4,638 research outputs found

    An adaptation reference-point-based multiobjective evolutionary algorithm

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.It is well known that maintaining a good balance between convergence and diversity is crucial to the performance of multiobjective optimization algorithms (MOEAs). However, the Pareto front (PF) of multiobjective optimization problems (MOPs) affects the performance of MOEAs, especially reference point-based ones. This paper proposes a reference-point-based adaptive method to study the PF of MOPs according to the candidate solutions of the population. In addition, the proportion and angle function presented selects elites during environmental selection. Compared with five state-of-the-art MOEAs, the proposed algorithm shows highly competitive effectiveness on MOPs with six complex characteristics

    Spatial Stroop and spatial orienting: the role of onset versus offset cues

    Get PDF
    The present study investigated whether offset cues have the same attentional consequences in the spatial Stroop effect as onset cues. Experiments 1 and 2 compared the attentional effects of onset-offset cues versus offset cues on the spatial Stroop effect, whereas Experiment 3 compared the attentional effects of onset versus offset cues. Across these experiments, independent of cue type (onset-offset or onset vs. offset) and even at long stimulus-onset asynchrony, attentional cueing did not revert into inhibition of return and was modulated by spatial Stroop with greater cueing effects for incongruent arrow&#39;s direction and position. In addition, onset-offset or onset and offset cues produced comparable cueing effects in the location-direction congruent condition, and onset-offset or onset cues produced greater facilitation than offset cues in the incongruent condition. From a different perspective, peripheral cueing modulated the spatial Stroop effect in the same direction for onset-offset or onset and offset cues, although the reduction in spatial Stroop at cued locations was smaller with offset than with onset-offset or onset cues.</p

    Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol

    Full text link
    The participant attack is the most serious threat for quantum secret-sharing protocols. We present a method to analyze the security of quantum secret-sharing protocols against this kind of attack taking the scheme of Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59 1829 (1999)] as an example. By distinguishing between two mixed states, we derive the necessary and sufficient conditions under which a dishonest participant can attain all the information without introducing any error, which shows that the HBB protocol is insecure against dishonest participants. It is easy to verify that the attack scheme of Karlsson, Koashi, and Imoto [Phys. Rev. A 59, 162 (1999)] is a special example of our results. To demonstrate our results further, we construct an explicit attack scheme according to the necessary and sufficient conditions. Our work completes the security analysis of the HBB protocol, and the method presented may be useful for the analysis of other similar protocols.Comment: Revtex, 7 pages, 3 figures; Introduction modifie
    corecore