
Citation: | CUI Jianzhong, YIN Zhixiang, TANG Zhen, YANG Jing. Probe Machine Based Computing Model for Maximum Clique Problem[J]. Chinese Journal of Electronics, 2022, 31(2): 304-312. DOI: 10.1049/cje.2020.00.293 |
Life is an extremely complicated organism. Organs, tissues, and systems within living things are closely interrelated and interacted on each other. At the same time, the surroundings of life are undergoing constant variations. Functions of every system are bound to be regulated in order to adapt to changes in the external surroundings, for example, the regulation of body temperature. The realization of this regulation relies on three regulatory mechanisms, nervous, humoral and auto-regulation, among which nervous regulation plays the leading role. In Ref.[1], a staggered grid scheme was proposed to reduce both the total memory requirement and the CPU time of generating the corrected near matrix in the FFT-based methods. Some numerical experiments were provided to demonstrate both the correctness and the efficiency of the proposed method. In Ref.[2], authors are concerned with a kind of iterative method for computing the Moore-Penrose inverse, which can be considered as a discrete-time form of recurrent neural networks. Numerical tests demonstrated the effectiveness of authors’ new acceleration algorithm. In Ref.[3], this paper according to the principle of PD-IPM, the UC model was pretreated by continuous relaxation, and the Newton correction equation was decoupled by fast decoupling technology. The experimental results show that the proposed algorithm can obtain better speedup for two different types of structured nonlinear programming. In Ref.[4], a micro-architecture definition of digital signal processing system suitable for motor vector control algorithm was designed, including its instruction set definition, memory model and interaction mode with the main CPU. In Ref.[5], aiming at the problems of high complexity and large amount of calculation of convolution operation in convolutional neural network and the delay and power consumption limitation of algorithm calculation on CPU and GPU, a reconfigurable neural network acceleration system with high throughput and low power consumption based on ZYNQ was designed from the perspective of improving the calculation speed and reducing power consumption of existing hardware platforms.
The building blocks of structure and function of nervous system are neurons. A neuron consists of a cell body, dendrites, and an axon. Dendrites are thin structures that arise from the cell body. An axon is a special cellular extension that arises from the cell body as well. When axon extended from cell body for a distance and coated in myelin, it often called nerve fiber. The function of the dendrites is to accept the nerve impulses transmitted from other neurons, and conduct the impulse to the cell body. The main function of the nerve fiber is the conduction of nerve impulse.
The connection between neurons via synapse forms neural networks. A synapse is a structure that permits a neuron to conduct nerve impulse to another neuron along nerve fiber. Synapse is essential to neuronal function: neurons are cells that are specialized to conduct nerve impulse to another neuron, and synapse is the mean by which they do so. Researches have shown that nearly 100 billion neurons in human brain are almost functionally ready prior to everyone’s birth, but the connections between neurons are relatively sparse. A newborn baby fails to think, he will only establish connections between neurons as result of external stimuli. Any external stimulus, as long as it is new, will promote the growth of dendrites and nerve fibers of certain neurons in the brain, and connection with other neurons to form a new network. When the same stimulus occurs again, the established network is active again. During the course of human life, new networks are unceasingly produced while old ones gradually shrinked and disappeared.
We now analyze the formation of a neural network, from the computing perspective. Neurons can be seen as data, synapses can be seen as a kind of operators in the computing. Under the action of operators, data are operated. Therefore, individual neurons are connected. Neural network is thus formed as result of the computing. We call the operator the connective operator. In Ref.[6], it presented an efficient GPU-based parallel tabu search algorithm (GPTS) for HW/SW partitioning. A single GPU kernel of compacting neighborhood was proposed to reduce the amount of GPU global memory accesses theoretically. A kernel fusion strategy was further proposed to reduce the amount of GPU global memory accesses of GPTS. In Ref.[7], author presented and evaluated a model of vector parallel ACO for multi-core SIMD CPU architecture. The proposed algorithm was tested on standard TSP instances ranging from 198 to 4,461 cities and showed a speedup factor of 57.8x compared to the single-threaded CPU counterpart. In Ref.[8], the authors exploited the parallel processing power of vector instructions on a CPU and made it collaboratively function with the on-chip GPU. The experimental results demonstrated that authors can achieve 146 GFLOP/s at best using a quad-core CPU and the performance is 2.5 to 4.8 times faster than that of the single-GPU version of the Open CV library. In Ref.[9], this article presented ideas to optimize existing GPU-based ACO algorithms for the TPS. Authors extended previous GPU-based ACO algorithms in two aspects: problem scale and computational efficiency. To solve larger problems, authors presented and evaluated two kernel strategies. To fully exploit GPU computing power, authors propose a new algorithm in the tour-construction stage.
Does the connective operator exist elsewhere? We think that the hybridization probe, which is commonly used in molecular biology, is another type of connective operator. In molecular biology, hybridization probes are variable length of deoxyribonucleic acids or ribonucleic acids labeled with radioactive or fluorescent dyes, which are used to detect the presence of nucleic acid sequences that are complementary to the probe sequences in the sample. When performing detection, in the presence of target sequences in the sample, the probes firstly hybridize with target sequences according to Watson-Crick complementary pairing rule to form double-stranded sequences. Then probes that hybridized are separated from the sample. Finally, determine the presence or absence of target sequence according to the labeled type of probe, for example, autoradiograph, fluorescence microscopy, etc. If the probe is designed as complement of two target deoxyribonucleic acids, in the presence of probe, two deoxyribonucleic acids both hybridize with their complements of the probe. Therefore, two deoxyribonucleic acids are connected by means of probe. Moreover, the concept of probe occurs in a variety of fields, computer science, electronics, information security, archeology, and so on. For example, light circuit board test probe is used to test circuit board or detect short circuits.
So far, we have introduced the concepts of data and probe in the PM, and their biological inspirations originated from neural network. Apparently, the concept of data in PM originated from neuron, whereas the probe in PM was the realization of the connective operator. Now, we presented the formal definition of PM as the following nine-tuple:
PM=(X,Y,σ1,σ2,τ,λ,η,Q,C) |
where each element corresponded to data library (
We next presented schematic diagram of PM in the following Fig.1.
For a problem to be solved, the computing paradigm of PM can be briefly summarized into the following steps:
1) Encode the given problem into data fibers, fabricate data, and construct data library;
2) Devise probes and construct probe library;
3) Perform probe operation;
4) Detect products resulting from probe operation, output solution (solutions) to the given problem;
5) Collect solution (solutions) into true solution storage;
6) Collect non-solutions into residue collector.
For the past decades, substantial efforts have been devoted to exploring brand new computing model, for example, quantum turing machine (QTM)[10-12], artificial neural network (ANN)[13-15], and biologically inspired computing (BIC)[16-20], etc. Research on TM gave birth to modern general purpose electronic computer, and left up-till-now unsolved problem in complexity theory whether P=NP. In 2000, the problem is named as the Millennium prize problems by Clay Mathematics Institute. In 2011, on the 100th anniversary of Turing’s birth, an open solicitation of new computational model that is superior to TM in terms of computing capacity was made world-widely. It is in this context that PM was proposed in 2016. For terminologies and notations not included in this paper, as well as the proof that TM is the special case of PM, readers may refer to Ref.[21] for detailed description.
In this paper, we presented a PM based computing model for maximum clique problem.
The rest of paper is organized as follows: Section II presented the formal definition of maximum clique problem, our model for solving a 6-vertex instance. Followed by, results and discussions were given in Section III. Conclusions and future work were presented in Section IV.
The maximum clique problem is a classic combinatorial optimization problem in graph theory, and is one of the first problems shown to be NP-complete[22, 23]. The concept of clique may trace its history to the research of social science. In 1949, Luce et al.[24] transformed social network into an undirected graph. Each vertex of the graph represented an individual in the network, and each edge represented the acquaintance between individuals. They gave the definition of clique as the set of vertices of complete subgraph, the group of people who known each other. In 1957, Harary et al.[25] proposed an exact algorithm enumerating all cliques of an arbitrary graph. To this day, the maximum clique problem has found extensive applications in different domains, computer vision, market analysis and coding theory, etc.
Let
The maximum clique problem is closely related to other problems in combinatorial optimization. The maximum clique, the maximum independent set and the minimum vertex cover problems are computationally equivalent to one another. Mathematically, the maximum clique problem is usually formulated as the following 0-1 programming subject to edge constraints of complement graph.
\begin{split} &\max \displaystyle\sum\limits_{i = 1}^n {{x_i}}\\ &{\rm{s.t.\quad}}{x_i} + {x_i} \le 1,\;\forall (i,j) \in \overline E \end{split} | (1) |
{x_i} \in \{ 0,1\} ,i = 1,2, \ldots ,n |
Decades of research into maximum clique problem has demonstrated that finding the maximum clique of the given graph is rather difficult. A variety of algorithms have been proposed so far. These algorithms can be briefly categorized into two classes: exact[20-29] and heuristic algorithms[30-35]. The drawback of exact algorithms is that the time complexity of the algorithms increases exponentially with the size of the problem. The drawback of heuristic algorithms is that the algorithms are not necessarily to find the optimal solution to the given problem.
Algorithms for maximum clique problem have been the subject of research in BIC, and results are fruitful. In 1997, Ouyang et al.[36] reported solving maximum clique problem by means of molecular biology techniques. For a graph with
In this section, we took Fig.2 as an example and presented our model for maximum clique problem. We started with the construction of data base.
Let
According to the definition of maximal clique, the maximal clique
For convenience, we listed and separated data fibers by comma in the superscript, and denoted each data in data sublibrary
{X_1} = \{ x_1^{0,V1,1},x_1^{2,V2,3},x_1^{4,V4,5},x_1^{6,V5,7}\} |
Likewise, based on the set
{X_2} = \{ x_2^{8,V2,9},x_2^{10,V1,11},x_2^{12,V3,13},x_2^{14,V5,15}\} , |
{X_3} = \{ x_3^{16,V3,17}x_3^{18,V2,19},x_3^{20,V4,21},x_3^{22,V5,23},x_3^{24,V6,25}\} , |
{X_4} = \{ x_4^{26,V4,27},x_4^{28,V1,29},x_4^{30,V3,31},x_4^{32,V5,33},x_4^{34,V6,35}\} , |
\begin{array}{l} {X_5} = \left\{ {x_5^{36,V5,37},x_5^{38,V1,39},x_5^{40,V2,41},x_5^{42,V3,43},} \right.\\ \;\;\;\;\;\;\;\;\left. {x_5^{44,V4,45},x_5^{46,V6,47}} \right\}, \end{array} |
{X_6} = \{ x_6^{48,V6,49},x_6^{50,V3,51},x_6^{52,V4,53},x_6^{54,V5,55}\} |
There are a total of
X = {X_1} \cup {X_2} \cup \cdots \cup {X_n} |
More generally, let the cardinality of
Next, we presented the construction of probe library
As previously described, the maximal cliques including vertex
For the maximal clique
Similarly, for the maximal clique
Therefore, in order to search and generate all maximal cliques that includes vertex
{Y_1} = \{ \overline {x_1^1x_1^6} ,\overline {x_1^7x_1^2} ,\overline {x_1^7x_1^4} \} |
Similarly, for the maximal cliques including vertex
In case of the presence of data and probes, the 3-aggregation to be generated as result of probe operations was presented in Fig.9. The maximal cliques including vertex
Therefore, in order to search and generate all maximal cliques that includes vertex
{Y_2} = \{ \overline {x_2^9x_2^{14}} ,\overline {x_2^{15}x_2^{12}} \} |
Similarly, for the maximal cliques including vertex
In case of the presence of data and probes, the 4-aggregation to be generated by probe operations was presented in Fig.11. The maximal cliques including vertex
Therefore, in order to search and generate all maximal cliques that includes vertex
{Y_3} = \{ \overline {x_3^{17}x_3^{20}} ,\overline {x_3^{21}x_3^{22}} ,\overline {x_3^{23}x_3^{24}} \} |
Since there do not exist other maximal cliques any more in the given graph, probe sub-libraries
{Y_4} = \Phi , |
{Y_5} = \Phi , |
{Y_6} = \Phi |
There are a total of
Y = {Y_1} \cup {Y_2} \cup \cdots \cup {Y_n} |
More generally, for arbitrary vertex
Upon the constructed data library
Given undirected graph
For convenience, let the cardinality of
As for data fibers, since each data has 3 types of data fiber, 2 types of data fiber are the targets for probe, the other 1 is the encoding for vertex in the given graph, the number of types of data fibers is
The data bodies of all data are the same with another. Data differ only in the types of data fiber. Therefore, the number of types of data bodies is 1.
As for the type of probe, probes are designed to search and generate all maximal cliques, as we discussed previously. According the designing principle of probes, for a maximal clique containing
In short, the space complexity is
Upon the constructed data library
The time complexity of the model is
As the size of problem increases, the types of data and probes polynomially increase. More probes will involve in searching target data pairs and generating maximal cliques in parallel. This means the parallelism of the proposed model increases dramatically with problem size. We think it marks a giant step in computing theory.
In 1945, Von Neumann employed semiconductors as components to realize Turing machine, giving birth to the modern general-purpose computer. The question naturally arises: how the proposed model is realized?
A possible realization technology was proposed in Ref.[17]. In the method, data fibers in the proposed model were realized by using single stranded DNA molecules, data bodies were realized by using nano-particles. Therefore, data were realized by attaching DNA segments to nano-particles. Probes were realized by using the complementary strands of two target single stranded DNA molecules. Currently, advances in biological technology have already made the attachment quite easy.
It should be pointed out that the following key issues must be carefully addressed in the realization of PM. The top priority is the solution detection technology. How is the cardinality of
In this paper, a computing model based on PM for maximum clique problem was proposed. Given undirected graph
PM is a mathematic model with massive parallelism. Our work demonstrate that, for NP-complete search problem, the searching capability of PM is superior to TM. Theoretically, one step of probe operation can search
PM was inspired from neural network. The main difference lies in the connective operator: probe, in contrast to synapse. The appealing characteristic of PM is the massive parallelism. In essence, the parallelism of PM contributes to the connective operator: probe. That is the reason that the model is termed PM. Although PM has far from being realized these days, we believe the model is promising. With massive parallelism inherited in PM, we expect more complicated problem can be tackled in this brand-new model. That will be our future work. Now, the question is: Whether there exists an alternative technique of realizing the connective operator that is more superior to probe?
[1] |
J. Xie, W Kong, L Pang, et al., “Staggered grid scheme for the FFT-based methods,” Chinese Journal of Electronics, vol.28, no.5, pp.1066–1072, 2019. DOI: 10.1049/cje.2019.06.002
|
[2] |
N. Zhang and T. Zhang, “Recurrent neural networks for computing the moore-penrose inverse with momentum learning,” Chinese Journal of Electronics, vol.29, no.6, pp.1039–1045, 2020. DOI: 10.1049/cje.2020.02.005
|
[3] |
L. Yang, G Hu, C Zhang, et al., “Solving structured nonlinear programming based on CPU-GPU collaborative parallel interior point algorithm,” Chinese Journal of Electronics, vol.47, no.2, pp.382–389, 2019.
|
[4] |
M. Yue and B. Bai, “Design and implementation of DSP system for motor FOC algorithm,” Chinese Journal of Electronics, vol.48, no.10, pp.2041–2046, 2020.
|
[5] |
J. Liu, Y. Ge, M. Tian, et al., “ZYNQ-based reconfigurable convolutional neural network accelerator,” Chinese Journal of Electronics, vol.49, no.4, pp.729–735, 2021.
|
[6] |
N. Hou, F. He, Y. Zhou, et al., “An efficient GPU-based parallel tabu search algorithm for hardware/software co-design,” Frontiers of Computer Science, vol.14, no.5, pp.1–18, 2020.
|
[7] |
Y. Zhou, F. He, N. Hou, et al., “Parallel ant colony optimization on multi-core SIMD CPUs,” Future Generation Computer Systems, vol.79, no.2, pp.473–487, 2018.
|
[8] |
Y. Zhou, F. He, and Y. Qiu, “Accelerating image convolution filtering algorithms on integrated CPU-GPU architectures,” Journal of Electronic Imaging, vol.27, article no.033002, 2018. DOI: 10.1117/1.JEI.27.3.033002
|
[9] |
Y. Zhou, F. He, and Y. Qiu, “Dynamic strategy based parallel ant colony optimization on GPUs for TSPs,” Science China Information Sciences, vol.60, article no.068102, 2017. DOI: 10.1007/s11432-015-0594-2
|
[10] |
D. Deutsch, “Quantum theory, the Church-Turing principle and the universal quantum computer,” Proc. of the Royal Society of London A, vol.400, no.1818, pp.97–117, 1985. DOI: 10.1098/rspa.1985.0070
|
[11] |
M. Muller, “Strongly universal quantum turing machines and invariance of Kolmogorov complexity,” IEEE Trans. on Information Theory, vol.54, no.2, pp.763–780, 2008. DOI: 10.1109/TIT.2007.913263
|
[12] |
Frank Tabakin, “Model dynamics for quantum computing,” Annals of Physics, vol.383, pp.33–78, 2017. DOI: 10.1016/j.aop.2017.04.013
|
[13] |
W. S. Mcculloch and W. Pitts, “A logical calculus of the ideas immanent in nervous activity,” Bulletin of Mathematical Biology, vol.5, pp.115–133, 1943. DOI: 10.1007/BF02478259
|
[14] |
Z. Aram, S. Jafari, J. Ma, et al., “Using chaotic artificial neural networks to model memory in the brain,” Communications in Nonlinear Science and Numerical Simulation, vol.44, pp.449–459, 2017. DOI: 10.1016/j.cnsns.2016.08.025
|
[15] |
M. Ranjbar, S. Effati, and S. M. Miri, “An artificial neural network for solving quadratic zero-one programming problems,” Neurocomputing, vol.235, pp.192–198, 2017.
|
[16] |
L. Adleman, “Molecular computation of solutions to combinatorial problems,” Science, vol.266, no.5187, pp.1021–1024, 1994. DOI: 10.1126/science.7973651
|
[17] |
Z. X. Yin, J. Z. Cui, and J. Yang, “Integer programming problem based on plasmid DNA computing model,” Chinese Journal of Electronics, vol.26, no.6, pp.1284–1288, 2017. DOI: 10.1049/cje.2017.07.013
|
[18] |
T. Song, P. Zheng, W. M. L. Dennis, et al., “Design of logic gates using spiking neural P systems with homogeneous neurons and astrocytes-like control,” Information Sciences, vol.372, pp.380–391, 2016.
|
[19] |
X. Wang, T. Song, F. Gong, et al., “On the computational power of spiking neural P systems with self-organization,” Scientific Reports, vol.6, no.1, pp.27624–27639, 2016. DOI: 10.1038/srep27624
|
[20] |
H. Peng, J. Yang, J. Wang, et al., “Spiking neural P systems with multiple channels,” Neural Networks, vol.95, pp.66–71, 2017.
|
[21] |
J. Xu, “Probe machine,” IEEE Transactions on Neural Networks & Learning Systems, vol.27, no.7, pp.1405–1416, 2016.
|
[22] |
R. M. Karp. “Reducibility among combinatorial problems,” in Complexity of Computer Computations, R. E. Miller and J. W. Thatcher, edit., New York: Plenum Press, pp.88−103, 1972.
|
[23] |
C. Godsil and B. Rooney, “Hardness of computing clique number and chromatic number for Cayley graphs,” European Journal of Combinatorics, vol.62, pp.147–166, 2017.
|
[24] |
R. D. Luce and A. D. Perry, “A method of matrix analysis of group structure,” Psychometrika, vol.14, no.2, pp.95–116, 1949. DOI: 10.1007/BF02289146
|
[25] |
F. Harary and I. C. Ross, “A procedure for clique detection using the group matrix,” Sociometry, vol.20, no.3, pp.205–215, 1957. DOI: 10.2307/2785673
|
[26] |
D. E. Knuth, The Art of Computer Programming, 1st ed., Addison-Wesley Professional, 2011.
|
[27] |
A. H. Land, “An automatic method of solving discrete programming problem,” Econometrica, vol.28, no.3, pp.497–520, 1960. DOI: 10.2307/1910129
|
[28] |
P. S. Segundo, A. Lopez, and P. M. Pardalos, “A new exact maximum clique algorithm for large and massive sparse graphs,” Computers & Operations Research, vol.66, pp.81–94, 2016.
|
[29] |
C. M. Li, H. Jiang, and F. Manyà, “On minimization of the number of branches in branch-and-bound algorithms for the maximum clique problem,” Computers & Operations Research, Vol.84, DOI: 10.1016/j.cor.2017.02.017, 2017.
|
[30] |
R. Kopf and G. Ruhe, “A computational study of the weighted independent set problem for general graphs,” Foundations of Control Engineering, vol.12, no.4, pp.167–180, 1987.
|
[31] |
S. Zhang, W. Jing, Q. Wu, et al., “A fast genetic algorithm for solving the maximum clique problem,” 2014 10th International Conference on Natural Computation, IEEE, Xiamen, China, DOI: 10.1109/ICNC.2014.697593, 2014.
|
[32] |
C. Friden, A. Hertz, and D. Werra, “Stabulus: A technique for finding stable sets in large graphs with tabu search,” Computing, vol.42, no.1, pp.35–44, 1989. DOI: 10.1007/BF02243141
|
[33] |
F. Ma, J. K. Hao, and Y. Wang, “An effective iterated tabu search for the maximum bisection problem,” Computers & Operations Research, vol.81, pp.78–89, 2017.
|
[34] |
A. K. Jagota and K. W. Regan, “Performance of MAX-CLIQUE Approximation heuristics under description-length weighted distributions,” available at: http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=2FA485973535F33AA6535F861791FA33?doi=10.1.1.32.6486&rep=rep1&type=pdf, 1992.
|
[35] |
G. Yang and J. Yi, “Delayed chaotic neural network with annealing controlling for maximum clique problem,” Neurocomputing, vol.127, pp.114–123, 2014.
|
[36] |
Q. Ouyang, “DNA solution of the maximal clique problem,” Science, vol.278, no.5337, pp.446–449, 1997. DOI: 10.1126/science.278.5337.446
|
[37] |
T. Head, G. Rozenberg, R. S. Bladergroen, et al., “Computing with DNA by operating on plasmids,” Biosystems, vol.57, no.2, pp.87–93, 2000. DOI: 10.1016/S0303-2647(00)00091-5
|
[38] |
LI Ken-Li, ZHOU Xu, and ZOU Shu-Ting, “Improved volume molecular solutions for the maximum clique problem on DNA-based supercomputing,” Chinese Journal of Computers, vol.31, no.12, pp.2173–2181, 2008.
|
[39] |
Zhou Xu, Zhou Yantao, Ouyang Aijia, et.al, “An efficient tile assembly model for maximum clique problem,” Journal of Computer Research and Development, vol.51, no.6, pp.1253–1262, 2014.
|
[1] | ZHANG Xueying, GUO Yuling, LI Fenglian, WEI Xin, HU Fengyun, HUI Haisheng, JIA Wenhui. Geometric Mean Maximum FSVMI Model and Its Application in Carotid Artery Stenosis Risk Prediction[J]. Chinese Journal of Electronics, 2021, 30(5): 824-832. DOI: 10.1049/cje.2021.06.004 |
[2] | ZHANG Zhengyu, LOU Jinming, JIN Mengdi, YAO Yuan, ZHU Jingguo. Application of Maximum Entropy Theorem in Channel Estimation[J]. Chinese Journal of Electronics, 2020, 29(2): 361-370. DOI: 10.1049/cje.2020.01.015 |
[3] | GUO Ping, ZHU Jian, CHEN Haizhu, YANG Ruilong. A Linear-Time Solution for All-SAT Problem Based on P System[J]. Chinese Journal of Electronics, 2018, 27(2): 367-373. DOI: 10.1049/cje.2018.01.008 |
[4] | HUANG Yufang, XIAO Jianhua, JIANG Keqin, CHEN Zhihua. Parallel Solution for Maximum Independent Set Problem by Programmable Tile Assembly[J]. Chinese Journal of Electronics, 2016, 25(2): 203-208. DOI: 10.1049/cje.2016.03.002 |
[5] | QIAN Yaguan, WU Chunming, YANG Qiang, WANG Bin. Network Traffic Anomaly Detection Based on Maximum Entropy Model[J]. Chinese Journal of Electronics, 2012, 21(3): 579-582. |
[6] | FANG Jinglong, WANG Wanliang, WANG Xingqi, LONG Zhe, LIANG Dongsheng, ZHOU Qili. A SVDD Method Based on Maximum Distance between Two Centers of Spheres[J]. Chinese Journal of Electronics, 2012, 21(1): 107-111. |
[7] | ZHOU Xi, HU Weidong, SUN Houjun, LI Bo, LV Xin. A Multiscale Maximum Entropy ReconstructionAlgorithm for Synthetic Aperture ImagingRadiometers[J]. Chinese Journal of Electronics, 2010, 19(4): 743-746. |
[8] | ZHANG Xiang, XIAO Xiang, WANG Haipeng, ZHANG Jianping, YAN Yonghong. Multi-Class Maximum A Posteriori LinearRegression for Speaker Verification[J]. Chinese Journal of Electronics, 2010, 19(4): 641-645. |
[9] | HAO Jinghua, LIU Min, WU Cheng. Particle Swarm Optimization for Parallel MachineScheduling Problem with Machine EligibilityConstraints[J]. Chinese Journal of Electronics, 2010, 19(1): 103-106. |
[10] | BAI Danyu, TANG Lixin. Two Asymptotically Optimal Lower Bounds for Flow Shop Problem[J]. Chinese Journal of Electronics, 2009, 18(4): 625-629. |