期刊文献+
共找到368,079篇文章
< 1 2 250 >
每页显示 20 50 100
Fault current Characterization Based on Fuzzy Algorithm for DOCR Application
1
作者 Luly Susilo J. C. Gu S. K. Huang 《Energy and Power Engineering》 2013年第4期932-936,共5页
Penetration of distribution generation (DG) into power system might disturb the existing fault diagnosis system. The detection of fault, fault classification, and random changes of direction of fault current cannot al... Penetration of distribution generation (DG) into power system might disturb the existing fault diagnosis system. The detection of fault, fault classification, and random changes of direction of fault current cannot always be monitored and determined via on-line by conventional fault diagnosis system due to DG penetration. In this paper, a fault current characterization which based on fuzzy logic algorithm (FLA) is proposed. Fault detection, fault classification, and fault current direction are extracted after processing the measurement result of three-phase line current. The ability of fault current characterization based on FLA is reflected in directional overcurrent relay (DOCR) model. The proposed DOCR model has been validated in microgrid test system simulation in Matlab environment. The simulation result showed accurate result for different fault location and type. The proposed DOCR model can operate as common protection device (PD) unit as well as unit to improve the effectiveness of existing fault diagnosis system when DG is present. 展开更多
关键词 FAULT CURRENT CHARACTERIZATION fuzzy LOGIC algorithm DOCR Distributed GENERATION
下载PDF
Optimization Algorithms of PERT/CPM Network Diagrams in Linear Diophantine Fuzzy Environment
2
作者 Mani Parimala Karthikeyan Prakash +2 位作者 Ashraf Al-Quran Muhammad Riaz Saeid Jafari 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期1095-1118,共24页
The idea of linear Diophantine fuzzy set(LDFS)theory with its control parameters is a strong model for machine learning and optimization under uncertainty.The activity times in the critical path method(CPM)representat... The idea of linear Diophantine fuzzy set(LDFS)theory with its control parameters is a strong model for machine learning and optimization under uncertainty.The activity times in the critical path method(CPM)representation procedures approach are initially static,but in the Project Evaluation and Review Technique(PERT)approach,they are probabilistic.This study proposes a novel way of project review and assessment methodology for a project network in a linear Diophantine fuzzy(LDF)environment.The LDF expected task time,LDF variance,LDF critical path,and LDF total expected time for determining the project network are all computed using LDF numbers as the time of each activity in the project network.The primary premise of the LDF-PERT approach is to address ambiguities in project network activity timesmore simply than other approaches such as conventional PERT,Fuzzy PERT,and so on.The LDF-PERT is an efficient approach to analyzing symmetries in fuzzy control systems to seek an optimal decision.We also present a new approach for locating LDF-CPM in a project network with uncertain and erroneous activity timings.When the available resources and activity times are imprecise and unpredictable,this strategy can help decision-makers make better judgments in a project.A comparison analysis of the proposed technique with the existing techniques has also been discussed.The suggested techniques are demonstrated with two suitable numerical examples. 展开更多
关键词 Linear Diophantine fuzzy graphs project management PERT CPM linear Diophantine fuzzy numbers score function accuracy function
下载PDF
Adaptive Fuzzy Sliding Mode Controller for Grid Interface Ocean Wave Energy Conversion
3
作者 Adel A. A. Elgammal 《Journal of Intelligent Learning Systems and Applications》 2014年第2期53-69,共17页
This paper presents a closed-loop vector control structure based on adaptive Fuzzy Logic Sliding Mode Controller (FL-SMC) for a grid-connected Wave Energy Conversion System (WECS) driven Self-Excited Induction Generat... This paper presents a closed-loop vector control structure based on adaptive Fuzzy Logic Sliding Mode Controller (FL-SMC) for a grid-connected Wave Energy Conversion System (WECS) driven Self-Excited Induction Generator (SEIG). The aim of the developed control method is to automatically tune and optimize the scaling factors and the membership functions of the Fuzzy Logic Controllers (FLC) using Multi-Objective Genetic Algorithms (MOGA) and Multi-Objective Particle Swarm Optimization (MOPSO). Two Pulse Width Modulated voltage source PWM converters with a carrier-based Sinusoidal PWM modulation for both Generator- and Grid-side converters have been connected back to back between the generator terminals and utility grid via common DC link. The indirect vector control scheme is implemented to maintain balance between generated power and power supplied to the grid and maintain the terminal voltage of the generator and the DC bus voltage constant for variable rotor speed and load. Simulation study has been carried out using the MATLAB/Simulink environment to verify the robustness of the power electronics converters and the effectiveness of proposed control method under steady state and transient conditions and also machine parameters mismatches. The proposed control scheme has improved the voltage regulation and the transient performance of the wave energy scheme over a wide range of operating conditions. 展开更多
关键词 GRID integration Wave Energy Conversion Systems Self-Excited Induction Generator (SEIG) Vector CONTROL Genetic algorithm (GA) Particle SWARM Optimization (PSO) SLIDING Mode CONTROL (SMC) fuzzy Logic CONTROL (FLC) MEMBERSHIP Function Tuning
下载PDF
Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss
4
作者 Thanh-Lam Nguyen HaoKao +2 位作者 Thanh-Tuan Nguyen Mong-Fong Horng Chin-Shiuh Shieh 《Computers, Materials & Continua》 SCIE EI 2024年第2期2181-2205,共25页
Since its inception,the Internet has been rapidly evolving.With the advancement of science and technology and the explosive growth of the population,the demand for the Internet has been on the rise.Many applications i... Since its inception,the Internet has been rapidly evolving.With the advancement of science and technology and the explosive growth of the population,the demand for the Internet has been on the rise.Many applications in education,healthcare,entertainment,science,and more are being increasingly deployed based on the internet.Concurrently,malicious threats on the internet are on the rise as well.Distributed Denial of Service(DDoS)attacks are among the most common and dangerous threats on the internet today.The scale and complexity of DDoS attacks are constantly growing.Intrusion Detection Systems(IDS)have been deployed and have demonstrated their effectiveness in defense against those threats.In addition,the research of Machine Learning(ML)and Deep Learning(DL)in IDS has gained effective results and significant attention.However,one of the challenges when applying ML and DL techniques in intrusion detection is the identification of unknown attacks.These attacks,which are not encountered during the system’s training,can lead to misclassification with significant errors.In this research,we focused on addressing the issue of Unknown Attack Detection,combining two methods:Spatial Location Constraint Prototype Loss(SLCPL)and Fuzzy C-Means(FCM).With the proposed method,we achieved promising results compared to traditional methods.The proposed method demonstrates a very high accuracy of up to 99.8%with a low false positive rate for known attacks on the Intrusion Detection Evaluation Dataset(CICIDS2017)dataset.Particularly,the accuracy is also very high,reaching 99.7%,and the precision goes up to 99.9%for unknown DDoS attacks on the DDoS Evaluation Dataset(CICDDoS2019)dataset.The success of the proposed method is due to the combination of SLCPL,an advanced Open-Set Recognition(OSR)technique,and FCM,a traditional yet highly applicable clustering technique.This has yielded a novel method in the field of unknown attack detection.This further expands the trend of applying DL and ML techniques in the development of intrusion detection systems and cybersecurity.Finally,implementing the proposed method in real-world systems can enhance the security capabilities against increasingly complex threats on computer networks. 展开更多
关键词 CYBERSECURITY DDoS unknown attack detection machine learning deep learning incremental learning convolutional neural networks(CNN) open-set recognition(OSR) spatial location constraint prototype loss fuzzy c-means CICIDS2017 CICDDoS2019
下载PDF
Proportion Integration Differentiation(PID)Control Strategy of Belt Sander Based on Fuzzy Algorithm
5
作者 陈坤 张亚伟 +1 位作者 张振 桂志伟 《Journal of Donghua University(English Edition)》 CAS 2023年第2期177-184,共8页
Aiming at solving the problems of response lag and lack of precision and stability in constant grinding force control of industrial robot belts,a constant force control strategy combining fuzzy control and proportion ... Aiming at solving the problems of response lag and lack of precision and stability in constant grinding force control of industrial robot belts,a constant force control strategy combining fuzzy control and proportion integration differentiation(PID)was proposed by analyzing the signal transmission process and the dynamic characteristics of the grinding mechanism.The simulation results showed that compared with the classical PID control strategy,the system adjustment time was shortened by 98.7%,the overshoot was reduced by 5.1%,and the control error was 0.2%-0.5%when the system was stabilized.The optimized fuzzy control system had fast adjustment speeds,precise force control and stability.The experimental analysis of the surface morphology of the machined blade was carried out by the industrial robot abrasive grinding mechanism,and the correctness of the theoretical analysis and the effectiveness of the control strategy were verified. 展开更多
关键词 grinding mechanism constant force control strategy fuzzy control proportion integration differentiation(PID)
下载PDF
Probabilistic Fuzzy Approach to Assess RDS Vulnerability and Plan Corrective Action Using Feeder Reconfiguration 被引量:2
6
作者 Mini S Thomas Rakesh Ranjan Roma Raina 《Energy and Power Engineering》 2012年第5期330-338,共9页
Two common problems for a typical Power distribution system are voltage collapse & instability. Challenge is to identify the vulnerable nodes and apply the effective corrective actions. This paper presents a proba... Two common problems for a typical Power distribution system are voltage collapse & instability. Challenge is to identify the vulnerable nodes and apply the effective corrective actions. This paper presents a probabilistic fuzzy approach to assess the node status and proposes feeder reconfiguration as a method to address the same. Feeder reconfiguration is altering the topological structures of distribution feeders by changing the open/closed states of the sectionalizing and ties switches. The solution is converge using a probabilistic fuzzy modeled solution, which defines the nodal vulnerability index (VI) as a function of node voltage and node voltage stability index and predicts nodes critical to voltage collapse. The information is further used to plan best combination of feeders from each loop in distribution system to be switched out such that the resulting configuration gives the optimal performance i.e. best voltage profile and minimal kW losses. The proposed method is tested on established radial distribution system and results are presented. 展开更多
关键词 Branch VOLTAGE Three Phase Load Flow VOLTAGE Stability INDEX (SI) Radial Distribution System (RDS) Monte Carlo Probability Distributions fuzzy Set Node VULNERABILITY Index(VI) FEEDER Reconfiguration
下载PDF
A Decision Support System for Selection of Solar Power Plant Locations by Applying Fuzzy AHP and TOPSIS: An Empirical Study 被引量:1
7
作者 Athakorn Kengpol Piya Rontlaong Markku Tuominen 《Journal of Software Engineering and Applications》 2013年第9期470-481,共12页
The objective of this research is to propose a decision support system for avoiding flood on solar power plant site selection. Methodologically, the geographic information system (GIS) is used to determine the optimum... The objective of this research is to propose a decision support system for avoiding flood on solar power plant site selection. Methodologically, the geographic information system (GIS) is used to determine the optimum site for a solar power plant. It is intended to integrate the qualitative and quantitative variables based upon the adoption of the Fuzzy Analytic Hierarchy Process (Fuzzy AHP) and the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) model. These methods are employed to unite the environmental aspects and social needs for electrical power systematically. Regarding a case study of the choice of a solar power plant site in Thailand, it demonstrates that the quantitative and qualitative criteria should be realized prior to analysis in the Fuzzy AHP-TOPSIS model. The fuzzy AHP is employed to determine the weights of qualitative and quantitative criteria that can affect the selection process. The adoption of the fuzzy AHP is aimed to model the linguistic unclear, ambiguous, and incomplete knowledge. Additionally, TOPSIS, which is a ranking multi-criteria decision making method, is employed to rank the alternative sites based upon overall efficiency. The contribution of this paper lies in the evolution of a new approach that is flexible and practical to the decision maker, in providing the guidelines for the solar power plant site choices under stakeholder needs: at the same time, the desirable functions are achieved, in avoiding flood, reducing cost, time and causing less environmental impact. The new approach is assessed in the empirical study during major flooding in Thailand during the fourth quarter of 2011 to 2012. The result analysis and sensitivity analysis are also presented. 展开更多
关键词 Solar Power Plant Site SELECTION Decision Support System fuzzy ANALYTIC HIERARCHY Process (FAHP) Technique for Order PREFERENCE by Similarity to Ideal Solution (TOPSIS)
下载PDF
Harnessing the Power of Artificial Intelligence in Neuromuscular Disease Rehabilitation: A Comprehensive Review and Algorithmic Approach
8
作者 Rocco de Filippis Abdullah Al Foysal 《Advances in Bioscience and Biotechnology》 CAS 2024年第5期289-309,共21页
Neuromuscular diseases present profound challenges to individuals and healthcare systems worldwide, profoundly impacting motor functions. This research provides a comprehensive exploration of how artificial intelligen... Neuromuscular diseases present profound challenges to individuals and healthcare systems worldwide, profoundly impacting motor functions. This research provides a comprehensive exploration of how artificial intelligence (AI) technology is revolutionizing rehabilitation for individuals with neuromuscular disorders. Through an extensive review, this paper elucidates a wide array of AI-driven interventions spanning robotic-assisted therapy, virtual reality rehabilitation, and intricately tailored machine learning algorithms. The aim is to delve into the nuanced applications of AI, unlocking its transformative potential in optimizing personalized treatment plans for those grappling with the complexities of neuromuscular diseases. By examining the multifaceted intersection of AI and rehabilitation, this paper not only contributes to our understanding of cutting-edge advancements but also envisions a future where technological innovations play a pivotal role in alleviating the challenges posed by neuromuscular diseases. From employing neural-fuzzy adaptive controllers for precise trajectory tracking amidst uncertainties to utilizing machine learning algorithms for recognizing patient motor intentions and adapting training accordingly, this research encompasses a holistic approach towards harnessing AI for enhanced rehabilitation outcomes. By embracing the synergy between AI and rehabilitation, we pave the way for a future where individuals with neuromuscular disorders can access tailored, effective, and technologically-driven interventions to improve their quality of life and functional independence. 展开更多
关键词 Neuromuscular Diseases REHABILITATION Artificial Intelligence Machine Learning Robotic-Assisted Therapy Virtual Reality Personalized Treatment Motor Function Assistive Technologies algorithmic Rehabilitation
下载PDF
Development of a Post Quantum Encryption Key Generation Algorithm Using Electromagnetic Wave Propagation Theory
9
作者 Vincent Mbonigaba Fulgence Nahayo +1 位作者 Octave Moutsinga Okalas-Ossami Dieudonné 《Journal of Information Security》 2024年第1期53-62,共10页
In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has beco... In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys. 展开更多
关键词 Key Wave ELECTROMAGNETIC CRYPTOGRAPHY POST Quantum Network Protocol PROPAGATION algorithm
下载PDF
Deep Transfers of p-Class Tower Groups
10
作者 Daniel C. Mayer 《Journal of Applied Mathematics and Physics》 2018年第1期36-50,共15页
Let p be a prime. For any finite p-group G, the deep transfers T H,G ' : H / H ' → G ' / G " from the maximal subgroups H of index (G:H) = p in G to the derived subgroup G ' are introduced as an ... Let p be a prime. For any finite p-group G, the deep transfers T H,G ' : H / H ' → G ' / G " from the maximal subgroups H of index (G:H) = p in G to the derived subgroup G ' are introduced as an innovative tool for identifying G uniquely by means of the family of kernels ùd(G) =(ker(T H,G ')) (G: H) = p. For all finite 3-groups G of coclass cc(G) = 1, the family ùd(G) is determined explicitly. The results are applied to the Galois groups G =Gal(F3 (∞)/ F) of the Hilbert 3-class towers of all real quadratic fields F = Q(√d) with fundamental discriminants d > 1, 3-class group Cl3(F) □ C3 × C3, and total 3-principalization in each of their four unramified cyclic cubic extensions E/F. A systematic statistical evaluation is given for the complete range 1 d 7, and a few exceptional cases are pointed out for 1 d 8. 展开更多
关键词 Hilbert p-Class Field Towers p-Class GROUPS p-Principalization Quadratic FIELDS Dihedral FIELDS of Degree 2p Finite p-Groups Two-Step Centralizers Polarization PRINCIPLE Descendant Trees p-Group Generation algorithm p-Multiplicator RANK Relation RANK Generator RANK Deep Transfers Shallow Transfers Partial Order and Monotony PRINCIPLE of Artin Patterns Parametrized Polycyclic pc-Presentations Commutator Calculus
下载PDF
A Study of EM Algorithm as an Imputation Method: A Model-Based Simulation Study with Application to a Synthetic Compositional Data
11
作者 Yisa Adeniyi Abolade Yichuan Zhao 《Open Journal of Modelling and Simulation》 2024年第2期33-42,共10页
Compositional data, such as relative information, is a crucial aspect of machine learning and other related fields. It is typically recorded as closed data or sums to a constant, like 100%. The statistical linear mode... Compositional data, such as relative information, is a crucial aspect of machine learning and other related fields. It is typically recorded as closed data or sums to a constant, like 100%. The statistical linear model is the most used technique for identifying hidden relationships between underlying random variables of interest. However, data quality is a significant challenge in machine learning, especially when missing data is present. The linear regression model is a commonly used statistical modeling technique used in various applications to find relationships between variables of interest. When estimating linear regression parameters which are useful for things like future prediction and partial effects analysis of independent variables, maximum likelihood estimation (MLE) is the method of choice. However, many datasets contain missing observations, which can lead to costly and time-consuming data recovery. To address this issue, the expectation-maximization (EM) algorithm has been suggested as a solution for situations including missing data. The EM algorithm repeatedly finds the best estimates of parameters in statistical models that depend on variables or data that have not been observed. This is called maximum likelihood or maximum a posteriori (MAP). Using the present estimate as input, the expectation (E) step constructs a log-likelihood function. Finding the parameters that maximize the anticipated log-likelihood, as determined in the E step, is the job of the maximization (M) phase. This study looked at how well the EM algorithm worked on a made-up compositional dataset with missing observations. It used both the robust least square version and ordinary least square regression techniques. The efficacy of the EM algorithm was compared with two alternative imputation techniques, k-Nearest Neighbor (k-NN) and mean imputation (), in terms of Aitchison distances and covariance. 展开更多
关键词 Compositional Data Linear Regression Model Least Square Method Robust Least Square Method Synthetic Data Aitchison Distance Maximum Likelihood Estimation Expectation-Maximization algorithm k-Nearest Neighbor and Mean imputation
下载PDF
New Regularization Algorithms for Solving the Deconvolution Problem in Well Test Data Interpretation 被引量:1
12
作者 Vladimir Vasin Georgy Skorik +1 位作者 Evgeny Pimonov Fikri Kuchuk 《Applied Mathematics》 2010年第5期387-399,共13页
Two new regularization algorithms for solving the first-kind Volterra integral equation, which describes the pressure-rate deconvolution problem in well test data interpretation, are developed in this paper. The main ... Two new regularization algorithms for solving the first-kind Volterra integral equation, which describes the pressure-rate deconvolution problem in well test data interpretation, are developed in this paper. The main features of the problem are the strong nonuniform scale of the solution and large errors (up to 15%) in the input data. In both algorithms, the solution is represented as decomposition on special basic functions, which satisfy given a priori information on solution, and this idea allow us significantly to improve the quality of approximate solution and simplify solving the minimization problem. The theoretical details of the algorithms, as well as the results of numerical experiments for proving robustness of the algorithms, are presented. 展开更多
关键词 DECONVOLUTION PROBLEM VOLTERRA Equations Well Test REGULARIZATION algorithm Quasi-Solutions Method Tikhonov REGULARIZATION A Priori Information Discrete Approximation Non-Quadratic Stabilizing Functional Special Basis
下载PDF
Binary Gravitational Search based Algorithm for Optimum Siting and Sizing of DG and Shunt Capacitors in Radial Distribution Systems
13
作者 N. A. Khan S. Ghosh S. P. Ghoshal 《Energy and Power Engineering》 2013年第4期1005-1010,共6页
This paper presents a binary gravitational search algorithm (BGSA) is applied to solve the problem of optimal allotment of DG sets and Shunt capacitors in radial distribution systems. The problem is formulated as a no... This paper presents a binary gravitational search algorithm (BGSA) is applied to solve the problem of optimal allotment of DG sets and Shunt capacitors in radial distribution systems. The problem is formulated as a nonlinear constrained single-objective optimization problem where the total line loss (TLL) and the total voltage deviations (TVD) are to be minimized separately by incorporating optimal placement of DG units and shunt capacitors with constraints which include limits on voltage, sizes of installed capacitors and DG. This BGSA is applied on the balanced IEEE 10 Bus distribution network and the results are compared with conventional binary particle swarm optimization. 展开更多
关键词 Normal Load Flow Radial Distribution System Distributed Generation SHUNT Capacitors BINARY Particle SWARM Optimization BINARY GRAVITATIONAL SEARCH algorithm TOTAL line Loss TOTAL Voltage Deviation
下载PDF
Fuzzy ARTMAP神经网络在土地覆盖分类中的应用研究 被引量:11
14
作者 韩敏 程磊 唐晓亮 《中国图象图形学报(A辑)》 CSCD 北大核心 2005年第4期415-419,i001,共6页
面对数量激增、包含信息日趋复杂的遥感影像,如何快速有效地自动分类已成为遥感领域亟待解决的问题。以TM影像为实例,探讨了FuzzyARTMAP神经网络在土地覆盖分类方面的应用。在总结FuzzyARTMAP网络警戒系数调整方法的基础上,提出了一种... 面对数量激增、包含信息日趋复杂的遥感影像,如何快速有效地自动分类已成为遥感领域亟待解决的问题。以TM影像为实例,探讨了FuzzyARTMAP神经网络在土地覆盖分类方面的应用。在总结FuzzyARTMAP网络警戒系数调整方法的基础上,提出了一种新的设置和调整警戒系数的方法。实验结果表明,这种新方法可以解决人为选择警戒系数效率低、难以取得合适数值的问题,并能提高网络的收敛速度和分类精度,结合本文所提算法的FuzzyARTMAP神经网络与最大似然法和传统FuzzyARTMAP网络相比较,训练时间缩短,分类精度有所提高。FuzzyARTMAP网络用于土地覆盖分类研究可以获得相对较好的分类结果。 展开更多
关键词 ARTMAP fuzzy ARTMAP TM
下载PDF
Deep Structure Optimization for Incremental Hierarchical Fuzzy Systems Using Improved Differential Evolution Algorithm
15
作者 Yue Zhu Tao Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1139-1158,共20页
The optimization of the rule base of a fuzzy logic system (FLS) based on evolutionary algorithm has achievednotable results. However, due to the diversity of the deep structure in the hierarchical fuzzy system (HFS) a... The optimization of the rule base of a fuzzy logic system (FLS) based on evolutionary algorithm has achievednotable results. However, due to the diversity of the deep structure in the hierarchical fuzzy system (HFS) and thecorrelation of each sub fuzzy system, the uncertainty of the HFS’s deep structure increases. For the HFS, a largenumber of studies mainly use fixed structures, which cannot be selected automatically. To solve this problem, thispaper proposes a novel approach for constructing the incremental HFS. During system design, the deep structureand the rule base of the HFS are encoded separately. Subsequently, the deep structure is adaptively mutated basedon the fitness value, so as to realize the diversity of deep structures while ensuring reasonable competition amongthe structures. Finally, the differential evolution (DE) is used to optimize the deep structure of HFS and theparameters of antecedent and consequent simultaneously. The simulation results confirm the effectiveness of themodel. Specifically, the root mean square errors in the Laser dataset and Friedman dataset are 0.0395 and 0.0725,respectively with rule counts of rules is 8 and 12, respectively.When compared to alternative methods, the resultsindicate that the proposed method offers improvements in accuracy and rule counts. 展开更多
关键词 Hierarchical fuzzy system automatic optimization differential evolution regression problem
下载PDF
基于遗传算法和最小二乘支持向量机的织物剪切性能预测 被引量:2
16
作者 卢桂馥 王勇 +1 位作者 窦易文 Gui-fu Yi-wen 《计量学报》 CSCD 北大核心 2009年第6期-,共4页
提出了一种基于最小二乘支持向量机的织物剪切性能预测模型,并且采用遗传算法进行最小二乘支持向量机的参数优化,将获得的样本进行归一化处理后,将其输入预测模型以得到预测结果.仿真结果表明,基于最小二乘支持向量机的预测模型比BP神... 提出了一种基于最小二乘支持向量机的织物剪切性能预测模型,并且采用遗传算法进行最小二乘支持向量机的参数优化,将获得的样本进行归一化处理后,将其输入预测模型以得到预测结果.仿真结果表明,基于最小二乘支持向量机的预测模型比BP神经网络和线性回归方法具有更高的精度和范化能力. Abstract: A new method is proposed to predict the fabric shearing property with least square support vector machines ( LS-SVM ). The genetic algorithm is investigated to select the parameters of LS-SVM models as a means of improving the LS- SVM prediction. After normalizing the sampling data, the sampling data are inputted into the model to gain the prediction result. The simulation results show the prediction model gives better forecasting accuracy and generalization ability than BP neural network and linear regression method. 展开更多
关键词 SUPPORT VECTOR MACHINES sampling data SUPPORT VECTOR MACHINES generalization ability simulation results linear regression genetic algorithm BP neural network prediction model 线 LS-SVM least square new method
下载PDF
Kabbalah Logic and Semantic Foundations for a Postmodern Fuzzy Set and Fuzzy Logic Theory
17
作者 Gabriel Burstein Constantin Virgil Negoita Menachem Kranz 《Applied Mathematics》 2014年第9期1375-1385,共11页
Despite half a century of fuzzy sets and fuzzy logic progress, as fuzzy sets address complex and uncertain information through the lens of human knowledge and subjectivity, more progress is needed in the semantics of ... Despite half a century of fuzzy sets and fuzzy logic progress, as fuzzy sets address complex and uncertain information through the lens of human knowledge and subjectivity, more progress is needed in the semantics of fuzzy sets and in exploring the multi-modal aspect of fuzzy logic due to the different cognitive, emotional and behavioral angles of assessing truth. We lay here the foundations of a postmodern fuzzy set and fuzzy logic theory addressing these issues by deconstructing fuzzy truth values and fuzzy set membership functions to re-capture the human knowledge and subjectivity structure in membership function evaluations. We formulate a fractal multi-modal logic of Kabbalah which integrates the cognitive, emotional and behavioral levels of humanistic systems into epistemic and modal, deontic and doxastic and dynamic multi-modal logic. This is done by creating a fractal multi-modal Kabbalah possible worlds semantic frame of Kripke model type. The Kabbalah possible worlds semantic frame integrates together both the multi-modal logic aspects and their Kripke possible worlds model. We will not focus here on modal operators and axiom sets. We constructively define a fractal multi-modal Kabbalistic L-fuzzy set as the central concept of the postmodern fuzzy set theory based on Kabbalah logic and semantics. 展开更多
关键词 L-fuzzy SETS fuzzy SETS fuzzy LOGIC Modal LOGIC fuzzy Semantics Kripke Possible Worlds Model Kabbalah Sefirot Partzufim Tree of Life Tikkun POSTMODERNISM DECONSTRUCTION LOGIC Humanistic Systems
下载PDF
Active micro-vibration control based on improved variable step size LMS algorithm 被引量:1
18
作者 李相敏 Fang Yubin +2 位作者 Zhu Xiaojin Huang Yonghui Zhou Yijia 《High Technology Letters》 EI CAS 2020年第2期178-187,共10页
The contradiction of variable step size least mean square(LMS)algorithm between fast convergence speed and small steady-state error has always existed.So,a new algorithm based on the combination of logarithmic and sym... The contradiction of variable step size least mean square(LMS)algorithm between fast convergence speed and small steady-state error has always existed.So,a new algorithm based on the combination of logarithmic and symbolic function and step size factor is proposed.It establishes a new updating method of step factor that is related to step factor and error signal.This work makes an analysis from 3 aspects:theoretical analysis,theoretical verification and specific experiments.The experimental results show that the proposed algorithm is superior to other variable step size algorithms in convergence speed and steady-state error. 展开更多
关键词 adaptive filtering variable step size least mean square(LMS)algorithm logarithmic and SYMBOLIC functions convergence and STEADY state error ACTIVE CONTROL of micro vibration
下载PDF
Enhanced Euclid Algorithm for Modular Multiplicative Inverse and Its Application in Cryptographic Protocols
19
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2010年第12期901-906,共6页
Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorit... Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorithm, for modular multiplicative inverse (MMI). Analysis of the proposed algorithm shows that it is more efficient than the Extended Euclid algorithm (XEA). In addition, if a MMI does not exist, then it is not necessary to use the Backtracking procedure in the proposed algorithm;this case requires fewer operations on every step (divisions, multiplications, additions, assignments and push operations on stack), than the XEA. Overall, XEA uses more multiplications, additions, assignments and twice as many variables than the proposed algorithm. 展开更多
关键词 Extended-Euclid algorithm MODULAR MULTIPLICATIVE INVERSE Public-Key Cryptography RSA Cryptocol Rabin Information Hiding algorithm ELGAMAL ENCRYPTION/DECRYPTION NTRU Cryptosystem Computer Simulation Low Memory Devices
下载PDF
Fuzzy Firefly Based Intelligent Algorithm for Load Balancing inMobile Cloud Computing
20
作者 Poonam Suman Sangwan 《Computers, Materials & Continua》 SCIE EI 2023年第1期1783-1799,共17页
This paper presents a novel fuzzy firefly-based intelligent algorithm for load balancing in mobile cloud computing while reducing makespan.The proposed technique implicitly acts intelligently by using inherent traits ... This paper presents a novel fuzzy firefly-based intelligent algorithm for load balancing in mobile cloud computing while reducing makespan.The proposed technique implicitly acts intelligently by using inherent traits of fuzzy and firefly.It automatically adjusts its behavior or converges depending on the information gathered during the search process and objective function.It works for 3-tier architecture,including cloudlet and public cloud.As cloudlets have limited resources,fuzzy logic is used for cloudlet selection using capacity and waiting time as input.Fuzzy provides human-like decisions without using any mathematical model.Firefly is a powerful meta-heuristic optimization technique to balance diversification and solution speed.It balances the load on cloud and cloudlet while minimizing makespan and execution time.However,it may trap in local optimum;levy flight can handle it.Hybridization of fuzzy fireflywith levy flight is a novel technique that provides reduced makespan,execution time,and Degree of imbalance while balancing the load.Simulation has been carried out on the Cloud Analyst platform with National Aeronautics and Space Administration(NASA)and Clarknet datasets.Results show that the proposed algorithm outperforms Ant Colony Optimization Queue Decision Maker(ACOQDM),Distributed Scheduling Optimization Algorithm(DSOA),andUtility-based Firefly Algorithm(UFA)when compared in terms of makespan,Degree of imbalance,and Figure of Merit. 展开更多
关键词 Cloud computing CLOUDLET mobile cloud computing fuzzy FIREFLY load balancing MAKESPAN degree of imbalance
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部