permutation matrix
Recently Published Documents


TOTAL DOCUMENTS

75
(FIVE YEARS 17)

H-INDEX

13
(FIVE YEARS 2)

2022 ◽  
Author(s):  
Avinash N. ◽  
Jaraldpushparaj S. ◽  
Sathinathan T. ◽  
Britto Antony Xavier G.

Robotics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 122
Author(s):  
Jennifer David ◽  
Thorsteinn Rögnvaldsson

In this paper, we study the “Multi-Robot Routing problem” with min–max objective (MRR-MM) in detail. It involves the assignment of sequentially ordered tasks to robots such that the maximum cost of the slowest robot is minimized. The problem description, the different types of formulations, and the methods used across various research communities are discussed in this paper. We propose a new problem formulation by treating this problem as a bipartite graph with a permutation matrix to solve it. A comparative study is done between three methods: Stochastic simulated annealing, deterministic mean-field annealing, and a heuristic-based graph search method. Each method is investigated in detail with several data sets (simulation and real-world), and the results are analysed and compared with respect to scalability, computational complexity, optimality, and its application to real-world scenarios. The paper shows that the heuristic method produces results very quickly with good scalability. However, the solution quality is sub-optimal. On the other hand, when optimal or near-optimal results are required with considerable computational resources, the simulated annealing method proves to be more efficient. However, the results show that the optimal choice of algorithm depends on the dataset size and the available computational budget. The contribution of the paper is three-fold: We study the MRR-MM problem in detail across various research communities. This study also shows the lack of inter-research terminology that has led to different names for the same problem. Secondly, formulating the task allocation problem as a permutation matrix formulation (bipartite graph) has opened up new approaches to solve this problem. Thirdly, we applied our problem formulation to three different methods and conducted a detailed comparative study using real-world and simulation data.


2021 ◽  
Vol 295 (2) ◽  
pp. 78-88
Author(s):  
VLADIMIR KRASILENKO ◽  
◽  
NATALIYA YURCHUK ◽  
DIANA NIKITOVICH ◽  
◽  
...  

A The article considers the peculiarities of the application of isomorphic matrix representations for modeling the protocol of matching secret keys-permutations of significant dimension. The situation is considered when for cryptographic transformations of blocks with a length of 256 * 256 bytes, presented in the form of a matrix of a black-and-white image, it is necessary to rearrange all bytes in accordance with the matrix keys. To generate a basic matrix key and the appearance of the components KeyA and KeyB in the format of two black and white images, a software module using engineering mathematical software Mathcad is proposed. Simulations are performed, for example, with sets of fixed matrix representations. The essence of the protocol of coordination of the main matrix of permutations by the parties is considered. Also shown are software modules in Mathcad for accelerated methods that display the procedure of iterative permutations in a permutation matrix isomorphic to the elevation of the permutation matrix to the desired degree with a certain side, corresponding to specific bits of bits or other code representations of selected random numbers. It is demonstrated that the parties receive new permutation matrices after the first step of the protocol, those sent to the other party, and the identical new permutation matrices received by the parties after the second step of the protocol, ie the secret permutation matrix. Similar qualitative cryptographic transformations have been confirmed using the proposed representations of the permutation matrix based on the results of modeling matrix affine-permutation ciphers and multi-step matrix affine-permutation ciphers for different cases when the components of affine transformations are first executed in different sequences. , and then permutation using the permutation matrix, or vice versa. The model experiments performed in the study demonstrated the adequacy of the functioning of the models proposed by the protocol and methods of generating a permutation matrix and demonstrated their advantages.


Author(s):  
Marcel Seelbach Benkner ◽  
Vladislav Golyanik ◽  
Christian Theobalt ◽  
Michael Moeller

2020 ◽  
Vol 48 (4) ◽  
pp. 719-740
Author(s):  
Richard A. Brualdi ◽  
Geir Dahl

AbstractFor a permutation π, and the corresponding permutation matrix, we introduce the notion of discrete derivative, obtained by taking differences of successive entries in π. We characterize the possible derivatives of permutations, and consider questions for permutations with certain properties satisfied by the derivative. For instance, we consider permutations with distinct derivatives, and the relationship to so-called Costas arrays.


2020 ◽  
Vol 17 (04) ◽  
pp. 2050052 ◽  
Author(s):  
Hans-Thomas Elze

The dynamics-from-permutations of classical Ising spins are studied for a chain of four spins. We obtain the Hamiltonian operator which is equivalent to the unitary permutation matrix that encodes assumed pairwise exchange interactions. It is shown how this can be summarized by an exact terminating Baker–Campbell–Hausdorff formula, which relates the Hamiltonian to a product of exponentiated two-spin exchange permutations. We briefly comment upon physical motivation and implications of this study.


Sign in / Sign up

Export Citation Format

Share Document