth than other metrics of industries’ occupational and task content as well as compared to indicators of local occupational and industrial composition. When we separately compute occupational complexity of service and manufacturing industries and delve into their specific role for long run growth, we find a prominent role of the occupation complexity embedded in local services with respect to the one embedded in local manufacturing. Our baseline evidence is corroborated in the context of the NUTS3 regions of France over the period 2010–2017.  相似文献   

15.
为解决IPV4地址资源紧张问题,NAT技术应运而生。NAT技术将内网的私有地址转换为外网的公有地址,从而实现和Internet用户的通信,在解决IP地址不足问题的同时,隐藏了内部网络的细节,防止了部分来自网络外部的攻击,具有一定的安全作用。由于NAT技术的复杂多样性,造成复杂网络中应用的复杂性,NAT技术的综合使用要兼顾内外网各种要素,周密计划,严密组织,避免网络漏洞,对此进行了论述。  相似文献   

16.
沈光星 《科技通报》2006,22(5):579-583
利用快速富里叶变换(FFT),给出n阶(n1,n2,…,nk)型k重(r1,r2,…,rk)-循环矩阵相乘的快速算法,其计算复杂性为O(nlog2n),其中n=k  相似文献   

17.
卢诚波 《科技通报》2007,23(1):6-10
指出了文《R-循环分块矩阵求逆的快速傅里叶算法》中的一个错误,并证明了n阶r-循环矩阵的m次方根矩阵中仍为r-循环矩阵的矩阵个数为m^n,进一步给出了求n阶r-循环矩阵的m次方根矩阵中仍为r-循环矩阵的矩阵的快速算法,若用FFT计算一个m次方根矩阵,其时间复杂性为O(nlog2n);计算全部平方根矩阵的时间复杂性为O(nm^n)。同时,本文还给出了求r-循环矩阵主平方根矩阵的算法。  相似文献   

18.
随着企业网络安全问题日益突出,防火墙技术的发展更加迅速,防火墙通常被放置在系统的边缘并作为流量的过滤器。随着网络攻击技术的多样化、复杂化,传统防火墙的缺陷逐渐显现,于是分布式防火墙应运而生。分布式防火墙是主机驻留式的网络安全系统,用以保护网络中的核心结点服务器、数据库和工作站以防止非法入侵的活动进行破坏。本文研究了分布式防火墙的体系结构和组件及其安全机制,分析了保障数据安全方面的性能和扩展应用。  相似文献   

19.
Genetic variation in the angiotensin II type 1 receptor (AT1R) has an important effect on the outcome of acute coronary syndrome (ACS) initiated treatment with captopril. This study aims to investigate the impact of genetic polymorphism of AT1R (rs5186 and rs275651) on the ACS outcome in Iraqi patients treated with captopril. A total of 250 Iraqi individuals with ACS were included in this case—control study and they were divided into two study groups; Study group 1 included 125 participants who were prescribed captopril, 25 mg twice daily and study group 2 included 125 participants who received no captopril as part of their ACS treatment (control study). The AT1R gene (rs5186) CC genotype was found to be associated with ST-elevation myocardial infarction (STEMI) (Odd’s ratio (O.R) = 1.2, P = 0.7), while AC was associated with Non-ST-elevation myocardial infarction (NSTEMI) and unstable angina (UA) (O.R = 1.2, P = 0.8). AC genotype is more prone to have Percutaneous coronary intervention (PCI) after ACS attack (O.R = 1.2, P = 0.6). CC genotype had a risk to get less improvement (O.R = 1.6, P = 0.5), so might require higher doses of captopril during acute coronary insult. The AT1R gene (rs275651) AA genotype was associated with UA (O.R = 1.3, P = 0.9). AA and AT genotypes were more prone to have PCI after ACS attack (O.R = 3.9 P = 0.2, O.R = 3.5, P = 0.3 respectively) and thus requiring higher doses of captopril. We conclude that the AT1R rs5186, rs275651 genetic polymorphisms might partially affect the clinical outcome of ACS patients treated with captopril and might have captopril resistance which requires higher doses.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号