首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 125 毫秒
1.
胡耀光  王圣军  金涛  屈世显 《物理学报》2015,64(2):28901-028901
有倾向随机行走是研究网络上数据包路由策略的有效方法. 由于许多真实技术网络包括互联网都具有负的度关联特征, 因此本文研究这种网络上的有倾向随机行走性质. 研究表明: 在负关联网络上粒子可以在连接度较大的节点上均匀分布, 而连接度小的节点上粒子较少; 负关联网络上随机行走的速度比非关联网络更快; 找到了负关联网络上的最佳倾向性系数, 在此情况下负关联网络上随机行走的速度远快于非关联网络. 负关联网络既可以利用度小的节点容纳粒子, 又可以利用度大的节点快速传输, 这是负关联网络上高行走效率产生的机制.  相似文献   

2.
肖延东  老松杨  侯绿林  白亮 《物理学报》2013,62(24):248901-248901
基于网络可控性模型提出了最大可控子图的概念,在此基础上提出了一种基于最大可控子图的导航搜索模型. 模型中基于最大可控子图的加边策略用最小的代价解决了有向网络搜索中存在的粒子因“无路可走”而终止搜索的问题;基于最大可控子图部署导航节点,仅用节点总数2%左右的导航点,就使全网搜索时间接近导航网络的平均最短路径. 通过在ER和SF 网络上的实验表明,全网搜索时间与网络的可控性有关,可控性越好,添加的边数量越少,同时会使网络中导航节点分布越多,越能提高网络的搜索效率. 关键词: 导航搜索 有向网 网络可控性  相似文献   

3.
姜志宏  王晖  高超 《物理学报》2011,60(5):58903-058903
本文提出了一个基于随机行走和策略选择的复杂网络局域演化模型RAPA. 新节点加入系统不需要全局知识,而是通过随机行走构造局域世界;然后依据概率采用随机连接,"扶贫"连接或"亲富"连接策略,从局域世界中选择节点增加连接边;最终自组织演化具有幂律特点的复杂网络. 初步的解析计算和仿真实验都表明,RAPA模型不仅重现了具有小世界特性、整体上的无标度特性,还可以演化出小变量饱和以及指数截断等现象,同时也具有明显的聚类特性,并能够构造出同配或异配等不同混合模式的网络. 关键词: 复杂网络 模型 随机行走 策略连接  相似文献   

4.
王开  周思源  张毅锋  裴文江  刘茜 《物理学报》2011,60(11):118903-118903
在对随机行走过程的研究中发现:单个粒子通过某条特定路径的时间正比于该路径上所有节点度的连乘积.据此,文章提出基于随机行走机理的优化路由改进策略.该策略以节点度连乘积最小化为原则,通过调节可变参数,建立节点处理能力均匀分布的情况下最佳路由策略.通过分析比较不同路由策略条件下平均路由介数中心度,网络的临界负载量,平均路径长度以及平均搜索信息量等性能指标,研究结果表明,此改进路由策略在保证网络平均路径长度较少增加的前提下,使网络的传输能力获得最大幅度的提升. 关键词: 复杂网络 路由策略 负载传输  相似文献   

5.
基于置换群的多粒子环上量子行走的反馈搜索算法   总被引:1,自引:0,他引:1       下载免费PDF全文
在量子计算科学中,如何更好地构建量子搜索算法一直以来受到学者们的广泛关注,并且基于量子行走寻找新的搜索算法也仍吸引着学者们不断深入研究与探索.本文从减少搜索过程中的时间消耗、增加算法搜索的准确性和可控性等多方面进行考虑,提出了一种基于置换群的多粒子量子行走搜索算法.首先分析得到置换群在空间中可看成一个闭环,定义了置换集合,并且通过同构映射将数据点所在数据集映射到定义的置换集,使得置换集合中元素数据点形成一一对应的关系.其次,根据给定初始态和硬币算符,在数据点集与置换集合张成的搜索空间中利用多粒子的量子行走在环上进行目标数据搜索.最后,根据函数Φ(w)=1找到目标数据,并用量子态存储数值,用于形成搜索算法的反馈控制;同时通过控制硬币算符从而控制量子行走在环上的行走方向,增加搜索的可操作性与准确性.本文利用多粒子的量子行走进行搜索,分析得到粒子数量参数j与时间复杂度呈非线性负相关;提出的量子行走搜索算法符合零点条件与下确界条件,且不受变量数j的影响;通过数值分析得到量子行走搜索算法的时间复杂度等价于O(N1/3),相比于Grover搜索算法提高了搜索效率.  相似文献   

6.
肖媛  崔国民  彭富裕  周静 《计算物理》2015,32(6):693-700
通过分析粒子群算法早熟现象的机理,研究早熟收敛的本质,并提出一种克服粒子群算法早熟现象的局部"飞跃"策略.应用仿真及系统工程实例表明,该方法能有效地改善粒子群算法在非线性全局优化上的早熟问题,提高了粒子群算法的全局搜索能力.  相似文献   

7.
基于PSO-DE算法的污水处理优化控制研究   总被引:1,自引:0,他引:1  
针对污水处理系统能耗过大,变量多,非线性和滞后严重等特点造成的控制困难问题,提出了基于改进型粒子群的算法的优化控制。粒子群算法具有自适应控制,全局搜索等优点但本身存在早熟收敛及在进化后期收敛速度慢等缺点,通过优势互补思想引入差分进化算法,新算法结合两者优势有效提高粒子在全局的寻优效率,建立对应的混合算法优化模型,并与普通粒子群算法优化进行比较,结果证明了该算法在保证出水水质的前提下做到降低能耗。  相似文献   

8.
邓炜栋  崔国民  肖媛 《计算物理》2018,35(6):675-684
针对启发式算法在优化换热网络后期由于种群多样性消失等原因造成难以找到使年综合费用进一步下降的进化方向,本文提出换热器耦合联动进化策略.该策略在一般启发式算法优化后期通过按一定概率分布抽取部分换热量不为零的换热器参与联动进化,以找到使费用下降的耦合匹配.算例验证表明,该策略效果明显.将该策略与RWCE算法相结合组成一种混合算法.首先采用RWCE算法对求解域进行初步探索,利用该算法强大的全局搜索能力找到求解域内各个潜力结构.然后再用耦合联动进化策略对各潜力结构进行深入搜索,搜索完成后再经变异反馈给RWCE算法.将该混合算法应用于10SP2和15SP算例,得到了较好的优化结果.  相似文献   

9.
针对粒子群算法优化后期容易出现早熟收敛问题,建立一种具有种群多样性监测和实时更新策略的改进方法.首先建立种群健康度指标用来评价粒子群进化状态;其次提出随机扰动策略和离心搜索策略用于丰富粒子群的种群多样性,增强算法的全局搜索能力,并提出梯度搜索策略用于精确、高效地搜寻当前邻域内的局部极值点,提高算法的计算效率.最后建立种群健康度反馈机制,使粒子可以实时感知种群的健康程度,并自适应地采用不同的粒子更新策略,保证粒子群处于健康进化水平.将新方法应用于优化实例,并与其它改进方法进行性能比较,结果验证了新方法的有效性.  相似文献   

10.
当计算机断层成像(CT)中X射线的采样范围和数量受限时,得到的稀疏投影数据完备性很低,重建算法的搜索空间巨大。基于凸优化思路的迭代求解算法及其改进采用固定搜索路径,难以在有限时间内收敛至全局最优解;粒子群优化具有全局搜索能力,但计算成本和存储代价过高。为解决这类不完备投影数据的重建问题,提出基于粒子群优化的随机稀疏重建算法。首先,通过随机策略生成具有多样性的初始种群,以保证算法的搜索能力;其次,随机选择梯度下降或基于个体历史最优解和全局历史最优解的随机方向进行迭代,以兼顾算法效率和搜索方向的多样性;最后,基于适应度评价,有针对性地重新生成随机初始种群,强制跳离局部最优。针对角度受限下无噪声和含噪声的稀疏投影数据,分别进行重建实验。结果显示,与常见的凸优化迭代和粒子群优化算法相比,本文算法既能保证算法效率,又在重建质量和算法稳健性上具有明显优势。  相似文献   

11.
Cun-Lai Pu  Wen-Jiang Pei 《Physica A》2010,389(3):4699-594
In this article, we derive the first passage time (FPT) distribution and the mean first passage time (MFPT) of random walks from multiple sources on networks. On the basis of analysis and simulation, we find that the MFPT drops substantially when particle number increases at the first stage, and converges to the shortest distance between the sources and the destination when particle number tends to infinite. Given the fact that a Brownian particle from a high-degree node often needs a large number of steps to reach an expected low-degree node, which is the bottleneck for a single random walk, we propose a mixing search model to improve the efficiency of search processes by using random walks from multiple sources to continue the searches from high-degree nodes to destinations. We compare our model with the mixing navigation model proposed by Zhou on complex networks and find that our model converges much faster with lower hardware cost than Zhou’s model. Moreover, simulations on scale-free networks show that the search efficiency of our model is much higher than that of a single random walk, and comparable to that of multiple random walks which have much higher hardware cost than our model. Finally, we discuss the traffic cost of our model, and propose an absorption strategy for our model to recover the additional walkers in networks. Simulations indicate that this strategy reduces the traffic cost of our model effectively.  相似文献   

12.
Diffusive capture processes are known to be an effective method for information search on complex networks. The biased NN lions–lamb model provides quick search time by attracting random walkers to high degree nodes, where most capture events take place. The price of the efficiency is extreme traffic concentration on top hubs. We propose traffic load balancing provided by type specific biased random walks. For that we introduce a multi-type scale-free graph generation model, which embeds homophily structure into the network by utilizing type dependent random walks. We show analytically and with simulations that by augmenting the biased random walk method with a simple type homophily rule, we can alleviate the traffic concentration on high degree nodes by spreading the load proportionally between hubs with different types of our generated multi-type scale-free topologies.  相似文献   

13.
We carry out comparative studies of random walks on deterministic Apollonian networks (DANs) and random Apollonian networks (RANs). We perform computer simulations for the mean first-passage time, the average return time, the mean-square displacement, and the network coverage for the unrestricted random walk. The diffusions both on DANs and RANs are proved to be sublinear. The effects of the network structure on the dynamics and the search efficiencies of walks with various strategies are also discussed. Contrary to intuition, it is shown that the self-avoiding random walk, which has been verified as an optimal local search strategy in networks, is not the best strategy for the DANs in the large size limit.  相似文献   

14.
Reducing the complexity of large systems described as complex networks is key to understanding them and a crucial issue is to know which properties of the initial system are preserved in the reduced one. Here we use random walks to design a coarse graining scheme for complex networks. By construction the coarse graining preserves the slow modes of the walk, while reducing significantly the size and the complexity of the network. In this sense our coarse graining allows us to approximate large networks by smaller ones, keeping most of their relevant spectral properties.  相似文献   

15.
郑大昉  沈顺清  陶瑞宝 《物理学报》1988,37(11):1823-1828
本文中通过引入格子无规行走的结构因子矩阵,推广了生成函数技术,提出一种可以处理具有复杂元胞结构的格子无规行走问题的理论方法。为说明这一方法的有效性以及如何运用这一方法,本文求解了一维无限二聚化链上的无规行走问题。 关键词:  相似文献   

16.
We consider a minimal model of persistent random searcher with a short range memory. We calculate exactly for such a searcher the mean first-passage time to a target in a bounded domain and find that it admits a nontrivial minimum as function of the persistence length. This reveals an optimal search strategy which differs markedly from the simple ballistic motion obtained in the case of Poisson distributed targets. Our results show that the distribution of targets plays a crucial role in the random search problem. In particular, in the biologically relevant cases of either a single target or regular patterns of targets, we find that, in strong contrast to repeated statements in the literature, persistent random walks with exponential distribution of excursion lengths can minimize the search time, and in that sense perform better than any Levy walk.  相似文献   

17.
A.M. Reynolds 《Physica A》2009,388(5):561-564
Recently it has been found that composite Brownian walk searches are more efficient than any Lévy walk when searching is non-destructive and when the Lévy walks are not responsive to conditions found in the search. Here a new class of adaptive Lévy walk searches is presented that encompasses composite Brownian walks as a special case. In these new models, bouts of Lévy walk searching alternate with bouts of more intensive Brownian walk searching. Switching from extensive to intensive searching is prompted by the detection of a target. And here, switching back to extensive searching arises if a target is not located after travelling a distance equal to the ‘giving-up distance’. It is found that adaptive Lévy walks outperform composite Brownian walks when searching for sparsely distributed resources. Consequently there is stronger selection pressures for Lévy processes when resources are sparsely distributed within unpredictable environments. The findings reconcile Lévy walk search theory with the ubiquity of two modes of searching by predators and with their switching search mode immediately after finding a prey.  相似文献   

18.
金艳  崔国民  曹美  沈昊  陈子禾 《计算物理》2020,37(6):725-733
针对强制进化随机游走算法(RWCE)在优化后期会陷入局部最优而使搜索能力下降的问题,提出周期优势结构提炼与搜索路径强化结合策略.首先对系统种群初步优化,每隔一定周期进行一次优势个体提炼,然后采用多重路径复制的方法将这些优势个体给其他个体,最后根据搜索机制遍布整个求解域.以优势个体为中心进行多重路径搜索策略,提高了局部寻优精度,增加了种群多样性,进而增强了全局搜索能力,优化效率和质量得以提高.  相似文献   

19.
Jv-Jie Wang 《中国物理 B》2022,31(5):50308-050308
We propose an efficient quantum private comparison protocol firstly based on one direction quantum walks. With the help of one direction quantum walk, we develop a novel method that allows the semi-honest third party to set a flag to judge the comparing result, which improves the qubit efficiency and the maximum quantity of the participants' secret messages. Besides, our protocol can judge the size of the secret messages, not only equality. Furthermore, the quantum walks particle is disentangled in the initial state. It only requires a quantum walks operator to move, making our proposed protocol easy to implement and reducing the quantum resources. Through security analysis, we prove that our protocol can withstand well-known attacks and brute-force attacks. Analyses also reveal that our protocol is correct and practical.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号