
The traditional image encryption technology has the disadvantages of low encryption efficiency and low security. According to the characteristics of image information, an image encryption algorithm based on double time-delay chaos is proposed by combining the delay chaotic system with traditional encryption technology. Because of the infinite dimension and complex dynamic behavior of the delayed chaotic system, it is difficult to be simulated by AI technology. Furthermore time delay and time delay position have also become elements to be considered in the key space. The proposed encryption algorithm has good quality. The stability and the existence condition of Hopf bifurcation of Lorenz system with double delay at the equilibrium point are studied by nonlinear dynamics theory, and the critical delay value of Hopf bifurcation is obtained. The system intercepts the pseudo-random sequence in chaotic state and encrypts the image by means of scrambling operation and diffusion operation. The algorithm is simulated and analyzed from key space size, key sensitivity, plaintext image sensitivity and plaintext histogram. The results show that the algorithm can produce satisfactory scrambling effect and can effectively encrypt and decrypt images without distortion. Moreover, the scheme is not only robust to statistical attacks, selective plaintext attacks and noise, but also has high stability.
Citation: Yuzhen Zhou, Erxi Zhu, Shan Li. An image encryption algorithm based on the double time-delay Lorenz system[J]. Mathematical Biosciences and Engineering, 2023, 20(10): 18491-18522. doi: 10.3934/mbe.2023821
[1] | Chunlai Liu, Chuanhui Xiong . Single machine resource allocation scheduling problems with deterioration effect and general positional effect. Mathematical Biosciences and Engineering, 2021, 18(3): 2562-2578. doi: 10.3934/mbe.2021130 |
[2] | Weiguo Liu, Xuyin Wang, Xiaoxiao Wang, Peizhen Zhao . Due-window assignment scheduling with past-sequence-dependent setup times. Mathematical Biosciences and Engineering, 2022, 19(3): 3110-3126. doi: 10.3934/mbe.2022144 |
[3] | Xuyin Wang, Weiguo Liu, Lu Li, Peizhen Zhao, Ruifeng Zhang . Resource dependent scheduling with truncated learning effects. Mathematical Biosciences and Engineering, 2022, 19(6): 5957-5967. doi: 10.3934/mbe.2022278 |
[4] | Guohui Zhang, Jinghe Sun, Xing Liu, Guodong Wang, Yangyang Yang . Solving flexible job shop scheduling problems with transportation time based on improved genetic algorithm. Mathematical Biosciences and Engineering, 2019, 16(3): 1334-1347. doi: 10.3934/mbe.2019065 |
[5] | Xuyin Wang, Weiguo Liu, Lu Li, Peizhen Zhao, Ruifeng Zhang . Due date assignment scheduling with positional-dependent weights and proportional setup times. Mathematical Biosciences and Engineering, 2022, 19(5): 5104-5119. doi: 10.3934/mbe.2022238 |
[6] | Dan Yang, Zhiqiang Xie, Chunting Zhang . Multi-flexible integrated scheduling algorithm for multi-flexible integrated scheduling problem with setup times. Mathematical Biosciences and Engineering, 2023, 20(6): 9781-9817. doi: 10.3934/mbe.2023429 |
[7] | Xue Jia, Jing Xue, Shi-Yun Wang, Ji-Bo Wang . Polynomial time algorithm for minmax scheduling with common due-window and proportional-linear shortening processing times. Mathematical Biosciences and Engineering, 2022, 19(9): 8923-8934. doi: 10.3934/mbe.2022414 |
[8] | Jiahe Xu, Yuan Tian, Tinghuai Ma, Najla Al-Nabhan . Intelligent manufacturing security model based on improved blockchain. Mathematical Biosciences and Engineering, 2020, 17(5): 5633-5650. doi: 10.3934/mbe.2020303 |
[9] | Jianguo Duan, Mengting Wang, Qinglei Zhang, Jiyun Qin . Distributed shop scheduling: A comprehensive review on classifications, models and algorithms. Mathematical Biosciences and Engineering, 2023, 20(8): 15265-15308. doi: 10.3934/mbe.2023683 |
[10] | Lu-Wen Liao . A branch and bound algorithm for optimal television commercial scheduling. Mathematical Biosciences and Engineering, 2022, 19(5): 4933-4945. doi: 10.3934/mbe.2022231 |
The traditional image encryption technology has the disadvantages of low encryption efficiency and low security. According to the characteristics of image information, an image encryption algorithm based on double time-delay chaos is proposed by combining the delay chaotic system with traditional encryption technology. Because of the infinite dimension and complex dynamic behavior of the delayed chaotic system, it is difficult to be simulated by AI technology. Furthermore time delay and time delay position have also become elements to be considered in the key space. The proposed encryption algorithm has good quality. The stability and the existence condition of Hopf bifurcation of Lorenz system with double delay at the equilibrium point are studied by nonlinear dynamics theory, and the critical delay value of Hopf bifurcation is obtained. The system intercepts the pseudo-random sequence in chaotic state and encrypts the image by means of scrambling operation and diffusion operation. The algorithm is simulated and analyzed from key space size, key sensitivity, plaintext image sensitivity and plaintext histogram. The results show that the algorithm can produce satisfactory scrambling effect and can effectively encrypt and decrypt images without distortion. Moreover, the scheme is not only robust to statistical attacks, selective plaintext attacks and noise, but also has high stability.
In actual industrial production, the processing times of jobs have deterioration (aging) effects, i.e., the later of a job starts, the longer it takes to process it (see Wang and Wang [1]). Wang and Wang [2] considered the single-machine makespan minimization problem with time dependent processing times and group technology. Under ready times of the jobs, they proved that the problem can be solved in polynomial time. Wang and Wang [3] investigated the single-machine weighted sum of the hth power of waiting times problems with simple linear deterioration and precedence constraints. Under some precedence constraints, they proved that these problems remain polynomially solvable. Cheng et al. [4] studied single-machine problems with an accelerating deterioration effect. They proved that some regular and non-regular objective functions can be solved in polynomial time. Yin et al. [5] addressed some two-agent scheduling problems with deterioration effects on a single-machine. Zhang et al. [6] considered single-machine problems with time-dependent processing times. Under the common and slack due window assignments, they proved that two non-regular objective function minimizations can be solved in polynomial time. Liu et al. [7] considered single-machine group scheduling with deteriorating jobs. For the makespan minimization with ready times, they proposed branch-and-bound algorithm and heuristic algorithm. Wang and Liang [8] studied single-machine group scheduling with deterioration effects and resource allocation. For the makespan minimization under limited resource availability constraint, they proposed branch-and-bound and heuristic algorithms. Gawiejnowicz [9] reviewed scheduling problems with deteriorations effects (time-dependent processing times). In addition, with the deterioration (aging) effects, the machine can perform the maintenance activities and increase work efficiency, so, the scheduling problems with maintenance activities have also been considered (see Ma et al. [10] and Wang and Wei [11]). Hsu et al. [12] considered unrelated parallel-machine problem with rate-modifying activities. For the total completion time minimization, they proposed a more efficient algorithm. Ji et al. [13] studied single-machine slack due date assignment problem with job-dependent aging effects. Under a deteriorating maintenance activity, that proved that a non-regular objective minimization can be solved in polynomial time. Rustogi and Strusevich [14,15] considered single-machine scheduling problems with rate modifying activities. Liu et al. [16] studied single-machine multiple common due-date assignments scheduling with deterioration effects. Under an maintenance activity, they proved that the linear weighted sum of earliness, tardiness, and the due dates minimization can be solved in polynomial time. Xiong et al. [17] considered the single-machine common due date assignment problem potential machine disruption. Zhu et al. [18] investigated multitasking scheduling problems with multiple rate-modifying activities. For the single-criterion and multi-criteria minimizations, they proposed optimal algorithms.
Recently, Zhang et al. [19] studied machine scheduling problems with deteriorating effects. Under the deteriorating rate-modifying activities, they proved that some objective function minimizations can be solved in polynomial time. Wang and Li [20] studied the unrelated parallel processors problem with deterioration effects and deteriorating maintenance activities. For some regular objective function minimizations, they proved that the problem can be solved in polynomial time. Zhang et al. [21] considered parallel machines scheduling problems with linear deteriorating jobs and maintenance activities. Under the resumable and non-resumable cases, the goal is to minimize the expected sum of completion times. They presented the pseudo-polynomial time algorithms to solve the problems. Zhang et al. [22] addressed single-machine scheduling problems with multiple maintenance activities and position-and-resource-dependent processing times. For some regular and non-regular objective function minimizations, they proposed polynomial time and pseudo-polynomial time algorithms. Sun and Geng [23] investigated the single-machine maintenance activity scheduling with deteriorating effects. The goal is to minimize the makespan and total completion time, they showed that the problem can be solved in polynomial time, respectively. Wang et al. [24] examined the single-machine common due-window assignment problem with a maintenance activity. Under constant and time-dependent processing times, they proved that a non-regular general earliness and tardiness minimization can be solved in polynomial time. Jia et al. [25] considered the single-machine scheduling problem with deterioration effects. Under the deterioration maintenance activity and slack due-window assignment, they showed that a non-regular objective function minimization can be solved in polynomial time. He et al. [26] discussed unrelated parallel processor scheduling with deterioration effects and maintenance activities. The objective is to minimize the total completion time and total machine load, they showed that these problems remain polynomially solvable.
The phenomena of deteriorating jobs and machine maintenance activity occurring simultaneously can be found in real-life situations. For example, consider a set of tasks (jobs) available for processing by a human operator. Perhaps the most distinguishing factor that differentiates human operators from machines within the context of task-sequencing is the notion of fatigue and its effect on task processing. More specifically, the rate at which a human operator performs a given task is known to be a decreasing function of the operator's level of fatigue, which manifests as the task processing time taking longer than expected. Another distinguishing characteristic is that human operators regularly engage in rest breaks during work shifts, which allows them to recover and mitigate some of the negative effects of fatigue (Sun and Geng [23]; Eilon [27]; Lodree and Geiger [28]). In this paper, we extend the results of Sun and Geng [23], by studying a more general processing times that includes the one given in Sun and Geng [23] as a special case. For the makespan minimization, we prove that the problem is polynomial-time solvable.
The organization of this article is as follows. Section 2 gives a description of the problem. Section 3 presents a polynomial-time solution for the problem. Conclusions are presented in Section 4.
There are ¨n independent jobs T1,T2,…,Tn to be processed on a single-machine, and before processing, the machine needs ˜t (˜t>0) preparation time. Due to the time-and-position dependent deteriorating effects (denoted by tpdde), the machine's production efficiency is reduced, the machine will perform a maintenance activity (denoted by ma), and when the repair is completed, the machine will return to the initial setting and the tpdde will start again.
It is assumed that the machine performs a ma after the kth job is completed, and the maintenance time is D. In the case of tpdde, the actual processing time of job Tj if it is scheduled in rth position in a sequence is given by
pj={(aj+bjsj)rc,if r≤k,(θjaj+bj(sj−C[k]−D))(r−k)c,if r>k, | (1) |
where aj (resp. bj) is the normal processing time (resp. Deteriorating rate) of Tj (j=1,2,…,n), sj (resp. θj (θj>0)) is the starting processing time (resp. Maintenance rate) of Tj, c (c≥0) is the common aging rate for all the jobs, and [k] is some job scheduled in kth position. Ji et al. [29] studied the following (i.e., simple linear deterioration and aging) model pj={bjsjrc,if r≤k,bj(sj−C[k]−D)(r−k)c,if r>k. Ji et al. [29] proved that the makespan minimization under simple linear deterioration and aging model is NP-hard in the strong sense. Sun and Geng [23] considered the following (i.e., linear deterioration) model pj={aj+bsj,if r≤k,θaj+b(sj−C[k]−D),if r>k, where b (resp. 0<θ≤1) is the common deterioration rate (resp. Maintenance rate) for all the jobs. Sun and Geng [23] proved that the makespan and total completion time minimizations can be solved in polynomial time, respectively.
In this paper, we mainly concentrate on the following model:
pj={(aj+bsj)rc,if r≤k,(θjaj+b(sj−C[k]−D))(r−k)c,if r>k, | (2) |
Let Cj denote the completion time of job Tj, the objective is to determine the location of the maintenance activity and the job sequence φ such that the makespan Cmax=max{C1,C2,…,Cn} is to be minimized. From Gawiejnowicz [9], this problem can be written as:
1|ma,tpdde|Cmax | (3) |
The machine is repaired after the kth job is processed, the machine can be repaired in any position from 1 to n−1, and the maintenance time is D, hence, from Figure 1, we have
Cmax=˜t+k∑j=1p[j]+D+˜t+n∑j=k+1p[j]=D+2˜t+k∑j=1p[j]+n∑j=k+1p[j] | (4) |
According to the location of ma, we are divided into the following three cases, that is, case ⅰ: k=0, case ⅱ: 0<k<n, and case ⅲ: k=n.
If k=0, the actual machining time p[j] of the job T[j] is
p[j]=(θ[j]a[j]+b(s[j]−D))jc,j=1,2,…,n. | (5) |
If j=1, the machine needs ˜t time to prepare and maintenance time D,
s[1]=˜t+D, p[1]=(θ[1]a[1]+b(s[1]−D))1c=θ[1]a[1]+b˜t.
If j=2, s[2]=C[1]=p[1]+s[1]=θ[1]a[1]+(1+b)˜t+D,
p[2]=(θ[2]a[2]+b(s[2]−D))2c=θ[2]a[2]2c+b2c(θ[1]a[1]+(1+b)˜t)=θ[2]a[2]2c+b2cθ[1]a[1]+b2c(1+b)˜t. |
If j=3, s[3]=C[2]=p[2]+s[2]=θ[2]a[2]2c+θ[1]a[1](1+b2c)+˜t(1+b)(1+b2c)+D,
p[3]=(θ[3]a[3]+b(s[3]−D))3c=θ[3]a[3]3c+b3c(θ[2]a[2]2c+θ[1]a[1](1+b2c)+˜t(1+b)(1+b2c)).
......
If j=i,
s[i]=C[i−1]=∑i−1h=1θ[h]a[h]hc∏i−1l=h+1(1+blc)+˜t∏i−1l=1(1+blc)+D,
p[i]=θ[i]a[i]ic+bic(∑i−1h=1a[h]hc∏i−1l=h+1(1+blc)+˜t∏i−1l=1(1+blc)).
......
If j=n,
s[n]=C[n−1]=∑n−1h=1θ[h]a[h]hc∏n−1l=h+1(1+blc)+˜t∏n−1l=1(1+blc)+D,
p[n]=θ[n]a[n]nc+bnc(∑n−1h=1a[h]hc∏n−1l=h+1(1+blc)+˜t∏n−1l=1(1+blc)).
By the simple algebraic calculation, we have
Cmax=C[n]=s[n]+p[n]=n−1∑h=1θ[h]a[h]hcn−1∏l=h+1(1+blc)+˜tn−1∏l=1(1+blc)+D+θ[n]a[n]ic+bnc(n−1∑h=1a[h]hcn−1∏l=h+1(1+blc)+˜tn−1∏l=1(1+blc))=(1+b2c+b3c(1+b2c)+b4c(1+b2c)(1+b3c)+⋯+bncn−1∏h=2(1+bhc))θ[1]a[1]+(2c+b3c2c+b4c2c(1+b3c)+⋯+bnc2cn−1∏h=3(1+bhc))θ[2]a[2]+...+((n−1)c+bnc(n−1)c)θ[n−1]a[n−1]+ncθ[n]a[n]+(b+b2c(1+b)+b3c(1+b)(1+b2c)+...+bncn−1∏l=1(1+blc))˜t+D=n∑j=1Δjθ[j]a[j]+E, | (6) |
where
Δ1=1+b2c+b3c(1+b2c)+b4c(1+b2c)(1+b3c)+⋯+bnc∏n−1h=2(1+bhc)Δ2=2c+b3c2c+b4c2c(1+b3c)+⋯+bnc2c∏n−1h=3(1+bhc)......Δn−1=(n−1)c+bnc(n−1)cΔn=nc, | (7) |
and
E=D+(b+b2c(1+b)+b3c(1+b)(1+b2c)+...+bncn−1∏l=1(1+blc))˜t. | (8) |
If 0<k<n, the actual processing time of job Tj is:
p[j]={(a[j]+bs[j])jc,if j≤k(θ[j]a[j]+b(s[j]−C[k]−D))(j−k)c,if j>k | (9) |
If j=1,2,…,k, we have s[1]=˜t, p[1]=(a[1]+bs[1])1c=a[1]+b˜t,
s[2]=C[1]=p[1]+s[1]=a[1]+(1+b)˜t,
p[2]=(a[2]+bs[2])2c=a[2]2c+b2c(a[1]1c+(1+b)˜t),
s[3]=C[2]=p[2]+s[2]=a[2]2c+a[1]1c(1+b2c)+(1+b)(1+b2c)˜t,
p[3]=(a[3]+bs[3])3c=a[3]3c+b3c(a[2]2c+a[1](1+b2c)+(1+b)(1+b2c)˜t),
......
s[k]=C[k−1]=∑k−1h=1a[h]hc∏k−1l=h+1(1+blc)+˜t∏k−1l=1(1+blc),
p[k]=(a[k]+bs[k−1])ic=a[k]kc+bkc(∑k−1h=1a[h]hc∏k−1l=h+1(1+blc)+˜t∏k−1l=1(1+blc)),
C[k]=∑kh=1a[h]hc∏kl=h+1(1+blc)+˜t∏kl=1(1+blc).
If j=k+1, the machine need to be repaired after the job T[k] is completed, we have
s[k+1]=C[k]+D+˜t, |
p[k+1]=(θ[k+1]a[k+1]+b(s[k+1]−C[k]−D))1c=θ[k+1]a[k+1]+b˜t. |
If j=k+2, j=k+3, …, j=n, we have
s[k+2]=C[k+1]=θ[k+1]a[k+1]+(1+b)˜t+C[k]+D,
p[k+2]=(θ[k+2]a[k+2]+b(s[k+2]−C[k]−D))2c=θ[k+2]a[k+2]2c+b2cθ[k+1]a[k+1]+b2c(1+b)˜t.
s[k+3]=C[k+2]=θ[k+2]a[k+2]2c+θ[k+1]a[k+1](1+b2c)+(1+b)(1+b2c)˜t+C[k]+D,
p[k+3]=(θ[k+3]a[k+3]+b(s[k+3]−C[k]−d))3c=θ[k+3]a[k+3]3c+b3c(θ[k+2]a[k+2]2c+θ[k+1]a[k+1](1+b2c)+(1+b)(1+b2c)˜t) |
......
s[n]=C[n−1]=∑n−k−1h=1θ[k+h]a[k+h]hc∏n−k−1l=h+1(1+blc)+˜t∏n−k−1l=1(1+blc)+C[k]+D,
p[n]=θ[n]a[n](n−k)c+b(n−k)c(n−k−1∑h=1θ[k+h]a[k+h]hcn−k−1∏l=h+1(1+blc)+˜tn−k−1∏l=1(1+blc)). |
Hence,
Cmax=s[n]+p[n]=n−k−1∑h=1θ[k+h]a[k+h]hcn−k−1∏l=h+1(1+blc)+˜tn−k−1∏l=1(1+blc)+k∑h=1a[h]hck∏l=h+1(1+blc)+˜tk∏l=1(1+blc)+D+θ[n]a[n](n−k)c+b(n−k)c(n−k−1∑h=1θ[k+h]a[k+h]hcn−k−1∏l=h+1(1+blc)+˜tn−k−1∏l=1(1+blc))=(1+b2c+b3c(1+b2c)+b4c(1+b2c)(1+b3c)+⋯+bkck−1∏h=2(1+bhc))a[1]+(2c+b3c2c+b4c2c(1+b3c)+⋯+bkc2ck−1∏h=3(1+bhc))a[2]+...+((k−1)c+bkc(k−1)c)a[k−1]+kca[k]+(+b2c+b3c(1+b2c)+b4c(1+b2c)(1+b3c)+⋯+b(n−k)cn−k−1∏h=2(1+bhc))θ[k+1]a[k+1]+(2c+b3c2c+b4c2c(1+b3c)+⋯+b(n−k)c2cn−k−1∏h=3(1+bhc))θ[k+2]a[k+2]+...+((n−k−1)c+b(n−k−1)c(n−k)cθ[n−1]a[n−1]+(n−k)cθ[n]a[n]+(b+b2c(1+b)+b3c(1+b)(1+b2c)+...+bkck−1∏l=1(1+blc)+b+b2c(1+b)+...+b(n−k)cn−k−1∏l=1(1+blc))˜t+D=k∑j=1Δja[j]+n∑j=k+1Δjθ[j]a[j]+E | (10) |
where,
Δ1=1+b2c+b3c(1+b2c)+b4c(1+b2c)(1+b3c)+⋯+bkc∏k−1h=2(1+bhc)Δ2=2c+b3c2c+b4c2c(1+b3c)+⋯+bkc2c∏k−1h=3(1+bhc)......Δk−1=(k−1)c+bkc(k−1)cΔk=kcΔk+1=1+b2c+b3c(1+b2c)+b4c(1+b2c)(1+b3c) +⋯+b(n−k)c∏n−k−1h=2(1+bhc)Δk+2=2c+b3c2c+b4c2c(1+b3c)+⋯+b(n−k)c2c∏n−k−1h=3(1+bhc)......Δn−1=(n−k−1)c+b(n−k−1)c(n−k)cΔn=(n−k)c, | (11) |
and
E=D+˜t(b+b2c(1+b)+b3c(1+b)(1+b2c)+...+bkc∏k−1l=1(1+blc)+b+b2c(1+b)+...+b(n−k)c∏n−k−1l=1(1+blc)). | (12) |
Similarly, if k=n, the actual processing time of T[j] is
p[j]=(a[j]+bs[j])jc,j=1,2,…,n, | (13) |
we have
Cmax=(a[1]+b˜t)+(a[2]2c+b2ca[1]+b2c(1+b)˜t)+...+(a[n]nc+bnc(n−1∑h=1a[h]hcn−1∏l=h+1(1+blc)+˜tn−1∏l=1(1+blc)))+D=(1+b2c+b3c(1+b2c)+b4c(1+b2c)(1+b3c)+⋯+bncn−1∏h=2(1+bhc))a[1]+(2c+b3c2c+b4c2c(1+b3c)+⋯+bnc2cn−1∏h=3(1+bhc))a[2]+...+((n−1)c+bnc(n−1)c)a[n−1]+nca[n]+(b+b2c(1+b)+b3c(1+b)(1+b2c)+...+bncn−1∏l=1(1+blc))˜t+D=n∑j=1Δja[j]+E | (14) |
where
Δ1=1+b2c+b3c(1+b2c)+b4c(1+b2c)(1+b3c)+⋯+bnc∏n−1h=2(1+bhc)Δ2=2c+b3c2c+b4c2c(1+b3c)+⋯+bnc2c∏n−1h=3(1+bhc)......Δn−1=(n−1)c+bnc(n−1)cΔn=nc, | (15) |
and
E=D+(b+b2c(1+b)+b3c(1+b)(1+b2c)+...+bncn−1∏l=1(1+blc))˜t. | (16) |
Lemma 1. (Hardy et al. [30]) ∑ni=jμjνj get the minimum, when sequence μj and sequence νj is arranged in opposite monotonous order.
From Eqs (8), (12) and (16), we have that E is a constant.
For case ⅰ (i.e., k=0), the problem 1|ma,tpdde|Cmax can be easily solved by Lemma 1 in O(nlogn) time, i.e., μj=Δj (see Eqs (6) and (7)), νj=θjaj.
For case ⅲ (i.e., k=n), the problem 1|ma,tpdde|Cmax can be easily solved by Lemma 1 in O(nlogn) time, i.e., μj=Δj (see Eqs (14) and (15)), νj=aj.
For case ⅱ (i.e., 0<k<n), let Zj,r=1 if job Tj is scheduled in rth position, and Zj,r=0, otherwise. Form Eq (10), the optimal solution of the problem 1|ma,tpdde|Cmax can be solved by the following assignment problem:
Min(n∑j=1k∑r=1ΔrajZj,r+n∑j=1n∑r=k+1ΔrθjajZj,r) | (17) |
Subject to n∑j=1Zj,r=1,r=1,2,…,n, | (18) |
n∑r=1Zj,r=1,j=1,2,…,n, | (19) |
Zj,r=0or1,j,r=1,2,…,n, | (20) |
where Δr (r=1,2,…,n) is given by Eq (11).
Let Cmax(k) be the makespan under a given k (k=0,1,2,…,n), from the above analysis, we propose the following algorithm to solve the problem 1|ma,tpdde|Cmax.
Algorithm 1
Step 1. Set k=0, calculate μj=Δj (see Eqs (6) and (7)) and νj=θjaj, determine a local optimal job sequence by Lemma 1, and record the objective function Cmax(k=0).
Step 2. Set k=1,2,…,n−1, calculate Δr (see Eq (11)) and determine a local optimal job sequence by an assignment problem Eqs (17)–(20), and record the objective function Cmax(k) (k=1,2,…,n−1).
Step 3. Set k=n, calculate μj=Δj (see Eqs (14) and (15)) and νj=aj, determine a local optimal job sequence by Lemma 1, and record the objective function Cmax(k=n).
Step 4. The optimal job sequence is the one with the minimum objective function value C∗max=min{Cmax(k)|k=0,1,2,…,n}.
Theorem 1. The problem 1|ma,tpdde|Cmax can be solved by Algorithm 1 in O(n4) time.
Proof. Steps 1 and 3 need O(nlogn) time respectively. For each k (k=1,2,…,n−1), the running time for solving each assignment problem needs O(n3) time. Step 4 needs O(n) time. Hence, the overall time complexity of Algorithm 1 is O(n4) time.
Example 1. Consider a 6-job problem 1|ma,tpdde|Cmax, where a1=3,a2=4,a3=5,a4=8,a5=9,a6=7, θ1=0.7, θ2=0.6, θ3=0.7, θ4=0.8, θ5=0.6, θ6=0.9, ˜t=1, b=0.15, c=0.3, and D=3.
Solution:
For k=0, from Eqs (7) and (8), we have Δ1=2.7453, Δ2=2.8530, Δ3=2.6660, Δ4=2.3680, Δ5=2.0368, Δ6=1.7118, and E=5.1571. The local optimal job sequence is φ={J2→J1→J3→J5→J6→J4}, and Cmax(0)=63.6427.
For k=1, from Eqs (11) and (12), we have Δ1=1, Δ2=2.1845, Δ3=2.2701, Δ4=2.1214, Δ5=1.8842, Δ6=1.6207, and E=4.6621. The local optimal job sequence is φ={J6→J2→J1→J3→J5→J4}, and Cmax(1)=49.6442.
For k=2, from Eqs (11) and (12), we have Δ1=1.1847, Δ2=1.2311, Δ3=1.7573, Δ4=1.8262, Δ5=1.7065, Δ6=1.5157, and E=4.3832. The local optimal job sequence is φ={J4→J6→J2→J1→J3→J5}, and Cmax(2)=44.6886.
For k=3, from Eqs (11) and (12), we have Δ1=1.4317, Δ2=1.4879, Δ3=1.3904, Δ4=1.4317, Δ5=1.4879, Δ6=1.3904, and E=4.2930. The local optimal job sequence is φ={J3→J1→J6→J5→J2→J4}, and Cmax(3)=45.8487.
For k=4, from Eqs (11) and (12), we have Δ1=1.7573, Δ2=1.8262, Δ3=1.7065, Δ4=1.5157, Δ5=1.1847, Δ6=1.2311, and E=4.3832. The local optimal job sequence is φ={J2→J1→J3→J6→J4→J5}, and Cmax(4)=50.2634.
For k=5, from Eqs (11) and (12), we have Δ1=2.1845, Δ2=2.2701, Δ3=2.1214, Δ4=1.8842, Δ5=1.6207, Δ6=1, and E=4.6621. The local optimal job sequence is φ={J2→J1→J3→J6→J4→J5}, and Cmax(5)=62.3724.
For k=6, from Eqs (15) and (16), we have Δ1=2.7453, Δ2=2.8530, Δ3=2.6660, Δ4=2.3680, Δ5=2.0368, Δ6=1.7118, and E=5.1571. The local optimal job sequence is φ={J2→J1→J3→J6→J4→J5}, and Cmax(6)=86.3039.
From above analysis, the optimal value is k=2, the optimal job sequence is φ∗={J4→J6→J2→J1→J3→J5}, and the optimal value is C∗max=44.6886.
We studied the single-machine problem with tpdde and ma, where the objective function is to minimize the makespan. It is showed that the problem 1|ma,tpdde|Cmax can be solved in O(n4) time. Future research may focus on the problems with general time-and-position dependent deteriorating effects p[j]={(a[j]+b[j]s[j])jc,if j≤k,(θ[j]a[j]+b[j](s[j]−C[k]−D))(j−k)c,if j>k. Another possible challenging is to consider the problems under parallel machines. The model assumptions can also be extended to for several special cases of processing set restrictions like as Scenario-Dependent Component Processing Times or Release Dates (see Wu et al. [31]; Wu et al. [32]; Wu et al. [33]).
This research was supported by the National Natural Science Regional Foundation of China (71861031 and 72061029).
The authors declare that they have no conflicts of interest.
[1] |
M. Bouchaala, C. Ghazel, L. A. Saidane, Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card, J. Supercomput., 78 (2022), 497–522. https://doi.org/10.1007/s11227-021-03857-7 doi: 10.1007/s11227-021-03857-7
![]() |
[2] |
S. Gao, R. Wu, X. Wang, J. Liu, Q. Li, C. Wang, et al., Asynchronous updating Boolean network encryption algorithm, IEEE Trans. Circuits Syst. Video Technol., 33 (2023), 4388–4400. https://doi.org/10.1109/TCSVT.2023.3237136 doi: 10.1109/TCSVT.2023.3237136
![]() |
[3] |
L. Yuan, S. Zheng, Z. Alam, Dynamics analysis and cryptographic application of fractional logistic map, Nonlinear Dyn., 202 (2019), 615–636. https://doi.org/10.1007/s11071-019-04810-3 doi: 10.1007/s11071-019-04810-3
![]() |
[4] | S. Gao, R. Wu, X. Wang, J. Liu, Q. Li, C. Wang, et al., A 3D model encryption scheme based on a cascaded chaotic system, Signal Process., 202 (2023), 108745. https://doi.org/j.sigpro.2022.108745 |
[5] |
D. Park, S. Hong, N. S. Chang, S. Cho, Efficient implementation of modular multiplication over 192-bit NIST prime for 8-bit AVR-based sensor node, J. Supercomput., 77 (2021), 4852–4870. https://doi.org/10.1007/s11227-020-03441-5 doi: 10.1007/s11227-020-03441-5
![]() |
[6] |
S. Gao, R. Wu, X. Wang, J. Liu, Q. Li, C. Wang, et al., EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory, Inf. Sci., 621 (2023), 766–781. https://doi.org/10.1016/j.ins.2022.11.121 doi: 10.1016/j.ins.2022.11.121
![]() |
[7] |
R. Wu, S. Gao, X. Wang, J. Liu, Q. Li, C. Wang, et al., AEA-NCS: An audio encryption algorithm based on a nested chaotic system, Chaos Soliton. Fract., 165 (2022), 112770. https://doi.org/10.1016/j.chaos.2022.112770 doi: 10.1016/j.chaos.2022.112770
![]() |
[8] |
W. Diffie, M. E. Hellman, Special feature exhaustive cryptanalysis of the NBS data encryption standard, Computer, 10 (1977), 74–84. https://doi.org/10.1109/C-M.1977.217750 doi: 10.1109/C-M.1977.217750
![]() |
[9] |
M. Monger, The RC6 algorithm is a block cipher that was one of the finalists in the Advanced Encryption Standard (AES) competition sponsored by the National Secu, J. Radiat. Res., 56 (2015), 248–260. https://doi.org/10.1109/IAdCC.2013.6514287 doi: 10.1109/IAdCC.2013.6514287
![]() |
[10] |
M. Robert, On the derivation of a "chaotic" encryption algorithm, Cryptologia, 13 (1989), 29–42. https://doi.org/10.1080/0161-118991863745 doi: 10.1080/0161-118991863745
![]() |
[11] | H. Asadollahi, M. S. Kamarposhti, E. M. Jandaghi, Image encryption using cellular automata and arnold cat's map, Australian J. Basic Appl. Sci., 5 (2011), 587–593. |
[12] |
X. Huang, Image encryption algorithm using chaotic Chebyshev generator, Nonlinear Dyn., 67 (2012), 2411–2417. https://doi.org/10.1007/s11071-011-0155-7 doi: 10.1007/s11071-011-0155-7
![]() |
[13] |
X. Wang, L. Liu, Y. Zhang, A novel chaotic block image encryption algorithm based on dynamic random growth technique, Opt. Lasers Eng., 66 (2015), 10–18. https://doi.org/10.1016/j.optlaseng.2014.08.005 doi: 10.1016/j.optlaseng.2014.08.005
![]() |
[14] |
A. Akhshani, A. Akhavan, S. C. Lim, Z. Hassan, An image encryption scheme based on quantum logistic map, Commun. Nonlinear Sci. Numer. Simul., 17 (2012), 4653–4661. https://doi.org/10.1016/j.cnsns.2012.05.033 doi: 10.1016/j.cnsns.2012.05.033
![]() |
[15] |
Y. Guo, J. Yang, B. Liu, Application of chaotic encryption algorithm based on variable parameters in RFID security, EURASIP J. Wirel. Commun. Netw., 2021 (2021), 1–. https://doi.org/10.1186/s13638-021-02023-0 doi: 10.1186/s13638-021-02023-0
![]() |
[16] |
F. Pichler, J. Scharinger, Finite dimensional generalized baker dynamical systems for cryptographic applications, Int. Conf. Comput. Aided Syst. Theor., 1030 (2005), 465–476. https://doi.org/10.1007/BFb0034782 doi: 10.1007/BFb0034782
![]() |
[17] |
G. Ye, K. W. Wong, An efficient chaotic image encryption algorithm based on a generalized Arnold map, Nonlinear Dyn., 69 (2012), 2079–2087. https://doi.org/10.1007/s11071-012-0409-z doi: 10.1007/s11071-012-0409-z
![]() |
[18] |
F. Sun, S. Liu, Z. Li, Q. Zhong, Z. Lü, A novel image encryption scheme based on spatial chaos map, Chaos Soliton. Fract., 38 (2008), 631–640. https://doi.org/10.1016/j.chaos.2008.01.028 doi: 10.1016/j.chaos.2008.01.028
![]() |
[19] |
F. Sun, Z. Lü, S. Liu, A new cryptosystem based on spatial chaotic system, Opt. Commun., 283 (2010), 2066–2073. https://doi.org/10.1016/J.OPTCOM.2010.01.028 doi: 10.1016/J.OPTCOM.2010.01.028
![]() |
[20] |
H. Liu, X. Wang, Color image encryption using spatial bit-level permutation and high-dimension chaotic system, Opt. Commun., 284 (2011), 3895–3903. https://doi.org/10.1016/j.optcom.2011.04.001 doi: 10.1016/j.optcom.2011.04.001
![]() |
[21] |
Z. Zhu, W. Zhang, K. W. Wong, H. Yu, A chaos-based symmetric image encryption scheme using a bit-level permutation, Inf. Sci., 181 (2011), 1171–1186. https://doi.org/10.1016/j.ins.2010.11.009 doi: 10.1016/j.ins.2010.11.009
![]() |
[22] |
P. Manjunath, K. L. Sudha, Chaos image encryption using pixel shuffling, CCSEA, 1 (2011), 169–179. https://doi.org/10.5121/csit.2011.1217 doi: 10.5121/csit.2011.1217
![]() |
[23] | Y. Jiang, B. Li, A novel image encryption algorithm based on logistic and henon map, 2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2016, 66–69. https://doi.org/10.1109/ICCWAMTIP.2016.8079806 |
[24] |
G. Chen, Y. Mao, C. K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos Soliton. Fract., 21 (2004), 749-761. https://doi.org/10.1016/j.chaos.2003.12.022 doi: 10.1016/j.chaos.2003.12.022
![]() |
[25] |
Y. Luo, M. Du, A Novel Digital Image Encryption Scheme Based on Spatial-chaos, J. Convergence Inf. Technol., 7 (2012), 199–207. https://doi.org/10.1016/j.chaos.2008.01.028 doi: 10.1016/j.chaos.2008.01.028
![]() |
[26] |
C. Li, Y. Liu, L. Y. Zhang, M. Chen, Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation, Int. J. Bifurcat. Chaos, 23 (2003), 1350075–1350087. https://doi.org/10.1142/S0218127413500752 doi: 10.1142/S0218127413500752
![]() |
[27] |
C. Gangadhar, K. D. Rao, HYPERCHAOS BASED IMAGE ENCRYPTION, Int. J. Bifurcat. Chaos, 19 (2009), 3833–3839. https://doi.org/10.1142/S021812740902516X doi: 10.1142/S021812740902516X
![]() |
[28] |
Q. Zhang, X. Xue, X. Wei, A novel image encryption algorithm based on DNA subsequence operation, Sci. World J., 2012 (2012), 286741–286751. https://doi.org/10.1100/2012/286741 doi: 10.1100/2012/286741
![]() |
[29] |
S. Lian, J. Sun, Z. Wang, A block cipher based on a suitable use of the chaotic standard map, Chaos Soliton. Fract., 26 (2005), 117–129. https://doi.org/10.1016/j.chaos.2004.11.096 doi: 10.1016/j.chaos.2004.11.096
![]() |
[30] |
H. Mkaouar, O. Boubaker, Chaos synchronization for master slave piecewise linear systems: Application to Chua's circuit, Commun. Nonlinear Sci. Numer. Simul., 17 (2012), 1292–1302. https://doi.org/10.1016/j.cnsns.2011.07.027 doi: 10.1016/j.cnsns.2011.07.027
![]() |
[31] |
L. Chen, H. Yin, T. Huang, L. Yuan, S. Zheng, L. Yin, Chaos in fractional-order discrete neural networks with application to image encryption, Neural Netw., 125 (2020), 174–184. https://doi.org/10.1016/j.neunet.2020.02.008 doi: 10.1016/j.neunet.2020.02.008
![]() |
[32] | C. Liu, L. Tao, L. Ling, L. Kai, A new chaotic attractor, Chaos Soliton. Fract., 22 (2004), 1031–1038. https://doi.org/10.1016/j.chaos.2004.02.060 |
[33] |
Y. Yu, S. Zhang, Hopf bifurcation in the Lü system, Commun. Nonlinear Sci. Numer. Simul., 17 (2003), 901–906. https://doi.org/10.1016/S0960-0779(02)00573-8 doi: 10.1016/S0960-0779(02)00573-8
![]() |
[34] |
X. Hu, A. Pratap, Z. Zhang, A. Wan, Hopf bifurcation and global exponential stability of an epidemiological smoking model with time delay, Alex. Eng. J., 61 (2022), 2096–2104. https://doi.org/10.1016/j.aej.2021.08.001 doi: 10.1016/j.aej.2021.08.001
![]() |
[35] |
G. Qi, G. Chen, S. Du, Z. Chen, Z. Yuan, Analysis of a new chaotic system, Physica A, 352 (2005), 295–308. https://doi.org/10.1016/J.PHYSA.2004.12.040 doi: 10.1016/J.PHYSA.2004.12.040
![]() |
[36] |
S. N. Chow, J. Mallet-Paret, The Fuller index and global Hopf bifurcation, J. Differ. Equ., 29 (1978), 66–85. https://doi.org/10.1016/0022-0396(78)90041-4 doi: 10.1016/0022-0396(78)90041-4
![]() |
[37] |
X. Huang, Image encryption algorithm using chaotic Chebyshev generator, Nonlinear Dyn., 67 (2012), 2411–2417. https://doi.org/10.1007/s11071-011-0155-7 doi: 10.1007/s11071-011-0155-7
![]() |
[38] |
L. Teng, X. Wang, A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive, Opt. Commun., 285 (2012), 4048–4054. https://doi.org/10.1016/j.optcom.2012.06.004 doi: 10.1016/j.optcom.2012.06.004
![]() |
[39] |
Z. Parvin, H. Seyedarabi, M. Shamsi, A new secure and sensitive image encryption scheme based on new substitution with chaotic function, Multimed. Tools. Appl., 75 (2014), 10631–10648. https://doi.org/10.1007/s11042-014-2115-y doi: 10.1007/s11042-014-2115-y
![]() |
1. | Wei Wu, Dan-Yang Lv, Ji-Bo Wang, Two Due-Date Assignment Scheduling with Location-Dependent Weights and a Deteriorating Maintenance Activity, 2023, 11, 2079-8954, 150, 10.3390/systems11030150 | |
2. | Eghonghon-Aye Eigbe, Bart De Schutter, Mitra Nasri, Neil Yorke-Smith, Sequence- and Time-Dependent Maintenance Scheduling in Twice Re-Entrant Flow Shops, 2023, 11, 2169-3536, 103461, 10.1109/ACCESS.2023.3317533 | |
3. | Rong-Rong Mao, Dan-Yang Lv, Na Ren, Ji-Bo Wang, Supply chain scheduling with deteriorating jobs and delivery times, 2024, 70, 1598-5865, 2285, 10.1007/s12190-024-02052-0 |