13 research outputs found

    Chaotic Quantum Double Delta Swarm Algorithm using Chebyshev Maps: Theoretical Foundations, Performance Analyses and Convergence Issues

    Full text link
    Quantum Double Delta Swarm (QDDS) Algorithm is a new metaheuristic algorithm inspired by the convergence mechanism to the center of potential generated within a single well of a spatially co-located double-delta well setup. It mimics the wave nature of candidate positions in solution spaces and draws upon quantum mechanical interpretations much like other quantum-inspired computational intelligence paradigms. In this work, we introduce a Chebyshev map driven chaotic perturbation in the optimization phase of the algorithm to diversify weights placed on contemporary and historical, socially-optimal agents' solutions. We follow this up with a characterization of solution quality on a suite of 23 single-objective functions and carry out a comparative analysis with eight other related nature-inspired approaches. By comparing solution quality and successful runs over dynamic solution ranges, insights about the nature of convergence are obtained. A two-tailed t-test establishes the statistical significance of the solution data whereas Cohen's d and Hedge's g values provide a measure of effect sizes. We trace the trajectory of the fittest pseudo-agent over all function evaluations to comment on the dynamics of the system and prove that the proposed algorithm is theoretically globally convergent under the assumptions adopted for proofs of other closely-related random search algorithms.Comment: 27 pages, 4 figures, 19 table

    Diazine based ligand supported CoII3 and CoII4 coordination complexes: role of the anions

    Get PDF
    We report the synthesis and characterisation of a family of three CoII4, two CoII3 complexes from an symmetrical diazine ligand, H2hyda = N,N−bis(3−methoxy salicylidene) hydrazine). The metallic skeletons of all complexes describe a nearly linear arrangement of CoII centers. The present results highlight the profound influence of the anions on the structural outcome of a complex. Furthermore, the distortion imposed by the twisted nature of the diazine based ligand depends on the use of associated anions which results in triple helical CoII4 and double helical CoII3 entities. The CoII ions in complexes 1−3 are antiferromagnetically coupled leading to diamagnetic ground state. In contrast, complexes 4 and 5 exhibit a magnetic ground state, but exhibit different behaviour at low temperatures due to differences in crystal packing and hence intermolecular interactions

    Diazine based ligand supported CoII3 and CoII4 coordination complexes: role of the anions

    Get PDF
    We report the synthesis and characterisation of a family of three CoII4, two CoII3 complexes from an symmetrical diazine ligand, H2hyda = N,N−bis(3−methoxy salicylidene) hydrazine). The metallic skeletons of all complexes describe a nearly linear arrangement of CoII centers. The present results highlight the profound influence of the anions on the structural outcome of a complex. Furthermore, the distortion imposed by the twisted nature of the diazine based ligand depends on the use of associated anions which results in triple helical CoII4 and double helical CoII3 entities. The CoII ions in complexes 1−3 are antiferromagnetically coupled leading to diamagnetic ground state. In contrast, complexes 4 and 5 exhibit a magnetic ground state, but exhibit different behaviour at low temperatures due to differences in crystal packing and hence intermolecular interactions

    Secure and Trusted SoC: Challenges and Emerging Solutions

    No full text
    Over the ages, hardware components, platforms and supply chains have been considered secure and trustworthy. However, recent discoveries and reports on security vulnerabilities and attacks in microchips and circuits violate this hardware root of trust. System-on-Chip (SoC) design based on reusable hardware intellectual property (IP) is now a pervasive design practice in the industry due to the dramatic reduction in design/verification cost and time. This growing reliance on reusable pre-verified hardware IPs and a wide array of design automation tools during SoC design, often acquired from untrusted 3rd party vendors, coupled with fabrication in untrusted offshore foundries severely affects the security and trustworthiness of SoCs used in diverse applications. This paper presents an overview of the various security challenges in the SoC design cycle and possible solutions for protection

    Secure and Trusted SoC: Challenges and Emerging Solutions

    No full text
    Over the ages, hardware components, platforms and supply chains have been considered secure and trustworthy. However, recent discoveries and reports on security vulnerabilities and attacks in microchips and circuits violate this hardware root of trust. System-on-Chip (SoC) design based on reusable hardware intellectual property (IP) is now a pervasive design practice in the industry due to the dramatic reduction in design/verification cost and time. This growing reliance on reusable pre-verified hardware IPs and a wide array of design automation tools during SoC design, often acquired from untrusted 3rd party vendors, coupled with fabrication in untrusted offshore foundries severely affects the security and trustworthiness of SoCs used in diverse applications. This paper presents an overview of the various security challenges in the SoC design cycle and possible solutions for protection
    corecore