期刊文献+

动态商拓扑模型及其在路径查找中的应用 被引量:1

Dynamic Quotient Topology Model and Its Application to Optimal Path Finding
下载PDF
导出
摘要 为解决动态环境下的问题求解,针对拓扑结构随时间变化的情况,文中借鉴社会学中的信任模型扩展传统的商空间理论,利用贝叶斯方法评估节点的可信度,提出一种基于信任机制的动态商拓扑模型.将该模型应用于最佳路径查找.仿真结果证实,该模型能以较小的时间花费为代价,有效提高路径可靠性,实现动态问题求解. To settle the problem solving under dynamic conditions, according to the fact that the topological structure changes with time, the traditional theory of quotient space is extended by using the trust model in sociology for reference. Based on the creditability evaluation of nodes by Bayesian model, a kind of dynamic quotient topology model based on the trust mechanism is proposed, and then this model is applied to optimal path finding. Theoretical analysis and simulation results prove that the proposed model can efficiently enhance the path reliability and meet the requirement of dynamic problem solving with fewer time costs.
作者 齐平 李龙澍
出处 《模式识别与人工智能》 EI CSCD 北大核心 2014年第4期337-344,共8页 Pattern Recognition and Artificial Intelligence
基金 国家自然科学基金项目(No.60273043) 安徽省科技攻关计划重大科技专项项目(No.08010201002) 安徽高等学校省级自然科学基金项目(No.KJ2011Z020)资助
关键词 动态商拓扑模型 贝叶斯方法 可信度评估 最佳路径查找 Dynamic Quotient Topology Model Bayesian Method Creditability Evaluation Optimal Path Finding
  • 相关文献

参考文献14

  • 1Zhang B, Zhang L. Theory and Applications of Problem Solving. Amsterdam, the Netherlands: Elsevier, 1992.
  • 2Zhang L, Zhang B. The Quotient Space Theory of Problem Solving. Fundamenta Informaticae, 2004, 59 (2/3) : 287-298.
  • 3张铃,张钹.模糊商空间理论(模糊粒度计算方法)[J].软件学报,2003,14(4):770-776. 被引量:206
  • 4张燕平,张铃,吴涛.不同粒度世界的描述法——商空间法[J].计算机学报,2004,27(3):328-333. 被引量:80
  • 5Zhang L, He F Z, Zhang Y P, et al. A New Algorithm for Optimal Path Finding in Complex Networks Based on the Quotient Space.Fundamenta Informaticae, 2009, 93 (4) : 459-469.
  • 6He F G, Zhang Y P, Zhao S, et al. Computing the Point-to-Point Shortest Path: Quotient Space Theory's Application in Complex Net- work// Proc of the 5th International Conference on Rough Set and Knowledge Technology. Beijing, China, 2010:751-758.
  • 7Zhang Y P, Xu X S, Hua B, et al. Contracting Community for Computing Maximum Flow//Proc of the IEEE International Confer- ence on Granular Computing. Hangzhou, China, 2012 : 773-778.
  • 8陈洁,张燕平,赵姝.一种结构化描述方法:保序性与或图[J].南京大学学报(自然科学版),2013,49(2):235-243. 被引量:3
  • 9张铃,张钹.动态商空间模型及其基本性质[J].模式识别与人工智能,2012,25(2):181-185. 被引量:5
  • 10Wang W, Zeng G S, Tang D Z, et al. Dynamic Trusted Schedu- ling for Cloud Computing. Expert Systems with Applications, 2012, 39(3): 2321-2329.

二级参考文献41

  • 1柯长青,欧阳晓莹.基于元胞自动机模型的城市空间变化模拟研究进展[J].南京大学学报(自然科学版),2006,42(1):103-110. 被引量:23
  • 2祁红志,徐惠益.机电产品面向拆卸与回收的设计理论与方法[J].现代制造工程,2007(6):134-138. 被引量:16
  • 3Weidl A L,Madsen S I.Applications of object-oriented Bayesian net works for condition monitoring root cause analysis and decision support on opera tion of complex continuous processes[J].Computers and Chemical Engineering,20 05,29(9):1996-2009.
  • 4Jenelius E,Petersen T,Mattsson L G.Importance and exp osure in road network vulnerability analysis[J].Transportation Research Part A,2006,40(7):537-560.
  • 5Berdica K.An introduction to road vulnerability:What has been done,is done and should be done[J].Transport Policy,2002,9(2):117-127.
  • 6Chen A,Yang C,Kongsomsaksakul S,et al.Network-based accessibility measures for vulnerability analysis of degradable transportation networks[J].Networks and Spatial Economics,2007,7(3):241-256.
  • 7Taylor M A P,D'Este G M.Transport network vulnerability:A m ethod for diagnosis of critical locations in transport infrastructure systems[M].In Critical infrastructure:Reliability and vulnerability,ed.Murray A T a nd Grubesic T H.New York:Springer,2007.
  • 8D'Este G M,Taylor M A P.Network vulnerability:an approach t o reliabili ty analysis at the level of national strategic transport networks[C] //In Bell M G H,Iida Y,The Network Reliability of Transport.Proceedings of the 1st Int ernational Symposium on Transportation Network Reliability (INSTR).Pergamon,Ox ford,England,2003,23-44.
  • 9Husdal J.The vulnerability of road networks in a cost-benefit perspective[C] //Proceedings of the Transportation Research Board Annual Meetin g,Washington DC,USA,2005:1-17.
  • 10Bell M G H,Kanturska U,Schmcker J D,et al.Attacker-defender models and road network vulnerability[J].Philosophical Transactions of the R oyal Society A-Mathematical Physical and Engineering Sciences,2008,366(1872):1893-1906.

共引文献268

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部