10 results
Search Results
2. A hybrid Q-learning sine-cosine-based strategy for addressing the combinatorial test suite minimization problem.
- Author
-
Zamli, Kamal Z., Din, Fakhrud, Ahmed, Bestoun S., and Bures, Miroslav
- Subjects
- *
HEURISTIC algorithms , *SINE function , *COSINE function , *TRIGONOMETRIC functions , *COMBINATORICS - Abstract
The sine-cosine algorithm (SCA) is a new population-based meta-heuristic algorithm. In addition to exploiting sine and cosine functions to perform local and global searches (hence the name sine-cosine), the SCA introduces several random and adaptive parameters to facilitate the search process. Although it shows promising results, the search process of the SCA is vulnerable to local minima/maxima due to the adoption of a fixed switch probability and the bounded magnitude of the sine and cosine functions (from -1 to 1). In this paper, we propose a new hybrid Q-learning sine-cosine- based strategy, called the Q-learning sine-cosine algorithm (QLSCA). Within the QLSCA, we eliminate the switching probability. Instead, we rely on the Q-learning algorithm (based on the penalty and reward mechanism) to dynamically identify the best operation during runtime. Additionally, we integrate two new operations (Lévy flight motion and crossover) into the QLSCA to facilitate jumping out of local minima/maxima and enhance the solution diversity. To assess its performance, we adopt the QLSCA for the combinatorial test suite minimization problem. Experimental results reveal that the QLSCA is statistically superior with regard to test suite size reduction compared to recent state-of-the-art strategies, including the original SCA, the particle swarm test generator (PSTG), adaptive particle swarm optimization (APSO) and the cuckoo search strategy (CS) at the 95% confidence level. However, concerning the comparison with discrete particle swarm optimization (DPSO), there is no significant difference in performance at the 95% confidence level. On a positive note, the QLSCA statistically outperforms the DPSO in certain configurations at the 90% confidence level. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
3. A novel encryption scheme for high-contrast image data in the Fresnelet domain.
- Author
-
Bibi, Nargis, Farwa, Shabieh, Muhammad, Nazeer, Jahngir, Adnan, and Usman, Muhammad
- Subjects
- *
FRESNEL lenses , *IMAGE encryption , *COMPUTATIONAL complexity , *MATHEMATICAL analysis , *GALOIS theory - Abstract
In this paper, a unique and more distinctive encryption algorithm is proposed. This is based on the complexity of highly nonlinear S box in Flesnelet domain. The nonlinear pattern is transformed further to enhance the confusion in the dummy data using Fresnelet technique. The security level of the encrypted image boosts using the algebra of Galois field in Fresnelet domain. At first level, the Fresnelet transform is used to propagate the given information with desired wavelength at specified distance. It decomposes given secret data into four complex subbands. These complex sub-bands are separated into two components of real subband data and imaginary subband data. At second level, the net subband data, produced at the first level, is deteriorated to non-linear diffused pattern using the unique S-box defined on the Galois field . In the diffusion process, the permuted image is substituted via dynamic algebraic S-box substitution. We prove through various analysis techniques that the proposed scheme enhances the cipher security level, extensively. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
4. Provably secure identity-based identification and signature schemes from code assumptions.
- Author
-
Song, Bo and Zhao, Yiming
- Subjects
- *
COMPUTER security , *CRYPTOGRAPHY , *DIGITAL signatures , *IDENTIFICATION , *CYBERTERRORISM - Abstract
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
5. The freeness of Ish arrangements.
- Author
-
Abe, Takuro, Suyama, Daisuke, and Tsujie, Shuhei
- Subjects
- *
CATALAN numbers , *COMBINATORICS , *MATHEMATICS , *BINARY operations , *APPLIED mathematics - Abstract
The Ish arrangement was introduced by Armstrong to give a new interpretation of the q , t -Catalan numbers of Garsia and Haiman. Armstrong and Rhoades showed that there are some striking similarities between the Shi arrangement and the Ish arrangement and posed some problems. One of them is whether the Ish arrangement is a free arrangement or not. In this paper, we verify that the Ish arrangement is supersolvable and hence free. Moreover, we give a necessary and sufficient condition for the deleted Ish arrangement to be free. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
6. An Improved Swarm Optimization for Parameter Estimation and Biological Model Selection.
- Author
-
Abdullah, Afnizanfaizal, Deris, Safaai, Mohamad, Mohd Saberi, and Anwar, Sohail
- Subjects
- *
SWARMING (Zoology) , *BIOLOGICAL models , *PROTEOLYTIC enzymes , *CHEMICAL reactions , *COMPUTATIONAL biology , *SYSTEMS biology , *BIOCOMPLEXITY - Abstract
One of the key aspects of computational systems biology is the investigation on the dynamic biological processes within cells. Computational models are often required to elucidate the mechanisms and principles driving the processes because of the nonlinearity and complexity. The models usually incorporate a set of parameters that signify the physical properties of the actual biological systems. In most cases, these parameters are estimated by fitting the model outputs with the corresponding experimental data. However, this is a challenging task because the available experimental data are frequently noisy and incomplete. In this paper, a new hybrid optimization method is proposed to estimate these parameters from the noisy and incomplete experimental data. The proposed method, called Swarm-based Chemical Reaction Optimization, integrates the evolutionary searching strategy employed by the Chemical Reaction Optimization, into the neighbouring searching strategy of the Firefly Algorithm method. The effectiveness of the method was evaluated using a simulated nonlinear model and two biological models: synthetic transcriptional oscillators, and extracellular protease production models. The results showed that the accuracy and computational speed of the proposed method were better than the existing Differential Evolution, Firefly Algorithm and Chemical Reaction Optimization methods. The reliability of the estimated parameters was statistically validated, which suggests that the model outputs produced by these parameters were valid even when noisy and incomplete experimental data were used. Additionally, Akaike Information Criterion was employed to evaluate the model selection, which highlighted the capability of the proposed method in choosing a plausible model based on the experimental data. In conclusion, this paper presents the effectiveness of the proposed method for parameter estimation and model selection problems using noisy and incomplete experimental data. This study is hoped to provide a new insight in developing more accurate and reliable biological models based on limited and low quality experimental data. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
7. Stochastic Identification of Stability of Competitive Interactions in Ecosystems.
- Author
-
Vach, Marek and Vachová, Pavla
- Subjects
- *
ECOSYSTEMS , *STOCHASTIC analysis , *NASH equilibrium , *PLANT ecology , *PROBLEM solving - Abstract
The problem of finding an optimum within a set of possibilities that represent the varying successfulness of numerous subjects competing with one another is highly relevant in the field of ecosystem interactions. We propose a method for solving this problem by the application of the Nash equilibrium concept, which is frequently used in ecology. The proposed model is based on the transformation of the initial payoff vectors of subjects that interact in different situations into a statistical set of symmetrical game matrices that consist of permutations of payoff values. The equilibrium solution is expressed as values of the probability of Nash equilibrium occurrence with uniform distribution over all possible permutations based on uncertainty of positions of payoff values in the matrix. We assume that this equilibrium solution provides information on the distribution of the degree of stability among individual situations and interacting subjects. In this paper, we validate this assumption and demonstrate its application to a dataset that represents interspecies interactions in plant ecology. We propose that the use of the Nash equilibrium in the analysis of datasets formalized according to the Pareto optimality scheme is applicable in numerous other contexts. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
8. Do Triplets Have Enough Information to Construct the Multi-Labeled Phylogenetic Tree?
- Author
-
Hassanzadeh, Reza, Eslahchi, Changiz, and Sung, Wing-Kin
- Subjects
- *
PLANT phylogeny , *PLANT species , *PLANT evolution , *COMPUTATIONAL biology , *COMBINATORICS - Abstract
The evolutionary history of certain species such as polyploids are modeled by a generalization of phylogenetic trees called multi-labeled phylogenetic trees, or MUL trees for short. One problem that relates to inferring a MUL tree is how to construct the smallest possible MUL tree that is consistent with a given set of rooted triplets, or SMRT problem for short. This problem is NP-hard. There is one algorithm for the SMRT problem which is exact and runs in time, where is the number of taxa. In this paper, we show that the SMRT does not seem to be an appropriate solution from the biological point of view. Indeed, we present a heuristic algorithm named MTRT for this problem and execute it on some real and simulated datasets. The results of MTRT show that triplets alone cannot provide enough information to infer the true MUL tree. So, it is inappropriate to infer a MUL tree using triplet information alone and considering the minimum number of duplications. Finally, we introduce some new problems which are more suitable from the biological point of view. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
9. Differential Bees Flux Balance Analysis with OptKnock for In Silico Microbial Strains Optimization.
- Author
-
Choon, Yee Wen, Mohamad, Mohd Saberi, Deris, Safaai, Illias, Rosli Md., Chong, Chuii Khim, Chai, Lian En, Omatu, Sigeru, and Corchado, Juan Manuel
- Subjects
- *
MATHEMATICAL optimization , *PHENOTYPES , *MICROBIAL cells , *GENE knockout , *COMBINATORICS , *GENETIC engineering - Abstract
Microbial strains optimization for the overproduction of desired phenotype has been a popular topic in recent years. The strains can be optimized through several techniques in the field of genetic engineering. Gene knockout is a genetic engineering technique that can engineer the metabolism of microbial cells with the objective to obtain desirable phenotypes. However, the complexities of the metabolic networks have made the process to identify the effects of genetic modification on the desirable phenotypes challenging. Furthermore, a vast number of reactions in cellular metabolism often lead to the combinatorial problem in obtaining optimal gene deletion strategy. Basically, the size of a genome-scale metabolic model is usually large. As the size of the problem increases, the computation time increases exponentially. In this paper, we propose Differential Bees Flux Balance Analysis (DBFBA) with OptKnock to identify optimal gene knockout strategies for maximizing the production yield of desired phenotypes while sustaining the growth rate. This proposed method functions by improving the performance of a hybrid of Bees Algorithm and Flux Balance Analysis (BAFBA) by hybridizing Differential Evolution (DE) algorithm into neighborhood searching strategy of BAFBA. In addition, DBFBA is integrated with OptKnock to validate the results for improving the reliability the work. Through several experiments conducted on Escherichia coli, Bacillus subtilis, and Clostridium thermocellum as the model organisms, DBFBA has shown a better performance in terms of computational time, stability, growth rate, and production yield of desired phenotypes compared to the methods used in previous works. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
10. Stability Indicators in Network Reconstruction.
- Author
-
Filosi, Michele, Visintainer, Roberto, Riccadonna, Samantha, Jurman, Giuseppe, and Furlanello, Cesare
- Subjects
- *
BIOINDICATORS , *COMPUTATIONAL biology , *FUNCTIONAL genomics , *GENE regulatory networks , *COMPUTATIONAL mathematics , *COMBINATORICS - Abstract
The number of available algorithms to infer a biological network from a dataset of high-throughput measurements is overwhelming and keeps growing. However, evaluating their performance is unfeasible unless a ‘gold standard’ is available to measure how close the reconstructed network is to the ground truth. One measure of this is the stability of these predictions to data resampling approaches. We introduce NetSI, a family of Network Stability Indicators, to assess quantitatively the stability of a reconstructed network in terms of inference variability due to data subsampling. In order to evaluate network stability, the main NetSI methods use a global/local network metric in combination with a resampling (bootstrap or cross-validation) procedure. In addition, we provide two normalized variability scores over data resampling to measure edge weight stability and node degree stability, and then introduce a stability ranking for edges and nodes. A complete implementation of the NetSI indicators, including the Hamming-Ipsen-Mikhailov (HIM) network distance adopted in this paper is available with the R package nettools. We demonstrate the use of the NetSI family by measuring network stability on four datasets against alternative network reconstruction methods. First, the effect of sample size on stability of inferred networks is studied in a gold standard framework on yeast-like data from the Gene Net Weaver simulator. We also consider the impact of varying modularity on a set of structurally different networks (50 nodes, from 2 to 10 modules), and then of complex feature covariance structure, showing the different behaviours of standard reconstruction methods based on Pearson correlation, Maximum Information Coefficient (MIC) and False Discovery Rate (FDR) strategy. Finally, we demonstrate a strong combined effect of different reconstruction methods and phenotype subgroups on a hepatocellular carcinoma miRNA microarray dataset (240 subjects), and we validate the analysis on a second dataset (166 subjects) with good reproducibility. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.