For the problems that the performance of the nearest neighbor classification algorithm is greatly affected by the adopted similarity or distance measuring method, and it is difficult to select the optimal similarity or distance measuring method, with multi-similarity method adopted, a K-Nearest Neighbor algorithm with Ordered Pairs of Normalized real numbers (OPNs-KNN) was proposed. Firstly, the new mathematical theory of Ordered Pair of Normalized real numbers (OPN) was introduced in machine learning. And all the samples in the training and test sets were converted into OPNs by multiple similarity or distance measuring methods, so that different similarity information was included in each OPN. Then, the improved nearest neighbor algorithm was used to classify the OPNs, so that different similarity or distance measuring methods were able to be mixed and complemented to improve the classification performance. Experimental results show that compared with 6 improved nearest neighbor classification algorithms, such as distance-Weighted K-Nearest-Neighbor rule (WKNN) rule on Iris, seeds, and other datasets, OPNs-KNN has the classification accuracy improved by 0.29 to 15.28 percentage points, which proves that the performance of classification can be improved greatly by the proposed algorithm.
Ride-hailing has become a popular choice for people to travel due to its convenience and speed, how to efficiently dispatch the appropriate orders to deliver passengers to the destination is a research hotspot today. Many researches focus on training a single agent, which then uniformly distributies orders, without the vehicle itself being involved in the decision making. To solve the above problem, a multi-agent reinforcement learning algorithm based on shared attention, named SARL (Shared Attention Reinforcement Learning), was proposed. In the algorithm, the order dispatching problem was modeled as a Markov decision process, and multi-agent reinforcement learning was used to make each agent become a decision-maker through centralized training and decentralized execution. Meanwhile, the shared attention mechanism was added to make the agents share information and cooperate with each other. Comparison experiments with Random matching (Random), Greedy algorithm (Greedy), Individual Deep-Q-Network (IDQN) and Q-learning MIXing network (QMIX) were conducted under different map scales, different number of passengers and different number of vehicles. Experimental results show that the SARL algorithm achieves optimal time efficiency in three different scale maps (100×100, 10×10 and 500×500) for fixed and variable vehicle and passenger combinations, which verifies the generalization performance and stable performance of the SARL algorithm. The SARL algorithm can optimize the matching of vehicles and passengers, reduce the waiting time of passengers and improve the satisfaction of passengers.
Traditional methods of generating digital camouflages cannot generate digital camouflages based on the background information in real time. In order to cope with this problem, a digital camouflage generation method based on cycle-consistent adversarial network was proposed. Firstly, the image features were extracted by using densely connected convolutional network, and the learned digital camouflage features were mapped into the background image. Secondly, the color retention loss was added to improve the quality of generated digital camouflages, ensuring that the generated digital camouflages were consistent with the surrounding background colors. Finally, a self-normalized neural network was added to the discriminator to improve the robustness of the model against noise. For the lack of objective evaluation criteria for digital camouflages, the edge detection algorithm and the Structural SIMilarity (SSIM) algorithm were used to evaluate the camouflage effects of the generated digital camouflages. Experimental results show that the SSIM score of the digital camouflage generated by the proposed method on the self-made datasets is reduced by more than 30% compared with the existing algorithms, verifying the effectiveness of the proposed method in the digital camouflage generation task.
Now the integer Discrete Cosine Transform (DCT) algorithm of H.264 can not apply to Distributed Video Coding (DVC) framework directly because of its high complexity. In view of this, the authors presented a integer DCT algorithm and transform radix generating method based on fixed long step quantization which length was 2x (x was a plus integer). The transform radix in H.264 could be stretched. The authors took full advantage of this feature to find transform radix which best suits for working principle of hardware, and it moved the contracted-quantized stage from coder to decoder to reduced complexity of coder under the premise of "small" transform radix. In the process of "moving", this algorithm guaranteed image quality by saturated amplification for DCT coefficient, guaranteed reliability by overflow upper limit, and improved compression performance by reducing radix error. The experimental results show that, compared with corresponding module in H.264, the quantization method of this algorithm is convenient for bit-plane extraction. And it reduces calculating work of contracted-quantized stage of coder to 16 times of integer constant addition under the premise of quasi-lossless compression, raises the ratio of image quality and compression by 0.239. This algorithm conforms to DVC framework.
Concerning the proxy signcryption security problem in reality, motivated by Gus proxy signature scheme (GU K, JIA W J, JIANG C L. Efficient identity-based proxy signature in the standard model. The Computer Journal, 2013:bxt132), a new secure identity-based proxy signcyption scheme in the standard model was proposed. Proxy signcryption allowed that the original signcrypter delegated his authority of signcrption to the proxy signcrypter in such a way that the latter could generate ciphertext on behalf of the former. By combining the functionalities of identity-based signcryption and proxy signature scheme, the new scheme not only had the advantage of identity-based signcryption scheme, but also had the function of proxy signature scheme. Analysis results show that, under the assumption of Diffie-Hellman problem, the proposed scheme is confidential and unforgeable. Compared with the known scheme, the scheme requires 2 pairings computation in proxy key generation and 1 pairing computation in proxy signcryption. So it has higher computational efficiency.